IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_8867d6cd-5c5f-4031-a0a2-77840b94c1c7.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_8867d6cd-5c5f-4031-a0a2-77840b94c1c7.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2240 -prefMapHandle 2224 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aaa928f9-cb8d-43a7-a620-61f3cf2f0713} 5752 "\\.\pipe\gecko-crash-server-pipe.5752" 1ba5726d310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3956 -parentBuildID 20230927232528 -prefsHandle 3972 -prefMapHandle 4160 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6bbae05-984c-492c-99ba-be9d11b0e1d4} 5752 "\\.\pipe\gecko-crash-server-pipe.5752" 1ba6795e210 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5288 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5272 -prefMapHandle 5280 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f824fe1-5f0b-4c79-b4bd-9ac21d58fc51} 5752 "\\.\pipe\gecko-crash-server-pipe.5752" 1ba6eec4310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://youtube.comZ
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
http://mozilla.org/0
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
http://detectportal.firefox.comP
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://mozilla-hub.atlassian.net/browse/SDK-405
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.252.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
172.217.16.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.78
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.65.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.217.16.206
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
A4F000
heap
page read and write
malicious
1BA6940E000
trusted library allocation
page read and write
1BA6F621000
trusted library allocation
page read and write
1BA6970F000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA674EC000
trusted library allocation
page read and write
1BA6A9CF000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA6F7DA000
trusted library allocation
page read and write
1BA6785F000
trusted library allocation
page read and write
1BA6F8F5000
trusted library allocation
page read and write
1BA66D6D000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA5DFD2000
heap
page read and write
1BA6A49C000
trusted library allocation
page read and write
1BA5DFBD000
heap
page read and write
1BA6A586000
trusted library allocation
page read and write
1BA70DDD000
trusted library allocation
page read and write
1BA6F094000
trusted library allocation
page read and write
1BA64123000
trusted library allocation
page read and write
1BA6A942000
trusted library allocation
page read and write
1BA6944D000
trusted library allocation
page read and write
1BA66EA5000
trusted library allocation
page read and write
1BA70BC5000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA5DFC3000
heap
page read and write
1BA688F0000
trusted library allocation
page read and write
1BA688E8000
trusted library allocation
page read and write
1BA684EB000
trusted library allocation
page read and write
1BA69361000
trusted library allocation
page read and write
1BA6F329000
trusted library allocation
page read and write
1BA6AB83000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA6F693000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA5DF9E000
heap
page read and write
1BA67896000
trusted library allocation
page read and write
1BA69823000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA6AB67000
trusted library allocation
page read and write
1BA678AC000
trusted library allocation
page read and write
1BA71841000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA66FC0000
trusted library allocation
page read and write
1BA70B77000
trusted library allocation
page read and write
1BA715D7000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFAE000
heap
page read and write
1BA67886000
trusted library allocation
page read and write
1BA6A570000
trusted library allocation
page read and write
1BA68BF3000
trusted library allocation
page read and write
1BA672D8000
trusted library allocation
page read and write
1BA66D1B000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA64197000
trusted library allocation
page read and write
1BA70CA4000
trusted library allocation
page read and write
1BA6F32B000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA66FF8000
trusted library allocation
page read and write
1BA699CF000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA6A8FD000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA73054000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA5DFD3000
heap
page read and write
1BA66D63000
trusted library allocation
page read and write
1BA6F2BA000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA730D1000
trusted library allocation
page read and write
1BA6A5CF000
trusted library allocation
page read and write
1C5B7396000
trusted library allocation
page read and write
23B96807000
trusted library allocation
page read and write
1BA72F2E000
trusted library allocation
page read and write
1BA698BF000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA6884E000
trusted library allocation
page read and write
1BA69972000
trusted library allocation
page read and write
1BA66F89000
trusted library allocation
page read and write
1BA674FA000
trusted library allocation
page read and write
1BA69A2A000
trusted library allocation
page read and write
1BA6F343000
trusted library allocation
page read and write
1BA6F8E6000
trusted library allocation
page read and write
1BA72F16000
trusted library allocation
page read and write
2A02E6E0000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA68B22000
trusted library allocation
page read and write
283563C7000
trusted library allocation
page read and write
1BA6F8C4000
trusted library allocation
page read and write
1BA68C36000
trusted library allocation
page read and write
1BA66E9E000
trusted library allocation
page read and write
1BA67454000
trusted library allocation
page read and write
1BA73025000
trusted library allocation
page read and write
1BA68AF8000
trusted library allocation
page read and write
28356FD0000
heap
page read and write
1BA70C51000
trusted library allocation
page read and write
1BA724A5000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA723ED000
trusted library allocation
page read and write
1BA66E89000
trusted library allocation
page read and write
1BA629B3000
trusted library allocation
page read and write
1BA69354000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA5E004000
heap
page read and write
23B96450000
heap
page readonly
1BA6F8D2000
trusted library allocation
page read and write
28357048000
heap
page read and write
1BA6A508000
trusted library allocation
page read and write
28356FEC000
heap
page read and write
1BA683C7000
trusted library allocation
page read and write
283563F5000
trusted library allocation
page read and write
1A9367E000
unkown
page readonly
1BA70DE0000
trusted library allocation
page read and write
1BA6A4BB000
trusted library allocation
page read and write
1BA6A937000
trusted library allocation
page read and write
1BA678CB000
trusted library allocation
page read and write
1BA64109000
trusted library allocation
page read and write
28356F6D000
heap
page read and write
1BA6F60B000
trusted library allocation
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA5DFCC000
heap
page read and write
1BA6988B000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
894000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA66EA5000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
177F000
stack
page read and write
1BA5DFD0000
heap
page read and write
1BA67B68000
trusted library allocation
page read and write
1BA70C9B000
trusted library allocation
page read and write
1BA6419A000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA67290000
trusted library allocation
page read and write
1BA6EF32000
trusted library allocation
page read and write
23B963F6000
heap
page read and write
1BA6F82F000
trusted library allocation
page read and write
1BA70DDD000
trusted library allocation
page read and write
1BA66881000
trusted library allocation
page read and write
1BA72F0A000
trusted library allocation
page read and write
1BA718E4000
trusted library allocation
page read and write
1BA70C4F000
trusted library allocation
page read and write
1BA72FF7000
trusted library allocation
page read and write
1BA67BA9000
trusted library allocation
page read and write
28356FD3000
heap
page read and write
1C5B71C5000
heap
page read and write
1BA5E004000
heap
page read and write
28357067000
heap
page read and write
1BA6F865000
trusted library allocation
page read and write
1BA6F184000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA5DFD9000
heap
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA68407000
trusted library allocation
page read and write
1BA684C0000
trusted library allocation
page read and write
1BA6F1F6000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA6F6C1000
trusted library allocation
page read and write
1BA70D26000
trusted library allocation
page read and write
1BA69796000
trusted library allocation
page read and write
1BA70BDF000
trusted library allocation
page read and write
1BA69732000
trusted library allocation
page read and write
1BA6F8E6000
trusted library allocation
page read and write
1BA66DB6000
trusted library allocation
page read and write
1BA718C5000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
23B9690C000
trusted library allocation
page read and write
1BA6F36E000
trusted library allocation
page read and write
880000
heap
page read and write
1BA5DF9E000
heap
page read and write
1BA5DFB3000
heap
page read and write
1BA688CA000
trusted library allocation
page read and write
1A924FB000
stack
page read and write
1BA629F7000
trusted library allocation
page read and write
1BA5DFBD000
heap
page read and write
1BA72348000
trusted library allocation
page read and write
2A02E807000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
1BA5DFD6000
heap
page read and write
28356312000
trusted library allocation
page read and write
1BA6F7DB000
trusted library allocation
page read and write
1BA674A5000
trusted library allocation
page read and write
1BA6970B000
trusted library allocation
page read and write
1BA6F1EF000
trusted library allocation
page read and write
1BA70CB2000
trusted library allocation
page read and write
1A924F8000
stack
page read and write
1BA5DFCA000
heap
page read and write
1BA672B9000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA6F392000
trusted library allocation
page read and write
28357059000
heap
page read and write
1BA6F756000
trusted library allocation
page read and write
1BA72501000
heap
page read and write
1BA67BF5000
trusted library allocation
page read and write
1BA72C00000
trusted library allocation
page read and write
1C5B7517000
trusted library allocation
page read and write
1BA70BEB000
trusted library allocation
page read and write
28356FD0000
heap
page read and write
1BA674B2000
trusted library allocation
page read and write
1BA70BC3000
trusted library allocation
page read and write
1BA690ED000
trusted library allocation
page read and write
1BA6A6C8000
trusted library allocation
page read and write
1BA67863000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA5DFCA000
heap
page read and write
1BA5E01B000
heap
page read and write
1BA68AB2000
trusted library allocation
page read and write
1BA6F7F3000
trusted library allocation
page read and write
1BA69481000
trusted library allocation
page read and write
1BA70D56000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA70B58000
trusted library allocation
page read and write
1BA70DBA000
trusted library allocation
page read and write
1BA72387000
trusted library allocation
page read and write
1BA6A5D4000
trusted library allocation
page read and write
1BA5DFCB000
heap
page read and write
1BA66B4F000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFC9000
heap
page read and write
1BA6A6A3000
trusted library allocation
page read and write
1BA6F8BA000
trusted library allocation
page read and write
1BA72464000
trusted library allocation
page read and write
1BA6F3DB000
trusted library allocation
page read and write
1BA67BED000
trusted library allocation
page read and write
1BA684E2000
trusted library allocation
page read and write
1BA64262000
trusted library allocation
page read and write
1BA6F8A7000
trusted library allocation
page read and write
1BA70CE0000
trusted library allocation
page read and write
1BA66FFE000
trusted library allocation
page read and write
1BA66D65000
trusted library allocation
page read and write
1BA641E8000
trusted library allocation
page read and write
1BA630B6000
trusted library allocation
page read and write
1BA71957000
trusted library allocation
page read and write
1BA694C5000
trusted library allocation
page read and write
1BA68A6A000
trusted library allocation
page read and write
1BA67B81000
trusted library allocation
page read and write
1BA6F187000
trusted library allocation
page read and write
1BA629EF000
trusted library allocation
page read and write
1BA69946000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
28356F6D000
heap
page read and write
1BA698BF000
trusted library allocation
page read and write
1BA674C1000
trusted library allocation
page read and write
1BA73074000
trusted library allocation
page read and write
1BA66E9E000
trusted library allocation
page read and write
1BA6F3D1000
trusted library allocation
page read and write
23B96646000
trusted library allocation
page read and write
345B7E9C000
trusted library allocation
page execute read
1BA5DFB7000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA68C54000
trusted library allocation
page read and write
28357034000
heap
page read and write
1BA69825000
trusted library allocation
page read and write
1BA66FD9000
trusted library allocation
page read and write
1BA70CC7000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA5E004000
heap
page read and write
1BA5DF9E000
heap
page read and write
1BA5E004000
heap
page read and write
1BA6F8B1000
trusted library allocation
page read and write
1BA67463000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA6A949000
trusted library allocation
page read and write
1BA5DFD6000
heap
page read and write
1BA6F3BD000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA70B9F000
trusted library allocation
page read and write
1C5B751E000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA70DA2000
trusted library allocation
page read and write
1BA6A6DD000
trusted library allocation
page read and write
1BA66FB2000
trusted library allocation
page read and write
1BA6B267000
trusted library allocation
page read and write
1BA6A5F1000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA642F8000
trusted library allocation
page read and write
2A030157000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA674AE000
trusted library allocation
page read and write
1BA630B6000
trusted library allocation
page read and write
1BA6A6E0000
trusted library allocation
page read and write
1BA678BC000
trusted library allocation
page read and write
A61000
heap
page read and write
1BA66D65000
trusted library allocation
page read and write
28356375000
trusted library allocation
page read and write
1BA6F8C2000
trusted library allocation
page read and write
1BA69777000
trusted library allocation
page read and write
F66766E000
stack
page read and write
1BA6F2BE000
trusted library allocation
page read and write
283561C0000
unclassified section
page read and write
1BA5DFB9000
heap
page read and write
1BA5DFA8000
heap
page read and write
894000
heap
page read and write
1BA66E7F000
trusted library allocation
page read and write
28356FE1000
heap
page read and write
1BA717A2000
trusted library allocation
page read and write
1BA730CA000
trusted library allocation
page read and write
1BA7248F000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA6F3AC000
trusted library allocation
page read and write
1BA66F89000
trusted library allocation
page read and write
1BA70D21000
trusted library allocation
page read and write
1BA6424D000
trusted library allocation
page read and write
1BA67823000
trusted library allocation
page read and write
1C5B737A000
trusted library allocation
page read and write
1BA6AB37000
trusted library allocation
page read and write
1BA70D4D000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
1BA70DC2000
trusted library allocation
page read and write
A70000
heap
page read and write
1C5B719A000
heap
page read and write
1BA6F8E8000
trusted library allocation
page read and write
A56000
heap
page read and write
1BA72FED000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA6F18B000
trusted library allocation
page read and write
1BA68C8A000
trusted library allocation
page read and write
1C5B735B000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA666CA000
trusted library allocation
page read and write
1BA70DAE000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA674C1000
trusted library allocation
page read and write
1BA5DF9E000
heap
page read and write
283569E0000
unkown
page execute read
1BA5DFA8000
heap
page read and write
1BA6F139000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA6F0DC000
trusted library allocation
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA678CB000
trusted library allocation
page read and write
1BA6946C000
trusted library allocation
page read and write
1BA70B36000
trusted library allocation
page read and write
1BA66FE3000
trusted library allocation
page read and write
1BA674BD000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFB6000
heap
page read and write
1BA6EFE9000
trusted library allocation
page read and write
1BA699F1000
trusted library allocation
page read and write
A65000
heap
page read and write
1BA5E01B000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA6F215000
trusted library allocation
page read and write
1BA641E4000
trusted library allocation
page read and write
1BA67B6E000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
1BA6F3A4000
trusted library allocation
page read and write
1BA72FD2000
trusted library allocation
page read and write
1BA5DFD5000
heap
page read and write
1BA684E4000
trusted library allocation
page read and write
1BA67BC5000
trusted library allocation
page read and write
1BA66D7F000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA6F0F3000
trusted library allocation
page read and write
1BA64154000
trusted library allocation
page read and write
1BA66E66000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA68CD6000
trusted library allocation
page read and write
1BA67897000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA666C8000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFA8000
heap
page read and write
C88E83E000
unkown
page readonly
1BA5DFFA000
heap
page read and write
1BA6F6EE000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA70B77000
trusted library allocation
page read and write
1BA694FA000
trusted library allocation
page read and write
1BA6976D000
trusted library allocation
page read and write
1BA5DFA0000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA6F1D2000
trusted library allocation
page read and write
28356410000
heap
page read and write
1BA5E023000
heap
page read and write
28356389000
trusted library allocation
page read and write
1BA68330000
trusted library allocation
page read and write
1BA5DFD5000
heap
page read and write
1BA6831E000
trusted library allocation
page read and write
2835614A000
heap
page read and write
1BA70B3E000
trusted library allocation
page read and write
1BA68310000
trusted library allocation
page read and write
1BA5DFD9000
heap
page read and write
1BA5DFAE000
heap
page read and write
1BA5E02B000
heap
page read and write
1BA6A5DC000
trusted library allocation
page read and write
1BA683E2000
trusted library allocation
page read and write
1BA6F89F000
trusted library allocation
page read and write
23B96460000
unclassified section
page read and write
1BA7300F000
trusted library allocation
page read and write
1BA6F8F5000
trusted library allocation
page read and write
1BA67255000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA5DFD7000
heap
page read and write
1BA66D7F000
trusted library allocation
page read and write
1C5B7300000
trusted library allocation
page read and write
1BA5DFBD000
heap
page read and write
1BA67BFE000
trusted library allocation
page read and write
1F0000
heap
page read and write
1BA6F0F9000
trusted library allocation
page read and write
1BA6688C000
trusted library allocation
page read and write
1BA723CE000
trusted library allocation
page read and write
1BA717A3000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
1BA70CC2000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
F6676AE000
unkown
page readonly
1BA72547000
heap
page read and write
1BA6F0B0000
trusted library allocation
page read and write
2A02E80A000
trusted library allocation
page read and write
1BA68AB4000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA5DFC1000
heap
page read and write
1BA69949000
trusted library allocation
page read and write
23B96462000
unclassified section
page read and write
1BA5E02B000
heap
page read and write
283561A0000
heap
page readonly
1BA7309E000
trusted library allocation
page read and write
1BA66D92000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
C8901BE000
stack
page read and write
1BA5DFB2000
heap
page read and write
1BA6688C000
trusted library allocation
page read and write
1BA70CC2000
trusted library allocation
page read and write
F6699FE000
unkown
page readonly
1BA64266000
trusted library allocation
page read and write
1BA66EA5000
trusted library allocation
page read and write
1BA6F614000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA6F7C7000
trusted library allocation
page read and write
1BA718AC000
trusted library allocation
page read and write
1BA5DFAF000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA70B26000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA5DFD8000
heap
page read and write
1BA6F7F3000
trusted library allocation
page read and write
1BA6A576000
trusted library allocation
page read and write
1BA6F853000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA683EE000
trusted library allocation
page read and write
1BA6426D000
trusted library allocation
page read and write
1BA67BCC000
trusted library allocation
page read and write
1BA641E8000
trusted library allocation
page read and write
28356FD9000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA6991A000
trusted library allocation
page read and write
1BA5DF91000
heap
page read and write
1BA70DFD000
trusted library allocation
page read and write
2A02E5E0000
heap
page read and write
1BA5DFB6000
heap
page read and write
1BA67425000
trusted library allocation
page read and write
23B962D0000
heap
page read and write
1BA66FAE000
trusted library allocation
page read and write
1A90BD8000
stack
page read and write
E6D65FF000
stack
page read and write
1BA642F6000
trusted library allocation
page read and write
1BA70C98000
trusted library allocation
page read and write
28356140000
heap
page read and write
28356F7A000
heap
page read and write
28357059000
heap
page read and write
1BA6BC02000
trusted library allocation
page read and write
2582AB07000
trusted library allocation
page read and write
1BA698C3000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA66E8C000
trusted library allocation
page read and write
1BA68C99000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA70CAD000
trusted library allocation
page read and write
1BA69399000
trusted library allocation
page read and write
1BA672FE000
trusted library allocation
page read and write
1BA699EB000
trusted library allocation
page read and write
1BA6689C000
trusted library allocation
page read and write
1BA72F4B000
trusted library allocation
page read and write
1BA72F2F000
trusted library allocation
page read and write
1BA63FC2000
trusted library allocation
page read and write
1BA674A1000
trusted library allocation
page read and write
1BA70CB2000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA70C46000
trusted library allocation
page read and write
1BA6F6EE000
trusted library allocation
page read and write
1BA6F6A7000
trusted library allocation
page read and write
1BA68CBF000
trusted library allocation
page read and write
1BA69748000
trusted library allocation
page read and write
1BA5DFB3000
heap
page read and write
1BA68852000
trusted library allocation
page read and write
1BA5DFCD000
heap
page read and write
1BA692BB000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA71558000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA698EA000
trusted library allocation
page read and write
1BA66E71000
trusted library allocation
page read and write
1BA6935C000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA630B0000
trusted library allocation
page read and write
1BA6F7FE000
trusted library allocation
page read and write
1BA70DA8000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
2582AB0A000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
2582A850000
heap
page read and write
1BA6685F000
trusted library allocation
page read and write
1BA70DCE000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA730F8000
trusted library allocation
page read and write
1BA68AF8000
trusted library allocation
page read and write
1BA678C3000
trusted library allocation
page read and write
1BA6A5CF000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA5DFA7000
heap
page read and write
1BA66ECE000
trusted library allocation
page read and write
1BA641FA000
trusted library allocation
page read and write
1BA67808000
trusted library allocation
page read and write
A38000
heap
page read and write
1BA5DF9E000
heap
page read and write
1BA6F850000
trusted library allocation
page read and write
1BA699A1000
trusted library allocation
page read and write
1BA70BC5000
trusted library allocation
page read and write
1BA678C3000
trusted library allocation
page read and write
894000
heap
page read and write
1BA674A1000
trusted library allocation
page read and write
1BA6426D000
trusted library allocation
page read and write
1BA6F08D000
trusted library allocation
page read and write
1BA5E01E000
heap
page read and write
1BA6F883000
trusted library allocation
page read and write
1BA69A82000
trusted library allocation
page read and write
2A02E5A0000
heap
page read and write
1BA699BF000
trusted library allocation
page read and write
1BA6F3D1000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA5DFAC000
heap
page read and write
28356A0D000
trusted library allocation
page read and write
1BA6F6B0000
trusted library allocation
page read and write
1BA6A9F3000
trusted library allocation
page read and write
1BA724C4000
trusted library allocation
page read and write
1BA642AE000
trusted library allocation
page read and write
1BA64248000
trusted library allocation
page read and write
23B96682000
trusted library allocation
page read and write
1BA70B28000
trusted library allocation
page read and write
1BA674CF000
trusted library allocation
page read and write
1BA67BA9000
trusted library allocation
page read and write
1BA684FE000
trusted library allocation
page read and write
1BA6F8FB000
trusted library allocation
page read and write
1BA6F34A000
trusted library allocation
page read and write
2B4612424000
trusted library allocation
page read and write
1BA6F6A7000
trusted library allocation
page read and write
1BA6F6AB000
trusted library allocation
page read and write
1BA6A93B000
trusted library allocation
page read and write
1BA683C7000
trusted library allocation
page read and write
1BA6F356000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
894000
heap
page read and write
2582A900000
trusted library allocation
page read and write
28356F6F000
heap
page read and write
1BA5DFB9000
heap
page read and write
1BA70CB7000
trusted library allocation
page read and write
1BA693DB000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA666BA000
trusted library allocation
page read and write
1BA6A6C7000
trusted library allocation
page read and write
1BA73090000
trusted library allocation
page read and write
1BA69215000
trusted library allocation
page read and write
1BA6976D000
trusted library allocation
page read and write
1BA5DFB3000
heap
page read and write
1BA724A5000
trusted library allocation
page read and write
1A935FE000
unkown
page readonly
1BA5DFB2000
heap
page read and write
1BA66FC3000
trusted library allocation
page read and write
1BA642A2000
trusted library allocation
page read and write
1BA730CE000
trusted library allocation
page read and write
1BA6749C000
trusted library allocation
page read and write
1BA7247A000
trusted library allocation
page read and write
1BA674C3000
trusted library allocation
page read and write
1BA683E2000
trusted library allocation
page read and write
1BA6F8B1000
trusted library allocation
page read and write
1BA73044000
trusted library allocation
page read and write
1BA72376000
trusted library allocation
page read and write
1BA5DFD7000
heap
page read and write
1BA66ECE000
trusted library allocation
page read and write
1BA6EEF6000
trusted library allocation
page read and write
1BA674FD000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA6784F000
trusted library allocation
page read and write
2C1469A04000
trusted library allocation
page read and write
1BA70BC3000
trusted library allocation
page read and write
1BA69955000
trusted library allocation
page read and write
1BA70D45000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA67270000
trusted library allocation
page read and write
1BA6F09F000
trusted library allocation
page read and write
1BA67448000
trusted library allocation
page read and write
1BA66D8D000
trusted library allocation
page read and write
1BA63082000
trusted library allocation
page read and write
1BA69767000
trusted library allocation
page read and write
1BA666E5000
trusted library allocation
page read and write
1BA66DB6000
trusted library allocation
page read and write
1BA70CC2000
trusted library allocation
page read and write
1C5B71D2000
unclassified section
page read and write
1BA5DFB7000
heap
page read and write
1BA5DFD9000
heap
page read and write
1BA6F86D000
trusted library allocation
page read and write
A70000
heap
page read and write
1BA5DFB4000
heap
page read and write
F66B9FE000
unkown
page readonly
1BA66E8E000
trusted library allocation
page read and write
1BA6F8ED000
trusted library allocation
page read and write
1C5B7323000
trusted library allocation
page read and write
23B966B1000
trusted library allocation
page read and write
1BA68C57000
trusted library allocation
page read and write
1BA672C4000
trusted library allocation
page read and write
1BA70DB6000
trusted library allocation
page read and write
1BA672E0000
trusted library allocation
page read and write
A70000
heap
page read and write
1BA5DFAE000
heap
page read and write
1BA71843000
trusted library allocation
page read and write
1BA6884E000
trusted library allocation
page read and write
1BA6A570000
trusted library allocation
page read and write
1BA70DAE000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA70BD7000
trusted library allocation
page read and write
1BA6F0A8000
trusted library allocation
page read and write
1BA70DCC000
trusted library allocation
page read and write
1BA6F6F7000
trusted library allocation
page read and write
1BA5DFC9000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA68C3A000
trusted library allocation
page read and write
1BA66F4E000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA5DFD4000
heap
page read and write
1BA6F34F000
trusted library allocation
page read and write
1BA630A3000
trusted library allocation
page read and write
1BA6F354000
trusted library allocation
page read and write
1BA6A5A4000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5E023000
heap
page read and write
1BA630B6000
trusted library allocation
page read and write
1BA6A4DF000
trusted library allocation
page read and write
1BA6F34A000
trusted library allocation
page read and write
1BA69AD8000
trusted library allocation
page read and write
1BA68AB6000
trusted library allocation
page read and write
1BA666F5000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA6F793000
trusted library allocation
page read and write
1BA5DFD6000
heap
page read and write
1BA6787C000
trusted library allocation
page read and write
1BA6722A000
trusted library allocation
page read and write
23B9644B000
heap
page read and write
C88E8FE000
stack
page read and write
1BA718C5000
trusted library allocation
page read and write
1BA70DC2000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA68309000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA6934F000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
1BA5DFC9000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA6F0DE000
trusted library allocation
page read and write
1BA674B0000
trusted library allocation
page read and write
1BA70CC7000
trusted library allocation
page read and write
CB8B3FE000
stack
page read and write
1BA6F8C0000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA70B9D000
trusted library allocation
page read and write
1BA69AC5000
trusted library allocation
page read and write
1BA66F37000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA5E004000
heap
page read and write
1BA697A1000
trusted library allocation
page read and write
1BA6F699000
trusted library allocation
page read and write
1BA6661A000
trusted library allocation
page read and write
1BA66E8E000
trusted library allocation
page read and write
1BA70CE0000
trusted library allocation
page read and write
1BA70BC5000
trusted library allocation
page read and write
1BA6F7DF000
trusted library allocation
page read and write
1BA70CE9000
trusted library allocation
page read and write
1BA6749E000
trusted library allocation
page read and write
1BA66FE0000
trusted library allocation
page read and write
1BA684E7000
trusted library allocation
page read and write
23B962D3000
heap
page read and write
1BA6F871000
trusted library allocation
page read and write
1BA5DFBE000
heap
page read and write
1BA6F0FD000
trusted library allocation
page read and write
1BA6688C000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA699F7000
trusted library allocation
page read and write
1BA724C4000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1C5B73C9000
trusted library allocation
page read and write
1BA70D9A000
trusted library allocation
page read and write
1BA6F242000
trusted library allocation
page read and write
1BA6A9EC000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA6F6FB000
trusted library allocation
page read and write
1BA6784B000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA666E0000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA70DF4000
trusted library allocation
page read and write
1BA688D0000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA70BD7000
trusted library allocation
page read and write
1BA6F354000
trusted library allocation
page read and write
1BA698BD000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA67823000
trusted library allocation
page read and write
1BA642F6000
trusted library allocation
page read and write
28356F50000
heap
page read and write
1BA6F157000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA674B2000
trusted library allocation
page read and write
1BA70D0A000
trusted library allocation
page read and write
1BA73096000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA66B78000
heap
page read and write
1BA6A9CB000
trusted library allocation
page read and write
1BA5DFA9000
heap
page read and write
1BA5E01B000
heap
page read and write
1BA5DFB1000
heap
page read and write
1BA5DF95000
heap
page read and write
1BA7293B000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
1BA66FA3000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA70AAC000
trusted library allocation
page read and write
1BA70C54000
trusted library allocation
page read and write
1BA70DE5000
trusted library allocation
page read and write
1BA6940E000
trusted library allocation
page read and write
1BA66D7B000
trusted library allocation
page read and write
1BA6F7E9000
trusted library allocation
page read and write
1BA70B44000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA6A5BA000
trusted library allocation
page read and write
1BA68304000
trusted library allocation
page read and write
1BA6F09C000
trusted library allocation
page read and write
1BA69743000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
894000
heap
page read and write
1BA63F42000
trusted library allocation
page read and write
1BA72B4E000
trusted library allocation
page read and write
1BA5E01A000
heap
page read and write
1BA6A5A4000
trusted library allocation
page read and write
1BA68459000
trusted library allocation
page read and write
1BA66FD2000
trusted library allocation
page read and write
1C5B73A7000
trusted library allocation
page read and write
1BA66858000
trusted library allocation
page read and write
1BA5DFB3000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA6F242000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA63FF7000
trusted library allocation
page read and write
23B96800000
trusted library allocation
page read and write
1BA5DFA9000
heap
page read and write
1BA69AF7000
trusted library allocation
page read and write
137E000
stack
page read and write
1BA5DFA8000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA666CA000
trusted library allocation
page read and write
1BA73017000
trusted library allocation
page read and write
1BA67BC5000
trusted library allocation
page read and write
1BA6F098000
trusted library allocation
page read and write
1BA6885D000
trusted library allocation
page read and write
A48000
heap
page read and write
1BA72495000
trusted library allocation
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA66B10000
heap
page read and write
1BA66D81000
trusted library allocation
page read and write
1BA6F3AF000
trusted library allocation
page read and write
1BA6F841000
trusted library allocation
page read and write
23B96269000
remote allocation
page execute read
1BA5DFBD000
heap
page read and write
1BA70BEB000
trusted library allocation
page read and write
1BA63FD3000
trusted library allocation
page read and write
1BA674C1000
trusted library allocation
page read and write
1BA6F14E000
trusted library allocation
page read and write
1C5B750C000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA730DC000
trusted library allocation
page read and write
1BA5DFD7000
heap
page read and write
1BA6929E000
trusted library allocation
page read and write
1BA63F99000
trusted library allocation
page read and write
1BA697A2000
trusted library allocation
page read and write
1BA5DFD6000
heap
page read and write
1BA72600000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
2835701A000
heap
page read and write
1BA6F850000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA68CE1000
trusted library allocation
page read and write
1BA71848000
trusted library allocation
page read and write
1BA6688F000
trusted library allocation
page read and write
1BA674CF000
trusted library allocation
page read and write
1BA6A8FD000
trusted library allocation
page read and write
1BA70B39000
trusted library allocation
page read and write
1BA6F3AC000
trusted library allocation
page read and write
1BA68AEC000
trusted library allocation
page read and write
1BA6F7F7000
trusted library allocation
page read and write
1BA68459000
trusted library allocation
page read and write
1BA6A5C7000
trusted library allocation
page read and write
1BA5DFA0000
heap
page read and write
1C5B7347000
trusted library allocation
page read and write
1BA67886000
trusted library allocation
page read and write
1BA63F95000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA6F87F000
trusted library allocation
page read and write
1BA63F2D000
trusted library allocation
page read and write
1BA678B2000
trusted library allocation
page read and write
1BA6F1BF000
trusted library allocation
page read and write
1BA71807000
trusted library allocation
page read and write
1BA6A576000
trusted library allocation
page read and write
1BA67468000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
23B96663000
trusted library allocation
page read and write
1BA66F3B000
trusted library allocation
page read and write
1BA67863000
trusted library allocation
page read and write
1BA684E4000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA6F351000
trusted library allocation
page read and write
1BA6F2C0000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA66F47000
trusted library allocation
page read and write
1BA69748000
trusted library allocation
page read and write
1BA67BC0000
trusted library allocation
page read and write
1BA5DFAF000
heap
page read and write
1BA6A935000
trusted library allocation
page read and write
1BA6A5D4000
trusted library allocation
page read and write
1BA66E40000
trusted library allocation
page read and write
1BA672F6000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA674B2000
trusted library allocation
page read and write
1BA699EB000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA70DC6000
trusted library allocation
page read and write
1BA70DDD000
trusted library allocation
page read and write
1BA6F1F6000
trusted library allocation
page read and write
23B96649000
trusted library allocation
page read and write
1BA6F857000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA6B12F000
trusted library allocation
page read and write
1BA71848000
trusted library allocation
page read and write
1BA72BF1000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA6F8B1000
trusted library allocation
page read and write
1BA666C8000
trusted library allocation
page read and write
1BA69743000
trusted library allocation
page read and write
1BA699AB000
trusted library allocation
page read and write
2A02E700000
trusted library allocation
page read and write
2A03014E000
heap
page read and write
1BA5DFA8000
heap
page read and write
1C5B7200000
trusted library allocation
page read and write
23B966B5000
trusted library allocation
page read and write
1BA6A9D5000
trusted library allocation
page read and write
1BA66661000
trusted library allocation
page read and write
2835632F000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
9EFD2D04000
trusted library allocation
page read and write
1BA62FFE000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA70B59000
trusted library allocation
page read and write
1BA641F8000
trusted library allocation
page read and write
1BA678A6000
trusted library allocation
page read and write
1BA674C3000
trusted library allocation
page read and write
1BA5E027000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA63026000
trusted library allocation
page read and write
1BA672BF000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA68402000
trusted library allocation
page read and write
1BA6F392000
trusted library allocation
page read and write
1BA5DFA6000
heap
page read and write
1BA5DFA1000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA6F790000
trusted library allocation
page read and write
1BA674C3000
trusted library allocation
page read and write
1BA6F0ED000
trusted library allocation
page read and write
1BA70B58000
trusted library allocation
page read and write
1BA6F6EA000
trusted library allocation
page read and write
1BA70C73000
trusted library allocation
page read and write
1BA6F79B000
trusted library allocation
page read and write
1BA66F92000
trusted library allocation
page read and write
1BA70CE9000
trusted library allocation
page read and write
E6D5DFC000
stack
page read and write
1BA5DFB3000
heap
page read and write
1BA70CB7000
trusted library allocation
page read and write
1BA6F718000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA6783C000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA730F8000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA6F855000
trusted library allocation
page read and write
1BA683C1000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
1BA6747A000
trusted library allocation
page read and write
1BA6F7B6000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA724EF000
trusted library allocation
page read and write
1BA674C3000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA67436000
trusted library allocation
page read and write
28356FD9000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA730D3000
trusted library allocation
page read and write
1BA6F1BC000
trusted library allocation
page read and write
1BA6F699000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
83D000
stack
page read and write
1BA6EFD4000
trusted library allocation
page read and write
1BA5DFD6000
heap
page read and write
1BA5DFA1000
heap
page read and write
1BA5DFD2000
heap
page read and write
1BA66E8E000
trusted library allocation
page read and write
1BA66D6D000
trusted library allocation
page read and write
1BA683E0000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA6F2C0000
trusted library allocation
page read and write
1C5B73B7000
trusted library allocation
page read and write
1BA672DB000
trusted library allocation
page read and write
1BA6A5C1000
trusted library allocation
page read and write
1BA5DFC4000
heap
page read and write
1BA730D9000
trusted library allocation
page read and write
1BA6999B000
trusted library allocation
page read and write
28357059000
heap
page read and write
1BA70CD0000
trusted library allocation
page read and write
23B966D7000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA70DC2000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA7255B000
heap
page read and write
1BA5DFAE000
heap
page read and write
1BA5E023000
heap
page read and write
1BA73070000
trusted library allocation
page read and write
1C5B7010000
heap
page read and write
1BA6F823000
trusted library allocation
page read and write
1BA70AAC000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA64178000
trusted library allocation
page read and write
1BA6981B000
trusted library allocation
page read and write
1BA70DE3000
trusted library allocation
page read and write
1BA694CE000
trusted library allocation
page read and write
1BA68A90000
trusted library allocation
page read and write
1BA66FD6000
trusted library allocation
page read and write
1BA728A8000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA67217000
trusted library allocation
page read and write
1BA6F8D7000
trusted library allocation
page read and write
1BA699D9000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA6F8D4000
trusted library allocation
page read and write
1BA678BC000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA698BB000
trusted library allocation
page read and write
2A02E5D0000
heap
page read and write
1BA5DF9E000
heap
page read and write
28357048000
heap
page read and write
1BA70CF1000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
C88E93E000
unkown
page readonly
1BA678BA000
trusted library allocation
page read and write
C8909BE000
unkown
page readonly
1BA69AFD000
trusted library allocation
page read and write
C88CFD8000
stack
page read and write
1BA684C7000
trusted library allocation
page read and write
1BA672B6000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA70CC7000
trusted library allocation
page read and write
1BA5DFD4000
heap
page read and write
1BA698BF000
trusted library allocation
page read and write
1BA6F1FC000
trusted library allocation
page read and write
1BA69348000
trusted library allocation
page read and write
1BA66F3D000
trusted library allocation
page read and write
2A02E601000
heap
page read and write
1BA70C9E000
trusted library allocation
page read and write
1BA690BE000
trusted library allocation
page read and write
1BA66D42000
trusted library allocation
page read and write
1BA70BE1000
trusted library allocation
page read and write
1BA68C45000
trusted library allocation
page read and write
1BA66E6A000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA72377000
trusted library allocation
page read and write
1BA72501000
heap
page read and write
1BA67858000
trusted library allocation
page read and write
1C5B7312000
trusted library allocation
page read and write
1BA6F8CD000
trusted library allocation
page read and write
1BA70D4F000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5DFC1000
heap
page read and write
1BA67BA5000
trusted library allocation
page read and write
1BA70C51000
trusted library allocation
page read and write
1BA68AF5000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA72FF9000
trusted library allocation
page read and write
1BA6F8FB000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA67899000
trusted library allocation
page read and write
1BA5DFD8000
heap
page read and write
1BA6F3B1000
trusted library allocation
page read and write
1BA67425000
trusted library allocation
page read and write
1BA6F8FB000
trusted library allocation
page read and write
1BA64136000
trusted library allocation
page read and write
1BA69387000
trusted library allocation
page read and write
1BA730DC000
trusted library allocation
page read and write
F64000
unkown
page readonly
1BA66FE2000
trusted library allocation
page read and write
1BA6F654000
trusted library allocation
page read and write
1BA678AC000
trusted library allocation
page read and write
1BA67851000
trusted library allocation
page read and write
1BA66E9E000
trusted library allocation
page read and write
1BA6840F000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
A52000
heap
page read and write
1BA6749C000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA67BF9000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA66FC9000
trusted library allocation
page read and write
1BA5E01E000
heap
page read and write
28356F4C000
heap
page read and write
1C5B7190000
heap
page read and write
1BA70B6B000
trusted library allocation
page read and write
1BA6A97C000
trusted library allocation
page read and write
1BA64269000
trusted library allocation
page read and write
1BA6F1BD000
trusted library allocation
page read and write
1BA5DF87000
heap
page read and write
1BA6EF59000
trusted library allocation
page read and write
1BA70CC2000
trusted library allocation
page read and write
1BA70B4D000
trusted library allocation
page read and write
1BA66E78000
trusted library allocation
page read and write
1BA6F1BF000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA5E004000
heap
page read and write
28356000000
heap
page read and write
1BA66FD2000
trusted library allocation
page read and write
1BA684CE000
trusted library allocation
page read and write
1BA5DFCD000
heap
page read and write
2835639E000
trusted library allocation
page read and write
1BA6F84C000
trusted library allocation
page read and write
1BA6F871000
trusted library allocation
page read and write
1BA66D6D000
trusted library allocation
page read and write
1BA66D73000
trusted library allocation
page read and write
1BA70CE0000
trusted library allocation
page read and write
1BA5DFAF000
heap
page read and write
1BA7249D000
trusted library allocation
page read and write
28356F7D000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA6F71E000
trusted library allocation
page read and write
1BA69938000
trusted library allocation
page read and write
1BA6A4DC000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA70C51000
trusted library allocation
page read and write
1BA6F7E9000
trusted library allocation
page read and write
1BA6F8D2000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1C5B6F70000
unclassified section
page readonly
1BA67279000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA5DFD3000
heap
page read and write
1BA5E004000
heap
page read and write
1BA5DFCD000
heap
page read and write
1A9567E000
unkown
page readonly
28356FE1000
heap
page read and write
1BA6723D000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
1BA64178000
trusted library allocation
page read and write
1BA68A5B000
trusted library allocation
page read and write
1BA6F356000
trusted library allocation
page read and write
1BA5DFC8000
heap
page read and write
23B963F4000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFB7000
heap
page read and write
1BA6978F000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA63075000
trusted library allocation
page read and write
1BA70AC3000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA6F8ED000
trusted library allocation
page read and write
1BA6F621000
trusted library allocation
page read and write
1BA6F853000
trusted library allocation
page read and write
2A02E5EC000
heap
page read and write
1BA5DFC1000
heap
page read and write
1BA6F7DB000
trusted library allocation
page read and write
F66B1FE000
stack
page read and write
1BA5DFA4000
heap
page read and write
1BA68C82000
trusted library allocation
page read and write
1BA684EB000
trusted library allocation
page read and write
1BA68405000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA70DA4000
trusted library allocation
page read and write
1BA66D92000
trusted library allocation
page read and write
1BA674EC000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA6A5CF000
trusted library allocation
page read and write
1BA672B9000
trusted library allocation
page read and write
1BA6F7F3000
trusted library allocation
page read and write
1BA6F12E000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA69996000
trusted library allocation
page read and write
1BA6F86B000
trusted library allocation
page read and write
1BA688CA000
trusted library allocation
page read and write
894000
heap
page read and write
1BA66B86000
heap
page read and write
1BA642F6000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
1BA5E02B000
heap
page read and write
1BA5DFC4000
heap
page read and write
1BA6F614000
trusted library allocation
page read and write
1BA6F8E6000
trusted library allocation
page read and write
1BA6F8E6000
trusted library allocation
page read and write
1BA629BF000
trusted library allocation
page read and write
1BA5DFD4000
heap
page read and write
1BA70DA8000
trusted library allocation
page read and write
1BA68480000
trusted library allocation
page read and write
1BA66B1A000
heap
page read and write
1BA6F236000
trusted library allocation
page read and write
1BA68C9C000
trusted library allocation
page read and write
1BA5DFB3000
heap
page read and write
1BA66F81000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA70DE0000
trusted library allocation
page read and write
1BA684F1000
trusted library allocation
page read and write
1BA71901000
trusted library allocation
page read and write
23B9646F000
unclassified section
page read and write
1BA70BB3000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
283563C4000
trusted library allocation
page read and write
1BA692A6000
trusted library allocation
page read and write
1BA6F11C000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA6F762000
trusted library allocation
page read and write
1C5B6FD0000
remote allocation
page read and write
1BA5DFB8000
heap
page read and write
1BA5DFB3000
heap
page read and write
1BA672C6000
trusted library allocation
page read and write
1BA68474000
trusted library allocation
page read and write
1BA66D4E000
trusted library allocation
page read and write
1BA7192C000
trusted library allocation
page read and write
1BA6662B000
trusted library allocation
page read and write
1BA68CF6000
trusted library allocation
page read and write
1BA66D87000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA6F7EF000
trusted library allocation
page read and write
1BA683B3000
trusted library allocation
page read and write
1BA688B3000
trusted library allocation
page read and write
1BA66FCE000
trusted library allocation
page read and write
894000
heap
page read and write
1BA68CCC000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA67467000
trusted library allocation
page read and write
1BA5DFC1000
heap
page read and write
28356F7A000
heap
page read and write
1BA5E01D000
heap
page read and write
1BA5DFA2000
heap
page read and write
28356F50000
heap
page read and write
1BA66660000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA641E8000
trusted library allocation
page read and write
1BA67B2D000
trusted library allocation
page read and write
1BA66ECE000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA70C59000
trusted library allocation
page read and write
23B96611000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA724D4000
trusted library allocation
page read and write
1BA6A9F7000
trusted library allocation
page read and write
1BA69A35000
trusted library allocation
page read and write
1BA70B63000
trusted library allocation
page read and write
1BA678A6000
trusted library allocation
page read and write
1BA6F7C3000
trusted library allocation
page read and write
1BA6F795000
trusted library allocation
page read and write
1BA694EE000
trusted library allocation
page read and write
1BA66FAA000
trusted library allocation
page read and write
28356110000
heap
page read and write
1BA72392000
trusted library allocation
page read and write
33D0000
heap
page read and write
1BA67494000
trusted library allocation
page read and write
1BA684C2000
trusted library allocation
page read and write
1BA63FDA000
trusted library allocation
page read and write
1BA697F2000
trusted library allocation
page read and write
1BA6EFB1000
trusted library allocation
page read and write
1BA66B10000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA6F2BE000
trusted library allocation
page read and write
1BA729CB000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
F5C000
unkown
page read and write
1BA6F08E000
trusted library allocation
page read and write
1BA70DC2000
trusted library allocation
page read and write
1BA5DFC4000
heap
page read and write
1BA66E86000
trusted library allocation
page read and write
1BA5DFA9000
heap
page read and write
1BA5DFAC000
heap
page read and write
28357048000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA678AC000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA66D73000
trusted library allocation
page read and write
1BA6F0F8000
trusted library allocation
page read and write
28356F54000
heap
page read and write
1BA72315000
trusted library allocation
page read and write
1BA68322000
trusted library allocation
page read and write
1BA70C8D000
trusted library allocation
page read and write
1BA674FA000
trusted library allocation
page read and write
283563BC000
trusted library allocation
page read and write
1BA678CB000
trusted library allocation
page read and write
1BA666C6000
trusted library allocation
page read and write
1BA5E024000
heap
page read and write
1BA67B60000
trusted library allocation
page read and write
1BA66F78000
trusted library allocation
page read and write
1BA67448000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA70AA8000
trusted library allocation
page read and write
1BA6426D000
trusted library allocation
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA7246C000
trusted library allocation
page read and write
1BA70CC2000
trusted library allocation
page read and write
1BA6F0E7000
trusted library allocation
page read and write
1BA70CAF000
trusted library allocation
page read and write
28356FE1000
heap
page read and write
28356A00000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA730C6000
trusted library allocation
page read and write
1BA70BDF000
trusted library allocation
page read and write
1BA67448000
trusted library allocation
page read and write
1BA6F8E8000
trusted library allocation
page read and write
1BA67BF4000
trusted library allocation
page read and write
1BA6F1E0000
trusted library allocation
page read and write
1BA66D70000
trusted library allocation
page read and write
1BA67448000
trusted library allocation
page read and write
1BA73070000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA6725A000
trusted library allocation
page read and write
1BA68AAA000
trusted library allocation
page read and write
1BA67886000
trusted library allocation
page read and write
1BA678BC000
trusted library allocation
page read and write
1BA678BA000
trusted library allocation
page read and write
1BA6999B000
trusted library allocation
page read and write
1BA70AF3000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA66D7B000
trusted library allocation
page read and write
1C5B737D000
trusted library allocation
page read and write
1BA699C8000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA6F3B8000
trusted library allocation
page read and write
1A93E7E000
stack
page read and write
1BA70C4F000
trusted library allocation
page read and write
1BA6787C000
trusted library allocation
page read and write
1BA6741F000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA70E00000
trusted library allocation
page read and write
23B9670B000
heap
page read and write
1BA5DFD2000
heap
page read and write
2A02E960000
heap
page read and write
1BA674BA000
trusted library allocation
page read and write
1BA70CE0000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA683E5000
trusted library allocation
page read and write
1BA6F2B9000
trusted library allocation
page read and write
1BA70B0D000
trusted library allocation
page read and write
1BA6F8EB000
trusted library allocation
page read and write
1BA68C1F000
trusted library allocation
page read and write
1BA72FC7000
trusted library allocation
page read and write
28356FE1000
heap
page read and write
1BA6F7F9000
trusted library allocation
page read and write
1BA6F0ED000
trusted library allocation
page read and write
28356F50000
heap
page read and write
1BA6991C000
trusted library allocation
page read and write
28357012000
heap
page read and write
1BA5E022000
heap
page read and write
1BA6749C000
trusted library allocation
page read and write
1BA70C9E000
trusted library allocation
page read and write
1BA6F3C3000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
283569CF000
unkown
page execute read
1BA66863000
trusted library allocation
page read and write
1BA5DF84000
heap
page read and write
1BA683B9000
trusted library allocation
page read and write
1BA6688F000
trusted library allocation
page read and write
1BA70BE1000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA6F00F000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA70CB2000
trusted library allocation
page read and write
1BA674C1000
trusted library allocation
page read and write
1BA63F99000
trusted library allocation
page read and write
1BA66D73000
trusted library allocation
page read and write
1BA70CBC000
trusted library allocation
page read and write
1BA6F7DF000
trusted library allocation
page read and write
1BA6F7E8000
trusted library allocation
page read and write
1BA6F6F7000
trusted library allocation
page read and write
1BA70CC6000
trusted library allocation
page read and write
1BA666DC000
trusted library allocation
page read and write
87E000
stack
page read and write
1BA66F3B000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA684F7000
trusted library allocation
page read and write
1BA6A9D3000
trusted library allocation
page read and write
1BA70AAC000
trusted library allocation
page read and write
1BA66E76000
trusted library allocation
page read and write
1BA6749E000
trusted library allocation
page read and write
1BA674A7000
trusted library allocation
page read and write
1BA70AC6000
trusted library allocation
page read and write
1BA66D81000
trusted library allocation
page read and write
1BA6F8E8000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA5DFBF000
heap
page read and write
1BA5E023000
heap
page read and write
1BA6F75F000
trusted library allocation
page read and write
1BA694B8000
trusted library allocation
page read and write
23B96700000
heap
page read and write
1BA5DF95000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA66D9D000
trusted library allocation
page read and write
1BA674B2000
trusted library allocation
page read and write
1BA6F098000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA6309A000
trusted library allocation
page read and write
1BA69766000
trusted library allocation
page read and write
1BA5DFD4000
heap
page read and write
1BA5E01D000
heap
page read and write
1BA72FDA000
trusted library allocation
page read and write
1BA5DFC5000
heap
page read and write
1BA5DFB9000
heap
page read and write
1BA70AF0000
trusted library allocation
page read and write
1BA6787C000
trusted library allocation
page read and write
1BA70ABD000
trusted library allocation
page read and write
F5C000
unkown
page write copy
7BE000
stack
page read and write
C88F1BE000
stack
page read and write
1BA6840A000
trusted library allocation
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA684E4000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5E004000
heap
page read and write
1BA6F111000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
28356EF9000
heap
page read and write
F6681D8000
stack
page read and write
1BA6F0E2000
trusted library allocation
page read and write
1BA70DD7000
trusted library allocation
page read and write
1BA6426B000
trusted library allocation
page read and write
1BA5DFD4000
heap
page read and write
1BA723D4000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA6785B000
trusted library allocation
page read and write
1BA66FFC000
trusted library allocation
page read and write
2A02E5F1000
heap
page read and write
1BA6F6A5000
trusted library allocation
page read and write
1BA698BD000
trusted library allocation
page read and write
1BA724A9000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA5DFD2000
heap
page read and write
1BA70DBA000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA70AA3000
trusted library allocation
page read and write
1BA688DE000
trusted library allocation
page read and write
7CE000
stack
page read and write
1BA70CA4000
trusted library allocation
page read and write
1BA672FE000
trusted library allocation
page read and write
1BA66D49000
trusted library allocation
page read and write
E90000
unkown
page readonly
1BA5DFFA000
heap
page read and write
1BA5E026000
heap
page read and write
1BA6745C000
trusted library allocation
page read and write
1BA67430000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5DFCD000
heap
page read and write
1BA684D6000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA6F1E7000
trusted library allocation
page read and write
1BA66E79000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA5DFC1000
heap
page read and write
1BA70B3C000
trusted library allocation
page read and write
1BA70D83000
trusted library allocation
page read and write
1BA6F865000
trusted library allocation
page read and write
1BA66E55000
trusted library allocation
page read and write
1BA67846000
trusted library allocation
page read and write
1BA5E024000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA69A9A000
trusted library allocation
page read and write
1BA6F862000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA70CBA000
trusted library allocation
page read and write
1BA7180C000
trusted library allocation
page read and write
1BA672D8000
trusted library allocation
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA67852000
trusted library allocation
page read and write
1BA5E027000
heap
page read and write
1BA70BA8000
trusted library allocation
page read and write
1BA6F2BA000
trusted library allocation
page read and write
2835630C000
trusted library allocation
page read and write
1BA70DB6000
trusted library allocation
page read and write
1BA692F5000
trusted library allocation
page read and write
1BA71805000
trusted library allocation
page read and write
1BA70DB1000
trusted library allocation
page read and write
1BA684F1000
trusted library allocation
page read and write
1BA730DC000
trusted library allocation
page read and write
1BA5DFC6000
heap
page read and write
1BA6A547000
trusted library allocation
page read and write
1BA70C62000
trusted library allocation
page read and write
7DB000
stack
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA641E4000
trusted library allocation
page read and write
1BA70ABD000
trusted library allocation
page read and write
1BA6F8F7000
trusted library allocation
page read and write
1BA66D8D000
trusted library allocation
page read and write
23B966F4000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA666D9000
trusted library allocation
page read and write
1BA6B16D000
trusted library allocation
page read and write
1BA70B25000
trusted library allocation
page read and write
1BA5DFD5000
heap
page read and write
1BA684E2000
trusted library allocation
page read and write
1BA6F3AF000
trusted library allocation
page read and write
1BA683E0000
trusted library allocation
page read and write
1BA66ECE000
trusted library allocation
page read and write
1C5B7496000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA68B9B000
trusted library allocation
page read and write
1BA68886000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA70AC6000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
23B96490000
unclassified section
page readonly
1BA66F58000
trusted library allocation
page read and write
1BA72571000
heap
page read and write
28356FEC000
heap
page read and write
1BA5E022000
heap
page read and write
1BA5DFBF000
heap
page read and write
1BA683E5000
trusted library allocation
page read and write
1BA70B9F000
trusted library allocation
page read and write
1BA674EC000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA66E3B000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA6846F000
trusted library allocation
page read and write
1A92D7E000
stack
page read and write
1BA70DA7000
trusted library allocation
page read and write
1BA5DFC0000
heap
page read and write
1BA6A9CF000
trusted library allocation
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA684D2000
trusted library allocation
page read and write
1BA66DB6000
trusted library allocation
page read and write
1BA69724000
trusted library allocation
page read and write
1BA7248D000
trusted library allocation
page read and write
1BA66E7C000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
A70000
heap
page read and write
1BA66FC8000
trusted library allocation
page read and write
1BA70DDD000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFBF000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA684F7000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA5DFC1000
heap
page read and write
1BA6F134000
trusted library allocation
page read and write
1BA66D81000
trusted library allocation
page read and write
1BA5DFD6000
heap
page read and write
1BA6669B000
trusted library allocation
page read and write
1BA67BC3000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
23B96677000
trusted library allocation
page read and write
23B96669000
trusted library allocation
page read and write
1C5B6FE5000
remote allocation
page execute read
1BA5DFD6000
heap
page read and write
1BA6979F000
trusted library allocation
page read and write
1BA5DF9E000
heap
page read and write
1BA66D7F000
trusted library allocation
page read and write
1BA6A52E000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA698B9000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA66E1F000
trusted library allocation
page read and write
1BA6B28A000
trusted library allocation
page read and write
1BA6832E000
trusted library allocation
page read and write
1BA6F7FB000
trusted library allocation
page read and write
1BA5E022000
heap
page read and write
1BA5DFDA000
heap
page read and write
2582A729000
heap
page read and write
1BA6F7B6000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA694BF000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA5DF9E000
heap
page read and write
1BA674EC000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
28356EF0000
heap
page read and write
1BA699E4000
trusted library allocation
page read and write
1BA7186D000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA683C7000
trusted library allocation
page read and write
1BA641EF000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA66628000
trusted library allocation
page read and write
1BA672C2000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA6A97E000
trusted library allocation
page read and write
1BA63F99000
trusted library allocation
page read and write
1BA5E024000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA7248D000
trusted library allocation
page read and write
2A02E580000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA6A9D5000
trusted library allocation
page read and write
1BA688B0000
trusted library allocation
page read and write
1BA6F3A4000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA698BD000
trusted library allocation
page read and write
1BA6EF8C000
trusted library allocation
page read and write
1BA698C1000
trusted library allocation
page read and write
1BA684C7000
trusted library allocation
page read and write
1BA70D8E000
trusted library allocation
page read and write
1BA69A8A000
trusted library allocation
page read and write
1C5B7030000
heap
page read and write
1BA69724000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA684C0000
trusted library allocation
page read and write
1BA693B9000
trusted library allocation
page read and write
1BA64142000
trusted library allocation
page read and write
1BA6922A000
trusted library allocation
page read and write
1C5B7400000
unclassified section
page readonly
1BA5DFB3000
heap
page read and write
1BA70B36000
trusted library allocation
page read and write
1BA630CF000
trusted library allocation
page read and write
1BA6A6F6000
trusted library allocation
page read and write
1BA641E4000
trusted library allocation
page read and write
1BA7309C000
trusted library allocation
page read and write
1BA62FF6000
trusted library allocation
page read and write
1BA68A61000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
28356F5C000
heap
page read and write
1C5B7512000
trusted library allocation
page read and write
1BA70B9F000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFD6000
heap
page read and write
1BA678B8000
trusted library allocation
page read and write
1BA71886000
trusted library allocation
page read and write
1BA6F6BE000
trusted library allocation
page read and write
1BA70C8B000
trusted library allocation
page read and write
1BA66F87000
trusted library allocation
page read and write
1BA66EA5000
trusted library allocation
page read and write
1C5B7381000
trusted library allocation
page read and write
1BA6AB50000
trusted library allocation
page read and write
1A9243D000
stack
page read and write
1BA6F8A5000
trusted library allocation
page read and write
1BA6A9CD000
trusted library allocation
page read and write
1BA718E4000
trusted library allocation
page read and write
1BA5DFD4000
heap
page read and write
1BA63F7E000
trusted library allocation
page read and write
1BA6EF00000
trusted library allocation
page read and write
1BA674B4000
trusted library allocation
page read and write
1BA5DFA5000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA5DFBE000
heap
page read and write
1BA70B63000
trusted library allocation
page read and write
1BA70DB2000
trusted library allocation
page read and write
1BA70DEC000
trusted library allocation
page read and write
1BA6B19E000
trusted library allocation
page read and write
1BA683D1000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA6F13D000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFAE000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA68474000
trusted library allocation
page read and write
1BA70B7D000
trusted library allocation
page read and write
1BA70B58000
trusted library allocation
page read and write
1BA718A3000
trusted library allocation
page read and write
1BA70BA8000
trusted library allocation
page read and write
1BA6F147000
trusted library allocation
page read and write
1BA630CF000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA70BC3000
trusted library allocation
page read and write
1BA674FA000
trusted library allocation
page read and write
1BA72FF1000
trusted library allocation
page read and write
1BA730EA000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA66D20000
trusted library allocation
page read and write
1BA7184D000
trusted library allocation
page read and write
1BA66F3D000
trusted library allocation
page read and write
1BA6F7A1000
trusted library allocation
page read and write
1BA683F7000
trusted library allocation
page read and write
1BA6785B000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA6F198000
trusted library allocation
page read and write
1BA66B10000
heap
page read and write
1BA5DFB7000
heap
page read and write
1BA730E5000
trusted library allocation
page read and write
1BA70BA8000
trusted library allocation
page read and write
1BA63F2D000
trusted library allocation
page read and write
28357034000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA6A6D0000
trusted library allocation
page read and write
1BA5DF95000
heap
page read and write
1BA66E6C000
trusted library allocation
page read and write
1BA6787C000
trusted library allocation
page read and write
1BA6A5E7000
trusted library allocation
page read and write
1BA630AA000
trusted library allocation
page read and write
1BA6F0AD000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA66FFC000
trusted library allocation
page read and write
1BA641E4000
trusted library allocation
page read and write
1BA70BEB000
trusted library allocation
page read and write
1BA6A558000
trusted library allocation
page read and write
1BA62F76000
trusted library allocation
page read and write
1BA6749E000
trusted library allocation
page read and write
1BA5E022000
heap
page read and write
1BA5DFB9000
heap
page read and write
1BA72F73000
trusted library allocation
page read and write
1BA6F367000
trusted library allocation
page read and write
28356F59000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA5E01B000
heap
page read and write
28356F4C000
heap
page read and write
1BA642DC000
trusted library allocation
page read and write
283563BE000
trusted library allocation
page read and write
23B962B0000
heap
page read and write
1BA7293B000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA684F1000
trusted library allocation
page read and write
1BA68B26000
trusted library allocation
page read and write
28355FE0000
unclassified section
page readonly
1BA672F0000
trusted library allocation
page read and write
1BA70D54000
trusted library allocation
page read and write
1BA6F6A7000
trusted library allocation
page read and write
1BA6F83C000
trusted library allocation
page read and write
1BA70DFD000
trusted library allocation
page read and write
1BA70DE0000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA66FC5000
trusted library allocation
page read and write
1BA6EFD6000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA5DFD2000
heap
page read and write
F66776E000
stack
page read and write
1BA6F8CD000
trusted library allocation
page read and write
1BA72501000
heap
page read and write
1BA6A9F3000
trusted library allocation
page read and write
1BA70AF0000
trusted library allocation
page read and write
1BA66F54000
trusted library allocation
page read and write
1BA7192E000
trusted library allocation
page read and write
1BA5DFA0000
heap
page read and write
28356F50000
heap
page read and write
1BA684FE000
trusted library allocation
page read and write
1BA70B77000
trusted library allocation
page read and write
1BA66D9A000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA6A5EF000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA73030000
trusted library allocation
page read and write
1BA5DFC9000
heap
page read and write
1BA6F0C5000
trusted library allocation
page read and write
A64000
heap
page read and write
1BA5DFB7000
heap
page read and write
1BA66F3D000
trusted library allocation
page read and write
1BA68AAF000
trusted library allocation
page read and write
1BA6784A000
trusted library allocation
page read and write
1BA70C73000
trusted library allocation
page read and write
1BA66D7B000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA6F7E5000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA694A9000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA6F076000
trusted library allocation
page read and write
1BA6F3DB000
trusted library allocation
page read and write
1BA66DD2000
trusted library allocation
page read and write
1BA6667A000
trusted library allocation
page read and write
1C5B7303000
trusted library allocation
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA630E4000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA6A5F7000
trusted library allocation
page read and write
1BA67867000
trusted library allocation
page read and write
1BA7292C000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA6A568000
trusted library allocation
page read and write
1BA672F1000
trusted library allocation
page read and write
1BA66B75000
heap
page read and write
1BA6A52A000
trusted library allocation
page read and write
1BA6299E000
trusted library allocation
page read and write
1BA69298000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA64332000
trusted library allocation
page read and write
1BA730D1000
trusted library allocation
page read and write
1BA5DFC1000
heap
page read and write
1BA69A3B000
trusted library allocation
page read and write
1BA6A586000
trusted library allocation
page read and write
1BA668CC000
trusted library allocation
page read and write
1BA5E028000
heap
page read and write
1BA6A574000
trusted library allocation
page read and write
1BA67494000
trusted library allocation
page read and write
1BA6F2C2000
trusted library allocation
page read and write
1BA672C6000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA69AC9000
trusted library allocation
page read and write
1BA70CCD000
trusted library allocation
page read and write
1BA6F89F000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA672CE000
trusted library allocation
page read and write
1BA6A69D000
trusted library allocation
page read and write
1BA6417E000
trusted library allocation
page read and write
1BA5DF9E000
heap
page read and write
1BA5DFA8000
heap
page read and write
C88E7FE000
unkown
page readonly
1BA70DE5000
trusted library allocation
page read and write
1BA6307E000
trusted library allocation
page read and write
1BA6F178000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA6F850000
trusted library allocation
page read and write
1BA69825000
trusted library allocation
page read and write
1BA68CF1000
trusted library allocation
page read and write
1BA6F3D3000
trusted library allocation
page read and write
1BA6F84C000
trusted library allocation
page read and write
1BA6A5C7000
trusted library allocation
page read and write
1BA67425000
trusted library allocation
page read and write
1BA70BE1000
trusted library allocation
page read and write
18A000
stack
page read and write
1BA6F33B000
trusted library allocation
page read and write
1BA72FDE000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA699D9000
trusted library allocation
page read and write
1BA6F8E8000
trusted library allocation
page read and write
1BA730EA000
trusted library allocation
page read and write
F6677AE000
unkown
page readonly
1BA67BA7000
trusted library allocation
page read and write
1BA6682E000
trusted library allocation
page read and write
1BA66DCC000
trusted library allocation
page read and write
1BA70C46000
trusted library allocation
page read and write
1BA683E2000
trusted library allocation
page read and write
1BA66E9E000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA69A3F000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA66D97000
trusted library allocation
page read and write
1BA668BE000
trusted library allocation
page read and write
1BA6F871000
trusted library allocation
page read and write
1BA6F871000
trusted library allocation
page read and write
1BA5DFD5000
heap
page read and write
1BA683EB000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1C5B7073000
heap
page read and write
1BA674C3000
trusted library allocation
page read and write
1BA68BFE000
trusted library allocation
page read and write
1BA678CB000
trusted library allocation
page read and write
1BA5DFA1000
heap
page read and write
F6691FE000
stack
page read and write
1BA5DFFA000
heap
page read and write
1BA678B7000
trusted library allocation
page read and write
E6D5DFF000
stack
page read and write
1BA6F7F7000
trusted library allocation
page read and write
1BA7230C000
trusted library allocation
page read and write
1BA6F8D7000
trusted library allocation
page read and write
1BA5DFC7000
heap
page read and write
1BA6F3C8000
trusted library allocation
page read and write
1BA70C3A000
trusted library allocation
page read and write
1BA70D2C000
trusted library allocation
page read and write
1BA6AB1C000
trusted library allocation
page read and write
1BA70BB3000
trusted library allocation
page read and write
1BA684FE000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA724C0000
trusted library allocation
page read and write
1BA70CC7000
trusted library allocation
page read and write
1BA66B25000
heap
page read and write
1BA5DFC1000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA67863000
trusted library allocation
page read and write
28357059000
heap
page read and write
1BA6F1BD000
trusted library allocation
page read and write
1BA68CCA000
trusted library allocation
page read and write
1BA674CF000
trusted library allocation
page read and write
1BA5DFCD000
heap
page read and write
1BA641E4000
trusted library allocation
page read and write
1BA692EC000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1C5B7603000
heap
page read and write
1BA674C3000
trusted library allocation
page read and write
1BA66FD6000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA70C8B000
trusted library allocation
page read and write
1C5B7600000
heap
page read and write
1BA70BC5000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA6F092000
trusted library allocation
page read and write
1BA6F8F9000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA67231000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA717E5000
trusted library allocation
page read and write
1BA69366000
trusted library allocation
page read and write
1BA5DFCE000
heap
page read and write
1BA66B19000
heap
page read and write
1BA68467000
trusted library allocation
page read and write
23B961E0000
unclassified section
page readonly
1BA70AC3000
trusted library allocation
page read and write
1BA68CEC000
trusted library allocation
page read and write
1BA723ED000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA6F699000
trusted library allocation
page read and write
1BA70DAC000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA5DFD6000
heap
page read and write
1BA7292C000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA5DFE9000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA6F881000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA68C59000
trusted library allocation
page read and write
A70000
heap
page read and write
1BA699BA000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA6F7DA000
trusted library allocation
page read and write
1BA70DBA000
trusted library allocation
page read and write
1BA71901000
trusted library allocation
page read and write
1BA5DFC1000
heap
page read and write
1BA5DFB7000
heap
page read and write
1BA641E8000
trusted library allocation
page read and write
1BA683C5000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
28357048000
heap
page read and write
1BA6846F000
trusted library allocation
page read and write
1BA6F147000
trusted library allocation
page read and write
1BA66D63000
trusted library allocation
page read and write
23B966C4000
trusted library allocation
page read and write
1BA6F0E7000
trusted library allocation
page read and write
1BA70D36000
trusted library allocation
page read and write
1BA668B7000
trusted library allocation
page read and write
1BA70CFE000
trusted library allocation
page read and write
1BA668B7000
trusted library allocation
page read and write
1BA66EA5000
trusted library allocation
page read and write
1BA70C96000
trusted library allocation
page read and write
2582A720000
heap
page read and write
1BA5DFD9000
heap
page read and write
1BA678A9000
trusted library allocation
page read and write
1BA5DFA9000
heap
page read and write
1BA5E004000
heap
page read and write
1BA66DF6000
trusted library allocation
page read and write
1BA6F1D8000
trusted library allocation
page read and write
1BA5DFCE000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA6830E000
trusted library allocation
page read and write
1BA5DFC1000
heap
page read and write
1BA5DFD6000
heap
page read and write
1BA674A5000
trusted library allocation
page read and write
1BA6F3A7000
trusted library allocation
page read and write
1BA69A57000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA641EF000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA5DFDF000
heap
page read and write
C88C5EB000
stack
page read and write
1BA5DFD6000
heap
page read and write
1BA6F8FB000
trusted library allocation
page read and write
1BA70C42000
trusted library allocation
page read and write
1BA68CC5000
trusted library allocation
page read and write
1BA698FC000
trusted library allocation
page read and write
1BA6785B000
trusted library allocation
page read and write
1BA5DFB6000
heap
page read and write
28356890000
heap
page read and write
1BA688D0000
trusted library allocation
page read and write
1BA6749E000
trusted library allocation
page read and write
1BA678A6000
trusted library allocation
page read and write
1BA6F8F5000
trusted library allocation
page read and write
1BA5DFD6000
heap
page read and write
1BA67423000
trusted library allocation
page read and write
1BA66F9D000
trusted library allocation
page read and write
1BA5DFC1000
heap
page read and write
1BA5DFB9000
heap
page read and write
28356F53000
heap
page read and write
1BA72A00000
trusted library allocation
page read and write
1BA683CC000
trusted library allocation
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA678BC000
trusted library allocation
page read and write
1BA70CFE000
trusted library allocation
page read and write
1A9247E000
unkown
page readonly
1BA5DFBE000
heap
page read and write
1BA5DFC1000
heap
page read and write
1BA6F8DD000
trusted library allocation
page read and write
1BA5DFCC000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFC1000
heap
page read and write
28357059000
heap
page read and write
1BA5DFC9000
heap
page read and write
1BA6F7F3000
trusted library allocation
page read and write
7FE000
stack
page read and write
1BA6F86D000
trusted library allocation
page read and write
1BA630A3000
trusted library allocation
page read and write
1BA5E027000
heap
page read and write
1BA6F790000
trusted library allocation
page read and write
1BA699E4000
trusted library allocation
page read and write
1BA70C40000
trusted library allocation
page read and write
1BA6993D000
trusted library allocation
page read and write
1A9363E000
stack
page read and write
1BA5DF9E000
heap
page read and write
1BA723CE000
trusted library allocation
page read and write
1BA70BDF000
trusted library allocation
page read and write
1BA72400000
trusted library allocation
page read and write
1BA72387000
trusted library allocation
page read and write
1BA698A5000
trusted library allocation
page read and write
2A02E995000
heap
page read and write
1BA70DD0000
trusted library allocation
page read and write
1BA5DFD4000
heap
page read and write
1BA5DFE9000
heap
page read and write
1BA66FCE000
trusted library allocation
page read and write
1BA70AF3000
trusted library allocation
page read and write
1BA70BB3000
trusted library allocation
page read and write
1BA6A5EF000
trusted library allocation
page read and write
1BA6F7BA000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA6F7E1000
trusted library allocation
page read and write
1BA66E9E000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1A94E7E000
stack
page read and write
1BA66D73000
trusted library allocation
page read and write
28356F59000
heap
page read and write
F64000
unkown
page readonly
1A9257E000
unkown
page readonly
2A030140000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA6972A000
trusted library allocation
page read and write
1BA70C4A000
trusted library allocation
page read and write
1BA68447000
trusted library allocation
page read and write
1BA5DFC5000
heap
page read and write
1BA6F899000
trusted library allocation
page read and write
1BA69498000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
F66A1FE000
stack
page read and write
1BA630B6000
trusted library allocation
page read and write
1BA6F844000
trusted library allocation
page read and write
1BA6F6EE000
trusted library allocation
page read and write
1BA5DFC9000
heap
page read and write
1BA730F8000
trusted library allocation
page read and write
1BA684FC000
trusted library allocation
page read and write
345B7ED1000
trusted library allocation
page execute read
1BA6F3E6000
trusted library allocation
page read and write
1BA71906000
trusted library allocation
page read and write
1BA70BE1000
trusted library allocation
page read and write
1BA672C5000
trusted library allocation
page read and write
1BA67468000
trusted library allocation
page read and write
1BA6416A000
trusted library allocation
page read and write
1BA69886000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA6AB05000
trusted library allocation
page read and write
1BA699F1000
trusted library allocation
page read and write
1BA683EE000
trusted library allocation
page read and write
1BA5DFCE000
heap
page read and write
1BA5DFCA000
heap
page read and write
1BA66DCF000
trusted library allocation
page read and write
1BA630CF000
trusted library allocation
page read and write
1BA698C5000
trusted library allocation
page read and write
1BA693EE000
trusted library allocation
page read and write
1BA6B184000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA70AF0000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
28356FF0000
heap
page read and write
1BA6973E000
trusted library allocation
page read and write
1BA70DE4000
trusted library allocation
page read and write
1BA678BA000
trusted library allocation
page read and write
1BA684E7000
trusted library allocation
page read and write
1BA6F1AE000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA71787000
trusted library allocation
page read and write
1BA67BC5000
trusted library allocation
page read and write
1C5B73E7000
trusted library allocation
page read and write
1BA70B77000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA6F6EA000
trusted library allocation
page read and write
1BA629C3000
trusted library allocation
page read and write
1BA6301A000
trusted library allocation
page read and write
1BA70B28000
trusted library allocation
page read and write
894000
heap
page read and write
1BA68A13000
trusted library allocation
page read and write
1BA6A9CB000
trusted library allocation
page read and write
1BA6F795000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1C5B7398000
trusted library allocation
page read and write
1BA69454000
trusted library allocation
page read and write
1BA70CB2000
trusted library allocation
page read and write
1BA70B9F000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA67BA7000
trusted library allocation
page read and write
1BA5DFC9000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA70B4D000
trusted library allocation
page read and write
1BA684C0000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA698C5000
trusted library allocation
page read and write
1BA5DFB3000
heap
page read and write
1BA693D7000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA5E004000
heap
page read and write
23B96500000
trusted library allocation
page read and write
1BA69966000
trusted library allocation
page read and write
1BA68CA1000
trusted library allocation
page read and write
1BA723B8000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA6F0F9000
trusted library allocation
page read and write
894000
heap
page read and write
1BA674B0000
trusted library allocation
page read and write
1BA7243A000
trusted library allocation
page read and write
F52000
unkown
page readonly
1BA683CF000
trusted library allocation
page read and write
1BA6F8AF000
trusted library allocation
page read and write
1BA69886000
trusted library allocation
page read and write
1BA692AA000
trusted library allocation
page read and write
1BA68436000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA629CF000
trusted library allocation
page read and write
1BA7184D000
trusted library allocation
page read and write
1BA6A4AB000
trusted library allocation
page read and write
1BA684C0000
trusted library allocation
page read and write
1BA6A94C000
trusted library allocation
page read and write
1BA6685F000
trusted library allocation
page read and write
1BA6A5DC000
trusted library allocation
page read and write
1BA63F9C000
trusted library allocation
page read and write
1BA6A574000
trusted library allocation
page read and write
CB8A3FF000
stack
page read and write
1BA5DFC1000
heap
page read and write
1BA68422000
trusted library allocation
page read and write
1BA6F2CA000
trusted library allocation
page read and write
1BA68BE1000
trusted library allocation
page read and write
1BA63013000
trusted library allocation
page read and write
2835636F000
trusted library allocation
page read and write
1BA678AD000
trusted library allocation
page read and write
1BA672C8000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA6906A000
trusted library allocation
page read and write
1BA70AB1000
trusted library allocation
page read and write
1BA5E022000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA68C77000
trusted library allocation
page read and write
1BA70B4D000
trusted library allocation
page read and write
1BA672FE000
trusted library allocation
page read and write
1BA70BD7000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA6F7DF000
trusted library allocation
page read and write
1BA70CA1000
trusted library allocation
page read and write
1BA64262000
trusted library allocation
page read and write
1BA674FA000
trusted library allocation
page read and write
1BA678CB000
trusted library allocation
page read and write
1BA6F3CB000
trusted library allocation
page read and write
1BA6F7E9000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA68433000
trusted library allocation
page read and write
1BA5DF9E000
heap
page read and write
1BA5E022000
heap
page read and write
1BA66633000
trusted library allocation
page read and write
1BA64149000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
28357067000
heap
page read and write
1BA63F81000
trusted library allocation
page read and write
1BA72351000
trusted library allocation
page read and write
1BA674B5000
trusted library allocation
page read and write
1BA69580000
trusted library allocation
page read and write
1BA6A981000
trusted library allocation
page read and write
1BA5DFD5000
heap
page read and write
1BA6F7B9000
trusted library allocation
page read and write
1BA70C8D000
trusted library allocation
page read and write
1BA6977F000
trusted library allocation
page read and write
1BA6922C000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA66ECE000
trusted library allocation
page read and write
1BA67B91000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA678C3000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA6F846000
trusted library allocation
page read and write
1BA6F0F8000
trusted library allocation
page read and write
1BA68813000
trusted library allocation
page read and write
1BA66DCF000
trusted library allocation
page read and write
1BA6F08E000
trusted library allocation
page read and write
1BA67B8D000
trusted library allocation
page read and write
1BA641FA000
trusted library allocation
page read and write
1BA6F6EA000
trusted library allocation
page read and write
1BA70BDF000
trusted library allocation
page read and write
1BA684EB000
trusted library allocation
page read and write
1BA5DFC3000
heap
page read and write
1BA67BE2000
trusted library allocation
page read and write
345B7EC1000
trusted library allocation
page execute read
1BA69243000
trusted library allocation
page read and write
1BA73094000
trusted library allocation
page read and write
1BA70D4A000
trusted library allocation
page read and write
1BA684EB000
trusted library allocation
page read and write
1BA68BF3000
trusted library allocation
page read and write
1BA6F14E000
trusted library allocation
page read and write
A70000
heap
page read and write
1BA6A942000
trusted library allocation
page read and write
1BA70BA8000
trusted library allocation
page read and write
1BA666D7000
trusted library allocation
page read and write
1BA6A942000
trusted library allocation
page read and write
1BA7309A000
trusted library allocation
page read and write
1BA70B44000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA641E4000
trusted library allocation
page read and write
33D1000
heap
page read and write
1BA674C3000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA666E7000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA6F8AF000
trusted library allocation
page read and write
1BA674F8000
trusted library allocation
page read and write
1BA6F3D3000
trusted library allocation
page read and write
1BA68CF1000
trusted library allocation
page read and write
1BA6F8C4000
trusted library allocation
page read and write
1BA70CA1000
trusted library allocation
page read and write
1BA6F290000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
28356FD6000
heap
page read and write
1BA70BA8000
trusted library allocation
page read and write
2A03015A000
heap
page read and write
1BA6F392000
trusted library allocation
page read and write
1BA71786000
trusted library allocation
page read and write
1BA68C9C000
trusted library allocation
page read and write
1BA70D9F000
trusted library allocation
page read and write
1BA6F0E4000
trusted library allocation
page read and write
1BA698EB000
trusted library allocation
page read and write
1BA68AAF000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA66D9D000
trusted library allocation
page read and write
1BA69A5D000
trusted library allocation
page read and write
1BA66FAA000
trusted library allocation
page read and write
1BA66FDB000
trusted library allocation
page read and write
1BA70BC5000
trusted library allocation
page read and write
2D583DC03000
trusted library allocation
page read and write
1BA5DFD9000
heap
page read and write
1BA6749E000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
23B96674000
trusted library allocation
page read and write
1BA5DFCE000
heap
page read and write
F52000
unkown
page readonly
28356F9A000
heap
page read and write
1BA5DFA2000
heap
page read and write
28356FD0000
heap
page read and write
1BA5E025000
heap
page read and write
1BA6F3B8000
trusted library allocation
page read and write
1BA668BE000
trusted library allocation
page read and write
1BA6F13D000
trusted library allocation
page read and write
1BA6781F000
trusted library allocation
page read and write
1BA698CB000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA6F009000
trusted library allocation
page read and write
1BA72501000
heap
page read and write
1BA73041000
trusted library allocation
page read and write
1BA6A4CC000
trusted library allocation
page read and write
1BA71841000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
1BA6785F000
trusted library allocation
page read and write
1BA6F8A5000
trusted library allocation
page read and write
1BA69968000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFC2000
heap
page read and write
1BA694C9000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA6B1CE000
trusted library allocation
page read and write
283569D0000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFBC000
heap
page read and write
1BA5DFD3000
heap
page read and write
1BA678B3000
trusted library allocation
page read and write
1BA66D65000
trusted library allocation
page read and write
1BA5DFA7000
heap
page read and write
1BA5E02B000
heap
page read and write
1BA72802000
trusted library allocation
page read and write
1BA684D6000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA5E004000
heap
page read and write
1BA5DFDF000
heap
page read and write
1BA5DFA2000
heap
page read and write
28357048000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA5DFC1000
heap
page read and write
1BA6EF16000
trusted library allocation
page read and write
1BA6F34F000
trusted library allocation
page read and write
1BA666CA000
trusted library allocation
page read and write
1BA6F3BB000
trusted library allocation
page read and write
1BA6EFFB000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA66D39000
trusted library allocation
page read and write
1BA68BE1000
trusted library allocation
page read and write
1BA5DFCB000
heap
page read and write
1BA67BA9000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5E004000
heap
page read and write
1BA674A7000
trusted library allocation
page read and write
1BA5E026000
heap
page read and write
1BA67463000
trusted library allocation
page read and write
1BA6A686000
trusted library allocation
page read and write
1BA64244000
trusted library allocation
page read and write
1BA674EC000
trusted library allocation
page read and write
1BA63080000
trusted library allocation
page read and write
1BA6F3BB000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA70DB1000
trusted library allocation
page read and write
1BA684CC000
trusted library allocation
page read and write
1BA68BF0000
trusted library allocation
page read and write
1BA5E026000
heap
page read and write
F2C000
unkown
page readonly
1BA70B44000
trusted library allocation
page read and write
1BA70AF0000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA5DF9D000
heap
page read and write
1BA66EA5000
trusted library allocation
page read and write
1BA67494000
trusted library allocation
page read and write
1BA66ECE000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA7306B000
trusted library allocation
page read and write
1BA6975E000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA6A6E2000
trusted library allocation
page read and write
1BA70C8D000
trusted library allocation
page read and write
1BA5DFB1000
heap
page read and write
1BA5DFB6000
heap
page read and write
1BA6749C000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA70CC7000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA6EEDF000
trusted library allocation
page read and write
1BA5DFCB000
heap
page read and write
1BA70CCD000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA6F857000
trusted library allocation
page read and write
1BA6888E000
trusted library allocation
page read and write
1BA58B1F000
heap
page read and write
1BA6F71E000
trusted library allocation
page read and write
1BA70CBD000
trusted library allocation
page read and write
1BA668D6000
trusted library allocation
page read and write
1BA73074000
trusted library allocation
page read and write
1BA68BAC000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA6A5EF000
trusted library allocation
page read and write
1BA6F6F7000
trusted library allocation
page read and write
1BA69760000
trusted library allocation
page read and write
1BA6F0CD000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA6A506000
trusted library allocation
page read and write
1BA70B3E000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
1BA5DFD3000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA5DFD2000
heap
page read and write
1BA6F3D3000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5E004000
heap
page read and write
1BA70C98000
trusted library allocation
page read and write
1BA641F8000
trusted library allocation
page read and write
23B9660C000
trusted library allocation
page read and write
1BA6978F000
trusted library allocation
page read and write
1BA66EA5000
trusted library allocation
page read and write
1BA70D30000
trusted library allocation
page read and write
1BA5DFC5000
heap
page read and write
1BA6F72A000
trusted library allocation
page read and write
1BA70C4A000
trusted library allocation
page read and write
1BA683EE000
trusted library allocation
page read and write
1BA6F7F3000
trusted library allocation
page read and write
1BA70D11000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA70CFE000
trusted library allocation
page read and write
1C5B7500000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA6A55C000
trusted library allocation
page read and write
1BA6EF7F000
trusted library allocation
page read and write
28356980000
trusted library section
page readonly
1BA6A990000
trusted library allocation
page read and write
1BA5DF95000
heap
page read and write
1BA5E01B000
heap
page read and write
1BA6F157000
trusted library allocation
page read and write
1BA674FA000
trusted library allocation
page read and write
1BA6F7A1000
trusted library allocation
page read and write
1BA6F1B5000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA5DFA9000
heap
page read and write
1BA70BC5000
trusted library allocation
page read and write
1BA72F3E000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA6F184000
trusted library allocation
page read and write
1BA70BB3000
trusted library allocation
page read and write
1BA67BA5000
trusted library allocation
page read and write
28356FEC000
heap
page read and write
1BA6F6A7000
trusted library allocation
page read and write
1BA70CBD000
trusted library allocation
page read and write
1BA641F8000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA68A6A000
trusted library allocation
page read and write
1BA66E5A000
trusted library allocation
page read and write
1BA6EEEC000
trusted library allocation
page read and write
1BA68C9D000
trusted library allocation
page read and write
1BA6F75F000
trusted library allocation
page read and write
1BA5DFD9000
heap
page read and write
1BA66E71000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
23B96670000
trusted library allocation
page read and write
1BA70DA8000
trusted library allocation
page read and write
1BA70DAC000
trusted library allocation
page read and write
1BA674EC000
trusted library allocation
page read and write
1BA5DFBF000
heap
page read and write
1BA66B2B000
heap
page read and write
23B961F0000
unclassified section
page readonly
1BA67BA0000
trusted library allocation
page read and write
1BA6F081000
trusted library allocation
page read and write
1BA674C1000
trusted library allocation
page read and write
1BA67237000
trusted library allocation
page read and write
1BA6F78E000
trusted library allocation
page read and write
1BA688B3000
trusted library allocation
page read and write
1BA5DFCC000
heap
page read and write
1BA5DF9E000
heap
page read and write
1BA66E9E000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA7293B000
trusted library allocation
page read and write
1BA5DFAF000
heap
page read and write
1BA70D26000
trusted library allocation
page read and write
1BA678BA000
trusted library allocation
page read and write
1BA68AF5000
trusted library allocation
page read and write
1BA6F3D3000
trusted library allocation
page read and write
1BA6787C000
trusted library allocation
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA72FFB000
trusted library allocation
page read and write
1BA66D7F000
trusted library allocation
page read and write
1BA6F0C7000
trusted library allocation
page read and write
1BA7232C000
trusted library allocation
page read and write
28356A30000
trusted library allocation
page read and write
1BA6F8BF000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA6F0CE000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA70DFD000
trusted library allocation
page read and write
1BA69923000
trusted library allocation
page read and write
1BA5DFD4000
heap
page read and write
1BA5DFA8000
heap
page read and write
28356FD8000
heap
page read and write
1BA66F90000
trusted library allocation
page read and write
1BA68433000
trusted library allocation
page read and write
1BA5DFB1000
heap
page read and write
1BA6743A000
trusted library allocation
page read and write
1BA66ECE000
trusted library allocation
page read and write
1BA66D63000
trusted library allocation
page read and write
1BA70B58000
trusted library allocation
page read and write
1BA668CE000
trusted library allocation
page read and write
1BA666DC000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA66FD6000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA70C53000
trusted library allocation
page read and write
1BA674FA000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA672F1000
trusted library allocation
page read and write
1BA70C40000
trusted library allocation
page read and write
1BA72B6D000
trusted library allocation
page read and write
1BA66FA0000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA66FD9000
trusted library allocation
page read and write
1BA70C43000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA684E2000
trusted library allocation
page read and write
1BA6F888000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA5DFB3000
heap
page read and write
1BA6F3B8000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA70CA4000
trusted library allocation
page read and write
1BA678BC000
trusted library allocation
page read and write
1BA5DFBE000
heap
page read and write
1BA6423D000
trusted library allocation
page read and write
1BA70DA4000
trusted library allocation
page read and write
1BA6A92F000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA66E8E000
trusted library allocation
page read and write
894000
heap
page read and write
1BA697E8000
trusted library allocation
page read and write
1BA692CA000
trusted library allocation
page read and write
1BA68A86000
trusted library allocation
page read and write
1BA64240000
trusted library allocation
page read and write
1BA6F75F000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA66E81000
trusted library allocation
page read and write
1C5B7373000
trusted library allocation
page read and write
1BA70BD7000
trusted library allocation
page read and write
1BA71933000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA70C59000
trusted library allocation
page read and write
1BA688D7000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA68474000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFFA000
heap
page read and write
CB8BBFE000
stack
page read and write
1BA5E01B000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA6F793000
trusted library allocation
page read and write
A5D000
heap
page read and write
1BA690A9000
trusted library allocation
page read and write
1BA69495000
trusted library allocation
page read and write
1BA688D4000
trusted library allocation
page read and write
1BA66E7A000
trusted library allocation
page read and write
1BA724A9000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA724F1000
trusted library allocation
page read and write
1BA70CAD000
trusted library allocation
page read and write
1BA723CE000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA69777000
trusted library allocation
page read and write
1BA6413A000
trusted library allocation
page read and write
1BA6F1D2000
trusted library allocation
page read and write
1BA68332000
trusted library allocation
page read and write
1BA6F6BD000
trusted library allocation
page read and write
1C5B735D000
trusted library allocation
page read and write
1BA6B21C000
trusted library allocation
page read and write
1BA68B13000
trusted library allocation
page read and write
283563EB000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA6ABAC000
trusted library allocation
page read and write
28356FE1000
heap
page read and write
1BA683D1000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA72FE9000
trusted library allocation
page read and write
28356F98000
heap
page read and write
1BA642A2000
trusted library allocation
page read and write
1BA6F3AC000
trusted library allocation
page read and write
28357034000
heap
page read and write
1BA6A5F1000
trusted library allocation
page read and write
2582A731000
heap
page read and write
1BA63066000
trusted library allocation
page read and write
1BA6B205000
trusted library allocation
page read and write
1BA66ECE000
trusted library allocation
page read and write
28356F4F000
heap
page read and write
1BA688D7000
trusted library allocation
page read and write
1BA70CE0000
trusted library allocation
page read and write
1BA6F7B2000
trusted library allocation
page read and write
1BA70DFD000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA6A937000
trusted library allocation
page read and write
1BA66FB6000
trusted library allocation
page read and write
1BA68CB1000
trusted library allocation
page read and write
1BA69737000
trusted library allocation
page read and write
1BA672A4000
trusted library allocation
page read and write
1BA674FA000
trusted library allocation
page read and write
1BA688E8000
trusted library allocation
page read and write
28356FA9000
heap
page read and write
1BA699BF000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA63017000
trusted library allocation
page read and write
1BA6F7F7000
trusted library allocation
page read and write
1BA5E026000
heap
page read and write
1BA70DA7000
trusted library allocation
page read and write
1BA6A9CD000
trusted library allocation
page read and write
1BA71933000
trusted library allocation
page read and write
1BA68C3A000
trusted library allocation
page read and write
1BA6F024000
trusted library allocation
page read and write
1BA5DFBC000
heap
page read and write
1BA5DFB6000
heap
page read and write
1A9467E000
unkown
page readonly
1BA69396000
trusted library allocation
page read and write
1BA66F83000
trusted library allocation
page read and write
1BA66EA5000
trusted library allocation
page read and write
2835689F000
heap
page read and write
1BA6749E000
trusted library allocation
page read and write
1BA674BB000
trusted library allocation
page read and write
1BA698EA000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5DFC0000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA6F6AB000
trusted library allocation
page read and write
1BA7156E000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA730D9000
trusted library allocation
page read and write
1BA69A4F000
trusted library allocation
page read and write
1BA698B9000
trusted library allocation
page read and write
1BA5DFC0000
heap
page read and write
1BA6F1BF000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
E90000
unkown
page readonly
1BA70B2C000
trusted library allocation
page read and write
1BA5DFCB000
heap
page read and write
28357067000
heap
page read and write
1BA693E4000
trusted library allocation
page read and write
1BA5E022000
heap
page read and write
1BA6F88F000
trusted library allocation
page read and write
1BA684FE000
trusted library allocation
page read and write
1BA67467000
trusted library allocation
page read and write
1BA699BD000
trusted library allocation
page read and write
1BA6A97E000
trusted library allocation
page read and write
1BA68CF6000
trusted library allocation
page read and write
1BA699F7000
trusted library allocation
page read and write
1BA71957000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA6F6FB000
trusted library allocation
page read and write
1BA724B1000
trusted library allocation
page read and write
1BA66B1A000
heap
page read and write
1BA66B1E000
heap
page read and write
1BA693AE000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
28356A06000
trusted library allocation
page read and write
A57000
heap
page read and write
1BA694FD000
trusted library allocation
page read and write
1BA70DC7000
trusted library allocation
page read and write
1BA6F855000
trusted library allocation
page read and write
28357067000
heap
page read and write
1BA66B11000
heap
page read and write
28356348000
trusted library allocation
page read and write
1BA70DF6000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA6743C000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA688D0000
trusted library allocation
page read and write
1BA66E9E000
trusted library allocation
page read and write
1BA6783D000
trusted library allocation
page read and write
1BA6F6EA000
trusted library allocation
page read and write
1C5B6F60000
unclassified section
page readonly
1BA72F0C000
trusted library allocation
page read and write
1BA70C46000
trusted library allocation
page read and write
1C5B753D000
trusted library allocation
page read and write
1BA683E5000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA6F2E6000
trusted library allocation
page read and write
1BA6F863000
trusted library allocation
page read and write
1BA69760000
trusted library allocation
page read and write
1BA6F8ED000
trusted library allocation
page read and write
1BA68C62000
trusted library allocation
page read and write
1BA66F3B000
trusted library allocation
page read and write
2A03014F000
heap
page read and write
28357069000
heap
page read and write
1BA70AA3000
trusted library allocation
page read and write
1BA674B8000
trusted library allocation
page read and write
1BA67468000
trusted library allocation
page read and write
1BA70C4A000
trusted library allocation
page read and write
1BA6785C000
trusted library allocation
page read and write
23B9668F000
trusted library allocation
page read and write
1BA68B31000
trusted library allocation
page read and write
1BA6F8CD000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA71548000
trusted library allocation
page read and write
23B96470000
heap
page read and write
1BA68BEA000
trusted library allocation
page read and write
1BA71886000
trusted library allocation
page read and write
1BA66D8D000
trusted library allocation
page read and write
1BA70C54000
trusted library allocation
page read and write
2835701D000
heap
page read and write
1BA666DB000
trusted library allocation
page read and write
1BA70B48000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA70AF3000
trusted library allocation
page read and write
1BA70DD7000
trusted library allocation
page read and write
1BA5DFD6000
heap
page read and write
1BA5E027000
heap
page read and write
1BA5E01B000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA67867000
trusted library allocation
page read and write
1BA6993A000
trusted library allocation
page read and write
1BA6F8A7000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA68AA8000
trusted library allocation
page read and write
1BA6F8EB000
trusted library allocation
page read and write
1BA70CC7000
trusted library allocation
page read and write
CB8CBFF000
stack
page read and write
1BA5DFB4000
heap
page read and write
1BA5DFAE000
heap
page read and write
1BA6B250000
trusted library allocation
page read and write
1BA6F2C2000
trusted library allocation
page read and write
1BA6A566000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA641EA000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA6F899000
trusted library allocation
page read and write
28356310000
trusted library allocation
page read and write
1BA5DFB5000
heap
page read and write
1BA683E0000
trusted library allocation
page read and write
1BA72200000
trusted library allocation
page read and write
1BA71805000
trusted library allocation
page read and write
1BA5DFC3000
heap
page read and write
1BA70AB1000
trusted library allocation
page read and write
1BA683EB000
trusted library allocation
page read and write
1BA5DFC1000
heap
page read and write
1BA6A981000
trusted library allocation
page read and write
1BA698C3000
trusted library allocation
page read and write
1BA67463000
trusted library allocation
page read and write
1BA64273000
trusted library allocation
page read and write
1BA67863000
trusted library allocation
page read and write
28356FE1000
heap
page read and write
1BA6F014000
trusted library allocation
page read and write
1BA70DE5000
trusted library allocation
page read and write
1BA6F1ED000
trusted library allocation
page read and write
28356386000
trusted library allocation
page read and write
1BA6F0E1000
trusted library allocation
page read and write
1BA63100000
trusted library allocation
page read and write
1BA678A7000
trusted library allocation
page read and write
1BA70D83000
trusted library allocation
page read and write
1BA67896000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA6F8EB000
trusted library allocation
page read and write
1BA71577000
trusted library allocation
page read and write
1BA678B2000
trusted library allocation
page read and write
1BA6A5E7000
trusted library allocation
page read and write
1BA68124000
trusted library allocation
page read and write
1BA67BF9000
trusted library allocation
page read and write
1BA5DFC3000
heap
page read and write
1BA6F6F7000
trusted library allocation
page read and write
1BA67861000
trusted library allocation
page read and write
1BA6F871000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
1BA730F8000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA730D9000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA6F0F3000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
3A82A5C03000
trusted library allocation
page read and write
1BA69AD3000
trusted library allocation
page read and write
1BA6749E000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA692E5000
trusted library allocation
page read and write
1BA6F60B000
trusted library allocation
page read and write
1BA6EEF0000
trusted library allocation
page read and write
1BA7192E000
trusted library allocation
page read and write
1BA66D87000
trusted library allocation
page read and write
1BA684FC000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1A923FE000
unkown
page readonly
1C5B7050000
heap
page read and write
1BA69785000
trusted library allocation
page read and write
1BA6F8FC000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA69760000
trusted library allocation
page read and write
1BA5DFB3000
heap
page read and write
1BA5E02B000
heap
page read and write
1BA6784F000
trusted library allocation
page read and write
1BA5DFA9000
heap
page read and write
1BA67843000
trusted library allocation
page read and write
1BA70CB7000
trusted library allocation
page read and write
1BA718AC000
trusted library allocation
page read and write
1BA70D07000
trusted library allocation
page read and write
1BA5DFB8000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA668D4000
trusted library allocation
page read and write
1BA70BB3000
trusted library allocation
page read and write
1BA68436000
trusted library allocation
page read and write
1BA6840F000
trusted library allocation
page read and write
1BA6A5F7000
trusted library allocation
page read and write
1BA64227000
trusted library allocation
page read and write
1BA6741C000
trusted library allocation
page read and write
1BA5DFD9000
heap
page read and write
1BA67BC6000
trusted library allocation
page read and write
1BA70B36000
trusted library allocation
page read and write
28356F5C000
heap
page read and write
F60000
unkown
page write copy
28356FE2000
heap
page read and write
1BA698CB000
trusted library allocation
page read and write
1BA70C33000
trusted library allocation
page read and write
1BA66F89000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
23B96630000
trusted library allocation
page read and write
28356F59000
heap
page read and write
1BA66EA5000
trusted library allocation
page read and write
1BA723D4000
trusted library allocation
page read and write
1BA67438000
trusted library allocation
page read and write
1BA683C1000
trusted library allocation
page read and write
1BA683EB000
trusted library allocation
page read and write
1BA5DF88000
heap
page read and write
1BA730FC000
trusted library allocation
page read and write
1BA70CBC000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA5E022000
heap
page read and write
345B7F41000
trusted library allocation
page execute read
28356FD8000
heap
page read and write
1BA66F4A000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA641E8000
trusted library allocation
page read and write
1BA70DE0000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA68ADF000
trusted library allocation
page read and write
28357067000
heap
page read and write
1BA5E004000
heap
page read and write
1BA6723B000
trusted library allocation
page read and write
1BA7249E000
trusted library allocation
page read and write
2582A700000
heap
page read and write
1BA6F86D000
trusted library allocation
page read and write
1BA70CBA000
trusted library allocation
page read and write
1BA6F3C8000
trusted library allocation
page read and write
1C5B7519000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA6B2AC000
trusted library allocation
page read and write
1BA68AC1000
trusted library allocation
page read and write
1BA5DFC4000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFB3000
heap
page read and write
1BA699BA000
trusted library allocation
page read and write
2A030144000
heap
page read and write
1BA6F84B000
trusted library allocation
page read and write
1BA6F762000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA5DFB9000
heap
page read and write
1BA72BCE000
trusted library allocation
page read and write
1BA688E0000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA70CC9000
trusted library allocation
page read and write
2B461241E000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
1BA6EED7000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA674EC000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA6884E000
trusted library allocation
page read and write
1C5B7070000
heap
page read and write
1BA6784F000
trusted library allocation
page read and write
1BA698C1000
trusted library allocation
page read and write
1BA717C8000
trusted library allocation
page read and write
23B9665F000
trusted library allocation
page read and write
1BA6AB8A000
trusted library allocation
page read and write
28355F60000
unclassified section
page readonly
1BA678CB000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA6F79D000
trusted library allocation
page read and write
1BA6F1ED000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA68480000
trusted library allocation
page read and write
1BA5DF95000
heap
page read and write
1BA629A9000
trusted library allocation
page read and write
1BA68CF4000
trusted library allocation
page read and write
1BA70CC7000
trusted library allocation
page read and write
1BA684D6000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA70C42000
trusted library allocation
page read and write
1BA6F82C000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA6F3AF000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA668A8000
trusted library allocation
page read and write
1BA6F2CB000
trusted library allocation
page read and write
1BA70C9E000
trusted library allocation
page read and write
1BA6B1F1000
trusted library allocation
page read and write
1BA66DB6000
trusted library allocation
page read and write
1BA5DFB3000
heap
page read and write
1BA724A5000
trusted library allocation
page read and write
1BA7306B000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA6F7C9000
trusted library allocation
page read and write
1BA6F7E9000
trusted library allocation
page read and write
1BA5E022000
heap
page read and write
28357034000
heap
page read and write
1BA5E02C000
heap
page read and write
1BA6F88E000
trusted library allocation
page read and write
1BA67436000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA5DFB9000
heap
page read and write
1C5B7365000
trusted library allocation
page read and write
1BA68C82000
trusted library allocation
page read and write
28357011000
heap
page read and write
1BA6A5C1000
trusted library allocation
page read and write
1BA5DFD5000
heap
page read and write
1C5B736E000
trusted library allocation
page read and write
1BA70B16000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5DF9E000
heap
page read and write
1BA6F1D0000
trusted library allocation
page read and write
28356400000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA67892000
trusted library allocation
page read and write
1BA70B3F000
trusted library allocation
page read and write
1BA684D6000
trusted library allocation
page read and write
1BA678BF000
trusted library allocation
page read and write
1BA5DF9E000
heap
page read and write
1BA70C33000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
A5B000
heap
page read and write
1BA68479000
trusted library allocation
page read and write
1BA666B1000
trusted library allocation
page read and write
1BA69A7D000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA72F9D000
trusted library allocation
page read and write
1BA684EB000
trusted library allocation
page read and write
1BA672C4000
trusted library allocation
page read and write
1BA6741C000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA6F290000
trusted library allocation
page read and write
1BA64197000
trusted library allocation
page read and write
1BA641EF000
trusted library allocation
page read and write
283560F0000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA668D6000
trusted library allocation
page read and write
1BA73054000
trusted library allocation
page read and write
1BA6F823000
trusted library allocation
page read and write
1BA70B9F000
trusted library allocation
page read and write
1BA684E2000
trusted library allocation
page read and write
28356414000
heap
page read and write
1BA72464000
trusted library allocation
page read and write
1BA6F68F000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
28357011000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA67897000
trusted library allocation
page read and write
E91000
unkown
page execute read
1BA67240000
trusted library allocation
page read and write
1BA5DFD6000
heap
page read and write
28356319000
trusted library allocation
page read and write
1BA6A5F1000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
2582A830000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA5E023000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA70C40000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA678AD000
trusted library allocation
page read and write
1BA6EFDB000
trusted library allocation
page read and write
1C5B7503000
trusted library allocation
page read and write
1BA70AC6000
trusted library allocation
page read and write
1BA66FAC000
trusted library allocation
page read and write
1BA6F6F7000
trusted library allocation
page read and write
1BA68422000
trusted library allocation
page read and write
2835635F000
trusted library allocation
page read and write
1BA684F7000
trusted library allocation
page read and write
23B96290000
heap
page read and write
1BA5DFB9000
heap
page read and write
1BA630A3000
trusted library allocation
page read and write
1BA7244C000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA68AB6000
trusted library allocation
page read and write
1BA6F32E000
trusted library allocation
page read and write
1BA70DA4000
trusted library allocation
page read and write
1BA6F626000
trusted library allocation
page read and write
1BA68B0F000
trusted library allocation
page read and write
1BA6787C000
trusted library allocation
page read and write
23B96410000
heap
page read and write
1BA63026000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA693D4000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA683B3000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA698CB000
trusted library allocation
page read and write
28356FD6000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA698A5000
trusted library allocation
page read and write
1BA6EEE6000
trusted library allocation
page read and write
1BA70CC2000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
E91000
unkown
page execute read
1BA70DD2000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA6978F000
trusted library allocation
page read and write
1BA678C3000
trusted library allocation
page read and write
23B963B0000
heap
page read and write
1BA6A586000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA64269000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
1BA684F7000
trusted library allocation
page read and write
1BA69A4B000
trusted library allocation
page read and write
1BA6F01E000
trusted library allocation
page read and write
1BA72B9E000
trusted library allocation
page read and write
1BA5DF9E000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA6F3C6000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA668F8000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA72F48000
trusted library allocation
page read and write
1BA66633000
trusted library allocation
page read and write
1BA6F857000
trusted library allocation
page read and write
1BA6F0A1000
trusted library allocation
page read and write
1BA67BE7000
trusted library allocation
page read and write
1BA6F32B000
trusted library allocation
page read and write
1BA72476000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA70C59000
trusted library allocation
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA70CBA000
trusted library allocation
page read and write
1BA70CA4000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA699A1000
trusted library allocation
page read and write
1BA70B9F000
trusted library allocation
page read and write
1BA70CE0000
trusted library allocation
page read and write
1BA66E71000
trusted library allocation
page read and write
1BA715F9000
trusted library allocation
page read and write
1BA6F728000
trusted library allocation
page read and write
28356F8C000
heap
page read and write
1BA6740B000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1C5B71E0000
heap
page read and write
1BA6F79D000
trusted library allocation
page read and write
1BA67262000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA678CB000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA723D4000
trusted library allocation
page read and write
1BA6EEFB000
trusted library allocation
page read and write
1BA64339000
trusted library allocation
page read and write
1BA66FE9000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA697C4000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA690D0000
trusted library allocation
page read and write
1BA5DFC4000
heap
page read and write
1BA70DE0000
trusted library allocation
page read and write
28356416000
heap
page read and write
1BA5DFAE000
heap
page read and write
1BA69748000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
C88F9BE000
unkown
page readonly
1BA70C1B000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA5E02B000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA5E022000
heap
page read and write
1BA7245E000
trusted library allocation
page read and write
1BA6A57B000
trusted library allocation
page read and write
1BA67886000
trusted library allocation
page read and write
1BA6F3CB000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA6F8A9000
trusted library allocation
page read and write
1BA70BDF000
trusted library allocation
page read and write
1BA6F8F5000
trusted library allocation
page read and write
1BA5DFC0000
heap
page read and write
1BA641EA000
trusted library allocation
page read and write
23B96803000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
28356FD8000
heap
page read and write
1BA678CB000
trusted library allocation
page read and write
1BA67438000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA5DFB1000
heap
page read and write
1BA70CBD000
trusted library allocation
page read and write
1BA5E024000
heap
page read and write
1BA7180C000
trusted library allocation
page read and write
1C5B7494000
heap
page read and write
1BA72387000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
283569F0000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA5DFB3000
heap
page read and write
1BA66FD0000
trusted library allocation
page read and write
1BA5DF9E000
heap
page read and write
1BA72FDA000
trusted library allocation
page read and write
1BA6A5A4000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA5E004000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA6F7BA000
trusted library allocation
page read and write
1BA5DFBC000
heap
page read and write
1BA641F8000
trusted library allocation
page read and write
1BA668D6000
trusted library allocation
page read and write
1BA5DFB5000
heap
page read and write
1BA730D3000
trusted library allocation
page read and write
1A91BFE000
stack
page read and write
1BA68AC1000
trusted library allocation
page read and write
1BA6F83D000
trusted library allocation
page read and write
1BA6F6BD000
trusted library allocation
page read and write
1BA6F875000
trusted library allocation
page read and write
1BA6F8C4000
trusted library allocation
page read and write
28357067000
heap
page read and write
1BA641EA000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA6787C000
trusted library allocation
page read and write
1BA5DFAF000
heap
page read and write
1BA5DFC3000
heap
page read and write
1BA70B18000
trusted library allocation
page read and write
1BA70C9A000
trusted library allocation
page read and write
28356880000
heap
page read and write
1BA70DA7000
trusted library allocation
page read and write
1BA70D40000
trusted library allocation
page read and write
28356EF1000
heap
page read and write
28356F5C000
heap
page read and write
1BA688F0000
trusted library allocation
page read and write
1BA5DFBC000
heap
page read and write
2A02E603000
heap
page read and write
1BA730E5000
trusted library allocation
page read and write
1BA697F7000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
1BA6749E000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5DFCE000
heap
page read and write
1BA67BE5000
trusted library allocation
page read and write
1BA5DFAF000
heap
page read and write
1BA5DFA4000
heap
page read and write
2A030143000
heap
page read and write
1BA6994B000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA68C96000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
1C5B7532000
trusted library allocation
page read and write
1BA684FC000
trusted library allocation
page read and write
1BA71572000
trusted library allocation
page read and write
1BA70BA8000
trusted library allocation
page read and write
1BA70BD7000
trusted library allocation
page read and write
1BA684FC000
trusted library allocation
page read and write
1BA6A9D3000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
1BA6F7BA000
trusted library allocation
page read and write
1BA674CF000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA641EA000
trusted library allocation
page read and write
1BA6F0AF000
trusted library allocation
page read and write
1BA64335000
trusted library allocation
page read and write
1BA67887000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA68CCC000
trusted library allocation
page read and write
894000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA66881000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA5DFC6000
heap
page read and write
1BA5E02B000
heap
page read and write
1BA6F8D2000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA70CAD000
trusted library allocation
page read and write
1BA70D98000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA66F7D000
trusted library allocation
page read and write
1BA666BC000
trusted library allocation
page read and write
1BA67448000
trusted library allocation
page read and write
1BA68C46000
trusted library allocation
page read and write
1BA6F162000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA66FE9000
trusted library allocation
page read and write
1BA6928A000
trusted library allocation
page read and write
1BA72F8C000
trusted library allocation
page read and write
1BA66D7B000
trusted library allocation
page read and write
894000
heap
page read and write
1BA72F0D000
trusted library allocation
page read and write
1BA723D4000
trusted library allocation
page read and write
23B96270000
unclassified section
page readonly
1BA62990000
trusted library allocation
page read and write
1BA6F152000
trusted library allocation
page read and write
1BA68AFE000
trusted library allocation
page read and write
1BA6A53D000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
894000
heap
page read and write
1BA730F9000
trusted library allocation
page read and write
1BA5DFB3000
heap
page read and write
1BA72456000
trusted library allocation
page read and write
1BA6F0D4000
trusted library allocation
page read and write
1BA67BE0000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA68C96000
trusted library allocation
page read and write
1BA698C1000
trusted library allocation
page read and write
1BA68480000
trusted library allocation
page read and write
1BA69398000
trusted library allocation
page read and write
1BA66FC8000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA66E04000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA684FE000
trusted library allocation
page read and write
1BA69996000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA70AC3000
trusted library allocation
page read and write
1BA674B2000
trusted library allocation
page read and write
1BA68A00000
trusted library allocation
page read and write
1BA674CF000
trusted library allocation
page read and write
1BA66B10000
heap
page read and write
28357048000
heap
page read and write
1BA70B77000
trusted library allocation
page read and write
1BA69A75000
trusted library allocation
page read and write
1BA5DFDB000
heap
page read and write
2835701A000
heap
page read and write
1BA6F8B5000
trusted library allocation
page read and write
1BA717E5000
trusted library allocation
page read and write
1BA68CB4000
trusted library allocation
page read and write
1BA72B84000
trusted library allocation
page read and write
1BA62FFB000
trusted library allocation
page read and write
1BA68B2A000
trusted library allocation
page read and write
1BA6722A000
trusted library allocation
page read and write
23B96624000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA6415D000
trusted library allocation
page read and write
1BA66869000
trusted library allocation
page read and write
1BA68474000
trusted library allocation
page read and write
1BA630A3000
trusted library allocation
page read and write
1BA67867000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFB9000
heap
page read and write
1BA6906E000
trusted library allocation
page read and write
1BA6A5A0000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
2582AB00000
trusted library allocation
page read and write
1BA683CF000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA67436000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA6A5E7000
trusted library allocation
page read and write
1BA70B3C000
trusted library allocation
page read and write
1BA5DFD4000
heap
page read and write
1BA6F1D0000
trusted library allocation
page read and write
1BA67852000
trusted library allocation
page read and write
1BA72FD2000
trusted library allocation
page read and write
1BA6F7DA000
trusted library allocation
page read and write
1BA66D87000
trusted library allocation
page read and write
1C5B71DF000
unclassified section
page read and write
1BA5DFAE000
heap
page read and write
1BA7152E000
trusted library allocation
page read and write
1BA6F677000
trusted library allocation
page read and write
1BA730EB000
trusted library allocation
page read and write
1BA66ECE000
trusted library allocation
page read and write
1BA68B9B000
trusted library allocation
page read and write
1BA68450000
trusted library allocation
page read and write
1BA724A9000
trusted library allocation
page read and write
1BA63FFD000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA674FA000
trusted library allocation
page read and write
33D1000
heap
page read and write
1BA5DFA1000
heap
page read and write
1BA674B8000
trusted library allocation
page read and write
1BA6F7F3000
trusted library allocation
page read and write
1BA6F85D000
trusted library allocation
page read and write
1A935BE000
stack
page read and write
2A02E800000
trusted library allocation
page read and write
1BA693B0000
trusted library allocation
page read and write
1BA6EF3C000
trusted library allocation
page read and write
1BA5DFC1000
heap
page read and write
1BA70BDF000
trusted library allocation
page read and write
1BA678CB000
trusted library allocation
page read and write
1BA5DFC6000
heap
page read and write
1BA5DFA2000
heap
page read and write
28356F59000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA70DAC000
trusted library allocation
page read and write
1BA6F152000
trusted library allocation
page read and write
23B96600000
trusted library allocation
page read and write
1BA6A8FD000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA67BCF000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
1BA67BF7000
trusted library allocation
page read and write
1BA6F0D8000
trusted library allocation
page read and write
1BA66D9D000
trusted library allocation
page read and write
1BA68CF4000
trusted library allocation
page read and write
1BA70DAC000
trusted library allocation
page read and write
1BA6A568000
trusted library allocation
page read and write
1BA5E024000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA641EA000
trusted library allocation
page read and write
1BA642EB000
trusted library allocation
page read and write
1BA5DFCC000
heap
page read and write
1BA67836000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA72FAC000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA6A5F7000
trusted library allocation
page read and write
28356F50000
heap
page read and write
23B96613000
trusted library allocation
page read and write
1BA66D7B000
trusted library allocation
page read and write
1BA63F42000
trusted library allocation
page read and write
1BA66FF8000
trusted library allocation
page read and write
1BA6F3A4000
trusted library allocation
page read and write
1BA629DF000
trusted library allocation
page read and write
283569C1000
unkown
page execute read
1BA5E01D000
heap
page read and write
1BA66660000
trusted library allocation
page read and write
1BA6F3D1000
trusted library allocation
page read and write
1BA5DFCB000
heap
page read and write
1BA730DC000
trusted library allocation
page read and write
1BA6F6BD000
trusted library allocation
page read and write
1BA717C8000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA6F8A5000
trusted library allocation
page read and write
1BA72476000
trusted library allocation
page read and write
1BA7192C000
trusted library allocation
page read and write
1BA62F23000
trusted library allocation
page read and write
1BA66628000
trusted library allocation
page read and write
1BA6F8A9000
trusted library allocation
page read and write
1C5B6FF0000
unclassified section
page readonly
1BA678BC000
trusted library allocation
page read and write
1BA6F699000
trusted library allocation
page read and write
28356369000
trusted library allocation
page read and write
1BA6F85F000
trusted library allocation
page read and write
2835702B000
heap
page read and write
1BA6A5C1000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA70CC6000
trusted library allocation
page read and write
1BA688D7000
trusted library allocation
page read and write
1BA6842E000
trusted library allocation
page read and write
1BA7231F000
trusted library allocation
page read and write
1BA674EC000
trusted library allocation
page read and write
1BA7254C000
heap
page read and write
1BA6F0D6000
trusted library allocation
page read and write
1BA6983C000
trusted library allocation
page read and write
28357067000
heap
page read and write
1BA70D26000
trusted library allocation
page read and write
1BA66F51000
trusted library allocation
page read and write
1BA688D7000
trusted library allocation
page read and write
1BA683CF000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA64266000
trusted library allocation
page read and write
1BA723ED000
trusted library allocation
page read and write
C88DFFE000
stack
page read and write
1BA70C4B000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA58B28000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA66E4A000
trusted library allocation
page read and write
1BA688C8000
trusted library allocation
page read and write
1BD0003F000
trusted library allocation
page read and write
1BA67BC0000
trusted library allocation
page read and write
1BA5DFB1000
heap
page read and write
1BA70DB6000
trusted library allocation
page read and write
F66772E000
unkown
page readonly
1BA6F623000
trusted library allocation
page read and write
1BA6A8F5000
trusted library allocation
page read and write
1BA6846F000
trusted library allocation
page read and write
1BA6F7C1000
trusted library allocation
page read and write
1BA66D65000
trusted library allocation
page read and write
9E0000
heap
page read and write
1BA66DAF000
trusted library allocation
page read and write
1BA730CA000
trusted library allocation
page read and write
1BA64114000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA674AE000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA5E026000
heap
page read and write
1BA6973B000
trusted library allocation
page read and write
1BA6F79B000
trusted library allocation
page read and write
1BA64178000
trusted library allocation
page read and write
1BA70C4F000
trusted library allocation
page read and write
1BA5DFB5000
heap
page read and write
1BA66672000
trusted library allocation
page read and write
1BA64238000
trusted library allocation
page read and write
1BA6A5D4000
trusted library allocation
page read and write
1BA6831C000
trusted library allocation
page read and write
1BA5DFC4000
heap
page read and write
2835702B000
heap
page read and write
1BA5DFFA000
heap
page read and write
C88E87C000
stack
page read and write
23B96666000
trusted library allocation
page read and write
1BA6783B000
trusted library allocation
page read and write
1BA697AD000
trusted library allocation
page read and write
1BA6F343000
trusted library allocation
page read and write
1BA6F68B000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
1BA6F3C8000
trusted library allocation
page read and write
1BA6F3D1000
trusted library allocation
page read and write
1BA6F3DB000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA6785F000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA699C8000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA72FDA000
trusted library allocation
page read and write
28356F50000
heap
page read and write
1BA70B1A000
trusted library allocation
page read and write
1BA70B05000
trusted library allocation
page read and write
1BA73092000
trusted library allocation
page read and write
1BA67897000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA68AE2000
trusted library allocation
page read and write
1BA66F54000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
23B96250000
remote allocation
page read and write
1BA6A549000
trusted library allocation
page read and write
1BA6F3AF000
trusted library allocation
page read and write
1BA67BA0000
trusted library allocation
page read and write
1BA5DFC4000
heap
page read and write
1BA6880A000
trusted library allocation
page read and write
1BA70CA1000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA66FE2000
trusted library allocation
page read and write
1BA5DFC0000
heap
page read and write
1BA69724000
trusted library allocation
page read and write
1BA684D2000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA70AA8000
trusted library allocation
page read and write
1BA7298B000
trusted library allocation
page read and write
1BA5DFD5000
heap
page read and write
1BA63F95000
trusted library allocation
page read and write
1BA6F3B8000
trusted library allocation
page read and write
1BA666F5000
trusted library allocation
page read and write
1BA6F0DE000
trusted library allocation
page read and write
1BA5DFC3000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA6F6AB000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA699CF000
trusted library allocation
page read and write
28356F4C000
heap
page read and write
1BA5DFD6000
heap
page read and write
1BA67843000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA66B77000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA6F8CD000
trusted library allocation
page read and write
1BA6F1EF000
trusted library allocation
page read and write
1BA6F8C3000
trusted library allocation
page read and write
1BA71843000
trusted library allocation
page read and write
1BA5DF84000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA5DFD2000
heap
page read and write
1BA66E8C000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA66678000
trusted library allocation
page read and write
1BA5DFCD000
heap
page read and write
1BA5E01B000
heap
page read and write
1BA70C42000
trusted library allocation
page read and write
1BA674B8000
trusted library allocation
page read and write
1BA6973E000
trusted library allocation
page read and write
1BA69743000
trusted library allocation
page read and write
1BA70DE0000
trusted library allocation
page read and write
1BA6F644000
trusted library allocation
page read and write
1BA66FA6000
trusted library allocation
page read and write
1BA66F78000
trusted library allocation
page read and write
1BA674CF000
trusted library allocation
page read and write
1BA6F290000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA6F7C7000
trusted library allocation
page read and write
2835702B000
heap
page read and write
28356381000
trusted library allocation
page read and write
283569CB000
unkown
page execute read
1BA68C33000
trusted library allocation
page read and write
1BA6A515000
trusted library allocation
page read and write
1BA67897000
trusted library allocation
page read and write
E6D6DFF000
stack
page read and write
1BA6F13B000
trusted library allocation
page read and write
1BA730C2000
trusted library allocation
page read and write
1BA683C5000
trusted library allocation
page read and write
1BA5DFA6000
heap
page read and write
1BA66D6D000
trusted library allocation
page read and write
1BA6990A000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA73098000
trusted library allocation
page read and write
1BA6688F000
trusted library allocation
page read and write
1BA70B63000
trusted library allocation
page read and write
1BA6F6AB000
trusted library allocation
page read and write
1BA70B22000
trusted library allocation
page read and write
1BA6944D000
trusted library allocation
page read and write
1BA70CB7000
trusted library allocation
page read and write
1BA69769000
trusted library allocation
page read and write
1BA66D93000
trusted library allocation
page read and write
1BA68C96000
trusted library allocation
page read and write
1BA697DA000
trusted library allocation
page read and write
1BA68436000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA64160000
trusted library allocation
page read and write
1BA698BB000
trusted library allocation
page read and write
1BA674A7000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA6F7F3000
trusted library allocation
page read and write
1BA666BC000
trusted library allocation
page read and write
1BA629C6000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA5E004000
heap
page read and write
1BA5DFD2000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA723AA000
trusted library allocation
page read and write
1BA6F354000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA6F89C000
trusted library allocation
page read and write
1BA70D59000
trusted library allocation
page read and write
1BA6A68D000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
1BA730FC000
trusted library allocation
page read and write
1BA672B6000
trusted library allocation
page read and write
1BA6301E000
trusted library allocation
page read and write
1BA70D19000
trusted library allocation
page read and write
1BA678A6000
trusted library allocation
page read and write
1BA6783A000
trusted library allocation
page read and write
1BA6F8FD000
trusted library allocation
page read and write
A04000
heap
page read and write
1BA5DFAC000
heap
page read and write
1BA70C54000
trusted library allocation
page read and write
1BA5E022000
heap
page read and write
1BA68B40000
trusted library allocation
page read and write
1BA67445000
trusted library allocation
page read and write
1BA730E5000
trusted library allocation
page read and write
1BA67293000
trusted library allocation
page read and write
1BA6F8E6000
trusted library allocation
page read and write
1BA67251000
trusted library allocation
page read and write
1BA5E01A000
heap
page read and write
28356BA0000
heap
page read and write
1BA629EF000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA698FC000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA6F3AC000
trusted library allocation
page read and write
1BA6F719000
trusted library allocation
page read and write
1BA70D8B000
trusted library allocation
page read and write
1BA688D4000
trusted library allocation
page read and write
1BA70B42000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
1BA674C3000
trusted library allocation
page read and write
1BA68C79000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA72336000
trusted library allocation
page read and write
1BA6972A000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA6F13B000
trusted library allocation
page read and write
1BA66F9D000
trusted library allocation
page read and write
1BA6970B000
trusted library allocation
page read and write
1BA6F6FB000
trusted library allocation
page read and write
1BA724A5000
trusted library allocation
page read and write
1BA68CD3000
trusted library allocation
page read and write
1BA66F95000
trusted library allocation
page read and write
1BA70C40000
trusted library allocation
page read and write
1BA6728A000
trusted library allocation
page read and write
28356379000
trusted library allocation
page read and write
1BA6F0E4000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA68B0C000
trusted library allocation
page read and write
1BA70C40000
trusted library allocation
page read and write
1BA698BB000
trusted library allocation
page read and write
1BA5DFCD000
heap
page read and write
1BA70ABD000
trusted library allocation
page read and write
1BA6F356000
trusted library allocation
page read and write
1BA678BA000
trusted library allocation
page read and write
1BA6F853000
trusted library allocation
page read and write
1BA6F75F000
trusted library allocation
page read and write
28356F91000
heap
page read and write
1BA5DFDA000
heap
page read and write
23B9641A000
heap
page read and write
1BA6F1E0000
trusted library allocation
page read and write
1BA72F95000
trusted library allocation
page read and write
1BA5DFCD000
heap
page read and write
1BA694FD000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA66E9E000
trusted library allocation
page read and write
1BA6844E000
trusted library allocation
page read and write
1BA6660A000
trusted library allocation
page read and write
1BA5E026000
heap
page read and write
1BA6995E000
trusted library allocation
page read and write
1BA5DFC2000
heap
page read and write
1BA5DFA8000
heap
page read and write
1BA66B7A000
heap
page read and write
1BA5DFD3000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA6F863000
trusted library allocation
page read and write
1BA6F86D000
trusted library allocation
page read and write
2582AAB0000
heap
page read and write
28356200000
trusted library allocation
page read and write
1BA73044000
trusted library allocation
page read and write
1BA63F33000
trusted library allocation
page read and write
1BA70B58000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA6F08D000
trusted library allocation
page read and write
1BA6F1F6000
trusted library allocation
page read and write
1BA6A688000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5DFDA000
heap
page read and write
1BA68BE7000
trusted library allocation
page read and write
1BA71906000
trusted library allocation
page read and write
1BA72468000
trusted library allocation
page read and write
1BA6F266000
trusted library allocation
page read and write
1BA6F642000
trusted library allocation
page read and write
1BA71807000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA7306B000
trusted library allocation
page read and write
1BA6F139000
trusted library allocation
page read and write
1BA67494000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
1BA68A93000
trusted library allocation
page read and write
1BA67BC8000
trusted library allocation
page read and write
1BA66D4E000
trusted library allocation
page read and write
1BA63FE7000
trusted library allocation
page read and write
1BA66622000
trusted library allocation
page read and write
1BA6F8D2000
trusted library allocation
page read and write
1BA6B293000
trusted library allocation
page read and write
1BA7186D000
trusted library allocation
page read and write
1BA66D73000
trusted library allocation
page read and write
1BA6F756000
trusted library allocation
page read and write
1BA69394000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA67270000
trusted library allocation
page read and write
1BA67886000
trusted library allocation
page read and write
1BA6B237000
trusted library allocation
page read and write
1BA70B4D000
trusted library allocation
page read and write
1BA641EB000
trusted library allocation
page read and write
1BA6988B000
trusted library allocation
page read and write
1BA73038000
trusted library allocation
page read and write
28355FDE000
remote allocation
page execute read
1BA5DFFA000
heap
page read and write
1BA66E76000
trusted library allocation
page read and write
1BA678B8000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA6846F000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA5E01D000
heap
page read and write
23B9665D000
trusted library allocation
page read and write
1BA66DD2000
trusted library allocation
page read and write
1BA66E07000
trusted library allocation
page read and write
28356FD3000
heap
page read and write
1BA5E02B000
heap
page read and write
970000
heap
page read and write
1BA67429000
trusted library allocation
page read and write
1BA67463000
trusted library allocation
page read and write
1BA64157000
trusted library allocation
page read and write
1BA6945E000
trusted library allocation
page read and write
1BA70AF3000
trusted library allocation
page read and write
F2C000
unkown
page readonly
1BA68C5B000
trusted library allocation
page read and write
1BA73027000
trusted library allocation
page read and write
28356FD8000
heap
page read and write
1BA5DFFA000
heap
page read and write
28356F50000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA70AC3000
trusted library allocation
page read and write
1BA68CA7000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA683F7000
trusted library allocation
page read and write
283561CF000
unclassified section
page read and write
1BA5DFBA000
heap
page read and write
1BA68886000
trusted library allocation
page read and write
1BA642AE000
trusted library allocation
page read and write
28357059000
heap
page read and write
1BA5DFC0000
heap
page read and write
1BA674CF000
trusted library allocation
page read and write
1BA5DFC4000
heap
page read and write
1BA64273000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA684FC000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
28356300000
trusted library allocation
page read and write
1BA642DC000
trusted library allocation
page read and write
1BA62F2F000
trusted library allocation
page read and write
1BA5DFC9000
heap
page read and write
1BA67479000
trusted library allocation
page read and write
1BA70C51000
trusted library allocation
page read and write
1BA6988C000
trusted library allocation
page read and write
1BA6F71E000
trusted library allocation
page read and write
1BA70CE0000
trusted library allocation
page read and write
1BA6F1EF000
trusted library allocation
page read and write
1BA70C4A000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA66D9F000
trusted library allocation
page read and write
2835701A000
heap
page read and write
1BA6743A000
trusted library allocation
page read and write
1BA67494000
trusted library allocation
page read and write
1BA5DFCD000
heap
page read and write
1BA5DFD4000
heap
page read and write
1BA68B10000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA5DFAF000
heap
page read and write
1BA70BFE000
trusted library allocation
page read and write
1BA70D91000
trusted library allocation
page read and write
1BA5DFD5000
heap
page read and write
1BA6F875000
trusted library allocation
page read and write
1BA70C8B000
trusted library allocation
page read and write
890000
heap
page read and write
1BA66FD9000
trusted library allocation
page read and write
1BA5DFAE000
heap
page read and write
1BA70C7B000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA68459000
trusted library allocation
page read and write
1BA68474000
trusted library allocation
page read and write
1BA6688F000
trusted library allocation
page read and write
1BA6F875000
trusted library allocation
page read and write
1BA6F8A7000
trusted library allocation
page read and write
1BA6A9EC000
trusted library allocation
page read and write
1BA668A0000
trusted library allocation
page read and write
1BA70CB2000
trusted library allocation
page read and write
1BA6F78E000
trusted library allocation
page read and write
1BA67818000
trusted library allocation
page read and write
1BA63F42000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA70C46000
trusted library allocation
page read and write
1BA66FD9000
trusted library allocation
page read and write
1BA6F7EF000
trusted library allocation
page read and write
1BA66D87000
trusted library allocation
page read and write
1BA66E77000
trusted library allocation
page read and write
1BA70CA4000
trusted library allocation
page read and write
28356323000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5E004000
heap
page read and write
1BA5DFD4000
heap
page read and write
1BA66B10000
heap
page read and write
1BA67897000
trusted library allocation
page read and write
1BA6F8EB000
trusted library allocation
page read and write
1BA6F7EF000
trusted library allocation
page read and write
1BA70DCA000
trusted library allocation
page read and write
1BA6F6FB000
trusted library allocation
page read and write
1BA66FC3000
trusted library allocation
page read and write
1BA672FE000
trusted library allocation
page read and write
1BA6F7BC000
trusted library allocation
page read and write
1BA67897000
trusted library allocation
page read and write
1BA67840000
trusted library allocation
page read and write
1BA683D1000
trusted library allocation
page read and write
1BA6745C000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA723ED000
trusted library allocation
page read and write
1BA6F187000
trusted library allocation
page read and write
1BA66FCE000
trusted library allocation
page read and write
1BA72501000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA67863000
trusted library allocation
page read and write
1BA5E02C000
heap
page read and write
6AFF9903000
trusted library allocation
page read and write
1BA5DFCD000
heap
page read and write
1BA5E004000
heap
page read and write
1BA72B38000
trusted library allocation
page read and write
1BA723CE000
trusted library allocation
page read and write
1BA5DFBB000
heap
page read and write
1BA693EE000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
23B96617000
trusted library allocation
page read and write
1BA63F42000
trusted library allocation
page read and write
1BA699BD000
trusted library allocation
page read and write
1BA5DFCB000
heap
page read and write
1BA5E02C000
heap
page read and write
1BA70DCC000
trusted library allocation
page read and write
1BA70BD7000
trusted library allocation
page read and write
CB8A3FB000
stack
page read and write
1BA5DFD0000
heap
page read and write
1BA684E4000
trusted library allocation
page read and write
1BA684F7000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA6F7EF000
trusted library allocation
page read and write
1BA67BBE000
trusted library allocation
page read and write
1BA6F363000
trusted library allocation
page read and write
1BA6415D000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA5E023000
heap
page read and write
1BA70CBA000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
A00000
heap
page read and write
1BA698C3000
trusted library allocation
page read and write
1BA66D9D000
trusted library allocation
page read and write
1BA70BC3000
trusted library allocation
page read and write
1BA70A63000
trusted library allocation
page read and write
1BA5DF9D000
heap
page read and write
1BA5DFC8000
heap
page read and write
1BA5DFAF000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA688BE000
trusted library allocation
page read and write
1BA5DFA3000
heap
page read and write
1BA5DFB6000
heap
page read and write
1BA70D9D000
trusted library allocation
page read and write
1BA63090000
trusted library allocation
page read and write
1BA5DFC4000
heap
page read and write
1BA67212000
trusted library allocation
page read and write
F6676EE000
stack
page read and write
1BA68B51000
trusted library allocation
page read and write
1BA5DFC1000
heap
page read and write
1BA69343000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA6F6CB000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA5DFFA000
heap
page read and write
1BA70B10000
trusted library allocation
page read and write
1BA678CB000
trusted library allocation
page read and write
1BA70BE1000
trusted library allocation
page read and write
1BA6A5DC000
trusted library allocation
page read and write
1BA5DFC0000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA672E0000
trusted library allocation
page read and write
1BA6F035000
trusted library allocation
page read and write
1BA5DFAC000
heap
page read and write
1BA5E01D000
heap
page read and write
1BA674CF000
trusted library allocation
page read and write
1BA72375000
trusted library allocation
page read and write
1BA6F2E8000
trusted library allocation
page read and write
1BA674A0000
trusted library allocation
page read and write
1BA68467000
trusted library allocation
page read and write
1BA67BFA000
trusted library allocation
page read and write
1BA6742C000
trusted library allocation
page read and write
1BA66626000
trusted library allocation
page read and write
1BA5DFA3000
heap
page read and write
1BA5DFB7000
heap
page read and write
1BA630F9000
trusted library allocation
page read and write
1BA5DFC3000
heap
page read and write
1BA6F682000
trusted library allocation
page read and write
1BA6F8AF000
trusted library allocation
page read and write
1BA73070000
trusted library allocation
page read and write
1BA6F8E6000
trusted library allocation
page read and write
1BA6F7EF000
trusted library allocation
page read and write
1BA6F8A9000
trusted library allocation
page read and write
1C5B71D0000
unclassified section
page read and write
1BA70AB1000
trusted library allocation
page read and write
1BA68BFE000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA69500000
trusted library allocation
page read and write
1BA5E023000
heap
page read and write
1BA6F6EE000
trusted library allocation
page read and write
283561C2000
unclassified section
page read and write
1BA5E004000
heap
page read and write
1BA70CFE000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA6780F000
trusted library allocation
page read and write
1BA5DFC1000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA63F2D000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
28356F3D000
heap
page read and write
1BA5DFC8000
heap
page read and write
1BA6F3DB000
trusted library allocation
page read and write
28357049000
heap
page read and write
1BA5DFD0000
heap
page read and write
1BA5E01B000
heap
page read and write
1BA69785000
trusted library allocation
page read and write
1BA70BE1000
trusted library allocation
page read and write
1BA6F8D2000
trusted library allocation
page read and write
1BA66E76000
trusted library allocation
page read and write
28356886000
heap
page read and write
1BA684E2000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5E01D000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA641CB000
trusted library allocation
page read and write
1BA6A9F7000
trusted library allocation
page read and write
1BA68467000
trusted library allocation
page read and write
1BA70DAE000
trusted library allocation
page read and write
1BA5DFCC000
heap
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA5DF84000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA6949F000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA5DF9E000
heap
page read and write
1BA6973E000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA674FA000
trusted library allocation
page read and write
1BA5DFB9000
heap
page read and write
1BA66FA3000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA5DFB2000
heap
page read and write
1BA66E3C000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA6F8E8000
trusted library allocation
page read and write
1BA5DFCA000
heap
page read and write
345B7F2E000
trusted library allocation
page execute read
1BA6F8B5000
trusted library allocation
page read and write
1C5B732E000
trusted library allocation
page read and write
1BA70BC3000
trusted library allocation
page read and write
1BA66E6A000
trusted library allocation
page read and write
1BA69921000
trusted library allocation
page read and write
1BA718A7000
trusted library allocation
page read and write
7EF000
stack
page read and write
1BA5E023000
heap
page read and write
1BA697D3000
trusted library allocation
page read and write
1BA6F6B0000
trusted library allocation
page read and write
1BA5DFBE000
heap
page read and write
1BA5E023000
heap
page read and write
1BA72446000
trusted library allocation
page read and write
1BA6F3C3000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA5E01B000
heap
page read and write
1BA5DFD3000
heap
page read and write
1BA6F1ED000
trusted library allocation
page read and write
CB8C3FE000
stack
page read and write
1BA70DFD000
trusted library allocation
page read and write
1BA68467000
trusted library allocation
page read and write
1BA6F162000
trusted library allocation
page read and write
1BA678BC000
trusted library allocation
page read and write
1BA6F7C7000
trusted library allocation
page read and write
1BA72F2C000
trusted library allocation
page read and write
F66A9FE000
unkown
page readonly
1BA5E01B000
heap
page read and write
1BA674A3000
trusted library allocation
page read and write
1BA5DFA4000
heap
page read and write
23B963F0000
heap
page read and write
1BA66660000
trusted library allocation
page read and write
1BA70D91000
trusted library allocation
page read and write
1BA73038000
trusted library allocation
page read and write
1BA70B1D000
trusted library allocation
page read and write
1BA70D2D000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA67892000
trusted library allocation
page read and write
1C5B7310000
trusted library allocation
page read and write
1BA678BC000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
1BA68449000
trusted library allocation
page read and write
1BA70DCB000
trusted library allocation
page read and write
1BA684F1000
trusted library allocation
page read and write
1BA69211000
trusted library allocation
page read and write
1BA6AB93000
trusted library allocation
page read and write
1BA66B61000
heap
page read and write
1BA70C4F000
trusted library allocation
page read and write
1BA5DFDA000
heap
page read and write
1BA6F6EE000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA69A61000
trusted library allocation
page read and write
1BA66D8D000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
1BA641EF000
trusted library allocation
page read and write
1BA6422C000
trusted library allocation
page read and write
1BA70B0A000
trusted library allocation
page read and write
283561D0000
trusted library allocation
page read and write
1BA6F178000
trusted library allocation
page read and write
1BA5DFD5000
heap
page read and write
1BA678ED000
trusted library allocation
page read and write
1BA668C9000
trusted library allocation
page read and write
1BA68459000
trusted library allocation
page read and write
1BA6F8A7000
trusted library allocation
page read and write
1BA6F0E1000
trusted library allocation
page read and write
1BA5DFA2000
heap
page read and write
1BA718A3000
trusted library allocation
page read and write
1BA5E025000
heap
page read and write
1BA6F18B000
trusted library allocation
page read and write
1BA67BDE000
trusted library allocation
page read and write
1BA68B13000
trusted library allocation
page read and write
1BA6415F000
trusted library allocation
page read and write
1BA6F7B2000
trusted library allocation
page read and write
1BA678B6000
trusted library allocation
page read and write
1BA5E01B000
heap
page read and write
1BA70B4D000
trusted library allocation
page read and write
1BA5DFB4000
heap
page read and write
1BA70C42000
trusted library allocation
page read and write
1BA66E9E000
trusted library allocation
page read and write
1BA6743C000
trusted library allocation
page read and write
1BA69A2F000
trusted library allocation
page read and write
1C5B7608000
heap
page read and write
1BA678AF000
trusted library allocation
page read and write
A30000
heap
page read and write
1C5B7490000
heap
page read and write
1BA70D98000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA66FAA000
trusted library allocation
page read and write
1BA6F7EF000
trusted library allocation
page read and write
1BA6F34A000
trusted library allocation
page read and write
1BA5DFB3000
heap
page read and write
1BA6F8AF000
trusted library allocation
page read and write
1BA7249B000
trusted library allocation
page read and write
1BA5DFD2000
heap
page read and write
1BA70D56000
trusted library allocation
page read and write
1BA699AB000
trusted library allocation
page read and write
1BA6F8F5000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA5DFD4000
heap
page read and write
1BA5DFBB000
heap
page read and write
1BA5DFA2000
heap
page read and write
1BA6F8EC000
trusted library allocation
page read and write
1BA678F6000
trusted library allocation
page read and write
1BA5DFA6000
heap
page read and write
1BA730E5000
trusted library allocation
page read and write
1BA6A9D1000
trusted library allocation
page read and write
CB8ABFD000
stack
page read and write
1BA70CAD000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA70CA1000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA5DFA7000
heap
page read and write
1BA67863000
trusted library allocation
page read and write
1BA66FE2000
trusted library allocation
page read and write
1BA6975E000
trusted library allocation
page read and write
1BA5DFD4000
heap
page read and write
1BA70BFE000
trusted library allocation
page read and write
33D1000
heap
page read and write
1BA72441000
trusted library allocation
page read and write
1BA674B8000
trusted library allocation
page read and write
1BA6742B000
trusted library allocation
page read and write
1BA678F3000
trusted library allocation
page read and write
1BA6AB23000
trusted library allocation
page read and write
1BA5DFC5000
heap
page read and write
1BA683F7000
trusted library allocation
page read and write
1BA70C51000
trusted library allocation
page read and write
1BA7292B000
trusted library allocation
page read and write
1BA730D9000
trusted library allocation
page read and write
1BA698B9000
trusted library allocation
page read and write
1BA7248F000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA6F0DD000
trusted library allocation
page read and write
1BA72F29000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA6F8B1000
trusted library allocation
page read and write
A60000
heap
page read and write
1BA5DFA4000
heap
page read and write
1BA5DFD6000
heap
page read and write
1BA6F89F000
trusted library allocation
page read and write
1BA698A5000
trusted library allocation
page read and write
1BA70C8D000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA69ACD000
trusted library allocation
page read and write
1BA6F343000
trusted library allocation
page read and write
1BA678B7000
trusted library allocation
page read and write
1BA6975E000
trusted library allocation
page read and write
1BA70DA4000
trusted library allocation
page read and write
1BA70BEB000
trusted library allocation
page read and write
1BA66C00000
trusted library allocation
page read and write
1BA684F1000
trusted library allocation
page read and write
1BA6729C000
trusted library allocation
page read and write
1BA69357000
trusted library allocation
page read and write
1BA5E02B000
heap
page read and write
1BA6983C000
trusted library allocation
page read and write
1BA5DFBC000
heap
page read and write
1BA5DFB1000
heap
page read and write
1BA70D8D000
trusted library allocation
page read and write
1BA688F0000
trusted library allocation
page read and write
1BA70DB1000
trusted library allocation
page read and write
1BA6F8F7000
trusted library allocation
page read and write
1BA6F0C3000
trusted library allocation
page read and write
1BA70A23000
trusted library allocation
page read and write
1BA5E027000
heap
page read and write
1BA698FC000
trusted library allocation
page read and write
1BA6688C000
trusted library allocation
page read and write
1BA6EECD000
trusted library allocation
page read and write
1BA66D4E000
trusted library allocation
page read and write
1BA6A6D7000
trusted library allocation
page read and write
1BA697CE000
trusted library allocation
page read and write
1BA674FD000
trusted library allocation
page read and write
C88E8BE000
unkown
page readonly
2835635C000
trusted library allocation
page read and write
1BA5DFB2000
heap
page read and write
1BA5DFB4000
heap
page read and write
1BA5E025000
heap
page read and write
2A02E990000
heap
page read and write
1BA5E02C000
heap
page read and write
1BA63FD3000
trusted library allocation
page read and write
1BA6F8FB000
trusted library allocation
page read and write
1BA6F0D8000
trusted library allocation
page read and write
1BA72365000
trusted library allocation
page read and write
1BA68AA8000
trusted library allocation
page read and write
1BA66F78000
trusted library allocation
page read and write
1BA6973B000
trusted library allocation
page read and write
1BA6F8F7000
trusted library allocation
page read and write
1BA5DFD3000
heap
page read and write
1BA698C5000
trusted library allocation
page read and write
23B96900000
trusted library allocation
page read and write
1BA62981000
trusted library allocation
page read and write
1BA6F853000
trusted library allocation
page read and write
1BA5E01D000
heap
page read and write
1BA67863000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
28356FD1000
heap
page read and write
1BA6972A000
trusted library allocation
page read and write
1BA5E004000
heap
page read and write
1BA6A6DD000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA70B63000
trusted library allocation
page read and write
1BA668A8000
trusted library allocation
page read and write
1BA5DFFA000
heap
page read and write
1BA67899000
trusted library allocation
page read and write
1BA66FD9000
trusted library allocation
page read and write
1BA66E8E000
trusted library allocation
page read and write
23B96603000
trusted library allocation
page read and write
1BA6EFD0000
trusted library allocation
page read and write
28355F70000
unclassified section
page readonly
1BA67494000
trusted library allocation
page read and write
1BA70BB3000
trusted library allocation
page read and write
1BA70BEB000
trusted library allocation
page read and write
1BA70B70000
trusted library allocation
page read and write
1BA6F372000
trusted library allocation
page read and write
1BA6F8EB000
trusted library allocation
page read and write
1BA70BC3000
trusted library allocation
page read and write
1BA6F194000
trusted library allocation
page read and write
1BA5DF9E000
heap
page read and write
1BA68B22000
trusted library allocation
page read and write
A70000
heap
page read and write
1BA641F8000
trusted library allocation
page read and write
1C5B7180000
heap
page readonly
1BA70DE4000
trusted library allocation
page read and write
1BA5DFD0000
heap
page read and write
1BA64266000
trusted library allocation
page read and write
1BA68CD2000
trusted library allocation
page read and write
1BA62F71000
trusted library allocation
page read and write
1BA718A7000
trusted library allocation
page read and write
1BA683B9000
trusted library allocation
page read and write
1BA5DFB7000
heap
page read and write
1BA62998000
trusted library allocation
page read and write
1BA64134000
trusted library allocation
page read and write
1BA5DFA8000
heap
page read and write
1BA6A524000
trusted library allocation
page read and write
1BA642EB000
trusted library allocation
page read and write
28356303000
trusted library allocation
page read and write
1BA6AB00000
trusted library allocation
page read and write
There are 4007 hidden memdumps, click here to show them.