IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_54e4d048-228c-4fbe-bc29-76ec44013f8d.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_54e4d048-228c-4fbe-bc29-76ec44013f8d.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
ASCII text, with very long lines (1717), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 4, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f5b33e7-d113-4847-8deb-63ab7a99d8dc} 6484 "\\.\pipe\gecko-crash-server-pipe.6484" 1ffa3f6d710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3724 -parentBuildID 20230927232528 -prefsHandle 3720 -prefMapHandle 3716 -prefsLen 26265 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dee93147-3765-4cc2-bc3d-54383d42b79d} 6484 "\\.\pipe\gecko-crash-server-pipe.6484" 1ffb640b910 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4980 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3568 -prefMapHandle 4724 -prefsLen 33076 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3c4fb31-33a7-4628-840c-3041c3ce5eed} 6484 "\\.\pipe\gecko-crash-server-pipe.6484" 1ffb4fc2510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://youtube.com/account?=https://ac
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://developer.mozilla.org/docs/Web/API/Element/setPointerCapture
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://www.google.com/complete/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
216.58.212.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
dualstack.reddit.map.fastly.net
151.101.1.140
youtube-ui.l.google.com
142.250.185.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
216.58.212.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1FFAAD92000
heap
page read and write
1FFB5435000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB59F4000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB55C6000
trusted library allocation
page read and write
1FFBC792000
trusted library allocation
page read and write
1FFB7F91000
trusted library allocation
page read and write
1FFBC831000
trusted library allocation
page read and write
1FFB75B3000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB75F9000
trusted library allocation
page read and write
1FFB4070000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
1FFB01F0000
trusted library allocation
page read and write
1FFB1FB7000
trusted library allocation
page read and write
1FFAADCE000
heap
page read and write
1FFB55D0000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB7ADD000
trusted library allocation
page read and write
1FFB67EE000
trusted library allocation
page read and write
1FFB1498000
trusted library allocation
page read and write
1FFB80D3000
trusted library allocation
page read and write
1FFB54E1000
trusted library allocation
page read and write
1FFAAD31000
heap
page read and write
1FFB5873000
trusted library allocation
page read and write
1FFB14F2000
trusted library allocation
page read and write
1FFB7621000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB7F7C000
trusted library allocation
page read and write
1FFB69C3000
trusted library allocation
page read and write
1FFB802F000
trusted library allocation
page read and write
1FFB7D1F000
trusted library allocation
page read and write
1FFB8069000
trusted library allocation
page read and write
1FFB65D9000
trusted library allocation
page read and write
1FFB5435000
trusted library allocation
page read and write
1FFB40FD000
trusted library allocation
page read and write
1FFAF6C9000
trusted library allocation
page read and write
1FFB807E000
trusted library allocation
page read and write
1FFB7C8A000
trusted library allocation
page read and write
1FFB6484000
trusted library allocation
page read and write
1FFB4BFC000
trusted library allocation
page read and write
1FFB40AA000
trusted library allocation
page read and write
1FFB4952000
trusted library allocation
page read and write
1FFB13B6000
trusted library allocation
page read and write
1FFBEBA3000
trusted library allocation
page read and write
7C3AABE000
unkown
page readonly
1FFB7FF7000
trusted library allocation
page read and write
23C25B0C000
trusted library allocation
page read and write
1FFB6AF0000
trusted library allocation
page read and write
1FFB5992000
trusted library allocation
page read and write
1FFB5712000
trusted library allocation
page read and write
1FFAF6F7000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB6AB0000
trusted library allocation
page read and write
1FFB5992000
trusted library allocation
page read and write
1FFB5759000
trusted library allocation
page read and write
19B5940C000
trusted library allocation
page read and write
1FFB5463000
trusted library allocation
page read and write
23C25C80000
unkown
page execute read
23C268E8000
heap
page read and write
1FFAADD6000
heap
page read and write
1FFB5DB0000
trusted library allocation
page read and write
23C26978000
heap
page read and write
1FFB58BB000
trusted library allocation
page read and write
1FFBE15B000
trusted library allocation
page read and write
1FFB57F5000
trusted library allocation
page read and write
1FFB52F5000
trusted library allocation
page read and write
1FFB577E000
trusted library allocation
page read and write
1FFB5DE2000
trusted library allocation
page read and write
1FFB52FE000
trusted library allocation
page read and write
1FFB77F2000
trusted library allocation
page read and write
1FFBC81F000
trusted library allocation
page read and write
1FFAAD88000
heap
page read and write
1FFBC8FE000
trusted library allocation
page read and write
1FFB75C0000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB1F35000
trusted library allocation
page read and write
1FFB55EC000
trusted library allocation
page read and write
1FFB3E67000
trusted library allocation
page read and write
1FFBE1AB000
trusted library allocation
page read and write
1FFBC82F000
trusted library allocation
page read and write
19B59468000
trusted library allocation
page read and write
1438622E000
trusted library allocation
page read and write
1FFB7ED0000
trusted library allocation
page read and write
23C26959000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFAAD5A000
heap
page read and write
1FFAADB2000
heap
page read and write
1FFB804A000
trusted library allocation
page read and write
1FFB48EA000
trusted library allocation
page read and write
23C25B9F000
trusted library allocation
page read and write
1FFB77F2000
trusted library allocation
page read and write
1FFB5171000
trusted library allocation
page read and write
1FFB40EF000
trusted library allocation
page read and write
1FFB64BC000
trusted library allocation
page read and write
1FFB588B000
trusted library allocation
page read and write
1FFB58F6000
trusted library allocation
page read and write
1FFAADB4000
heap
page read and write
1FFB52F5000
trusted library allocation
page read and write
1FFAAD68000
heap
page read and write
14386212000
trusted library allocation
page read and write
1FFB571C000
trusted library allocation
page read and write
1FFB1F0D000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB49C8000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFC0591000
trusted library allocation
page read and write
1FFB55CA000
trusted library allocation
page read and write
1FFAADD6000
heap
page read and write
1660000
heap
page read and write
1FFB5145000
trusted library allocation
page read and write
1FFBE125000
trusted library allocation
page read and write
1FFAAD42000
heap
page read and write
1FFB7E79000
trusted library allocation
page read and write
1FFB6AF4000
trusted library allocation
page read and write
1FFB40AA000
trusted library allocation
page read and write
1FFB7DD2000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFC05C8000
trusted library allocation
page read and write
1FFBEB41000
trusted library allocation
page read and write
1FFB7727000
trusted library allocation
page read and write
1FFB52F8000
trusted library allocation
page read and write
1FFB809F000
trusted library allocation
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFBC6F7000
trusted library allocation
page read and write
1FFB577A000
trusted library allocation
page read and write
1FFBC5BC000
trusted library allocation
page read and write
1FFB52FE000
trusted library allocation
page read and write
23C268F1000
heap
page read and write
1FFB14C1000
trusted library allocation
page read and write
1FFB59C2000
trusted library allocation
page read and write
1FFAAD56000
heap
page read and write
1FFB149D000
trusted library allocation
page read and write
1FFAADD5000
heap
page read and write
1FFB4782000
trusted library allocation
page read and write
1FFBC844000
trusted library allocation
page read and write
1FFAAD5D000
heap
page read and write
1FFAADC5000
heap
page read and write
1FFB80A3000
trusted library allocation
page read and write
1FFB803D000
trusted library allocation
page read and write
1FFB1F82000
trusted library allocation
page read and write
23C25C30000
trusted library allocation
page read and write
1FFC0384000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFBFFE0000
trusted library allocation
page read and write
1FFB7682000
trusted library allocation
page read and write
23C26864000
heap
page read and write
1FFB542B000
trusted library allocation
page read and write
1FFB51F6000
trusted library allocation
page read and write
1FFBC579000
trusted library allocation
page read and write
1FFB5296000
trusted library allocation
page read and write
7C3A1FE000
stack
page read and write
1628000
heap
page read and write
19B58F50000
unclassified section
page readonly
1FFAADB3000
heap
page read and write
1FFB7DB0000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB760F000
trusted library allocation
page read and write
14386320000
unclassified section
page readonly
1FFAADCF000
heap
page read and write
1FFB642A000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB586A000
trusted library allocation
page read and write
23C26922000
heap
page read and write
19B59430000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB1F71000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB597A000
trusted library allocation
page read and write
1FFAADC7000
heap
page read and write
1FFBCBC8000
trusted library allocation
page read and write
1FFBC6D9000
trusted library allocation
page read and write
1FFAAD2C000
heap
page read and write
1FFB4984000
trusted library allocation
page read and write
1FFB04A1000
trusted library allocation
page read and write
1FFB688F000
trusted library allocation
page read and write
1FFB55B6000
trusted library allocation
page read and write
1FFB3DD4000
trusted library allocation
page read and write
1FFBE1B0000
trusted library allocation
page read and write
1FFB5DC1000
trusted library allocation
page read and write
1FFB6484000
trusted library allocation
page read and write
1FFB6B47000
trusted library allocation
page read and write
14386262000
trusted library allocation
page read and write
1FFB8019000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB14BC000
trusted library allocation
page read and write
23C268E9000
heap
page read and write
1FFB1469000
trusted library allocation
page read and write
24464C50000
heap
page read and write
1FFB7FD6000
trusted library allocation
page read and write
1FFB6983000
trusted library allocation
page read and write
1FFBC5CE000
trusted library allocation
page read and write
1FFB6627000
trusted library allocation
page read and write
1FFB40F7000
trusted library allocation
page read and write
A8A4BFE000
stack
page read and write
1FFB5407000
trusted library allocation
page read and write
B00000
unkown
page readonly
1FFB76BB000
trusted library allocation
page read and write
1FFB6484000
trusted library allocation
page read and write
1FFB5867000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFAAD4B000
heap
page read and write
1FFB7CD6000
trusted library allocation
page read and write
1FFB6BDC000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
19B5948F000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB1FCF000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB5283000
trusted library allocation
page read and write
14386210000
trusted library allocation
page read and write
1FFB7DB0000
trusted library allocation
page read and write
1FFBC59D000
trusted library allocation
page read and write
14386384000
heap
page read and write
1FFB6AC6000
trusted library allocation
page read and write
1FFB5DF7000
trusted library allocation
page read and write
1FFAAD53000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFBEBAC000
trusted library allocation
page read and write
1FFB5832000
trusted library allocation
page read and write
1FFB01AF000
trusted library allocation
page read and write
1FFB4985000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFAAD51000
heap
page read and write
1FFAF6A6000
trusted library allocation
page read and write
1FFB19C1000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
2360000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB24F9000
trusted library allocation
page read and write
1FFB5128000
trusted library allocation
page read and write
1FFB52EC000
trusted library allocation
page read and write
1FFB67CD000
trusted library allocation
page read and write
23C26978000
heap
page read and write
1FFAADC1000
heap
page read and write
1FFB40A4000
trusted library allocation
page read and write
1FFBCD01000
trusted library allocation
page read and write
1FFB64AD000
trusted library allocation
page read and write
1FFBC80F000
trusted library allocation
page read and write
1FFB58F4000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB689D000
trusted library allocation
page read and write
1FFB14BE000
trusted library allocation
page read and write
1FFB64B3000
trusted library allocation
page read and write
1FFBCC0C000
trusted library allocation
page read and write
1474000
heap
page read and write
1FFB40DD000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
23C2685C000
heap
page read and write
1FFB6A73000
trusted library allocation
page read and write
1FFB75D5000
trusted library allocation
page read and write
1FFBC86F000
trusted library allocation
page read and write
1FFBE130000
trusted library allocation
page read and write
1FFBC686000
trusted library allocation
page read and write
19B59411000
trusted library allocation
page read and write
1FFB14BE000
trusted library allocation
page read and write
1FFB79E6000
trusted library allocation
page read and write
23C25810000
heap
page read and write
1FFB80AE000
trusted library allocation
page read and write
1FFB679E000
trusted library allocation
page read and write
1FFB762F000
trusted library allocation
page read and write
1FFB77F3000
trusted library allocation
page read and write
1FFBEC2C000
trusted library allocation
page read and write
1FFB1417000
trusted library allocation
page read and write
1FFB1F53000
trusted library allocation
page read and write
19B59090000
heap
page readonly
1FFAADB0000
heap
page read and write
1FFB648B000
trusted library allocation
page read and write
1FFB52C3000
trusted library allocation
page read and write
1F56EFE000
unkown
page readonly
1FFB5478000
trusted library allocation
page read and write
1FFB52A7000
trusted library allocation
page read and write
1FFB1F31000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB571A000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB7627000
trusted library allocation
page read and write
1FFB4464000
trusted library allocation
page read and write
1FFB01A4000
trusted library allocation
page read and write
1FFBC821000
trusted library allocation
page read and write
1FFB7C3E000
trusted library allocation
page read and write
1FFB49D6000
trusted library allocation
page read and write
1FFB68C5000
trusted library allocation
page read and write
1FFB6484000
trusted library allocation
page read and write
1FFB4917000
trusted library allocation
page read and write
1FFB54A1000
trusted library allocation
page read and write
1FFB1FB7000
trusted library allocation
page read and write
1FFB6BC6000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB13A4000
trusted library allocation
page read and write
1FFB58BB000
trusted library allocation
page read and write
1FFB5440000
trusted library allocation
page read and write
1FFB764E000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB574C000
trusted library allocation
page read and write
1FFB3DE4000
trusted library allocation
page read and write
1FFBE155000
trusted library allocation
page read and write
1FFB58BB000
trusted library allocation
page read and write
14386281000
trusted library allocation
page read and write
1FFBF54A000
heap
page read and write
1FFB66EA000
trusted library allocation
page read and write
1FFAAD3A000
heap
page read and write
1FFC0036000
trusted library allocation
page read and write
1FFB48F7000
trusted library allocation
page read and write
1FFB75B1000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFBE1C6000
trusted library allocation
page read and write
1FFB76D4000
trusted library allocation
page read and write
1FFB7A80000
trusted library allocation
page read and write
1FFB576D000
trusted library allocation
page read and write
1FFAAD42000
heap
page read and write
1FFB5AF9000
trusted library allocation
page read and write
1FFB5DEF000
trusted library allocation
page read and write
23C26704000
trusted library allocation
page read and write
1FFBC7C4000
trusted library allocation
page read and write
1FFB40AA000
trusted library allocation
page read and write
1FFB65B7000
trusted library allocation
page read and write
19B59300000
unclassified section
page readonly
1FFAAD5B000
heap
page read and write
1FFB80D3000
trusted library allocation
page read and write
1FFB6BE7000
trusted library allocation
page read and write
1FFB24DE000
trusted library allocation
page read and write
1FFBE19D000
trusted library allocation
page read and write
1FFB544C000
trusted library allocation
page read and write
1FFB3EA8000
trusted library allocation
page read and write
1FFB491C000
trusted library allocation
page read and write
1FFB54B8000
trusted library allocation
page read and write
19B5970C000
trusted library allocation
page read and write
1FFBC865000
trusted library allocation
page read and write
1FFB7D51000
trusted library allocation
page read and write
19B59477000
trusted library allocation
page read and write
1FFB7EC9000
trusted library allocation
page read and write
1FFB8032000
trusted library allocation
page read and write
1FFB52F8000
trusted library allocation
page read and write
1667000
heap
page read and write
1FFB14FE000
trusted library allocation
page read and write
1FFB807E000
trusted library allocation
page read and write
23C268E1000
heap
page read and write
1FFBC798000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFB59D2000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB493C000
trusted library allocation
page read and write
1FFAAD55000
heap
page read and write
1FFB66A5000
trusted library allocation
page read and write
1FFAADBA000
heap
page read and write
1FFB8075000
trusted library allocation
page read and write
1FFB449A000
trusted library allocation
page read and write
1FFBE13E000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
14385F20000
heap
page read and write
1FFB76EE000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFBE173000
trusted library allocation
page read and write
1FFB1FAD000
trusted library allocation
page read and write
1FFB59EE000
trusted library allocation
page read and write
1FFBEB48000
trusted library allocation
page read and write
1FFB5888000
trusted library allocation
page read and write
23C257D0000
unclassified section
page readonly
1FFBE14F000
trusted library allocation
page read and write
1FFB6BC9000
trusted library allocation
page read and write
1FFB52EE000
trusted library allocation
page read and write
1FFB8069000
trusted library allocation
page read and write
1FFBE1C6000
trusted library allocation
page read and write
1FFB59D1000
trusted library allocation
page read and write
1FFB48EC000
trusted library allocation
page read and write
1FFBC7D3000
trusted library allocation
page read and write
1FFB446E000
trusted library allocation
page read and write
1FFB766D000
trusted library allocation
page read and write
1FFB5478000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1F54EFE000
unkown
page readonly
1FFC0043000
trusted library allocation
page read and write
1FFB5DF6000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB44BA000
trusted library allocation
page read and write
1FFBE12B000
trusted library allocation
page read and write
1FFB4440000
trusted library allocation
page read and write
1FFB76C2000
trusted library allocation
page read and write
1FFB493C000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFB6672000
trusted library allocation
page read and write
1FFB7D29000
trusted library allocation
page read and write
1FFB40A7000
trusted library allocation
page read and write
3CB4000
heap
page read and write
19B5945D000
trusted library allocation
page read and write
1FFB6615000
trusted library allocation
page read and write
1FFB6AC6000
trusted library allocation
page read and write
1FFBE167000
trusted library allocation
page read and write
1FFB7F8D000
trusted library allocation
page read and write
1FFB645A000
trusted library allocation
page read and write
1FFB5740000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB7FF6000
trusted library allocation
page read and write
1FFB65F6000
trusted library allocation
page read and write
1FFB40B3000
trusted library allocation
page read and write
1FFB7E3B000
trusted library allocation
page read and write
1FFB57D9000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFBC70D000
trusted library allocation
page read and write
19B59607000
trusted library allocation
page read and write
1FFB8012000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1F535FE000
stack
page read and write
1FFC057A000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFBEC01000
trusted library allocation
page read and write
1FFAADB9000
heap
page read and write
1FFBF54A000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFB4824000
trusted library allocation
page read and write
1FFB5853000
trusted library allocation
page read and write
1FFB47D3000
trusted library allocation
page read and write
1FFB5ABB000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB6656000
trusted library allocation
page read and write
1FFB80C1000
trusted library allocation
page read and write
1FFC06F6000
trusted library allocation
page read and write
1FFB3E59000
trusted library allocation
page read and write
1FFB14C7000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB585B000
trusted library allocation
page read and write
1FFB491F000
trusted library allocation
page read and write
1FFB12C3000
trusted library allocation
page read and write
1FFB7E61000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFAADA8000
heap
page read and write
1FFB6418000
trusted library allocation
page read and write
1FFAAD54000
heap
page read and write
1FFB7DDB000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB5DFE000
trusted library allocation
page read and write
23C268F1000
heap
page read and write
1FFB7DC2000
trusted library allocation
page read and write
1FFB7C7C000
trusted library allocation
page read and write
1FFC06E1000
trusted library allocation
page read and write
1FFBE1C1000
trusted library allocation
page read and write
1FFAAD62000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFBEBC2000
trusted library allocation
page read and write
1FFB5DE5000
trusted library allocation
page read and write
1FFBE173000
trusted library allocation
page read and write
1FFB529C000
trusted library allocation
page read and write
1FFB497F000
trusted library allocation
page read and write
1FFB586A000
trusted library allocation
page read and write
1FFBC837000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB1FA9000
trusted library allocation
page read and write
1FFB6BE7000
trusted library allocation
page read and write
1FFBE162000
trusted library allocation
page read and write
1FFB58AE000
trusted library allocation
page read and write
1FFB583D000
trusted library allocation
page read and write
1FFB6631000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFB408C000
trusted library allocation
page read and write
1FFB7FFE000
trusted library allocation
page read and write
1FFB585B000
trusted library allocation
page read and write
1FFBFFE3000
trusted library allocation
page read and write
1FFB3B63000
heap
page read and write
1FFB577C000
trusted library allocation
page read and write
1FFB571C000
trusted library allocation
page read and write
19B5941B000
trusted library allocation
page read and write
1FFB805E000
trusted library allocation
page read and write
1FFB75B1000
trusted library allocation
page read and write
1FFB77AE000
trusted library allocation
page read and write
1FFB582B000
trusted library allocation
page read and write
1FFB5A5B000
trusted library allocation
page read and write
1FFC06FC000
trusted library allocation
page read and write
1FFB6B8F000
trusted library allocation
page read and write
A8A3BFF000
stack
page read and write
1FFAAD70000
heap
page read and write
1FFAAD4B000
heap
page read and write
1FFB48E8000
trusted library allocation
page read and write
1FFB594F000
trusted library allocation
page read and write
1FFB40FD000
trusted library allocation
page read and write
1FFB19D8000
trusted library allocation
page read and write
1FFBFFD8000
trusted library allocation
page read and write
1FFB5947000
trusted library allocation
page read and write
1FFAAD99000
heap
page read and write
1FFB40A4000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFBE1AE000
trusted library allocation
page read and write
1FFB66EB000
trusted library allocation
page read and write
1FFB7E67000
trusted library allocation
page read and write
1FFAADCD000
heap
page read and write
23C25B2F000
trusted library allocation
page read and write
1FFBC6F7000
trusted library allocation
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFB7C40000
trusted library allocation
page read and write
1FFBC8AE000
trusted library allocation
page read and write
1FFB13E2000
trusted library allocation
page read and write
1FFB6015000
trusted library allocation
page read and write
1FFB1F53000
trusted library allocation
page read and write
1FFAADBA000
heap
page read and write
1FFAADB2000
heap
page read and write
1FFB7CE4000
trusted library allocation
page read and write
1FFB7FDA000
trusted library allocation
page read and write
1FFBE152000
trusted library allocation
page read and write
1FFB8050000
trusted library allocation
page read and write
1FFB7ECE000
trusted library allocation
page read and write
1FFB40E1000
trusted library allocation
page read and write
1FFB7699000
trusted library allocation
page read and write
1FFB7D49000
trusted library allocation
page read and write
1FFB7570000
trusted library allocation
page read and write
1FFB4796000
trusted library allocation
page read and write
1FFB3B63000
heap
page read and write
1FFBE162000
trusted library allocation
page read and write
1FFAADD6000
heap
page read and write
1F51AEE000
unkown
page readonly
1FFAAD52000
heap
page read and write
1FFB75E8000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFAADD6000
heap
page read and write
1FFB1F13000
trusted library allocation
page read and write
1FFB5AEF000
trusted library allocation
page read and write
23C268FC000
heap
page read and write
1FFB5D93000
trusted library allocation
page read and write
1FFB7CCB000
trusted library allocation
page read and write
1FFBC837000
trusted library allocation
page read and write
1FFB57D7000
trusted library allocation
page read and write
1FFB7DAC000
trusted library allocation
page read and write
23C26945000
heap
page read and write
23C25B23000
trusted library allocation
page read and write
1FFB5ADC000
trusted library allocation
page read and write
1FFBC8CA000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB65A4000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB76BB000
trusted library allocation
page read and write
1FFB6434000
trusted library allocation
page read and write
1FFB40E9000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB6AB4000
trusted library allocation
page read and write
1FFB7621000
trusted library allocation
page read and write
1FFB5888000
trusted library allocation
page read and write
1FFB5DF6000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB7E50000
trusted library allocation
page read and write
1FFBC839000
trusted library allocation
page read and write
1FFB40A4000
trusted library allocation
page read and write
1FFB67C2000
trusted library allocation
page read and write
1FFB3F24000
trusted library allocation
page read and write
1FFB5D5D000
trusted library allocation
page read and write
1FFB6AA6000
trusted library allocation
page read and write
1FFB57D3000
trusted library allocation
page read and write
1FFB5AE5000
trusted library allocation
page read and write
1FFB7599000
trusted library allocation
page read and write
1FFB517A000
trusted library allocation
page read and write
1FFB5D93000
trusted library allocation
page read and write
1FFB54CB000
trusted library allocation
page read and write
1FFB7DF1000
trusted library allocation
page read and write
1FFB6B68000
trusted library allocation
page read and write
1FFB4963000
trusted library allocation
page read and write
1FFB59A2000
trusted library allocation
page read and write
1FFB7DBE000
trusted library allocation
page read and write
1FFB7CA8000
trusted library allocation
page read and write
1FFBC89C000
trusted library allocation
page read and write
1FFB68D7000
trusted library allocation
page read and write
1FFB59D1000
trusted library allocation
page read and write
1FFB4932000
trusted library allocation
page read and write
1FFB54CB000
trusted library allocation
page read and write
1FFBC854000
trusted library allocation
page read and write
1FFAAD3A000
heap
page read and write
1FFB76BD000
trusted library allocation
page read and write
1FFBC825000
trusted library allocation
page read and write
1FFB5810000
trusted library allocation
page read and write
1FFB5AC7000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFBFFF4000
trusted library allocation
page read and write
1FFAADB9000
heap
page read and write
23C259B0000
unclassified section
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFB5111000
trusted library allocation
page read and write
1FFB4973000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB5AEF000
trusted library allocation
page read and write
1FFB44B4000
trusted library allocation
page read and write
1FFB7C7C000
trusted library allocation
page read and write
1FFB6A71000
trusted library allocation
page read and write
1FFBE14F000
trusted library allocation
page read and write
24464CE0000
heap
page read and write
1FFB545F000
trusted library allocation
page read and write
1FFC05C8000
trusted library allocation
page read and write
1FFB494E000
trusted library allocation
page read and write
1FFB64C0000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
1FFAAD5B000
heap
page read and write
1FFAADC7000
heap
page read and write
1FFC0584000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB5439000
trusted library allocation
page read and write
1FFB12D3000
trusted library allocation
page read and write
1FFB011E000
trusted library allocation
page read and write
1FFB3B7B000
heap
page read and write
1FFB59F6000
trusted library allocation
page read and write
1FFB6B9C000
trusted library allocation
page read and write
1FFB581D000
trusted library allocation
page read and write
1FFAADD6000
heap
page read and write
1FFAAD5A000
heap
page read and write
1FFB7FD2000
trusted library allocation
page read and write
1FFB40FB000
trusted library allocation
page read and write
1FFB19E5000
trusted library allocation
page read and write
1FFB67BE000
trusted library allocation
page read and write
1FFAAD3B000
heap
page read and write
1FFB6893000
trusted library allocation
page read and write
1FFB67A2000
trusted library allocation
page read and write
23C26860000
heap
page read and write
1FFB5D75000
trusted library allocation
page read and write
1FFBE176000
trusted library allocation
page read and write
1FFB1460000
trusted library allocation
page read and write
1F55EFE000
unkown
page readonly
1FFB64F4000
trusted library allocation
page read and write
1FFB76A1000
trusted library allocation
page read and write
1FFAADC5000
heap
page read and write
1FFB551F000
trusted library allocation
page read and write
1FFBF5CB000
heap
page read and write
1FFB59FB000
trusted library allocation
page read and write
1FFB5180000
trusted library allocation
page read and write
1FFB5442000
trusted library allocation
page read and write
1FFB7551000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB011E000
trusted library allocation
page read and write
23C26978000
heap
page read and write
1FFB59F0000
trusted library allocation
page read and write
1FFB491F000
trusted library allocation
page read and write
1FFAAD42000
heap
page read and write
1FFB6672000
trusted library allocation
page read and write
1FFB5A00000
trusted library allocation
page read and write
1FFBFF41000
trusted library allocation
page read and write
1FFB48E4000
trusted library allocation
page read and write
1FFB5840000
trusted library allocation
page read and write
1FFBC6DF000
trusted library allocation
page read and write
1FFB53FC000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB5D47000
trusted library allocation
page read and write
1FFB40EF000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB14DD000
trusted library allocation
page read and write
B9C000
unkown
page readonly
1FFB3FF9000
trusted library allocation
page read and write
1FFBF501000
heap
page read and write
1FFB8063000
trusted library allocation
page read and write
1FFB763A000
trusted library allocation
page read and write
1FFB5175000
trusted library allocation
page read and write
1FFB5ACA000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB546B000
trusted library allocation
page read and write
1FFB7D51000
trusted library allocation
page read and write
1FFBC5F9000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB516E000
trusted library allocation
page read and write
1FFBE130000
trusted library allocation
page read and write
23C268ED000
heap
page read and write
1FFB541B000
trusted library allocation
page read and write
1FFB4924000
trusted library allocation
page read and write
1FFB513B000
trusted library allocation
page read and write
1FFB49E6000
trusted library allocation
page read and write
1FFB4988000
trusted library allocation
page read and write
19B58FC8000
remote allocation
page execute read
1FFB5440000
trusted library allocation
page read and write
1FFB40F7000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB80A3000
trusted library allocation
page read and write
1FFB1F72000
trusted library allocation
page read and write
1FFB69DE000
trusted library allocation
page read and write
1FFAADE7000
heap
page read and write
1FFAADB0000
heap
page read and write
1FFB51C3000
trusted library allocation
page read and write
1FFB54C3000
trusted library allocation
page read and write
1FFB5DF2000
trusted library allocation
page read and write
1FFBEBE4000
trusted library allocation
page read and write
1FFB3B7B000
heap
page read and write
1FFB5442000
trusted library allocation
page read and write
1FFB7640000
trusted library allocation
page read and write
23C26869000
heap
page read and write
1FFB19BF000
trusted library allocation
page read and write
1FFB58F4000
trusted library allocation
page read and write
1FFBC5C9000
trusted library allocation
page read and write
15CE000
stack
page read and write
1FFAADC0000
heap
page read and write
1FFBE16C000
trusted library allocation
page read and write
1FFB7C84000
trusted library allocation
page read and write
1FFC057D000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB77AC000
trusted library allocation
page read and write
1F51B6B000
stack
page read and write
1FFB7F54000
trusted library allocation
page read and write
19B59603000
trusted library allocation
page read and write
1FFB7C69000
trusted library allocation
page read and write
1FFB5598000
trusted library allocation
page read and write
1FFB3B6F000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFB76A1000
trusted library allocation
page read and write
23C26922000
heap
page read and write
1FFB58F6000
trusted library allocation
page read and write
1FFB7673000
trusted library allocation
page read and write
1FFAAD3B000
heap
page read and write
1FFB55D4000
trusted library allocation
page read and write
1FFB80FA000
trusted library allocation
page read and write
1FFB5D70000
trusted library allocation
page read and write
1FFB5AEF000
trusted library allocation
page read and write
1FFB5DA8000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
13CE000
stack
page read and write
1FFB587B000
trusted library allocation
page read and write
1FFB5147000
trusted library allocation
page read and write
23C259B2000
unclassified section
page read and write
7C3AAFE000
stack
page read and write
1FFBE182000
trusted library allocation
page read and write
1FFB409A000
trusted library allocation
page read and write
1FFB7FC5000
trusted library allocation
page read and write
1FFB75C0000
trusted library allocation
page read and write
23C26860000
heap
page read and write
1660000
heap
page read and write
1FFBE137000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFAADB4000
heap
page read and write
1FFAF6DF000
trusted library allocation
page read and write
1FFBE138000
trusted library allocation
page read and write
1FFBC78C000
trusted library allocation
page read and write
1FFBCD2C000
trusted library allocation
page read and write
1FFB4497000
trusted library allocation
page read and write
1FFBE182000
trusted library allocation
page read and write
1FFB6B0D000
trusted library allocation
page read and write
1474000
heap
page read and write
A8A3BFC000
stack
page read and write
1FFB5DC3000
trusted library allocation
page read and write
1FFB6AF0000
trusted library allocation
page read and write
1FFB48AB000
trusted library allocation
page read and write
1FFB588B000
trusted library allocation
page read and write
1FFB76C6000
trusted library allocation
page read and write
1FFB40FD000
trusted library allocation
page read and write
1FFB546B000
trusted library allocation
page read and write
4001000
heap
page read and write
7C3AA3E000
unkown
page readonly
23C25BB5000
trusted library allocation
page read and write
23C268F1000
heap
page read and write
1FFB04B9000
trusted library allocation
page read and write
14386300000
heap
page read and write
1FFB51BF000
trusted library allocation
page read and write
1FFAAD3A000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFB55EC000
trusted library allocation
page read and write
1FFB5DBF000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFBEC2E000
trusted library allocation
page read and write
1FFB64F4000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1F54EBE000
stack
page read and write
1FFB6BD3000
trusted library allocation
page read and write
1FFAAD60000
heap
page read and write
1FFB51C0000
trusted library allocation
page read and write
23C25BBA000
trusted library allocation
page read and write
1FFB8059000
trusted library allocation
page read and write
1FFB019D000
trusted library allocation
page read and write
1FFB5759000
trusted library allocation
page read and write
1FFBE162000
trusted library allocation
page read and write
7C3BB3E000
unkown
page readonly
1FFB5183000
trusted library allocation
page read and write
1FFB8047000
trusted library allocation
page read and write
1FFB5DFE000
trusted library allocation
page read and write
7C3B33E000
stack
page read and write
1FFAADAF000
heap
page read and write
1FFBC873000
trusted library allocation
page read and write
1FFB14BC000
trusted library allocation
page read and write
1FFB5296000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFBE14F000
trusted library allocation
page read and write
1FFB7CA2000
trusted library allocation
page read and write
1FFB75E7000
trusted library allocation
page read and write
1FFB44A2000
trusted library allocation
page read and write
1FFB64C0000
trusted library allocation
page read and write
1FFC05F6000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB795C000
trusted library allocation
page read and write
1FFBC5CE000
trusted library allocation
page read and write
1FFB558A000
trusted library allocation
page read and write
1FFB7C9D000
trusted library allocation
page read and write
1FFB69D8000
trusted library allocation
page read and write
1FFB69E6000
trusted library allocation
page read and write
1FFB5881000
trusted library allocation
page read and write
1FFB3FF9000
trusted library allocation
page read and write
1FFB801F000
trusted library allocation
page read and write
1FFB7E35000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
164E000
heap
page read and write
1FFBEBEE000
trusted library allocation
page read and write
1FFB51A8000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFAADB9000
heap
page read and write
1FFB7FF6000
trusted library allocation
page read and write
1FFBC6BD000
trusted library allocation
page read and write
1FFB44B2000
trusted library allocation
page read and write
1FFB5545000
trusted library allocation
page read and write
1FFBC8B8000
trusted library allocation
page read and write
1FFB529E000
trusted library allocation
page read and write
1F525D8000
stack
page read and write
1FFBC8D3000
trusted library allocation
page read and write
1FFB6B9C000
trusted library allocation
page read and write
1C66E82E000
heap
page read and write
1FFB68DC000
trusted library allocation
page read and write
1FFB6BDC000
trusted library allocation
page read and write
23C268E3000
heap
page read and write
1FFB5173000
trusted library allocation
page read and write
1FFB55BC000
trusted library allocation
page read and write
1FFBC5E2000
trusted library allocation
page read and write
1FFB48EB000
trusted library allocation
page read and write
1FFB4028000
trusted library allocation
page read and write
1FFAAD54000
heap
page read and write
1FFB5498000
trusted library allocation
page read and write
1FFB58EC000
trusted library allocation
page read and write
1FFBEC57000
trusted library allocation
page read and write
1FFB75DC000
trusted library allocation
page read and write
1FFBE152000
trusted library allocation
page read and write
1FFB7DB3000
trusted library allocation
page read and write
1FFB6B47000
trusted library allocation
page read and write
1FFB13EA000
trusted library allocation
page read and write
1FFB6B5C000
trusted library allocation
page read and write
1FFB409A000
trusted library allocation
page read and write
1FFBE104000
trusted library allocation
page read and write
1FFB14DC000
trusted library allocation
page read and write
1FFB77AE000
trusted library allocation
page read and write
1FFB79DD000
trusted library allocation
page read and write
1FFB7727000
trusted library allocation
page read and write
1FFB24C3000
trusted library allocation
page read and write
23C268F1000
heap
page read and write
1FFB7D0E000
trusted library allocation
page read and write
1FFB5D82000
trusted library allocation
page read and write
1FFB3B7B000
heap
page read and write
1FFAAD42000
heap
page read and write
14385EF5000
remote allocation
page execute read
1FFB7FD8000
trusted library allocation
page read and write
1FFAADB1000
heap
page read and write
1FFB80CC000
trusted library allocation
page read and write
1FFB5DA8000
trusted library allocation
page read and write
1FFB57D3000
trusted library allocation
page read and write
1FFBC79B000
trusted library allocation
page read and write
1FFB80FA000
trusted library allocation
page read and write
1FFB6BAD000
trusted library allocation
page read and write
1FFB490B000
trusted library allocation
page read and write
1FFB3F6D000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFC06B2000
trusted library allocation
page read and write
23C2688A000
heap
page read and write
23C2684D000
heap
page read and write
1FFAADB2000
heap
page read and write
1FFB4909000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB59F9000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFB7D51000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFBE176000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB7EB2000
trusted library allocation
page read and write
1FFB5AEF000
trusted library allocation
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFB5ABB000
trusted library allocation
page read and write
1FFB7DAC000
trusted library allocation
page read and write
1FFAADC7000
heap
page read and write
1FFAADBA000
heap
page read and write
1FFBE13A000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFBC710000
trusted library allocation
page read and write
1FFB44CC000
trusted library allocation
page read and write
1FFB1F63000
trusted library allocation
page read and write
1FFBC638000
trusted library allocation
page read and write
1FFBE182000
trusted library allocation
page read and write
19B590A0000
unclassified section
page read and write
1FFB51E9000
trusted library allocation
page read and write
1FFB7D2F000
trusted library allocation
page read and write
1FFB6B15000
trusted library allocation
page read and write
1FFB5D73000
trusted library allocation
page read and write
1FFB139E000
trusted library allocation
page read and write
1FFBE11C000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFBC5C1000
trusted library allocation
page read and write
1FFB67A4000
trusted library allocation
page read and write
1FFB89A3000
trusted library allocation
page read and write
1FFB773E000
trusted library allocation
page read and write
1FFB4924000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
23C268E0000
heap
page read and write
1FFB48F7000
trusted library allocation
page read and write
1FFB4411000
trusted library allocation
page read and write
1FFB77CF000
trusted library allocation
page read and write
1FFB40DD000
trusted library allocation
page read and write
23C25B65000
trusted library allocation
page read and write
1FFB0113000
trusted library allocation
page read and write
164D000
heap
page read and write
1FFBC89C000
trusted library allocation
page read and write
1FFB69F1000
trusted library allocation
page read and write
1FFAADC7000
heap
page read and write
19B594AA000
trusted library allocation
page read and write
1FFB5483000
trusted library allocation
page read and write
1FFB7D1F000
trusted library allocation
page read and write
1FFB1FBB000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFAAD54000
heap
page read and write
1FFB7DCA000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB548C000
trusted library allocation
page read and write
1FFB68C9000
trusted library allocation
page read and write
1FFB58E0000
trusted library allocation
page read and write
1FFBE176000
trusted library allocation
page read and write
1FFB7C58000
trusted library allocation
page read and write
1FFB54FE000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB6BC1000
trusted library allocation
page read and write
14386080000
heap
page readonly
1FFB583D000
trusted library allocation
page read and write
1FFB4037000
trusted library allocation
page read and write
23C26978000
heap
page read and write
1FFB7673000
trusted library allocation
page read and write
1FFB7EFC000
trusted library allocation
page read and write
1FFB80AD000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFB7E71000
trusted library allocation
page read and write
1FFB14AA000
trusted library allocation
page read and write
1FFB80C9000
trusted library allocation
page read and write
1FFB04C3000
trusted library allocation
page read and write
1FFB5171000
trusted library allocation
page read and write
1FFB5DC3000
trusted library allocation
page read and write
1FFB517B000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB44EE000
trusted library allocation
page read and write
1FFB59F0000
trusted library allocation
page read and write
1FFB59C8000
trusted library allocation
page read and write
23C26863000
heap
page read and write
1FFB59DC000
trusted library allocation
page read and write
1FFB4932000
trusted library allocation
page read and write
1FFB661A000
trusted library allocation
page read and write
1FFB002F000
trusted library allocation
page read and write
1FFB5DB0000
trusted library allocation
page read and write
1FFB5158000
trusted library allocation
page read and write
1FFB52A6000
trusted library allocation
page read and write
1FFB3E6D000
trusted library allocation
page read and write
1FFB6A51000
trusted library allocation
page read and write
19B594F6000
trusted library allocation
page read and write
1FFB1404000
trusted library allocation
page read and write
1FFB40F7000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB6651000
trusted library allocation
page read and write
1FFB80D8000
trusted library allocation
page read and write
1FFB244A000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFBC579000
trusted library allocation
page read and write
1FFC0740000
trusted library allocation
page read and write
1FFB40EF000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB49ED000
trusted library allocation
page read and write
1FFB52F6000
trusted library allocation
page read and write
1FFB3F6D000
trusted library allocation
page read and write
1FFB59F0000
trusted library allocation
page read and write
1FFB5AC3000
trusted library allocation
page read and write
14386438000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFC0039000
trusted library allocation
page read and write
1FFB51D8000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB7A59000
trusted library allocation
page read and write
1FFB8069000
trusted library allocation
page read and write
1FFC057A000
trusted library allocation
page read and write
1FFB55BC000
trusted library allocation
page read and write
1FFAAD2E000
heap
page read and write
1FFB40E9000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
23C26809000
heap
page read and write
1FFB1F85000
trusted library allocation
page read and write
1FFB40FD000
trusted library allocation
page read and write
1FFAADCB000
heap
page read and write
1FFB542B000
trusted library allocation
page read and write
1FFAF69E000
trusted library allocation
page read and write
1FFAAD31000
heap
page read and write
1FFBF547000
heap
page read and write
1FFB4058000
trusted library allocation
page read and write
1FFBC75B000
trusted library allocation
page read and write
1C66E81E000
heap
page read and write
1C66E830000
heap
page read and write
1FFB64A8000
trusted library allocation
page read and write
1FFB40E9000
trusted library allocation
page read and write
1FFBFF4A000
trusted library allocation
page read and write
1FFB1FCB000
trusted library allocation
page read and write
1FFB4037000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFBEB05000
trusted library allocation
page read and write
1FFB8084000
trusted library allocation
page read and write
1FFB7DF4000
trusted library allocation
page read and write
1FFAAD65000
heap
page read and write
1FFB1F61000
trusted library allocation
page read and write
1FFB5899000
trusted library allocation
page read and write
1FFBE1B0000
trusted library allocation
page read and write
1FFB548B000
trusted library allocation
page read and write
1FFB491F000
trusted library allocation
page read and write
1C66E82B000
heap
page read and write
1FFAAD89000
heap
page read and write
19B594C4000
trusted library allocation
page read and write
1FFB4066000
trusted library allocation
page read and write
1FFB76F8000
trusted library allocation
page read and write
1FFB75E2000
trusted library allocation
page read and write
1FFB5423000
trusted library allocation
page read and write
1FFB7583000
trusted library allocation
page read and write
1FFB55CA000
trusted library allocation
page read and write
1FFB5A0F000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB5840000
trusted library allocation
page read and write
19B5947A000
trusted library allocation
page read and write
1FFB492C000
trusted library allocation
page read and write
1FFBC717000
trusted library allocation
page read and write
1FFAAD3F000
heap
page read and write
1FFB57FD000
trusted library allocation
page read and write
1FFB51EE000
trusted library allocation
page read and write
1FFB3E7D000
trusted library allocation
page read and write
1FFB4040000
trusted library allocation
page read and write
1FFBE159000
trusted library allocation
page read and write
1FFB3B7B000
heap
page read and write
1FFB48D6000
trusted library allocation
page read and write
1FFB513C000
trusted library allocation
page read and write
1FFB3F6D000
trusted library allocation
page read and write
1FFB585B000
trusted library allocation
page read and write
1FFBFF94000
trusted library allocation
page read and write
23C26860000
heap
page read and write
1FFB7ED2000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFAADC1000
heap
page read and write
1FFBEB0C000
trusted library allocation
page read and write
1FFAADD1000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB7EFE000
trusted library allocation
page read and write
1FFAAD54000
heap
page read and write
1FFB7EAE000
trusted library allocation
page read and write
1FFB4BC1000
trusted library allocation
page read and write
1FFC009E000
trusted library allocation
page read and write
19B590C0000
heap
page read and write
1FFB583A000
trusted library allocation
page read and write
19B590CA000
heap
page read and write
1FFB69E3000
trusted library allocation
page read and write
1474000
heap
page read and write
23C26860000
heap
page read and write
1FFB54FD000
trusted library allocation
page read and write
1FFC008B000
trusted library allocation
page read and write
1FFB1458000
trusted library allocation
page read and write
1FFB68C5000
trusted library allocation
page read and write
1FFB40B3000
trusted library allocation
page read and write
1FFAAD70000
heap
page read and write
1FFBC790000
trusted library allocation
page read and write
1FFBF555000
heap
page read and write
1FFB40F7000
trusted library allocation
page read and write
1FFB59F0000
trusted library allocation
page read and write
1FFB69ED000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
1FFB58B3000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
BD0000
unkown
page write copy
1FFB75EC000
trusted library allocation
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB12AE000
trusted library allocation
page read and write
1FFB13BA000
trusted library allocation
page read and write
23C2685C000
heap
page read and write
1FFB149A000
trusted library allocation
page read and write
1FFB541B000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB6AF4000
trusted library allocation
page read and write
1FFB68E7000
trusted library allocation
page read and write
1FFB8060000
trusted library allocation
page read and write
1FFB40E9000
trusted library allocation
page read and write
1C66E819000
heap
page read and write
1FFB7525000
trusted library allocation
page read and write
1FFB67DE000
trusted library allocation
page read and write
1FFB5D23000
trusted library allocation
page read and write
402983E000
unkown
page readonly
164F000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB7DC4000
trusted library allocation
page read and write
1FFBC6DF000
trusted library allocation
page read and write
1FFAF698000
trusted library allocation
page read and write
1FFB5417000
trusted library allocation
page read and write
1FFB017E000
trusted library allocation
page read and write
1FFC05F1000
trusted library allocation
page read and write
1FFB5832000
trusted library allocation
page read and write
1FFB5AEF000
trusted library allocation
page read and write
1474000
heap
page read and write
1FFBC5A5000
trusted library allocation
page read and write
19B58FF0000
heap
page read and write
1FFAAD63000
heap
page read and write
23C259BF000
unclassified section
page read and write
1FFB48F2000
trusted library allocation
page read and write
1FFB588B000
trusted library allocation
page read and write
23C268E0000
heap
page read and write
1FFBCC4D000
trusted library allocation
page read and write
1FFB14FA000
trusted library allocation
page read and write
1FFB44FE000
trusted library allocation
page read and write
1FFBE1F4000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
23C25B6A000
trusted library allocation
page read and write
1FFBF54A000
heap
page read and write
1FFB4431000
trusted library allocation
page read and write
1FFB6697000
trusted library allocation
page read and write
1FFB7618000
trusted library allocation
page read and write
1FFBC59F000
trusted library allocation
page read and write
1FFB7DC2000
trusted library allocation
page read and write
1FFB6796000
trusted library allocation
page read and write
1FFBF555000
heap
page read and write
1FFAAD68000
heap
page read and write
1FFBFB00000
trusted library allocation
page read and write
1FFB7DBE000
trusted library allocation
page read and write
1FFB445C000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB40E1000
trusted library allocation
page read and write
1FFB64A8000
trusted library allocation
page read and write
1FFB571A000
trusted library allocation
page read and write
1FFB1F33000
trusted library allocation
page read and write
14386090000
heap
page read and write
1FFB574F000
trusted library allocation
page read and write
1FFB55E1000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB5AEF000
trusted library allocation
page read and write
1FFB758E000
trusted library allocation
page read and write
14386380000
heap
page read and write
1FFB1460000
trusted library allocation
page read and write
1FFB6412000
trusted library allocation
page read and write
1FFB80C1000
trusted library allocation
page read and write
1FFBE173000
trusted library allocation
page read and write
1FFB553E000
trusted library allocation
page read and write
1FFBC82C000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB67E0000
trusted library allocation
page read and write
1FFB51FC000
trusted library allocation
page read and write
19B594B1000
trusted library allocation
page read and write
1F54DFE000
unkown
page readonly
1FFB40D5000
trusted library allocation
page read and write
1FFBE117000
trusted library allocation
page read and write
1FFB529C000
trusted library allocation
page read and write
1FFBF545000
heap
page read and write
1FFB752D000
trusted library allocation
page read and write
23C26110000
heap
page read and write
1FFB80D3000
trusted library allocation
page read and write
1FFB804F000
trusted library allocation
page read and write
1FFB75B3000
trusted library allocation
page read and write
1FFC008B000
trusted library allocation
page read and write
1FFBC5B8000
trusted library allocation
page read and write
1FFB3E89000
trusted library allocation
page read and write
1FFB7A93000
trusted library allocation
page read and write
1FFB6BD3000
trusted library allocation
page read and write
1FFB679A000
trusted library allocation
page read and write
23C26918000
heap
page read and write
1FFB7FA2000
trusted library allocation
page read and write
19B594DB000
trusted library allocation
page read and write
14385EE0000
remote allocation
page read and write
23C26869000
heap
page read and write
1FFB8099000
trusted library allocation
page read and write
1FFB14DC000
trusted library allocation
page read and write
23C2695A000
heap
page read and write
13BE000
stack
page read and write
1FFB54A1000
trusted library allocation
page read and write
1FFBE176000
trusted library allocation
page read and write
1FFB55C6000
trusted library allocation
page read and write
1FFBE174000
trusted library allocation
page read and write
1FFBC5F6000
trusted library allocation
page read and write
1FFB54D9000
trusted library allocation
page read and write
13DB000
stack
page read and write
1FFB51D3000
trusted library allocation
page read and write
1FFB55C6000
trusted library allocation
page read and write
1FFBC71E000
trusted library allocation
page read and write
1FFBE115000
trusted library allocation
page read and write
2ECC2010000
trusted library allocation
page execute read
1FFB545D000
trusted library allocation
page read and write
1FFB04DD000
trusted library allocation
page read and write
1FFB768D000
trusted library allocation
page read and write
1FFB7EE0000
trusted library allocation
page read and write
1FFBE1B4000
trusted library allocation
page read and write
1FFB5493000
trusted library allocation
page read and write
1FFB64AD000
trusted library allocation
page read and write
1FFB7C84000
trusted library allocation
page read and write
1FFB75EC000
trusted library allocation
page read and write
23C25760000
unclassified section
page readonly
1FFB7DBE000
trusted library allocation
page read and write
9CB15FE000
stack
page read and write
1FFB77CD000
trusted library allocation
page read and write
1FFB763E000
trusted library allocation
page read and write
1FFB5B80000
trusted library allocation
page read and write
1FFBC8FE000
trusted library allocation
page read and write
1FFB57D7000
trusted library allocation
page read and write
1FFBC6FC000
trusted library allocation
page read and write
1FFAAD36000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFC0095000
trusted library allocation
page read and write
7C3A9FE000
unkown
page readonly
1FFB69F3000
trusted library allocation
page read and write
1FFB4034000
trusted library allocation
page read and write
1FFBC8B8000
trusted library allocation
page read and write
1FFB7C88000
trusted library allocation
page read and write
1FFB5435000
trusted library allocation
page read and write
402648E000
unkown
page readonly
1FFAF6C5000
trusted library allocation
page read and write
1FFB7F61000
trusted library allocation
page read and write
1FFB4957000
trusted library allocation
page read and write
1FFB4058000
trusted library allocation
page read and write
23C26860000
heap
page read and write
1FFB7E33000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1474000
heap
page read and write
1FFB5813000
trusted library allocation
page read and write
1FFB4483000
trusted library allocation
page read and write
1FFC00F7000
trusted library allocation
page read and write
14386247000
trusted library allocation
page read and write
1FFB1460000
trusted library allocation
page read and write
1FFB4943000
trusted library allocation
page read and write
1FFB7DD9000
trusted library allocation
page read and write
1FFB4BE9000
trusted library allocation
page read and write
1FFB661A000
trusted library allocation
page read and write
2ECC2081000
trusted library allocation
page execute read
1FFB6B6C000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB510E000
trusted library allocation
page read and write
19B594B7000
trusted library allocation
page read and write
1FFBC817000
trusted library allocation
page read and write
1FFC05C2000
trusted library allocation
page read and write
1FFB7F6F000
trusted library allocation
page read and write
1FFB768D000
trusted library allocation
page read and write
1FFB1184000
trusted library allocation
page read and write
1FFB408E000
trusted library allocation
page read and write
1FFB4038000
trusted library allocation
page read and write
1FFB69EB000
trusted library allocation
page read and write
1FFAAD70000
heap
page read and write
1FFAAD4B000
heap
page read and write
1FFB540A000
trusted library allocation
page read and write
1FFB5768000
trusted library allocation
page read and write
1FFB51BD000
trusted library allocation
page read and write
1FFB55E1000
trusted library allocation
page read and write
1FFBC71B000
trusted library allocation
page read and write
1FFBE174000
trusted library allocation
page read and write
1FFB04BC000
trusted library allocation
page read and write
1FFB7563000
trusted library allocation
page read and write
1FFB5171000
trusted library allocation
page read and write
1FFB7FF3000
trusted library allocation
page read and write
23C2688A000
heap
page read and write
1FFB69FD000
trusted library allocation
page read and write
1FFB5A1B000
trusted library allocation
page read and write
1FFB24FE000
trusted library allocation
page read and write
1FFBC616000
trusted library allocation
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFB11DB000
trusted library allocation
page read and write
1FFB441B000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
23C2696A000
heap
page read and write
1FFB6B64000
trusted library allocation
page read and write
1FFBE816000
trusted library allocation
page read and write
1FFB40B3000
trusted library allocation
page read and write
1FFBFFE9000
trusted library allocation
page read and write
1FFB4065000
trusted library allocation
page read and write
1FFB59EE000
trusted library allocation
page read and write
1F556FE000
stack
page read and write
1FFB7DB6000
trusted library allocation
page read and write
1FFB7D0E000
trusted library allocation
page read and write
1FFAADD0000
heap
page read and write
1FFAADD6000
heap
page read and write
1FFB7A49000
trusted library allocation
page read and write
1FFB5283000
trusted library allocation
page read and write
1FFBE190000
trusted library allocation
page read and write
1FFB75EC000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFBFF18000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB64B3000
trusted library allocation
page read and write
1FFB3DF1000
trusted library allocation
page read and write
1FFAADAD000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFB8078000
trusted library allocation
page read and write
23C2686C000
heap
page read and write
1FFB807E000
trusted library allocation
page read and write
1FFB758C000
trusted library allocation
page read and write
1FFB7ADD000
trusted library allocation
page read and write
1FFB5D96000
trusted library allocation
page read and write
1FFB66A7000
trusted library allocation
page read and write
1FFB76BD000
trusted library allocation
page read and write
1FFB3E76000
trusted library allocation
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFB1479000
trusted library allocation
page read and write
1FFB1FF6000
trusted library allocation
page read and write
1FFB51D3000
trusted library allocation
page read and write
1FFB3E7D000
trusted library allocation
page read and write
1FFB7A72000
trusted library allocation
page read and write
1FFBC71E000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB55EC000
trusted library allocation
page read and write
1FFB7EB2000
trusted library allocation
page read and write
1FFB11C4000
trusted library allocation
page read and write
1FFB5A0B000
trusted library allocation
page read and write
1FFB5DF6000
trusted library allocation
page read and write
1FFB4941000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB663D000
trusted library allocation
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFBC673000
trusted library allocation
page read and write
1FFB1FA4000
trusted library allocation
page read and write
1FFB77AC000
trusted library allocation
page read and write
1FFB12C8000
trusted library allocation
page read and write
1FFC0071000
trusted library allocation
page read and write
7C3AA7D000
stack
page read and write
1FFB7D51000
trusted library allocation
page read and write
1FFB58F6000
trusted library allocation
page read and write
1FFB49F7000
trusted library allocation
page read and write
1FFAADC7000
heap
page read and write
1FFAADB9000
heap
page read and write
1FFB59A2000
trusted library allocation
page read and write
1FFB6B36000
trusted library allocation
page read and write
1FFB1486000
trusted library allocation
page read and write
1FFB7F46000
trusted library allocation
page read and write
1FFB7DC4000
trusted library allocation
page read and write
1FFB68C9000
trusted library allocation
page read and write
1FFB5478000
trusted library allocation
page read and write
1FFB55CA000
trusted library allocation
page read and write
23C26860000
heap
page read and write
1FFB55CD000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB766D000
trusted library allocation
page read and write
1FFB4987000
trusted library allocation
page read and write
1FFB7FED000
trusted library allocation
page read and write
1FFB57FD000
trusted library allocation
page read and write
1FFB6B68000
trusted library allocation
page read and write
1FFB1FCD000
trusted library allocation
page read and write
1FFBC78E000
trusted library allocation
page read and write
1FFAF6A9000
trusted library allocation
page read and write
1FFB80FA000
trusted library allocation
page read and write
1FFBEBBC000
trusted library allocation
page read and write
1FFB52FE000
trusted library allocation
page read and write
1FFB6AD6000
trusted library allocation
page read and write
1FFB48FB000
trusted library allocation
page read and write
1FFB4791000
trusted library allocation
page read and write
1FFB55D7000
trusted library allocation
page read and write
1FFC05CA000
trusted library allocation
page read and write
1FFB7DD9000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFAADB1000
heap
page read and write
1FFB69F6000
trusted library allocation
page read and write
1FFB6B64000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB7EE0000
trusted library allocation
page read and write
1FFBC5C5000
trusted library allocation
page read and write
1FFC00C9000
trusted library allocation
page read and write
1FFB5D97000
trusted library allocation
page read and write
1FFBC667000
trusted library allocation
page read and write
1FFB7FD2000
trusted library allocation
page read and write
1C66E81A000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB599C000
trusted library allocation
page read and write
1FFB68F3000
trusted library allocation
page read and write
1FFBF501000
heap
page read and write
1FFB57D9000
trusted library allocation
page read and write
1FFB5598000
trusted library allocation
page read and write
1FFB6B8F000
trusted library allocation
page read and write
1FFB7FDE000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB5D7E000
trusted library allocation
page read and write
1FFB7D29000
trusted library allocation
page read and write
23C268FC000
heap
page read and write
1FFB01E4000
trusted library allocation
page read and write
1FFBE1AE000
trusted library allocation
page read and write
1FFB1F77000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
1FFB7DC4000
trusted library allocation
page read and write
1FFB12B5000
trusted library allocation
page read and write
1FFB68C9000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1620000
heap
page read and write
1FFB404A000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
1FFB40FD000
trusted library allocation
page read and write
1FFBF7A8000
trusted library allocation
page read and write
1FFB76F8000
trusted library allocation
page read and write
1FFBCB84000
trusted library allocation
page read and write
1FFAAD2C000
heap
page read and write
1FFB58F6000
trusted library allocation
page read and write
1FFB40F7000
trusted library allocation
page read and write
1FFB5759000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFB6697000
trusted library allocation
page read and write
1FFB58BB000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB7EAE000
trusted library allocation
page read and write
1FFB75B3000
trusted library allocation
page read and write
1FFAADD0000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFB5128000
trusted library allocation
page read and write
1FFB5947000
trusted library allocation
page read and write
1FFB7DDF000
trusted library allocation
page read and write
1FFB6BFE000
trusted library allocation
page read and write
1FFBCD33000
trusted library allocation
page read and write
1FFB3E6D000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFAAD3B000
heap
page read and write
1FFAAD5B000
heap
page read and write
1FFB5D75000
trusted library allocation
page read and write
1FFB5DAF000
trusted library allocation
page read and write
1FFBF54A000
heap
page read and write
23C268E9000
heap
page read and write
1FFB79DD000
trusted library allocation
page read and write
1FFBC574000
trusted library allocation
page read and write
1FFB7CF7000
trusted library allocation
page read and write
1FFB54D2000
trusted library allocation
page read and write
1FFB58DC000
trusted library allocation
page read and write
1FFB57D9000
trusted library allocation
page read and write
1FFB59EE000
trusted library allocation
page read and write
23C2687D000
heap
page read and write
14386400000
trusted library allocation
page read and write
1FFB586A000
trusted library allocation
page read and write
1FFB807C000
trusted library allocation
page read and write
1FFBC7F3000
trusted library allocation
page read and write
143862A2000
trusted library allocation
page read and write
1FFB6800000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFAADB2000
heap
page read and write
1438626E000
trusted library allocation
page read and write
24465007000
trusted library allocation
page read and write
1FFB4070000
trusted library allocation
page read and write
1FFB69E3000
trusted library allocation
page read and write
1FFB52EE000
trusted library allocation
page read and write
1FFBC647000
trusted library allocation
page read and write
BD4000
unkown
page readonly
1FFB488F000
trusted library allocation
page read and write
1FFB576D000
trusted library allocation
page read and write
14385F00000
unclassified section
page readonly
1FFB764E000
trusted library allocation
page read and write
1FFB587B000
trusted library allocation
page read and write
1FFB79E6000
trusted library allocation
page read and write
1FFAADC0000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFB76BD000
trusted library allocation
page read and write
1FFB1189000
trusted library allocation
page read and write
1FFB4917000
trusted library allocation
page read and write
1FFB67B6000
trusted library allocation
page read and write
1FFB49E8000
trusted library allocation
page read and write
1FFB666C000
trusted library allocation
page read and write
1FFB8035000
trusted library allocation
page read and write
1FFB7544000
trusted library allocation
page read and write
1FFBC79B000
trusted library allocation
page read and write
1FFB594C000
trusted library allocation
page read and write
1FFBE162000
trusted library allocation
page read and write
1FFB47D6000
trusted library allocation
page read and write
1FFBC75B000
trusted library allocation
page read and write
1FFC005B000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB5D62000
trusted library allocation
page read and write
23C2688D000
heap
page read and write
1FFAAD4B000
heap
page read and write
1FFB76EE000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
14386432000
trusted library allocation
page read and write
1FFB490B000
trusted library allocation
page read and write
1FFB409A000
trusted library allocation
page read and write
1FFB5D68000
trusted library allocation
page read and write
1FFB6472000
trusted library allocation
page read and write
1FFBC5B4000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
158E000
stack
page read and write
1FFAADCC000
heap
page read and write
1FFB1F39000
trusted library allocation
page read and write
1FFB016A000
trusted library allocation
page read and write
14386223000
trusted library allocation
page read and write
1C66E81E000
heap
page read and write
1FFBF54A000
heap
page read and write
1FFB808A000
trusted library allocation
page read and write
1FFBC5C5000
trusted library allocation
page read and write
1FFB3BB0000
heap
page read and write
1FFB7DAE000
trusted library allocation
page read and write
1FFBC792000
trusted library allocation
page read and write
1FFB5949000
trusted library allocation
page read and write
1FFB6AB0000
trusted library allocation
page read and write
1FFB40A7000
trusted library allocation
page read and write
1FFB52FE000
trusted library allocation
page read and write
1FFB59C7000
trusted library allocation
page read and write
1FFB48FD000
trusted library allocation
page read and write
1FFBE125000
trusted library allocation
page read and write
1FFB49E6000
trusted library allocation
page read and write
1FFB01A0000
trusted library allocation
page read and write
1FFBE170000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFAAD41000
heap
page read and write
1FFB5D09000
trusted library allocation
page read and write
1FFB7AA9000
trusted library allocation
page read and write
1FFB5829000
trusted library allocation
page read and write
1FFB52BF000
trusted library allocation
page read and write
1FFB68EB000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB5493000
trusted library allocation
page read and write
1FFBC6B8000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFAAD52000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFB67EC000
trusted library allocation
page read and write
1FFB7D1F000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFBC8F6000
trusted library allocation
page read and write
1FFB40E3000
trusted library allocation
page read and write
1FFB57FD000
trusted library allocation
page read and write
1FFB6BC9000
trusted library allocation
page read and write
402654E000
stack
page read and write
1FFB76F8000
trusted library allocation
page read and write
1FFB77CD000
trusted library allocation
page read and write
1FFB51C9000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFB5D7E000
trusted library allocation
page read and write
1FFB7FED000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB58BB000
trusted library allocation
page read and write
1FFB44CD000
trusted library allocation
page read and write
1FFB5962000
trusted library allocation
page read and write
1FFBE122000
trusted library allocation
page read and write
1FFB69F3000
trusted library allocation
page read and write
1FFB59FD000
trusted library allocation
page read and write
1FFB52F2000
trusted library allocation
page read and write
1FFB795A000
trusted library allocation
page read and write
19B59600000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB14BE000
trusted library allocation
page read and write
1FFB77B2000
trusted library allocation
page read and write
1FFB6491000
trusted library allocation
page read and write
1FFB52FE000
trusted library allocation
page read and write
1FFAAD2F000
heap
page read and write
1FFB5704000
trusted library allocation
page read and write
1FFB8099000
trusted library allocation
page read and write
1C66E810000
heap
page read and write
1FFB58E5000
trusted library allocation
page read and write
1FFB1F2B000
trusted library allocation
page read and write
1FFB599C000
trusted library allocation
page read and write
1FFBC865000
trusted library allocation
page read and write
23C25C40000
unkown
page execute read
1FFAADAF000
heap
page read and write
1FFB5DB5000
trusted library allocation
page read and write
1FFB4BB7000
trusted library allocation
page read and write
14386386000
heap
page read and write
1FFAADB2000
heap
page read and write
1FFB04F3000
trusted library allocation
page read and write
23C268E0000
heap
page read and write
1FFB58F6000
trusted library allocation
page read and write
1FFBCC86000
trusted library allocation
page read and write
1FFB6AEA000
trusted library allocation
page read and write
19B59050000
heap
page read and write
1FFB7790000
trusted library allocation
page read and write
1FFB576D000
trusted library allocation
page read and write
1FFAAD3A000
heap
page read and write
1FFB57D9000
trusted library allocation
page read and write
23C26714000
trusted library allocation
page read and write
1FFB69ED000
trusted library allocation
page read and write
1FFBC796000
trusted library allocation
page read and write
1FFB7530000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB5AAB000
trusted library allocation
page read and write
1FFB79EF000
trusted library allocation
page read and write
1FFB6BA0000
trusted library allocation
page read and write
1FFB7DCA000
trusted library allocation
page read and write
1FFB58E0000
trusted library allocation
page read and write
1FFB5440000
trusted library allocation
page read and write
1FFB58E5000
trusted library allocation
page read and write
1FFB7FD8000
trusted library allocation
page read and write
1FFB67E6000
trusted library allocation
page read and write
1FFB7DC4000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFAAD5B000
heap
page read and write
1FFB79D7000
trusted library allocation
page read and write
1FFB5DE2000
trusted library allocation
page read and write
1FFB14C7000
trusted library allocation
page read and write
1438625B000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB1FC6000
trusted library allocation
page read and write
1FFB5233000
trusted library allocation
page read and write
1FFB577C000
trusted library allocation
page read and write
1FFAADC7000
heap
page read and write
1FFB1359000
trusted library allocation
page read and write
1FFB49D2000
trusted library allocation
page read and write
1FFB69F1000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFC0082000
trusted library allocation
page read and write
1FFB7DCA000
trusted library allocation
page read and write
1FFB805C000
trusted library allocation
page read and write
1FFB5190000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFC05F6000
trusted library allocation
page read and write
1FFB52C2000
trusted library allocation
page read and write
1FFB3EE9000
trusted library allocation
page read and write
1FFB1351000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB40FD000
trusted library allocation
page read and write
1FFB52FE000
trusted library allocation
page read and write
1FFB7ED0000
trusted library allocation
page read and write
1FFB5DB5000
trusted library allocation
page read and write
1FFB6651000
trusted library allocation
page read and write
1FFB6895000
trusted library allocation
page read and write
1FFB6AA6000
trusted library allocation
page read and write
1FFB59A2000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB7F7E000
trusted library allocation
page read and write
1FFB69E6000
trusted library allocation
page read and write
1FFB5402000
trusted library allocation
page read and write
1FFB5839000
trusted library allocation
page read and write
1FFB77AF000
trusted library allocation
page read and write
14386840000
heap
page read and write
1FFB405F000
trusted library allocation
page read and write
1FFBE162000
trusted library allocation
page read and write
1FFB440A000
trusted library allocation
page read and write
1FFBC827000
trusted library allocation
page read and write
1FFB3E79000
trusted library allocation
page read and write
1FFB4077000
trusted library allocation
page read and write
1FFB5548000
trusted library allocation
page read and write
1FFB408E000
trusted library allocation
page read and write
1FFB58E5000
trusted library allocation
page read and write
1FFBE1B0000
trusted library allocation
page read and write
1FFAADBA000
heap
page read and write
1FFB67A8000
trusted library allocation
page read and write
1FFB0076000
trusted library allocation
page read and write
1FFB04F7000
trusted library allocation
page read and write
19B5945F000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB5740000
trusted library allocation
page read and write
1FFAADD5000
heap
page read and write
19B59482000
trusted library allocation
page read and write
1FFAADAB000
heap
page read and write
1FFAADB2000
heap
page read and write
1FFB68AD000
trusted library allocation
page read and write
1FFBC5B4000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB5417000
trusted library allocation
page read and write
1FFBEBA7000
trusted library allocation
page read and write
1FFB588B000
trusted library allocation
page read and write
1FFB64E0000
trusted library allocation
page read and write
1FFB549D000
trusted library allocation
page read and write
1FFB5D9E000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB57D9000
trusted library allocation
page read and write
1FFB68B9000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB80B0000
trusted library allocation
page read and write
1FFB5DFE000
trusted library allocation
page read and write
1FFBF556000
heap
page read and write
1FFB52F6000
trusted library allocation
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB146E000
trusted library allocation
page read and write
1FFB79DD000
trusted library allocation
page read and write
1FFB146E000
trusted library allocation
page read and write
1FFB4996000
trusted library allocation
page read and write
1FFBE18C000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB57F5000
trusted library allocation
page read and write
1FFAAD35000
heap
page read and write
1FFB68D0000
trusted library allocation
page read and write
23C262D0000
heap
page read and write
1FFBE14F000
trusted library allocation
page read and write
14385E80000
unclassified section
page readonly
1FFAADBD000
heap
page read and write
1FFB1F61000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
22C0000
trusted library allocation
page read and write
1FFB7CD6000
trusted library allocation
page read and write
1438641C000
trusted library allocation
page read and write
1FFAADB4000
heap
page read and write
1FFB7FF6000
trusted library allocation
page read and write
7C391D8000
stack
page read and write
19B59403000
trusted library allocation
page read and write
1FFBF545000
heap
page read and write
23C25C49000
unkown
page execute read
1FFB6A93000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
1FFB80E8000
trusted library allocation
page read and write
402903E000
stack
page read and write
1FFBE182000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFAADC1000
heap
page read and write
1FFB49FB000
trusted library allocation
page read and write
14386272000
trusted library allocation
page read and write
1FFB49E6000
trusted library allocation
page read and write
23C25B12000
trusted library allocation
page read and write
1FFB59F4000
trusted library allocation
page read and write
1FFB55D4000
trusted library allocation
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFB3B63000
heap
page read and write
1FFB0200000
trusted library allocation
page read and write
1FFB7DD2000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB24D8000
trusted library allocation
page read and write
1FFBC5F2000
trusted library allocation
page read and write
1FFB44AC000
trusted library allocation
page read and write
1FFB7FE9000
trusted library allocation
page read and write
1FFB12CB000
trusted library allocation
page read and write
1FFB7CA2000
trusted library allocation
page read and write
1FFB586A000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB5D96000
trusted library allocation
page read and write
1FFB5899000
trusted library allocation
page read and write
1FFBE15B000
trusted library allocation
page read and write
1FFAADB9000
heap
page read and write
1FFB69F1000
trusted library allocation
page read and write
1FFB80D3000
trusted library allocation
page read and write
1FFB2463000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB7FCD000
trusted library allocation
page read and write
1FFB51E9000
trusted library allocation
page read and write
1C66D060000
heap
page read and write
1FFBE8E6000
trusted library allocation
page read and write
23C2685C000
heap
page read and write
1FFB5AF9000
trusted library allocation
page read and write
1FFB04A4000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB5469000
trusted library allocation
page read and write
1FFBE179000
trusted library allocation
page read and write
1FFB7D19000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
19B59424000
trusted library allocation
page read and write
1FFB6621000
trusted library allocation
page read and write
1FFB58FB000
trusted library allocation
page read and write
1FFB80CC000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB5D75000
trusted library allocation
page read and write
1FFB148F000
trusted library allocation
page read and write
1FFBE130000
trusted library allocation
page read and write
1F54E7E000
unkown
page readonly
1FFC05C6000
trusted library allocation
page read and write
1FFB9301000
trusted library allocation
page read and write
1FFB5759000
trusted library allocation
page read and write
221E000
stack
page read and write
1FFB7606000
trusted library allocation
page read and write
1FFBC717000
trusted library allocation
page read and write
1FFBE15B000
trusted library allocation
page read and write
402658E000
unkown
page readonly
1FFB7C58000
trusted library allocation
page read and write
1FFB249A000
trusted library allocation
page read and write
1FFB58E5000
trusted library allocation
page read and write
1FFB58E0000
trusted library allocation
page read and write
1FFAADB6000
heap
page read and write
1FFB58BB000
trusted library allocation
page read and write
1FFAAD70000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFAADC8000
heap
page read and write
1FFB7673000
trusted library allocation
page read and write
1FFB66A5000
trusted library allocation
page read and write
1FFBC5A5000
trusted library allocation
page read and write
1FFB13D1000
trusted library allocation
page read and write
1FFBF559000
heap
page read and write
1FFBC67B000
trusted library allocation
page read and write
1FFB4929000
trusted library allocation
page read and write
1FFB586A000
trusted library allocation
page read and write
1FFB7FD0000
trusted library allocation
page read and write
1FFB76C2000
trusted library allocation
page read and write
1FFB76F8000
trusted library allocation
page read and write
1FFB759B000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
1FFB77F2000
trusted library allocation
page read and write
1FFBEB7C000
trusted library allocation
page read and write
1FFB7FB6000
trusted library allocation
page read and write
1FFB68D8000
trusted library allocation
page read and write
1FFC00F7000
trusted library allocation
page read and write
23C26900000
heap
page read and write
1FFB4963000
trusted library allocation
page read and write
1C66CF07000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
1FFB5D1F000
trusted library allocation
page read and write
1FFAAD2A000
heap
page read and write
1FFB58F4000
trusted library allocation
page read and write
1FFB7D25000
trusted library allocation
page read and write
1FFAADD0000
heap
page read and write
1FFAAD3A000
heap
page read and write
1FFB5475000
trusted library allocation
page read and write
1FFB4996000
trusted library allocation
page read and write
1FFB546B000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFBEC33000
trusted library allocation
page read and write
1FFB5160000
trusted library allocation
page read and write
1FFB54D4000
trusted library allocation
page read and write
1FFC05F6000
trusted library allocation
page read and write
1FFB6BC6000
trusted library allocation
page read and write
1FFB67AE000
trusted library allocation
page read and write
1FFB58F6000
trusted library allocation
page read and write
1FFB8092000
trusted library allocation
page read and write
1FFB7F75000
trusted library allocation
page read and write
1FFAADB4000
heap
page read and write
1FFB6074000
trusted library allocation
page read and write
1FFAADC0000
heap
page read and write
1FFB5768000
trusted library allocation
page read and write
BC2000
unkown
page readonly
1FFB69F3000
trusted library allocation
page read and write
1FFB4966000
trusted library allocation
page read and write
1474000
heap
page read and write
1FFAAD51000
heap
page read and write
1FFBCB7B000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB4415000
trusted library allocation
page read and write
1FFB6491000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB665F000
trusted library allocation
page read and write
1FFBC5C1000
trusted library allocation
page read and write
1FFB7C80000
trusted library allocation
page read and write
1FFBC78E000
trusted library allocation
page read and write
1FFB76BB000
trusted library allocation
page read and write
1FFB7EA7000
trusted library allocation
page read and write
23C25B78000
trusted library allocation
page read and write
1FFB40B3000
trusted library allocation
page read and write
14386279000
trusted library allocation
page read and write
1FFAADC8000
heap
page read and write
1FFB54B2000
trusted library allocation
page read and write
1438627D000
trusted library allocation
page read and write
1FFB75E7000
trusted library allocation
page read and write
1FFB7DD9000
trusted library allocation
page read and write
23C25B86000
trusted library allocation
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFAADB6000
heap
page read and write
1FFB51D4000
trusted library allocation
page read and write
1FFB80D8000
trusted library allocation
page read and write
1FFB79FD000
trusted library allocation
page read and write
1FFB04E2000
trusted library allocation
page read and write
1FFB7CCB000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFBE1AB000
trusted library allocation
page read and write
1FFB8200000
trusted library allocation
page read and write
1FFB5891000
trusted library allocation
page read and write
1FFB54FD000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB76A4000
trusted library allocation
page read and write
1FFB544B000
trusted library allocation
page read and write
1FFB59D2000
trusted library allocation
page read and write
1FFB69AC000
trusted library allocation
page read and write
1FFB55BC000
trusted library allocation
page read and write
1FFB7A7C000
trusted library allocation
page read and write
1FFB52F8000
trusted library allocation
page read and write
1FFB801D000
trusted library allocation
page read and write
23C2685F000
heap
page read and write
1FFB7790000
trusted library allocation
page read and write
1FFB7E9B000
trusted library allocation
page read and write
1FFB40F7000
trusted library allocation
page read and write
1FFB6A93000
trusted library allocation
page read and write
1FFB5992000
trusted library allocation
page read and write
1FFB7F48000
trusted library allocation
page read and write
1FFB68F3000
trusted library allocation
page read and write
1FFB575F000
trusted library allocation
page read and write
1FFB64BC000
trusted library allocation
page read and write
1FFC070D000
trusted library allocation
page read and write
1FFB6A6B000
trusted library allocation
page read and write
1FFB55B6000
trusted library allocation
page read and write
1FFB7780000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB546B000
trusted library allocation
page read and write
1FFB1F0C000
trusted library allocation
page read and write
1FFB5DC3000
trusted library allocation
page read and write
1FFB586A000
trusted library allocation
page read and write
1FFAAD70000
heap
page read and write
1FFB1FF6000
trusted library allocation
page read and write
1FFBE154000
trusted library allocation
page read and write
1FFB4923000
trusted library allocation
page read and write
1FFB441B000
trusted library allocation
page read and write
1FFB759B000
trusted library allocation
page read and write
1FFB59EE000
trusted library allocation
page read and write
1FFAF6B3000
trusted library allocation
page read and write
23C268F1000
heap
page read and write
1FFBC584000
trusted library allocation
page read and write
1FFAAD3A000
heap
page read and write
1FFBC642000
trusted library allocation
page read and write
1FFB3B5C000
heap
page read and write
1FFB5888000
trusted library allocation
page read and write
1FFB58BB000
trusted library allocation
page read and write
23C268E8000
heap
page read and write
23C257F0000
heap
page read and write
1FFB75DC000
trusted library allocation
page read and write
1FFBC59F000
trusted library allocation
page read and write
1FFB5A43000
trusted library allocation
page read and write
1FFB22CE000
trusted library allocation
page read and write
1FFAAD3B000
heap
page read and write
19B594F4000
trusted library allocation
page read and write
1FFBF55C000
heap
page read and write
1FFB585B000
trusted library allocation
page read and write
1FFAADB3000
heap
page read and write
1FFB5594000
trusted library allocation
page read and write
1FFB494E000
trusted library allocation
page read and write
1FFB3B4E000
heap
page read and write
1FFB57F5000
trusted library allocation
page read and write
1FFB4966000
trusted library allocation
page read and write
1643000
heap
page read and write
1FFB7F6F000
trusted library allocation
page read and write
1FFB51E8000
trusted library allocation
page read and write
1FFBFFE0000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB6B45000
trusted library allocation
page read and write
1FFB1FC8000
trusted library allocation
page read and write
1FFB5AF9000
trusted library allocation
page read and write
1FFAAD54000
heap
page read and write
BCC000
unkown
page read and write
1FFAAD5B000
heap
page read and write
1FFC05BE000
trusted library allocation
page read and write
1474000
heap
page read and write
1FFC06B7000
trusted library allocation
page read and write
1FFB12AA000
trusted library allocation
page read and write
1FFAADC7000
heap
page read and write
1FFB6674000
trusted library allocation
page read and write
1FFAAD3C000
heap
page read and write
1FFB77AC000
trusted library allocation
page read and write
1FFB542B000
trusted library allocation
page read and write
1FFB5840000
trusted library allocation
page read and write
1FFB7DCA000
trusted library allocation
page read and write
1FFB1164000
trusted library allocation
page read and write
23C25BF3000
trusted library allocation
page read and write
1FFB64A8000
trusted library allocation
page read and write
1FFB5DA8000
trusted library allocation
page read and write
1FFB64F4000
trusted library allocation
page read and write
9CB05FD000
stack
page read and write
1FFB5473000
trusted library allocation
page read and write
1FFB6B18000
trusted library allocation
page read and write
1FFB571C000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFBC8E2000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFBE162000
trusted library allocation
page read and write
1FFB5ADC000
trusted library allocation
page read and write
1FFB5405000
trusted library allocation
page read and write
1FFB8050000
trusted library allocation
page read and write
1FFB773E000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFB7947000
trusted library allocation
page read and write
1FFAADD6000
heap
page read and write
1FFB5169000
trusted library allocation
page read and write
1FFBFF0A000
trusted library allocation
page read and write
1FFBCCA3000
trusted library allocation
page read and write
1FFBE15C000
trusted library allocation
page read and write
1FFB01D1000
trusted library allocation
page read and write
1FFB40E9000
trusted library allocation
page read and write
1FFB4471000
trusted library allocation
page read and write
1FFB8096000
trusted library allocation
page read and write
1FFBC7F3000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB5137000
trusted library allocation
page read and write
1FFB7DAA000
trusted library allocation
page read and write
1FFB40EF000
trusted library allocation
page read and write
1FFAADCF000
heap
page read and write
1FFB7947000
trusted library allocation
page read and write
1FFBC59D000
trusted library allocation
page read and write
1FFB14F6000
trusted library allocation
page read and write
1FFB1364000
trusted library allocation
page read and write
1FFB8060000
trusted library allocation
page read and write
1FFB5D6B000
trusted library allocation
page read and write
1FFB65B6000
trusted library allocation
page read and write
23C2686C000
heap
page read and write
1FFB80C1000
trusted library allocation
page read and write
1FFB7FED000
trusted library allocation
page read and write
1FFB3F5D000
trusted library allocation
page read and write
1653000
heap
page read and write
1FFB52F5000
trusted library allocation
page read and write
1FFB40E9000
trusted library allocation
page read and write
1FFB04E4000
trusted library allocation
page read and write
1FFB1F26000
trusted library allocation
page read and write
1FFBEB88000
trusted library allocation
page read and write
1FFBC62D000
trusted library allocation
page read and write
23C268FC000
heap
page read and write
1E1E000
stack
page read and write
1FFB6BC6000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
23C26959000
heap
page read and write
1FFB145F000
trusted library allocation
page read and write
1FFB5867000
trusted library allocation
page read and write
1FFBE11C000
trusted library allocation
page read and write
1FFBE1BD000
trusted library allocation
page read and write
1FFB67BA000
trusted library allocation
page read and write
1FFB57F3000
trusted library allocation
page read and write
1FFB585B000
trusted library allocation
page read and write
23C26860000
heap
page read and write
1FFB7593000
trusted library allocation
page read and write
1FFB75F3000
trusted library allocation
page read and write
1FFB5839000
trusted library allocation
page read and write
1FFB5DE2000
trusted library allocation
page read and write
1FFB405E000
trusted library allocation
page read and write
1FFB8060000
trusted library allocation
page read and write
1FFB13AF000
trusted library allocation
page read and write
1FFBC5F6000
trusted library allocation
page read and write
1FFC06EA000
trusted library allocation
page read and write
19B59030000
heap
page read and write
1FFBF556000
heap
page read and write
1FFB3FF9000
trusted library allocation
page read and write
1FFB407D000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFAAD41000
heap
page read and write
1FFB6B36000
trusted library allocation
page read and write
1FFB3EA1000
trusted library allocation
page read and write
23C25B81000
trusted library allocation
page read and write
1FFB6491000
trusted library allocation
page read and write
1FFB6651000
trusted library allocation
page read and write
1FFB67B6000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB494E000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFBC709000
trusted library allocation
page read and write
1FFB44EE000
trusted library allocation
page read and write
1FFAADD3000
heap
page read and write
23C25B75000
trusted library allocation
page read and write
24464E00000
trusted library allocation
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFB12EE000
trusted library allocation
page read and write
23C26959000
heap
page read and write
1FFB75E2000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB3BC8000
heap
page read and write
1EF358E24000
trusted library allocation
page read and write
19B59010000
heap
page read and write
1FFB40EF000
trusted library allocation
page read and write
1FFB49D2000
trusted library allocation
page read and write
1FFB809F000
trusted library allocation
page read and write
1FFB7CA5000
trusted library allocation
page read and write
1438625D000
trusted library allocation
page read and write
1FFBCC00000
trusted library allocation
page read and write
1FFB512B000
trusted library allocation
page read and write
1FFB7DDB000
trusted library allocation
page read and write
1FFBC5C9000
trusted library allocation
page read and write
1FFAADCF000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFB1F1F000
trusted library allocation
page read and write
1FFB117A000
trusted library allocation
page read and write
1FFB75E2000
trusted library allocation
page read and write
1FFB13DA000
trusted library allocation
page read and write
1FFBE1BD000
trusted library allocation
page read and write
1FFB40DD000
trusted library allocation
page read and write
1FFBFF41000
trusted library allocation
page read and write
1FFB11AD000
trusted library allocation
page read and write
1FFBE154000
trusted library allocation
page read and write
1FFBFFE6000
trusted library allocation
page read and write
1660000
heap
page read and write
1FFB7F58000
trusted library allocation
page read and write
23C25B10000
trusted library allocation
page read and write
1FFB768D000
trusted library allocation
page read and write
1FFC003F000
trusted library allocation
page read and write
1FFB6B68000
trusted library allocation
page read and write
1FFB57F5000
trusted library allocation
page read and write
1FFB401C000
trusted library allocation
page read and write
1FFB40E9000
trusted library allocation
page read and write
1FFB4BB5000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFAADB2000
heap
page read and write
1FFBE88A000
trusted library allocation
page read and write
1FFBE1A0000
trusted library allocation
page read and write
1FFB24CB000
trusted library allocation
page read and write
1FFB5D47000
trusted library allocation
page read and write
1FFBC819000
trusted library allocation
page read and write
1FFB68B7000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFB5480000
trusted library allocation
page read and write
1FFB5AF9000
trusted library allocation
page read and write
1FFAAD56000
heap
page read and write
1FFB409A000
trusted library allocation
page read and write
1FFB145D000
trusted library allocation
page read and write
1FFB5435000
trusted library allocation
page read and write
1FFAADB4000
heap
page read and write
1FFB3E51000
trusted library allocation
page read and write
24464FE0000
heap
page read and write
1FFB6050000
trusted library allocation
page read and write
1FFB54CD000
trusted library allocation
page read and write
1FFB5832000
trusted library allocation
page read and write
1FFB7F75000
trusted library allocation
page read and write
1FFAADC0000
heap
page read and write
1FFB544B000
trusted library allocation
page read and write
1FFAAD68000
heap
page read and write
1FFB67DE000
trusted library allocation
page read and write
1FFB7CD2000
trusted library allocation
page read and write
1FFB3B63000
heap
page read and write
1FFB75E8000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB6A96000
trusted library allocation
page read and write
1FFB52CF000
trusted library allocation
page read and write
1FFB545F000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB5AEF000
trusted library allocation
page read and write
B00000
unkown
page readonly
1FFB0071000
trusted library allocation
page read and write
1FFB662A000
trusted library allocation
page read and write
1FFB76B3000
trusted library allocation
page read and write
1FFAAD31000
heap
page read and write
1FFBE122000
trusted library allocation
page read and write
1FFB59F4000
trusted library allocation
page read and write
9CB0DFE000
stack
page read and write
1FFB5DF6000
trusted library allocation
page read and write
1FFB661A000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB7DB6000
trusted library allocation
page read and write
1FFB5989000
trusted library allocation
page read and write
1FFB77F2000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFC0578000
trusted library allocation
page read and write
1FFBC856000
trusted library allocation
page read and write
1FFAAD44000
heap
page read and write
23C25C4B000
unkown
page execute read
1FFB54DD000
trusted library allocation
page read and write
23C26800000
heap
page read and write
1FFB1124000
trusted library allocation
page read and write
1FFB5533000
trusted library allocation
page read and write
1FFAAD2E000
heap
page read and write
1FFB67EC000
trusted library allocation
page read and write
1FFB759B000
trusted library allocation
page read and write
1FFBC632000
trusted library allocation
page read and write
1FFB64BC000
trusted library allocation
page read and write
1FFB67EE000
trusted library allocation
page read and write
1FFB7FF3000
trusted library allocation
page read and write
1FFB57D7000
trusted library allocation
page read and write
1FFBC5BC000
trusted library allocation
page read and write
1FFB75F3000
trusted library allocation
page read and write
1FFBE13F000
trusted library allocation
page read and write
1FFB7C3B000
trusted library allocation
page read and write
1FFB7DAC000
trusted library allocation
page read and write
23C268ED000
heap
page read and write
1FFB13D8000
trusted library allocation
page read and write
23C2696A000
heap
page read and write
1FFB49ED000
trusted library allocation
page read and write
1FFB64C0000
trusted library allocation
page read and write
1FFB49F0000
trusted library allocation
page read and write
1FFB6BA0000
trusted library allocation
page read and write
1FFB6659000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFAAD88000
heap
page read and write
1FFB3F9A000
trusted library allocation
page read and write
1FFB75F9000
trusted library allocation
page read and write
1FFB55D9000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFAAD55000
heap
page read and write
402A03E000
stack
page read and write
1C66CC54000
heap
page read and write
23C268E6000
heap
page read and write
1FFB79CC000
trusted library allocation
page read and write
1FFB7DB6000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFC0012000
trusted library allocation
page read and write
1FFAADC0000
heap
page read and write
1FFBC7BF000
trusted library allocation
page read and write
1FFB513B000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB4016000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB583D000
trusted library allocation
page read and write
1FFB4918000
trusted library allocation
page read and write
1FFBE16C000
trusted library allocation
page read and write
1FFBE8E9000
trusted library allocation
page read and write
1FFB6B38000
trusted library allocation
page read and write
1FFB5708000
trusted library allocation
page read and write
1FFB2458000
trusted library allocation
page read and write
1FFB5DA8000
trusted library allocation
page read and write
1FFB760F000
trusted library allocation
page read and write
1FFBE104000
trusted library allocation
page read and write
1FFB6B45000
trusted library allocation
page read and write
1FFC05F0000
trusted library allocation
page read and write
1FFB7EFE000
trusted library allocation
page read and write
1FFB807E000
trusted library allocation
page read and write
1FFB5423000
trusted library allocation
page read and write
1FFC05CC000
trusted library allocation
page read and write
1FFBC6F0000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFBE127000
trusted library allocation
page read and write
13FE000
stack
page read and write
1FFB7C54000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
143860A0000
heap
page read and write
9CAFDFF000
stack
page read and write
1FFB6963000
trusted library allocation
page read and write
1FFB12D6000
trusted library allocation
page read and write
1FFC007B000
trusted library allocation
page read and write
1FFB1479000
trusted library allocation
page read and write
1FFBE8E2000
trusted library allocation
page read and write
1FFB59FD000
trusted library allocation
page read and write
1FFB49D2000
trusted library allocation
page read and write
1FFB7DB6000
trusted library allocation
page read and write
1FFB5440000
trusted library allocation
page read and write
1FFB7E67000
trusted library allocation
page read and write
1FFB1FD8000
trusted library allocation
page read and write
1FFB52A3000
trusted library allocation
page read and write
1FFB5D33000
trusted library allocation
page read and write
1FFB586A000
trusted library allocation
page read and write
1FFB76A4000
trusted library allocation
page read and write
1FFBE146000
trusted library allocation
page read and write
1FFB6A58000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFBC596000
trusted library allocation
page read and write
14385E70000
unclassified section
page readonly
1FFAAD92000
heap
page read and write
23C25BE9000
trusted library allocation
page read and write
1FFB76E0000
trusted library allocation
page read and write
1FFB11FE000
trusted library allocation
page read and write
1FFB4923000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFBC70D000
trusted library allocation
page read and write
1FFB1469000
trusted library allocation
page read and write
1FFBC5B8000
trusted library allocation
page read and write
1FFC06D3000
trusted library allocation
page read and write
1FFB58B3000
trusted library allocation
page read and write
1FFB7E61000
trusted library allocation
page read and write
23C26978000
heap
page read and write
1FFB529E000
trusted library allocation
page read and write
1FFB5414000
trusted library allocation
page read and write
1FFB546B000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB40FD000
trusted library allocation
page read and write
1FFB7ED0000
trusted library allocation
page read and write
1FFB5475000
trusted library allocation
page read and write
1FFB65D9000
trusted library allocation
page read and write
1FFB40A7000
trusted library allocation
page read and write
1FFB7FD6000
trusted library allocation
page read and write
1FFB5843000
trusted library allocation
page read and write
1FFB5768000
trusted library allocation
page read and write
1FFB529E000
trusted library allocation
page read and write
1FFAAD53000
heap
page read and write
1FFAADD6000
heap
page read and write
1C66CC20000
heap
page read and write
1FFC05BE000
trusted library allocation
page read and write
1FFB7C5F000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFAAD53000
heap
page read and write
23C2696A000
heap
page read and write
1FFB67E4000
trusted library allocation
page read and write
1FFB5432000
trusted library allocation
page read and write
1FFBC75B000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFAADD6000
heap
page read and write
1FFAAD3F000
heap
page read and write
1FFB58F6000
trusted library allocation
page read and write
23C2696A000
heap
page read and write
1FFB3B4E000
heap
page read and write
1FFB1FC7000
trusted library allocation
page read and write
1FFBE1F6000
trusted library allocation
page read and write
1FFB678E000
trusted library allocation
page read and write
1FFB5768000
trusted library allocation
page read and write
9CB1DFE000
stack
page read and write
1FFB57F3000
trusted library allocation
page read and write
1FFB6A93000
trusted library allocation
page read and write
1FFB48E6000
trusted library allocation
page read and write
1FFB3B5C000
heap
page read and write
1C66D065000
heap
page read and write
1FFB49D6000
trusted library allocation
page read and write
1FFBE1F6000
trusted library allocation
page read and write
1FFB4BCA000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFBC5E2000
trusted library allocation
page read and write
1FFB6689000
trusted library allocation
page read and write
1FFB775F000
trusted library allocation
page read and write
1FFB1476000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB5989000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB59F9000
trusted library allocation
page read and write
1FFB66A7000
trusted library allocation
page read and write
1FFB6B5C000
trusted library allocation
page read and write
1FFBE19E000
trusted library allocation
page read and write
1FFAAD32000
heap
page read and write
1FFBC794000
trusted library allocation
page read and write
1FFBC796000
trusted library allocation
page read and write
1FFB69FD000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
23C25CA4000
heap
page read and write
1FFB58E5000
trusted library allocation
page read and write
23C259C0000
trusted library section
page readonly
1FFB59D2000
trusted library allocation
page read and write
1FFB6491000
trusted library allocation
page read and write
1FFBE13E000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB67E6000
trusted library allocation
page read and write
1FFB68F3000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB54A1000
trusted library allocation
page read and write
1FFB0126000
trusted library allocation
page read and write
1FFB12B5000
trusted library allocation
page read and write
1FFB7EFC000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB407A000
trusted library allocation
page read and write
1FFB24CF000
trusted library allocation
page read and write
1FFB4070000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
23C25A00000
trusted library allocation
page read and write
1FFBF702000
trusted library allocation
page read and write
1FFB64E0000
trusted library allocation
page read and write
1FFB8052000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB58DC000
trusted library allocation
page read and write
1FFB1464000
trusted library allocation
page read and write
1FFB546B000
trusted library allocation
page read and write
1FFB5992000
trusted library allocation
page read and write
1FFB5118000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFBE159000
trusted library allocation
page read and write
23C25C64000
unkown
page execute read
22C0000
trusted library allocation
page read and write
1FFC06D8000
trusted library allocation
page read and write
1FFB40B3000
trusted library allocation
page read and write
1FFAADCE000
heap
page read and write
19B59500000
heap
page read and write
1FFBC833000
trusted library allocation
page read and write
1FFBEA87000
trusted library allocation
page read and write
1FFBE1C3000
trusted library allocation
page read and write
1FFB75DC000
trusted library allocation
page read and write
1FFB6A6B000
trusted library allocation
page read and write
1FFB7D49000
trusted library allocation
page read and write
1FFB5553000
trusted library allocation
page read and write
1FFB4438000
trusted library allocation
page read and write
143862B2000
trusted library allocation
page read and write
1FFB5D68000
trusted library allocation
page read and write
23C268A1000
heap
page read and write
1FFAADC1000
heap
page read and write
1FFAAD3B000
heap
page read and write
1FFB40F7000
trusted library allocation
page read and write
1FFB6AC6000
trusted library allocation
page read and write
1FFB59F9000
trusted library allocation
page read and write
1FFB47EE000
trusted library allocation
page read and write
23C268AA000
heap
page read and write
1FFAAD53000
heap
page read and write
1FFB80D3000
trusted library allocation
page read and write
1FFB5873000
trusted library allocation
page read and write
1FFB4946000
trusted library allocation
page read and write
1FFB4091000
trusted library allocation
page read and write
1FFBCCC5000
trusted library allocation
page read and write
1FFB7FC4000
trusted library allocation
page read and write
1FFB5213000
trusted library allocation
page read and write
402650E000
unkown
page readonly
1FFC05C0000
trusted library allocation
page read and write
1FFB400C000
trusted library allocation
page read and write
1FFBC798000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFAADB0000
heap
page read and write
1FFAADC8000
heap
page read and write
1FFB76D4000
trusted library allocation
page read and write
1FFAAD53000
heap
page read and write
1FFB5982000
trusted library allocation
page read and write
1FFB04E7000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB24D2000
trusted library allocation
page read and write
1FFBC8E2000
trusted library allocation
page read and write
1FFB58E0000
trusted library allocation
page read and write
1FFB1FD0000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB668F000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB4056000
trusted library allocation
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFB544F000
trusted library allocation
page read and write
1FFB0023000
trusted library allocation
page read and write
1FFB5717000
trusted library allocation
page read and write
1FFB7FF3000
trusted library allocation
page read and write
1FFAADAB000
heap
page read and write
1FFC070B000
trusted library allocation
page read and write
1FFBCCAC000
trusted library allocation
page read and write
1FFB1F61000
trusted library allocation
page read and write
1FFAADD0000
heap
page read and write
1FFB24D2000
trusted library allocation
page read and write
1474000
heap
page read and write
1FFB137F000
trusted library allocation
page read and write
1FFB7FEB000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFBC688000
trusted library allocation
page read and write
1FFB52EC000
trusted library allocation
page read and write
1FFB54B8000
trusted library allocation
page read and write
1FFB44F4000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFAAD51000
heap
page read and write
1FFB5DBC000
trusted library allocation
page read and write
1FFB7EE0000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFAAD32000
heap
page read and write
1FFBE165000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
1FFBE146000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFB5873000
trusted library allocation
page read and write
1FFB4991000
trusted library allocation
page read and write
1FFB01D1000
trusted library allocation
page read and write
1FFB1FC1000
trusted library allocation
page read and write
1FFAAD54000
heap
page read and write
1FFB14FA000
trusted library allocation
page read and write
1FFB5141000
trusted library allocation
page read and write
1FFBE162000
trusted library allocation
page read and write
1470000
heap
page read and write
1FFB8076000
trusted library allocation
page read and write
1FFB51D3000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFAAD4B000
heap
page read and write
1FFB1F78000
trusted library allocation
page read and write
1FFBF55C000
heap
page read and write
1FFB64AD000
trusted library allocation
page read and write
1FFBE14F000
trusted library allocation
page read and write
1FFB40D5000
trusted library allocation
page read and write
1FFB40FB000
trusted library allocation
page read and write
1FFB545E000
trusted library allocation
page read and write
1FFBC680000
trusted library allocation
page read and write
1FFB40A7000
trusted library allocation
page read and write
1FFB65B6000
trusted library allocation
page read and write
DD9000
stack
page read and write
1FFB54B8000
trusted library allocation
page read and write
1FFB5DB2000
trusted library allocation
page read and write
1C66CC40000
heap
page read and write
1FFB59EE000
trusted library allocation
page read and write
1FFB13FA000
trusted library allocation
page read and write
1FFB75F9000
trusted library allocation
page read and write
1FFB80B0000
trusted library allocation
page read and write
1FFB4963000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB64C8000
trusted library allocation
page read and write
1FFB7ED2000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFAADC1000
heap
page read and write
1FFB55EC000
trusted library allocation
page read and write
1FFB4078000
trusted library allocation
page read and write
1FFB8096000
trusted library allocation
page read and write
23C26923000
heap
page read and write
1FFAAD3B000
heap
page read and write
1FFB7DB0000
trusted library allocation
page read and write
1FFB7F4F000
trusted library allocation
page read and write
23C2693C000
heap
page read and write
1FFB52FE000
trusted library allocation
page read and write
1FFAAD3A000
heap
page read and write
1FFB75D5000
trusted library allocation
page read and write
1FFBCD06000
trusted library allocation
page read and write
1FFBE152000
trusted library allocation
page read and write
1FFB1FBB000
trusted library allocation
page read and write
1FFB3DD0000
trusted library allocation
page read and write
1FFB14FE000
trusted library allocation
page read and write
1FFB3B5C000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFAAD3A000
heap
page read and write
1FFB516D000
trusted library allocation
page read and write
1FFAAD56000
heap
page read and write
1FFB55C6000
trusted library allocation
page read and write
1FFB517A000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB4BED000
trusted library allocation
page read and write
1FFB4BE7000
trusted library allocation
page read and write
1FFB51D8000
trusted library allocation
page read and write
1FFBFF4A000
trusted library allocation
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB55B3000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB5490000
trusted library allocation
page read and write
1FFB4091000
trusted library allocation
page read and write
1FFAADC0000
heap
page read and write
1FFB01B0000
trusted library allocation
page read and write
1FFBE127000
trusted library allocation
page read and write
1FFB40AF000
trusted library allocation
page read and write
1FFB7586000
trusted library allocation
page read and write
1FFB7C5F000
trusted library allocation
page read and write
1FFB5DFE000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB69F6000
trusted library allocation
page read and write
23C25B5C000
trusted library allocation
page read and write
1FFB4435000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFAF681000
trusted library allocation
page read and write
1FFB7EED000
trusted library allocation
page read and write
1FFB4070000
trusted library allocation
page read and write
1FFB5D61000
trusted library allocation
page read and write
1FFB4941000
trusted library allocation
page read and write
1FFB757B000
trusted library allocation
page read and write
1FFB7DDB000
trusted library allocation
page read and write
1FFB7DC2000
trusted library allocation
page read and write
1FFB542B000
trusted library allocation
page read and write
1FFB8099000
trusted library allocation
page read and write
1FFB577E000
trusted library allocation
page read and write
1FFB8025000
trusted library allocation
page read and write
1FFB64B3000
trusted library allocation
page read and write
23C26700000
trusted library allocation
page read and write
1FFAADA8000
heap
page read and write
1FFB5816000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB5ADE000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB5493000
trusted library allocation
page read and write
1FFBE1A7000
trusted library allocation
page read and write
1FFB7ECE000
trusted library allocation
page read and write
1FFC0043000
trusted library allocation
page read and write
23C25C50000
heap
page read and write
23C25BBC000
trusted library allocation
page read and write
1FFAADC0000
heap
page read and write
1FFBFFF3000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFBE1BD000
trusted library allocation
page read and write
1FFBEDCE000
trusted library allocation
page read and write
1FFBC8D3000
trusted library allocation
page read and write
1FFB76C2000
trusted library allocation
page read and write
1FFB5165000
trusted library allocation
page read and write
1FFB5891000
trusted library allocation
page read and write
1FFB52CF000
trusted library allocation
page read and write
1FFB544F000
trusted library allocation
page read and write
1FFB5463000
trusted library allocation
page read and write
1FFB59F4000
trusted library allocation
page read and write
1FFC0023000
trusted library allocation
page read and write
1FFB49C5000
trusted library allocation
page read and write
1FFB1FDC000
trusted library allocation
page read and write
1FFB571A000
trusted library allocation
page read and write
1FFB58BB000
trusted library allocation
page read and write
1FFB1458000
trusted library allocation
page read and write
1FFB7D2C000
trusted library allocation
page read and write
1FFB8092000
trusted library allocation
page read and write
1FFBF519000
heap
page read and write
1FFAAD52000
heap
page read and write
1FFB1FFE000
trusted library allocation
page read and write
1FFAAD65000
heap
page read and write
1C66CDE0000
heap
page read and write
1FFB6AB4000
trusted library allocation
page read and write
1FFB3F9A000
trusted library allocation
page read and write
1FFB4070000
trusted library allocation
page read and write
1FFB40B3000
trusted library allocation
page read and write
1FFB66B7000
trusted library allocation
page read and write
1FFB49DC000
trusted library allocation
page read and write
23C2687F000
heap
page read and write
1FFBC82F000
trusted library allocation
page read and write
1FFB44BA000
trusted library allocation
page read and write
1FFAAD3B000
heap
page read and write
23C2686C000
heap
page read and write
1FFC03CE000
trusted library allocation
page read and write
1FFB6B47000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFB6AE8000
trusted library allocation
page read and write
1FFB772C000
trusted library allocation
page read and write
1FFB59FB000
trusted library allocation
page read and write
1FFB1496000
trusted library allocation
page read and write
1FFB5D75000
trusted library allocation
page read and write
1FFB5AF0000
trusted library allocation
page read and write
1FFB8076000
trusted library allocation
page read and write
1FFB80FA000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB12B3000
trusted library allocation
page read and write
1FFC036D000
trusted library allocation
page read and write
1FFB0166000
trusted library allocation
page read and write
1FFB515E000
trusted library allocation
page read and write
4000000
heap
page read and write
1FFAADCF000
heap
page read and write
1FFB7DB6000
trusted library allocation
page read and write
1FFB5851000
trusted library allocation
page read and write
1FFAADC8000
heap
page read and write
1474000
heap
page read and write
1FFB52F7000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFBC5E2000
trusted library allocation
page read and write
1FFB6BE6000
trusted library allocation
page read and write
1FFB59F4000
trusted library allocation
page read and write
1FFBE154000
trusted library allocation
page read and write
1FFBEAE5000
trusted library allocation
page read and write
1FFAAD54000
heap
page read and write
1FFB14C7000
trusted library allocation
page read and write
1474000
heap
page read and write
1FFB544B000
trusted library allocation
page read and write
1FFB7E79000
trusted library allocation
page read and write
1FFB249E000
trusted library allocation
page read and write
1FFB5992000
trusted library allocation
page read and write
1FFB24EA000
trusted library allocation
page read and write
1FFB64AD000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFBC792000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB7EFE000
trusted library allocation
page read and write
1FFB6B9C000
trusted library allocation
page read and write
1FFB48A1000
trusted library allocation
page read and write
1FFB5442000
trusted library allocation
page read and write
1FFB64E0000
trusted library allocation
page read and write
1FFBE1EA000
trusted library allocation
page read and write
1FFB00F6000
trusted library allocation
page read and write
1FFB7940000
trusted library allocation
page read and write
1FFB76C6000
trusted library allocation
page read and write
1FFBF555000
heap
page read and write
1FFB59EE000
trusted library allocation
page read and write
1FFB80CC000
trusted library allocation
page read and write
1FFB7C52000
trusted library allocation
page read and write
1FFB577C000
trusted library allocation
page read and write
1438640C000
trusted library allocation
page read and write
1FFBE17D000
trusted library allocation
page read and write
1FFB69F6000
trusted library allocation
page read and write
1FFBEAA3000
trusted library allocation
page read and write
1FFAAD53000
heap
page read and write
1FFBCD57000
trusted library allocation
page read and write
1FFB4946000
trusted library allocation
page read and write
1FFB7FAB000
trusted library allocation
page read and write
1FFB1F2C000
trusted library allocation
page read and write
1FFAADD0000
heap
page read and write
1FFBEDF1000
trusted library allocation
page read and write
1FFB69ED000
trusted library allocation
page read and write
1FFB6036000
trusted library allocation
page read and write
1FFB4962000
trusted library allocation
page read and write
1FFB7551000
trusted library allocation
page read and write
1FFB5AF9000
trusted library allocation
page read and write
1FFB5816000
trusted library allocation
page read and write
1FFB7FFE000
trusted library allocation
page read and write
1FFB75AC000
trusted library allocation
page read and write
1FFBCC41000
trusted library allocation
page read and write
1640000
heap
page read and write
1FFB7C77000
trusted library allocation
page read and write
1FFAAD54000
heap
page read and write
1FFB24CF000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB1F31000
trusted library allocation
page read and write
1FFB5A43000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB2454000
trusted library allocation
page read and write
23C2696A000
heap
page read and write
1FFB7D25000
trusted library allocation
page read and write
1FFB448D000
trusted library allocation
page read and write
1FFB59FB000
trusted library allocation
page read and write
1FFB571C000
trusted library allocation
page read and write
1FFB4454000
trusted library allocation
page read and write
1FFB77B2000
trusted library allocation
page read and write
1FFC05F6000
trusted library allocation
page read and write
1FFB7DAE000
trusted library allocation
page read and write
1FFB8043000
trusted library allocation
page read and write
1FFB7C88000
trusted library allocation
page read and write
1FFB584D000
trusted library allocation
page read and write
1FFC005B000
trusted library allocation
page read and write
1FFB5D2B000
trusted library allocation
page read and write
1FFB67F5000
trusted library allocation
page read and write
1FFB52FE000
trusted library allocation
page read and write
1FFB3E55000
trusted library allocation
page read and write
1FFB6B5C000
trusted library allocation
page read and write
1FFB67E8000
trusted library allocation
page read and write
1FFBC8DE000
trusted library allocation
page read and write
1FFB1F1A000
trusted library allocation
page read and write
1FFB44AC000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB1FAB000
trusted library allocation
page read and write
7C3C33E000
stack
page read and write
1FFB407A000
trusted library allocation
page read and write
1FFB54BC000
trusted library allocation
page read and write
1FFBC854000
trusted library allocation
page read and write
1FFBC839000
trusted library allocation
page read and write
1FFB5190000
trusted library allocation
page read and write
1FFB5AF9000
trusted library allocation
page read and write
23C258A0000
heap
page read and write
1FFB6A5D000
trusted library allocation
page read and write
1FFBF545000
heap
page read and write
1FFAADBA000
heap
page read and write
1FFAADAB000
heap
page read and write
1FFBFF94000
trusted library allocation
page read and write
1FFB1469000
trusted library allocation
page read and write
1FFB8047000
trusted library allocation
page read and write
1FFBC71B000
trusted library allocation
page read and write
1FFBC7ED000
trusted library allocation
page read and write
1FFB44EE000
trusted library allocation
page read and write
1FFB58E5000
trusted library allocation
page read and write
1FFB40E1000
trusted library allocation
page read and write
1FFB5710000
trusted library allocation
page read and write
1FFB51EE000
trusted library allocation
page read and write
1FFBEBF9000
trusted library allocation
page read and write
1FFB7DAE000
trusted library allocation
page read and write
1FFB5AEF000
trusted library allocation
page read and write
1FFB648B000
trusted library allocation
page read and write
1FFB3B79000
heap
page read and write
1FFAAD5B000
heap
page read and write
1FFB5AF9000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
1FFAADCD000
heap
page read and write
1FFB68BB000
trusted library allocation
page read and write
1FFC0584000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB6BDC000
trusted library allocation
page read and write
1FFB67F3000
trusted library allocation
page read and write
1FFB5299000
trusted library allocation
page read and write
1FFB6BC9000
trusted library allocation
page read and write
1FFBC70A000
trusted library allocation
page read and write
1FFB5D64000
trusted library allocation
page read and write
1FFB58F4000
trusted library allocation
page read and write
1FFB0497000
trusted library allocation
page read and write
1FFB52FE000
trusted library allocation
page read and write
1FFB5478000
trusted library allocation
page read and write
1FFBEBA7000
trusted library allocation
page read and write
1FFB59FD000
trusted library allocation
page read and write
1FFB766D000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
1FFBEBBE000
trusted library allocation
page read and write
1FFBFFC1000
trusted library allocation
page read and write
1EF358E1E000
trusted library allocation
page read and write
1FFB5190000
trusted library allocation
page read and write
1FFB574F000
trusted library allocation
page read and write
1474000
heap
page read and write
1FFBE152000
trusted library allocation
page read and write
1FFB11DE000
trusted library allocation
page read and write
1FFB48CB000
trusted library allocation
page read and write
1FFB8079000
trusted library allocation
page read and write
1FFB54BC000
trusted library allocation
page read and write
1FFB4034000
trusted library allocation
page read and write
1FFB0182000
trusted library allocation
page read and write
1FFB79D7000
trusted library allocation
page read and write
1FFB5473000
trusted library allocation
page read and write
14386266000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB6B38000
trusted library allocation
page read and write
1FFB51A0000
trusted library allocation
page read and write
1FFB48E6000
trusted library allocation
page read and write
1FFB1FD8000
trusted library allocation
page read and write
1FFB68EB000
trusted library allocation
page read and write
1FFB44AA000
trusted library allocation
page read and write
1FFBC675000
trusted library allocation
page read and write
1FFB4420000
trusted library allocation
page read and write
1FFAADC7000
heap
page read and write
143860AA000
heap
page read and write
1C66CC44000
heap
page read and write
1FFB54E1000
trusted library allocation
page read and write
1FFB68E7000
trusted library allocation
page read and write
1438627B000
trusted library allocation
page read and write
1FFAADAB000
heap
page read and write
1FFB5445000
trusted library allocation
page read and write
1FFB51EE000
trusted library allocation
page read and write
1FFB580B000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB5283000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB80AB000
trusted library allocation
page read and write
1C66CE00000
trusted library allocation
page read and write
19B59413000
trusted library allocation
page read and write
1FFB400A000
trusted library allocation
page read and write
1FFB51FC000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB5D28000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB14A1000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB58E0000
trusted library allocation
page read and write
1FFB1F53000
trusted library allocation
page read and write
1FFB7FD8000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFC05CA000
trusted library allocation
page read and write
23C2692B000
heap
page read and write
1FFAAD54000
heap
page read and write
1FFAADB0000
heap
page read and write
19B58FB0000
remote allocation
page read and write
1FFBFFE6000
trusted library allocation
page read and write
1FFB7DDF000
trusted library allocation
page read and write
1FFBF547000
heap
page read and write
1FFB5DC1000
trusted library allocation
page read and write
1FFB51A8000
trusted library allocation
page read and write
1FFB8025000
trusted library allocation
page read and write
1FFBC7CF000
trusted library allocation
page read and write
1FFB7EC7000
trusted library allocation
page read and write
1FFBC59D000
trusted library allocation
page read and write
1FFB3E7F000
trusted library allocation
page read and write
1FFB51EE000
trusted library allocation
page read and write
1FFB40F7000
trusted library allocation
page read and write
1FFB3B4E000
heap
page read and write
1FFAAD5A000
heap
page read and write
1FFB583D000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB5DF7000
trusted library allocation
page read and write
1FFB57D7000
trusted library allocation
page read and write
1FFB40E1000
trusted library allocation
page read and write
1FFB5AF9000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
143860E2000
unclassified section
page read and write
1FFB5832000
trusted library allocation
page read and write
1FFB4957000
trusted library allocation
page read and write
1FFB7741000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB7E71000
trusted library allocation
page read and write
1FFBC5C5000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB7EED000
trusted library allocation
page read and write
23C268E8000
heap
page read and write
1FFB66B7000
trusted library allocation
page read and write
19B59200000
trusted library allocation
page read and write
1FFB67CD000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFAAD4B000
heap
page read and write
1FFAADA9000
heap
page read and write
1FFB549D000
trusted library allocation
page read and write
1FFB760F000
trusted library allocation
page read and write
1FFAADB4000
heap
page read and write
1FFB5DF7000
trusted library allocation
page read and write
1FFB5AE8000
trusted library allocation
page read and write
1FFB40A7000
trusted library allocation
page read and write
1FFB4957000
trusted library allocation
page read and write
19B59394000
heap
page read and write
23C25B00000
trusted library allocation
page read and write
1FFAAD70000
heap
page read and write
1FFAADB0000
heap
page read and write
1FFB7CDD000
trusted library allocation
page read and write
1FFBC7F3000
trusted library allocation
page read and write
1FFB80D3000
trusted library allocation
page read and write
1FFB1F86000
trusted library allocation
page read and write
1FFBE162000
trusted library allocation
page read and write
1FFBEBB1000
trusted library allocation
page read and write
1FFAAD42000
heap
page read and write
1FFB76B3000
trusted library allocation
page read and write
1FFAAD53000
heap
page read and write
1FFBC5BC000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB803D000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFBF556000
heap
page read and write
1FFB80FA000
trusted library allocation
page read and write
1FFB6450000
trusted library allocation
page read and write
1FFB5469000
trusted library allocation
page read and write
1FFB59D8000
trusted library allocation
page read and write
1FFB69AF000
trusted library allocation
page read and write
1FFB5D75000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFB5442000
trusted library allocation
page read and write
1FFB49C8000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB51F7000
trusted library allocation
page read and write
4026FD8000
stack
page read and write
1FFB76A1000
trusted library allocation
page read and write
1FFB4985000
trusted library allocation
page read and write
1FFB4070000
trusted library allocation
page read and write
23C25750000
unclassified section
page readonly
1FFAAD92000
heap
page read and write
1FFB58F4000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFAAD41000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB763E000
trusted library allocation
page read and write
1FFB1F09000
trusted library allocation
page read and write
1FFBF501000
heap
page read and write
23C258AA000
heap
page read and write
1FFB3D00000
trusted library allocation
page read and write
1FFB40EF000
trusted library allocation
page read and write
1FFBFFE9000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
4001000
heap
page read and write
1FFB7FBC000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB3EE9000
trusted library allocation
page read and write
1FFBE1A0000
trusted library allocation
page read and write
1FFBF559000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFB4957000
trusted library allocation
page read and write
1FFB4431000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB5714000
trusted library allocation
page read and write
1FFB7640000
trusted library allocation
page read and write
1FFBC844000
trusted library allocation
page read and write
1FFBCCA7000
trusted library allocation
page read and write
1FFB59F4000
trusted library allocation
page read and write
1FFB665F000
trusted library allocation
page read and write
1FFBE113000
trusted library allocation
page read and write
1FFB64E0000
trusted library allocation
page read and write
1FFB7C56000
trusted library allocation
page read and write
1FFB7FCF000
trusted library allocation
page read and write
1FFB404F000
trusted library allocation
page read and write
1FFBEBEE000
trusted library allocation
page read and write
1FFB6615000
trusted library allocation
page read and write
1FFB44EE000
trusted library allocation
page read and write
23C26979000
heap
page read and write
1FFB55DC000
trusted library allocation
page read and write
1FFB1437000
trusted library allocation
page read and write
1FFB75F3000
trusted library allocation
page read and write
1FFAADB6000
heap
page read and write
1FFB5453000
trusted library allocation
page read and write
1FFB648B000
trusted library allocation
page read and write
1FFC05CC000
trusted library allocation
page read and write
1FFB0175000
trusted library allocation
page read and write
1FFB5299000
trusted library allocation
page read and write
1FFB40FD000
trusted library allocation
page read and write
1FFB12E7000
trusted library allocation
page read and write
1FFB76A4000
trusted library allocation
page read and write
1FFB14FA000
trusted library allocation
page read and write
1FFB49E8000
trusted library allocation
page read and write
1450000
heap
page read and write
1FFB5165000
trusted library allocation
page read and write
1FFAADD5000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFB55DC000
trusted library allocation
page read and write
1FFB648B000
trusted library allocation
page read and write
1FFAAD5D000
heap
page read and write
1FFB7F86000
trusted library allocation
page read and write
1FFC05C2000
trusted library allocation
page read and write
1FFBFFE9000
trusted library allocation
page read and write
1FFB1124000
trusted library allocation
page read and write
1FFB8039000
trusted library allocation
page read and write
1FFB7606000
trusted library allocation
page read and write
1FFB58F4000
trusted library allocation
page read and write
1FFBC59F000
trusted library allocation
page read and write
1FFBEB43000
trusted library allocation
page read and write
1FFB49FB000
trusted library allocation
page read and write
1FFB7961000
trusted library allocation
page read and write
1FFB48FB000
trusted library allocation
page read and write
1FFB5AEC000
trusted library allocation
page read and write
1FFBC600000
trusted library allocation
page read and write
14386407000
trusted library allocation
page read and write
1FFB76B3000
trusted library allocation
page read and write
1FFB7642000
trusted library allocation
page read and write
1FFBC8DE000
trusted library allocation
page read and write
1FFB19F4000
trusted library allocation
page read and write
1FFB7FE1000
trusted library allocation
page read and write
1FFB7DAA000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB5493000
trusted library allocation
page read and write
1FFB6BA0000
trusted library allocation
page read and write
1FFBE1A0000
trusted library allocation
page read and write
1FFB5A81000
trusted library allocation
page read and write
1FFB7A5C000
trusted library allocation
page read and write
1FFB7E9F000
trusted library allocation
page read and write
1FFB5DC3000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
BD4000
unkown
page readonly
1FFB1F3A000
trusted library allocation
page read and write
1FFBE112000
trusted library allocation
page read and write
1FFC003F000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB14F8000
trusted library allocation
page read and write
1FFB51B8000
trusted library allocation
page read and write
1FFB55B6000
trusted library allocation
page read and write
1FFB76F8000
trusted library allocation
page read and write
1FFBF555000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFB8076000
trusted library allocation
page read and write
1FFB586A000
trusted library allocation
page read and write
24464C30000
heap
page read and write
1FFB5728000
trusted library allocation
page read and write
1639000
heap
page read and write
1FFB58B1000
trusted library allocation
page read and write
1FFB1F53000
trusted library allocation
page read and write
1FFB7599000
trusted library allocation
page read and write
1FFC00EF000
trusted library allocation
page read and write
1FFAAD36000
heap
page read and write
1FFC05C0000
trusted library allocation
page read and write
1FFB5165000
trusted library allocation
page read and write
1FFB7EA7000
trusted library allocation
page read and write
1FFB11F1000
trusted library allocation
page read and write
1FFB00FE000
trusted library allocation
page read and write
1FFB6B45000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFBF555000
heap
page read and write
1438620D000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFAAD7C000
heap
page read and write
1438641F000
trusted library allocation
page read and write
1FFBC86F000
trusted library allocation
page read and write
1FFBE17D000
trusted library allocation
page read and write
143862B7000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB6AF4000
trusted library allocation
page read and write
1FFAADCE000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFBE16A000
trusted library allocation
page read and write
1FFAADD2000
heap
page read and write
1FFB75D5000
trusted library allocation
page read and write
1FFB7ECE000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFAADA9000
heap
page read and write
1FFB3E76000
trusted library allocation
page read and write
1FFB3F75000
trusted library allocation
page read and write
B01000
unkown
page execute read
1FFB545E000
trusted library allocation
page read and write
1FFB584B000
trusted library allocation
page read and write
1FFB7658000
trusted library allocation
page read and write
1FFB40AA000
trusted library allocation
page read and write
1FFB402A000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB80CC000
trusted library allocation
page read and write
1FFBCE00000
trusted library allocation
page read and write
1FFBFFF3000
trusted library allocation
page read and write
1FFB7DC2000
trusted library allocation
page read and write
1FFB7FD3000
trusted library allocation
page read and write
1FFBF546000
heap
page read and write
1FFB807E000
trusted library allocation
page read and write
23C25B5F000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB80AB000
trusted library allocation
page read and write
1FFB758E000
trusted library allocation
page read and write
1FFB5DFE000
trusted library allocation
page read and write
1FFB40E1000
trusted library allocation
page read and write
1FFB5499000
trusted library allocation
page read and write
1FFB665F000
trusted library allocation
page read and write
1FFBCC43000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFAADD6000
heap
page read and write
1FFB4952000
trusted library allocation
page read and write
1FFAAD53000
heap
page read and write
1FFAF684000
trusted library allocation
page read and write
1FFB52C3000
trusted library allocation
page read and write
1FFB77AE000
trusted library allocation
page read and write
1FFB1F2B000
trusted library allocation
page read and write
1FFB5447000
trusted library allocation
page read and write
1FFAAD53000
heap
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFB5488000
trusted library allocation
page read and write
1FFBC8AE000
trusted library allocation
page read and write
1F566FE000
stack
page read and write
1FFB80CC000
trusted library allocation
page read and write
1FFBC790000
trusted library allocation
page read and write
1FFAADB3000
heap
page read and write
23C25CA6000
heap
page read and write
1FFB7E57000
trusted library allocation
page read and write
1FFC05C4000
trusted library allocation
page read and write
1FFC032F000
trusted library allocation
page read and write
1FFB68C5000
trusted library allocation
page read and write
1FFB75B9000
trusted library allocation
page read and write
1FFB75B9000
trusted library allocation
page read and write
1FFB76A1000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFB80FA000
trusted library allocation
page read and write
1FFBCC05000
trusted library allocation
page read and write
1FFB58AE000
trusted library allocation
page read and write
1FFB4987000
trusted library allocation
page read and write
1FFB5594000
trusted library allocation
page read and write
1FFB516B000
trusted library allocation
page read and write
1FFBE1FE000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB1F7A000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB7DAA000
trusted library allocation
page read and write
1FFB7E47000
trusted library allocation
page read and write
1FFAAD44000
heap
page read and write
1FFAAD5A000
heap
page read and write
1FFB6AA6000
trusted library allocation
page read and write
1FFBC676000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB40FD000
trusted library allocation
page read and write
1FFB7D49000
trusted library allocation
page read and write
1FFB40D5000
trusted library allocation
page read and write
1FFB112C000
trusted library allocation
page read and write
1FFBC823000
trusted library allocation
page read and write
BCC000
unkown
page write copy
1FFB7C8C000
trusted library allocation
page read and write
1FFBCC6D000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
1FFAADC7000
heap
page read and write
1FFB1F35000
trusted library allocation
page read and write
9CAFDFA000
stack
page read and write
1FFB757A000
trusted library allocation
page read and write
1FFBE8FC000
trusted library allocation
page read and write
1FFB4471000
trusted library allocation
page read and write
1FFB405C000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFBE15E000
trusted library allocation
page read and write
1FFAADB6000
heap
page read and write
1FFAAD38000
heap
page read and write
1FFB516F000
trusted library allocation
page read and write
1FFAADEC000
heap
page read and write
1FFB768D000
trusted library allocation
page read and write
1FFB1F88000
trusted library allocation
page read and write
1FFBF58B000
heap
page read and write
14386100000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB6BD3000
trusted library allocation
page read and write
1C66CD60000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB11AD000
trusted library allocation
page read and write
1FFB40AA000
trusted library allocation
page read and write
1FFB44EE000
trusted library allocation
page read and write
1FFB3F9A000
trusted library allocation
page read and write
1FFB80A3000
trusted library allocation
page read and write
1FFBE182000
trusted library allocation
page read and write
1FFBE16D000
trusted library allocation
page read and write
1FFB58E0000
trusted library allocation
page read and write
1FFBC856000
trusted library allocation
page read and write
1FFB76C6000
trusted library allocation
page read and write
1FFBED84000
trusted library allocation
page read and write
1FFAAD2E000
heap
page read and write
1FFB40D5000
trusted library allocation
page read and write
1FFB7FE3000
trusted library allocation
page read and write
1FFB58B3000
trusted library allocation
page read and write
1FFB04D9000
trusted library allocation
page read and write
1FFBC8CA000
trusted library allocation
page read and write
1FFB5DA2000
trusted library allocation
page read and write
1FFB405E000
trusted library allocation
page read and write
A8A43FE000
stack
page read and write
1FFBE1CD000
trusted library allocation
page read and write
1FFB51E9000
trusted library allocation
page read and write
1FFB76BD000
trusted library allocation
page read and write
1FFBE154000
trusted library allocation
page read and write
1FFAADAC000
heap
page read and write
1FFBE131000
trusted library allocation
page read and write
1FFAADC7000
heap
page read and write
1FFB1414000
trusted library allocation
page read and write
1FFB777D000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFAAD54000
heap
page read and write
1FFB58E5000
trusted library allocation
page read and write
1FFB75B9000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB7E5C000
trusted library allocation
page read and write
1FFB7C77000
trusted library allocation
page read and write
1FFB4068000
trusted library allocation
page read and write
1FFB68DD000
trusted library allocation
page read and write
1FFBC812000
trusted library allocation
page read and write
1F545FE000
stack
page read and write
1FFBED9E000
trusted library allocation
page read and write
1FFAADAC000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFAAD4B000
heap
page read and write
1FFB04A7000
trusted library allocation
page read and write
1FFB3F75000
trusted library allocation
page read and write
1FFB80D3000
trusted library allocation
page read and write
23C268E8000
heap
page read and write
1FFBCB7F000
trusted library allocation
page read and write
1FFB574F000
trusted library allocation
page read and write
1FFB5992000
trusted library allocation
page read and write
1FFB8087000
trusted library allocation
page read and write
1FFB5D47000
trusted library allocation
page read and write
1FFB762F000
trusted library allocation
page read and write
1FFB44CD000
trusted library allocation
page read and write
1FFB14A6000
trusted library allocation
page read and write
23C2692E000
heap
page read and write
1FFAADA9000
heap
page read and write
1FFB69E9000
trusted library allocation
page read and write
1FFBC851000
trusted library allocation
page read and write
1FFB4BBD000
trusted library allocation
page read and write
1FFAAD68000
heap
page read and write
1FFB44FC000
trusted library allocation
page read and write
1FFB6B6C000
trusted library allocation
page read and write
23C26869000
heap
page read and write
1FFB01A0000
trusted library allocation
page read and write
1FFBEB07000
trusted library allocation
page read and write
1FFB69C3000
trusted library allocation
page read and write
1FFB584D000
trusted library allocation
page read and write
1FFB68FC000
trusted library allocation
page read and write
14386203000
trusted library allocation
page read and write
1FFBE18C000
trusted library allocation
page read and write
1FFB01E1000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB6B64000
trusted library allocation
page read and write
1FFB7C34000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB48DE000
trusted library allocation
page read and write
1FFB5891000
trusted library allocation
page read and write
23C268E6000
heap
page read and write
1FFB5183000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
1FFB1441000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB805C000
trusted library allocation
page read and write
1FFB13BD000
trusted library allocation
page read and write
1FFB4070000
trusted library allocation
page read and write
1FFC05C6000
trusted library allocation
page read and write
1FFB7E9B000
trusted library allocation
page read and write
1FFB5153000
trusted library allocation
page read and write
1FFB493C000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB805C000
trusted library allocation
page read and write
1FFB49C8000
trusted library allocation
page read and write
1FFB64F4000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFAAD36000
heap
page read and write
14386030000
heap
page read and write
1FFBC79B000
trusted library allocation
page read and write
1FFB6AF0000
trusted library allocation
page read and write
1FFAAD3B000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFAADCE000
heap
page read and write
1FFB7DDF000
trusted library allocation
page read and write
1FFB5AC7000
trusted library allocation
page read and write
1FFB3B85000
heap
page read and write
1FFAADCC000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB68BB000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFB40EF000
trusted library allocation
page read and write
23C26945000
heap
page read and write
1FFAAD41000
heap
page read and write
1FFB7621000
trusted library allocation
page read and write
1FFB582B000
trusted library allocation
page read and write
1FFB5417000
trusted library allocation
page read and write
23C268A8000
heap
page read and write
1FFB52FE000
trusted library allocation
page read and write
1FFB14F6000
trusted library allocation
page read and write
1FFB7F63000
trusted library allocation
page read and write
1FFB807A000
trusted library allocation
page read and write
1FFB1FFD000
trusted library allocation
page read and write
1FFB7984000
trusted library allocation
page read and write
1FFBCBE5000
trusted library allocation
page read and write
23C26959000
heap
page read and write
1FFB54E3000
trusted library allocation
page read and write
1FFB577A000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB48F2000
trusted library allocation
page read and write
1FFB68EB000
trusted library allocation
page read and write
1FFB5D14000
trusted library allocation
page read and write
1FFB76E0000
trusted library allocation
page read and write
1FFB5473000
trusted library allocation
page read and write
19B59463000
trusted library allocation
page read and write
1474000
heap
page read and write
1FFB8047000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFAAD7C000
heap
page read and write
19B591D0000
heap
page read and write
1C66CC27000
heap
page read and write
1FFAADAF000
heap
page read and write
1FFBE152000
trusted library allocation
page read and write
1FFBE164000
trusted library allocation
page read and write
1FFB7E3B000
trusted library allocation
page read and write
1FFB01A8000
trusted library allocation
page read and write
1FFBC8F6000
trusted library allocation
page read and write
1FFB68E6000
trusted library allocation
page read and write
1FFB65D9000
trusted library allocation
page read and write
1FFB5163000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB5D6B000
trusted library allocation
page read and write
1FFB4022000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB75F3000
trusted library allocation
page read and write
1FFB80C1000
trusted library allocation
page read and write
1FFB6B8F000
trusted library allocation
page read and write
1FFB3D93000
trusted library allocation
page read and write
23C257CF000
remote allocation
page execute read
1FFB4068000
trusted library allocation
page read and write
1FFB67AA000
trusted library allocation
page read and write
1FFC039E000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFB76EE000
trusted library allocation
page read and write
1FFBC835000
trusted library allocation
page read and write
19B58FD0000
unclassified section
page readonly
213676A03000
trusted library allocation
page read and write
23C2689C000
heap
page read and write
1FFAADC0000
heap
page read and write
1FFB53F0000
trusted library allocation
page read and write
23C25B03000
trusted library allocation
page read and write
1FFB55E3000
trusted library allocation
page read and write
1FFB49E8000
trusted library allocation
page read and write
1FFB55E0000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
24465000000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB8043000
trusted library allocation
page read and write
1FFB40DD000
trusted library allocation
page read and write
1FFAAD63000
heap
page read and write
1FFAAD51000
heap
page read and write
1FFB54A1000
trusted library allocation
page read and write
1FFB4066000
trusted library allocation
page read and write
143862C8000
trusted library allocation
page read and write
1C66CC10000
heap
page read and write
1FFB67BC000
trusted library allocation
page read and write
1FFB5AC3000
trusted library allocation
page read and write
23C25C4D000
unkown
page execute read
1FFB7AA6000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFAADB2000
heap
page read and write
1FFB59F0000
trusted library allocation
page read and write
1FFB4963000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFB7606000
trusted library allocation
page read and write
23C25C46000
unkown
page execute read
1FFB6BD3000
trusted library allocation
page read and write
1FFB7699000
trusted library allocation
page read and write
1FFB408E000
trusted library allocation
page read and write
1FFB40EF000
trusted library allocation
page read and write
4001000
heap
page read and write
1FFB146C000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
1FFB49FD000
trusted library allocation
page read and write
1FFB4923000
trusted library allocation
page read and write
1FFAF6EF000
trusted library allocation
page read and write
1FFB4899000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFAADB6000
heap
page read and write
1FFB76EE000
trusted library allocation
page read and write
1FFB58E5000
trusted library allocation
page read and write
23C268B9000
heap
page read and write
1FFB80A3000
trusted library allocation
page read and write
1FFB5899000
trusted library allocation
page read and write
1FFB0126000
trusted library allocation
page read and write
1FFAADCF000
heap
page read and write
1FFBF500000
trusted library allocation
page read and write
1FFAAD62000
heap
page read and write
1FFAADB3000
heap
page read and write
1FFAAD56000
heap
page read and write
23C25CA0000
heap
page read and write
1FFB14F6000
trusted library allocation
page read and write
1FFB4938000
trusted library allocation
page read and write
1FFB5169000
trusted library allocation
page read and write
1FFB1FF6000
trusted library allocation
page read and write
1FFBC5C1000
trusted library allocation
page read and write
1FFB8021000
trusted library allocation
page read and write
1F51BEE000
unkown
page readonly
1FFB7CD6000
trusted library allocation
page read and write
1FFB577E000
trusted library allocation
page read and write
1FFB76B3000
trusted library allocation
page read and write
1FFBC790000
trusted library allocation
page read and write
1FFAAD65000
heap
page read and write
14386296000
trusted library allocation
page read and write
1FFB14E6000
trusted library allocation
page read and write
1FFB47FB000
trusted library allocation
page read and write
1FFB1437000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB14FE000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFAAD4B000
heap
page read and write
19B59396000
heap
page read and write
1FFB67C0000
trusted library allocation
page read and write
1FFAAD56000
heap
page read and write
1FFB40AF000
trusted library allocation
page read and write
1FFB5867000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFAADC7000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB59FD000
trusted library allocation
page read and write
1FFC007B000
trusted library allocation
page read and write
1FFB134E000
trusted library allocation
page read and write
1FFB6A41000
trusted library allocation
page read and write
1FFB5ADC000
trusted library allocation
page read and write
1FFB661A000
trusted library allocation
page read and write
1F51B67000
stack
page read and write
7C3CB3E000
unkown
page readonly
1FFAAD68000
heap
page read and write
1FFBE125000
trusted library allocation
page read and write
1C66CD30000
heap
page read and write
1FFB4048000
trusted library allocation
page read and write
1FFAAD37000
heap
page read and write
1FFAAD2E000
heap
page read and write
1FFB57FD000
trusted library allocation
page read and write
1FFBEBE0000
trusted library allocation
page read and write
1FFB14F2000
trusted library allocation
page read and write
1FFB5111000
trusted library allocation
page read and write
1FFB14A6000
trusted library allocation
page read and write
1FFB1FC3000
trusted library allocation
page read and write
1FFC0095000
trusted library allocation
page read and write
1FFBE159000
trusted library allocation
page read and write
1FFB5445000
trusted library allocation
page read and write
1FFB7F73000
trusted library allocation
page read and write
1FFB51F6000
trusted library allocation
page read and write
1FFB58BB000
trusted library allocation
page read and write
23C2692B000
heap
page read and write
1FFB544F000
trusted library allocation
page read and write
1FFB13CD000
trusted library allocation
page read and write
1FFAADC5000
heap
page read and write
1FFB8076000
trusted library allocation
page read and write
1FFB75A8000
trusted library allocation
page read and write
19B59700000
trusted library allocation
page read and write
1FFAADB4000
heap
page read and write
1FFB4440000
trusted library allocation
page read and write
1FFB51F3000
trusted library allocation
page read and write
1FFBE1B4000
trusted library allocation
page read and write
1FFB75AC000
trusted library allocation
page read and write
23C268ED000
heap
page read and write
1FFB40E1000
trusted library allocation
page read and write
1FFB8202000
trusted library allocation
page read and write
1FFB5552000
trusted library allocation
page read and write
1FFAAD44000
heap
page read and write
1FFB5AC9000
trusted library allocation
page read and write
1FFAADD5000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFAAD54000
heap
page read and write
1FFB7DF4000
trusted library allocation
page read and write
1FFB80C4000
trusted library allocation
page read and write
14386200000
trusted library allocation
page read and write
1FFAAD65000
heap
page read and write
1FFBE1C1000
trusted library allocation
page read and write
1FFB54B8000
trusted library allocation
page read and write
1FFBE8E8000
trusted library allocation
page read and write
1FFB7642000
trusted library allocation
page read and write
1FFB5717000
trusted library allocation
page read and write
1FFB49AD000
trusted library allocation
page read and write
1FFB7F69000
trusted library allocation
page read and write
1FFAAD3A000
heap
page read and write
23C268ED000
heap
page read and write
402644B000
stack
page read and write
1FFAAD3B000
heap
page read and write
1FFB666C000
trusted library allocation
page read and write
1FFB5463000
trusted library allocation
page read and write
1FFBE138000
trusted library allocation
page read and write
1FFB3F75000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB67C2000
trusted library allocation
page read and write
1FFB3F75000
trusted library allocation
page read and write
1FFB80CC000
trusted library allocation
page read and write
1FFBE130000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB807E000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB514B000
trusted library allocation
page read and write
1FFB69AF000
trusted library allocation
page read and write
1FFB1469000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB5989000
trusted library allocation
page read and write
1FFB52F5000
trusted library allocation
page read and write
1FFAAD56000
heap
page read and write
1FFB7F63000
trusted library allocation
page read and write
1FFB52C2000
trusted library allocation
page read and write
1FFAADC5000
heap
page read and write
143860EF000
unclassified section
page read and write
1FFB8079000
trusted library allocation
page read and write
23C25C00000
trusted library allocation
page read and write
1FFBF555000
heap
page read and write
1FFB3F9A000
trusted library allocation
page read and write
BC2000
unkown
page readonly
1FFB5893000
trusted library allocation
page read and write
1FFB6A63000
trusted library allocation
page read and write
1FFB40B3000
trusted library allocation
page read and write
1FFB49FB000
trusted library allocation
page read and write
1FFB5DC3000
trusted library allocation
page read and write
1FFBE18F000
trusted library allocation
page read and write
1FFB4451000
trusted library allocation
page read and write
1FFB1F53000
trusted library allocation
page read and write
1FFB14F6000
trusted library allocation
page read and write
1FFB581D000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFC0591000
trusted library allocation
page read and write
1FFB59FB000
trusted library allocation
page read and write
1FFB7FD3000
trusted library allocation
page read and write
1FFB51E9000
trusted library allocation
page read and write
1FFB51D3000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
1FFB80CC000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFAAD51000
heap
page read and write
1FFB55E1000
trusted library allocation
page read and write
23C25C70000
trusted library allocation
page read and write
1FFAAD5D000
heap
page read and write
1FFC00BB000
trusted library allocation
page read and write
1FFB6AB0000
trusted library allocation
page read and write
1FFB44FE000
trusted library allocation
page read and write
1FFB58E9000
trusted library allocation
page read and write
1FFAF6C3000
trusted library allocation
page read and write
23C25880000
heap
page readonly
1FFB40D5000
trusted library allocation
page read and write
1FFB7E5C000
trusted library allocation
page read and write
1FFB5432000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB4B4A000
trusted library allocation
page read and write
B9C000
unkown
page readonly
1FFBEB4D000
trusted library allocation
page read and write
1FFB40E1000
trusted library allocation
page read and write
1FFB478E000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB5294000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFAAD41000
heap
page read and write
1FFB5AF9000
trusted library allocation
page read and write
1FFBCD2E000
trusted library allocation
page read and write
1FFB5817000
trusted library allocation
page read and write
1FFB48F2000
trusted library allocation
page read and write
1FFB3F6D000
trusted library allocation
page read and write
1FFB51C0000
trusted library allocation
page read and write
1FFB1481000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB76C6000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1647000
heap
page read and write
1FFB4451000
trusted library allocation
page read and write
1FFB59F6000
trusted library allocation
page read and write
1FFB5843000
trusted library allocation
page read and write
19B59053000
heap
page read and write
1FFB51FC000
trusted library allocation
page read and write
1FFB7DB0000
trusted library allocation
page read and write
1FFBE176000
trusted library allocation
page read and write
23C26959000
heap
page read and write
1FFB69E3000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB772C000
trusted library allocation
page read and write
23C268E3000
heap
page read and write
1FFB48A7000
trusted library allocation
page read and write
1FFB1433000
trusted library allocation
page read and write
1FFBEB6D000
trusted library allocation
page read and write
1FFBE8F1000
trusted library allocation
page read and write
1FFB51D3000
trusted library allocation
page read and write
1FFB7FF1000
trusted library allocation
page read and write
1FFB4454000
trusted library allocation
page read and write
1FFB5DF6000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFBEC06000
trusted library allocation
page read and write
23C26945000
heap
page read and write
1FFAADC0000
heap
page read and write
1FFBC5FC000
trusted library allocation
page read and write
1FFAADC7000
heap
page read and write
1FFB574C000
trusted library allocation
page read and write
1FFBCC07000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFC05C4000
trusted library allocation
page read and write
1FFB1F77000
trusted library allocation
page read and write
1FFB7C9D000
trusted library allocation
page read and write
1FFB59CD000
trusted library allocation
page read and write
1FFB4068000
trusted library allocation
page read and write
1FFB4B54000
trusted library allocation
page read and write
1FFB8038000
trusted library allocation
page read and write
1FFAF6EF000
trusted library allocation
page read and write
1FFB59D8000
trusted library allocation
page read and write
1FFB68E7000
trusted library allocation
page read and write
1FFB4441000
trusted library allocation
page read and write
1FFB582B000
trusted library allocation
page read and write
1FFAADC0000
heap
page read and write
1FFB65F6000
trusted library allocation
page read and write
1FFB5851000
trusted library allocation
page read and write
1FFBE15B000
trusted library allocation
page read and write
4027FFE000
stack
page read and write
1FFB7F81000
trusted library allocation
page read and write
1FFB51FC000
trusted library allocation
page read and write
1FFBE8FA000
trusted library allocation
page read and write
1FFB409C000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB7978000
trusted library allocation
page read and write
1FFBE182000
trusted library allocation
page read and write
1FFB76BB000
trusted library allocation
page read and write
1FFB79D7000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
1FFB4963000
trusted library allocation
page read and write
1FFB7F6C000
trusted library allocation
page read and write
1FFB80C9000
trusted library allocation
page read and write
1FFC05F0000
trusted library allocation
page read and write
1FFB7D25000
trusted library allocation
page read and write
1FFB3B63000
heap
page read and write
1FFB7A64000
trusted library allocation
page read and write
23C2693C000
heap
page read and write
1FFB58B3000
trusted library allocation
page read and write
1FFB5714000
trusted library allocation
page read and write
1FFB7E35000
trusted library allocation
page read and write
1FFB6A31000
trusted library allocation
page read and write
1FFB1FF6000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB4420000
trusted library allocation
page read and write
1FFAAD5A000
heap
page read and write
1FFBE1CD000
trusted library allocation
page read and write
1FFB5DC3000
trusted library allocation
page read and write
23C26978000
heap
page read and write
1FFAAD51000
heap
page read and write
1FFAAD92000
heap
page read and write
1FFB47EA000
trusted library allocation
page read and write
1FFB3B7B000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFB5873000
trusted library allocation
page read and write
1FFB1FC8000
trusted library allocation
page read and write
1FFBFF78000
trusted library allocation
page read and write
1FFB1FB7000
trusted library allocation
page read and write
1FFB5888000
trusted library allocation
page read and write
1FFB79DD000
trusted library allocation
page read and write
1FFBC6F0000
trusted library allocation
page read and write
1FFB7AAB000
trusted library allocation
page read and write
1FFB51E8000
trusted library allocation
page read and write
1FFB65F6000
trusted library allocation
page read and write
1FFB12D6000
trusted library allocation
page read and write
1FFB7DD2000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1C66CC52000
heap
page read and write
1FFB7ED2000
trusted library allocation
page read and write
1FFB7F66000
trusted library allocation
page read and write
1FFB40E9000
trusted library allocation
page read and write
1FFB3F0F000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFB44AC000
trusted library allocation
page read and write
1FFBEAC8000
trusted library allocation
page read and write
1F51AAC000
stack
page read and write
1FFB441D000
trusted library allocation
page read and write
1FFBC5C9000
trusted library allocation
page read and write
1FFB7FF3000
trusted library allocation
page read and write
1FFB492C000
trusted library allocation
page read and write
1FFB14A8000
trusted library allocation
page read and write
14386010000
heap
page read and write
1FFB7DBE000
trusted library allocation
page read and write
40287FE000
unkown
page readonly
1FFB40EF000
trusted library allocation
page read and write
1FFB5498000
trusted library allocation
page read and write
1FFC03F1000
trusted library allocation
page read and write
1FFB49E6000
trusted library allocation
page read and write
23C268ED000
heap
page read and write
1FFBC73F000
trusted library allocation
page read and write
1FFB5473000
trusted library allocation
page read and write
1FFB8079000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB5475000
trusted library allocation
page read and write
1FFBE115000
trusted library allocation
page read and write
1FFB5DC1000
trusted library allocation
page read and write
B01000
unkown
page execute read
143860E0000
unclassified section
page read and write
1FFBC794000
trusted library allocation
page read and write
1FFB4052000
trusted library allocation
page read and write
1FFAAD38000
heap
page read and write
9CB25FE000
stack
page read and write
1FFAADA9000
heap
page read and write
1FFB575F000
trusted library allocation
page read and write
1FFB58BB000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB7C80000
trusted library allocation
page read and write
1FFB7782000
trusted library allocation
page read and write
1FFB7CDD000
trusted library allocation
page read and write
1FFB00FB000
trusted library allocation
page read and write
1FFBFFE3000
trusted library allocation
page read and write
1FFB516F000
trusted library allocation
page read and write
1FFB7581000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFAAD51000
heap
page read and write
1FFB1F72000
trusted library allocation
page read and write
1FFB75C0000
trusted library allocation
page read and write
1FFB6A18000
trusted library allocation
page read and write
1FFB0118000
trusted library allocation
page read and write
1FFB7EFC000
trusted library allocation
page read and write
1FFBE122000
trusted library allocation
page read and write
1FFBC710000
trusted library allocation
page read and write
1FFB51F6000
trusted library allocation
page read and write
23C268F2000
heap
page read and write
1FFAAD7C000
heap
page read and write
1FFB58F4000
trusted library allocation
page read and write
1FFB51D8000
trusted library allocation
page read and write
1FFB3EBE000
trusted library allocation
page read and write
1FFB140F000
trusted library allocation
page read and write
1FFB5969000
trusted library allocation
page read and write
1FFAAD44000
heap
page read and write
1474000
heap
page read and write
1C66E828000
heap
page read and write
23C26945000
heap
page read and write
1FFBFFE3000
trusted library allocation
page read and write
1FFB5463000
trusted library allocation
page read and write
1FFB49CB000
trusted library allocation
page read and write
1FFB4058000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB64A8000
trusted library allocation
page read and write
1FFBC81D000
trusted library allocation
page read and write
1FFB55D9000
trusted library allocation
page read and write
1FFB4923000
trusted library allocation
page read and write
1FFB3EA8000
trusted library allocation
page read and write
1FFB79D7000
trusted library allocation
page read and write
1FFBC81B000
trusted library allocation
page read and write
1FFB5153000
trusted library allocation
page read and write
1FFB8963000
trusted library allocation
page read and write
1FFBE1BC000
trusted library allocation
page read and write
1C66CF00000
trusted library allocation
page read and write
1FFBF545000
heap
page read and write
1FFB3E67000
trusted library allocation
page read and write
1FFB6B70000
trusted library allocation
page read and write
1FFBC6BB000
trusted library allocation
page read and write
1FFB80C1000
trusted library allocation
page read and write
1FFB5273000
trusted library allocation
page read and write
1FFB68B9000
trusted library allocation
page read and write
1FFB668F000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFBE13E000
trusted library allocation
page read and write
1FFB3B63000
heap
page read and write
1FFB11C8000
trusted library allocation
page read and write
1FFBE1BD000
trusted library allocation
page read and write
1FFAADC0000
heap
page read and write
19B59470000
trusted library allocation
page read and write
1FFB5480000
trusted library allocation
page read and write
1FFB7961000
trusted library allocation
page read and write
1FFB80E3000
trusted library allocation
page read and write
1FFB58E0000
trusted library allocation
page read and write
1FFB75F9000
trusted library allocation
page read and write
1FFBC794000
trusted library allocation
page read and write
1FFAADE4000
heap
page read and write
1FFB75AC000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB58F6000
trusted library allocation
page read and write
1FFB5881000
trusted library allocation
page read and write
1FFB76D4000
trusted library allocation
page read and write
7C387CE000
stack
page read and write
1FFBE1AB000
trusted library allocation
page read and write
1FFBE155000
trusted library allocation
page read and write
1FFAAD70000
heap
page read and write
1FFB409A000
trusted library allocation
page read and write
1FFAAD5D000
heap
page read and write
1FFB5435000
trusted library allocation
page read and write
1FFB58E5000
trusted library allocation
page read and write
1FFB7EC9000
trusted library allocation
page read and write
1FFB58BB000
trusted library allocation
page read and write
1C66CC2B000
heap
page read and write
23C25B6F000
trusted library allocation
page read and write
19B58F40000
unclassified section
page readonly
19B59400000
trusted library allocation
page read and write
1FFB80FA000
trusted library allocation
page read and write
3CB0000
heap
page read and write
23C268ED000
heap
page read and write
1FFB7EED000
trusted library allocation
page read and write
1FFB5118000
trusted library allocation
page read and write
1FFBE159000
trusted library allocation
page read and write
1FFB7DD2000
trusted library allocation
page read and write
1FFB51F3000
trusted library allocation
page read and write
1FFBC5A5000
trusted library allocation
page read and write
1FFB51D8000
trusted library allocation
page read and write
1FFA591F000
heap
page read and write
1FFAAD89000
heap
page read and write
1FFB5853000
trusted library allocation
page read and write
1FFB55B3000
trusted library allocation
page read and write
1FFB52EC000
trusted library allocation
page read and write
1FFBCBA2000
trusted library allocation
page read and write
1FFB5867000
trusted library allocation
page read and write
1FFB5417000
trusted library allocation
page read and write
1FFB7FF6000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFB77F2000
trusted library allocation
page read and write
1FFB5840000
trusted library allocation
page read and write
1FFBE154000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB5DF7000
trusted library allocation
page read and write
1FFB54E8000
trusted library allocation
page read and write
1FFAAD4A000
heap
page read and write
1FFBC78C000
trusted library allocation
page read and write
1FFBC5F2000
trusted library allocation
page read and write
1FFC0708000
trusted library allocation
page read and write
1FFB6BC9000
trusted library allocation
page read and write
1FFAAD3B000
heap
page read and write
1FFB14F2000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB68DD000
trusted library allocation
page read and write
1FFB402E000
trusted library allocation
page read and write
1FFB51D8000
trusted library allocation
page read and write
2446500A000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFAADB4000
heap
page read and write
23C26869000
heap
page read and write
1FFB5740000
trusted library allocation
page read and write
1FFB488D000
trusted library allocation
page read and write
1FFB6B0D000
trusted library allocation
page read and write
1FFB69AC000
trusted library allocation
page read and write
1FFB76EE000
trusted library allocation
page read and write
1FFBE178000
trusted library allocation
page read and write
1FFB1FB7000
trusted library allocation
page read and write
1FFB47E8000
trusted library allocation
page read and write
1FFAAD54000
heap
page read and write
1FFB7DB3000
trusted library allocation
page read and write
1FFB803D000
trusted library allocation
page read and write
1FFB65AF000
trusted library allocation
page read and write
402A83E000
unkown
page readonly
1FFB54FA000
trusted library allocation
page read and write
1FFAADB2000
heap
page read and write
1FFB01F0000
trusted library allocation
page read and write
1FFB40EC000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFAADC1000
heap
page read and write
1FFB54BC000
trusted library allocation
page read and write
1FFB511B000
trusted library allocation
page read and write
1FFB8017000
trusted library allocation
page read and write
1F53DFE000
unkown
page readonly
1FFAAD68000
heap
page read and write
1FFB49AD000
trusted library allocation
page read and write
1FFB545B000
trusted library allocation
page read and write
1FFBCC48000
trusted library allocation
page read and write
19B590A2000
unclassified section
page read and write
1FFB58B3000
trusted library allocation
page read and write
1FFB51D4000
trusted library allocation
page read and write
1FFB69F1000
trusted library allocation
page read and write
1FFB558A000
trusted library allocation
page read and write
1FFAADB4000
heap
page read and write
1FFB4977000
trusted library allocation
page read and write
22A0000
heap
page read and write
1FFB7D49000
trusted library allocation
page read and write
1FFAAD4B000
heap
page read and write
1FFB80FA000
trusted library allocation
page read and write
1FFAAD53000
heap
page read and write
1FFAADA9000
heap
page read and write
1FFAAD3B000
heap
page read and write
1FFB4941000
trusted library allocation
page read and write
1FFB7CE9000
trusted library allocation
page read and write
1FFB7961000
trusted library allocation
page read and write
1F54E3E000
stack
page read and write
1FFAAD62000
heap
page read and write
1FFB7FC0000
trusted library allocation
page read and write
1FFB6B6C000
trusted library allocation
page read and write
1FFBC67F000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFAADBA000
heap
page read and write
1FFB64C0000
trusted library allocation
page read and write
1FFBC7BF000
trusted library allocation
page read and write
1FFB4911000
trusted library allocation
page read and write
1FFB580D000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB5523000
trusted library allocation
page read and write
1FFB54FE000
trusted library allocation
page read and write
1FFB80FE000
trusted library allocation
page read and write
1FFB7DF4000
trusted library allocation
page read and write
1FFBC6F0000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
23C2687D000
heap
page read and write
1FFAAD4B000
heap
page read and write
1FFBEB82000
trusted library allocation
page read and write
1FFBF5AD000
heap
page read and write
1FFB75B1000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB24FD000
trusted library allocation
page read and write
1FFB544F000
trusted library allocation
page read and write
1FFB24C3000
trusted library allocation
page read and write
1FFB4420000
trusted library allocation
page read and write
1FFBE130000
trusted library allocation
page read and write
1FFB5947000
trusted library allocation
page read and write
19B590AF000
unclassified section
page read and write
1FFB67AA000
trusted library allocation
page read and write
1FFB4946000
trusted library allocation
page read and write
1FFC06D0000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB5DFE000
trusted library allocation
page read and write
14386093000
heap
page read and write
1FFB47BB000
trusted library allocation
page read and write
1FFB75C0000
trusted library allocation
page read and write
1FFB1F88000
trusted library allocation
page read and write
1FFBE1D2000
trusted library allocation
page read and write
1FFB5832000
trusted library allocation
page read and write
1FFB55CA000
trusted library allocation
page read and write
1FFB68BB000
trusted library allocation
page read and write
1FFB64BC000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB8015000
trusted library allocation
page read and write
1FFAADD6000
heap
page read and write
1FFB5D64000
trusted library allocation
page read and write
1FFB04C1000
trusted library allocation
page read and write
23C2693C000
heap
page read and write
7C3AB3E000
unkown
page readonly
1FFB5451000
trusted library allocation
page read and write
1FFB804D000
trusted library allocation
page read and write
1FFB58E5000
trusted library allocation
page read and write
1FFB5120000
trusted library allocation
page read and write
1FFB68B9000
trusted library allocation
page read and write
1FFB5DAD000
trusted library allocation
page read and write
1FFB5DB9000
trusted library allocation
page read and write
1FFB7F6C000
trusted library allocation
page read and write
1FFBC5F2000
trusted library allocation
page read and write
2ECC2091000
trusted library allocation
page execute read
1FFB52F5000
trusted library allocation
page read and write
1FFB4982000
trusted library allocation
page read and write
1FFB48AD000
trusted library allocation
page read and write
1FFBE173000
trusted library allocation
page read and write
1FFB758C000
trusted library allocation
page read and write
24464C70000
heap
page read and write
1FFBFF94000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB49D6000
trusted library allocation
page read and write
1FFB52EC000
trusted library allocation
page read and write
1FFAAD68000
heap
page read and write
1FFBC796000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB571A000
trusted library allocation
page read and write
1FFB7FE3000
trusted library allocation
page read and write
1FFBC615000
trusted library allocation
page read and write
1FFAAD56000
heap
page read and write
1FFAADB0000
heap
page read and write
1FFB54E1000
trusted library allocation
page read and write
1FFB54B9000
trusted library allocation
page read and write
1FFB1F3A000
trusted library allocation
page read and write
1FFB3E75000
trusted library allocation
page read and write
1FFBF545000
heap
page read and write
1FFB1F31000
trusted library allocation
page read and write
1FFB6B70000
trusted library allocation
page read and write
1FFBCCE4000
trusted library allocation
page read and write
1FFBE14C000
trusted library allocation
page read and write
1FFBFF0E000
trusted library allocation
page read and write
1FFB5D9E000
trusted library allocation
page read and write
1FFB1FC8000
trusted library allocation
page read and write
1660000
heap
page read and write
1FFB7E57000
trusted library allocation
page read and write
1FFB58E0000
trusted library allocation
page read and write
1FFB6BFE000
trusted library allocation
page read and write
1FFB7C5F000
trusted library allocation
page read and write
1FFB405E000
trusted library allocation
page read and write
1FFB55DC000
trusted library allocation
page read and write
1FFAADBD000
heap
page read and write
1648000
heap
page read and write
1FFB55DD000
trusted library allocation
page read and write
1FFC0081000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB1FAF000
trusted library allocation
page read and write
1FFBE1A0000
trusted library allocation
page read and write
1FFAADC8000
heap
page read and write
1FFBEBDB000
trusted library allocation
page read and write
1FFB7FF6000
trusted library allocation
page read and write
1FFB51EE000
trusted library allocation
page read and write
1FFB80C1000
trusted library allocation
page read and write
1FFB7EC9000
trusted library allocation
page read and write
1FFAAD52000
heap
page read and write
1FFB7699000
trusted library allocation
page read and write
1FFBC86F000
trusted library allocation
page read and write
1FFB14AB000
trusted library allocation
page read and write
1FFBC78E000
trusted library allocation
page read and write
1FFB765B000
trusted library allocation
page read and write
1FFBFFE6000
trusted library allocation
page read and write
1FFB5498000
trusted library allocation
page read and write
1FFAAD68000
heap
page read and write
1FFB7F7B000
trusted library allocation
page read and write
1440000
heap
page read and write
1FFB5D73000
trusted library allocation
page read and write
1FFB1533000
trusted library allocation
page read and write
1FFBE162000
trusted library allocation
page read and write
23C25830000
heap
page read and write
23C25B48000
trusted library allocation
page read and write
1FFB48CD000
trusted library allocation
page read and write
1FFB5D2B000
trusted library allocation
page read and write
1FFBE176000
trusted library allocation
page read and write
1FFB4894000
trusted library allocation
page read and write
1FFBC5B4000
trusted library allocation
page read and write
1FFB7566000
trusted library allocation
page read and write
14386415000
trusted library allocation
page read and write
1FFAADCC000
heap
page read and write
23C2692B000
heap
page read and write
1FFB1442000
trusted library allocation
page read and write
1FFB5D8E000
trusted library allocation
page read and write
1FFB68C9000
trusted library allocation
page read and write
1FFB5432000
trusted library allocation
page read and write
1FFB58AF000
trusted library allocation
page read and write
1FFB6BFE000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFB80A5000
trusted library allocation
page read and write
1FFB75EC000
trusted library allocation
page read and write
1FFAAD41000
heap
page read and write
1FFB404A000
trusted library allocation
page read and write
1FFB149D000
trusted library allocation
page read and write
1FFB135D000
trusted library allocation
page read and write
1FFB4034000
trusted library allocation
page read and write
1FFB7FB7000
trusted library allocation
page read and write
13EF000
stack
page read and write
143862E9000
trusted library allocation
page read and write
1FFBC7BF000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFBC835000
trusted library allocation
page read and write
1FFBF55C000
heap
page read and write
1FFB586A000
trusted library allocation
page read and write
1FFBC6D9000
trusted library allocation
page read and write
1FFB408B000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFB80C1000
trusted library allocation
page read and write
1FFBE138000
trusted library allocation
page read and write
1FFAAD51000
heap
page read and write
1FFAF690000
trusted library allocation
page read and write
1FFB1FDB000
trusted library allocation
page read and write
1FFBED2F000
trusted library allocation
page read and write
1FFB40F7000
trusted library allocation
page read and write
1FFB66EA000
trusted library allocation
page read and write
1FFBEBF9000
trusted library allocation
page read and write
23C2696A000
heap
page read and write
1FFB77EB000
trusted library allocation
page read and write
1FFB69EB000
trusted library allocation
page read and write
1FFB5891000
trusted library allocation
page read and write
1FFBED6D000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFBC5B8000
trusted library allocation
page read and write
1FFAADAD000
heap
page read and write
1FFB5989000
trusted library allocation
page read and write
1FFB762F000
trusted library allocation
page read and write
1FFAADC1000
heap
page read and write
1FFAAD5A000
heap
page read and write
1FFB8069000
trusted library allocation
page read and write
1FFAAD89000
heap
page read and write
1FFB76E0000
trusted library allocation
page read and write
1FFB5DF6000
trusted library allocation
page read and write
1FFB3F31000
trusted library allocation
page read and write
1FFBFFE0000
trusted library allocation
page read and write
1FFB7DDF000
trusted library allocation
page read and write
1FFBC865000
trusted library allocation
page read and write
1FFB14F6000
trusted library allocation
page read and write
1FFB76E0000
trusted library allocation
page read and write
1FFB4957000
trusted library allocation
page read and write
1FFB04AB000
trusted library allocation
page read and write
1FFAAD43000
heap
page read and write
1FFB24F9000
trusted library allocation
page read and write
1FFB1164000
trusted library allocation
page read and write
1FFAAD56000
heap
page read and write
1FFB48F8000
trusted library allocation
page read and write
1FFB5469000
trusted library allocation
page read and write
1FFB49ED000
trusted library allocation
page read and write
1FFBEB95000
trusted library allocation
page read and write
19B59446000
trusted library allocation
page read and write
1FFB77CA000
trusted library allocation
page read and write
23C26918000
heap
page read and write
1FFBEBC5000
trusted library allocation
page read and write
1C66CF0A000
trusted library allocation
page read and write
1FFAADE4000
heap
page read and write
1FFB5DC3000
trusted library allocation
page read and write
1FFB80E3000
trusted library allocation
page read and write
1FFB7D29000
trusted library allocation
page read and write
1FFB59F0000
trusted library allocation
page read and write
1FFB48F0000
trusted library allocation
page read and write
1FFBFFDC000
trusted library allocation
page read and write
23C268F1000
heap
page read and write
1FFB7699000
trusted library allocation
page read and write
1FFB6B70000
trusted library allocation
page read and write
1FFB76C2000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
1FFB5899000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB5961000
trusted library allocation
page read and write
1FFB7FD0000
trusted library allocation
page read and write
1FFAADAF000
heap
page read and write
1FFB52CF000
trusted library allocation
page read and write
1FFAAD3A000
heap
page read and write
1FFAADAF000
heap
page read and write
23C26959000
heap
page read and write
1FFB5475000
trusted library allocation
page read and write
1FFB7E33000
trusted library allocation
page read and write
1FFB5A0F000
trusted library allocation
page read and write
1FFB51E8000
trusted library allocation
page read and write
1FFB76A4000
trusted library allocation
page read and write
1FFB55B3000
trusted library allocation
page read and write
1FFB3FF9000
trusted library allocation
page read and write
1FFB1433000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
23C26978000
heap
page read and write
1FFB44AA000
trusted library allocation
page read and write
1FFBC798000
trusted library allocation
page read and write
1FFB4946000
trusted library allocation
page read and write
1FFB4920000
trusted library allocation
page read and write
1FFB405E000
trusted library allocation
page read and write
1FFBE1C6000
trusted library allocation
page read and write
1FFB5DAD000
trusted library allocation
page read and write
1FFB4066000
trusted library allocation
page read and write
1FFB7CA8000
trusted library allocation
page read and write
1FFBC6FC000
trusted library allocation
page read and write
1FFB58F4000
trusted library allocation
page read and write
1FFBE15B000
trusted library allocation
page read and write
1FFB65AE000
trusted library allocation
page read and write
1FFB7599000
trusted library allocation
page read and write
1FFB7E9F000
trusted library allocation
page read and write
1FFAADA9000
heap
page read and write
1FFAAD68000
heap
page read and write
1FFBF58B000
heap
page read and write
1FFB3F52000
trusted library allocation
page read and write
1FFB5174000
trusted library allocation
page read and write
1FFB445B000
trusted library allocation
page read and write
1FFB7593000
trusted library allocation
page read and write
1FFBF900000
trusted library allocation
page read and write
1FFBEB86000
trusted library allocation
page read and write
1FFB52CF000
trusted library allocation
page read and write
1FFB54D7000
trusted library allocation
page read and write
1FFAADC0000
heap
page read and write
1FFB244D000
trusted library allocation
page read and write
1FFB13F2000
trusted library allocation
page read and write
23C25BC1000
trusted library allocation
page read and write
1FFBC5CE000
trusted library allocation
page read and write
1FFB6791000
trusted library allocation
page read and write
1FFB408B000
trusted library allocation
page read and write
1FFAAD44000
heap
page read and write
1FFB7593000
trusted library allocation
page read and write
1FFB65AE000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFB89C3000
trusted library allocation
page read and write
1FFB57F3000
trusted library allocation
page read and write
1FFB59F9000
trusted library allocation
page read and write
23C26801000
heap
page read and write
1FFB5469000
trusted library allocation
page read and write
1FFB4058000
trusted library allocation
page read and write
1FFBE893000
trusted library allocation
page read and write
1FFB48BA000
trusted library allocation
page read and write
1FFB3E7E000
trusted library allocation
page read and write
1FFBCA00000
trusted library allocation
page read and write
1FFBE14F000
trusted library allocation
page read and write
1FFB5432000
trusted library allocation
page read and write
1FFB493C000
trusted library allocation
page read and write
1FFB3E63000
trusted library allocation
page read and write
1FFB765B000
trusted library allocation
page read and write
1FFB12D6000
trusted library allocation
page read and write
1FFAADB0000
heap
page read and write
1FFB44AD000
trusted library allocation
page read and write
1FFBE170000
trusted library allocation
page read and write
1FFB7AE6000
trusted library allocation
page read and write
1FFAAD7C000
heap
page read and write
1FFAAD51000
heap
page read and write
19B59449000
trusted library allocation
page read and write
40264CC000
stack
page read and write
1FFB40AC000
trusted library allocation
page read and write
1FFB763A000
trusted library allocation
page read and write
1FFB40B3000
trusted library allocation
page read and write
23C26719000
trusted library allocation
page read and write
24464CEA000
heap
page read and write
23C25BC7000
trusted library allocation
page read and write
1FFB5158000
trusted library allocation
page read and write
1FFAAD5B000
heap
page read and write
2ECC1FB1000
trusted library allocation
page execute read
19B59390000
heap
page read and write
1FFB5AC9000
trusted library allocation
page read and write
1FFB5432000
trusted library allocation
page read and write
1FFB64B3000
trusted library allocation
page read and write
1FFB7F73000
trusted library allocation
page read and write
1FFB76D4000
trusted library allocation
page read and write
1FFB6AB6000
trusted library allocation
page read and write
1FFAAD92000
heap
page read and write
1FFBC78C000
trusted library allocation
page read and write
1FFBC67B000
trusted library allocation
page read and write
1FFB58B3000
trusted library allocation
page read and write
1FFB40A4000
trusted library allocation
page read and write
1FFB58E0000
trusted library allocation
page read and write
There are 4059 hidden memdumps, click here to show them.