IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_4bfc1eb6-f636-40d5-877a-26d9ad5d39b1.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_4bfc1eb6-f636-40d5-877a-26d9ad5d39b1.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A556AD39MAI8N3RB8VMZ.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HQFPMO3MXXDRGLFH2JDX.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db83fbeb-70a2-415c-a953-7e22e98abec0} 7824 "\\.\pipe\gecko-crash-server-pipe.7824" 1fbd416db10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4496 -parentBuildID 20230927232528 -prefsHandle 4488 -prefMapHandle 4484 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f860fbe6-ec8e-4a4f-a1d6-0b39b6fa37a0} 7824 "\\.\pipe\gecko-crash-server-pipe.7824" 1fbe6298210 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4880 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4852 -prefMapHandle 2596 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55e9d9f9-db94-4c76-89f1-84360c2f0d61} 7824 "\\.\pipe\gecko-crash-server-pipe.7824" 1fbe5520f10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://login.li
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.17.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
151.101.1.91
services.addons.mozilla.org
United States
142.250.181.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1FBDAE79000
heap
page read and write
1FBE16CC000
heap
page read and write
1FBE4155000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE59BC000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBEBFA4000
trusted library allocation
page read and write
1FBE4917000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBF0326000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE4D49000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBEC0EA000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBE52E5000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
2530E5F9000
heap
page read and write
1FBE1671000
heap
page read and write
2AD4D866000
trusted library allocation
page read and write
1FBEF7FD000
trusted library allocation
page read and write
1FBEC1C5000
trusted library allocation
page read and write
1FBEC1D3000
trusted library allocation
page read and write
1FBEC012000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE3980000
trusted library allocation
page read and write
1FBEFE0D000
trusted library allocation
page read and write
1FBE4E6A000
trusted library allocation
page read and write
1FBE49FB000
trusted library allocation
page read and write
1FBE48BB000
trusted library allocation
page read and write
1D8C9E3F000
unclassified section
page read and write
1FBDAE79000
heap
page read and write
1FBEBE5D000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBE4CEB000
trusted library allocation
page read and write
1FBE4D3B000
trusted library allocation
page read and write
1FBE3EDC000
trusted library allocation
page read and write
1FBE49CB000
trusted library allocation
page read and write
1FBE50F7000
trusted library allocation
page read and write
1FBE5AA6000
trusted library allocation
page read and write
1FBE6935000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1D8CA012000
trusted library allocation
page read and write
1FBE4F95000
trusted library allocation
page read and write
1FBEC2EB000
trusted library allocation
page read and write
1FBE519B000
trusted library allocation
page read and write
1FBDAE00000
heap
page read and write
1FBE6925000
trusted library allocation
page read and write
1FBDAE4D000
heap
page read and write
21B44D3C000
heap
page read and write
1FBE5A70000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
2AD4D297000
remote allocation
page execute read
1FBDAEA3000
heap
page read and write
1FBE51C2000
trusted library allocation
page read and write
1FBE138E000
trusted library allocation
page read and write
E3CBEBE000
unkown
page readonly
1FBDAE55000
heap
page read and write
1FBEC08B000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBF0551000
heap
page read and write
1FBEBED8000
trusted library allocation
page read and write
1FBE4D49000
trusted library allocation
page read and write
1FBE415F000
trusted library allocation
page read and write
1FBEDA2E000
trusted library allocation
page read and write
1FBEC0F6000
trusted library allocation
page read and write
1FBDFE1E000
trusted library allocation
page read and write
1FBE168E000
heap
page read and write
1FBE513C000
trusted library allocation
page read and write
1FBE49E9000
trusted library allocation
page read and write
1FBEFDE6000
trusted library allocation
page read and write
1FBE5263000
trusted library allocation
page read and write
1FBE68AA000
trusted library allocation
page read and write
1FBF0347000
trusted library allocation
page read and write
1FBDAE15000
heap
page read and write
1FBE4CFD000
trusted library allocation
page read and write
1FBEC240000
trusted library allocation
page read and write
1FBE5A89000
trusted library allocation
page read and write
1FBE5A83000
trusted library allocation
page read and write
1FBE3D9E000
trusted library allocation
page read and write
1FBEBD8A000
trusted library allocation
page read and write
1FBF04E2000
trusted library allocation
page read and write
1FBE64AD000
trusted library allocation
page read and write
1FBEFF7D000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBE52F0000
trusted library allocation
page read and write
1FBF0595000
heap
page read and write
1FBF034D000
trusted library allocation
page read and write
1FBEC18E000
trusted library allocation
page read and write
1FBE10DD000
trusted library allocation
page read and write
1FBDAE2B000
heap
page read and write
1FBE3ECB000
trusted library allocation
page read and write
E3CCF3E000
unkown
page readonly
1FBDF7C1000
trusted library allocation
page read and write
1FBEE5E4000
trusted library allocation
page read and write
1FBEC2F0000
trusted library allocation
page read and write
1FBF033F000
trusted library allocation
page read and write
1FBEC382000
trusted library allocation
page read and write
1FBE73E9000
trusted library allocation
page read and write
1FBEBDFC000
trusted library allocation
page read and write
1FBE79F7000
trusted library allocation
page read and write
1FBF0551000
heap
page read and write
1FBEFFB3000
trusted library allocation
page read and write
1FBE7979000
trusted library allocation
page read and write
1FBEC18C000
trusted library allocation
page read and write
1FBEFEE9000
trusted library allocation
page read and write
1FBEE5E1000
trusted library allocation
page read and write
1FBEC1FD000
trusted library allocation
page read and write
283C22BC000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBDAE1A000
heap
page read and write
1FBE5276000
trusted library allocation
page read and write
1FBE5A37000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE5A66000
trusted library allocation
page read and write
1FBEFAAC000
trusted library allocation
page read and write
1FBDAEAA000
heap
page read and write
1FBE42FC000
trusted library allocation
page read and write
1FBE5198000
trusted library allocation
page read and write
1FBE55FC000
trusted library allocation
page read and write
1FBEBDD7000
trusted library allocation
page read and write
1FBE1669000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBE168A000
heap
page read and write
1FBDAE35000
heap
page read and write
21B44D6A000
heap
page read and write
1FBE16DA000
heap
page read and write
1FBE69E3000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE7709000
trusted library allocation
page read and write
2AD4D879000
trusted library allocation
page read and write
1FBE4FE8000
trusted library allocation
page read and write
1FBE0EAE000
trusted library allocation
page read and write
1FBE52EB000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBEC2FE000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBE5289000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBE1135000
trusted library allocation
page read and write
1FBEC0F2000
trusted library allocation
page read and write
1FBDAE41000
heap
page read and write
1FBEDA57000
trusted library allocation
page read and write
21B44300000
heap
page read and write
1FBE1637000
heap
page read and write
1FBE74FD000
trusted library allocation
page read and write
1FBE0EAE000
trusted library allocation
page read and write
1FBE52D1000
trusted library allocation
page read and write
1FBE874C000
trusted library allocation
page read and write
1FBE491C000
trusted library allocation
page read and write
1FBE63A8000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE52DB000
trusted library allocation
page read and write
1FBEFAB3000
trusted library allocation
page read and write
1FBEBDB9000
trusted library allocation
page read and write
1FBF0B99000
trusted library allocation
page read and write
1FBEC0FE000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBEC23E000
trusted library allocation
page read and write
1FBE4D50000
trusted library allocation
page read and write
1FBEC1DB000
trusted library allocation
page read and write
1FBE79FB000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE527F000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE53C0000
trusted library allocation
page read and write
1FBF04B8000
trusted library allocation
page read and write
1FBEFB62000
trusted library allocation
page read and write
1FBE68A3000
trusted library allocation
page read and write
1FBE1061000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE51A7000
trusted library allocation
page read and write
1FBE545D000
trusted library allocation
page read and write
1FBF032E000
trusted library allocation
page read and write
1FBDAE9C000
heap
page read and write
1FBDAE4E000
heap
page read and write
1FBE506C000
trusted library allocation
page read and write
1FBE50C7000
trusted library allocation
page read and write
21B447E9000
trusted library allocation
page read and write
1FBE16A0000
heap
page read and write
1FBE77B0000
trusted library allocation
page read and write
1FBE77D1000
trusted library allocation
page read and write
1FBE4FB6000
trusted library allocation
page read and write
1D8C9C60000
unclassified section
page readonly
21B44761000
trusted library allocation
page read and write
21B45377000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBEBDC7000
trusted library allocation
page read and write
1FBE106B000
trusted library allocation
page read and write
21B44DD1000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE4FE6000
trusted library allocation
page read and write
1FBE52F3000
trusted library allocation
page read and write
1FBE4F76000
trusted library allocation
page read and write
1FBE3EEA000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBE696C000
trusted library allocation
page read and write
1FBEFA9F000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBEFFE7000
trusted library allocation
page read and write
1FBE3F9D000
trusted library allocation
page read and write
21B44D40000
heap
page read and write
1FBEFE21000
trusted library allocation
page read and write
1FBE39FB000
trusted library allocation
page read and write
1FBE4D92000
trusted library allocation
page read and write
5C0000
unkown
page readonly
1FBE4D4C000
trusted library allocation
page read and write
1FBDAE36000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBEC1DE000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBEFFAD000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBEBDD1000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE1684000
heap
page read and write
1FBE3F4D000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE56EC000
trusted library allocation
page read and write
1D8CA092000
trusted library allocation
page read and write
1FBF0B99000
trusted library allocation
page read and write
1FBE4A8F000
trusted library allocation
page read and write
1FBE3D8E000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBE5169000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE3933000
trusted library allocation
page read and write
21B45377000
heap
page read and write
1FBE793F000
trusted library allocation
page read and write
1FBF0325000
trusted library allocation
page read and write
1FBE4FB6000
trusted library allocation
page read and write
1FBE775E000
trusted library allocation
page read and write
1FBE522D000
trusted library allocation
page read and write
1FBE16D7000
heap
page read and write
1FBDAE29000
heap
page read and write
1FBDAE2A000
heap
page read and write
1FBE4D4C000
trusted library allocation
page read and write
1FBEBDBD000
trusted library allocation
page read and write
1FBE5AB1000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBEC1E4000
trusted library allocation
page read and write
1FBE3E65000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBE4DF6000
trusted library allocation
page read and write
1FBE7421000
trusted library allocation
page read and write
1FBE3F65000
trusted library allocation
page read and write
1FBE1675000
heap
page read and write
1FBDAE32000
heap
page read and write
2AD4D86A000
trusted library allocation
page read and write
1FBEC1DE000
trusted library allocation
page read and write
1FBEC14B000
trusted library allocation
page read and write
1FBDFEBA000
trusted library allocation
page read and write
1FBE517E000
trusted library allocation
page read and write
1FBEC1DF000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBEC18C000
trusted library allocation
page read and write
1FBF0348000
trusted library allocation
page read and write
1FBE4E96000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBDAE06000
heap
page read and write
1FBE487D000
trusted library allocation
page read and write
1FBE4CD8000
trusted library allocation
page read and write
1FBE4D57000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
65C000
unkown
page readonly
1FBEFF91000
trusted library allocation
page read and write
1FBEC0EE000
trusted library allocation
page read and write
1FBE7744000
trusted library allocation
page read and write
1FBE4F76000
trusted library allocation
page read and write
1FBE7437000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
21B44D5D000
heap
page read and write
21B447F1000
trusted library allocation
page read and write
1FBEC2F6000
trusted library allocation
page read and write
1FBE4D49000
trusted library allocation
page read and write
1FBE7965000
trusted library allocation
page read and write
21B4435A000
heap
page read and write
1FBE4F86000
trusted library allocation
page read and write
1FBE7BCE000
trusted library allocation
page read and write
1FBE51B0000
trusted library allocation
page read and write
1FBEBDC7000
trusted library allocation
page read and write
1FBE8748000
trusted library allocation
page read and write
1FBE524E000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE52E5000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE2F000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBE77E4000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBE48EC000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
E3CBE7D000
stack
page read and write
1FBDAE32000
heap
page read and write
7F9D67E000
unkown
page readonly
5C1000
unkown
page execute read
1FBE61FD000
trusted library allocation
page read and write
1FBEC18E000
trusted library allocation
page read and write
1FBE1679000
heap
page read and write
1FBE5194000
trusted library allocation
page read and write
1FBE52F7000
trusted library allocation
page read and write
1FBEFF9C000
trusted library allocation
page read and write
1FBE52EB000
trusted library allocation
page read and write
21B447CE000
trusted library allocation
page read and write
1FBE3E96000
trusted library allocation
page read and write
1FBF036B000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE23000
heap
page read and write
154000
heap
page read and write
1FBDAE2E000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE47000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBF032E000
trusted library allocation
page read and write
1FBEFFAD000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE500A000
trusted library allocation
page read and write
1FBEFF7E000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
283C22BE000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBE3962000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBDAE99000
heap
page read and write
1FBE8B02000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBEFDD6000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBEC240000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE77E8000
trusted library allocation
page read and write
1FBED9A7000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
2AD4D2A0000
unclassified section
page readonly
C2E000
heap
page read and write
1FBE677A000
trusted library allocation
page read and write
1FBE41BE000
trusted library allocation
page read and write
1FBE693C000
trusted library allocation
page read and write
21B44D3F000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBDAE23000
heap
page read and write
1FBE3E5F000
trusted library allocation
page read and write
1FBE51CA000
trusted library allocation
page read and write
2AD4D432000
unclassified section
page read and write
1FBDAE55000
heap
page read and write
1FBEBDCB000
trusted library allocation
page read and write
1FBEC18E000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBEBE74000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
21B44773000
trusted library allocation
page read and write
1FBEEE00000
trusted library allocation
page read and write
1FBE5273000
trusted library allocation
page read and write
1FBE496E000
trusted library allocation
page read and write
1FBEC21F000
trusted library allocation
page read and write
1FBE4D79000
trusted library allocation
page read and write
1FBF04C2000
trusted library allocation
page read and write
1FBE6944000
trusted library allocation
page read and write
1FBEC197000
trusted library allocation
page read and write
1FBEC2D3000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE7458000
trusted library allocation
page read and write
1FBE3980000
trusted library allocation
page read and write
1FBED9AC000
trusted library allocation
page read and write
2530E907000
trusted library allocation
page read and write
1FBE61AE000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE774E000
trusted library allocation
page read and write
1FBEC08D000
trusted library allocation
page read and write
1FBEFFD5000
trusted library allocation
page read and write
21B45321000
heap
page read and write
1D8CA0B7000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBDAE02000
heap
page read and write
1FBDAE41000
heap
page read and write
1FBEC2F0000
trusted library allocation
page read and write
1FBE5263000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEC2FA000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEFAAC000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBE6478000
trusted library allocation
page read and write
1FBE52F7000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBEC191000
trusted library allocation
page read and write
1FBF034D000
trusted library allocation
page read and write
21B44700000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBDAE16000
heap
page read and write
1FBE6982000
trusted library allocation
page read and write
1FBE8741000
trusted library allocation
page read and write
1FBE4E94000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBE7721000
trusted library allocation
page read and write
1FBE506A000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE68E4000
trusted library allocation
page read and write
1FBE69F2000
trusted library allocation
page read and write
1FBF04F7000
trusted library allocation
page read and write
1FBE4F5F000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE99000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBEBE42000
trusted library allocation
page read and write
1FBEBE6C000
trusted library allocation
page read and write
1FBE519B000
trusted library allocation
page read and write
1FBE0EE1000
trusted library allocation
page read and write
1FBED8C8000
trusted library allocation
page read and write
21B45379000
heap
page read and write
1FBDAE16000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE73E7000
trusted library allocation
page read and write
1FBE49AD000
trusted library allocation
page read and write
1FBEFADE000
trusted library allocation
page read and write
1FBEC187000
trusted library allocation
page read and write
21B44490000
trusted library section
page readonly
1FBE514D000
trusted library allocation
page read and write
1FBE743A000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBF05AB000
heap
page read and write
21B446F6000
heap
page read and write
1FBE4E82000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBEC2F5000
trusted library allocation
page read and write
1FBE672E000
trusted library allocation
page read and write
1FBEBE16000
trusted library allocation
page read and write
1D8CA21F000
trusted library allocation
page read and write
21B45358000
heap
page read and write
1FBE1673000
heap
page read and write
1FBF05C1000
heap
page read and write
1FBE3DCE000
trusted library allocation
page read and write
1FBE4D55000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
21B45344000
heap
page read and write
1FBE4D47000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBE646E000
trusted library allocation
page read and write
1D8CA05D000
trusted library allocation
page read and write
21B44CD0000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBEBE74000
trusted library allocation
page read and write
1FBE527F000
trusted library allocation
page read and write
1FBF0551000
heap
page read and write
2530E730000
heap
page read and write
1FBE39F7000
trusted library allocation
page read and write
1FBEC35D000
trusted library allocation
page read and write
1FBEC3D0000
trusted library allocation
page read and write
1FBE1390000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBE74FD000
trusted library allocation
page read and write
1FBE4FAA000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBE53C9000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBEC0BE000
trusted library allocation
page read and write
1FBE1684000
heap
page read and write
1FBE5140000
trusted library allocation
page read and write
1FBE5AEE000
trusted library allocation
page read and write
1FBE4D77000
trusted library allocation
page read and write
1FBE3EC0000
trusted library allocation
page read and write
1FBE53E0000
trusted library allocation
page read and write
1FBEC1CF000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE3ED2000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBE3D9E000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBDAE1A000
heap
page read and write
1FBDAE35000
heap
page read and write
C36000
heap
page read and write
1FBEBDBD000
trusted library allocation
page read and write
1FBEFA51000
trusted library allocation
page read and write
C42000
heap
page read and write
1FBE3EC0000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBE3F9D000
trusted library allocation
page read and write
1FBE0E79000
trusted library allocation
page read and write
65C000
unkown
page readonly
1FBE59DF000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBDAE0E000
heap
page read and write
1FBE3EE9000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBEFF1D000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE546B000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBF0B86000
trusted library allocation
page read and write
1FBE52E7000
trusted library allocation
page read and write
1FBE6500000
trusted library allocation
page read and write
1FBE73D5000
trusted library allocation
page read and write
1FBDFE26000
trusted library allocation
page read and write
1FBEC17A000
trusted library allocation
page read and write
1FBE41C5000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE5002000
trusted library allocation
page read and write
1FBE488B000
trusted library allocation
page read and write
1FBEC600000
trusted library allocation
page read and write
21B44723000
trusted library allocation
page read and write
1FBE131F000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBEC234000
trusted library allocation
page read and write
1FBED96D000
trusted library allocation
page read and write
1D8C9C80000
heap
page read and write
1FBE51B1000
trusted library allocation
page read and write
1FBE4135000
trusted library allocation
page read and write
1FBDAE42000
heap
page read and write
1FBE48A8000
trusted library allocation
page read and write
1FBE3ED6000
trusted library allocation
page read and write
1FBE13FE000
trusted library allocation
page read and write
1FBE4FA6000
trusted library allocation
page read and write
1FBEBE32000
trusted library allocation
page read and write
1FBDAE38000
heap
page read and write
1FBE5262000
trusted library allocation
page read and write
1D8C9E70000
unclassified section
page readonly
1FBE3D6E000
trusted library allocation
page read and write
1FBEBDDF000
trusted library allocation
page read and write
1FBE645A000
trusted library allocation
page read and write
21B44DDD000
heap
page read and write
1FBE3962000
trusted library allocation
page read and write
7F9C5FE000
unkown
page readonly
1FBE74BF000
trusted library allocation
page read and write
1FBDAE40000
heap
page read and write
1FBDAE50000
heap
page read and write
1FBE52E2000
trusted library allocation
page read and write
1FBE1685000
heap
page read and write
1D8CA060000
trusted library allocation
page read and write
2AD4D440000
heap
page read and write
1FBEFE9F000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBDAE02000
heap
page read and write
1FBEBE6F000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBE0E41000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBE5AF1000
trusted library allocation
page read and write
21B44703000
trusted library allocation
page read and write
1FBE5443000
trusted library allocation
page read and write
1D8C9BD0000
unclassified section
page readonly
1FBDAE79000
heap
page read and write
1FBE3D70000
trusted library allocation
page read and write
1FBF0B6E000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBED9A3000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBE16D7000
heap
page read and write
1FBE744B000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE0E89000
trusted library allocation
page read and write
1FBE6753000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBEC0F4000
trusted library allocation
page read and write
1FBE48C3000
trusted library allocation
page read and write
1FBE52AC000
trusted library allocation
page read and write
1FBE5157000
trusted library allocation
page read and write
1FBE740F000
trusted library allocation
page read and write
1FBE48FD000
trusted library allocation
page read and write
1FBF044B000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE2F000
heap
page read and write
1FBE49CE000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBE5653000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBEFE65000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBEFE35000
trusted library allocation
page read and write
1FBE5670000
trusted library allocation
page read and write
1FBEC13B000
trusted library allocation
page read and write
2AD4D813000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBDFEA7000
trusted library allocation
page read and write
1FBDAE28000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBEC1C5000
trusted library allocation
page read and write
EA4073E000
unkown
page readonly
C12000
heap
page read and write
1FBE4117000
trusted library allocation
page read and write
1FBDAE34000
heap
page read and write
1FBE7494000
trusted library allocation
page read and write
1FBDAE2E000
heap
page read and write
1FBE4D38000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBDAE79000
heap
page read and write
154000
heap
page read and write
1FBE4E79000
trusted library allocation
page read and write
1FBF032E000
trusted library allocation
page read and write
1FBE3E70000
trusted library allocation
page read and write
1FBE4FA6000
trusted library allocation
page read and write
1FBEC15A000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBE3F39000
trusted library allocation
page read and write
1FBE41D8000
trusted library allocation
page read and write
1FBE69C7000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBE48AE000
trusted library allocation
page read and write
21B44DC0000
heap
page read and write
1FBEC01C000
trusted library allocation
page read and write
1FBE4D47000
trusted library allocation
page read and write
1FBE3ECB000
trusted library allocation
page read and write
1FBEF77C000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBE41F6000
trusted library allocation
page read and write
1FBDAE42000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBDAE1A000
heap
page read and write
1FBE51C7000
trusted library allocation
page read and write
1FBE5AAB000
trusted library allocation
page read and write
1FBE4AA1000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
154000
heap
page read and write
1FBE3F81000
trusted library allocation
page read and write
1FBE67AE000
trusted library allocation
page read and write
1FBE54D5000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
2AD4D8C4000
trusted library allocation
page read and write
21B44748000
trusted library allocation
page read and write
1FBE4866000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE67AE000
trusted library allocation
page read and write
1FBDAE3E000
heap
page read and write
C44000
heap
page read and write
21B44D49000
heap
page read and write
1FBEFF99000
trusted library allocation
page read and write
1FBF0551000
heap
page read and write
1FBEC14B000
trusted library allocation
page read and write
1FBE61B4000
trusted library allocation
page read and write
1FBF0307000
trusted library allocation
page read and write
21B4532A000
heap
page read and write
1FBE3D9E000
trusted library allocation
page read and write
1D8C9C40000
remote allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE39DC000
trusted library allocation
page read and write
21B44DC8000
heap
page read and write
1FBE41EA000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBE5458000
trusted library allocation
page read and write
1FBDAE44000
heap
page read and write
1FBE73EF000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBE0EAE000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBF04B2000
trusted library allocation
page read and write
1FBF04C2000
trusted library allocation
page read and write
1FBE4CD8000
trusted library allocation
page read and write
1FBE52FB000
trusted library allocation
page read and write
1FBEBFF5000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBE3F1B000
trusted library allocation
page read and write
1FBE4F46000
trusted library allocation
page read and write
1FBE3E77000
trusted library allocation
page read and write
1FBE6753000
trusted library allocation
page read and write
1FBEFFE5000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBF0340000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE48FD000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBE7464000
trusted library allocation
page read and write
1FBE3F6D000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBE7444000
trusted library allocation
page read and write
1FBEC139000
trusted library allocation
page read and write
682000
unkown
page readonly
91913FF000
stack
page read and write
1FBDAE35000
heap
page read and write
2AD4D210000
unclassified section
page readonly
1FBEBF92000
trusted library allocation
page read and write
1FBE64A0000
trusted library allocation
page read and write
1FBEFFF0000
trusted library allocation
page read and write
1FBE48EC000
trusted library allocation
page read and write
1FBEC140000
trusted library allocation
page read and write
1FBE506A000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
A7F000
stack
page read and write
1FBDAE1D000
heap
page read and write
1FBDAE42000
heap
page read and write
1FBE74B4000
trusted library allocation
page read and write
1FBE4FFA000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE4D92000
trusted library allocation
page read and write
1FBE4FAD000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBDAE0E000
heap
page read and write
1FBE5982000
trusted library allocation
page read and write
1FBEBE7C000
trusted library allocation
page read and write
1FBE13CF000
trusted library allocation
page read and write
1FBE64C8000
trusted library allocation
page read and write
1FBE51CA000
trusted library allocation
page read and write
1FBEE58F000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
21B44DCE000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBDF7F8000
trusted library allocation
page read and write
1FBE487F000
trusted library allocation
page read and write
1FBEC0A0000
trusted library allocation
page read and write
1FBE5A2C000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBE77D1000
trusted library allocation
page read and write
1FBE4FF5000
trusted library allocation
page read and write
1FBE481B000
trusted library allocation
page read and write
1FBE41D8000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBE69CF000
trusted library allocation
page read and write
1FBE61D2000
trusted library allocation
page read and write
1FBE41C3000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE48CF000
trusted library allocation
page read and write
1FBE4EEF000
trusted library allocation
page read and write
1FBDAE39000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBE1371000
trusted library allocation
page read and write
1FBF044B000
trusted library allocation
page read and write
1FBE6143000
trusted library allocation
page read and write
1FBE5163000
trusted library allocation
page read and write
1FBEF7F0000
trusted library allocation
page read and write
1FBE5763000
trusted library allocation
page read and write
1FBEFF91000
trusted library allocation
page read and write
1FBE3DA5000
trusted library allocation
page read and write
1FBE4883000
trusted library allocation
page read and write
1FBE488B000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBE4157000
trusted library allocation
page read and write
1FBE5976000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE56F3000
trusted library allocation
page read and write
1FBE4D35000
trusted library allocation
page read and write
1FBE487F000
trusted library allocation
page read and write
1FBEC1BD000
trusted library allocation
page read and write
1FBE4155000
trusted library allocation
page read and write
1FBE69FA000
trusted library allocation
page read and write
1FBEC2C3000
trusted library allocation
page read and write
1FBE3D84000
trusted library allocation
page read and write
1FBE1664000
heap
page read and write
1FBE3EBD000
trusted library allocation
page read and write
1FBEC07B000
trusted library allocation
page read and write
694000
unkown
page readonly
1FBDAE49000
heap
page read and write
1FBEFEFB000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBEDA06000
trusted library allocation
page read and write
1FBEC1BC000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
2AD4D3B0000
heap
page read and write
1FBE41F7000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBEC2E2000
trusted library allocation
page read and write
1FBE77C5000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1D8CA097000
trusted library allocation
page read and write
1FBEBDC7000
trusted library allocation
page read and write
1FBE5A89000
trusted library allocation
page read and write
1FBF04E2000
trusted library allocation
page read and write
1FBF0310000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBE5A51000
trusted library allocation
page read and write
1FBE5456000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBE7735000
trusted library allocation
page read and write
1FBDAE4F000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE7944000
trusted library allocation
page read and write
1FBE3EBE000
trusted library allocation
page read and write
1FBE3EC8000
trusted library allocation
page read and write
1FBEFBAF000
trusted library allocation
page read and write
99000
stack
page read and write
1FBE74DE000
trusted library allocation
page read and write
1FBDAE36000
heap
page read and write
1FBE49C3000
trusted library allocation
page read and write
1FBE3ECB000
trusted library allocation
page read and write
1FBE4950000
trusted library allocation
page read and write
1FBE5A4F000
trusted library allocation
page read and write
1FBE49C3000
trusted library allocation
page read and write
1FBEFFA9000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
1FBDAE4E000
heap
page read and write
1FBE3D8E000
trusted library allocation
page read and write
1FBDF7EF000
trusted library allocation
page read and write
1D8C9CC0000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBE4DA0000
trusted library allocation
page read and write
1FBEFFF9000
trusted library allocation
page read and write
1FBE1666000
heap
page read and write
1FBEC240000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBDAE4E000
heap
page read and write
1FBEFA3D000
trusted library allocation
page read and write
1FBE13F4000
trusted library allocation
page read and write
1FBE53E3000
trusted library allocation
page read and write
1FBE1385000
trusted library allocation
page read and write
21B45214000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBE41C8000
trusted library allocation
page read and write
1FBEE58A000
trusted library allocation
page read and write
1FBEBE74000
trusted library allocation
page read and write
1FBE0E8E000
trusted library allocation
page read and write
1FBE4BFB000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1D8CA047000
trusted library allocation
page read and write
E3CC73E000
unkown
page read and write
1FBDAE55000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBE74BA000
trusted library allocation
page read and write
1FBE4E8B000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBE5A62000
trusted library allocation
page read and write
2F91000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBEC1CA000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE4C97000
trusted library allocation
page read and write
C36000
heap
page read and write
21B45377000
heap
page read and write
2AD4D85F000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBDAE4E000
heap
page read and write
1FBEF200000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1D8CA1F6000
heap
page read and write
1FBE53E0000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE5194000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBEFA55000
trusted library allocation
page read and write
1FBE52A1000
trusted library allocation
page read and write
7F9DEFE000
stack
page read and write
1FBEC0B9000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
C2B000
heap
page read and write
1FBEC144000
trusted library allocation
page read and write
1FBE3ECB000
trusted library allocation
page read and write
1FBEC08F000
trusted library allocation
page read and write
1FBE518B000
trusted library allocation
page read and write
1FBDAE2A000
heap
page read and write
9191BFE000
stack
page read and write
1FBE4FA6000
trusted library allocation
page read and write
1FBE59D6000
trusted library allocation
page read and write
1FBEC0F2000
trusted library allocation
page read and write
1FBE528F000
trusted library allocation
page read and write
1FBE5AB1000
trusted library allocation
page read and write
1FBE39C9000
trusted library allocation
page read and write
1FBE3D80000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE43000
heap
page read and write
1FBE3E71000
trusted library allocation
page read and write
1FBE61B6000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAEB4000
heap
page read and write
1FBEFECC000
trusted library allocation
page read and write
1FBEC14B000
trusted library allocation
page read and write
1FBEFFB6000
trusted library allocation
page read and write
1FBEC0F8000
trusted library allocation
page read and write
1FBE1064000
trusted library allocation
page read and write
1FBEBE62000
trusted library allocation
page read and write
1FBE3EE4000
trusted library allocation
page read and write
1FBE63C6000
trusted library allocation
page read and write
1FBE528F000
trusted library allocation
page read and write
1FBE5A4D000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBDAE53000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBE5AF1000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBF04B2000
trusted library allocation
page read and write
1FBE77FB000
trusted library allocation
page read and write
1FBEF77A000
trusted library allocation
page read and write
1FBDAE28000
heap
page read and write
1FBE672E000
trusted library allocation
page read and write
1FBEC2C8000
trusted library allocation
page read and write
1FBE39DB000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBE5439000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBE52FB000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBEC151000
trusted library allocation
page read and write
1FBE5183000
trusted library allocation
page read and write
C36000
heap
page read and write
1FBEC2FA000
trusted library allocation
page read and write
1FBE5A48000
trusted library allocation
page read and write
1FBEE5CF000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBE54CF000
trusted library allocation
page read and write
1FBE4955000
trusted library allocation
page read and write
1FBE0D93000
trusted library allocation
page read and write
21B44D3C000
heap
page read and write
1FBDAE2F000
heap
page read and write
1FBEC35C000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1D8CA010000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBDAE42000
heap
page read and write
1FBE51A7000
trusted library allocation
page read and write
1FBE7B2F000
trusted library allocation
page read and write
1FBE4AFB000
trusted library allocation
page read and write
1FBEFFAD000
trusted library allocation
page read and write
1FBE4AA3000
trusted library allocation
page read and write
1FBEFFA0000
trusted library allocation
page read and write
1FBE6870000
trusted library allocation
page read and write
1FBE77CC000
trusted library allocation
page read and write
1FBEE4E5000
trusted library allocation
page read and write
1FBE59D3000
trusted library allocation
page read and write
1FBE5AB1000
trusted library allocation
page read and write
1FBDAE4A000
heap
page read and write
1FBE5280000
trusted library allocation
page read and write
1FBEBE0E000
trusted library allocation
page read and write
7F9C67E000
unkown
page readonly
1FBEFFB0000
trusted library allocation
page read and write
1FBEFA2D000
trusted library allocation
page read and write
1FBEBE6F000
trusted library allocation
page read and write
1FBE4FA6000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBE4D72000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE4D000
heap
page read and write
1FBDAE41000
heap
page read and write
1FBE0EEC000
trusted library allocation
page read and write
1FBE5A57000
trusted library allocation
page read and write
1FBE10EB000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBE4AF5000
trusted library allocation
page read and write
1FBF0488000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBEC3C9000
trusted library allocation
page read and write
1FBE53F7000
trusted library allocation
page read and write
1FBEC0FE000
trusted library allocation
page read and write
1FBE74D4000
trusted library allocation
page read and write
1FBE413B000
trusted library allocation
page read and write
1FBE48BE000
trusted library allocation
page read and write
1FBEDA33000
trusted library allocation
page read and write
1FBEF78A000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBEBDDB000
trusted library allocation
page read and write
21B4448F000
unclassified section
page read and write
1FBE641F000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE0EC1000
trusted library allocation
page read and write
1FBEFADE000
trusted library allocation
page read and write
2AD4DA00000
trusted library allocation
page read and write
1FBE1664000
heap
page read and write
21B4532A000
heap
page read and write
1FBF0551000
heap
page read and write
1FBDAE42000
heap
page read and write
2AD4D873000
trusted library allocation
page read and write
1FBE6362000
trusted library allocation
page read and write
1FBE52FB000
trusted library allocation
page read and write
1FBE3ECB000
trusted library allocation
page read and write
1FBE4D6E000
trusted library allocation
page read and write
1FBDAE36000
heap
page read and write
1FBE53F7000
trusted library allocation
page read and write
1FBEC15F000
trusted library allocation
page read and write
1FBE3F7B000
trusted library allocation
page read and write
1FBEC1BC000
trusted library allocation
page read and write
1FBEC192000
trusted library allocation
page read and write
1FBE515F000
trusted library allocation
page read and write
21B45368000
heap
page read and write
283C0687000
heap
page read and write
1FBE49F3000
trusted library allocation
page read and write
1FBE112A000
trusted library allocation
page read and write
1FBE4FE5000
trusted library allocation
page read and write
1FBE52FE000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE1638000
heap
page read and write
1FBDAE2F000
heap
page read and write
1FBE1382000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
21B45206000
trusted library allocation
page read and write
1FBE774B000
trusted library allocation
page read and write
1FBE3EC1000
trusted library allocation
page read and write
1FBE50F7000
trusted library allocation
page read and write
1FBEC132000
trusted library allocation
page read and write
1FBDAEA3000
heap
page read and write
1FBE5449000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBEC15A000
trusted library allocation
page read and write
1FBE39D5000
trusted library allocation
page read and write
1FBEBF8F000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBEFD96000
trusted library allocation
page read and write
1FBEBE62000
trusted library allocation
page read and write
1FBE77F4000
trusted library allocation
page read and write
1FBE4D59000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBEF77C000
trusted library allocation
page read and write
1FBE16DA000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBEBDFC000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBEBE3C000
trusted library allocation
page read and write
2AD4D700000
trusted library allocation
page read and write
1FBE515B000
trusted library allocation
page read and write
1FBE39F5000
trusted library allocation
page read and write
1FBE51C7000
trusted library allocation
page read and write
1D8CA0E4000
trusted library allocation
page read and write
1FBEFA4A000
trusted library allocation
page read and write
1FBE53B7000
trusted library allocation
page read and write
1FBEE5C8000
trusted library allocation
page read and write
1FBE4918000
trusted library allocation
page read and write
1FBE105F000
trusted library allocation
page read and write
1FBE3F74000
trusted library allocation
page read and write
1FBE418A000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
154000
heap
page read and write
1FBDAE52000
heap
page read and write
1D8CA081000
trusted library allocation
page read and write
1FBE523F000
trusted library allocation
page read and write
1FBED9E4000
trusted library allocation
page read and write
1FBDAE2A000
heap
page read and write
1D8CA06E000
trusted library allocation
page read and write
1FBE4E88000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE69F8000
trusted library allocation
page read and write
1FBE0E2A000
trusted library allocation
page read and write
1FBE5678000
trusted library allocation
page read and write
21B44CE0000
heap
page read and write
1FBF04EC000
trusted library allocation
page read and write
1FBE63D8000
trusted library allocation
page read and write
1FBE39D5000
trusted library allocation
page read and write
1FBEBEB2000
trusted library allocation
page read and write
1FBF0477000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
2530E601000
heap
page read and write
21B447C2000
trusted library allocation
page read and write
1FBE5A4F000
trusted library allocation
page read and write
1FBE69BC000
trusted library allocation
page read and write
2530E7A0000
heap
page read and write
1FBDAE43000
heap
page read and write
1FBE52D3000
trusted library allocation
page read and write
682000
unkown
page readonly
1FBE3939000
trusted library allocation
page read and write
1FBEC1D2000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBEC231000
trusted library allocation
page read and write
1FBEFBAB000
trusted library allocation
page read and write
1FBF034D000
trusted library allocation
page read and write
1FBEC14D000
trusted library allocation
page read and write
1FBE4F62000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDFDF6000
trusted library allocation
page read and write
1FBE5965000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE68CC000
trusted library allocation
page read and write
1FBE494F000
trusted library allocation
page read and write
1FBDAE4D000
heap
page read and write
1FBEBDCB000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE52E7000
trusted library allocation
page read and write
1FBDAE4F000
heap
page read and write
1FBE772A000
trusted library allocation
page read and write
1FBF0BA6000
trusted library allocation
page read and write
1FBE48CF000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBE5695000
trusted library allocation
page read and write
1FBEC0F8000
trusted library allocation
page read and write
1FBE52D3000
trusted library allocation
page read and write
1FBE104B000
trusted library allocation
page read and write
1FBE5458000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBE7752000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBDAE4C000
heap
page read and write
1FBE51A7000
trusted library allocation
page read and write
1FBE3DCE000
trusted library allocation
page read and write
1FBEBDDB000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1D8CA215000
trusted library allocation
page read and write
1FBEC1EF000
trusted library allocation
page read and write
1FBEBDD1000
trusted library allocation
page read and write
1D8CA064000
trusted library allocation
page read and write
1FBE3DCE000
trusted library allocation
page read and write
1FBE5029000
trusted library allocation
page read and write
1FBEC1E6000
trusted library allocation
page read and write
1FBE4EF5000
trusted library allocation
page read and write
1FBE73F1000
trusted library allocation
page read and write
1F155381E000
trusted library allocation
page read and write
1FBEBD8A000
trusted library allocation
page read and write
21B442C0000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBDAE4D000
heap
page read and write
1FBEFE06000
trusted library allocation
page read and write
1FBE6159000
trusted library allocation
page read and write
1FBEFF99000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBDAE16000
heap
page read and write
1FBE52A1000
trusted library allocation
page read and write
1FBEBF80000
trusted library allocation
page read and write
1FBE3D8A000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBE52F7000
trusted library allocation
page read and write
1FBEBE78000
trusted library allocation
page read and write
1FBEC185000
trusted library allocation
page read and write
1FBEC3A2000
trusted library allocation
page read and write
1FBE3E5A000
trusted library allocation
page read and write
1FBE7961000
trusted library allocation
page read and write
1FBF0551000
heap
page read and write
1FBEFDA7000
trusted library allocation
page read and write
1FBEC14B000
trusted library allocation
page read and write
1FBE50DE000
trusted library allocation
page read and write
1FBE0EE1000
trusted library allocation
page read and write
1FBEFB42000
trusted library allocation
page read and write
1FBEC1B8000
trusted library allocation
page read and write
1FBE5189000
trusted library allocation
page read and write
1FBE0E89000
trusted library allocation
page read and write
1FBEC168000
trusted library allocation
page read and write
2F90000
heap
page read and write
1FBE1353000
trusted library allocation
page read and write
1FBEC1CA000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE55DC000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDFE26000
trusted library allocation
page read and write
1FBE51CC000
trusted library allocation
page read and write
283C0A00000
trusted library allocation
page read and write
1FBEFFA5000
trusted library allocation
page read and write
1FBE41EB000
trusted library allocation
page read and write
21B4533B000
heap
page read and write
1FBDAEB4000
heap
page read and write
1FBE5783000
trusted library allocation
page read and write
1FBEC3C7000
trusted library allocation
page read and write
1FBF034B000
trusted library allocation
page read and write
1FBE4F7E000
trusted library allocation
page read and write
C2F000
heap
page read and write
1FBDAE53000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBE3E77000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBF0BF0000
trusted library allocation
page read and write
1FBEC2D3000
trusted library allocation
page read and write
1FBE4FF7000
trusted library allocation
page read and write
1FBE5AA6000
trusted library allocation
page read and write
21B45358000
heap
page read and write
1FBE4F62000
trusted library allocation
page read and write
1FBE61BE000
trusted library allocation
page read and write
1FBEFF96000
trusted library allocation
page read and write
1FBEC2CC000
trusted library allocation
page read and write
91913FC000
stack
page read and write
1FBDAE4F000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE6407000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE77CC000
trusted library allocation
page read and write
2AD4D8F6000
trusted library allocation
page read and write
1FBE4EC2000
trusted library allocation
page read and write
1FBE4FE3000
trusted library allocation
page read and write
1FBEECA8000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
1FBE3F81000
trusted library allocation
page read and write
1FBE0EEE000
trusted library allocation
page read and write
1FBE74B7000
trusted library allocation
page read and write
1FBE5456000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBEC1BC000
trusted library allocation
page read and write
1FBE515B000
trusted library allocation
page read and write
1FBEFF99000
trusted library allocation
page read and write
21B44768000
trusted library allocation
page read and write
C36000
heap
page read and write
1FBE5383000
trusted library allocation
page read and write
1FBE4FA3000
trusted library allocation
page read and write
1FBE4D4E000
trusted library allocation
page read and write
1FBEC0EC000
trusted library allocation
page read and write
1FBE543F000
trusted library allocation
page read and write
1FBEC356000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE4EA4000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBE428B000
trusted library allocation
page read and write
1FBEC178000
trusted library allocation
page read and write
1FBE3D68000
trusted library allocation
page read and write
21B45368000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBEFB35000
trusted library allocation
page read and write
1FBEBFF9000
trusted library allocation
page read and write
C1F000
heap
page read and write
1FBE52D3000
trusted library allocation
page read and write
1FBE41F7000
trusted library allocation
page read and write
1FBE61B6000
trusted library allocation
page read and write
1FBEFA51000
trusted library allocation
page read and write
1FBE52FB000
trusted library allocation
page read and write
1FBE5258000
trusted library allocation
page read and write
1FBEC3C5000
trusted library allocation
page read and write
1FBE7494000
trusted library allocation
page read and write
1D8CA300000
heap
page read and write
1FBDAE0E000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDFE13000
trusted library allocation
page read and write
1FBDAE4D000
heap
page read and write
1FBE49EC000
trusted library allocation
page read and write
1FBF0B6E000
trusted library allocation
page read and write
1FBE50E6000
trusted library allocation
page read and write
1FBE52D7000
trusted library allocation
page read and write
1FBE74DC000
trusted library allocation
page read and write
1FBE74D4000
trusted library allocation
page read and write
1FBE77BA000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
2AD4D610000
heap
page read and write
1FBE6472000
trusted library allocation
page read and write
1FBE5251000
trusted library allocation
page read and write
1FBE0EC1000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE676B000
trusted library allocation
page read and write
1FBE4D47000
trusted library allocation
page read and write
1FBEBF32000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE3D62000
trusted library allocation
page read and write
1FBE3ED2000
trusted library allocation
page read and write
1FBE7985000
trusted library allocation
page read and write
1FBE39DB000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBDAE2F000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBE4D9B000
trusted library allocation
page read and write
1FBE4D24000
trusted library allocation
page read and write
1FBE4859000
trusted library allocation
page read and write
1FBE53A7000
trusted library allocation
page read and write
1FBE53DE000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEBDDF000
trusted library allocation
page read and write
1FBF04AA000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBE7961000
trusted library allocation
page read and write
1FBEC0F4000
trusted library allocation
page read and write
1FBEC17D000
trusted library allocation
page read and write
1FBDAE0D000
heap
page read and write
1FBE3ED2000
trusted library allocation
page read and write
1FBE7761000
trusted library allocation
page read and write
1FBEFBEE000
trusted library allocation
page read and write
1FBE5481000
trusted library allocation
page read and write
1FBF0367000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBEBF7A000
trusted library allocation
page read and write
E3CB5FE000
stack
page read and write
21B4533B000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBEBED0000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE4FE9000
trusted library allocation
page read and write
1FBE3EC1000
trusted library allocation
page read and write
1FBE6954000
trusted library allocation
page read and write
1FBE49DE000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDFD23000
trusted library allocation
page read and write
1FBE52FE000
trusted library allocation
page read and write
1FBE5AC3000
trusted library allocation
page read and write
1FBEFFDF000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBDAE43000
heap
page read and write
1FBE0EB2000
trusted library allocation
page read and write
1FBE74E4000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBE3FB6000
trusted library allocation
page read and write
1FBE0E3C000
trusted library allocation
page read and write
1FBEC2F2000
trusted library allocation
page read and write
1FBE4AE0000
trusted library allocation
page read and write
1FBEFF9C000
trusted library allocation
page read and write
1FBEC2EB000
trusted library allocation
page read and write
283C0689000
heap
page read and write
1FBE4EFA000
trusted library allocation
page read and write
21B44D99000
heap
page read and write
1FBDAE4E000
heap
page read and write
21B45368000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE4151000
trusted library allocation
page read and write
1FBEFF7B000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1F1553824000
trusted library allocation
page read and write
1FBE48C3000
trusted library allocation
page read and write
1FBEC2EB000
trusted library allocation
page read and write
1FBEFFEB000
trusted library allocation
page read and write
1FBE526B000
trusted library allocation
page read and write
21B45368000
heap
page read and write
1FBE7979000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBE6753000
trusted library allocation
page read and write
1FBE39C2000
trusted library allocation
page read and write
1FBE64D6000
trusted library allocation
page read and write
1FBE3E99000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBEF78A000
trusted library allocation
page read and write
1FBEC148000
trusted library allocation
page read and write
283C06B5000
heap
page read and write
1FBE0E0B000
trusted library allocation
page read and write
C48000
heap
page read and write
1FBE5189000
trusted library allocation
page read and write
1FBE52ED000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEC1DB000
trusted library allocation
page read and write
1FBE49CF000
trusted library allocation
page read and write
1FBEC1E4000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBDAE21000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBDAE53000
heap
page read and write
1FBF0551000
heap
page read and write
1FBEC0F0000
trusted library allocation
page read and write
21B44DD1000
heap
page read and write
21B44D8A000
heap
page read and write
1FBEC154000
trusted library allocation
page read and write
1FBE167E000
heap
page read and write
1FBE48FD000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBEDA01000
trusted library allocation
page read and write
1FBEFA4B000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE16000
heap
page read and write
1FBE5061000
trusted library allocation
page read and write
1FBE4F83000
trusted library allocation
page read and write
1FBE39E7000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBDAE43000
heap
page read and write
1FBDAE1A000
heap
page read and write
1FBEBDB9000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE42F5000
trusted library allocation
page read and write
1FBE4F9B000
trusted library allocation
page read and write
1FBF04D5000
trusted library allocation
page read and write
1FBE41D8000
trusted library allocation
page read and write
1FBE3EC8000
trusted library allocation
page read and write
1FBE48EC000
trusted library allocation
page read and write
1FBEFF7D000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBE4D47000
trusted library allocation
page read and write
EA4067D000
stack
page read and write
1FBDAE49000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBEBE5D000
trusted library allocation
page read and write
1D8CA072000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
283C22B8000
heap
page read and write
1FBDAE0E000
heap
page read and write
1FBE3E77000
trusted library allocation
page read and write
1FBEBF8F000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBDAE72000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBDAE99000
heap
page read and write
1FBDAE4E000
heap
page read and write
1FBDAE04000
heap
page read and write
1FBEBE33000
trusted library allocation
page read and write
1FBF0590000
heap
page read and write
1FBE529A000
trusted library allocation
page read and write
21B4532D000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBEC2C8000
trusted library allocation
page read and write
1FBE41FB000
trusted library allocation
page read and write
2AD4D8B2000
trusted library allocation
page read and write
1FBE1690000
heap
page read and write
1FBDAE42000
heap
page read and write
1FBE4AAF000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBEFF99000
trusted library allocation
page read and write
1FBE167F000
heap
page read and write
C22000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBE596E000
trusted library allocation
page read and write
1FBDAE31000
heap
page read and write
1FBEC0EC000
trusted library allocation
page read and write
1FBEFBA9000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBE1685000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBE5183000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBE692A000
trusted library allocation
page read and write
1FBE48F2000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE5051000
trusted library allocation
page read and write
1FBEF080000
trusted library allocation
page read and write
1FBE5675000
trusted library allocation
page read and write
1FBE4D4E000
trusted library allocation
page read and write
1FBF04EC000
trusted library allocation
page read and write
1FBE3D3C000
trusted library allocation
page read and write
1FBDAE42000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBE6474000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
21B44D7C000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE3EEC000
trusted library allocation
page read and write
1FBEFA3D000
trusted library allocation
page read and write
1FBEC23C000
trusted library allocation
page read and write
1FBDAE8A000
heap
page read and write
1FBE5A1D000
trusted library allocation
page read and write
1FBEC0A7000
trusted library allocation
page read and write
1FBE52EB000
trusted library allocation
page read and write
1FBF059C000
heap
page read and write
2AD4D800000
trusted library allocation
page read and write
1FBEC1DE000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEFF97000
trusted library allocation
page read and write
1FBE5007000
trusted library allocation
page read and write
1FBE5A72000
trusted library allocation
page read and write
1FBE0E0D000
trusted library allocation
page read and write
1FBE4E30000
trusted library allocation
page read and write
1FBE48F7000
trusted library allocation
page read and write
1FBEFFF0000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBE4915000
trusted library allocation
page read and write
1FBE50B0000
trusted library allocation
page read and write
1D8CA00B000
trusted library allocation
page read and write
1FBEC1E9000
trusted library allocation
page read and write
1FBEC2FA000
trusted library allocation
page read and write
1FBE0EDD000
trusted library allocation
page read and write
1FBE3D6F000
trusted library allocation
page read and write
1FBE169A000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBEC1D2000
trusted library allocation
page read and write
1FBE523F000
trusted library allocation
page read and write
1FBEC23E000
trusted library allocation
page read and write
1FBE3D55000
trusted library allocation
page read and write
1FBE4CA2000
trusted library allocation
page read and write
1FBDAE54000
heap
page read and write
7F9ADD8000
stack
page read and write
1FBE6963000
trusted library allocation
page read and write
1FBEC2FE000
trusted library allocation
page read and write
1FBDAE26000
heap
page read and write
1FBE3F94000
trusted library allocation
page read and write
1FBE4180000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE3EBE000
trusted library allocation
page read and write
1FBE397A000
trusted library allocation
page read and write
1FBE516C000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBDAE1A000
heap
page read and write
1FBEE4AA000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBE5161000
trusted library allocation
page read and write
1FBE5148000
trusted library allocation
page read and write
1FBE1684000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBE63DA000
trusted library allocation
page read and write
21B44460000
heap
page readonly
1FBE677C000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE68F2000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBEC04F000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE4AE9000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE5700000
trusted library allocation
page read and write
1FBE3D62000
trusted library allocation
page read and write
1FBE4DA2000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBEC0BE000
trusted library allocation
page read and write
1FBE6163000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE0B000
heap
page read and write
1FBDAE32000
heap
page read and write
1D8CA00D000
trusted library allocation
page read and write
1FBE50AD000
trusted library allocation
page read and write
1FBE39C2000
trusted library allocation
page read and write
1FBE5A5E000
trusted library allocation
page read and write
1FBEC23C000
trusted library allocation
page read and write
1FBE61BE000
trusted library allocation
page read and write
1FBE64BB000
trusted library allocation
page read and write
1FBEFACE000
trusted library allocation
page read and write
283C06A4000
heap
page read and write
1FBE16BC000
heap
page read and write
1FBE3E9E000
trusted library allocation
page read and write
21B44777000
trusted library allocation
page read and write
1FBDAE42000
heap
page read and write
1FBEBFD1000
trusted library allocation
page read and write
1FBE0E2C000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBE50E6000
trusted library allocation
page read and write
21B44DCE000
heap
page read and write
1FBE52F0000
trusted library allocation
page read and write
2AD4D5D0000
unclassified section
page readonly
1FBE5244000
trusted library allocation
page read and write
1FBE49CA000
trusted library allocation
page read and write
1FBE74DE000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBEF76D000
trusted library allocation
page read and write
1FBE54D5000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBEFA92000
trusted library allocation
page read and write
1FBE5A1D000
trusted library allocation
page read and write
1D8CA0B5000
trusted library allocation
page read and write
1FBDFD76000
trusted library allocation
page read and write
1FBE562D000
trusted library allocation
page read and write
C22000
heap
page read and write
A6F000
stack
page read and write
1FBDAE49000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE41DA000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBDAE4F000
heap
page read and write
21B4532A000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBDAE3F000
heap
page read and write
1FBE69EB000
trusted library allocation
page read and write
1FBE4F44000
trusted library allocation
page read and write
1FBE53EE000
trusted library allocation
page read and write
1FBE1669000
heap
page read and write
1D8CA0E7000
trusted library allocation
page read and write
1FBDAE4D000
heap
page read and write
1FBE41FB000
trusted library allocation
page read and write
1FBE7B84000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBEBFFB000
trusted library allocation
page read and write
1FBE6476000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
21B44DDD000
heap
page read and write
1FBE69D1000
trusted library allocation
page read and write
21B44779000
trusted library allocation
page read and write
1FBF04B8000
trusted library allocation
page read and write
1FBEBE40000
trusted library allocation
page read and write
1FBE5005000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBE50E3000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE46000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBEFAAC000
trusted library allocation
page read and write
2530E90A000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
21B44DD2000
heap
page read and write
1FBE73CC000
trusted library allocation
page read and write
68C000
unkown
page write copy
1FBE69CD000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE1A000
heap
page read and write
1FBE16D8000
heap
page read and write
213DB211000
trusted library allocation
page execute read
1FBE39CC000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE21000
heap
page read and write
1FBE4985000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE0E3F000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBF04C2000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE74F1000
trusted library allocation
page read and write
1FBE67A8000
trusted library allocation
page read and write
1FBE673E000
trusted library allocation
page read and write
1FBF0323000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBDAE21000
heap
page read and write
283C069F000
heap
page read and write
1FBDAE4D000
heap
page read and write
1FBEBDCB000
trusted library allocation
page read and write
1FBE5A83000
trusted library allocation
page read and write
1FBE7786000
trusted library allocation
page read and write
1FBE3DA5000
trusted library allocation
page read and write
1D8C9D0A000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBEE588000
trusted library allocation
page read and write
1D8C9C59000
remote allocation
page execute read
1FBE5A57000
trusted library allocation
page read and write
1FBE5441000
trusted library allocation
page read and write
1FBE3ECA000
trusted library allocation
page read and write
21B446ED000
unkown
page execute read
1D8C9D00000
heap
page read and write
1FBDAE54000
heap
page read and write
1FBEE43A000
trusted library allocation
page read and write
1FBDAE48000
heap
page read and write
1FBEC0EC000
trusted library allocation
page read and write
1FBE48BF000
trusted library allocation
page read and write
C1B000
heap
page read and write
2AD4D849000
trusted library allocation
page read and write
1FBE6993000
trusted library allocation
page read and write
1FBE52FE000
trusted library allocation
page read and write
1FBE52F3000
trusted library allocation
page read and write
1FBF034F000
trusted library allocation
page read and write
1FBE5A97000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDAE49000
heap
page read and write
2AD4D882000
trusted library allocation
page read and write
1FBE48B5000
trusted library allocation
page read and write
1FBDAE42000
heap
page read and write
1FBE68C6000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBF0551000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBE4FA0000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBE0E8E000
trusted library allocation
page read and write
1FBE50AF000
trusted library allocation
page read and write
1FBE5AA2000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
1FBE3E9B000
trusted library allocation
page read and write
1FBDAE40000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBEBFE6000
trusted library allocation
page read and write
1FBEC147000
trusted library allocation
page read and write
1FBEFFA3000
trusted library allocation
page read and write
21B44D3C000
heap
page read and write
1FBE167E000
heap
page read and write
1FBE3E3D000
trusted library allocation
page read and write
1FBEFF99000
trusted library allocation
page read and write
1FBED887000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE4883000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBE4ECE000
trusted library allocation
page read and write
1FBE4869000
trusted library allocation
page read and write
1FBE3962000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE4179000
trusted library allocation
page read and write
1FBE68B2000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBEFD93000
trusted library allocation
page read and write
1FBE4DBF000
trusted library allocation
page read and write
1FBE486B000
trusted library allocation
page read and write
1FBEBDD1000
trusted library allocation
page read and write
1FBE4D3E000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBE5A83000
trusted library allocation
page read and write
1FBEC0EE000
trusted library allocation
page read and write
1FBE3F97000
trusted library allocation
page read and write
1FBEFBAD000
trusted library allocation
page read and write
21B44B90000
heap
page read and write
21B4470A000
trusted library allocation
page read and write
1FBE5005000
trusted library allocation
page read and write
1FBE4967000
trusted library allocation
page read and write
1FBE4EFE000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEC1BF000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE4FAA000
trusted library allocation
page read and write
1FBEFA9F000
trusted library allocation
page read and write
1FBE1675000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE2F000
heap
page read and write
1FBE64CC000
trusted library allocation
page read and write
1FBEFF9A000
trusted library allocation
page read and write
213DB2C1000
trusted library allocation
page execute read
1FBDAE4D000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBE4F8E000
trusted library allocation
page read and write
1FBE63D3000
trusted library allocation
page read and write
1FBDAE3E000
heap
page read and write
1FBEBF29000
trusted library allocation
page read and write
1FBEFB52000
trusted library allocation
page read and write
21B45358000
heap
page read and write
21B446F0000
heap
page read and write
1FBEF78A000
trusted library allocation
page read and write
1FBE3DCE000
trusted library allocation
page read and write
1FBE3EBE000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBE1344000
trusted library allocation
page read and write
1FBEC242000
trusted library allocation
page read and write
C0F000
heap
page read and write
21B45368000
heap
page read and write
1FBEFF88000
trusted library allocation
page read and write
1FBDAE2E000
heap
page read and write
1FBE64E0000
trusted library allocation
page read and write
1FBEFBB7000
trusted library allocation
page read and write
1FBE3E3B000
trusted library allocation
page read and write
1FBE4D3E000
trusted library allocation
page read and write
1FBEC1E6000
trusted library allocation
page read and write
1FBE53DC000
trusted library allocation
page read and write
1FBE4FC8000
trusted library allocation
page read and write
E3C9BEB000
stack
page read and write
1FBEC2ED000
trusted library allocation
page read and write
1FBF0488000
trusted library allocation
page read and write
1FBE515D000
trusted library allocation
page read and write
1FBE5280000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBEC1CB000
trusted library allocation
page read and write
1FBE5A6B000
trusted library allocation
page read and write
1FBE5A97000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBEC14D000
trusted library allocation
page read and write
2AD4D430000
unclassified section
page read and write
1FBEFA23000
trusted library allocation
page read and write
E3CBF3E000
unkown
page readonly
1FBE59B0000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE42000
heap
page read and write
1FBDAE99000
heap
page read and write
1FBE52D3000
trusted library allocation
page read and write
1FBE671F000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE4140000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBED941000
trusted library allocation
page read and write
1FBF0337000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE5194000
trusted library allocation
page read and write
1FBE4996000
trusted library allocation
page read and write
1FBF0B91000
trusted library allocation
page read and write
1FBE39C0000
trusted library allocation
page read and write
2AD4D803000
trusted library allocation
page read and write
1FBE5189000
trusted library allocation
page read and write
1FBE49A0000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE23000
heap
page read and write
1FBE1684000
heap
page read and write
1FBDAE53000
heap
page read and write
1FBDAE02000
heap
page read and write
1FBE3E65000
trusted library allocation
page read and write
1FBE4FE5000
trusted library allocation
page read and write
1FBE3D82000
trusted library allocation
page read and write
1FBE0E89000
trusted library allocation
page read and write
1FBEC154000
trusted library allocation
page read and write
1FBEC0F2000
trusted library allocation
page read and write
1FBDAE54000
heap
page read and write
7F9BDFE000
stack
page read and write
1FBE53DC000
trusted library allocation
page read and write
1FBE5112000
trusted library allocation
page read and write
1FBE64EF000
trusted library allocation
page read and write
1FBEFA9F000
trusted library allocation
page read and write
1FBE48BB000
trusted library allocation
page read and write
1FBDF7EF000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBEFBE0000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDFE1B000
trusted library allocation
page read and write
1FBDAE4A000
heap
page read and write
21B44D4C000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBE5263000
trusted library allocation
page read and write
1FBF04B2000
trusted library allocation
page read and write
21B44D40000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBDAE0B000
heap
page read and write
1FBEBEF9000
trusted library allocation
page read and write
1FBE4FBC000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBEC1BF000
trusted library allocation
page read and write
1FBE1122000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBE0EB2000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBEF78A000
trusted library allocation
page read and write
1FBE3D9E000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
21B45377000
heap
page read and write
1FBE5061000
trusted library allocation
page read and write
EA3E3FE000
stack
page read and write
1FBDAE2D000
heap
page read and write
2AD4D824000
trusted library allocation
page read and write
1FBEE4BC000
trusted library allocation
page read and write
1D8C9E20000
heap
page readonly
1FBEC1D0000
trusted library allocation
page read and write
1FBEFBB3000
trusted library allocation
page read and write
1FBEC1CF000
trusted library allocation
page read and write
7F9C63E000
stack
page read and write
1FBEBEAD000
trusted library allocation
page read and write
1FBE5016000
trusted library allocation
page read and write
1FBEBE93000
trusted library allocation
page read and write
1FBE5A9A000
trusted library allocation
page read and write
1FBE3E7D000
trusted library allocation
page read and write
1FBE1061000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE567A000
trusted library allocation
page read and write
1FBEC0BE000
trusted library allocation
page read and write
1FBE73DA000
trusted library allocation
page read and write
1FBE5A70000
trusted library allocation
page read and write
21B45200000
trusted library allocation
page read and write
C44000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBDAE0B000
heap
page read and write
30E4000
heap
page read and write
1FBEBFF9000
trusted library allocation
page read and write
1FBE5A7A000
trusted library allocation
page read and write
1FBEBE5A000
trusted library allocation
page read and write
C22000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBE4ED4000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE4D94000
trusted library allocation
page read and write
1FBEFDFD000
trusted library allocation
page read and write
1FBF04D5000
trusted library allocation
page read and write
1FBEC215000
trusted library allocation
page read and write
1FBE0DE3000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBEBD8A000
trusted library allocation
page read and write
1FBDAE38000
heap
page read and write
1FBEC371000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBE4D60000
trusted library allocation
page read and write
1FBE5453000
trusted library allocation
page read and write
1FBEC2F7000
trusted library allocation
page read and write
1FBE5690000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBEC07E000
trusted library allocation
page read and write
154000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE4ABB000
trusted library allocation
page read and write
1FBEC2D6000
trusted library allocation
page read and write
1FBE1664000
heap
page read and write
1FBEFE3E000
trusted library allocation
page read and write
AAE000
stack
page read and write
1FBDAE35000
heap
page read and write
1FBE5653000
trusted library allocation
page read and write
1FBE4AF7000
trusted library allocation
page read and write
1FBF034B000
trusted library allocation
page read and write
1FBE7B9E000
trusted library allocation
page read and write
1FBE4A97000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBE69C1000
trusted library allocation
page read and write
1FBEFFA9000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE1666000
heap
page read and write
1FBE52AA000
trusted library allocation
page read and write
1FBDFDFE000
trusted library allocation
page read and write
1FBF04B2000
trusted library allocation
page read and write
1FBF034B000
trusted library allocation
page read and write
1FBDAE1B000
heap
page read and write
283C09C0000
heap
page read and write
7F9E6FE000
unkown
page readonly
1FBDAE32000
heap
page read and write
1FBE53BC000
trusted library allocation
page read and write
1FBE3EE7000
trusted library allocation
page read and write
1FBEC3C5000
trusted library allocation
page read and write
1FBE64D8000
trusted library allocation
page read and write
7F9D6FE000
unkown
page readonly
1FBDAE20000
heap
page read and write
1FBE48A2000
trusted library allocation
page read and write
1FBEFB62000
trusted library allocation
page read and write
1FBE51B1000
trusted library allocation
page read and write
1FBE39C0000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
1FBEC17D000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBE6500000
trusted library allocation
page read and write
1FBE3980000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBE74B7000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
21B44D40000
heap
page read and write
1FBEC35B000
trusted library allocation
page read and write
1FBE543C000
trusted library allocation
page read and write
1FBE3F57000
trusted library allocation
page read and write
1FBDAE4D000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBE4EED000
trusted library allocation
page read and write
1FBDAEA3000
heap
page read and write
1FBE545B000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBDAE53000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBE74E4000
trusted library allocation
page read and write
1FBE41EF000
trusted library allocation
page read and write
1FBEBEEC000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
5C1000
unkown
page execute read
1FBE39F7000
trusted library allocation
page read and write
1FBDAE34000
heap
page read and write
1FBE5279000
trusted library allocation
page read and write
1FBE4CDE000
trusted library allocation
page read and write
1FBEFF85000
trusted library allocation
page read and write
1FBDF7CA000
trusted library allocation
page read and write
1FBE3EC8000
trusted library allocation
page read and write
1FBE6441000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE50BD000
trusted library allocation
page read and write
1FBEC242000
trusted library allocation
page read and write
21B44220000
unclassified section
page readonly
1FBE5643000
trusted library allocation
page read and write
1FBE0E8E000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
154000
heap
page read and write
1FBE51D0000
trusted library allocation
page read and write
2530E5E0000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBE50E3000
trusted library allocation
page read and write
1FBE506C000
trusted library allocation
page read and write
1FBDFE9E000
trusted library allocation
page read and write
1FBEBF1E000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1D8C9E50000
heap
page read and write
1FBE3FF6000
trusted library allocation
page read and write
1FBE4AF9000
trusted library allocation
page read and write
1FBEFFC5000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBE0EB4000
trusted library allocation
page read and write
1FBEFACE000
trusted library allocation
page read and write
1FBEC55F000
trusted library allocation
page read and write
3B64C0303000
trusted library allocation
page read and write
1FBE48B5000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBEC0B9000
trusted library allocation
page read and write
1FBE50BD000
trusted library allocation
page read and write
1FBEC0B9000
trusted library allocation
page read and write
1FBEC1D2000
trusted library allocation
page read and write
1FBE496C000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
C28000
heap
page read and write
1FBEFF26000
trusted library allocation
page read and write
1FBE59FB000
trusted library allocation
page read and write
1FBE54F1000
trusted library allocation
page read and write
1FBEC0F0000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
1FBE4D2B000
trusted library allocation
page read and write
1FBE48CF000
trusted library allocation
page read and write
1FBDAE48000
heap
page read and write
1FBE3EC2000
trusted library allocation
page read and write
C17000
heap
page read and write
1FBEFFB0000
trusted library allocation
page read and write
1FBF0329000
trusted library allocation
page read and write
21B44DC1000
heap
page read and write
2AD4D80C000
trusted library allocation
page read and write
F2481FF000
stack
page read and write
1FBDAE62000
heap
page read and write
1FBDAE3F000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBF035E000
trusted library allocation
page read and write
1FBE1637000
heap
page read and write
1FBEC1CA000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBF034A000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBF0597000
heap
page read and write
1FBDAE51000
heap
page read and write
1FBE39F7000
trusted library allocation
page read and write
1FBEC15F000
trusted library allocation
page read and write
1FBE4D53000
trusted library allocation
page read and write
1FBE48F7000
trusted library allocation
page read and write
1FBE3EC2000
trusted library allocation
page read and write
1FBEC0EC000
trusted library allocation
page read and write
1FBE4D55000
trusted library allocation
page read and write
1FBE3F87000
trusted library allocation
page read and write
1FBDFEA3000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE3933000
trusted library allocation
page read and write
1FBE4F2E000
trusted library allocation
page read and write
1FBE3D6D000
trusted library allocation
page read and write
1FBEC051000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE4AD0000
trusted library allocation
page read and write
1FBE74CE000
trusted library allocation
page read and write
1FBE77B0000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE21000
heap
page read and write
1FBE4816000
trusted library allocation
page read and write
1FBEBDBD000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBDAE47000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE545D000
trusted library allocation
page read and write
1FBEFBAD000
trusted library allocation
page read and write
1FBE4AAC000
trusted library allocation
page read and write
21B44CE1000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBE3D84000
trusted library allocation
page read and write
1FBE49AB000
trusted library allocation
page read and write
1FBEFAB3000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBEBF92000
trusted library allocation
page read and write
1FBDFEFC000
trusted library allocation
page read and write
1FBE54CF000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE3EDD000
trusted library allocation
page read and write
1FBF0477000
trusted library allocation
page read and write
1FBE53B6000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBDAE52000
heap
page read and write
F2459FF000
stack
page read and write
1FBE3D66000
trusted library allocation
page read and write
1FBEFD7D000
trusted library allocation
page read and write
1FBEBE6C000
trusted library allocation
page read and write
C44000
heap
page read and write
1FBEC2E2000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE7985000
trusted library allocation
page read and write
1FBEFB35000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE3F74000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
21B44CE9000
heap
page read and write
1FBE168B000
heap
page read and write
1FBE5192000
trusted library allocation
page read and write
1FBEE5C9000
trusted library allocation
page read and write
1FBE51A7000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBEC2C3000
trusted library allocation
page read and write
1FBF0BF7000
trusted library allocation
page read and write
1FBE3E77000
trusted library allocation
page read and write
1FBF0464000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBDAE4E000
heap
page read and write
1FBDAE4E000
heap
page read and write
1FBE5A83000
trusted library allocation
page read and write
1FBEC2CC000
trusted library allocation
page read and write
150000
heap
page read and write
1FBDAE0B000
heap
page read and write
1FBF0457000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBEFA51000
trusted library allocation
page read and write
283C22C0000
heap
page read and write
1FBDAE43000
heap
page read and write
1FBDAE99000
heap
page read and write
1FBE3E99000
trusted library allocation
page read and write
1FBE48FD000
trusted library allocation
page read and write
1FBE5695000
trusted library allocation
page read and write
1FBEFE49000
trusted library allocation
page read and write
1FBE522E000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBEC1CF000
trusted library allocation
page read and write
1FBE0EB4000
trusted library allocation
page read and write
1FBE3E99000
trusted library allocation
page read and write
1FBF0329000
trusted library allocation
page read and write
1FBEC0FE000
trusted library allocation
page read and write
21B45358000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBEFB7D000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE3963000
trusted library allocation
page read and write
13EE000
stack
page read and write
1FBE4DDF000
trusted library allocation
page read and write
1FBEBD83000
trusted library allocation
page read and write
21B44DC8000
heap
page read and write
1FBF04AA000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE3E47000
trusted library allocation
page read and write
1FBE79F9000
trusted library allocation
page read and write
1FBE74CE000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
E3CBDFE000
unkown
page readonly
1D8C9CA0000
heap
page read and write
1FBE517B000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEFBB3000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBE4D57000
trusted library allocation
page read and write
1FBDAE8A000
heap
page read and write
154000
heap
page read and write
1FBE3EF5000
trusted library allocation
page read and write
21B446F4000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBE41C5000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE8748000
trusted library allocation
page read and write
2AD4D614000
heap
page read and write
1D8C9F00000
trusted library allocation
page read and write
21B44DCE000
heap
page read and write
1FBE0E78000
trusted library allocation
page read and write
1FBDFEFC000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
21B44480000
unclassified section
page read and write
21B44DC6000
heap
page read and write
1FBE4E4B000
trusted library allocation
page read and write
1FBE4A9D000
trusted library allocation
page read and write
1FBE3E9C000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBE50AA000
trusted library allocation
page read and write
1FBE63D3000
trusted library allocation
page read and write
21B44DC3000
heap
page read and write
1FBE3E57000
trusted library allocation
page read and write
1FBED948000
trusted library allocation
page read and write
1FBE3913000
trusted library allocation
page read and write
1FBE3EC8000
trusted library allocation
page read and write
1FBEFEFB000
trusted library allocation
page read and write
1FBE1699000
heap
page read and write
1FBE77B2000
trusted library allocation
page read and write
1FBEFA1B000
trusted library allocation
page read and write
1FBE79DF000
trusted library allocation
page read and write
A8B000
stack
page read and write
1FBEC07E000
trusted library allocation
page read and write
1FBF036B000
trusted library allocation
page read and write
1FBE168D000
heap
page read and write
1FBE774B000
trusted library allocation
page read and write
2AD4DA0C000
trusted library allocation
page read and write
1FBEC0F8000
trusted library allocation
page read and write
1FBE54C1000
trusted library allocation
page read and write
1FBE673E000
trusted library allocation
page read and write
1FBEFBDD000
trusted library allocation
page read and write
1FBE515F000
trusted library allocation
page read and write
1FBE524A000
trusted library allocation
page read and write
1FBEC1D2000
trusted library allocation
page read and write
1FBE3E8A000
trusted library allocation
page read and write
1FBE4FE9000
trusted library allocation
page read and write
1FBE166E000
heap
page read and write
1FBEC1E1000
trusted library allocation
page read and write
1FBE52AF000
trusted library allocation
page read and write
1FBE113A000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBE5A9F000
trusted library allocation
page read and write
1FBF0334000
trusted library allocation
page read and write
1FBEFFB0000
trusted library allocation
page read and write
1FBE4D4E000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBE49C4000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBDAE2F000
heap
page read and write
21B44D4C000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBE4E8F000
trusted library allocation
page read and write
1FBEC144000
trusted library allocation
page read and write
21B44D5F000
heap
page read and write
1FBE39F7000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBE7414000
trusted library allocation
page read and write
1FBE4EBC000
trusted library allocation
page read and write
1FBEC0F4000
trusted library allocation
page read and write
1FBF05D9000
heap
page read and write
1FBF0551000
heap
page read and write
1FBE7756000
trusted library allocation
page read and write
1FBDAE41000
heap
page read and write
1FBE4FFA000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
1D8CA066000
trusted library allocation
page read and write
21B44DC8000
heap
page read and write
1FBF0440000
trusted library allocation
page read and write
1FBDAE4F000
heap
page read and write
1FBE7969000
trusted library allocation
page read and write
1FBE5021000
trusted library allocation
page read and write
21B44DC9000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE4E5B000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE69000
heap
page read and write
1FBEC382000
trusted library allocation
page read and write
1FBE0D96000
trusted library allocation
page read and write
1FBE64CC000
trusted library allocation
page read and write
1FBDAE50000
heap
page read and write
1FBEFF9E000
trusted library allocation
page read and write
1FBED907000
trusted library allocation
page read and write
1FBE73E9000
trusted library allocation
page read and write
1FBE3DA5000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBE48CF000
trusted library allocation
page read and write
91923FF000
stack
page read and write
1FBE4D55000
trusted library allocation
page read and write
1FBEC2F0000
trusted library allocation
page read and write
1FBE53DE000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBEFFB9000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
283C0691000
heap
page read and write
1FBEE5D5000
trusted library allocation
page read and write
1FBE673E000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE1042000
trusted library allocation
page read and write
21B44786000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE53000
heap
page read and write
1FBDAE2C000
heap
page read and write
1FBE4F24000
trusted library allocation
page read and write
1FBF0464000
trusted library allocation
page read and write
1FBE166B000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBE52EB000
trusted library allocation
page read and write
1FBDAE31000
heap
page read and write
1FBE5D09000
trusted library allocation
page read and write
1FBE4843000
trusted library allocation
page read and write
1FBEC2E6000
trusted library allocation
page read and write
1FBEDD00000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBEC2EB000
trusted library allocation
page read and write
1FBE77BA000
trusted library allocation
page read and write
1FBE49A2000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAEA3000
heap
page read and write
1FBEFE14000
trusted library allocation
page read and write
1FBEC17D000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE3F7B000
trusted library allocation
page read and write
1FBE5AAB000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBE4D49000
trusted library allocation
page read and write
1FBEFBB5000
trusted library allocation
page read and write
1FBEC07B000
trusted library allocation
page read and write
283C06B3000
heap
page read and write
1FBE49D7000
trusted library allocation
page read and write
1FBDAEA8000
heap
page read and write
1FBDAE23000
heap
page read and write
1FBE5A30000
trusted library allocation
page read and write
1FBDAEA3000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBE5670000
trusted library allocation
page read and write
1FBE54D5000
trusted library allocation
page read and write
1FBE51CC000
trusted library allocation
page read and write
1FBDAE38000
heap
page read and write
21B45344000
heap
page read and write
1FBEFFE2000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBE50AD000
trusted library allocation
page read and write
1FBE67A8000
trusted library allocation
page read and write
1FBE5433000
trusted library allocation
page read and write
1FBE3E79000
trusted library allocation
page read and write
1FBEFFA9000
trusted library allocation
page read and write
1FBEC2E6000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBDAE21000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBE487D000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE49E9000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1D8CA023000
trusted library allocation
page read and write
1FBEBEC4000
trusted library allocation
page read and write
154000
heap
page read and write
1FBDF781000
trusted library allocation
page read and write
1FBEFD85000
trusted library allocation
page read and write
21B45377000
heap
page read and write
1FBDAE19000
heap
page read and write
694000
unkown
page readonly
1FBE3E99000
trusted library allocation
page read and write
1FBE4D77000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBE52CF000
trusted library allocation
page read and write
1FBE5A92000
trusted library allocation
page read and write
F2471FF000
stack
page read and write
1FBEC23C000
trusted library allocation
page read and write
21B44E20000
heap
page read and write
1FBDAE2E000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE4996000
trusted library allocation
page read and write
1FBE48EC000
trusted library allocation
page read and write
1FBE688B000
trusted library allocation
page read and write
21B44DD1000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBE8731000
trusted library allocation
page read and write
1FBE5A62000
trusted library allocation
page read and write
283C09C5000
heap
page read and write
1FBE4EA1000
trusted library allocation
page read and write
1FBEE5D5000
trusted library allocation
page read and write
1FBDAE50000
heap
page read and write
1FBDAE79000
heap
page read and write
2AD4D43F000
unclassified section
page read and write
1FBDAE38000
heap
page read and write
1FBDAE29000
heap
page read and write
1FBDAE28000
heap
page read and write
21B447B3000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBDAE0B000
heap
page read and write
2AD4D818000
trusted library allocation
page read and write
1FBEBDAF000
trusted library allocation
page read and write
1FBDAE48000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBEC1B8000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBEF7F0000
trusted library allocation
page read and write
1FBEFFC1000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBEFBF3000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBDAE69000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDAE4F000
heap
page read and write
1FBDAE69000
heap
page read and write
7F9A3FE000
unkown
page readonly
1FBDAE52000
heap
page read and write
2AD4D49A000
heap
page read and write
1FBE74D4000
trusted library allocation
page read and write
1FBE3DA5000
trusted library allocation
page read and write
1FBE51A9000
trusted library allocation
page read and write
1FBE413B000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE4D55000
trusted library allocation
page read and write
1FBF04EC000
trusted library allocation
page read and write
1FBEFA92000
trusted library allocation
page read and write
1FBE4DE2000
trusted library allocation
page read and write
1FBE4BF7000
trusted library allocation
page read and write
1FBE49EF000
trusted library allocation
page read and write
1FBE5280000
trusted library allocation
page read and write
1D8CA0C9000
trusted library allocation
page read and write
1FBE489B000
trusted library allocation
page read and write
1FBE49E9000
trusted library allocation
page read and write
1FBE3F8D000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
EA40F3E000
stack
page read and write
1FBDAE09000
heap
page read and write
1FBE1363000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBEFADE000
trusted library allocation
page read and write
1FBE7770000
trusted library allocation
page read and write
1FBEC1B4000
trusted library allocation
page read and write
1D8CA1F0000
heap
page read and write
1FBDFE18000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBE61ED000
trusted library allocation
page read and write
1FBE4AED000
trusted library allocation
page read and write
1FBE1699000
heap
page read and write
1FBDAE21000
heap
page read and write
1FBEC18C000
trusted library allocation
page read and write
1FBEE4F3000
trusted library allocation
page read and write
1FBEC1DE000
trusted library allocation
page read and write
1FBEC0EA000
trusted library allocation
page read and write
1FBE5690000
trusted library allocation
page read and write
2AD4D220000
unclassified section
page readonly
283C0660000
heap
page read and write
1FBEFBB1000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE5164000
trusted library allocation
page read and write
1FBE3913000
trusted library allocation
page read and write
283C0650000
heap
page read and write
1FBEC067000
trusted library allocation
page read and write
21B44DC8000
heap
page read and write
1FBE4971000
trusted library allocation
page read and write
1FBDAE04000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBEFF88000
trusted library allocation
page read and write
1FBE3DCE000
trusted library allocation
page read and write
1FBE5A54000
trusted library allocation
page read and write
1FBEBEAB000
trusted library allocation
page read and write
2AD4D490000
heap
page read and write
1FBEBF19000
trusted library allocation
page read and write
2AD4D616000
heap
page read and write
1FBE3DA5000
trusted library allocation
page read and write
1FBE3E8A000
trusted library allocation
page read and write
1FBE1665000
heap
page read and write
1FBDAE21000
heap
page read and write
EA3FDFE000
stack
page read and write
2AD4D811000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBDAE52000
heap
page read and write
21B44500000
trusted library allocation
page read and write
1FBE169A000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE0DFE000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE4DF1000
trusted library allocation
page read and write
1FBE3EA8000
trusted library allocation
page read and write
1D8CA000000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBEC00E000
trusted library allocation
page read and write
1FBDAE3E000
heap
page read and write
1FBDAE2F000
heap
page read and write
1FBE677A000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
2AD4D8A2000
trusted library allocation
page read and write
1FBE4F8C000
trusted library allocation
page read and write
1FBE4F63000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBE0EDD000
trusted library allocation
page read and write
1FBE526B000
trusted library allocation
page read and write
1FBEFECC000
trusted library allocation
page read and write
1FBE7744000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBEC0EA000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBDAE23000
heap
page read and write
1FBEC1BC000
trusted library allocation
page read and write
1FBE4FE3000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
7F9A2BE000
stack
page read and write
1FBE5643000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
1FBEC14D000
trusted library allocation
page read and write
1FBE0EC1000
trusted library allocation
page read and write
1FBE0E58000
trusted library allocation
page read and write
1FBEC2C3000
trusted library allocation
page read and write
1FBE3DCE000
trusted library allocation
page read and write
1FBF0631000
heap
page read and write
1FBE8731000
trusted library allocation
page read and write
1FBEC1F5000
trusted library allocation
page read and write
1FBEFFF0000
trusted library allocation
page read and write
1FBE52FE000
trusted library allocation
page read and write
1FBEC234000
trusted library allocation
page read and write
1FBEFBDD000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE21000
heap
page read and write
1FBE4FF7000
trusted library allocation
page read and write
1FBE64E4000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBDFEEE000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBE1699000
heap
page read and write
1FBE16DF000
heap
page read and write
1FBE695C000
trusted library allocation
page read and write
1FBEFB8B000
trusted library allocation
page read and write
1FBE39F5000
trusted library allocation
page read and write
1FBE7BF1000
trusted library allocation
page read and write
1FBEBEDC000
trusted library allocation
page read and write
1FBED94D000
trusted library allocation
page read and write
1FBEC20A000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE3DA5000
trusted library allocation
page read and write
1FBDAE8A000
heap
page read and write
1FBEBDDB000
trusted library allocation
page read and write
1FBE4CFD000
trusted library allocation
page read and write
1FBE77C5000
trusted library allocation
page read and write
1FBE6733000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBE687D000
trusted library allocation
page read and write
1FBEC2C8000
trusted library allocation
page read and write
1FBE48A4000
trusted library allocation
page read and write
1FBEFDCB000
trusted library allocation
page read and write
1FBE73E7000
trusted library allocation
page read and write
1FBE74BA000
trusted library allocation
page read and write
1FBE4FAD000
trusted library allocation
page read and write
1FBE677C000
trusted library allocation
page read and write
1FBED986000
trusted library allocation
page read and write
2AD4D903000
trusted library allocation
page read and write
1FBE3FB6000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
1FBDAE0B000
heap
page read and write
21B45321000
heap
page read and write
1FBE4F2C000
trusted library allocation
page read and write
1FBEFF6A000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBEBFBD000
trusted library allocation
page read and write
1FBE4F7E000
trusted library allocation
page read and write
1FBDAEA3000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE0B000
heap
page read and write
1FBE5AAB000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBEBE5A000
trusted library allocation
page read and write
1FBE397C000
trusted library allocation
page read and write
1D8CA209000
trusted library allocation
page read and write
1FBE1684000
heap
page read and write
1FBE6399000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE50C7000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
21B44D40000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE426B000
trusted library allocation
page read and write
1FBE63A0000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
2530E5F0000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBEFFE7000
trusted library allocation
page read and write
1FBEBE7C000
trusted library allocation
page read and write
1FBDAE1E000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBDAE3B000
heap
page read and write
21B44710000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBE52E5000
trusted library allocation
page read and write
1FBE79EC000
trusted library allocation
page read and write
1FBE4D60000
trusted library allocation
page read and write
1FBDAE3A000
heap
page read and write
283C07A0000
heap
page read and write
1FBDAE99000
heap
page read and write
1FBE5A62000
trusted library allocation
page read and write
1FBE51C7000
trusted library allocation
page read and write
C28000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE52FE000
trusted library allocation
page read and write
1FBE5600000
trusted library allocation
page read and write
1FBEC1CB000
trusted library allocation
page read and write
1FBE52EB000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE3E7A000
trusted library allocation
page read and write
1FBEF77A000
trusted library allocation
page read and write
21B44D40000
heap
page read and write
1FBE5A7A000
trusted library allocation
page read and write
1FBE54CF000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE5456000
trusted library allocation
page read and write
1FBE5A62000
trusted library allocation
page read and write
1FBE3E7D000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBEC3C7000
trusted library allocation
page read and write
1FBF0BF4000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBF04E2000
trusted library allocation
page read and write
21B44DC9000
heap
page read and write
1FBDAE28000
heap
page read and write
21B45344000
heap
page read and write
EA406BE000
unkown
page readonly
1FBE562C000
trusted library allocation
page read and write
1FBEC1E9000
trusted library allocation
page read and write
1FBEC157000
trusted library allocation
page read and write
1FBF0329000
trusted library allocation
page read and write
1FBEFF81000
trusted library allocation
page read and write
21B4472F000
trusted library allocation
page read and write
E3CBEFE000
stack
page read and write
1FBDAE55000
heap
page read and write
1FBE499F000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE16B6000
heap
page read and write
1FBE4EC9000
trusted library allocation
page read and write
1FBE0DF1000
trusted library allocation
page read and write
1FBE41D8000
trusted library allocation
page read and write
1FBE6364000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBE742D000
trusted library allocation
page read and write
1FBE5223000
trusted library allocation
page read and write
1FBEE4F3000
trusted library allocation
page read and write
1FBEFBA9000
trusted library allocation
page read and write
21B44DDD000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBE7988000
trusted library allocation
page read and write
1FBDF7C6000
trusted library allocation
page read and write
1FBE3E70000
trusted library allocation
page read and write
1FBEC1E6000
trusted library allocation
page read and write
1FBEC1CF000
trusted library allocation
page read and write
1FBEC022000
trusted library allocation
page read and write
1FBE48F2000
trusted library allocation
page read and write
1FBDAE2E000
heap
page read and write
1FBEFAB3000
trusted library allocation
page read and write
283C23A0000
heap
page read and write
1FBEC0A7000
trusted library allocation
page read and write
1FBEC2C8000
trusted library allocation
page read and write
C44000
heap
page read and write
21B444D0000
trusted library allocation
page read and write
1FBDAE39000
heap
page read and write
1FBDAE69000
heap
page read and write
1FBEFFE5000
trusted library allocation
page read and write
1FBEC1D2000
trusted library allocation
page read and write
1FBF0464000
trusted library allocation
page read and write
1FBED9C5000
trusted library allocation
page read and write
1FBE3E6B000
trusted library allocation
page read and write
1FBE4FFA000
trusted library allocation
page read and write
1FBEFF94000
trusted library allocation
page read and write
1FBF04AA000
trusted library allocation
page read and write
1FBEC1BC000
trusted library allocation
page read and write
1FBF0BB7000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1D8CA07B000
trusted library allocation
page read and write
1FBE5004000
trusted library allocation
page read and write
1FBE74E4000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE49EF000
trusted library allocation
page read and write
1FBE4190000
trusted library allocation
page read and write
1FBDAEA8000
heap
page read and write
1FBE1664000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBDAE79000
heap
page read and write
21B44BA0000
heap
page read and write
1FBEBDD7000
trusted library allocation
page read and write
1FBEC1DB000
trusted library allocation
page read and write
1FBE4D4C000
trusted library allocation
page read and write
1FBE49C8000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBDAE49000
heap
page read and write
21B447C7000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBE48B8000
trusted library allocation
page read and write
1FBEFFA9000
trusted library allocation
page read and write
1FBE5AA2000
trusted library allocation
page read and write
1FBE61EF000
trusted library allocation
page read and write
1FBDF7BF000
trusted library allocation
page read and write
1FBE61D9000
trusted library allocation
page read and write
1FBE525D000
trusted library allocation
page read and write
1FBE4FF7000
trusted library allocation
page read and write
1FBDF7B3000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBE3E89000
trusted library allocation
page read and write
C36000
heap
page read and write
21B44DC0000
heap
page read and write
1FBEC2D3000
trusted library allocation
page read and write
1FBE4ED1000
trusted library allocation
page read and write
1FBE48CF000
trusted library allocation
page read and write
1FBE5265000
trusted library allocation
page read and write
1FBF0313000
trusted library allocation
page read and write
1FBE52F7000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE4D55000
trusted library allocation
page read and write
1FBEC1BF000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE4D30000
trusted library allocation
page read and write
1FBE1342000
trusted library allocation
page read and write
1FBEFF5B000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBE52F3000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBDAE42000
heap
page read and write
1FBE519B000
trusted library allocation
page read and write
1FBEC1BF000
trusted library allocation
page read and write
1FBE74BD000
trusted library allocation
page read and write
1FBE5A89000
trusted library allocation
page read and write
1FBF0551000
heap
page read and write
1FBE4D3B000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE53E3000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE99000
heap
page read and write
1FBE52A7000
trusted library allocation
page read and write
1FBE6728000
trusted library allocation
page read and write
1FBE519B000
trusted library allocation
page read and write
1FBE52CC000
trusted library allocation
page read and write
1FBEC14B000
trusted library allocation
page read and write
1FBE5273000
trusted library allocation
page read and write
1FBE48EC000
trusted library allocation
page read and write
1FBE52AF000
trusted library allocation
page read and write
1FBEBE6F000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBE3F87000
trusted library allocation
page read and write
154000
heap
page read and write
1FBEC043000
trusted library allocation
page read and write
690000
unkown
page write copy
1FBDAE16000
heap
page read and write
21B44D6D000
heap
page read and write
1FBE74CE000
trusted library allocation
page read and write
1FBE3F93000
trusted library allocation
page read and write
1FBEBDAF000
trusted library allocation
page read and write
1FBE4FBC000
trusted library allocation
page read and write
E3CA5D8000
stack
page read and write
2AD4D2C0000
heap
page read and write
1FBE7994000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE5363000
trusted library allocation
page read and write
1FBEC56A000
trusted library allocation
page read and write
1FBEE5DE000
trusted library allocation
page read and write
1FBEFFAD000
trusted library allocation
page read and write
1FBEC1C5000
trusted library allocation
page read and write
1FBEFE74000
trusted library allocation
page read and write
1FBE63B9000
trusted library allocation
page read and write
C44000
heap
page read and write
1FBE677D000
trusted library allocation
page read and write
1FBE3D9E000
trusted library allocation
page read and write
1FBDAE00000
heap
page read and write
1FBEFFAB000
trusted library allocation
page read and write
1FBE4D6E000
trusted library allocation
page read and write
1FBE0EE1000
trusted library allocation
page read and write
1FBE52CC000
trusted library allocation
page read and write
21B44D40000
heap
page read and write
1FBE51CA000
trusted library allocation
page read and write
1FBE4E57000
trusted library allocation
page read and write
1FBE415A000
trusted library allocation
page read and write
1FBE5A10000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBDF798000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBE3933000
trusted library allocation
page read and write
1FBE4D6D000
trusted library allocation
page read and write
1FBEC0F6000
trusted library allocation
page read and write
1FBDAE61000
heap
page read and write
1FBE166B000
heap
page read and write
283C0A0A000
trusted library allocation
page read and write
1FBE4187000
trusted library allocation
page read and write
1FBEBF99000
trusted library allocation
page read and write
2AD4D6C0000
heap
page read and write
1FBDAE21000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE3FB6000
trusted library allocation
page read and write
1FBE3DCE000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBDAEAF000
heap
page read and write
1FBE6716000
trusted library allocation
page read and write
1FBE3D6B000
trusted library allocation
page read and write
1FBE4151000
trusted library allocation
page read and write
21B44DD1000
heap
page read and write
1FBEBF8F000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE16CC000
heap
page read and write
1FBEFFBE000
trusted library allocation
page read and write
1FBE52AC000
trusted library allocation
page read and write
1FBEFECA000
trusted library allocation
page read and write
1FBF0477000
trusted library allocation
page read and write
1FBE5163000
trusted library allocation
page read and write
1FBDAEA3000
heap
page read and write
1FBEC2CE000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBE3D9E000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBEC1F5000
trusted library allocation
page read and write
1FBEC049000
trusted library allocation
page read and write
1FBE4D53000
trusted library allocation
page read and write
1FBE1662000
heap
page read and write
1FBE50DE000
trusted library allocation
page read and write
1FBE4AAA000
trusted library allocation
page read and write
1FBE39E0000
trusted library allocation
page read and write
21B4475C000
trusted library allocation
page read and write
1FBE63CF000
trusted library allocation
page read and write
1FBE5268000
trusted library allocation
page read and write
1FBEBEAE000
trusted library allocation
page read and write
1FBE3F65000
trusted library allocation
page read and write
1FBE5265000
trusted library allocation
page read and write
1FBE3EB3000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBEFF6A000
trusted library allocation
page read and write
1FBF0344000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBE489B000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBEC0F6000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
2AD4D907000
trusted library allocation
page read and write
1FBE74DC000
trusted library allocation
page read and write
1FBE69D3000
trusted library allocation
page read and write
1FBEFD7A000
trusted library allocation
page read and write
1FBDFEF0000
trusted library allocation
page read and write
1FBE3E5D000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE3FAF000
trusted library allocation
page read and write
1FBEFA9B000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBE3F6D000
trusted library allocation
page read and write
1FBE4D30000
trusted library allocation
page read and write
1FBE74F1000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEC0FE000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBDAE55000
heap
page read and write
1D8CA05B000
trusted library allocation
page read and write
1FBE5006000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBF033E000
trusted library allocation
page read and write
1FBEC3C9000
trusted library allocation
page read and write
1FBE5192000
trusted library allocation
page read and write
1FBEC213000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1D8C9E43000
heap
page read and write
1FBED943000
trusted library allocation
page read and write
1FBEBF35000
trusted library allocation
page read and write
21B44D44000
heap
page read and write
1FBEC2ED000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
EA4173E000
unkown
page readonly
1FBEFBEE000
trusted library allocation
page read and write
1FBE13C9000
trusted library allocation
page read and write
1FBE5D04000
trusted library allocation
page read and write
1FBE647A000
trusted library allocation
page read and write
1FBEC1A8000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
C3F000
heap
page read and write
1FBF04E2000
trusted library allocation
page read and write
1FBEC371000
trusted library allocation
page read and write
1FBEFFA9000
trusted library allocation
page read and write
1FBE52E7000
trusted library allocation
page read and write
1FBE4F9B000
trusted library allocation
page read and write
1FBE4DB1000
trusted library allocation
page read and write
1FBE519F000
trusted library allocation
page read and write
1FBEFFA1000
trusted library allocation
page read and write
1FBEC08D000
trusted library allocation
page read and write
4E0000
heap
page read and write
1FBEFA4A000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBEFFA1000
trusted library allocation
page read and write
1FBDAE7E000
heap
page read and write
1FBEF77C000
trusted library allocation
page read and write
21B44DCE000
heap
page read and write
1FBEC157000
trusted library allocation
page read and write
1FBE48FD000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBEDA2C000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
21B45344000
heap
page read and write
21B446E5000
unkown
page execute read
1FBEFF97000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBDAE29000
heap
page read and write
1FBE744F000
trusted library allocation
page read and write
68C000
unkown
page read and write
1FBE3D9E000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBF0308000
trusted library allocation
page read and write
21B45300000
heap
page read and write
EA3EDD8000
stack
page read and write
1FBE52CF000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE6154000
trusted library allocation
page read and write
1D8CA232000
trusted library allocation
page read and write
1FBE4FEB000
trusted library allocation
page read and write
1FBE5152000
trusted library allocation
page read and write
1FBE52F0000
trusted library allocation
page read and write
1FBE64D0000
trusted library allocation
page read and write
1FBE64E4000
trusted library allocation
page read and write
1FBE64BB000
trusted library allocation
page read and write
C28000
heap
page read and write
1FBDAE43000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBE499B000
trusted library allocation
page read and write
1FBE4884000
trusted library allocation
page read and write
1FBF0436000
trusted library allocation
page read and write
1FBE5A8E000
trusted library allocation
page read and write
1FBE5A5E000
trusted library allocation
page read and write
1FBEBF9E000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
F2469FE000
stack
page read and write
1FBE5AB7000
trusted library allocation
page read and write
1FBE1351000
trusted library allocation
page read and write
1FBE4FC4000
trusted library allocation
page read and write
1FBDAE4F000
heap
page read and write
1FBE3EC8000
trusted library allocation
page read and write
1FBE52F3000
trusted library allocation
page read and write
1FBDAE4D000
heap
page read and write
1FBEC2CC000
trusted library allocation
page read and write
100000
heap
page read and write
1FBE5257000
trusted library allocation
page read and write
1FBDFDFB000
trusted library allocation
page read and write
1FBE4C88000
trusted library allocation
page read and write
1FBEC0F0000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBE103C000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBE5972000
trusted library allocation
page read and write
1FBE544E000
trusted library allocation
page read and write
1FBEFFA3000
trusted library allocation
page read and write
1FBEC0B9000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
2AD4D877000
trusted library allocation
page read and write
1FBE74F1000
trusted library allocation
page read and write
C28000
heap
page read and write
1FBEFA55000
trusted library allocation
page read and write
1FBE5273000
trusted library allocation
page read and write
1FBEC1E1000
trusted library allocation
page read and write
1FBE5276000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
283C22A0000
heap
page read and write
1FBE168B000
heap
page read and write
2AD4D900000
trusted library allocation
page read and write
1FBEC2ED000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBDAE02000
heap
page read and write
1FBEBDC3000
trusted library allocation
page read and write
1FBEC1CF000
trusted library allocation
page read and write
1D8CA094000
trusted library allocation
page read and write
1FBEC0F8000
trusted library allocation
page read and write
1FBEFE9F000
trusted library allocation
page read and write
1FBDAE69000
heap
page read and write
1FBEC371000
trusted library allocation
page read and write
1FBDFE7E000
trusted library allocation
page read and write
21B44D2D000
heap
page read and write
E3CBE3E000
unkown
page readonly
1FBDAE49000
heap
page read and write
1FBDAEA8000
heap
page read and write
1FBDAE16000
heap
page read and write
1FBE49A5000
trusted library allocation
page read and write
C26000
heap
page read and write
1FBDAE34000
heap
page read and write
1FBE41CE000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBE50AA000
trusted library allocation
page read and write
1FBE4D72000
trusted library allocation
page read and write
1FBE16C6000
heap
page read and write
2AD4D8DB000
trusted library allocation
page read and write
1FBE53C0000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBEBEB2000
trusted library allocation
page read and write
1FBEC0EA000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE16A6000
heap
page read and write
1FBE4859000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE6387000
trusted library allocation
page read and write
283C0680000
heap
page read and write
1FBEBF9E000
trusted library allocation
page read and write
1FBE166B000
heap
page read and write
1FBED8A3000
trusted library allocation
page read and write
1FBE502A000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE21000
heap
page read and write
1FBE3F27000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBE41C3000
trusted library allocation
page read and write
1FBDAEAC000
heap
page read and write
1D8CA200000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBEC1C5000
trusted library allocation
page read and write
1FBEFA7D000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBEC17A000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE4F000
heap
page read and write
1FBE1684000
heap
page read and write
1FBEFF9C000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
C14000
heap
page read and write
1FBDAE79000
heap
page read and write
21B44230000
unclassified section
page readonly
1FBE501D000
trusted library allocation
page read and write
1D8CA20C000
trusted library allocation
page read and write
1FBE68B8000
trusted library allocation
page read and write
1FBE5436000
trusted library allocation
page read and write
1FBE4EDC000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBEBF0F000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBE48FD000
trusted library allocation
page read and write
1FBDAEB1000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE5A5E000
trusted library allocation
page read and write
1A0000
heap
page read and write
1FBE8741000
trusted library allocation
page read and write
21B44D5D000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBDAE73000
heap
page read and write
7F9CE7E000
stack
page read and write
1FBE4CDE000
trusted library allocation
page read and write
1FBE5183000
trusted library allocation
page read and write
1FBEBE46000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE1670000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBF05C1000
heap
page read and write
1FBDAE43000
heap
page read and write
1FBEC08D000
trusted library allocation
page read and write
1FBEBFEC000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBEBE6C000
trusted library allocation
page read and write
21B446E2000
unkown
page execute read
1FBE5AF1000
trusted library allocation
page read and write
1FBE4131000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBE59BF000
trusted library allocation
page read and write
1FBE77FB000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1D8CA23C000
trusted library allocation
page read and write
1FBEC178000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBE53EF000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBEC2ED000
trusted library allocation
page read and write
1FBEFB8B000
trusted library allocation
page read and write
1D8CA003000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBE5695000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBE515F000
trusted library allocation
page read and write
C26000
heap
page read and write
1FBE4A9B000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBE514F000
trusted library allocation
page read and write
1FBE74DE000
trusted library allocation
page read and write
1FBE3F7B000
trusted library allocation
page read and write
1FBE51A9000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE416B000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1D8CA20F000
trusted library allocation
page read and write
1FBE5262000
trusted library allocation
page read and write
1FBE3980000
trusted library allocation
page read and write
1FBE488B000
trusted library allocation
page read and write
1FBE77E9000
trusted library allocation
page read and write
1FBF04F9000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
2AD4D4D0000
heap
page read and write
1FBE4961000
trusted library allocation
page read and write
1FBE50A2000
trusted library allocation
page read and write
1FBE74BF000
trusted library allocation
page read and write
1FBE67A8000
trusted library allocation
page read and write
1FBEFE4B000
trusted library allocation
page read and write
1FBE5192000
trusted library allocation
page read and write
1FBE643B000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE21000
heap
page read and write
21B44D4C000
heap
page read and write
1FBEC2C3000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEC0A7000
trusted library allocation
page read and write
1FBE49D9000
trusted library allocation
page read and write
1FBEC0F0000
trusted library allocation
page read and write
1FBE5A89000
trusted library allocation
page read and write
1FBE3F9F000
trusted library allocation
page read and write
154000
heap
page read and write
1FBE48F2000
trusted library allocation
page read and write
1FBEC191000
trusted library allocation
page read and write
1FBE5051000
trusted library allocation
page read and write
1FBEC242000
trusted library allocation
page read and write
1FBF04F7000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBDAE3B000
heap
page read and write
21B44DC6000
heap
page read and write
17EE000
stack
page read and write
1FBDAE62000
heap
page read and write
1FBE13F4000
trusted library allocation
page read and write
1FBE4DFD000
trusted library allocation
page read and write
1FBE4FB7000
trusted library allocation
page read and write
1FBF0348000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBE4D49000
trusted library allocation
page read and write
1FBDAE2A000
heap
page read and write
1FBE5AB1000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
21B45368000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBE52D7000
trusted library allocation
page read and write
1D8C9E32000
unclassified section
page read and write
1FBDAE73000
heap
page read and write
1FBE48F2000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE52FE000
trusted library allocation
page read and write
1FBEFA92000
trusted library allocation
page read and write
1FBF0334000
trusted library allocation
page read and write
1FBE3F20000
trusted library allocation
page read and write
BF0000
heap
page read and write
1FBE48FB000
trusted library allocation
page read and write
1FBEBE62000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBE3D1F000
trusted library allocation
page read and write
21B45358000
heap
page read and write
1FBE39D0000
trusted library allocation
page read and write
1FBE5A51000
trusted library allocation
page read and write
1FBE5252000
trusted library allocation
page read and write
F2459FA000
stack
page read and write
1FBEC0F6000
trusted library allocation
page read and write
21B44D40000
heap
page read and write
1FBEFFD6000
trusted library allocation
page read and write
1FBEF7F9000
trusted library allocation
page read and write
1D8CA0C7000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE49F3000
trusted library allocation
page read and write
1FBE5143000
trusted library allocation
page read and write
EA405FE000
unkown
page readonly
1FBDAE2F000
heap
page read and write
1FBE5152000
trusted library allocation
page read and write
1FBDAE61000
heap
page read and write
1FBDF79E000
trusted library allocation
page read and write
1FBF04D5000
trusted library allocation
page read and write
1FBEC1BF000
trusted library allocation
page read and write
BF8000
heap
page read and write
1FBE4190000
trusted library allocation
page read and write
21B44C98000
unkown
page execute read
1FBDAE3B000
heap
page read and write
1FBF0329000
trusted library allocation
page read and write
1FBE61EC000
trusted library allocation
page read and write
1FBE7451000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
30E0000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBEFDF4000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE1362000
trusted library allocation
page read and write
1FBEFFB0000
trusted library allocation
page read and write
1FBE64F0000
trusted library allocation
page read and write
1FBDAE4D000
heap
page read and write
C36000
heap
page read and write
C12000
heap
page read and write
1FBE676B000
trusted library allocation
page read and write
1FBEFFDE000
trusted library allocation
page read and write
21B44D81000
heap
page read and write
1FBE526B000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBEFFE7000
trusted library allocation
page read and write
1FBE77AE000
trusted library allocation
page read and write
1FBE53E8000
trusted library allocation
page read and write
1FBDF7DF000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBE48FD000
trusted library allocation
page read and write
1FBE49A7000
trusted library allocation
page read and write
1FBEF7F0000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
1FBDFD71000
trusted library allocation
page read and write
1FBE52ED000
trusted library allocation
page read and write
1FBE3EF5000
trusted library allocation
page read and write
1FBE48FD000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBE5690000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBEBE85000
trusted library allocation
page read and write
1FBEC1E9000
trusted library allocation
page read and write
1FBE3E93000
trusted library allocation
page read and write
1FBE49FC000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBEC1BF000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBDAE40000
heap
page read and write
1FBEC371000
trusted library allocation
page read and write
1FBE134F000
trusted library allocation
page read and write
1FBEC178000
trusted library allocation
page read and write
1FBE5256000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE1321000
trusted library allocation
page read and write
1FBEBE45000
trusted library allocation
page read and write
1FBE59AE000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBEC1B8000
trusted library allocation
page read and write
1FBE54F8000
trusted library allocation
page read and write
1FBEC0F4000
trusted library allocation
page read and write
1FBE4E86000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBE7945000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBE5078000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBE74DC000
trusted library allocation
page read and write
1FBEC1AA000
trusted library allocation
page read and write
2530E710000
heap
page read and write
1FBDAE21000
heap
page read and write
1FBEC0EE000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBEBE68000
trusted library allocation
page read and write
1FBDAE4D000
heap
page read and write
1FBEC08F000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBEC136000
trusted library allocation
page read and write
1FBE39F5000
trusted library allocation
page read and write
C25000
heap
page read and write
1FBE4CEB000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBDAE4E000
heap
page read and write
1FBE55BC000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBE518B000
trusted library allocation
page read and write
1FBE0EDC000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBEBFB8000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBE7789000
trusted library allocation
page read and write
1FBEC08F000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBF0343000
trusted library allocation
page read and write
1FBE4E4F000
trusted library allocation
page read and write
1FBED90C000
trusted library allocation
page read and write
1FBE615F000
trusted library allocation
page read and write
1FBEC2FE000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBE415C000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBEFFCF000
trusted library allocation
page read and write
1FBEFBB1000
trusted library allocation
page read and write
1FBF0325000
trusted library allocation
page read and write
1FBE3D77000
trusted library allocation
page read and write
1FBDAE4F000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBEC554000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE5980000
trusted library allocation
page read and write
1FBE74BF000
trusted library allocation
page read and write
1FBEBE78000
trusted library allocation
page read and write
1FBE5458000
trusted library allocation
page read and write
1FBE0EB4000
trusted library allocation
page read and write
1FBEE591000
trusted library allocation
page read and write
1FBE4869000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE4955000
trusted library allocation
page read and write
1FBE597C000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBEC23E000
trusted library allocation
page read and write
1D8CA02E000
trusted library allocation
page read and write
1FBED8E5000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBDAE27000
heap
page read and write
1FBDAE35000
heap
page read and write
7F9A378000
stack
page read and write
1FBE74FD000
trusted library allocation
page read and write
1FBE5262000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBDAE49000
heap
page read and write
21B44292000
remote allocation
page execute read
1FBDAE29000
heap
page read and write
1FBE510B000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE7786000
trusted library allocation
page read and write
1FBEC39D000
trusted library allocation
page read and write
1FBE4FE5000
trusted library allocation
page read and write
1FBE4FBB000
trusted library allocation
page read and write
1FBDAE42000
heap
page read and write
1FBEFA9B000
trusted library allocation
page read and write
1FBEFACE000
trusted library allocation
page read and write
2530E900000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE3962000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBE4140000
trusted library allocation
page read and write
1FBDAE44000
heap
page read and write
1FBE0E18000
trusted library allocation
page read and write
1FBF0343000
trusted library allocation
page read and write
1FBEC34E000
trusted library allocation
page read and write
1FBE3D5A000
trusted library allocation
page read and write
1FBEC191000
trusted library allocation
page read and write
1FBEEC02000
trusted library allocation
page read and write
1FBEBE7C000
trusted library allocation
page read and write
1FBE6378000
trusted library allocation
page read and write
1FBE6470000
trusted library allocation
page read and write
21B45377000
heap
page read and write
1FBEC1FD000
trusted library allocation
page read and write
1FBEFA39000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBE5AF1000
trusted library allocation
page read and write
21B4475F000
trusted library allocation
page read and write
1FBEF7F0000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE51A9000
trusted library allocation
page read and write
1FBE5433000
trusted library allocation
page read and write
1FBE5AEE000
trusted library allocation
page read and write
1FBE64DE000
trusted library allocation
page read and write
1FBE52EB000
trusted library allocation
page read and write
1FBDAEA4000
heap
page read and write
21B446E7000
unkown
page execute read
1FBE16B8000
heap
page read and write
2AD4D870000
trusted library allocation
page read and write
154000
heap
page read and write
1FBEFBAF000
trusted library allocation
page read and write
1FBEBE33000
trusted library allocation
page read and write
1FBEC1E2000
trusted library allocation
page read and write
C2A000
heap
page read and write
2AD4D88F000
trusted library allocation
page read and write
1FBDAE2E000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBDAE28000
heap
page read and write
1FBE3F61000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBE67AE000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE5677000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBE3EF5000
trusted library allocation
page read and write
C19000
heap
page read and write
1FBDAE4C000
heap
page read and write
F2461FE000
stack
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE20000
heap
page read and write
2AD4D280000
remote allocation
page read and write
1FBE1664000
heap
page read and write
1FBEC1CA000
trusted library allocation
page read and write
283C0800000
trusted library allocation
page read and write
1FBE3E77000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBF04C2000
trusted library allocation
page read and write
1FBE13F4000
trusted library allocation
page read and write
1FBE74B4000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBE5D4A000
trusted library allocation
page read and write
1FBE5635000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
1FBE4FA2000
trusted library allocation
page read and write
21B44D43000
heap
page read and write
1FBE39F8000
trusted library allocation
page read and write
1FBE778B000
trusted library allocation
page read and write
1FBE1637000
heap
page read and write
1FBE4F2A000
trusted library allocation
page read and write
1FBE4D4E000
trusted library allocation
page read and write
1FBE52F3000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBE1699000
heap
page read and write
1FBDAE4D000
heap
page read and write
1FBEC3A4000
trusted library allocation
page read and write
1FBEFDEF000
trusted library allocation
page read and write
1FBE5268000
trusted library allocation
page read and write
1FBDAE52000
heap
page read and write
1FBE1362000
trusted library allocation
page read and write
21B44764000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE48F4000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE6973000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE7466000
trusted library allocation
page read and write
1FBE3DA5000
trusted library allocation
page read and write
1FBEC18E000
trusted library allocation
page read and write
154000
heap
page read and write
1FBEC1E2000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE04000
heap
page read and write
1FBEFE4B000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
21B44D49000
heap
page read and write
EA406FE000
stack
page read and write
1FBE5AC3000
trusted library allocation
page read and write
1FBDAE24000
heap
page read and write
1FBE4D55000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBE3F5B000
trusted library allocation
page read and write
1FBE7B6D000
trusted library allocation
page read and write
1FBE4D3B000
trusted library allocation
page read and write
1FBE7965000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE5194000
trusted library allocation
page read and write
1FBDAE61000
heap
page read and write
1FBF04D5000
trusted library allocation
page read and write
1FBEFF99000
trusted library allocation
page read and write
1FBF05DC000
heap
page read and write
1FBE682A000
trusted library allocation
page read and write
1FBE48F2000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1D8CA219000
trusted library allocation
page read and write
1FBEFDA9000
trusted library allocation
page read and write
1FBE5A7A000
trusted library allocation
page read and write
1FBE3E89000
trusted library allocation
page read and write
1FBEC178000
trusted library allocation
page read and write
2AD4D420000
heap
page readonly
1FBDAE25000
heap
page read and write
1FBDAE3F000
heap
page read and write
1FBDAE0B000
heap
page read and write
1FBEC154000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBEFB52000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBE5635000
trusted library allocation
page read and write
1FBE524E000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBE49BA000
trusted library allocation
page read and write
1FBE4F50000
trusted library allocation
page read and write
1FBF04F7000
trusted library allocation
page read and write
1FBE7766000
trusted library allocation
page read and write
14E000
stack
page read and write
1FBE5247000
trusted library allocation
page read and write
1FBEFFB9000
trusted library allocation
page read and write
1FBE5453000
trusted library allocation
page read and write
1FBE5192000
trusted library allocation
page read and write
1FBE166B000
heap
page read and write
1FBED905000
trusted library allocation
page read and write
1FBEC379000
trusted library allocation
page read and write
1FBE4AEB000
trusted library allocation
page read and write
1FBEBDD7000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE48000
heap
page read and write
1FBE10F6000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBEBE78000
trusted library allocation
page read and write
1FBE138B000
trusted library allocation
page read and write
1FBDAE4D000
heap
page read and write
1FBDAE02000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBDAE1A000
heap
page read and write
1FBDAE3B000
heap
page read and write
1FBF0477000
trusted library allocation
page read and write
1FBE5280000
trusted library allocation
page read and write
21B44DCE000
heap
page read and write
1FBE49BA000
trusted library allocation
page read and write
1FBE59FD000
trusted library allocation
page read and write
1FBE52ED000
trusted library allocation
page read and write
21B44DD1000
heap
page read and write
1FBEFECA000
trusted library allocation
page read and write
1FBE48EC000
trusted library allocation
page read and write
154000
heap
page read and write
1FBE514C000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
21B446EB000
unkown
page execute read
1FBDAE33000
heap
page read and write
1FBE4D57000
trusted library allocation
page read and write
1FBE778C000
trusted library allocation
page read and write
1FBE3F97000
trusted library allocation
page read and write
21B44DCE000
heap
page read and write
1FBEC1D2000
trusted library allocation
page read and write
1FBEC185000
trusted library allocation
page read and write
1FBDAE41000
heap
page read and write
1FBE61D4000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBEBDAF000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBE166B000
heap
page read and write
21B446E0000
unkown
page execute read
1FBE7789000
trusted library allocation
page read and write
1FBE77F8000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE0E000
heap
page read and write
1FBE5A98000
trusted library allocation
page read and write
21B45377000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBDAE2F000
heap
page read and write
1FBE3E70000
trusted library allocation
page read and write
21B447BF000
trusted library allocation
page read and write
1FBE3D9E000
trusted library allocation
page read and write
1FBEC07E000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBDAE46000
heap
page read and write
1FBE5169000
trusted library allocation
page read and write
1FBF0551000
heap
page read and write
1FBEFEE9000
trusted library allocation
page read and write
1FBF0345000
trusted library allocation
page read and write
1FBE3EC2000
trusted library allocation
page read and write
1FBE7466000
trusted library allocation
page read and write
1FBE5A37000
trusted library allocation
page read and write
1FBE5AC0000
trusted library allocation
page read and write
1FBE529A000
trusted library allocation
page read and write
1FBE4AB9000
trusted library allocation
page read and write
1FBEC2F0000
trusted library allocation
page read and write
1FBEFA9B000
trusted library allocation
page read and write
1FBEFA7D000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBF0551000
heap
page read and write
1FBEC191000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBE1668000
heap
page read and write
1FBF0373000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE4D57000
trusted library allocation
page read and write
1FBE49D7000
trusted library allocation
page read and write
1FBE50C7000
trusted library allocation
page read and write
2F91000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBF0340000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBE5AAB000
trusted library allocation
page read and write
1FBF033E000
trusted library allocation
page read and write
1FBF0B62000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
7F9A2FE000
unkown
page readonly
2F91000
heap
page read and write
1FBEC15D000
trusted library allocation
page read and write
1FBEFFAD000
trusted library allocation
page read and write
2AD4D6C3000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBDAE0B000
heap
page read and write
1FBE3D9E000
trusted library allocation
page read and write
1FBE77F4000
trusted library allocation
page read and write
1FBF034F000
trusted library allocation
page read and write
21B4533B000
heap
page read and write
1FBE4F92000
trusted library allocation
page read and write
1FBE48AE000
trusted library allocation
page read and write
1FBF034D000
trusted library allocation
page read and write
2AD4D830000
trusted library allocation
page read and write
1FBF035E000
trusted library allocation
page read and write
1FBE5012000
trusted library allocation
page read and write
21B44DD1000
heap
page read and write
1FBE59AB000
trusted library allocation
page read and write
1FBF0B4A000
trusted library allocation
page read and write
19E000
stack
page read and write
1FBDAE0B000
heap
page read and write
2530E800000
trusted library allocation
page read and write
1FBE3EC8000
trusted library allocation
page read and write
1FBE3B00000
trusted library allocation
page read and write
1FBDFF00000
trusted library allocation
page read and write
1FBE49A7000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBDAE28000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBEFF88000
trusted library allocation
page read and write
1FBE3EC1000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
1FBEC380000
trusted library allocation
page read and write
1FBE5229000
trusted library allocation
page read and write
1FBEBDB9000
trusted library allocation
page read and write
1FBEFA7D000
trusted library allocation
page read and write
1FBE77E4000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE36000
heap
page read and write
1FBE4F95000
trusted library allocation
page read and write
1FBEC1B8000
trusted library allocation
page read and write
1FBE7426000
trusted library allocation
page read and write
1FBE4D57000
trusted library allocation
page read and write
1FBE3F9E000
trusted library allocation
page read and write
21B44D49000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBE39CC000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBE3F87000
trusted library allocation
page read and write
1FBDFD2F000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
1FBDAE19000
heap
page read and write
1FBE39BE000
trusted library allocation
page read and write
1FBE3F74000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
1FBE69ED000
trusted library allocation
page read and write
1FBEFBAB000
trusted library allocation
page read and write
7F9A37B000
stack
page read and write
1FBDAE79000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBEFE7F000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE4D50000
trusted library allocation
page read and write
1FBEC147000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBE771C000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBDAE0E000
heap
page read and write
1FBEFBB7000
trusted library allocation
page read and write
C44000
heap
page read and write
1FBE52FE000
trusted library allocation
page read and write
1FBEFB7D000
trusted library allocation
page read and write
1FBEC18C000
trusted library allocation
page read and write
1FBF04AA000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBE692C000
trusted library allocation
page read and write
1FBEFE6B000
trusted library allocation
page read and write
1FBEFB42000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBE5A7A000
trusted library allocation
page read and write
1FBF0B91000
trusted library allocation
page read and write
1FBE3F8D000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
1FBE3ED2000
trusted library allocation
page read and write
1FBF0457000
trusted library allocation
page read and write
1FBEC1F5000
trusted library allocation
page read and write
1FBDAE1F000
heap
page read and write
1FBEFA55000
trusted library allocation
page read and write
21B45322000
heap
page read and write
1FBE4FA3000
trusted library allocation
page read and write
1FBDFE82000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBF04B8000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
1FBE5DE2000
trusted library allocation
page read and write
1FBE3DA5000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE16000
heap
page read and write
1FBE4FA0000
trusted library allocation
page read and write
1FBF0631000
heap
page read and write
1FBE52F7000
trusted library allocation
page read and write
1FBE52FE000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
283C0A07000
trusted library allocation
page read and write
1FBE48AA000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
1FBDFE77000
trusted library allocation
page read and write
1FBE52D7000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBE4996000
trusted library allocation
page read and write
1FBDAE48000
heap
page read and write
1FBE5192000
trusted library allocation
page read and write
1FBDAE54000
heap
page read and write
1FBEFE7F000
trusted library allocation
page read and write
1FBDFE66000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBDAE4F000
heap
page read and write
1FBE515B000
trusted library allocation
page read and write
1FBF05DC000
heap
page read and write
21B44D49000
heap
page read and write
1FBE4961000
trusted library allocation
page read and write
1FBE4EFA000
trusted library allocation
page read and write
1FBE48FD000
trusted library allocation
page read and write
1D8CA079000
trusted library allocation
page read and write
1FBF0B6B000
trusted library allocation
page read and write
1FBF0B6B000
trusted library allocation
page read and write
1FBEC08B000
trusted library allocation
page read and write
21B44C90000
unkown
page execute read
1FBE4F3F000
trusted library allocation
page read and write
1FBE4E77000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBE413D000
trusted library allocation
page read and write
1FBEBDDF000
trusted library allocation
page read and write
1FBEFFCD000
trusted library allocation
page read and write
1FBE51CE000
trusted library allocation
page read and write
1FBDAE69000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBE4DA0000
trusted library allocation
page read and write
1FBDAE62000
heap
page read and write
21B44D88000
heap
page read and write
1FBE5273000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBEBDC3000
trusted library allocation
page read and write
1FBEFDDE000
trusted library allocation
page read and write
1FBE3939000
trusted library allocation
page read and write
1FBE41F9000
trusted library allocation
page read and write
1FBEFFB0000
trusted library allocation
page read and write
1FBEFF94000
trusted library allocation
page read and write
21B44712000
trusted library allocation
page read and write
1FBDAE37000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBDAE33000
heap
page read and write
1FBDAE62000
heap
page read and write
1FBE49EF000
trusted library allocation
page read and write
1FBE3DCE000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
1FBE5453000
trusted library allocation
page read and write
1FBEFFDB000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE647C000
trusted library allocation
page read and write
1FBDAE73000
heap
page read and write
1FBEC231000
trusted library allocation
page read and write
1FBEC21A000
trusted library allocation
page read and write
1FBEE5D5000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
1FBEC148000
trusted library allocation
page read and write
1FBEC07B000
trusted library allocation
page read and write
1FBE7941000
trusted library allocation
page read and write
1FBEC1FB000
trusted library allocation
page read and write
1D8CA1F4000
heap
page read and write
1FBE1668000
heap
page read and write
1FBEC08B000
trusted library allocation
page read and write
1FBE16DA000
heap
page read and write
1FBE52B3000
trusted library allocation
page read and write
1FBEC0F2000
trusted library allocation
page read and write
21B44CA0000
trusted library allocation
page read and write
1FBE7969000
trusted library allocation
page read and write
1FBE48B8000
trusted library allocation
page read and write
1FBE8731000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
C25000
heap
page read and write
1FBE41DA000
trusted library allocation
page read and write
1FBE4C5B000
trusted library allocation
page read and write
1FBE48F2000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBF032E000
trusted library allocation
page read and write
1FBE495E000
trusted library allocation
page read and write
1FBF04EC000
trusted library allocation
page read and write
1FBDAEAA000
heap
page read and write
1FBE4DC3000
trusted library allocation
page read and write
1FBE4E74000
trusted library allocation
page read and write
1FBEFE73000
trusted library allocation
page read and write
1FBDAE0E000
heap
page read and write
21B44482000
unclassified section
page read and write
1FBDAE62000
heap
page read and write
1FBDAE3B000
heap
page read and write
21B442E0000
heap
page read and write
1FBE4887000
trusted library allocation
page read and write
1FBEBDC3000
trusted library allocation
page read and write
1FBE5628000
trusted library allocation
page read and write
1FBE5453000
trusted library allocation
page read and write
21B44350000
heap
page read and write
F2479FF000
stack
page read and write
1FBDAE3B000
heap
page read and write
1FBE13F4000
trusted library allocation
page read and write
1FBE3972000
trusted library allocation
page read and write
1FBEFF8B000
trusted library allocation
page read and write
1FBEC0A0000
trusted library allocation
page read and write
1FBEC14D000
trusted library allocation
page read and write
1FBDAE16000
heap
page read and write
21B45358000
heap
page read and write
1FBE5A66000
trusted library allocation
page read and write
1FBEFDBD000
trusted library allocation
page read and write
1FBE0EEC000
trusted library allocation
page read and write
1FBF04F7000
trusted library allocation
page read and write
2AD4D85D000
trusted library allocation
page read and write
1FBE52ED000
trusted library allocation
page read and write
1FBEBE5A000
trusted library allocation
page read and write
1FBDAE21000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBE3F70000
trusted library allocation
page read and write
1FBDAE33000
heap
page read and write
1FBEC2F0000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBE50BD000
trusted library allocation
page read and write
1FBE48CF000
trusted library allocation
page read and write
1FBE3EDC000
trusted library allocation
page read and write
1FBF04B8000
trusted library allocation
page read and write
1FBE68D8000
trusted library allocation
page read and write
1FBE4ADC000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
1FBDAE0B000
heap
page read and write
1FBE16B6000
heap
page read and write
1FBEE5E1000
trusted library allocation
page read and write
1FBEC1CF000
trusted library allocation
page read and write
1FBEC0BE000
trusted library allocation
page read and write
21B44781000
trusted library allocation
page read and write
2AD4D3D0000
heap
page read and write
1FBE4EB4000
trusted library allocation
page read and write
1FBEFF9C000
trusted library allocation
page read and write
520000
heap
page read and write
21B44D6A000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBEC2FA000
trusted library allocation
page read and write
1FBE525E000
trusted library allocation
page read and write
1FBDAE3B000
heap
page read and write
21B44DC0000
heap
page read and write
1FBEFBB5000
trusted library allocation
page read and write
1FBE4FFD000
trusted library allocation
page read and write
1FBEFBF3000
trusted library allocation
page read and write
1FBE4936000
trusted library allocation
page read and write
1FBE168B000
heap
page read and write
1FBE49CE000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBE4D57000
trusted library allocation
page read and write
1FBE505E000
trusted library allocation
page read and write
1FBEC156000
trusted library allocation
page read and write
1FBE50B0000
trusted library allocation
page read and write
1FBEBDFC000
trusted library allocation
page read and write
1FBE3EDC000
trusted library allocation
page read and write
1FBE49AB000
trusted library allocation
page read and write
1FBDAE43000
heap
page read and write
1FBE51B1000
trusted library allocation
page read and write
1FBDAE29000
heap
page read and write
5C0000
unkown
page readonly
1FBEC0A0000
trusted library allocation
page read and write
1FBE61B8000
trusted library allocation
page read and write
1FBE49F3000
trusted library allocation
page read and write
1FBEC1C5000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBDAE79000
heap
page read and write
1FBEF7FD000
trusted library allocation
page read and write
1FBE39BE000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBDAE79000
heap
page read and write
21B446D0000
trusted library allocation
page read and write
1FBE5653000
trusted library allocation
page read and write
1FBEFE7C000
trusted library allocation
page read and write
1FBEFD9C000
trusted library allocation
page read and write
1FBE68DA000
trusted library allocation
page read and write
21B44DC3000
heap
page read and write
1FBDAE55000
heap
page read and write
1FBE3DA5000
trusted library allocation
page read and write
1D8C9E40000
heap
page read and write
1FBDAE52000
heap
page read and write
1FBE3F63000
trusted library allocation
page read and write
1FBDAE1D000
heap
page read and write
1FBE4190000
trusted library allocation
page read and write
1FBDAE19000
heap
page read and write
1FBDAE20000
heap
page read and write
1FBDAE3E000
heap
page read and write
1FBE3E9E000
trusted library allocation
page read and write
1FBEFF24000
trusted library allocation
page read and write
1FBE5453000
trusted library allocation
page read and write
1FBE4FE5000
trusted library allocation
page read and write
1FBDF790000
trusted library allocation
page read and write
1FBE4112000
trusted library allocation
page read and write
EA4063E000
unkown
page readonly
1FBDAE99000
heap
page read and write
1D8C9BE0000
unclassified section
page readonly
1FBE4EC4000
trusted library allocation
page read and write
1FBE49CE000
trusted library allocation
page read and write
1FBE77B2000
trusted library allocation
page read and write
1FBEFE7C000
trusted library allocation
page read and write
21B45359000
heap
page read and write
1FBEFE2C000
trusted library allocation
page read and write
1FBE1699000
heap
page read and write
7F9D6BE000
stack
page read and write
1FBE169A000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBE52D1000
trusted library allocation
page read and write
1FBE49A7000
trusted library allocation
page read and write
1FBDAE99000
heap
page read and write
1FBEFFFD000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBE4FB6000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBE4FE3000
trusted library allocation
page read and write
1FBE5AA2000
trusted library allocation
page read and write
1FBEC234000
trusted library allocation
page read and write
1FBDAE79000
heap
page read and write
1FBEF7FE000
trusted library allocation
page read and write
1FBEBE00000
trusted library allocation
page read and write
1FBDAE55000
heap
page read and write
1FBDAE3E000
heap
page read and write
1FBDAE2F000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE5273000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBE3E5F000
trusted library allocation
page read and write
1FBEC1C5000
trusted library allocation
page read and write
1FBEC205000
trusted library allocation
page read and write
1FBE4D4B000
trusted library allocation
page read and write
1FBE4A9F000
trusted library allocation
page read and write
1FBDAE2F000
heap
page read and write
1FBE4884000
trusted library allocation
page read and write
1FBE6729000
trusted library allocation
page read and write
1FBE488B000
trusted library allocation
page read and write
1FBEC231000
trusted library allocation
page read and write
21B442A0000
unclassified section
page readonly
1FBDAE32000
heap
page read and write
1FBE64AD000
trusted library allocation
page read and write
A9F000
stack
page read and write
1FBDAE3B000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBE3EC8000
trusted library allocation
page read and write
1FBE7761000
trusted library allocation
page read and write
1FBDAE3C000
heap
page read and write
1FBDAE49000
heap
page read and write
1FBEBEFC000
trusted library allocation
page read and write
1FBE48FD000
trusted library allocation
page read and write
1FBE3F8D000
trusted library allocation
page read and write
1FBE56EC000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE3B000
heap
page read and write
C18000
heap
page read and write
1FBEC1E8000
trusted library allocation
page read and write
1FBDAE20000
heap
page read and write
1FBE3DCE000
trusted library allocation
page read and write
1FBDAE53000
heap
page read and write
1FBDAE73000
heap
page read and write
1FBE6179000
trusted library allocation
page read and write
1FBDAE32000
heap
page read and write
1FBDAE31000
heap
page read and write
1FBEC0EE000
trusted library allocation
page read and write
1FBDAE02000
heap
page read and write
1FBE5450000
trusted library allocation
page read and write
1FBE41C5000
trusted library allocation
page read and write
1FBDAE1A000
heap
page read and write
1FBE41EA000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
1FBDAE41000
heap
page read and write
1FBE5A66000
trusted library allocation
page read and write
213DB1BA000
trusted library allocation
page execute read
1FBDAE62000
heap
page read and write
1FBE4949000
trusted library allocation
page read and write
1FBDAE35000
heap
page read and write
1FBDAE28000
heap
page read and write
1FBDAE35000
heap
page read and write
1FBEC0AE000
trusted library allocation
page read and write
1D8C9E30000
unclassified section
page read and write
1FBEBF8C000
trusted library allocation
page read and write
1FBF0BB4000
trusted library allocation
page read and write
1FBE5AC0000
trusted library allocation
page read and write
1FBDAE23000
heap
page read and write
1FBDAE32000
heap
page read and write
1FBEC2F5000
trusted library allocation
page read and write
1FBE495C000
trusted library allocation
page read and write
1FBDAE4E000
heap
page read and write
1FBE4CC5000
trusted library allocation
page read and write
1FBDAE49000
heap
page read and write
C22000
heap
page read and write
1FBDAE69000
heap
page read and write
1FBDAE53000
heap
page read and write
1FBE614B000
trusted library allocation
page read and write
1FBE5493000
trusted library allocation
page read and write
1FBDAE0B000
heap
page read and write
1FBE167E000
heap
page read and write
1FBE52F7000
trusted library allocation
page read and write
21B4476F000
trusted library allocation
page read and write
1FBE3EA5000
trusted library allocation
page read and write
There are 3852 hidden memdumps, click here to show them.