IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_659ad1aa-4df5-4f18-b909-46000a9d32a0.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_659ad1aa-4df5-4f18-b909-46000a9d32a0.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 27954 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 27954 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2240 -prefMapHandle 2232 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0cd64659-21da-4d31-aee1-251f3b98197c} 7736 "\\.\pipe\gecko-crash-server-pipe.7736" 1eb6926f710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -parentBuildID 20230927232528 -prefsHandle 3904 -prefMapHandle 3928 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {897a4d31-21b5-4463-ab4c-15d994167ada} 7736 "\\.\pipe\gecko-crash-server-pipe.7736" 1eb78df9610 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5264 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5224 -prefMapHandle 5256 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4381dde7-c4a4-4f93-a32c-9b3dbde25bae} 7736 "\\.\pipe\gecko-crash-server-pipe.7736" 1eb7a5b2b10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://detectportal.firefox.com/success.txt?ipv6X
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.253.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.186.78
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1EB7BAB3000
trusted library allocation
page read and write
2365C700000
trusted library allocation
page read and write
1EB7B3C5000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
D9A473C000
stack
page read and write
1EB78E2E000
trusted library allocation
page read and write
1EB74836000
heap
page read and write
1EB842F3000
trusted library allocation
page read and write
1EB81272000
trusted library allocation
page read and write
1EB7AEE3000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB79067000
trusted library allocation
page read and write
1EB7693D000
heap
page read and write
1EB78F7F000
trusted library allocation
page read and write
1EB8446B000
trusted library allocation
page read and write
1DA20AB2000
trusted library allocation
page read and write
1EB79390000
trusted library allocation
page read and write
D9A837E000
stack
page read and write
1EB82BCD000
trusted library allocation
page read and write
1EB7A484000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB74849000
heap
page read and write
2365C410000
unclassified section
page readonly
1EB7A1EE000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB7A4C3000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB81146000
trusted library allocation
page read and write
1EB81482000
trusted library allocation
page read and write
1EB7AADD000
trusted library allocation
page read and write
1EB7AB50000
trusted library allocation
page read and write
1EB81164000
trusted library allocation
page read and write
1EB8435C000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB748A9000
heap
page read and write
1EB74861000
heap
page read and write
1EB812EC000
trusted library allocation
page read and write
1EB7A458000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB836FA000
trusted library allocation
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB799BE000
trusted library allocation
page read and write
124C000
heap
page read and write
1EB82C06000
trusted library allocation
page read and write
21DED26E000
heap
page read and write
1EB812F9000
trusted library allocation
page read and write
1EB75FF2000
trusted library allocation
page read and write
1EB7A182000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB74834000
heap
page read and write
1EB7994D000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB750F0000
trusted library allocation
page read and write
1EB7A4F9000
trusted library allocation
page read and write
1EB814D4000
trusted library allocation
page read and write
1EB7A2E6000
trusted library allocation
page read and write
1EB844C9000
trusted library allocation
page read and write
1EB78B4E000
trusted library allocation
page read and write
2365D6F0000
heap
page read and write
1EB7903B000
trusted library allocation
page read and write
1EB79097000
trusted library allocation
page read and write
1EB843B9000
trusted library allocation
page read and write
1EB7BC36000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB8429B000
trusted library allocation
page read and write
1EB8110E000
trusted library allocation
page read and write
1EB842E6000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB84222000
trusted library allocation
page read and write
1EB84254000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB748AE000
heap
page read and write
1EB811A9000
trusted library allocation
page read and write
1EB844F4000
trusted library allocation
page read and write
1EB8128A000
trusted library allocation
page read and write
1EB84D92000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB7AE40000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7A117000
trusted library allocation
page read and write
1EB7A6F9000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
21DED27A000
heap
page read and write
1EB7485F000
heap
page read and write
1EB761FA000
trusted library allocation
page read and write
1EB7A1E7000
trusted library allocation
page read and write
2365C6F4000
unkown
page execute read
1EB84580000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7483E000
heap
page read and write
1EB7AB4C000
trusted library allocation
page read and write
1EB7A4B7000
trusted library allocation
page read and write
1EB84440000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7A6F4000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB84E66000
trusted library allocation
page read and write
1EB842DA000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB7AEE9000
trusted library allocation
page read and write
D9A477E000
unkown
page readonly
1EB78FCE000
trusted library allocation
page read and write
1EB7B42F000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB74847000
heap
page read and write
1EB82B07000
trusted library allocation
page read and write
2365C400000
unclassified section
page readonly
1EB748A6000
heap
page read and write
1EB7485F000
heap
page read and write
1EB7A09B000
trusted library allocation
page read and write
1EB78E32000
trusted library allocation
page read and write
1EB7A623000
trusted library allocation
page read and write
1EB812A3000
trusted library allocation
page read and write
1EB79973000
trusted library allocation
page read and write
1EB7AA9D000
trusted library allocation
page read and write
1EB7A6E3000
trusted library allocation
page read and write
1EB76934000
heap
page read and write
1EB7BC99000
trusted library allocation
page read and write
1EB761F8000
trusted library allocation
page read and write
D4B77EE000
stack
page read and write
1EB74F71000
trusted library allocation
page read and write
1EB7908E000
trusted library allocation
page read and write
1EB74FF6000
trusted library allocation
page read and write
1EB844D5000
trusted library allocation
page read and write
1EB7A139000
trusted library allocation
page read and write
1EB75457000
trusted library allocation
page read and write
1EB7B4CB000
trusted library allocation
page read and write
1EB748AD000
heap
page read and write
1EB81039000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7C6EE000
trusted library allocation
page read and write
1EB7C6CA000
trusted library allocation
page read and write
1EB790CD000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB793D7000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB811A4000
trusted library allocation
page read and write
1EB81600000
trusted library allocation
page read and write
1DA20A6B000
trusted library allocation
page read and write
1EB7A125000
trusted library allocation
page read and write
FEF000
stack
page read and write
1EB7A170000
trusted library allocation
page read and write
1EB74885000
heap
page read and write
1EB7903D000
trusted library allocation
page read and write
1EB790AC000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB75F48000
trusted library allocation
page read and write
125B000
heap
page read and write
2365D744000
heap
page read and write
1EB7A196000
trusted library allocation
page read and write
1EB7A2A1000
trusted library allocation
page read and write
1EB79957000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB74853000
heap
page read and write
1EB7A280000
trusted library allocation
page read and write
1EB80FE3000
trusted library allocation
page read and write
1EB84DFC000
trusted library allocation
page read and write
1EB811FD000
trusted library allocation
page read and write
1EB7A027000
trusted library allocation
page read and write
1EB813B3000
trusted library allocation
page read and write
1EB7A4B4000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
2365D6AA000
heap
page read and write
1EB7A077000
trusted library allocation
page read and write
1EB7482D000
heap
page read and write
1EB7A0F6000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB74849000
heap
page read and write
2365C660000
unclassified section
page read and write
1EB74853000
heap
page read and write
1EB82C33000
trusted library allocation
page read and write
1EB84AAC000
trusted library allocation
page read and write
1EB85484000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
23011583000
trusted library allocation
page read and write
1EB748AD000
heap
page read and write
1FED04703000
trusted library allocation
page read and write
1EB74863000
heap
page read and write
1EB78EB3000
trusted library allocation
page read and write
1EB7C926000
trusted library allocation
page read and write
1EB81169000
trusted library allocation
page read and write
2365D68A000
heap
page read and write
1EB761EA000
trusted library allocation
page read and write
1EB76934000
heap
page read and write
1EB79945000
trusted library allocation
page read and write
1EB7B4A6000
trusted library allocation
page read and write
1DA20AF6000
trusted library allocation
page read and write
1EB814FD000
trusted library allocation
page read and write
1EB7B5F1000
trusted library allocation
page read and write
1EB748D3000
heap
page read and write
1EB78E84000
trusted library allocation
page read and write
1DA20ADB000
trusted library allocation
page read and write
1EB75F24000
trusted library allocation
page read and write
1EB7CBFD000
trusted library allocation
page read and write
123A000
heap
page read and write
1EB7C6DE000
trusted library allocation
page read and write
1EB858A3000
trusted library allocation
page read and write
1EB84FFD000
trusted library allocation
page read and write
1EB7A0B4000
trusted library allocation
page read and write
1EB79975000
trusted library allocation
page read and write
1EB79954000
trusted library allocation
page read and write
1EB79983000
trusted library allocation
page read and write
1EB814CE000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7A188000
trusted library allocation
page read and write
1EB811C8000
trusted library allocation
page read and write
23011547000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7B9AB000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB766A9000
trusted library allocation
page read and write
1EB842B5000
trusted library allocation
page read and write
1F64DB0A000
trusted library allocation
page read and write
1EB84E63000
trusted library allocation
page read and write
1EB84254000
trusted library allocation
page read and write
1EB7A084000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
1EB74838000
heap
page read and write
1EB842D6000
trusted library allocation
page read and write
1EB7907F000
trusted library allocation
page read and write
1EB81055000
trusted library allocation
page read and write
1238000
heap
page read and write
1EB7ABE8000
trusted library allocation
page read and write
1EB84245000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB8119A000
trusted library allocation
page read and write
1EB84254000
trusted library allocation
page read and write
1EB842FD000
trusted library allocation
page read and write
1EB82B43000
trusted library allocation
page read and write
1EB80FC2000
trusted library allocation
page read and write
1EB78B7C000
trusted library allocation
page read and write
1EB7A695000
trusted library allocation
page read and write
1EB74836000
heap
page read and write
1EB7A0B7000
trusted library allocation
page read and write
D9A7A7E000
unkown
page readonly
1EB74849000
heap
page read and write
1EB748D3000
heap
page read and write
1EB78BD1000
trusted library allocation
page read and write
303798B03000
trusted library allocation
page read and write
1EB8424C000
trusted library allocation
page read and write
1EB7C66D000
trusted library allocation
page read and write
1EB84449000
trusted library allocation
page read and write
1EB84492000
trusted library allocation
page read and write
2365D73B000
heap
page read and write
1EB748B5000
heap
page read and write
1EB74840000
heap
page read and write
1EB78BEC000
trusted library allocation
page read and write
1EB78ECA000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB7A03A000
trusted library allocation
page read and write
1EB84737000
trusted library allocation
page read and write
1244000
heap
page read and write
1EB748B6000
heap
page read and write
1EB761E4000
trusted library allocation
page read and write
1EB7A482000
trusted library allocation
page read and write
1EB7A30A000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB790BB000
trusted library allocation
page read and write
1EB842F3000
trusted library allocation
page read and write
1EB7A163000
trusted library allocation
page read and write
1EB7BCC9000
trusted library allocation
page read and write
21DEB800000
heap
page read and write
1EB74847000
heap
page read and write
1EB748B5000
heap
page read and write
1EB7692D000
heap
page read and write
1EB748AE000
heap
page read and write
1EB7907B000
trusted library allocation
page read and write
1EB7B419000
trusted library allocation
page read and write
1EB7AB65000
trusted library allocation
page read and write
1EB7A6BC000
trusted library allocation
page read and write
1EB78E90000
trusted library allocation
page read and write
1EB79047000
trusted library allocation
page read and write
1EB82C2E000
trusted library allocation
page read and write
1EB7A15A000
trusted library allocation
page read and write
1EB813E6000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
21DEB907000
trusted library allocation
page read and write
1EB7C97C000
trusted library allocation
page read and write
1EB844C8000
trusted library allocation
page read and write
1EB82BE4000
trusted library allocation
page read and write
D4B76EE000
stack
page read and write
1EB7BCCF000
trusted library allocation
page read and write
1EB7ABD8000
trusted library allocation
page read and write
1EB7AEBD000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
230110AA000
remote allocation
page execute read
1EB844ED000
trusted library allocation
page read and write
1EB82993000
trusted library allocation
page read and write
1EB84EC3000
trusted library allocation
page read and write
1EB84A83000
trusted library allocation
page read and write
1EB761CF000
trusted library allocation
page read and write
1DA20AA2000
trusted library allocation
page read and write
1EB842B5000
trusted library allocation
page read and write
1EB8118A000
trusted library allocation
page read and write
1EB74896000
heap
page read and write
1EB74862000
heap
page read and write
1244000
heap
page read and write
1EB842CD000
trusted library allocation
page read and write
1EB79AA8000
trusted library allocation
page read and write
1EB75026000
trusted library allocation
page read and write
1EB7A25F000
trusted library allocation
page read and write
1EB81394000
trusted library allocation
page read and write
21DEB8A0000
heap
page read and write
1EB74849000
heap
page read and write
1EB7BC16000
trusted library allocation
page read and write
1EB790DC000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB762F6000
trusted library allocation
page read and write
1EB812CA000
trusted library allocation
page read and write
1EB810DC000
trusted library allocation
page read and write
1EB83793000
trusted library allocation
page read and write
1EB84E72000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB7CB95000
trusted library allocation
page read and write
1EB761EF000
trusted library allocation
page read and write
1EB790A3000
trusted library allocation
page read and write
1EB7A127000
trusted library allocation
page read and write
6C0000
unkown
page write copy
1EB83630000
trusted library allocation
page read and write
1EB84E7C000
trusted library allocation
page read and write
1EB7906C000
trusted library allocation
page read and write
1DA20833000
heap
page read and write
1EB7B91D000
trusted library allocation
page read and write
11B4000
heap
page read and write
1EB7A1A5000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB74849000
heap
page read and write
1EB7698C000
heap
page read and write
1EB842B5000
trusted library allocation
page read and write
2365D669000
heap
page read and write
1EB844ED000
trusted library allocation
page read and write
1EB7621C000
trusted library allocation
page read and write
1EB799FA000
trusted library allocation
page read and write
1EB8128C000
trusted library allocation
page read and write
1EB7A045000
trusted library allocation
page read and write
1EB8429D000
trusted library allocation
page read and write
1EB7B8E7000
trusted library allocation
page read and write
1EB7A075000
trusted library allocation
page read and write
1EB7AB69000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB7B444000
trusted library allocation
page read and write
176082824000
trusted library allocation
page read and write
1EB7907F000
trusted library allocation
page read and write
1EB7A1B7000
trusted library allocation
page read and write
1EB7488D000
heap
page read and write
1EB85805000
trusted library allocation
page read and write
1EB7692D000
heap
page read and write
1EB84449000
trusted library allocation
page read and write
2365D6E9000
heap
page read and write
1EB8448A000
trusted library allocation
page read and write
1EB7A6FB000
trusted library allocation
page read and write
1EB790C4000
trusted library allocation
page read and write
1EB7A0E0000
trusted library allocation
page read and write
1EB7509E000
trusted library allocation
page read and write
1EB7AEFE000
trusted library allocation
page read and write
1EB814DA000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB78F8A000
trusted library allocation
page read and write
1EB7A18B000
trusted library allocation
page read and write
1EB7A15C000
trusted library allocation
page read and write
1EB74855000
heap
page read and write
1EB7ABD0000
trusted library allocation
page read and write
1EB7C9FC000
trusted library allocation
page read and write
1EB7AA7D000
trusted library allocation
page read and write
1EB814C8000
trusted library allocation
page read and write
1EB82A0A000
trusted library allocation
page read and write
1EB8446F000
trusted library allocation
page read and write
1EB837D1000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
123B000
heap
page read and write
1EB762EB000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1F64DA00000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB8423D000
trusted library allocation
page read and write
1EB814CA000
trusted library allocation
page read and write
1EB842E0000
trusted library allocation
page read and write
1EB82C57000
trusted library allocation
page read and write
1EB74871000
heap
page read and write
1EB79934000
trusted library allocation
page read and write
1EB793FD000
trusted library allocation
page read and write
1EB74862000
heap
page read and write
1EB762F0000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7A434000
trusted library allocation
page read and write
1EB748A9000
heap
page read and write
1EB7C6BB000
trusted library allocation
page read and write
1EB748A9000
heap
page read and write
1EB74859000
heap
page read and write
1EB749CD000
trusted library allocation
page read and write
1EB79980000
trusted library allocation
page read and write
1EB84E5D000
trusted library allocation
page read and write
1EB82BD5000
trusted library allocation
page read and write
1EB8126B000
trusted library allocation
page read and write
1EB748A9000
heap
page read and write
1EB750FE000
trusted library allocation
page read and write
2365C918000
trusted library allocation
page read and write
2365D6E6000
heap
page read and write
1EB74842000
heap
page read and write
1EB74845000
heap
page read and write
1EB7A1B7000
trusted library allocation
page read and write
1EB7484C000
heap
page read and write
1EB74834000
heap
page read and write
1EB7994A000
trusted library allocation
page read and write
1EB7A1B2000
trusted library allocation
page read and write
1EB815F8000
trusted library allocation
page read and write
1EB7A1A5000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB74856000
heap
page read and write
2365D6E0000
heap
page read and write
1EB7AAC0000
trusted library allocation
page read and write
1EB7A7E7000
trusted library allocation
page read and write
1EB829AC000
trusted library allocation
page read and write
1EB7B292000
trusted library allocation
page read and write
1EB7669D000
trusted library allocation
page read and write
1EB7B427000
trusted library allocation
page read and write
1EB7BC0C000
trusted library allocation
page read and write
1EB74843000
heap
page read and write
1EB74837000
heap
page read and write
1EB79399000
trusted library allocation
page read and write
1EB74835000
heap
page read and write
1EB74826000
heap
page read and write
1EB74842000
heap
page read and write
1EB748A6000
heap
page read and write
2365D66C000
heap
page read and write
1EB7A67A000
trusted library allocation
page read and write
1EB7A1A5000
trusted library allocation
page read and write
1EB7938D000
trusted library allocation
page read and write
23011030000
unclassified section
page readonly
1EB74858000
heap
page read and write
1EB81480000
trusted library allocation
page read and write
1EB7A1C0000
trusted library allocation
page read and write
1EB844C3000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB7A196000
trusted library allocation
page read and write
1EB813CC000
trusted library allocation
page read and write
1EB84E37000
trusted library allocation
page read and write
1EB85C6C000
heap
page read and write
1EB7482E000
heap
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB7905E000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB7A1DB000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
2365D6B9000
heap
page read and write
1EB748B5000
heap
page read and write
1EB74826000
heap
page read and write
1EB84467000
trusted library allocation
page read and write
1EB7A4F9000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB7976F000
trusted library allocation
page read and write
1EB843B3000
trusted library allocation
page read and write
1EB7B4FA000
trusted library allocation
page read and write
1EB7DD02000
trusted library allocation
page read and write
1EB790AC000
trusted library allocation
page read and write
1EB74896000
heap
page read and write
1EB7BACB000
trusted library allocation
page read and write
1EB78F41000
trusted library allocation
page read and write
1EB7AEBE000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
2365D6E3000
heap
page read and write
1EB748B6000
heap
page read and write
1DA20BF6000
heap
page read and write
1EB75FE6000
trusted library allocation
page read and write
1EB790BB000
trusted library allocation
page read and write
1EB761EB000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB7C8BD000
trusted library allocation
page read and write
1EB7B3B9000
trusted library allocation
page read and write
1EB7632B000
trusted library allocation
page read and write
1EB7B9E9000
trusted library allocation
page read and write
2365D660000
heap
page read and write
2365C903000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7B38F000
trusted library allocation
page read and write
1EB7A1AA000
trusted library allocation
page read and write
1EB81043000
trusted library allocation
page read and write
1EB7A095000
trusted library allocation
page read and write
1EB84457000
trusted library allocation
page read and write
1EB7999B000
trusted library allocation
page read and write
1EB8138B000
trusted library allocation
page read and write
1EB842C5000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
1EB84E52000
trusted library allocation
page read and write
1EB8114B000
trusted library allocation
page read and write
1EB7AB44000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7A1AD000
trusted library allocation
page read and write
1EB74865000
heap
page read and write
1EB7A4CF000
trusted library allocation
page read and write
1EB7A1EE000
trusted library allocation
page read and write
1EB7BC4F000
trusted library allocation
page read and write
1EB7AB60000
trusted library allocation
page read and write
1EB7A1F4000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
23011564000
trusted library allocation
page read and write
1EB7A1AA000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB74858000
heap
page read and write
1EB812F9000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB812A7000
trusted library allocation
page read and write
1EB837DA000
trusted library allocation
page read and write
1EB74871000
heap
page read and write
1EB7A7C9000
trusted library allocation
page read and write
1EB7AA37000
trusted library allocation
page read and write
124F000
heap
page read and write
1EB813EB000
trusted library allocation
page read and write
1EB7C8A1000
trusted library allocation
page read and write
1EB810E5000
trusted library allocation
page read and write
1EB847D2000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB7482E000
heap
page read and write
1EB858E4000
trusted library allocation
page read and write
1EB7A05F000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB75026000
trusted library allocation
page read and write
1EB78BE7000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB78F4B000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
23011190000
heap
page read and write
23011020000
unclassified section
page readonly
1EB813B0000
trusted library allocation
page read and write
1EB7B395000
trusted library allocation
page read and write
1EB813E0000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB7A0E6000
trusted library allocation
page read and write
1EB842EB000
trusted library allocation
page read and write
230116C0000
heap
page read and write
1EB7A1DE000
trusted library allocation
page read and write
2365D767000
heap
page read and write
1EB74842000
heap
page read and write
1EB8126E000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB794E1000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7AA8E000
trusted library allocation
page read and write
1EB842EB000
trusted library allocation
page read and write
1EB7C9CF000
trusted library allocation
page read and write
1EB793D5000
trusted library allocation
page read and write
1EB7484F000
heap
page read and write
1EB7994D000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB84D4C000
trusted library allocation
page read and write
2365D758000
heap
page read and write
1EB7A620000
trusted library allocation
page read and write
1EB81498000
trusted library allocation
page read and write
1F64D857000
heap
page read and write
1EB790C1000
trusted library allocation
page read and write
1EB7909A000
trusted library allocation
page read and write
1EB7B9B7000
trusted library allocation
page read and write
1EB84E8D000
trusted library allocation
page read and write
1EB7484A000
heap
page read and write
1EB74834000
heap
page read and write
1EB74F2F000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB7A1B4000
trusted library allocation
page read and write
1EB84A97000
trusted library allocation
page read and write
1EB7B8F7000
trusted library allocation
page read and write
1EB842A7000
trusted library allocation
page read and write
1EB76946000
heap
page read and write
728273E000
stack
page read and write
1EB74851000
heap
page read and write
1EB7B8E7000
trusted library allocation
page read and write
1EB74990000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB794EA000
trusted library allocation
page read and write
1EB81185000
trusted library allocation
page read and write
1EB78E60000
trusted library allocation
page read and write
1EB7A13B000
trusted library allocation
page read and write
1EB74857000
heap
page read and write
1EB80F94000
trusted library allocation
page read and write
1EB84EA6000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB748C3000
heap
page read and write
1EB7BADF000
trusted library allocation
page read and write
1EB748AB000
heap
page read and write
1EB84E7C000
trusted library allocation
page read and write
1EB842D2000
trusted library allocation
page read and write
1EB78B82000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB7ABFA000
trusted library allocation
page read and write
1EB7A4C5000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB81090000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB793E7000
trusted library allocation
page read and write
1EB84427000
trusted library allocation
page read and write
1EB7A1F3000
trusted library allocation
page read and write
1EB847A3000
trusted library allocation
page read and write
1EB78F55000
trusted library allocation
page read and write
1EB74871000
heap
page read and write
1EB74849000
heap
page read and write
1EB7484F000
heap
page read and write
1EB814FD000
trusted library allocation
page read and write
1EB81052000
trusted library allocation
page read and write
1EB85C69000
heap
page read and write
1EB748B5000
heap
page read and write
1EB748BB000
heap
page read and write
1EB7C6BE000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB81313000
trusted library allocation
page read and write
1EB7C8F0000
trusted library allocation
page read and write
1EB7A1F3000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
2365C966000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB7698C000
heap
page read and write
1EB7698C000
heap
page read and write
1EB7AA6C000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
11B4000
heap
page read and write
1EB7AB99000
trusted library allocation
page read and write
1EB837FA000
trusted library allocation
page read and write
1248000
heap
page read and write
1EB748A8000
heap
page read and write
1EB74841000
heap
page read and write
1EB7C8E7000
trusted library allocation
page read and write
1EB80FD4000
trusted library allocation
page read and write
1EB84489000
trusted library allocation
page read and write
1EB74850000
heap
page read and write
1EB8117A000
trusted library allocation
page read and write
1EB7A4C5000
trusted library allocation
page read and write
1EB7BCFD000
trusted library allocation
page read and write
1EB7B600000
trusted library allocation
page read and write
1EB78E9A000
trusted library allocation
page read and write
1EB7B5C9000
trusted library allocation
page read and write
1EB7BCEE000
trusted library allocation
page read and write
1EB7C9F5000
trusted library allocation
page read and write
1EB7B9AF000
trusted library allocation
page read and write
D4B9A3E000
unkown
page readonly
1EB815EA000
trusted library allocation
page read and write
1EB815FD000
trusted library allocation
page read and write
1EB75F24000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB844E5000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
23011713000
trusted library allocation
page read and write
1EB81459000
trusted library allocation
page read and write
1EB7A643000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB74885000
heap
page read and write
1EB85C69000
heap
page read and write
1DA20900000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1EB7692D000
heap
page read and write
230115C8000
trusted library allocation
page read and write
125B000
heap
page read and write
1EB8117A000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB74856000
heap
page read and write
2365D758000
heap
page read and write
1EB7A1BD000
trusted library allocation
page read and write
1EB748AD000
heap
page read and write
1EB74858000
heap
page read and write
1EB76109000
trusted library allocation
page read and write
1EB844AC000
trusted library allocation
page read and write
1EB7668F000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB810F6000
trusted library allocation
page read and write
1EB78B18000
trusted library allocation
page read and write
1EB7A4C0000
trusted library allocation
page read and write
1EB7A69E000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB7CBFD000
trusted library allocation
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB7A188000
trusted library allocation
page read and write
1EB7903D000
trusted library allocation
page read and write
1EB7C8E4000
trusted library allocation
page read and write
1EB7C9C8000
trusted library allocation
page read and write
1EB748BE000
heap
page read and write
1EB80F94000
trusted library allocation
page read and write
2365D669000
heap
page read and write
1EB7BA64000
trusted library allocation
page read and write
1EB799B0000
trusted library allocation
page read and write
1231000
heap
page read and write
1EB7A1EA000
trusted library allocation
page read and write
1EB7BC6B000
trusted library allocation
page read and write
1EB7CB72000
trusted library allocation
page read and write
1EB7C9B0000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB74858000
heap
page read and write
1EB74851000
heap
page read and write
1EB84AE2000
trusted library allocation
page read and write
1EB74856000
heap
page read and write
1EB8149C000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB84AAC000
trusted library allocation
page read and write
1EB7C6C1000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7A1E0000
trusted library allocation
page read and write
1EB8147A000
trusted library allocation
page read and write
1EB7A6EB000
trusted library allocation
page read and write
1EB7B8E7000
trusted library allocation
page read and write
1EB82A0C000
trusted library allocation
page read and write
1EB84477000
trusted library allocation
page read and write
1EB761E4000
trusted library allocation
page read and write
1EB761EF000
trusted library allocation
page read and write
1EB74830000
heap
page read and write
1EB761EA000
trusted library allocation
page read and write
1EB7C85F000
trusted library allocation
page read and write
1EB84474000
trusted library allocation
page read and write
23011732000
trusted library allocation
page read and write
1EB80FD8000
trusted library allocation
page read and write
1EB790FC000
trusted library allocation
page read and write
1EB799FE000
trusted library allocation
page read and write
2365D669000
heap
page read and write
1EB7AB59000
trusted library allocation
page read and write
1EB7906F000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7B5FC000
trusted library allocation
page read and write
1EB7A26B000
trusted library allocation
page read and write
2365D65F000
heap
page read and write
1EB790AC000
trusted library allocation
page read and write
1EB81320000
trusted library allocation
page read and write
1EB8108B000
trusted library allocation
page read and write
1EB80FFB000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB7485F000
heap
page read and write
1EB7483E000
heap
page read and write
5F0000
unkown
page readonly
1EB74853000
heap
page read and write
1EB7A09B000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB74862000
heap
page read and write
1EB8118A000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7C677000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7B2F5000
trusted library allocation
page read and write
1EB7A140000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB74853000
heap
page read and write
1DA20720000
heap
page read and write
1EB7A1BD000
trusted library allocation
page read and write
1EB85C69000
heap
page read and write
1EB7A6E7000
trusted library allocation
page read and write
1EB74874000
heap
page read and write
1DA20670000
unclassified section
page readonly
1EB7A4E7000
trusted library allocation
page read and write
2365D758000
heap
page read and write
D9A69FE000
unkown
page readonly
1EB84DC4000
trusted library allocation
page read and write
1EB74835000
heap
page read and write
1EB74859000
heap
page read and write
1EB7692C000
heap
page read and write
1EB7690A000
heap
page read and write
1EB7994D000
trusted library allocation
page read and write
1EB829C9000
trusted library allocation
page read and write
1DA206B0000
heap
page read and write
1EB74849000
heap
page read and write
1EB7B2FC000
trusted library allocation
page read and write
1EB8147C000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB748DB000
heap
page read and write
1EB7B354000
trusted library allocation
page read and write
1EB829B1000
trusted library allocation
page read and write
1EB82A16000
trusted library allocation
page read and write
1EB84443000
trusted library allocation
page read and write
1EB74891000
heap
page read and write
1EB844E5000
trusted library allocation
page read and write
1EB7A167000
trusted library allocation
page read and write
1F64D850000
heap
page read and write
1EB84389000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1DA20C00000
heap
page read and write
1EB7A1B2000
trusted library allocation
page read and write
1EB85C09000
heap
page read and write
1EB7485F000
heap
page read and write
1EB79A4F000
trusted library allocation
page read and write
CC139FE000
stack
page read and write
1EB7A6FE000
trusted library allocation
page read and write
1EB7A05F000
trusted library allocation
page read and write
1EB79937000
trusted library allocation
page read and write
2365D6A1000
heap
page read and write
1EB74838000
heap
page read and write
1EB78F7A000
trusted library allocation
page read and write
1EB748C1000
heap
page read and write
1EB84AB9000
trusted library allocation
page read and write
1EB79994000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB74862000
heap
page read and write
1EB74849000
heap
page read and write
1EB829D1000
trusted library allocation
page read and write
1EB842A3000
trusted library allocation
page read and write
1EB80FA0000
trusted library allocation
page read and write
2365D6F0000
heap
page read and write
1EB748A8000
heap
page read and write
1EB81488000
trusted library allocation
page read and write
1EB78E78000
trusted library allocation
page read and write
1EB7C6C1000
trusted library allocation
page read and write
1EB7AA52000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB748A5000
heap
page read and write
1EB7A576000
trusted library allocation
page read and write
1EB78BDD000
trusted library allocation
page read and write
1EB799C0000
trusted library allocation
page read and write
1EB7A6E3000
trusted library allocation
page read and write
1242000
heap
page read and write
1EB844C9000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7905C000
trusted library allocation
page read and write
1EB811BD000
trusted library allocation
page read and write
1EB7A684000
trusted library allocation
page read and write
1EB84D2D000
trusted library allocation
page read and write
2365D664000
heap
page read and write
1EB84AC3000
trusted library allocation
page read and write
1EB74855000
heap
page read and write
1EB7B9F3000
trusted library allocation
page read and write
1EB84460000
trusted library allocation
page read and write
1EB7AADB000
trusted library allocation
page read and write
1EB84466000
trusted library allocation
page read and write
1EB7A125000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB75082000
trusted library allocation
page read and write
1EB7A00A000
trusted library allocation
page read and write
1EB844D8000
trusted library allocation
page read and write
1EB837CE000
trusted library allocation
page read and write
1DA2072A000
heap
page read and write
1EB857C8000
trusted library allocation
page read and write
1EB80F8D000
trusted library allocation
page read and write
1EB812F1000
trusted library allocation
page read and write
1EB7C69A000
trusted library allocation
page read and write
1EB7AB59000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB74858000
heap
page read and write
1EB74858000
heap
page read and write
1EB74836000
heap
page read and write
1EB7A550000
trusted library allocation
page read and write
1EB811AC000
trusted library allocation
page read and write
1EB7AF89000
trusted library allocation
page read and write
1EB81486000
trusted library allocation
page read and write
1EB84DE2000
trusted library allocation
page read and write
1EB793AF000
trusted library allocation
page read and write
1EB7A7F2000
trusted library allocation
page read and write
1EB7A52E000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7B598000
trusted library allocation
page read and write
1EB7692D000
heap
page read and write
2301118F000
unclassified section
page read and write
1EB7A4C0000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1F64DB00000
trusted library allocation
page read and write
2365C99E000
trusted library allocation
page read and write
1EB810BF000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB761E9000
trusted library allocation
page read and write
1EB813E0000
trusted library allocation
page read and write
1EB8378E000
trusted library allocation
page read and write
1DA20A30000
trusted library allocation
page read and write
D4B772E000
unkown
page readonly
1EB84ABA000
trusted library allocation
page read and write
1EB7A6EC000
trusted library allocation
page read and write
1EB7C8A1000
trusted library allocation
page read and write
1EB7A6F6000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7AA69000
trusted library allocation
page read and write
1EB7483D000
heap
page read and write
1EB74836000
heap
page read and write
D4B99FE000
unkown
page readonly
1EB844C9000
trusted library allocation
page read and write
23011090000
remote allocation
page read and write
1EB85957000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7A7C9000
trusted library allocation
page read and write
1EB84D7E000
trusted library allocation
page read and write
1EB793B1000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB74859000
heap
page read and write
1EB7B8E5000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB84AF9000
trusted library allocation
page read and write
1EB7A0EA000
trusted library allocation
page read and write
1EB7B5A9000
trusted library allocation
page read and write
1EB7A098000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB75017000
trusted library allocation
page read and write
1EB748A9000
heap
page read and write
1EB7AB3A000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB74896000
heap
page read and write
1EB82BD9000
trusted library allocation
page read and write
1EB76111000
trusted library allocation
page read and write
1EB8549E000
trusted library allocation
page read and write
1EB84EE0000
trusted library allocation
page read and write
1EB7A6E6000
trusted library allocation
page read and write
1EB85C01000
heap
page read and write
1EB7698C000
heap
page read and write
1EB7A492000
trusted library allocation
page read and write
1EB7A454000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB7934E000
trusted library allocation
page read and write
1EB84449000
trusted library allocation
page read and write
1EB7B444000
trusted library allocation
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB84467000
trusted library allocation
page read and write
1EB812EE000
trusted library allocation
page read and write
1EB7A0E8000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB748A6000
heap
page read and write
1EB8114B000
trusted library allocation
page read and write
1EB7BC45000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7C6FB000
trusted library allocation
page read and write
1EB7A475000
trusted library allocation
page read and write
1EB80FD8000
trusted library allocation
page read and write
1EB7B372000
trusted library allocation
page read and write
1EB74814000
heap
page read and write
1EB78BDE000
trusted library allocation
page read and write
1EB844C9000
trusted library allocation
page read and write
1EB84E8D000
trusted library allocation
page read and write
1EB76261000
trusted library allocation
page read and write
1EB8475C000
trusted library allocation
page read and write
1DA20A8F000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7A167000
trusted library allocation
page read and write
1EB7629C000
trusted library allocation
page read and write
2365C95F000
trusted library allocation
page read and write
1EB748B6000
heap
page read and write
1EB7A045000
trusted library allocation
page read and write
122A000
heap
page read and write
1EB761D9000
trusted library allocation
page read and write
1EB811C6000
trusted library allocation
page read and write
1EB7A67F000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB74885000
heap
page read and write
1EB829DB000
trusted library allocation
page read and write
1EB82AE5000
trusted library allocation
page read and write
1EB7A7C9000
trusted library allocation
page read and write
1EB7483F000
heap
page read and write
1EB78B33000
trusted library allocation
page read and write
1EB74871000
heap
page read and write
1EB84EB4000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7501B000
trusted library allocation
page read and write
1EB7C8BD000
trusted library allocation
page read and write
1EB76942000
heap
page read and write
23011503000
trusted library allocation
page read and write
1EB797EE000
trusted library allocation
page read and write
23011400000
trusted library allocation
page read and write
1EB7485C000
heap
page read and write
1EB74858000
heap
page read and write
1EB81131000
trusted library allocation
page read and write
1EB814D2000
trusted library allocation
page read and write
1EB790C5000
trusted library allocation
page read and write
1268000
heap
page read and write
1EB7A7E7000
trusted library allocation
page read and write
1EB75FA7000
trusted library allocation
page read and write
1EB82999000
trusted library allocation
page read and write
1EB84355000
trusted library allocation
page read and write
1244000
heap
page read and write
1EB74855000
heap
page read and write
1EB78F7A000
trusted library allocation
page read and write
1EB7A58E000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7A480000
trusted library allocation
page read and write
1EB84477000
trusted library allocation
page read and write
1EB78E96000
trusted library allocation
page read and write
1EB799A4000
trusted library allocation
page read and write
1EB74871000
heap
page read and write
1EB790D8000
trusted library allocation
page read and write
2365D744000
heap
page read and write
1EB82A16000
trusted library allocation
page read and write
1EB7B435000
trusted library allocation
page read and write
1EB7A170000
trusted library allocation
page read and write
1EB74841000
heap
page read and write
1EB7BA4B000
trusted library allocation
page read and write
D9A61FE000
stack
page read and write
1EB78B1D000
trusted library allocation
page read and write
1EB793D5000
trusted library allocation
page read and write
1EB7A4A9000
trusted library allocation
page read and write
1EB82A0C000
trusted library allocation
page read and write
1EB748A8000
heap
page read and write
1EB74847000
heap
page read and write
1EB74844000
heap
page read and write
1EB847FA000
trusted library allocation
page read and write
1EB7A4F9000
trusted library allocation
page read and write
1EB793C2000
trusted library allocation
page read and write
1EB78E21000
trusted library allocation
page read and write
1EB813BE000
trusted library allocation
page read and write
1EB7B356000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB84359000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB78BB1000
trusted library allocation
page read and write
1EB85C6E000
heap
page read and write
1EB7485C000
heap
page read and write
1EB829D1000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7A699000
trusted library allocation
page read and write
230116C6000
heap
page read and write
1EB74849000
heap
page read and write
1EB812F1000
trusted library allocation
page read and write
1EB842F8000
trusted library allocation
page read and write
1EB7A47C000
trusted library allocation
page read and write
1EB7C97D000
trusted library allocation
page read and write
1EB74837000
heap
page read and write
7282FFE000
stack
page read and write
1EB7997E000
trusted library allocation
page read and write
1EB79AAA000
trusted library allocation
page read and write
1EB76938000
heap
page read and write
1EB74842000
heap
page read and write
1EB7A57A000
trusted library allocation
page read and write
1EB843BB000
trusted library allocation
page read and write
1EB829E2000
trusted library allocation
page read and write
230115EB000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EB790B9000
trusted library allocation
page read and write
1EB7B2CB000
trusted library allocation
page read and write
728263B000
stack
page read and write
1EB78F77000
trusted library allocation
page read and write
C129DFC000
stack
page read and write
1EB74859000
heap
page read and write
1EB7A15E000
trusted library allocation
page read and write
1EB7A4A3000
trusted library allocation
page read and write
1EB76983000
heap
page read and write
1EB7A17E000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB7A129000
trusted library allocation
page read and write
1EB811B6000
trusted library allocation
page read and write
1EB7A6FB000
trusted library allocation
page read and write
3A81000
heap
page read and write
1EB811EA000
trusted library allocation
page read and write
2365D6E0000
heap
page read and write
1EB82BD7000
trusted library allocation
page read and write
2365D67F000
heap
page read and write
1EB7AA5D000
trusted library allocation
page read and write
1EB81425000
trusted library allocation
page read and write
1EB84E95000
trusted library allocation
page read and write
1EB84441000
trusted library allocation
page read and write
1EB7A163000
trusted library allocation
page read and write
1EB811E0000
trusted library allocation
page read and write
1EB7A0E8000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
2365D663000
heap
page read and write
1EB7A648000
trusted library allocation
page read and write
1EB811E0000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
72825FE000
unkown
page readonly
1EB81274000
trusted library allocation
page read and write
1EB81152000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB74891000
heap
page read and write
1EB82AA2000
trusted library allocation
page read and write
2365D65C000
heap
page read and write
1EB84492000
trusted library allocation
page read and write
1EB84DE3000
trusted library allocation
page read and write
1EB7A1EE000
trusted library allocation
page read and write
1EB844E5000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB813E6000
trusted library allocation
page read and write
1EB81311000
trusted library allocation
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB84DB9000
trusted library allocation
page read and write
1EB7484C000
heap
page read and write
1EB78F8A000
trusted library allocation
page read and write
1EB76134000
trusted library allocation
page read and write
2365C96F000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB750B8000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7698C000
heap
page read and write
1EB79AE2000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB844C4000
trusted library allocation
page read and write
1EB7A4C0000
trusted library allocation
page read and write
1EB81445000
trusted library allocation
page read and write
2365D002000
heap
page read and write
1EB7485F000
heap
page read and write
1EB844AC000
trusted library allocation
page read and write
1EB74850000
heap
page read and write
1EB74859000
heap
page read and write
1EB843B3000
trusted library allocation
page read and write
1EB82B5F000
trusted library allocation
page read and write
2365C91A000
trusted library allocation
page read and write
1EB81322000
trusted library allocation
page read and write
1EB82C8A000
trusted library allocation
page read and write
1EB84773000
trusted library allocation
page read and write
1EB7A7E2000
trusted library allocation
page read and write
1DA20AF4000
trusted library allocation
page read and write
1EB74832000
heap
page read and write
1EB815FA000
trusted library allocation
page read and write
1EB74896000
heap
page read and write
1EB74849000
heap
page read and write
1EB748C4000
heap
page read and write
1EB74842000
heap
page read and write
1EB748AB000
heap
page read and write
1EB74838000
heap
page read and write
1EB8446C000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7C8E4000
trusted library allocation
page read and write
1EB84490000
trusted library allocation
page read and write
1EB7A4C3000
trusted library allocation
page read and write
1EB847B5000
trusted library allocation
page read and write
2365D6FC000
heap
page read and write
1EB748B5000
heap
page read and write
1EB748BB000
heap
page read and write
1EB797B9000
trusted library allocation
page read and write
1EB81146000
trusted library allocation
page read and write
1EB76322000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB78E6A000
trusted library allocation
page read and write
123B000
heap
page read and write
1EB842A9000
trusted library allocation
page read and write
1EB7692C000
heap
page read and write
2365C66F000
unclassified section
page read and write
1EB748E4000
heap
page read and write
1EB8149E000
trusted library allocation
page read and write
1EB76171000
trusted library allocation
page read and write
1EB7B5BA000
trusted library allocation
page read and write
1EB84AF9000
trusted library allocation
page read and write
1EB7A1EE000
trusted library allocation
page read and write
1DA20A00000
trusted library allocation
page read and write
1EB7B9AF000
trusted library allocation
page read and write
D9A9B7E000
unkown
page readonly
1EB7AE91000
trusted library allocation
page read and write
1EB8117D000
trusted library allocation
page read and write
1EB7B8D6000
trusted library allocation
page read and write
1EB748AB000
heap
page read and write
21DED26A000
heap
page read and write
1EB748BB000
heap
page read and write
1EB7ABBB000
trusted library allocation
page read and write
1EB762F6000
trusted library allocation
page read and write
2365D67D000
heap
page read and write
1EB74851000
heap
page read and write
1EB7A1D3000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB80FC4000
trusted library allocation
page read and write
1EB78B74000
trusted library allocation
page read and write
1EB7623D000
trusted library allocation
page read and write
1EB78B33000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB81160000
trusted library allocation
page read and write
1EB84EA6000
trusted library allocation
page read and write
1EB8378C000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB7CBD0000
trusted library allocation
page read and write
23011567000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7BA2E000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7A650000
trusted library allocation
page read and write
1EB7A470000
trusted library allocation
page read and write
1EB74862000
heap
page read and write
1EB85901000
trusted library allocation
page read and write
1EB7A0E0000
trusted library allocation
page read and write
1EB76934000
heap
page read and write
1EB7A0E0000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7A195000
trusted library allocation
page read and write
1EB79AF3000
trusted library allocation
page read and write
1EB84443000
trusted library allocation
page read and write
1DA20A03000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7A0BE000
trusted library allocation
page read and write
1EB7CB8D000
trusted library allocation
page read and write
2365D767000
heap
page read and write
1EB74851000
heap
page read and write
1EB7A59F000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB790C5000
trusted library allocation
page read and write
1EB81164000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1EB74862000
heap
page read and write
1EB7A6F9000
trusted library allocation
page read and write
1EB8446F000
trusted library allocation
page read and write
1EB7A158000
trusted library allocation
page read and write
6BC000
unkown
page write copy
1EB7485A000
heap
page read and write
1EB7A6E7000
trusted library allocation
page read and write
1EB7A0FC000
trusted library allocation
page read and write
1EB8140C000
trusted library allocation
page read and write
1DA20830000
heap
page read and write
1DA2085F000
unclassified section
page read and write
2365D6F0000
heap
page read and write
1EB7482D000
heap
page read and write
1EB7485F000
heap
page read and write
1EB7A7C9000
trusted library allocation
page read and write
1EB7B392000
trusted library allocation
page read and write
1EB7690A000
heap
page read and write
1EB7A6F6000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB74857000
heap
page read and write
1EB78E71000
trusted library allocation
page read and write
1EB7B3BB000
trusted library allocation
page read and write
2365C912000
trusted library allocation
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB78F8E000
trusted library allocation
page read and write
1EB8124B000
trusted library allocation
page read and write
1EB83640000
trusted library allocation
page read and write
1EB84423000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7C9F9000
trusted library allocation
page read and write
1EB74871000
heap
page read and write
3A81000
heap
page read and write
1EB842FC000
trusted library allocation
page read and write
1EB843F1000
trusted library allocation
page read and write
1EB74885000
heap
page read and write
1247000
heap
page read and write
1EB844E0000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB7A2EC000
trusted library allocation
page read and write
1EB844C9000
trusted library allocation
page read and write
1EB7B35A000
trusted library allocation
page read and write
1EB7A1EE000
trusted library allocation
page read and write
1EB7A5B7000
trusted library allocation
page read and write
1EB7A6AC000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB7A077000
trusted library allocation
page read and write
1EB7A070000
trusted library allocation
page read and write
1EB8125C000
trusted library allocation
page read and write
1EB7A5D1000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB7AB9D000
trusted library allocation
page read and write
1EB7A1F3000
trusted library allocation
page read and write
1EB81185000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB80FE7000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7A1EB000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB84E58000
trusted library allocation
page read and write
1EB7482D000
heap
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB7629E000
trusted library allocation
page read and write
1EB793FD000
trusted library allocation
page read and write
1EB81376000
trusted library allocation
page read and write
1EB75FFD000
trusted library allocation
page read and write
1EB7C9BA000
trusted library allocation
page read and write
1EB7A4C3000
trusted library allocation
page read and write
1EB7A05F000
trusted library allocation
page read and write
1EB844AB000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7482D000
heap
page read and write
1EB8128A000
trusted library allocation
page read and write
1EB7A1F3000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB81220000
trusted library allocation
page read and write
1EB847A5000
trusted library allocation
page read and write
910000
heap
page read and write
1EB748AD000
heap
page read and write
1EB7C673000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB74851000
heap
page read and write
1EB799B2000
trusted library allocation
page read and write
1EB814D0000
trusted library allocation
page read and write
1EB761F8000
trusted library allocation
page read and write
1EB761E8000
trusted library allocation
page read and write
1EB7A0F6000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB84D24000
trusted library allocation
page read and write
1EB8107E000
trusted library allocation
page read and write
1EB7BAE8000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB84254000
trusted library allocation
page read and write
1EB762F6000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB79961000
trusted library allocation
page read and write
CC141FE000
stack
page read and write
1EB82C2C000
trusted library allocation
page read and write
1EB7A4B6000
trusted library allocation
page read and write
1EB761D9000
trusted library allocation
page read and write
1EB761D9000
trusted library allocation
page read and write
1EB7A05F000
trusted library allocation
page read and write
1EB7A1B7000
trusted library allocation
page read and write
1EB7CB86000
trusted library allocation
page read and write
1EB7C97A000
trusted library allocation
page read and write
1EB811B3000
trusted library allocation
page read and write
1EB837F9000
trusted library allocation
page read and write
1EB7AE98000
trusted library allocation
page read and write
1EB85784000
trusted library allocation
page read and write
1EB814DC000
trusted library allocation
page read and write
1EB7693E000
heap
page read and write
1EB748D5000
heap
page read and write
1EB81488000
trusted library allocation
page read and write
1EB7A42B000
trusted library allocation
page read and write
1EB748C4000
heap
page read and write
1EB748A6000
heap
page read and write
1EB85C69000
heap
page read and write
1EB74834000
heap
page read and write
1EB748A5000
heap
page read and write
1EB7AB3D000
trusted library allocation
page read and write
1EB790C5000
trusted library allocation
page read and write
1F64D800000
heap
page read and write
1EB76923000
heap
page read and write
1EB78BE7000
trusted library allocation
page read and write
1EB7A6F6000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB84394000
trusted library allocation
page read and write
1EB78E15000
trusted library allocation
page read and write
1EB84EAF000
trusted library allocation
page read and write
1EB8147A000
trusted library allocation
page read and write
11B4000
heap
page read and write
1EB74841000
heap
page read and write
1EB847D2000
trusted library allocation
page read and write
1EB7488B000
heap
page read and write
1EB7A19E000
trusted library allocation
page read and write
2365C95C000
trusted library allocation
page read and write
1EB811E0000
trusted library allocation
page read and write
1EB7AA69000
trusted library allocation
page read and write
1EB79097000
trusted library allocation
page read and write
1EB84E9A000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
1EB7A181000
trusted library allocation
page read and write
1EB84EAF000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7C95E000
trusted library allocation
page read and write
1EB82993000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7A1C0000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7904D000
trusted library allocation
page read and write
1EB797DB000
trusted library allocation
page read and write
1EB842BB000
trusted library allocation
page read and write
1EB7A0BE000
trusted library allocation
page read and write
1EB814D8000
trusted library allocation
page read and write
1EB82A86000
trusted library allocation
page read and write
1EB84A7A000
trusted library allocation
page read and write
1EB7622C000
trusted library allocation
page read and write
11B4000
heap
page read and write
1EB7C6C4000
trusted library allocation
page read and write
1EB76938000
heap
page read and write
1EB813F8000
trusted library allocation
page read and write
1EB842BD000
trusted library allocation
page read and write
1EB7948A000
trusted library allocation
page read and write
1EB7A0BE000
trusted library allocation
page read and write
1EB78B0B000
trusted library allocation
page read and write
1EB7A6C4000
trusted library allocation
page read and write
1EB7B5B0000
trusted library allocation
page read and write
1EB761EA000
trusted library allocation
page read and write
1EB7AA89000
trusted library allocation
page read and write
1EB837D9000
trusted library allocation
page read and write
1EB7C9B2000
trusted library allocation
page read and write
2365C979000
trusted library allocation
page read and write
2365D6FC000
heap
page read and write
1EB74826000
heap
page read and write
1EB7A0AF000
trusted library allocation
page read and write
1EB837F9000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7A0BC000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB84ABE000
trusted library allocation
page read and write
1EB837F4000
trusted library allocation
page read and write
1EB811C8000
trusted library allocation
page read and write
1EB84287000
trusted library allocation
page read and write
1EB857A2000
trusted library allocation
page read and write
1EB75F36000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB84D0F000
trusted library allocation
page read and write
1EB812EC000
trusted library allocation
page read and write
1EB7A13F000
trusted library allocation
page read and write
2365C8B6000
heap
page read and write
2301123A000
heap
page read and write
1EB74855000
heap
page read and write
1EB7AAC0000
trusted library allocation
page read and write
1EB81160000
trusted library allocation
page read and write
1EB76934000
heap
page read and write
1EB7A143000
trusted library allocation
page read and write
1EB84AE6000
trusted library allocation
page read and write
1EB74841000
heap
page read and write
1EB7C9FC000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB85C09000
heap
page read and write
1EB7698C000
heap
page read and write
1EB837E9000
trusted library allocation
page read and write
1EB7A077000
trusted library allocation
page read and write
2301155D000
trusted library allocation
page read and write
1EB8115B000
trusted library allocation
page read and write
1EB815FA000
trusted library allocation
page read and write
1EB74845000
heap
page read and write
1EB7A1BD000
trusted library allocation
page read and write
1EB84407000
trusted library allocation
page read and write
1EB7AE79000
trusted library allocation
page read and write
1EB84491000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7485F000
heap
page read and write
1EB78E15000
trusted library allocation
page read and write
1EB84D4C000
trusted library allocation
page read and write
1EB7907F000
trusted library allocation
page read and write
1EB7BA97000
trusted library allocation
page read and write
1EB829EA000
trusted library allocation
page read and write
1EB793FD000
trusted library allocation
page read and write
1EB79083000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
1EB7ABC6000
trusted library allocation
page read and write
1EB7A094000
trusted library allocation
page read and write
1EB815C7000
trusted library allocation
page read and write
1EB814B3000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB75FD3000
trusted library allocation
page read and write
1EB7629C000
trusted library allocation
page read and write
1EB814CC000
trusted library allocation
page read and write
1EB83633000
trusted library allocation
page read and write
1EB7ABD0000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1DA20E0C000
trusted library allocation
page read and write
1EB7488D000
heap
page read and write
1EB7B3B9000
trusted library allocation
page read and write
728267E000
unkown
page readonly
1EB7A1AF000
trusted library allocation
page read and write
123B000
heap
page read and write
1EB84254000
trusted library allocation
page read and write
1EB7A305000
trusted library allocation
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB84432000
trusted library allocation
page read and write
230116C4000
heap
page read and write
1EB7485F000
heap
page read and write
1EB79080000
trusted library allocation
page read and write
1EB766F4000
trusted library allocation
page read and write
1EB84439000
trusted library allocation
page read and write
2365D6A8000
heap
page read and write
CC129FE000
stack
page read and write
1EB7483E000
heap
page read and write
1EB761D9000
trusted library allocation
page read and write
1EB85C6E000
heap
page read and write
1EB7BCAA000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB7B2DA000
trusted library allocation
page read and write
1EB842D6000
trusted library allocation
page read and write
11B0000
heap
page read and write
D9A8B7E000
unkown
page readonly
1EB7930F000
trusted library allocation
page read and write
1EB748DB000
heap
page read and write
1EB84E35000
trusted library allocation
page read and write
1EB81062000
trusted library allocation
page read and write
1EB842D6000
trusted library allocation
page read and write
1EB75F69000
trusted library allocation
page read and write
1EB761F7000
trusted library allocation
page read and write
1EB7A7EB000
trusted library allocation
page read and write
1EB81139000
trusted library allocation
page read and write
1EB74998000
trusted library allocation
page read and write
1EB7A09B000
trusted library allocation
page read and write
1EB84D61000
trusted library allocation
page read and write
1EB7BC83000
trusted library allocation
page read and write
1EB79A50000
trusted library allocation
page read and write
1EB7A4BE000
trusted library allocation
page read and write
1EB85807000
trusted library allocation
page read and write
1EB78F8C000
trusted library allocation
page read and write
1EB7AEC0000
trusted library allocation
page read and write
1EB829FD000
trusted library allocation
page read and write
1EB7A690000
trusted library allocation
page read and write
1EB8126D000
trusted library allocation
page read and write
1EB84466000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB7A1B2000
trusted library allocation
page read and write
1EB812EC000
trusted library allocation
page read and write
1EB748CE000
heap
page read and write
1EB748A6000
heap
page read and write
1EB814B6000
trusted library allocation
page read and write
1EB7C82A000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7993D000
trusted library allocation
page read and write
1EB74981000
trusted library allocation
page read and write
1EB78F9E000
trusted library allocation
page read and write
2365D769000
heap
page read and write
1EB7485C000
heap
page read and write
1EB84287000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1EB7488B000
heap
page read and write
1EB8297F000
trusted library allocation
page read and write
1EB7BC5E000
trusted library allocation
page read and write
1EB7485A000
heap
page read and write
1EB74851000
heap
page read and write
1EB748A6000
heap
page read and write
1EB762DD000
trusted library allocation
page read and write
1EB748BE000
heap
page read and write
1EB74834000
heap
page read and write
1EB74864000
heap
page read and write
1EB814D6000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EE0003F000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1267000
heap
page read and write
1EB7A0F6000
trusted library allocation
page read and write
1EB7A6F9000
trusted library allocation
page read and write
1EB7C97C000
trusted library allocation
page read and write
1EB844A4000
trusted library allocation
page read and write
1EB81094000
trusted library allocation
page read and write
21DEB700000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB837E1000
trusted library allocation
page read and write
1EB82BAC000
trusted library allocation
page read and write
1EB82BCF000
trusted library allocation
page read and write
1EB78F7F000
trusted library allocation
page read and write
1EB7933D000
trusted library allocation
page read and write
1EB847E8000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB761E4000
trusted library allocation
page read and write
1EB85393000
trusted library allocation
page read and write
1EB842D6000
trusted library allocation
page read and write
1EB7935F000
trusted library allocation
page read and write
1EB84EF2000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB82B41000
trusted library allocation
page read and write
1EB7B8D7000
trusted library allocation
page read and write
1EB82BA0000
trusted library allocation
page read and write
1EB843D1000
trusted library allocation
page read and write
1EB7AB38000
trusted library allocation
page read and write
1EB76231000
trusted library allocation
page read and write
1EB84441000
trusted library allocation
page read and write
1EB844E5000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7A6F6000
trusted library allocation
page read and write
1EB7482D000
heap
page read and write
1EB7AE86000
trusted library allocation
page read and write
1EB84EFE000
trusted library allocation
page read and write
1EB748BE000
heap
page read and write
1EB7A145000
trusted library allocation
page read and write
1EB842D6000
trusted library allocation
page read and write
1EB7A146000
trusted library allocation
page read and write
1EB7A0E8000
trusted library allocation
page read and write
1EB794FC000
trusted library allocation
page read and write
1EB7C69A000
trusted library allocation
page read and write
1EB7C95E000
trusted library allocation
page read and write
1EB8479A000
trusted library allocation
page read and write
1EB7485D000
heap
page read and write
1EB7C80E000
trusted library allocation
page read and write
1EB749C7000
trusted library allocation
page read and write
1EB7A0E8000
trusted library allocation
page read and write
1EB7C906000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB74849000
heap
page read and write
1EB78E5D000
trusted library allocation
page read and write
103D000
stack
page read and write
1EB7A5DC000
trusted library allocation
page read and write
1EB7A4B4000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB7485F000
heap
page read and write
1267000
heap
page read and write
1EB83797000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB74842000
heap
page read and write
2365D600000
heap
page read and write
2365D744000
heap
page read and write
1EB790BE000
trusted library allocation
page read and write
1EB814CE000
trusted library allocation
page read and write
1EB790D8000
trusted library allocation
page read and write
7280DD8000
stack
page read and write
1EB7485F000
heap
page read and write
1EB79083000
trusted library allocation
page read and write
1EB74896000
heap
page read and write
2365C900000
trusted library allocation
page read and write
1EB7668C000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB790AE000
trusted library allocation
page read and write
1EB84E72000
trusted library allocation
page read and write
2365D6E3000
heap
page read and write
1EB7B8EC000
trusted library allocation
page read and write
1EB74841000
heap
page read and write
21DEB90A000
trusted library allocation
page read and write
1EB815B8000
trusted library allocation
page read and write
1EB81225000
trusted library allocation
page read and write
1EB84443000
trusted library allocation
page read and write
1EB7A7C9000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1264000
heap
page read and write
1EB79AC7000
trusted library allocation
page read and write
1DA20852000
unclassified section
page read and write
1EB74849000
heap
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB75F1B000
trusted library allocation
page read and write
1EB7690A000
heap
page read and write
1EB84AC3000
trusted library allocation
page read and write
1EB84ABE000
trusted library allocation
page read and write
1EB80FB4000
trusted library allocation
page read and write
1EB7AED6000
trusted library allocation
page read and write
1EB7C9F5000
trusted library allocation
page read and write
1EB7A1BD000
trusted library allocation
page read and write
1EB7ABA4000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
11B4000
heap
page read and write
1EB842A7000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7A4E1000
trusted library allocation
page read and write
1EB814BC000
trusted library allocation
page read and write
1EB85C69000
heap
page read and write
1EB8440C000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7668A000
trusted library allocation
page read and write
1EB797A4000
trusted library allocation
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB8128A000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB799AC000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB84AFD000
trusted library allocation
page read and write
1EB812DD000
trusted library allocation
page read and write
1EB7A1E0000
trusted library allocation
page read and write
1EB74FFB000
trusted library allocation
page read and write
1DA20A67000
trusted library allocation
page read and write
1EB748A5000
heap
page read and write
1EB842A9000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7482E000
heap
page read and write
2365D721000
heap
page read and write
1EB85C6C000
heap
page read and write
1EB74842000
heap
page read and write
2301155B000
trusted library allocation
page read and write
2365C9E9000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB842A3000
trusted library allocation
page read and write
1EB7B594000
trusted library allocation
page read and write
1EB829B1000
trusted library allocation
page read and write
1EB793E7000
trusted library allocation
page read and write
1EB76264000
trusted library allocation
page read and write
1EB7665B000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
2365D700000
heap
page read and write
1EB74856000
heap
page read and write
1EB74849000
heap
page read and write
2365D6E8000
heap
page read and write
1EB7A54C000
trusted library allocation
page read and write
1EB7A1DB000
trusted library allocation
page read and write
2365C5B0000
heap
page read and write
1EB74861000
heap
page read and write
1EB75066000
trusted library allocation
page read and write
1EB7AADB000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
1EB8438C000
trusted library allocation
page read and write
1EB75FC9000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
1EB761EF000
trusted library allocation
page read and write
1EB7A61B000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB748B3000
heap
page read and write
1EB7995D000
trusted library allocation
page read and write
5F0000
unkown
page readonly
1EB84A8F000
trusted library allocation
page read and write
1EB82C67000
trusted library allocation
page read and write
2301157B000
trusted library allocation
page read and write
1EB78E07000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB797A0000
trusted library allocation
page read and write
1EB7974B000
trusted library allocation
page read and write
1EB84EC3000
trusted library allocation
page read and write
1EB79ABA000
trusted library allocation
page read and write
1EB78E71000
trusted library allocation
page read and write
1EB7BA76000
trusted library allocation
page read and write
1EB84AC3000
trusted library allocation
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB790FC000
trusted library allocation
page read and write
2365C923000
trusted library allocation
page read and write
1DA20850000
unclassified section
page read and write
68C000
unkown
page readonly
1EB78E84000
trusted library allocation
page read and write
1EB7488D000
heap
page read and write
1EB81262000
trusted library allocation
page read and write
1EB82B86000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
11B4000
heap
page read and write
1EB7B4C7000
trusted library allocation
page read and write
1EB7BA3B000
trusted library allocation
page read and write
1EB74854000
heap
page read and write
1EB7948A000
trusted library allocation
page read and write
1EB748A8000
heap
page read and write
1EB84239000
trusted library allocation
page read and write
2365D767000
heap
page read and write
1EB74842000
heap
page read and write
1EB74885000
heap
page read and write
1EB748A9000
heap
page read and write
1EB748AB000
heap
page read and write
1EB76923000
heap
page read and write
1EB79934000
trusted library allocation
page read and write
1267000
heap
page read and write
1EB748A8000
heap
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB85C6E000
heap
page read and write
1EB799EE000
trusted library allocation
page read and write
1EB7A1A7000
trusted library allocation
page read and write
1EB762EB000
trusted library allocation
page read and write
1EB80FC8000
trusted library allocation
page read and write
1EB84EA6000
trusted library allocation
page read and write
1EB7C9AE000
trusted library allocation
page read and write
1EB78B62000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB76136000
trusted library allocation
page read and write
2365C96A000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
D4BB23E000
stack
page read and write
1EB76698000
trusted library allocation
page read and write
1EB78BFC000
trusted library allocation
page read and write
1EB7A55E000
trusted library allocation
page read and write
1EB7483F000
heap
page read and write
1EB8363F000
trusted library allocation
page read and write
1EB74837000
heap
page read and write
1EB79050000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
1EB7BA71000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB813E6000
trusted library allocation
page read and write
1EB761FA000
trusted library allocation
page read and write
1EB79352000
trusted library allocation
page read and write
1EB7A6F6000
trusted library allocation
page read and write
1EB814A0000
trusted library allocation
page read and write
1EB81484000
trusted library allocation
page read and write
1EB82BC5000
trusted library allocation
page read and write
1EB7A15A000
trusted library allocation
page read and write
1EB7482D000
heap
page read and write
1EB81320000
trusted library allocation
page read and write
1EB84449000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7A800000
trusted library allocation
page read and write
2365CFD0000
heap
page read and write
1EB7C9B2000
trusted library allocation
page read and write
1EB85C6E000
heap
page read and write
1EB7ABFC000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB7AA80000
trusted library allocation
page read and write
1EB74886000
heap
page read and write
2365C590000
heap
page read and write
1EB74842000
heap
page read and write
2365C4A0000
heap
page read and write
1EB7A7E2000
trusted library allocation
page read and write
1EB7A7D0000
trusted library allocation
page read and write
1EB76938000
heap
page read and write
1EB85843000
trusted library allocation
page read and write
1EB7484F000
heap
page read and write
1EB74842000
heap
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB7AEC0000
trusted library allocation
page read and write
2365C90C000
trusted library allocation
page read and write
1EB7A5D5000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1EB84E72000
trusted library allocation
page read and write
230110B0000
unclassified section
page readonly
1EB793D5000
trusted library allocation
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB7BCF6000
trusted library allocation
page read and write
1210000
heap
page read and write
1EB7C80A000
trusted library allocation
page read and write
1EB82B05000
trusted library allocation
page read and write
1EB7B9B1000
trusted library allocation
page read and write
1EB7C9BA000
trusted library allocation
page read and write
1EB7AB5E000
trusted library allocation
page read and write
1DA205E0000
unclassified section
page readonly
1EB78B4E000
trusted library allocation
page read and write
1EB748A8000
heap
page read and write
1EB837E1000
trusted library allocation
page read and write
1EB7BCBD000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB74837000
heap
page read and write
1EB8446F000
trusted library allocation
page read and write
1EB799F4000
trusted library allocation
page read and write
1EB84E95000
trusted library allocation
page read and write
1EB78E63000
trusted library allocation
page read and write
1EB7A2E4000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB790A1000
trusted library allocation
page read and write
1EB84AE6000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1244000
heap
page read and write
1EB74845000
heap
page read and write
1EB7995D000
trusted library allocation
page read and write
1EB7A167000
trusted library allocation
page read and write
1EB7A188000
trusted library allocation
page read and write
1EB811A0000
trusted library allocation
page read and write
1EB76938000
heap
page read and write
1EB7C6E6000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB84239000
trusted library allocation
page read and write
1EB84E9B000
trusted library allocation
page read and write
1EB7C80C000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1DA20A24000
trusted library allocation
page read and write
6C4000
unkown
page readonly
1EB85C0E000
heap
page read and write
1EB7483E000
heap
page read and write
1EB748BB000
heap
page read and write
1EB84482000
trusted library allocation
page read and write
1EB812F9000
trusted library allocation
page read and write
1EB7BC89000
trusted library allocation
page read and write
1EB7A08F000
trusted library allocation
page read and write
1EB750D1000
trusted library allocation
page read and write
1EB7B27D000
trusted library allocation
page read and write
1EB84466000
trusted library allocation
page read and write
1EB7485C000
heap
page read and write
1EB81484000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB748B5000
heap
page read and write
1EB79AEE000
trusted library allocation
page read and write
1EB812FD000
trusted library allocation
page read and write
1EB7A58D000
trusted library allocation
page read and write
1EB7C6C4000
trusted library allocation
page read and write
1DA20A72000
trusted library allocation
page read and write
1EB7BA6F000
trusted library allocation
page read and write
1EB79088000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB78B63000
trusted library allocation
page read and write
1EB7A1BF000
trusted library allocation
page read and write
1EB7A1EE000
trusted library allocation
page read and write
1EB84494000
trusted library allocation
page read and write
1EB7B419000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB74842000
heap
page read and write
1EB7B8D7000
trusted library allocation
page read and write
1EB80FF7000
trusted library allocation
page read and write
1EB815F8000
trusted library allocation
page read and write
1DA20AC4000
trusted library allocation
page read and write
2365D6B9000
heap
page read and write
1EB74839000
heap
page read and write
1EB74830000
heap
page read and write
1DA20BF0000
heap
page read and write
1EB80FCE000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EB7A1EA000
trusted library allocation
page read and write
FFE000
stack
page read and write
1EB82B55000
trusted library allocation
page read and write
1EB7483F000
heap
page read and write
2301171C000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB7485F000
heap
page read and write
1EB7B871000
trusted library allocation
page read and write
1EB78E6A000
trusted library allocation
page read and write
1EB7A09B000
trusted library allocation
page read and write
230110D0000
heap
page read and write
1EB7BA33000
trusted library allocation
page read and write
1EB748BD000
heap
page read and write
1EB7B38A000
trusted library allocation
page read and write
1EB7A4C5000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB74858000
heap
page read and write
23011595000
trusted library allocation
page read and write
1EB7A250000
trusted library allocation
page read and write
1EB7A2F2000
trusted library allocation
page read and write
17608281E000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7A1C3000
trusted library allocation
page read and write
1EB7A1E4000
trusted library allocation
page read and write
1EB7BA15000
trusted library allocation
page read and write
1EB7933D000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7A648000
trusted library allocation
page read and write
21DEB6E0000
heap
page read and write
1EB84E66000
trusted library allocation
page read and write
C12ADFE000
stack
page read and write
1EB74842000
heap
page read and write
1EB748A8000
heap
page read and write
1EB7992D000
trusted library allocation
page read and write
1EB761F8000
trusted library allocation
page read and write
1EB81146000
trusted library allocation
page read and write
1EB7A4C3000
trusted library allocation
page read and write
1EB81050000
trusted library allocation
page read and write
1EB761CF000
trusted library allocation
page read and write
1EB750D2000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB748B3000
heap
page read and write
1EB74838000
heap
page read and write
1EB78E9A000
trusted library allocation
page read and write
1EB74885000
heap
page read and write
1EB74838000
heap
page read and write
1EB7A139000
trusted library allocation
page read and write
23011182000
unclassified section
page read and write
2365D500000
trusted library allocation
page read and write
1EB748DE000
heap
page read and write
1EB76116000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB815C9000
trusted library allocation
page read and write
1EB842F3000
trusted library allocation
page read and write
1EB7B8B1000
trusted library allocation
page read and write
1EB74857000
heap
page read and write
1EB7A1B2000
trusted library allocation
page read and write
1EB85C6E000
heap
page read and write
1EB74849000
heap
page read and write
1EB74857000
heap
page read and write
D9A937E000
stack
page read and write
1EB74861000
heap
page read and write
1EB7A475000
trusted library allocation
page read and write
1EB7A7EF000
trusted library allocation
page read and write
1EB7ADF8000
trusted library allocation
page read and write
1EB7A129000
trusted library allocation
page read and write
1EB7A01F000
trusted library allocation
page read and write
1EB85C69000
heap
page read and write
1EB78D00000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB74826000
heap
page read and write
1EB748A5000
heap
page read and write
1EB7A44E000
trusted library allocation
page read and write
2365C8B0000
heap
page read and write
1EB8427E000
trusted library allocation
page read and write
1EB7B5AC000
trusted library allocation
page read and write
1EB7A0E8000
trusted library allocation
page read and write
1EB8446F000
trusted library allocation
page read and write
2365D66C000
heap
page read and write
1EB84433000
trusted library allocation
page read and write
1EB837F4000
trusted library allocation
page read and write
2365C910000
trusted library allocation
page read and write
1EB7A6F9000
trusted library allocation
page read and write
1EB7B5AC000
trusted library allocation
page read and write
1EB7482D000
heap
page read and write
1EB74841000
heap
page read and write
1EB74858000
heap
page read and write
21DEB8A5000
heap
page read and write
1DA205F0000
unclassified section
page readonly
1EB74847000
heap
page read and write
123A000
heap
page read and write
1EB761EA000
trusted library allocation
page read and write
1EB7A4C0000
trusted library allocation
page read and write
72837FE000
unkown
page readonly
1EB7A0B7000
trusted library allocation
page read and write
1EB7AABA000
trusted library allocation
page read and write
1EB84777000
trusted library allocation
page read and write
1EB8427E000
trusted library allocation
page read and write
1EB7693C000
heap
page read and write
1EB843A9000
trusted library allocation
page read and write
1EB74856000
heap
page read and write
1EB74841000
heap
page read and write
1EB814AA000
trusted library allocation
page read and write
1EB842A9000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB84D8A000
trusted library allocation
page read and write
1EB7C85F000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7AA7D000
trusted library allocation
page read and write
1EB790BB000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7A089000
trusted library allocation
page read and write
1EB84232000
trusted library allocation
page read and write
1EB7C82A000
trusted library allocation
page read and write
2365D660000
heap
page read and write
1DA20880000
unclassified section
page readonly
1EB81074000
trusted library allocation
page read and write
3A80000
heap
page read and write
2365C8B4000
heap
page read and write
1EB7A4F9000
trusted library allocation
page read and write
1EB84414000
trusted library allocation
page read and write
1EB7629E000
trusted library allocation
page read and write
1EB842A9000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1240000
heap
page read and write
1EB7A0AF000
trusted library allocation
page read and write
1EB7BA30000
trusted library allocation
page read and write
1EB74836000
heap
page read and write
1EB748A5000
heap
page read and write
1EB7A19E000
trusted library allocation
page read and write
1EB7BC30000
trusted library allocation
page read and write
1EB8148F000
trusted library allocation
page read and write
1EB7A690000
trusted library allocation
page read and write
1EB84EF4000
trusted library allocation
page read and write
1EB7A1B0000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB8143D000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB74871000
heap
page read and write
1EB844E0000
trusted library allocation
page read and write
1EB7A533000
trusted library allocation
page read and write
1EB84EE0000
trusted library allocation
page read and write
1EB842FC000
trusted library allocation
page read and write
1EB84477000
trusted library allocation
page read and write
1EB81307000
trusted library allocation
page read and write
1EB7A5CF000
trusted library allocation
page read and write
1EB7A695000
trusted library allocation
page read and write
1DA20D03000
trusted library allocation
page read and write
1EB793C3000
trusted library allocation
page read and write
1EB762EB000
trusted library allocation
page read and write
1EB8137E000
trusted library allocation
page read and write
1EB842BD000
trusted library allocation
page read and write
1EB7BA3D000
trusted library allocation
page read and write
1EB7A5E2000
trusted library allocation
page read and write
1EB7A6E0000
trusted library allocation
page read and write
23011512000
trusted library allocation
page read and write
1EB85C6A000
heap
page read and write
1EB7A1AA000
trusted library allocation
page read and write
1EB810ED000
trusted library allocation
page read and write
1EB814D8000
trusted library allocation
page read and write
1EB7A1F3000
trusted library allocation
page read and write
1EB85373000
trusted library allocation
page read and write
1EB814D6000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7A1BF000
trusted library allocation
page read and write
1EB84457000
trusted library allocation
page read and write
1EB78F07000
trusted library allocation
page read and write
2365D72D000
heap
page read and write
1EB81484000
trusted library allocation
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB842EF000
trusted library allocation
page read and write
1EB7C695000
trusted library allocation
page read and write
1EB78BCE000
trusted library allocation
page read and write
1EB81482000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB74825000
heap
page read and write
1EB84381000
trusted library allocation
page read and write
1EB7AB5C000
trusted library allocation
page read and write
1EB84EFE000
trusted library allocation
page read and write
1EB84EC3000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB813E6000
trusted library allocation
page read and write
1EB84231000
trusted library allocation
page read and write
1EB7A6DF000
trusted library allocation
page read and write
1EB7A1B4000
trusted library allocation
page read and write
1EB7B294000
trusted library allocation
page read and write
1EB843C1000
trusted library allocation
page read and write
1EB84E1F000
trusted library allocation
page read and write
1EB7A1A8000
trusted library allocation
page read and write
1EB7C6E8000
trusted library allocation
page read and write
1EB761AF000
trusted library allocation
page read and write
1EB793A1000
trusted library allocation
page read and write
1EB7482D000
heap
page read and write
1249000
heap
page read and write
1EB74851000
heap
page read and write
1EB74842000
heap
page read and write
1EB844E5000
trusted library allocation
page read and write
1EB7A4A3000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB7A089000
trusted library allocation
page read and write
5F1000
unkown
page execute read
1EB82BA3000
trusted library allocation
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB7B9DF000
trusted library allocation
page read and write
D4B776D000
stack
page read and write
1EB748C3000
heap
page read and write
1EB7485F000
heap
page read and write
1EB79989000
trusted library allocation
page read and write
2365C800000
trusted library allocation
page read and write
1EB7A1B7000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB84EAA000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7B9B9000
trusted library allocation
page read and write
1EB748A5000
heap
page read and write
CC111FA000
stack
page read and write
1EB74826000
heap
page read and write
1EB85C69000
heap
page read and write
1EB8447F000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
3734000
heap
page read and write
1EB7C6BB000
trusted library allocation
page read and write
1EB813E4000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7AAF5000
trusted library allocation
page read and write
1EB7A484000
trusted library allocation
page read and write
1EB7A7C3000
trusted library allocation
page read and write
1EB79338000
trusted library allocation
page read and write
1EB844ED000
trusted library allocation
page read and write
6B2000
unkown
page readonly
1EB748C4000
heap
page read and write
1EB74837000
heap
page read and write
1EB748A8000
heap
page read and write
1EB7AAD0000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB79A59000
trusted library allocation
page read and write
1EB85CDF000
heap
page read and write
1EB829F8000
trusted library allocation
page read and write
23011721000
trusted library allocation
page read and write
1EB8112C000
trusted library allocation
page read and write
1EB84E63000
trusted library allocation
page read and write
1EB7BA41000
trusted library allocation
page read and write
2365D759000
heap
page read and write
1EB84AE2000
trusted library allocation
page read and write
1EB78ECF000
trusted library allocation
page read and write
1EB76934000
heap
page read and write
1EB7BA6C000
trusted library allocation
page read and write
1EB78BF7000
trusted library allocation
page read and write
D9A6A7E000
unkown
page readonly
1EB815F0000
trusted library allocation
page read and write
1EB8584D000
trusted library allocation
page read and write
1EB76986000
heap
page read and write
1EB7B4CF000
trusted library allocation
page read and write
1EB84A71000
trusted library allocation
page read and write
1EB7C982000
trusted library allocation
page read and write
1EB858A7000
trusted library allocation
page read and write
1EB79CB6000
trusted library allocation
page read and write
1EB7BAE9000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB7A1F3000
trusted library allocation
page read and write
1EB748A5000
heap
page read and write
1EB7482E000
heap
page read and write
1EB74859000
heap
page read and write
1EB814DA000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB85C09000
heap
page read and write
1EB81038000
trusted library allocation
page read and write
1EB813EC000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7A1EE000
trusted library allocation
page read and write
2365D6F0000
heap
page read and write
1EB815EE000
trusted library allocation
page read and write
1EB84338000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB748A9000
heap
page read and write
1EB810D0000
trusted library allocation
page read and write
1EB815F0000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7BABC000
trusted library allocation
page read and write
1EB7C66F000
trusted library allocation
page read and write
1EB7A167000
trusted library allocation
page read and write
1EB8422C000
trusted library allocation
page read and write
23011160000
heap
page readonly
1EB844ED000
trusted library allocation
page read and write
1EB7994F000
trusted library allocation
page read and write
1EB7A630000
trusted library allocation
page read and write
1EB79967000
trusted library allocation
page read and write
1EB7C668000
trusted library allocation
page read and write
1EB76140000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB78BFA000
trusted library allocation
page read and write
1EB799B6000
trusted library allocation
page read and write
1EB74856000
heap
page read and write
1EB81016000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
C12A5FE000
stack
page read and write
1EB78ECF000
trusted library allocation
page read and write
1EB82B8A000
trusted library allocation
page read and write
1EB85C6E000
heap
page read and write
1EB74858000
heap
page read and write
1EB81486000
trusted library allocation
page read and write
1EB844C9000
trusted library allocation
page read and write
1EB749EF000
trusted library allocation
page read and write
1EB84460000
trusted library allocation
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB7B8E7000
trusted library allocation
page read and write
1EB793EC000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB74856000
heap
page read and write
1EB7B9EF000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB842BB000
trusted library allocation
page read and write
1EB7A0E6000
trusted library allocation
page read and write
1EB76238000
trusted library allocation
page read and write
1EB7AA6C000
trusted library allocation
page read and write
1EB7B2AB000
trusted library allocation
page read and write
1EB84EF2000
trusted library allocation
page read and write
11B4000
heap
page read and write
1EB748BB000
heap
page read and write
1EB748DE000
heap
page read and write
1EB79091000
trusted library allocation
page read and write
1EB81391000
trusted library allocation
page read and write
68C000
unkown
page readonly
2365D744000
heap
page read and write
1EB74842000
heap
page read and write
1EB74863000
heap
page read and write
1EB82A14000
trusted library allocation
page read and write
1160000
heap
page read and write
1EB7A6BE000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB8478F000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7AB88000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB74849000
heap
page read and write
1EB811B6000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
1EB74839000
heap
page read and write
1EB7A1AF000
trusted library allocation
page read and write
1EB7A5D1000
trusted library allocation
page read and write
1EB7488B000
heap
page read and write
1EB74858000
heap
page read and write
1EB76264000
trusted library allocation
page read and write
1EB85D4F000
heap
page read and write
1EB82BD1000
trusted library allocation
page read and write
1EB790C4000
trusted library allocation
page read and write
1EB79957000
trusted library allocation
page read and write
1EB74871000
heap
page read and write
1EB748A5000
heap
page read and write
1EB84AA1000
trusted library allocation
page read and write
1EB748A5000
heap
page read and write
1EB7A484000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB74849000
heap
page read and write
1EB748A8000
heap
page read and write
1EB85C69000
heap
page read and write
1EB7485F000
heap
page read and write
1EB79049000
trusted library allocation
page read and write
1EB8421D000
trusted library allocation
page read and write
1EB7A188000
trusted library allocation
page read and write
1EB7483D000
heap
page read and write
1EB842E0000
trusted library allocation
page read and write
1EB81443000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7A7DB000
trusted library allocation
page read and write
2365D6B2000
heap
page read and write
1EB74871000
heap
page read and write
1EB7ABE8000
trusted library allocation
page read and write
1EB84A76000
trusted library allocation
page read and write
1EB7C9CF000
trusted library allocation
page read and write
1EB7CB41000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB7B912000
trusted library allocation
page read and write
1EB7AAAD000
trusted library allocation
page read and write
1EB76261000
trusted library allocation
page read and write
1EB74836000
heap
page read and write
21DED277000
heap
page read and write
1EB74834000
heap
page read and write
1EB7C9D4000
trusted library allocation
page read and write
2365C662000
unclassified section
page read and write
2365D6E0000
heap
page read and write
1EB8424F000
trusted library allocation
page read and write
1EB7BAC0000
trusted library allocation
page read and write
1EB84239000
trusted library allocation
page read and write
1EB7A18F000
trusted library allocation
page read and write
1EB79975000
trusted library allocation
page read and write
1EB7485D000
heap
page read and write
1EB7B294000
trusted library allocation
page read and write
23011110000
heap
page read and write
1EB812E6000
trusted library allocation
page read and write
1EB7A199000
trusted library allocation
page read and write
1EB837BA000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB7482D000
heap
page read and write
1EB7A53A000
trusted library allocation
page read and write
1EB748CE000
heap
page read and write
1EB79CE7000
trusted library allocation
page read and write
1EB7ABFA000
trusted library allocation
page read and write
1EB7C8EE000
trusted library allocation
page read and write
1EB7A574000
trusted library allocation
page read and write
2365C9CF000
trusted library allocation
page read and write
1EB793D7000
trusted library allocation
page read and write
2365C976000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7AB5C000
trusted library allocation
page read and write
1EB74840000
heap
page read and write
1EB793CB000
trusted library allocation
page read and write
1EB748A8000
heap
page read and write
1EB7A084000
trusted library allocation
page read and write
1EB7A18B000
trusted library allocation
page read and write
1EB7B5C6000
trusted library allocation
page read and write
1EB84E9B000
trusted library allocation
page read and write
1EB7A29E000
trusted library allocation
page read and write
1EB76248000
trusted library allocation
page read and write
1EB790AC000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB814B8000
trusted library allocation
page read and write
1EB80FC4000
trusted library allocation
page read and write
1EB7A1EE000
trusted library allocation
page read and write
1EB82AC8000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7CBE2000
trusted library allocation
page read and write
1EB7A181000
trusted library allocation
page read and write
1EB82C93000
trusted library allocation
page read and write
1EB790C1000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7995A000
trusted library allocation
page read and write
1EB7AF59000
trusted library allocation
page read and write
1EB844E0000
trusted library allocation
page read and write
2365D68A000
heap
page read and write
1EB7484D000
heap
page read and write
1EB82A0A000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7AA7D000
trusted library allocation
page read and write
1EB842C0000
trusted library allocation
page read and write
21DEB6D1000
heap
page read and write
1EB82C05000
trusted library allocation
page read and write
1EB74871000
heap
page read and write
1EB813FE000
trusted library allocation
page read and write
1EB748B6000
heap
page read and write
1EB74853000
heap
page read and write
1EB761B7000
trusted library allocation
page read and write
1EB7975D000
trusted library allocation
page read and write
1EB81274000
trusted library allocation
page read and write
1EB80FD4000
trusted library allocation
page read and write
1EB75FDB000
trusted library allocation
page read and write
1EB7A479000
trusted library allocation
page read and write
1EB84E8D000
trusted library allocation
page read and write
1EB843E3000
trusted library allocation
page read and write
1EB748A8000
heap
page read and write
2365D767000
heap
page read and write
21DED250000
heap
page read and write
1EB844ED000
trusted library allocation
page read and write
1EB8427E000
trusted library allocation
page read and write
D4B77AE000
unkown
page readonly
1EB8429B000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB85D4F000
heap
page read and write
1EB7A1EE000
trusted library allocation
page read and write
1EB79794000
trusted library allocation
page read and write
1EB7A1BD000
trusted library allocation
page read and write
1EB842FC000
trusted library allocation
page read and write
1EB7AB70000
trusted library allocation
page read and write
1EB83E00000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB790B9000
trusted library allocation
page read and write
1EB7CB8D000
trusted library allocation
page read and write
1EB7B964000
trusted library allocation
page read and write
1EB7C9EA000
trusted library allocation
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB7994F000
trusted library allocation
page read and write
2365D73B000
heap
page read and write
1EB79945000
trusted library allocation
page read and write
1DA20840000
heap
page readonly
1EB81379000
trusted library allocation
page read and write
1EB7B26E000
trusted library allocation
page read and write
1EB844E0000
trusted library allocation
page read and write
1EB79037000
trusted library allocation
page read and write
1EB790FC000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7B2F5000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB7507D000
trusted library allocation
page read and write
2365D6F0000
heap
page read and write
1EB762F6000
trusted library allocation
page read and write
1EB7B2B2000
trusted library allocation
page read and write
1EB7A6DF000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB761E9000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB748B3000
heap
page read and write
1EB85933000
trusted library allocation
page read and write
1EB7976D000
trusted library allocation
page read and write
1EB79332000
trusted library allocation
page read and write
1EB829DB000
trusted library allocation
page read and write
1EB7934E000
trusted library allocation
page read and write
1EB7BA0E000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB7906C000
trusted library allocation
page read and write
1EB7A1D9000
trusted library allocation
page read and write
1EB7A082000
trusted library allocation
page read and write
1EB7BA1C000
trusted library allocation
page read and write
1EB84DC4000
trusted library allocation
page read and write
1EB81363000
trusted library allocation
page read and write
1EB76684000
trusted library allocation
page read and write
1EB84D0D000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB84D3F000
trusted library allocation
page read and write
1EB76221000
trusted library allocation
page read and write
1EB82B0C000
trusted library allocation
page read and write
1EB844FC000
trusted library allocation
page read and write
1EB811BA000
trusted library allocation
page read and write
1EB750D5000
trusted library allocation
page read and write
1EB81114000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB813F3000
trusted library allocation
page read and write
1EB7A57E000
trusted library allocation
page read and write
1EB811C0000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB793FD000
trusted library allocation
page read and write
1EB7A1AF000
trusted library allocation
page read and write
2365C6FE000
unkown
page execute read
1EB7483E000
heap
page read and write
1EB76244000
trusted library allocation
page read and write
1EB842A3000
trusted library allocation
page read and write
1EB7A0E6000
trusted library allocation
page read and write
1EB844B9000
trusted library allocation
page read and write
1EB81049000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
2365D6FC000
heap
page read and write
1EB7BCF8000
trusted library allocation
page read and write
1EB7B924000
trusted library allocation
page read and write
1EB7C675000
trusted library allocation
page read and write
1EB76240000
trusted library allocation
page read and write
1EB811C3000
trusted library allocation
page read and write
1EB814DA000
trusted library allocation
page read and write
1EB7485C000
heap
page read and write
1EB7CB35000
trusted library allocation
page read and write
CC119FE000
stack
page read and write
1EB799E3000
trusted library allocation
page read and write
1EB79954000
trusted library allocation
page read and write
1EB7692D000
heap
page read and write
1EB74859000
heap
page read and write
1EB812F9000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7905C000
trusted library allocation
page read and write
1EB750CD000
trusted library allocation
page read and write
1EB843E3000
trusted library allocation
page read and write
1EB8106E000
trusted library allocation
page read and write
1EB7AEE9000
trusted library allocation
page read and write
1EB7B383000
trusted library allocation
page read and write
1EB80FB7000
trusted library allocation
page read and write
1EB793E8000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB78EAC000
trusted library allocation
page read and write
1EB7A13B000
trusted library allocation
page read and write
1EB7692D000
heap
page read and write
1EB829EF000
trusted library allocation
page read and write
1EB7C9A8000
trusted library allocation
page read and write
1EB7C97C000
trusted library allocation
page read and write
1EB7AABA000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB84EAF000
trusted library allocation
page read and write
1EB7993D000
trusted library allocation
page read and write
2365C47D000
remote allocation
page execute read
1EB84E5C000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB74852000
heap
page read and write
1EB748A8000
heap
page read and write
1EB8428A000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB76942000
heap
page read and write
1EB8104D000
trusted library allocation
page read and write
1EB79CB8000
trusted library allocation
page read and write
1EB7908E000
trusted library allocation
page read and write
D9A7AFE000
unkown
page readonly
1EB748A8000
heap
page read and write
1EB7668A000
trusted library allocation
page read and write
1EB7A1F4000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB74849000
heap
page read and write
1EB842BD000
trusted library allocation
page read and write
1EB749EF000
trusted library allocation
page read and write
1EB7B598000
trusted library allocation
page read and write
D9A51D8000
stack
page read and write
1EB74853000
heap
page read and write
1EB7485F000
heap
page read and write
1EB75F48000
trusted library allocation
page read and write
1DA20A0E000
trusted library allocation
page read and write
2365C6F2000
unkown
page execute read
1EB837FC000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB84EF4000
trusted library allocation
page read and write
1EB7908E000
trusted library allocation
page read and write
1EB76934000
heap
page read and write
1EB7B8D1000
trusted library allocation
page read and write
1EB814DC000
trusted library allocation
page read and write
1EB7BC1D000
trusted library allocation
page read and write
1EB79994000
trusted library allocation
page read and write
1EB7486A000
heap
page read and write
6BC000
unkown
page read and write
1EB7A17E000
trusted library allocation
page read and write
1EB84AA4000
trusted library allocation
page read and write
1EB844E0000
trusted library allocation
page read and write
D9A7B7E000
unkown
page readonly
1EB84DDB000
trusted library allocation
page read and write
1EB836B2000
trusted library allocation
page read and write
1EB842F3000
trusted library allocation
page read and write
1EB7A6E7000
trusted library allocation
page read and write
1EB7A1EA000
trusted library allocation
page read and write
1EB842BD000
trusted library allocation
page read and write
1EB84471000
trusted library allocation
page read and write
1EB844ED000
trusted library allocation
page read and write
1EB797CE000
trusted library allocation
page read and write
1EB7C9D4000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB74858000
heap
page read and write
1EB844E0000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB748AE000
heap
page read and write
1EB814D6000
trusted library allocation
page read and write
1EB7624D000
trusted library allocation
page read and write
1EB7B600000
trusted library allocation
page read and write
1EB7BCF0000
trusted library allocation
page read and write
1EB7AB62000
trusted library allocation
page read and write
1EB7BA9F000
trusted library allocation
page read and write
1EB79937000
trusted library allocation
page read and write
1EB81800000
trusted library allocation
page read and write
1EB811A0000
trusted library allocation
page read and write
1EB8577B000
trusted library allocation
page read and write
1EB748C3000
heap
page read and write
1EB85C6C000
heap
page read and write
1EB7A1F3000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB74842000
heap
page read and write
1EB790CE000
trusted library allocation
page read and write
1EB844D8000
trusted library allocation
page read and write
1EB85C6C000
heap
page read and write
728277E000
unkown
page readonly
1EB761EF000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB82B4D000
trusted library allocation
page read and write
1EB844C4000
trusted library allocation
page read and write
1EB7A16C000
trusted library allocation
page read and write
1EB7B826000
trusted library allocation
page read and write
D4BBA3E000
unkown
page readonly
1EB84AFB000
trusted library allocation
page read and write
23011572000
trusted library allocation
page read and write
1EB761F8000
trusted library allocation
page read and write
1EB84471000
trusted library allocation
page read and write
1EB78B82000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB812FD000
trusted library allocation
page read and write
1EB78F8E000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1263000
heap
page read and write
1EB748BB000
heap
page read and write
1EB74849000
heap
page read and write
1EB7B4FA000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
2365D758000
heap
page read and write
1EB7A170000
trusted library allocation
page read and write
1EB7B5FC000
trusted library allocation
page read and write
2365D72A000
heap
page read and write
1EB7A1F3000
trusted library allocation
page read and write
1EB7612B000
trusted library allocation
page read and write
1EB79327000
trusted library allocation
page read and write
1EB7A1EE000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1EB7485F000
heap
page read and write
1EB85C6E000
heap
page read and write
1EB84223000
trusted library allocation
page read and write
2365D660000
heap
page read and write
1EB85C69000
heap
page read and write
1EB829D1000
trusted library allocation
page read and write
1EB7A4A3000
trusted library allocation
page read and write
1EB7A0E6000
trusted library allocation
page read and write
1EB79A89000
trusted library allocation
page read and write
1EB7A098000
trusted library allocation
page read and write
1EB81127000
trusted library allocation
page read and write
1EB84222000
trusted library allocation
page read and write
1EB7ABF8000
trusted library allocation
page read and write
D4B81D8000
stack
page read and write
1DA20A11000
trusted library allocation
page read and write
1EB8123D000
trusted library allocation
page read and write
1EB7A19D000
trusted library allocation
page read and write
1EB75075000
trusted library allocation
page read and write
1EB85C09000
heap
page read and write
1EB750D2000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB748BB000
heap
page read and write
1EB790FC000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB829EA000
trusted library allocation
page read and write
21DEB6D2000
heap
page read and write
1EB7A17E000
trusted library allocation
page read and write
1EB84499000
trusted library allocation
page read and write
1EB7992E000
trusted library allocation
page read and write
1EB7A7D9000
trusted library allocation
page read and write
1EB814AE000
trusted library allocation
page read and write
1EB7A1EA000
trusted library allocation
page read and write
1EB7B381000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
2365D758000
heap
page read and write
1EB7B97A000
trusted library allocation
page read and write
1EB843A3000
trusted library allocation
page read and write
2365CF10000
heap
page read and write
1EB761F7000
trusted library allocation
page read and write
1EB84490000
trusted library allocation
page read and write
1DA20860000
heap
page read and write
1EB74847000
heap
page read and write
1EB7909C000
trusted library allocation
page read and write
1EB7BCF0000
trusted library allocation
page read and write
1EB81244000
trusted library allocation
page read and write
1EB78F5A000
trusted library allocation
page read and write
1EB75075000
trusted library allocation
page read and write
D4BAA3E000
unkown
page readonly
1EB812EA000
trusted library allocation
page read and write
1EB7485D000
heap
page read and write
1EB7485F000
heap
page read and write
1EB799A6000
trusted library allocation
page read and write
2365D65C000
heap
page read and write
1EB81050000
trusted library allocation
page read and write
1EB7903B000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB75FC9000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB84245000
trusted library allocation
page read and write
1EB814B3000
trusted library allocation
page read and write
1EB7A044000
trusted library allocation
page read and write
1EB84236000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
2365C620000
heap
page read and write
1EB74853000
heap
page read and write
2365D6E8000
heap
page read and write
1EB844C9000
trusted library allocation
page read and write
1EB78B7E000
trusted library allocation
page read and write
1EB7A254000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB78BF7000
trusted library allocation
page read and write
1EB7692C000
heap
page read and write
1EB748BB000
heap
page read and write
1EB843CB000
trusted library allocation
page read and write
1EB814D4000
trusted library allocation
page read and write
1EB810F1000
trusted library allocation
page read and write
1261000
heap
page read and write
1EB815F8000
trusted library allocation
page read and write
1EB7AEE5000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7484C000
heap
page read and write
1EB844E0000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB7A4C5000
trusted library allocation
page read and write
1EB7485D000
heap
page read and write
1EB7A0BC000
trusted library allocation
page read and write
1EB7907B000
trusted library allocation
page read and write
1EB7A272000
trusted library allocation
page read and write
1EB8119A000
trusted library allocation
page read and write
1EB82C37000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7A0F6000
trusted library allocation
page read and write
1EB7909A000
trusted library allocation
page read and write
1EB7A538000
trusted library allocation
page read and write
1EB7A084000
trusted library allocation
page read and write
1DA20BF4000
heap
page read and write
1EB837F7000
trusted library allocation
page read and write
1EB799FE000
trusted library allocation
page read and write
1EB7A0E8000
trusted library allocation
page read and write
23011710000
trusted library allocation
page read and write
1EB7BC91000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7C978000
trusted library allocation
page read and write
1EB7AEE0000
trusted library allocation
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB844A8000
trusted library allocation
page read and write
1EB7C9B0000
trusted library allocation
page read and write
1EB81455000
trusted library allocation
page read and write
1EB812F9000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7A0E8000
trusted library allocation
page read and write
23011739000
trusted library allocation
page read and write
1EB74845000
heap
page read and write
1EB81415000
trusted library allocation
page read and write
1EB82C50000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB78E34000
trusted library allocation
page read and write
1EB7A1B2000
trusted library allocation
page read and write
1EB7AEA9000
trusted library allocation
page read and write
2365C9F3000
trusted library allocation
page read and write
1EB7BC6D000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7C65E000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB7A163000
trusted library allocation
page read and write
23011703000
trusted library allocation
page read and write
23011180000
unclassified section
page read and write
1EB7482E000
heap
page read and write
1EB75FC2000
trusted library allocation
page read and write
1EB761C9000
trusted library allocation
page read and write
1EB844ED000
trusted library allocation
page read and write
1EB84779000
trusted library allocation
page read and write
1EB74839000
heap
page read and write
1EB74896000
heap
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB813C8000
trusted library allocation
page read and write
1EB843E3000
trusted library allocation
page read and write
1EB79061000
trusted library allocation
page read and write
1EB761EF000
trusted library allocation
page read and write
1EB813E6000
trusted library allocation
page read and write
1EB81272000
trusted library allocation
page read and write
1218000
heap
page read and write
1EB7A15E000
trusted library allocation
page read and write
1EB842D6000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB8103C000
trusted library allocation
page read and write
1EB80FBD000
trusted library allocation
page read and write
1EB7A5E6000
trusted library allocation
page read and write
23011579000
trusted library allocation
page read and write
1EB81441000
trusted library allocation
page read and write
1EB7A1EA000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB7A1EA000
trusted library allocation
page read and write
1EB84EFE000
trusted library allocation
page read and write
1EB7A437000
trusted library allocation
page read and write
1EB80FCE000
trusted library allocation
page read and write
1EB7903D000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB748A8000
heap
page read and write
1EB7C6FB000
trusted library allocation
page read and write
1EB7907B000
trusted library allocation
page read and write
1EB7669D000
trusted library allocation
page read and write
1EB79A66000
trusted library allocation
page read and write
1EB7B9B5000
trusted library allocation
page read and write
1EB748AD000
heap
page read and write
1EB748A6000
heap
page read and write
1EB7C6EE000
trusted library allocation
page read and write
1EB79A92000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7BCEE000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB7AA58000
trusted library allocation
page read and write
1EB813E4000
trusted library allocation
page read and write
1EB7A6F1000
trusted library allocation
page read and write
1EB79959000
trusted library allocation
page read and write
1EB7A1BF000
trusted library allocation
page read and write
1EB7A0C3000
trusted library allocation
page read and write
1EB7A2F0000
trusted library allocation
page read and write
1EB7C921000
trusted library allocation
page read and write
1EB790BE000
trusted library allocation
page read and write
1EB79990000
trusted library allocation
page read and write
1EB8147E000
trusted library allocation
page read and write
1247000
heap
page read and write
1EB74851000
heap
page read and write
1EB748AE000
heap
page read and write
1EB74842000
heap
page read and write
1EB748A6000
heap
page read and write
1EB84292000
trusted library allocation
page read and write
1EB78F48000
trusted library allocation
page read and write
1EB8592E000
trusted library allocation
page read and write
1EB844AC000
trusted library allocation
page read and write
1EB82C01000
trusted library allocation
page read and write
1EB84765000
trusted library allocation
page read and write
1EB7AB81000
trusted library allocation
page read and write
1EB8363D000
trusted library allocation
page read and write
1EB74862000
heap
page read and write
1EB82CAC000
trusted library allocation
page read and write
1EB84DAF000
trusted library allocation
page read and write
1EB7A173000
trusted library allocation
page read and write
1EB7A606000
trusted library allocation
page read and write
1EB7A1DB000
trusted library allocation
page read and write
2365C6B0000
trusted library allocation
page read and write
1EB748A5000
heap
page read and write
1EB74817000
heap
page read and write
1EB7482E000
heap
page read and write
11B4000
heap
page read and write
1EB7C6E6000
trusted library allocation
page read and write
1EB8427E000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7BA17000
trusted library allocation
page read and write
1EB82968000
trusted library allocation
page read and write
1EB842A3000
trusted library allocation
page read and write
1EB76150000
trusted library allocation
page read and write
1EB761E4000
trusted library allocation
page read and write
1EB7C8E9000
trusted library allocation
page read and write
1EB85841000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB74856000
heap
page read and write
1EB7B4CF000
trusted library allocation
page read and write
1EB84FF1000
trusted library allocation
page read and write
1EB7C974000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB78E08000
trusted library allocation
page read and write
1EB749CA000
trusted library allocation
page read and write
1EB792BC000
trusted library allocation
page read and write
1EB7933A000
trusted library allocation
page read and write
C129DFF000
stack
page read and write
1EB8118A000
trusted library allocation
page read and write
1EB8424C000
trusted library allocation
page read and write
1EB79994000
trusted library allocation
page read and write
1EB78B4E000
trusted library allocation
page read and write
2365D767000
heap
page read and write
21DEB6C2000
heap
page read and write
1EB84DDB000
trusted library allocation
page read and write
1EB748BD000
heap
page read and write
1EB7A6E6000
trusted library allocation
page read and write
11B4000
heap
page read and write
1EB74858000
heap
page read and write
1EB7B9B3000
trusted library allocation
page read and write
1EB762F0000
trusted library allocation
page read and write
1EB7CB86000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB813EF000
trusted library allocation
page read and write
1EB76938000
heap
page read and write
2365D67D000
heap
page read and write
1EB7484C000
heap
page read and write
1F64D9C0000
heap
page read and write
1EB7A0F6000
trusted library allocation
page read and write
1EB7B9B1000
trusted library allocation
page read and write
1EB7A08F000
trusted library allocation
page read and write
1EB7A0F4000
trusted library allocation
page read and write
1EB7B9F9000
trusted library allocation
page read and write
1EB7A4AA000
trusted library allocation
page read and write
1EB7485D000
heap
page read and write
1EB7A596000
trusted library allocation
page read and write
1EB79074000
trusted library allocation
page read and write
1EB7A479000
trusted library allocation
page read and write
1EB7A5DE000
trusted library allocation
page read and write
1EB7499E000
trusted library allocation
page read and write
1EB799E6000
trusted library allocation
page read and write
1EB7610D000
trusted library allocation
page read and write
1EB84413000
trusted library allocation
page read and write
1EB78F78000
trusted library allocation
page read and write
2365C92F000
trusted library allocation
page read and write
1EB7B600000
trusted library allocation
page read and write
1DA20690000
heap
page read and write
1EB748B3000
heap
page read and write
1EB842E6000
trusted library allocation
page read and write
23011581000
trusted library allocation
page read and write
1F64DB07000
trusted library allocation
page read and write
1DA20A5D000
trusted library allocation
page read and write
1EB7A167000
trusted library allocation
page read and write
1EB79975000
trusted library allocation
page read and write
1EB847F2000
trusted library allocation
page read and write
1EB748AD000
heap
page read and write
1DA20A5F000
trusted library allocation
page read and write
1EB75075000
trusted library allocation
page read and write
1EB79949000
trusted library allocation
page read and write
1EB842F2000
trusted library allocation
page read and write
1EB7483D000
heap
page read and write
2365C6E0000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1244000
heap
page read and write
1EB84791000
trusted library allocation
page read and write
1EB812F1000
trusted library allocation
page read and write
1EB75013000
trusted library allocation
page read and write
1EB84000000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1DA20664000
remote allocation
page execute read
1EB74842000
heap
page read and write
1EB7CB62000
trusted library allocation
page read and write
1EB82B93000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
2365C981000
trusted library allocation
page read and write
72826FE000
unkown
page readonly
1EB7A6FB000
trusted library allocation
page read and write
1EB79935000
trusted library allocation
page read and write
1EB748A8000
heap
page read and write
1EB815FA000
trusted library allocation
page read and write
1EB82B22000
trusted library allocation
page read and write
1EB842A7000
trusted library allocation
page read and write
1EB8444B000
trusted library allocation
page read and write
1EB7A0AF000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
21DED260000
heap
page read and write
1EB75FEE000
trusted library allocation
page read and write
1EB7A2D2000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7483C000
heap
page read and write
1EB7B5BA000
trusted library allocation
page read and write
1EB7A4B6000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB7A592000
trusted library allocation
page read and write
1EB7A690000
trusted library allocation
page read and write
1EB7B5AA000
trusted library allocation
page read and write
1EB7AA6C000
trusted library allocation
page read and write
1EB7A6E7000
trusted library allocation
page read and write
1EB84249000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB748CE000
heap
page read and write
23011510000
trusted library allocation
page read and write
1EB814CC000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB81480000
trusted library allocation
page read and write
1EB7A1AC000
trusted library allocation
page read and write
1F64D7C0000
heap
page read and write
1EB7BBFB000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7A6DF000
trusted library allocation
page read and write
1EB847FC000
trusted library allocation
page read and write
1EB8106A000
trusted library allocation
page read and write
1EB748E4000
heap
page read and write
23011173000
heap
page read and write
1EB84AB2000
trusted library allocation
page read and write
1EB7AEA3000
trusted library allocation
page read and write
125B000
heap
page read and write
1EB7B8E5000
trusted library allocation
page read and write
1EB7A0F2000
trusted library allocation
page read and write
1EB7B2B2000
trusted library allocation
page read and write
1EB842C9000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7482D000
heap
page read and write
1EB79386000
trusted library allocation
page read and write
1EB84241000
trusted library allocation
page read and write
1EB7A1BD000
trusted library allocation
page read and write
1EB78BF7000
trusted library allocation
page read and write
1EB7BA1E000
trusted library allocation
page read and write
1EB7A0E6000
trusted library allocation
page read and write
1EB761FA000
trusted library allocation
page read and write
1EB78B34000
trusted library allocation
page read and write
1EB750B5000
trusted library allocation
page read and write
1EB829DD000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB74847000
heap
page read and write
1EB7A1AA000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB84A7A000
trusted library allocation
page read and write
1EB7BCA0000
trusted library allocation
page read and write
D9A47FB000
stack
page read and write
1EB78EB3000
trusted library allocation
page read and write
1EB7CB8D000
trusted library allocation
page read and write
1EB85C69000
heap
page read and write
1EB7A6F1000
trusted library allocation
page read and write
1EB79954000
trusted library allocation
page read and write
1EB79983000
trusted library allocation
page read and write
1EB7ABA8000
trusted library allocation
page read and write
1EB836FC000
trusted library allocation
page read and write
1DA20A0C000
trusted library allocation
page read and write
1EB85C6E000
heap
page read and write
1EB74853000
heap
page read and write
1EB7507D000
trusted library allocation
page read and write
1EB81160000
trusted library allocation
page read and write
1EB7A1D8000
trusted library allocation
page read and write
1EB7488D000
heap
page read and write
1EB74849000
heap
page read and write
1EB7C9EA000
trusted library allocation
page read and write
1EB7A1EA000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB74841000
heap
page read and write
1EB78E71000
trusted library allocation
page read and write
9F0000
heap
page read and write
1EB7A0B7000
trusted library allocation
page read and write
6C4000
unkown
page readonly
1EB811DB000
trusted library allocation
page read and write
230110F0000
heap
page read and write
21DED26D000
heap
page read and write
1EB74834000
heap
page read and write
1EB762DD000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB74826000
heap
page read and write
23011700000
trusted library allocation
page read and write
1EB814D0000
trusted library allocation
page read and write
1EB7AB60000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB7AA80000
trusted library allocation
page read and write
1DA20A70000
trusted library allocation
page read and write
1EB7A4CF000
trusted library allocation
page read and write
1EB84D3F000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB84486000
trusted library allocation
page read and write
1EB74865000
heap
page read and write
1EB74853000
heap
page read and write
1EB7908E000
trusted library allocation
page read and write
1EB84431000
trusted library allocation
page read and write
21DED269000
heap
page read and write
1EB82BDB000
trusted library allocation
page read and write
1EB74843000
heap
page read and write
1EB7692D000
heap
page read and write
1EB7B9AD000
trusted library allocation
page read and write
1EB842E9000
trusted library allocation
page read and write
1EB7A533000
trusted library allocation
page read and write
1EB7A7D0000
trusted library allocation
page read and write
1EB82B87000
trusted library allocation
page read and write
1EB812FD000
trusted library allocation
page read and write
CC121FE000
stack
page read and write
1EB7483E000
heap
page read and write
1EB7A4F9000
trusted library allocation
page read and write
2365D6E8000
heap
page read and write
1EB84D09000
trusted library allocation
page read and write
1267000
heap
page read and write
1EB78BC0000
trusted library allocation
page read and write
1EB8130E000
trusted library allocation
page read and write
1EB79373000
trusted library allocation
page read and write
1EB7AA84000
trusted library allocation
page read and write
1EB842AD000
trusted library allocation
page read and write
2365CFE0000
heap
page read and write
1EB7A697000
trusted library allocation
page read and write
1EB85C09000
heap
page read and write
1EB74814000
heap
page read and write
1EB74845000
heap
page read and write
1EB7629E000
trusted library allocation
page read and write
1DA20650000
remote allocation
page read and write
1EB7A6B4000
trusted library allocation
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB7AA50000
trusted library allocation
page read and write
1EB813DA000
trusted library allocation
page read and write
1EB7908B000
trusted library allocation
page read and write
1EB81459000
trusted library allocation
page read and write
1EB7A1EA000
trusted library allocation
page read and write
1EB7AA89000
trusted library allocation
page read and write
1EB84474000
trusted library allocation
page read and write
1EB7A0B7000
trusted library allocation
page read and write
1EB7B59E000
trusted library allocation
page read and write
1EB81190000
trusted library allocation
page read and write
1EB84451000
trusted library allocation
page read and write
1EB7A472000
trusted library allocation
page read and write
1EB7938D000
trusted library allocation
page read and write
2365D72A000
heap
page read and write
1EB7485F000
heap
page read and write
1EB7C6DE000
trusted library allocation
page read and write
1EB761F8000
trusted library allocation
page read and write
1EB7A7E3000
trusted library allocation
page read and write
2301152E000
trusted library allocation
page read and write
1EB7A17E000
trusted library allocation
page read and write
1EB74857000
heap
page read and write
1EB7BCD2000
trusted library allocation
page read and write
1EB84EF4000
trusted library allocation
page read and write
1EB844D5000
trusted library allocation
page read and write
1EB7A0AB000
trusted library allocation
page read and write
1EB7BAA3000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EB74859000
heap
page read and write
1EB7485F000
heap
page read and write
1EB74849000
heap
page read and write
1EB78BE7000
trusted library allocation
page read and write
1EB748A6000
heap
page read and write
1EB811B4000
trusted library allocation
page read and write
1EB7B5A9000
trusted library allocation
page read and write
1EB7BC3E000
trusted library allocation
page read and write
1EB7AE9B000
trusted library allocation
page read and write
1EB84E95000
trusted library allocation
page read and write
1EB811C3000
trusted library allocation
page read and write
1EB81096000
trusted library allocation
page read and write
1EB843F5000
trusted library allocation
page read and write
1EB748A5000
heap
page read and write
1EB7C836000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7A6FB000
trusted library allocation
page read and write
1EB7A1C6000
trusted library allocation
page read and write
1EB7A139000
trusted library allocation
page read and write
1EB82BD3000
trusted library allocation
page read and write
1EB843FD000
trusted library allocation
page read and write
1EB7B9AD000
trusted library allocation
page read and write
1EB82A0F000
trusted library allocation
page read and write
1EB85C69000
heap
page read and write
1EB7A6DD000
trusted library allocation
page read and write
1EB7A0B0000
trusted library allocation
page read and write
1EB7BC21000
trusted library allocation
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB7A6E1000
trusted library allocation
page read and write
1EB7A5FA000
trusted library allocation
page read and write
1EB8447F000
trusted library allocation
page read and write
1EB7A145000
trusted library allocation
page read and write
1EB750B5000
trusted library allocation
page read and write
1EB7A6E6000
trusted library allocation
page read and write
1EB84E66000
trusted library allocation
page read and write
D9A727E000
stack
page read and write
1EB748AE000
heap
page read and write
1EB790CA000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB74849000
heap
page read and write
1EB829C7000
trusted library allocation
page read and write
1EB7A1EA000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB74858000
heap
page read and write
1EB79473000
trusted library allocation
page read and write
1EB811E5000
trusted library allocation
page read and write
1EB81099000
trusted library allocation
page read and write
1EB842E9000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB844ED000
trusted library allocation
page read and write
1EB7A143000
trusted library allocation
page read and write
1EB793C5000
trusted library allocation
page read and write
23011500000
trusted library allocation
page read and write
1EB79966000
trusted library allocation
page read and write
1EB814BC000
trusted library allocation
page read and write
1EB8424F000
trusted library allocation
page read and write
2365C948000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1DA20D00000
trusted library allocation
page read and write
1EB7907A000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7B4A8000
trusted library allocation
page read and write
1EB7A2EE000
trusted library allocation
page read and write
1DA20AB7000
trusted library allocation
page read and write
1EB74865000
heap
page read and write
1EB84DB9000
trusted library allocation
page read and write
1EB78E7C000
trusted library allocation
page read and write
1EB74863000
heap
page read and write
D4BA23E000
stack
page read and write
1EB799BB000
trusted library allocation
page read and write
1EB74841000
heap
page read and write
2365D6E9000
heap
page read and write
1EB81269000
trusted library allocation
page read and write
1EB766F4000
trusted library allocation
page read and write
1EB844B9000
trusted library allocation
page read and write
1EB74837000
heap
page read and write
126E000
heap
page read and write
8AA000
stack
page read and write
1EB7485B000
heap
page read and write
1EB7A1B7000
trusted library allocation
page read and write
1EB790C4000
trusted library allocation
page read and write
1EB843B9000
trusted library allocation
page read and write
1EB749B3000
trusted library allocation
page read and write
1EB790BE000
trusted library allocation
page read and write
1EB81311000
trusted library allocation
page read and write
3C9E26B1000
trusted library allocation
page execute read
1EB858AC000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB79932000
trusted library allocation
page read and write
1EB84413000
trusted library allocation
page read and write
1EB84D2D000
trusted library allocation
page read and write
1EB79998000
trusted library allocation
page read and write
1EB7AB65000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB7AEFE000
trusted library allocation
page read and write
1EB793F1000
trusted library allocation
page read and write
1EB84341000
trusted library allocation
page read and write
1EB85906000
trusted library allocation
page read and write
1EB7A4A9000
trusted library allocation
page read and write
1EB8446C000
trusted library allocation
page read and write
1EB7545D000
trusted library allocation
page read and write
1EB85438000
trusted library allocation
page read and write
1EB7A0E0000
trusted library allocation
page read and write
1EB829EA000
trusted library allocation
page read and write
1EB84449000
trusted library allocation
page read and write
1EB7B42B000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB82B2F000
trusted library allocation
page read and write
1EB7B5E2000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB74888000
heap
page read and write
1EB748BB000
heap
page read and write
1EB78F3C000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EB766C8000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB78E78000
trusted library allocation
page read and write
1EB81057000
trusted library allocation
page read and write
1EB7998E000
trusted library allocation
page read and write
1EB844B9000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
1EB85C6E000
heap
page read and write
1EB7A1AF000
trusted library allocation
page read and write
1EB7488D000
heap
page read and write
1EB7A235000
trusted library allocation
page read and write
1EB847FA000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB7A5AD000
trusted library allocation
page read and write
1EB7A176000
trusted library allocation
page read and write
1EB8577F000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EB7485C000
heap
page read and write
1EB847D5000
trusted library allocation
page read and write
1EB79765000
trusted library allocation
page read and write
1EB81077000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7AED3000
trusted library allocation
page read and write
1EB78B62000
trusted library allocation
page read and write
1EB7B8D1000
trusted library allocation
page read and write
1EB7AB70000
trusted library allocation
page read and write
2365D64D000
heap
page read and write
1EB84AE2000
trusted library allocation
page read and write
1EB76938000
heap
page read and write
1EB74841000
heap
page read and write
2365D73B000
heap
page read and write
1EB74858000
heap
page read and write
1EB7A089000
trusted library allocation
page read and write
1EB844D5000
trusted library allocation
page read and write
1EB7A6DF000
trusted library allocation
page read and write
1EB7B434000
trusted library allocation
page read and write
2365D6E1000
heap
page read and write
1EB812F1000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB842F8000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
1EB7B9B9000
trusted library allocation
page read and write
1EB7B9B3000
trusted library allocation
page read and write
1EB8139D000
trusted library allocation
page read and write
1EB78B76000
trusted library allocation
page read and write
1EB7C693000
trusted library allocation
page read and write
1EB7A0F6000
trusted library allocation
page read and write
1EB7A1C0000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB76934000
heap
page read and write
1EB7A2F2000
trusted library allocation
page read and write
1EB82969000
trusted library allocation
page read and write
1EB7B9EA000
trusted library allocation
page read and write
1EB84449000
trusted library allocation
page read and write
1EB761B4000
trusted library allocation
page read and write
1EB7A1BF000
trusted library allocation
page read and write
1EB7AA85000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1170000
heap
page read and write
2365C9C4000
trusted library allocation
page read and write
1EB7907B000
trusted library allocation
page read and write
1EB7A524000
trusted library allocation
page read and write
1EB7A188000
trusted library allocation
page read and write
1EB814B6000
trusted library allocation
page read and write
1EB84486000
trusted library allocation
page read and write
1EB7A145000
trusted library allocation
page read and write
1EB790BE000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB810D4000
trusted library allocation
page read and write
1EB799E6000
trusted library allocation
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB82F02000
trusted library allocation
page read and write
1EB74885000
heap
page read and write
1EB793D7000
trusted library allocation
page read and write
1EB7A4C0000
trusted library allocation
page read and write
1EB814CA000
trusted library allocation
page read and write
1EB8447F000
trusted library allocation
page read and write
1EB844C9000
trusted library allocation
page read and write
1EB78E6D000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB74834000
heap
page read and write
1EB74826000
heap
page read and write
1EB7A900000
trusted library allocation
page read and write
1EB7B2DA000
trusted library allocation
page read and write
1EB7B92A000
trusted library allocation
page read and write
1EB7A190000
trusted library allocation
page read and write
1EB761E8000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB80FDD000
trusted library allocation
page read and write
1EB797F9000
trusted library allocation
page read and write
1EB79352000
trusted library allocation
page read and write
2365C986000
trusted library allocation
page read and write
1EB79932000
trusted library allocation
page read and write
1EB7ABF8000
trusted library allocation
page read and write
1DA20D07000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB84DFC000
trusted library allocation
page read and write
1EB7A69B000
trusted library allocation
page read and write
1EB7B4C7000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB790BB000
trusted library allocation
page read and write
1EB85886000
trusted library allocation
page read and write
1EB811B3000
trusted library allocation
page read and write
1EB7692D000
heap
page read and write
1EB844E5000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7A1B7000
trusted library allocation
page read and write
1EB7B5E9000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB82B4C000
trusted library allocation
page read and write
1EB7B4CB000
trusted library allocation
page read and write
2365D767000
heap
page read and write
1EB799BE000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7A044000
trusted library allocation
page read and write
1EB844ED000
trusted library allocation
page read and write
1EB750B0000
trusted library allocation
page read and write
1EB842C7000
trusted library allocation
page read and write
1EB76942000
heap
page read and write
1EB82B3A000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7A084000
trusted library allocation
page read and write
1EB843DF000
trusted library allocation
page read and write
1EB7A0E0000
trusted library allocation
page read and write
1EB7A49B000
trusted library allocation
page read and write
1EB79953000
trusted library allocation
page read and write
1EB84E40000
trusted library allocation
page read and write
1EB7A0C2000
trusted library allocation
page read and write
1EB79448000
trusted library allocation
page read and write
1EB844E0000
trusted library allocation
page read and write
1EB7A42F000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB790AC000
trusted library allocation
page read and write
1EB82B6D000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
230115B7000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB7B434000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
2365C480000
unclassified section
page readonly
1EB7482D000
heap
page read and write
1EB84D8A000
trusted library allocation
page read and write
1EB79097000
trusted library allocation
page read and write
2365D72A000
heap
page read and write
1EB761E8000
trusted library allocation
page read and write
2365D721000
heap
page read and write
1EB814A4000
trusted library allocation
page read and write
1EB84397000
trusted library allocation
page read and write
1EB76682000
trusted library allocation
page read and write
1EB78E7E000
trusted library allocation
page read and write
1EB7BA9B000
trusted library allocation
page read and write
1EB84E63000
trusted library allocation
page read and write
1EB7A026000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB74842000
heap
page read and write
1EB814FD000
trusted library allocation
page read and write
1EB81228000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB7A6E7000
trusted library allocation
page read and write
1EB81494000
trusted library allocation
page read and write
1EB761E8000
trusted library allocation
page read and write
1EB82B48000
trusted library allocation
page read and write
1EB814DC000
trusted library allocation
page read and write
1EB81032000
trusted library allocation
page read and write
1EB78F3B000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7ABD0000
trusted library allocation
page read and write
11B4000
heap
page read and write
1EB76934000
heap
page read and write
1EB81257000
trusted library allocation
page read and write
1EB750FA000
trusted library allocation
page read and write
1EB84A59000
trusted library allocation
page read and write
1EB7A1FC000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB78E94000
trusted library allocation
page read and write
107E000
stack
page read and write
230115CB000
trusted library allocation
page read and write
1EB813F8000
trusted library allocation
page read and write
1EB78BE9000
trusted library allocation
page read and write
1EB7C819000
trusted library allocation
page read and write
124E000
heap
page read and write
1EB79967000
trusted library allocation
page read and write
1EB85C6C000
heap
page read and write
1EB748BB000
heap
page read and write
1EB74853000
heap
page read and write
1EB81482000
trusted library allocation
page read and write
1EB7B939000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB75F22000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB7483E000
heap
page read and write
1EB7AA92000
trusted library allocation
page read and write
1EB7B4C7000
trusted library allocation
page read and write
1EB811BF000
trusted library allocation
page read and write
1EB74863000
heap
page read and write
1EB76934000
heap
page read and write
1EB748AE000
heap
page read and write
1EB812FD000
trusted library allocation
page read and write
1EB7A531000
trusted library allocation
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB7907F000
trusted library allocation
page read and write
1EB7A075000
trusted library allocation
page read and write
1EB79357000
trusted library allocation
page read and write
1EB748D5000
heap
page read and write
1EB74838000
heap
page read and write
1EB749DF000
trusted library allocation
page read and write
1EB85CDF000
heap
page read and write
1EB74836000
heap
page read and write
1EB762F8000
trusted library allocation
page read and write
1DA20A82000
trusted library allocation
page read and write
1EB7698C000
heap
page read and write
1EB847DF000
trusted library allocation
page read and write
1DA206D0000
heap
page read and write
1EB748BD000
heap
page read and write
1E0E000
stack
page read and write
1EB7A1A8000
trusted library allocation
page read and write
1EB7A182000
trusted library allocation
page read and write
1EB7A4C5000
trusted library allocation
page read and write
D4B91FE000
stack
page read and write
1EB79767000
trusted library allocation
page read and write
1EB79338000
trusted library allocation
page read and write
1EB844D8000
trusted library allocation
page read and write
1EB7A7E2000
trusted library allocation
page read and write
1EB748D3000
heap
page read and write
1EB75100000
trusted library allocation
page read and write
1EB847AA000
trusted library allocation
page read and write
1EB7A173000
trusted library allocation
page read and write
1EB7B378000
trusted library allocation
page read and write
1EB7C9C8000
trusted library allocation
page read and write
1EB844B3000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1264000
heap
page read and write
1EB7483C000
heap
page read and write
1EB7A199000
trusted library allocation
page read and write
1EB81488000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB74858000
heap
page read and write
1EB793F1000
trusted library allocation
page read and write
1EB7AFA1000
trusted library allocation
page read and write
2365D758000
heap
page read and write
1EB842DA000
trusted library allocation
page read and write
1EB748A9000
heap
page read and write
1EB74834000
heap
page read and write
1EB847A7000
trusted library allocation
page read and write
1EB793B1000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7A52B000
trusted library allocation
page read and write
1EB7A302000
trusted library allocation
page read and write
1EB7A6F1000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB7A0F6000
trusted library allocation
page read and write
1EB84D24000
trusted library allocation
page read and write
1EB7A4CF000
trusted library allocation
page read and write
1EB7906C000
trusted library allocation
page read and write
1EB7ABC1000
trusted library allocation
page read and write
1EB748A9000
heap
page read and write
1EB78E8A000
trusted library allocation
page read and write
1EB84775000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7485C000
heap
page read and write
1EB7A0C1000
trusted library allocation
page read and write
1EB78F7A000
trusted library allocation
page read and write
CC111FF000
stack
page read and write
1EB8107A000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7A6FB000
trusted library allocation
page read and write
1EB74841000
heap
page read and write
1EB81323000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB842E3000
trusted library allocation
page read and write
1EB761B4000
trusted library allocation
page read and write
1EB79057000
trusted library allocation
page read and write
1267000
heap
page read and write
2365D6F0000
heap
page read and write
1EB7AEE0000
trusted library allocation
page read and write
CC131FF000
stack
page read and write
1EB7A0B7000
trusted library allocation
page read and write
1EB7A127000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
2365C9BB000
trusted library allocation
page read and write
1EB812E2000
trusted library allocation
page read and write
1EB75FAA000
trusted library allocation
page read and write
1EB8586D000
trusted library allocation
page read and write
1EB829E2000
trusted library allocation
page read and write
1EB84DED000
trusted library allocation
page read and write
1EB7C65A000
trusted library allocation
page read and write
1EB790D8000
trusted library allocation
page read and write
1EB7B5B0000
trusted library allocation
page read and write
1EB7A492000
trusted library allocation
page read and write
1EB7A7E7000
trusted library allocation
page read and write
1EB750CF000
trusted library allocation
page read and write
1EB78BE3000
trusted library allocation
page read and write
1EB74856000
heap
page read and write
1EB7488B000
heap
page read and write
1EB7A2FE000
trusted library allocation
page read and write
1EB76339000
trusted library allocation
page read and write
1EB7A18B000
trusted library allocation
page read and write
1EB7A52E000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB74842000
heap
page read and write
1EB8544E000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7A0F6000
trusted library allocation
page read and write
1EB7501E000
trusted library allocation
page read and write
1EB84373000
trusted library allocation
page read and write
3730000
heap
page read and write
1EB84E52000
trusted library allocation
page read and write
1EB74835000
heap
page read and write
1EB85C6E000
heap
page read and write
1EB80F75000
trusted library allocation
page read and write
1EB7B9AB000
trusted library allocation
page read and write
1EB843B9000
trusted library allocation
page read and write
1EB761E4000
trusted library allocation
page read and write
1EB78E9C000
trusted library allocation
page read and write
1EB74861000
heap
page read and write
1EB7A307000
trusted library allocation
page read and write
1EB811BD000
trusted library allocation
page read and write
1EB84DED000
trusted library allocation
page read and write
1EB7A1B7000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB7B9B5000
trusted library allocation
page read and write
1EB80FAF000
trusted library allocation
page read and write
72826BD000
stack
page read and write
1EB84489000
trusted library allocation
page read and write
1EB749BF000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7ABF8000
trusted library allocation
page read and write
1EB7B3F1000
trusted library allocation
page read and write
1EB811BD000
trusted library allocation
page read and write
1EB7A199000
trusted library allocation
page read and write
1EB84EF2000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB7B28B000
trusted library allocation
page read and write
1EB799FA000
trusted library allocation
page read and write
1EB8448A000
trusted library allocation
page read and write
2365D609000
heap
page read and write
23011B40000
heap
page read and write
1EB844C9000
trusted library allocation
page read and write
1EB7A269000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7A188000
trusted library allocation
page read and write
1EB7629E000
trusted library allocation
page read and write
1EB7A026000
trusted library allocation
page read and write
1EB84428000
trusted library allocation
page read and write
1EB7BA80000
trusted library allocation
page read and write
1EB8448E000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EB7B3F7000
trusted library allocation
page read and write
1EB829E8000
trusted library allocation
page read and write
1EB7692D000
heap
page read and write
1EB8580C000
trusted library allocation
page read and write
1EB7485C000
heap
page read and write
1EB7909A000
trusted library allocation
page read and write
1EB7485C000
heap
page read and write
1EB7483E000
heap
page read and write
1EB8427E000
trusted library allocation
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB84D11000
trusted library allocation
page read and write
1EB7A5FB000
trusted library allocation
page read and write
1EB7ABFC000
trusted library allocation
page read and write
1EB793D7000
trusted library allocation
page read and write
1EB815EA000
trusted library allocation
page read and write
1EB813C0000
trusted library allocation
page read and write
1EB85C69000
heap
page read and write
23011737000
trusted library allocation
page read and write
1EB7507E000
trusted library allocation
page read and write
1EB7B3CC000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB74834000
heap
page read and write
21DEB6A0000
heap
page read and write
1EB844D8000
trusted library allocation
page read and write
23011230000
heap
page read and write
1EB7A1F3000
trusted library allocation
page read and write
1EB76663000
trusted library allocation
page read and write
1EB7CB67000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB76106000
trusted library allocation
page read and write
1EB81383000
trusted library allocation
page read and write
1EB84ABC000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB7485C000
heap
page read and write
1EB80FDD000
trusted library allocation
page read and write
D9A7ABE000
stack
page read and write
1DA20E00000
trusted library allocation
page read and write
1EB7A743000
trusted library allocation
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB85C69000
heap
page read and write
1EB7946A000
trusted library allocation
page read and write
1EB78F04000
trusted library allocation
page read and write
1EB84EC3000
trusted library allocation
page read and write
1EB74830000
heap
page read and write
23011561000
trusted library allocation
page read and write
1EB78BB5000
trusted library allocation
page read and write
1EB799E3000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB74858000
heap
page read and write
1EB844DA000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7C9A8000
trusted library allocation
page read and write
1EB81476000
trusted library allocation
page read and write
1EB82B0B000
trusted library allocation
page read and write
1EB75066000
trusted library allocation
page read and write
1EB7A4BB000
trusted library allocation
page read and write
1EB84720000
trusted library allocation
page read and write
1EB84AAF000
trusted library allocation
page read and write
1EB80FE7000
trusted library allocation
page read and write
1EB7A1B7000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
1EB74F76000
trusted library allocation
page read and write
1EB811FD000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB810BD000
trusted library allocation
page read and write
1EB7A4C3000
trusted library allocation
page read and write
FDB000
stack
page read and write
1EB7A6AD000
trusted library allocation
page read and write
1EB8449A000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB7485C000
heap
page read and write
1EB7909A000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB7483E000
heap
page read and write
1EB7AACF000
trusted library allocation
page read and write
1EB84491000
trusted library allocation
page read and write
1EB7994F000
trusted library allocation
page read and write
1EB84ABC000
trusted library allocation
page read and write
1EB7B5E0000
trusted library allocation
page read and write
1EB7995B000
trusted library allocation
page read and write
1EB81405000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
FBE000
stack
page read and write
FCE000
stack
page read and write
1EB79949000
trusted library allocation
page read and write
1EB750FE000
trusted library allocation
page read and write
1EB81288000
trusted library allocation
page read and write
2365D6E6000
heap
page read and write
1EB761F8000
trusted library allocation
page read and write
1EB814B8000
trusted library allocation
page read and write
1EB811B6000
trusted library allocation
page read and write
1EB7A176000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB74834000
heap
page read and write
1EB814CC000
trusted library allocation
page read and write
1EB7A182000
trusted library allocation
page read and write
1EB81000000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB814AE000
trusted library allocation
page read and write
1EB7485D000
heap
page read and write
1EB7A188000
trusted library allocation
page read and write
1EB84489000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB7B82A000
trusted library allocation
page read and write
1EB7A143000
trusted library allocation
page read and write
1EB79A80000
trusted library allocation
page read and write
1EB7903B000
trusted library allocation
page read and write
1EB75FA7000
trusted library allocation
page read and write
1EB7690A000
heap
page read and write
1EB842D6000
trusted library allocation
page read and write
1EB81486000
trusted library allocation
page read and write
2365C670000
trusted library section
page readonly
1EB7BACF000
trusted library allocation
page read and write
1EB7AB69000
trusted library allocation
page read and write
1EB7483D000
heap
page read and write
230111B0000
unclassified section
page readonly
1EB82A18000
trusted library allocation
page read and write
1EB7A0FD000
trusted library allocation
page read and write
1EB81185000
trusted library allocation
page read and write
1EB7A28B000
trusted library allocation
page read and write
1EB847D5000
trusted library allocation
page read and write
1EB813D3000
trusted library allocation
page read and write
1EB74850000
heap
page read and write
1EB844D5000
trusted library allocation
page read and write
123F000
heap
page read and write
1EB7A4E0000
trusted library allocation
page read and write
1EB844E5000
trusted library allocation
page read and write
1EB7AAF5000
trusted library allocation
page read and write
1EB799FA000
trusted library allocation
page read and write
1EB7A660000
trusted library allocation
page read and write
1EB7AABC000
trusted library allocation
page read and write
1EB837FC000
trusted library allocation
page read and write
1EB793E8000
trusted library allocation
page read and write
1EB813B0000
trusted library allocation
page read and write
1EB74821000
heap
page read and write
1EB7C93A000
trusted library allocation
page read and write
1EB7B2CB000
trusted library allocation
page read and write
2365C62A000
heap
page read and write
1EB79088000
trusted library allocation
page read and write
1EB7B8D6000
trusted library allocation
page read and write
1EB748A8000
heap
page read and write
2365D65C000
heap
page read and write
1EB7C92F000
trusted library allocation
page read and write
1EB766A9000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB84491000
trusted library allocation
page read and write
1EB7936B000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB8422C000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1244000
heap
page read and write
11B4000
heap
page read and write
1EB813E4000
trusted library allocation
page read and write
1EB84D6E000
trusted library allocation
page read and write
1EB7488E000
heap
page read and write
1264000
heap
page read and write
1EB748BB000
heap
page read and write
1EB74871000
heap
page read and write
1EB748BB000
heap
page read and write
1EB829C7000
trusted library allocation
page read and write
1EB842F2000
trusted library allocation
page read and write
2365D660000
heap
page read and write
1EB7BCF6000
trusted library allocation
page read and write
3A81000
heap
page read and write
1EB80FE3000
trusted library allocation
page read and write
7283FFE000
stack
page read and write
1EB7B282000
trusted library allocation
page read and write
1EB7B2FC000
trusted library allocation
page read and write
1EB7484B000
heap
page read and write
1EB7A650000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB750B9000
trusted library allocation
page read and write
1EB7629C000
trusted library allocation
page read and write
1EB790AC000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
2365D52D000
trusted library allocation
page read and write
1EB78BF7000
trusted library allocation
page read and write
1EB8546D000
trusted library allocation
page read and write
1EB790FC000
trusted library allocation
page read and write
1EB74845000
heap
page read and write
1EB7A145000
trusted library allocation
page read and write
1EB7A1BD000
trusted library allocation
page read and write
1EB844D8000
trusted library allocation
page read and write
1EB799EE000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB82FA8000
trusted library allocation
page read and write
2365D660000
heap
page read and write
1EB844F8000
trusted library allocation
page read and write
1EB790AF000
trusted library allocation
page read and write
1EB7A1BD000
trusted library allocation
page read and write
1EB748D3000
heap
page read and write
1EB811A9000
trusted library allocation
page read and write
21DEB6AA000
heap
page read and write
1EB7AA9D000
trusted library allocation
page read and write
1EB74818000
heap
page read and write
1EB813B3000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1EB74845000
heap
page read and write
1EB74858000
heap
page read and write
1EB7ABC6000
trusted library allocation
page read and write
1EB84410000
trusted library allocation
page read and write
1EB813EB000
trusted library allocation
page read and write
1EB842EF000
trusted library allocation
page read and write
1EB78ECA000
trusted library allocation
page read and write
1EB76941000
heap
page read and write
1EB7C9DD000
trusted library allocation
page read and write
1EB76221000
trusted library allocation
page read and write
1EB80FC8000
trusted library allocation
page read and write
1EB7A1EA000
trusted library allocation
page read and write
1EB7692D000
heap
page read and write
1EB843F9000
trusted library allocation
page read and write
1EB790D6000
trusted library allocation
page read and write
1F64D860000
heap
page read and write
1EB762EB000
trusted library allocation
page read and write
1EB84226000
trusted library allocation
page read and write
1EB7905C000
trusted library allocation
page read and write
1EB842A7000
trusted library allocation
page read and write
1EB790FC000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB81455000
trusted library allocation
page read and write
1EB815F0000
trusted library allocation
page read and write
1EB7B5E9000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB74853000
heap
page read and write
1EB79824000
trusted library allocation
page read and write
1EB74856000
heap
page read and write
23011523000
trusted library allocation
page read and write
1EB84D9B000
trusted library allocation
page read and write
1EB7A122000
trusted library allocation
page read and write
1EB8444F000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB7A640000
trusted library allocation
page read and write
1EB844E5000
trusted library allocation
page read and write
1EB7B81C000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7907F000
trusted library allocation
page read and write
1EB8447F000
trusted library allocation
page read and write
1EB7C9AA000
trusted library allocation
page read and write
1EB7BC27000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB8296E000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB74859000
heap
page read and write
1EB7483C000
heap
page read and write
2365C9C7000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB7485F000
heap
page read and write
D9A47F7000
stack
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB8427F000
trusted library allocation
page read and write
1EB74856000
heap
page read and write
1EB74842000
heap
page read and write
1EB7A7D9000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB7488D000
heap
page read and write
1EB748CE000
heap
page read and write
1EB76989000
heap
page read and write
1EB74853000
heap
page read and write
1EB7A170000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB7698C000
heap
page read and write
1EB829AC000
trusted library allocation
page read and write
1EB7A08F000
trusted library allocation
page read and write
1EB84D7E000
trusted library allocation
page read and write
1EB7B429000
trusted library allocation
page read and write
1EB78E78000
trusted library allocation
page read and write
1EB844D8000
trusted library allocation
page read and write
1EB81369000
trusted library allocation
page read and write
1EB7A5E0000
trusted library allocation
page read and write
1EB84474000
trusted library allocation
page read and write
1EB84EF2000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB74853000
heap
page read and write
1EB7AB56000
trusted library allocation
page read and write
1DA20A49000
trusted library allocation
page read and write
2365D722000
heap
page read and write
1EB74834000
heap
page read and write
1EB857E5000
trusted library allocation
page read and write
1EB814D2000
trusted library allocation
page read and write
1EB7C836000
trusted library allocation
page read and write
1EB7A589000
trusted library allocation
page read and write
1EB7A1BD000
trusted library allocation
page read and write
1EB7A0E6000
trusted library allocation
page read and write
1EB84E7C000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7BCF8000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
11B4000
heap
page read and write
1EB7B9B7000
trusted library allocation
page read and write
1EB766CF000
trusted library allocation
page read and write
1EB7B97A000
trusted library allocation
page read and write
1EB74826000
heap
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB812EC000
trusted library allocation
page read and write
1EB790BE000
trusted library allocation
page read and write
1EB813FE000
trusted library allocation
page read and write
1EB79752000
trusted library allocation
page read and write
1EB78F9E000
trusted library allocation
page read and write
1EB7A293000
trusted library allocation
page read and write
1EB793EC000
trusted library allocation
page read and write
1EB813DB000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1EB74849000
heap
page read and write
1EB7ABC1000
trusted library allocation
page read and write
1EB748B6000
heap
page read and write
1EB84E5E000
trusted library allocation
page read and write
1EB7A46C000
trusted library allocation
page read and write
1EB84EE0000
trusted library allocation
page read and write
1EB74841000
heap
page read and write
1EB7BCAF000
trusted library allocation
page read and write
1EB82974000
trusted library allocation
page read and write
230115BA000
trusted library allocation
page read and write
1EB748B5000
heap
page read and write
1EB78BE7000
trusted library allocation
page read and write
1EB7A023000
trusted library allocation
page read and write
1EB749F7000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
125B000
heap
page read and write
1EB79064000
trusted library allocation
page read and write
1EB843E3000
trusted library allocation
page read and write
1EB74840000
heap
page read and write
1EB74857000
heap
page read and write
1EB7A0AF000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1EB74858000
heap
page read and write
1EB844B9000
trusted library allocation
page read and write
5F1000
unkown
page execute read
1EB7A11E000
trusted library allocation
page read and write
1EB74FFE000
trusted library allocation
page read and write
1EB7692D000
heap
page read and write
1EB7A60F000
trusted library allocation
page read and write
1EB7BC0A000
trusted library allocation
page read and write
1EB84457000
trusted library allocation
page read and write
1EB792CA000
trusted library allocation
page read and write
1EB7A19E000
trusted library allocation
page read and write
1EB7B3BB000
trusted library allocation
page read and write
1EB82B95000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB7488D000
heap
page read and write
21DEB5B0000
heap
page read and write
1EB74853000
heap
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB7A7D9000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB74853000
heap
page read and write
1EB74826000
heap
page read and write
1EB7C6FE000
trusted library allocation
page read and write
1EB7AEFE000
trusted library allocation
page read and write
D9A7B3E000
stack
page read and write
1EB7A1AC000
trusted library allocation
page read and write
1EB76335000
trusted library allocation
page read and write
1EB7A1B2000
trusted library allocation
page read and write
1EB7B59E000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB74863000
heap
page read and write
1EB74853000
heap
page read and write
1EB7A0E0000
trusted library allocation
page read and write
1EB84E56000
trusted library allocation
page read and write
1EB79376000
trusted library allocation
page read and write
1EB7A4A9000
trusted library allocation
page read and write
1EB844E5000
trusted library allocation
page read and write
1EB7A1BF000
trusted library allocation
page read and write
1EB7AAFA000
trusted library allocation
page read and write
1EB7692D000
heap
page read and write
1EB7A6F3000
trusted library allocation
page read and write
1EB812D6000
trusted library allocation
page read and write
7281DFE000
stack
page read and write
1EB84EE0000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EB814C8000
trusted library allocation
page read and write
1EB7B949000
trusted library allocation
page read and write
1EB74847000
heap
page read and write
1EB799F4000
trusted library allocation
page read and write
1DA20A13000
trusted library allocation
page read and write
1EB748AD000
heap
page read and write
2365C963000
trusted library allocation
page read and write
2365C6F0000
unkown
page execute read
1EB761E4000
trusted library allocation
page read and write
1EB844D8000
trusted library allocation
page read and write
1EB748B3000
heap
page read and write
1EB7483C000
heap
page read and write
1EB844B3000
trusted library allocation
page read and write
1EB7482D000
heap
page read and write
1EB84AF9000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB7A52B000
trusted library allocation
page read and write
1EB8115B000
trusted library allocation
page read and write
23011170000
heap
page read and write
1EB7A029000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB813CF000
trusted library allocation
page read and write
1EB837F9000
trusted library allocation
page read and write
1EB8592C000
trusted library allocation
page read and write
1EB84491000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB8123D000
trusted library allocation
page read and write
1EB7A486000
trusted library allocation
page read and write
1EB7693C000
heap
page read and write
1EB748BD000
heap
page read and write
2365C816000
unkown
page execute read
1EB8298F000
trusted library allocation
page read and write
1EB81197000
trusted library allocation
page read and write
1EB75066000
trusted library allocation
page read and write
1EB7A082000
trusted library allocation
page read and write
1EB74849000
heap
page read and write
2365D660000
heap
page read and write
1EB74814000
heap
page read and write
6B2000
unkown
page readonly
1EB7A7E7000
trusted library allocation
page read and write
1EB790C4000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
1EB7A1B7000
trusted library allocation
page read and write
1EB85C09000
heap
page read and write
1EB83638000
trusted library allocation
page read and write
1EB7A428000
trusted library allocation
page read and write
1EB78B62000
trusted library allocation
page read and write
1EB748AE000
heap
page read and write
1EB83693000
trusted library allocation
page read and write
1EB7690F000
heap
page read and write
1A0D000
stack
page read and write
1EB7626D000
trusted library allocation
page read and write
1EB7A03A000
trusted library allocation
page read and write
1EB7C82C000
trusted library allocation
page read and write
1EB842BE000
trusted library allocation
page read and write
1EB74842000
heap
page read and write
1EB7A17E000
trusted library allocation
page read and write
1EB78F1F000
trusted library allocation
page read and write
1EB79097000
trusted library allocation
page read and write
1EB76170000
trusted library allocation
page read and write
1EB7A531000
trusted library allocation
page read and write
1EB84236000
trusted library allocation
page read and write
1EB790A1000
trusted library allocation
page read and write
1EB7A5D8000
trusted library allocation
page read and write
1DA20A78000
trusted library allocation
page read and write
1EB837F2000
trusted library allocation
page read and write
1EB7483E000
heap
page read and write
1EB7A1EE000
trusted library allocation
page read and write
2365C600000
heap
page readonly
1EB74847000
heap
page read and write
1EB8115B000
trusted library allocation
page read and write
1EB748AD000
heap
page read and write
1EB7C6BE000
trusted library allocation
page read and write
1EB748AD000
heap
page read and write
1EB74851000
heap
page read and write
1EB74856000
heap
page read and write
1EB815EE000
trusted library allocation
page read and write
1EB7A09B000
trusted library allocation
page read and write
1EB7ABFC000
trusted library allocation
page read and write
1EB7AB2E000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB748B5000
heap
page read and write
1EB814D0000
trusted library allocation
page read and write
1EB78EF3000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EB748AE000
heap
page read and write
1EB813D1000
trusted library allocation
page read and write
21DEB6BD000
heap
page read and write
2365D669000
heap
page read and write
1EB84AE5000
trusted library allocation
page read and write
1EB7B9DF000
trusted library allocation
page read and write
1EB829E2000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB797C7000
trusted library allocation
page read and write
1EB7A1E0000
trusted library allocation
page read and write
1EB74862000
heap
page read and write
1EB7B826000
trusted library allocation
page read and write
1EB7AEEB000
trusted library allocation
page read and write
1EB7A6F9000
trusted library allocation
page read and write
1EB75FFD000
trusted library allocation
page read and write
2365C974000
trusted library allocation
page read and write
1EB7A0BE000
trusted library allocation
page read and write
1EB7A25C000
trusted library allocation
page read and write
1EB85C09000
heap
page read and write
1EB811C0000
trusted library allocation
page read and write
1EB8446F000
trusted library allocation
page read and write
1EB7A6F6000
trusted library allocation
page read and write
1EB7AAFC000
trusted library allocation
page read and write
1EB7A1BF000
trusted library allocation
page read and write
1EB74851000
heap
page read and write
2301156E000
trusted library allocation
page read and write
1EB7A640000
trusted library allocation
page read and write
1EB7905A000
trusted library allocation
page read and write
1EB829D6000
trusted library allocation
page read and write
1EB7A24C000
trusted library allocation
page read and write
1EB8147C000
trusted library allocation
page read and write
1EB84ABA000
trusted library allocation
page read and write
1EB85C69000
heap
page read and write
1EB74842000
heap
page read and write
1EB814A6000
trusted library allocation
page read and write
1EB7C9AC000
trusted library allocation
page read and write
1EB7509E000
trusted library allocation
page read and write
1EB74F23000
trusted library allocation
page read and write
1EB844A2000
trusted library allocation
page read and write
1EB814AA000
trusted library allocation
page read and write
1EB7AECA000
trusted library allocation
page read and write
1EB829F4000
trusted library allocation
page read and write
1EB79959000
trusted library allocation
page read and write
1EB7ABC6000
trusted library allocation
page read and write
1EB7626D000
trusted library allocation
page read and write
1EB78E96000
trusted library allocation
page read and write
1EB815BE000
trusted library allocation
page read and write
1EB74853000
heap
page read and write
1EB78F78000
trusted library allocation
page read and write
1EB790D6000
trusted library allocation
page read and write
1EB79089000
trusted library allocation
page read and write
124C000
heap
page read and write
1EB7A4CF000
trusted library allocation
page read and write
1EB7A6DF000
trusted library allocation
page read and write
1EB74858000
heap
page read and write
1EB7A18D000
trusted library allocation
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB7AA80000
trusted library allocation
page read and write
1EB7625F000
trusted library allocation
page read and write
1EB748A8000
heap
page read and write
1EB82BA7000
trusted library allocation
page read and write
1EB748BB000
heap
page read and write
1EB74853000
heap
page read and write
1EB7C6E8000
trusted library allocation
page read and write
2365D506000
trusted library allocation
page read and write
1EB7A122000
trusted library allocation
page read and write
1EB7995D000
trusted library allocation
page read and write
1EB858C5000
trusted library allocation
page read and write
1EB74855000
heap
page read and write
11B4000
heap
page read and write
1EB84232000
trusted library allocation
page read and write
1EB79373000
trusted library allocation
page read and write
1EB78E8A000
trusted library allocation
page read and write
1EB8114B000
trusted library allocation
page read and write
1EB85848000
trusted library allocation
page read and write
1EB78FA5000
trusted library allocation
page read and write
1EB7C679000
trusted library allocation
page read and write
1EB79905000
trusted library allocation
page read and write
1234000
heap
page read and write
1EB74845000
heap
page read and write
1EB7482E000
heap
page read and write
1EB7A0BE000
trusted library allocation
page read and write
1EB790D0000
trusted library allocation
page read and write
1EB7B8E5000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7C9AA000
trusted library allocation
page read and write
1EB85C6C000
heap
page read and write
1EB7A699000
trusted library allocation
page read and write
1EB7C9DD000
trusted library allocation
page read and write
1EB85C09000
heap
page read and write
3C9E25E1000
trusted library allocation
page execute read
1EB7482D000
heap
page read and write
1EB748B5000
heap
page read and write
72847FE000
unkown
page readonly
1EB8296E000
trusted library allocation
page read and write
1EB7B5AC000
trusted library allocation
page read and write
1EB79327000
trusted library allocation
page read and write
1EB7B5F1000
trusted library allocation
page read and write
1EB81092000
trusted library allocation
page read and write
1EB7483C000
heap
page read and write
1EB7A6F6000
trusted library allocation
page read and write
1EB84A73000
trusted library allocation
page read and write
1EB847E4000
trusted library allocation
page read and write
1EB7A4BE000
trusted library allocation
page read and write
1EB7A6F9000
trusted library allocation
page read and write
21DEB900000
trusted library allocation
page read and write
1EB7AA69000
trusted library allocation
page read and write
1EB81480000
trusted library allocation
page read and write
1240000
heap
page read and write
1EB749A4000
trusted library allocation
page read and write
1EB7932E000
trusted library allocation
page read and write
1EB7A4B4000
trusted library allocation
page read and write
1EB842A3000
trusted library allocation
page read and write
125B000
heap
page read and write
1EB81171000
trusted library allocation
page read and write
1EB78E8F000
trusted library allocation
page read and write
1EB74838000
heap
page read and write
1EB829FD000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7BCC2000
trusted library allocation
page read and write
1EB750D5000
trusted library allocation
page read and write
1EB7B2AB000
trusted library allocation
page read and write
1EB7A6FB000
trusted library allocation
page read and write
1EB84D6E000
trusted library allocation
page read and write
1EB80FBD000
trusted library allocation
page read and write
1EB84ABC000
trusted library allocation
page read and write
1EB7AB5E000
trusted library allocation
page read and write
1EB7B42F000
trusted library allocation
page read and write
1EB748A8000
heap
page read and write
1EB844F2000
trusted library allocation
page read and write
1EB750B0000
trusted library allocation
page read and write
1EB7A6F1000
trusted library allocation
page read and write
2365D6E8000
heap
page read and write
1EB82C1C000
trusted library allocation
page read and write
1EB74835000
heap
page read and write
2365D6F2000
heap
page read and write
1EB7BA2C000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7611E000
trusted library allocation
page read and write
1EB854F1000
trusted library allocation
page read and write
1EB842A3000
trusted library allocation
page read and write
1EB7485B000
heap
page read and write
1EB74862000
heap
page read and write
1EB7482E000
heap
page read and write
1EB79AD9000
trusted library allocation
page read and write
1EB7ABD0000
trusted library allocation
page read and write
1EB7485F000
heap
page read and write
1EB7A441000
trusted library allocation
page read and write
1EB78FCE000
trusted library allocation
page read and write
1EB80F96000
trusted library allocation
page read and write
1F64D7D0000
heap
page read and write
1EB854CE000
trusted library allocation
page read and write
1EB8422C000
trusted library allocation
page read and write
1EB84A13000
trusted library allocation
page read and write
1EB761CF000
trusted library allocation
page read and write
1EB7482E000
heap
page read and write
1EB7AED6000
trusted library allocation
page read and write
1EB74834000
heap
page read and write
1EB7999B000
trusted library allocation
page read and write
1EB80FB4000
trusted library allocation
page read and write
1EB799B7000
trusted library allocation
page read and write
1EB7A678000
trusted library allocation
page read and write
1EB844D8000
trusted library allocation
page read and write
1EB74859000
heap
page read and write
1EB748AE000
heap
page read and write
1EB7482E000
heap
page read and write
1EB76934000
heap
page read and write
1EB74845000
heap
page read and write
2365D66C000
heap
page read and write
1EB748AE000
heap
page read and write
There are 4018 hidden memdumps, click here to show them.