IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_73a49bae-d051-417a-a326-ad04d4bcf16a.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_73a49bae-d051-417a-a326-ad04d4bcf16a.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2240 -prefMapHandle 2224 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a72cb5cd-985a-4500-b060-a3fccf47a185} 6960 "\\.\pipe\gecko-crash-server-pipe.6960" 1ffd936e310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3664 -parentBuildID 20230927232528 -prefsHandle 2952 -prefMapHandle 2988 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {621ec6c5-4f70-4856-bbff-2195b9a901fa} 6960 "\\.\pipe\gecko-crash-server-pipe.6960" 1ffd937a410 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4968 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4996 -prefMapHandle 4992 -prefsLen 32993 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5c7457a-1b8b-4a7d-99d2-323e2f211b0d} 6960 "\\.\pipe\gecko-crash-server-pipe.6960" 1ffea7b9f10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://youtube.comZ
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://mathiasbynens.be/notes/javascript-escapes#single
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
http://mozilla.org/0
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://mathiasbynens.be/
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
dualstack.reddit.map.fastly.net
151.101.129.140
youtube-ui.l.google.com
142.250.181.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
142.250.181.78
youtube.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1FFE9263000
trusted library allocation
page read and write
1FFE63C1000
trusted library allocation
page read and write
1FFEA472000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFF5905000
heap
page read and write
1FFF601C000
trusted library allocation
page read and write
1FFE90A7000
trusted library allocation
page read and write
1FFF4FFC000
trusted library allocation
page read and write
1FFEA486000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFF4EE9000
trusted library allocation
page read and write
1FFECCC9000
trusted library allocation
page read and write
1FFF4EE9000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFEADE2000
trusted library allocation
page read and write
1FFE997A000
trusted library allocation
page read and write
1FFEC6FA000
trusted library allocation
page read and write
1FFEA876000
trusted library allocation
page read and write
1FFE6A33000
heap
page read and write
1FFEA596000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFF15F6000
trusted library allocation
page read and write
1FFF15FE000
trusted library allocation
page read and write
1FFEC6AB000
trusted library allocation
page read and write
1FFE9477000
trusted library allocation
page read and write
1FFED52F000
trusted library allocation
page read and write
1FFE48F0000
heap
page read and write
1FFE4893000
heap
page read and write
1FFEAA1E000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1FFF5520000
trusted library allocation
page read and write
1FFF455B000
trusted library allocation
page read and write
1FFE607C000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFEACE7000
trusted library allocation
page read and write
1FFE488D000
heap
page read and write
1FFF5425000
trusted library allocation
page read and write
1F82A512000
trusted library allocation
page read and write
1FFE6A86000
heap
page read and write
1FFE9939000
trusted library allocation
page read and write
1FFEA452000
trusted library allocation
page read and write
1462000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFEACFE000
trusted library allocation
page read and write
1FFEA9BB000
trusted library allocation
page read and write
22905B00000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFEA4F4000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
1FFE9071000
trusted library allocation
page read and write
1FFECCDA000
trusted library allocation
page read and write
1FFECAF9000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFECA55000
trusted library allocation
page read and write
1FFEC9E4000
trusted library allocation
page read and write
1A7D42DA000
heap
page read and write
1FFEA5FB000
trusted library allocation
page read and write
1FFED04D000
trusted library allocation
page read and write
11DC8370000
trusted library section
page readonly
1FFEA9D0000
trusted library allocation
page read and write
1FFEA9E5000
trusted library allocation
page read and write
1FFE94DA000
trusted library allocation
page read and write
1FFEA9A8000
trusted library allocation
page read and write
1FFEADCB000
trusted library allocation
page read and write
1FFF566F000
trusted library allocation
page read and write
1FFE48F3000
heap
page read and write
1FFEC6E2000
trusted library allocation
page read and write
1FFF11F4000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFF5546000
trusted library allocation
page read and write
1F82A1D0000
heap
page read and write
1FFF4B27000
trusted library allocation
page read and write
1FFE48E7000
heap
page read and write
1FFF11F2000
trusted library allocation
page read and write
11DC8A40000
heap
page read and write
1FFE99F1000
trusted library allocation
page read and write
1FFE9495000
trusted library allocation
page read and write
1FFE6077000
trusted library allocation
page read and write
1FFE4AEF000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
11DC8B28000
heap
page read and write
1204000
heap
page read and write
1FFE9845000
trusted library allocation
page read and write
11DC8617000
trusted library allocation
page read and write
1FFF13AE000
trusted library allocation
page read and write
1FFF1119000
trusted library allocation
page read and write
1FFE63A6000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFF2CC5000
trusted library allocation
page read and write
1FFF5334000
trusted library allocation
page read and write
1FFEA43C000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE6A56000
heap
page read and write
1FFF55C1000
trusted library allocation
page read and write
1FFE9E8C000
trusted library allocation
page read and write
1FFF119C000
trusted library allocation
page read and write
1FFF12D9000
trusted library allocation
page read and write
1FFF5398000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE63F6000
trusted library allocation
page read and write
1FFEB4DC000
trusted library allocation
page read and write
1FFECA52000
trusted library allocation
page read and write
1FFF5594000
trusted library allocation
page read and write
1FFF4B42000
trusted library allocation
page read and write
1FFE9E7E000
trusted library allocation
page read and write
11DC8AAC000
heap
page read and write
1FFE9167000
trusted library allocation
page read and write
1FFE67FA000
trusted library allocation
page read and write
1FFED6AC000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFE511B000
trusted library allocation
page read and write
1FFE91FA000
trusted library allocation
page read and write
1FFE9827000
trusted library allocation
page read and write
11DC7E2F000
trusted library allocation
page read and write
1FFE48FD000
heap
page read and write
1399E751000
trusted library allocation
page execute read
1FFF4300000
trusted library allocation
page read and write
1FFF1133000
trusted library allocation
page read and write
1FFF2C6D000
trusted library allocation
page read and write
1FFE48B3000
heap
page read and write
1FFF457C000
trusted library allocation
page read and write
1FFF2C05000
trusted library allocation
page read and write
1FFF13B0000
trusted library allocation
page read and write
1FFF4570000
trusted library allocation
page read and write
1FFEB4F2000
trusted library allocation
page read and write
1FFE48FE000
heap
page read and write
1FFE9E43000
trusted library allocation
page read and write
1FFE488D000
heap
page read and write
1FFF126A000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFE9073000
trusted library allocation
page read and write
4EFB27E000
unkown
page readonly
1FFECCC4000
trusted library allocation
page read and write
1FFE6A59000
heap
page read and write
1A7D5CD0000
heap
page read and write
11DC8A49000
heap
page read and write
1FFE48C2000
heap
page read and write
230000
unkown
page readonly
1FFF1741000
trusted library allocation
page read and write
1FFE67AB000
trusted library allocation
page read and write
1FFEA96A000
trusted library allocation
page read and write
1FFEB6E9000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1FFEA486000
trusted library allocation
page read and write
1FFE6341000
trusted library allocation
page read and write
11DC8B20000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFEAD8F000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFEB4DC000
trusted library allocation
page read and write
1FFF5472000
trusted library allocation
page read and write
1FFE4902000
heap
page read and write
1FFE7519000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1F82A340000
heap
page read and write
1FFEAA1E000
trusted library allocation
page read and write
1FFE4902000
heap
page read and write
1FFE48BB000
heap
page read and write
1FFE4881000
heap
page read and write
11DC8BAA000
heap
page read and write
1FFF55C5000
trusted library allocation
page read and write
1FFE6A4E000
heap
page read and write
1FFEA841000
trusted library allocation
page read and write
1FFE98F5000
trusted library allocation
page read and write
1FFE6A87000
heap
page read and write
1FFF559F000
trusted library allocation
page read and write
11DC8B58000
heap
page read and write
1FFEC65A000
trusted library allocation
page read and write
1F82A332000
unclassified section
page read and write
1A7D42AF000
heap
page read and write
1FFE48E8000
heap
page read and write
1F82A612000
trusted library allocation
page read and write
1FFE48EB000
heap
page read and write
1FFEA59B000
trusted library allocation
page read and write
1FFEAA5B000
trusted library allocation
page read and write
1FFF4F73000
trusted library allocation
page read and write
1FFE99A8000
trusted library allocation
page read and write
11DC8B23000
heap
page read and write
1FFE4907000
heap
page read and write
1FFEA5C7000
trusted library allocation
page read and write
1FFEA9CE000
trusted library allocation
page read and write
1FFEAA52000
trusted library allocation
page read and write
1FFEC71B000
trusted library allocation
page read and write
1FFE913D000
trusted library allocation
page read and write
1FFE9869000
trusted library allocation
page read and write
1FFF4B1A000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
11DC7EE9000
trusted library allocation
page read and write
1FFE915F000
trusted library allocation
page read and write
1FFE91A5000
trusted library allocation
page read and write
3D00000
heap
page read and write
1FFF18E1000
trusted library allocation
page read and write
1FFF2D33000
trusted library allocation
page read and write
1FFE9974000
trusted library allocation
page read and write
1FFEAA43000
trusted library allocation
page read and write
1FFEADDC000
trusted library allocation
page read and write
1FFEA963000
trusted library allocation
page read and write
1FFF4560000
trusted library allocation
page read and write
1FFF37E0000
trusted library allocation
page read and write
1FFE4905000
heap
page read and write
1FFEA48E000
trusted library allocation
page read and write
1FFE48F8000
heap
page read and write
1FFE94CA000
trusted library allocation
page read and write
1FFE6A57000
heap
page read and write
1FFE6A7A000
heap
page read and write
1FFECCF1000
trusted library allocation
page read and write
1FFF1900000
trusted library allocation
page read and write
1A7D4407000
trusted library allocation
page read and write
1FFEA938000
trusted library allocation
page read and write
1FFE6A4F000
heap
page read and write
1FFEB7F3000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFEA9BB000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFF11C4000
trusted library allocation
page read and write
1FFEBB40000
trusted library allocation
page read and write
1FFE9875000
trusted library allocation
page read and write
1FFF53FE000
trusted library allocation
page read and write
1FFE9986000
trusted library allocation
page read and write
11DC8AE8000
heap
page read and write
1FFE487F000
heap
page read and write
1FFEA6D8000
trusted library allocation
page read and write
CCBF3FF000
stack
page read and write
11DC7D00000
trusted library allocation
page read and write
1FFECA8D000
trusted library allocation
page read and write
1FFEADAA000
trusted library allocation
page read and write
1FFF10C9000
trusted library allocation
page read and write
1FFF1791000
trusted library allocation
page read and write
1FFE91BB000
trusted library allocation
page read and write
1FFE5119000
trusted library allocation
page read and write
1FFEA9F5000
trusted library allocation
page read and write
1FFE488D000
heap
page read and write
1FFEA9BB000
trusted library allocation
page read and write
1FFE9879000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFEAD99000
trusted library allocation
page read and write
1FFF569A000
trusted library allocation
page read and write
1FFF547D000
trusted library allocation
page read and write
1FFEBCBB000
trusted library allocation
page read and write
1FFF4577000
trusted library allocation
page read and write
1FFF12C2000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFEA48C000
trusted library allocation
page read and write
1410000
heap
page read and write
1FFE4891000
heap
page read and write
1FFE63C1000
trusted library allocation
page read and write
11DC7CF2000
unclassified section
page read and write
1FFE4886000
heap
page read and write
1FFE48CE000
heap
page read and write
1FFF4EFD000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFEAAE7000
trusted library allocation
page read and write
1FFF11C0000
trusted library allocation
page read and write
1460000
heap
page read and write
1FFE61E9000
trusted library allocation
page read and write
22ADD140000
unclassified section
page readonly
1FFE48AF000
heap
page read and write
1FFE4A98000
trusted library allocation
page read and write
1FFF4EFB000
trusted library allocation
page read and write
CCBEBFF000
stack
page read and write
1FFEC6E2000
trusted library allocation
page read and write
22ADD1A6000
heap
page read and write
1FFEB590000
trusted library allocation
page read and write
11DC8609000
trusted library allocation
page read and write
1FFE48F8000
heap
page read and write
1FFF4F7C000
trusted library allocation
page read and write
1FFEADA7000
trusted library allocation
page read and write
1E99F803000
trusted library allocation
page read and write
1FFF17B7000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1C0E000
stack
page read and write
1FFE511E000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
231000
unkown
page execute read
1FFE48B9000
heap
page read and write
1FFE9941000
trusted library allocation
page read and write
1FFE91CA000
trusted library allocation
page read and write
1FFF10CE000
trusted library allocation
page read and write
1FFE61DE000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFE915B000
trusted library allocation
page read and write
1FFE6077000
trusted library allocation
page read and write
1FFE48F8000
heap
page read and write
22905760000
heap
page read and write
1FFF5430000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE48E9000
heap
page read and write
1FFE6376000
trusted library allocation
page read and write
1FFF4577000
trusted library allocation
page read and write
1FFE984C000
trusted library allocation
page read and write
1FFE993D000
trusted library allocation
page read and write
11DC8A9C000
heap
page read and write
1FFE9954000
trusted library allocation
page read and write
1FFF6005000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFE48E6000
heap
page read and write
1FFF58D1000
heap
page read and write
1FFEA4B3000
trusted library allocation
page read and write
3950000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFEC7AF000
trusted library allocation
page read and write
1FFEA5F6000
trusted library allocation
page read and write
1FFF456E000
trusted library allocation
page read and write
1FFE91D8000
trusted library allocation
page read and write
1FFEA9A3000
trusted library allocation
page read and write
1FFEA9A3000
trusted library allocation
page read and write
1FFEB597000
trusted library allocation
page read and write
1FFE4898000
heap
page read and write
1FFF1185000
trusted library allocation
page read and write
1FFE9477000
trusted library allocation
page read and write
1FFE9E2B000
trusted library allocation
page read and write
1FFF55CE000
trusted library allocation
page read and write
1FFF1186000
trusted library allocation
page read and write
1FFE48A7000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFEA5F8000
trusted library allocation
page read and write
1FFF4F7C000
trusted library allocation
page read and write
1FFEA815000
trusted library allocation
page read and write
11DC7E81000
trusted library allocation
page read and write
1FFE48C0000
heap
page read and write
1FFE606F000
trusted library allocation
page read and write
22ADD5C4000
trusted library allocation
page read and write
1FFE917A000
trusted library allocation
page read and write
1FFEB78D000
trusted library allocation
page read and write
1FFF18EA000
trusted library allocation
page read and write
1F82A5A3000
trusted library allocation
page read and write
1FFF11F4000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1FFF2B87000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFF56B8000
trusted library allocation
page read and write
11DC84B0000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFF4100000
trusted library allocation
page read and write
1FFF545A000
trusted library allocation
page read and write
1FFF11EE000
trusted library allocation
page read and write
1FFF18BC000
trusted library allocation
page read and write
300000
unkown
page write copy
1FFF53F1000
trusted library allocation
page read and write
1FFF1828000
trusted library allocation
page read and write
230000
unkown
page readonly
1FFE48DD000
heap
page read and write
1FFE51AD000
trusted library allocation
page read and write
1FFF37C5000
trusted library allocation
page read and write
1FFE99F8000
trusted library allocation
page read and write
1FFF4FFC000
trusted library allocation
page read and write
1FFF53C3000
trusted library allocation
page read and write
1FFEA50C000
trusted library allocation
page read and write
1FFF553B000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFE63BC000
trusted library allocation
page read and write
1FFF12C2000
trusted library allocation
page read and write
1FFEB638000
trusted library allocation
page read and write
1FFEA886000
trusted library allocation
page read and write
11DC8B31000
heap
page read and write
1FFEC6D9000
trusted library allocation
page read and write
1FFEAA1A000
trusted library allocation
page read and write
1FFE48EF000
heap
page read and write
1FFE9E7E000
trusted library allocation
page read and write
1FFF5546000
trusted library allocation
page read and write
1FFE9492000
trusted library allocation
page read and write
1FFE6347000
trusted library allocation
page read and write
11DC7EC0000
trusted library allocation
page read and write
1FFEA596000
trusted library allocation
page read and write
1FFE61FC000
trusted library allocation
page read and write
1FFEADA5000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE91F4000
trusted library allocation
page read and write
1458000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFF54F2000
trusted library allocation
page read and write
1FFEA83F000
trusted library allocation
page read and write
1FFE913F000
trusted library allocation
page read and write
1FFEA5FD000
trusted library allocation
page read and write
1FFE75FA000
trusted library allocation
page read and write
1FFE4A81000
trusted library allocation
page read and write
11DC8BAA000
heap
page read and write
1FFEA9DB000
trusted library allocation
page read and write
1A7D42AA000
heap
page read and write
1FFEA6AE000
trusted library allocation
page read and write
1FFEA97E000
trusted library allocation
page read and write
1FFF1227000
trusted library allocation
page read and write
1FFE635C000
trusted library allocation
page read and write
1FFF1100000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE48E0000
heap
page read and write
11DC8AA0000
heap
page read and write
1FFEAC5D000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFED650000
trusted library allocation
page read and write
1FFEA87C000
trusted library allocation
page read and write
9EE117E000
stack
page read and write
1FFE48DD000
heap
page read and write
1FFE9149000
trusted library allocation
page read and write
1FFE5126000
trusted library allocation
page read and write
1FFE639A000
trusted library allocation
page read and write
1FFEC6CA000
trusted library allocation
page read and write
1FFECA28000
trusted library allocation
page read and write
1FFE4884000
heap
page read and write
1FFE61A8000
trusted library allocation
page read and write
39B0000
heap
page read and write
1FFE48BB000
heap
page read and write
1FFF13EC000
trusted library allocation
page read and write
1F82A253000
heap
page read and write
1F82A3E4000
heap
page read and write
1FFEA522000
trusted library allocation
page read and write
1FFEC74B000
trusted library allocation
page read and write
1FFEADD4000
trusted library allocation
page read and write
1FFEB638000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFEA4F6000
trusted library allocation
page read and write
1FFE92D4000
trusted library allocation
page read and write
1FFE48F4000
heap
page read and write
1FFEA85B000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFEAAE2000
trusted library allocation
page read and write
1FFF13C2000
trusted library allocation
page read and write
2020003F000
trusted library allocation
page read and write
1FFF13A7000
trusted library allocation
page read and write
1FFEA994000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE48EF000
heap
page read and write
1FFE6A87000
heap
page read and write
1FFE99D6000
trusted library allocation
page read and write
1FFEA5D4000
trusted library allocation
page read and write
1FFF11F4000
trusted library allocation
page read and write
1FFE998E000
trusted library allocation
page read and write
1FFEA841000
trusted library allocation
page read and write
1FFEBBF1000
trusted library allocation
page read and write
1FFF182A000
trusted library allocation
page read and write
1FFF4B2E000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE99BD000
trusted library allocation
page read and write
1FFEA598000
trusted library allocation
page read and write
11DC8AAC000
heap
page read and write
1FFF552E000
trusted library allocation
page read and write
1FFEADFA000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
1FFEC688000
trusted library allocation
page read and write
1FFEAA33000
trusted library allocation
page read and write
1FFE51E1000
trusted library allocation
page read and write
1FFEC6CA000
trusted library allocation
page read and write
1FFE91F4000
trusted library allocation
page read and write
1FFEC6CF000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFF456E000
trusted library allocation
page read and write
1FFE4892000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE9930000
trusted library allocation
page read and write
1FFE6422000
trusted library allocation
page read and write
1FFE6379000
trusted library allocation
page read and write
1FFE61FC000
trusted library allocation
page read and write
1FFF55CA000
trusted library allocation
page read and write
11DC8BAA000
heap
page read and write
1FFF45B6000
trusted library allocation
page read and write
1FFE9182000
trusted library allocation
page read and write
1A7D40C0000
heap
page read and write
1FFE7533000
trusted library allocation
page read and write
1FFE48CE000
heap
page read and write
1FFEA926000
trusted library allocation
page read and write
1FFEA595000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE9021000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFF45AA000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFEA5F6000
trusted library allocation
page read and write
1FFE91E6000
trusted library allocation
page read and write
1FFED12C000
trusted library allocation
page read and write
1F82A603000
trusted library allocation
page read and write
1FFF4555000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFEA9AA000
trusted library allocation
page read and write
1FFED605000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFEC6AD000
trusted library allocation
page read and write
1FFE9931000
trusted library allocation
page read and write
1FFE4897000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFE48B1000
heap
page read and write
1FFEA5D4000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1FFE4886000
heap
page read and write
1FFEA5C8000
trusted library allocation
page read and write
22ADD50C000
trusted library allocation
page read and write
1FFE9172000
trusted library allocation
page read and write
22ADD530000
trusted library allocation
page read and write
1FFF4E22000
trusted library allocation
page read and write
1FFF379A000
trusted library allocation
page read and write
1FFE9875000
trusted library allocation
page read and write
1A7D42C2000
heap
page read and write
1FFEA886000
trusted library allocation
page read and write
1FFECA86000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE48FD000
heap
page read and write
1FFE61FC000
trusted library allocation
page read and write
1FFE48F8000
heap
page read and write
1FFE99C9000
trusted library allocation
page read and write
1FFEA6EF000
trusted library allocation
page read and write
1FFE91FA000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
1FFE99C9000
trusted library allocation
page read and write
1FFE48FF000
heap
page read and write
1FFF1295000
trusted library allocation
page read and write
1FFEB4A4000
trusted library allocation
page read and write
1FFF1132000
trusted library allocation
page read and write
1FFEAA33000
trusted library allocation
page read and write
1F82A57B000
trusted library allocation
page read and write
1FFEA9F4000
trusted library allocation
page read and write
1FFE99BD000
trusted library allocation
page read and write
1FFF15BD000
trusted library allocation
page read and write
1FFE48EF000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE630E000
trusted library allocation
page read and write
1FFE5144000
trusted library allocation
page read and write
11BF000
stack
page read and write
1FFE48BB000
heap
page read and write
1FFE487F000
heap
page read and write
1FFECCC1000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
11DC8600000
trusted library allocation
page read and write
1FFECCF1000
trusted library allocation
page read and write
1FFE48DE000
heap
page read and write
1FFEC618000
trusted library allocation
page read and write
1FFE4880000
heap
page read and write
1FFEA9A3000
trusted library allocation
page read and write
1FFE6A56000
heap
page read and write
1FFE48A9000
heap
page read and write
11DC8B99000
heap
page read and write
1FFECADD000
trusted library allocation
page read and write
1F82A510000
trusted library allocation
page read and write
1FFEA843000
trusted library allocation
page read and write
1FFF4583000
trusted library allocation
page read and write
1FFE48B1000
heap
page read and write
1FFF45B3000
trusted library allocation
page read and write
1FFE48B1000
heap
page read and write
1FFE5177000
trusted library allocation
page read and write
1FFE6A48000
heap
page read and write
1FFEA5C1000
trusted library allocation
page read and write
11DC8BAA000
heap
page read and write
1FFEA51D000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE91C1000
trusted library allocation
page read and write
1FFE90A0000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFEA9DD000
trusted library allocation
page read and write
1FFF5905000
heap
page read and write
1FFEA935000
trusted library allocation
page read and write
1FFEB4A8000
trusted library allocation
page read and write
1FFF566B000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFEA527000
trusted library allocation
page read and write
1FFEBB8A000
trusted library allocation
page read and write
22905A0A000
trusted library allocation
page read and write
11DC8BB8000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE4886000
heap
page read and write
1FFEA996000
trusted library allocation
page read and write
11DC8BB8000
heap
page read and write
1FFE4883000
heap
page read and write
1FFE60DB000
trusted library allocation
page read and write
1FFE99A8000
trusted library allocation
page read and write
1FFEAA5B000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE91D6000
trusted library allocation
page read and write
1FFE6A56000
heap
page read and write
1FFE6347000
trusted library allocation
page read and write
1FFEB799000
trusted library allocation
page read and write
1FFF45AA000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFF55D4000
trusted library allocation
page read and write
1FFF149D000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFE489F000
heap
page read and write
1FFF54BA000
trusted library allocation
page read and write
1FFEA474000
trusted library allocation
page read and write
1FFF457C000
trusted library allocation
page read and write
1FFF4FC6000
trusted library allocation
page read and write
1FFE99B0000
trusted library allocation
page read and write
1FFEAA52000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFEA8D3000
trusted library allocation
page read and write
1FFF4666000
trusted library allocation
page read and write
1FFEA9A3000
trusted library allocation
page read and write
1FFF4EC7000
trusted library allocation
page read and write
1FFE9869000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1FFE91FB000
trusted library allocation
page read and write
1FFE98B4000
trusted library allocation
page read and write
1FFE48F1000
heap
page read and write
1FFE48A9000
heap
page read and write
1442000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFE48F0000
heap
page read and write
145B000
heap
page read and write
11DC7FD6000
heap
page read and write
1FFE90D6000
trusted library allocation
page read and write
1FFE6027000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE4886000
heap
page read and write
1FFE9E54000
trusted library allocation
page read and write
1FFE9E64000
trusted library allocation
page read and write
1FFF4662000
trusted library allocation
page read and write
1FFF13B7000
trusted library allocation
page read and write
1FFEA926000
trusted library allocation
page read and write
1FFE9060000
trusted library allocation
page read and write
22ADD56A000
trusted library allocation
page read and write
1FFE9E7E000
trusted library allocation
page read and write
1FFF1336000
trusted library allocation
page read and write
1FFF4E14000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFE986D000
trusted library allocation
page read and write
11DC8B7C000
heap
page read and write
1FFEA963000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE7579000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFE9289000
trusted library allocation
page read and write
1FFEA80B000
trusted library allocation
page read and write
1FFEA809000
trusted library allocation
page read and write
1F82A130000
remote allocation
page read and write
1FFF5553000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
1FFF13BC000
trusted library allocation
page read and write
1FFEA9AA000
trusted library allocation
page read and write
1FFE488D000
heap
page read and write
11DC8ABD000
heap
page read and write
1FFE4887000
heap
page read and write
1FFE6333000
trusted library allocation
page read and write
1FFEAC22000
trusted library allocation
page read and write
1FFF179A000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1FFEADAA000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE489D000
heap
page read and write
6B43FE000
stack
page read and write
4EFA9FE000
stack
page read and write
1FFEAAFB000
trusted library allocation
page read and write
22ADD549000
trusted library allocation
page read and write
1FFEB7DB000
trusted library allocation
page read and write
1FFF52F8000
trusted library allocation
page read and write
1FFE48C6000
heap
page read and write
1FFF4E0A000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFEC741000
trusted library allocation
page read and write
1FFEBBEB000
trusted library allocation
page read and write
1FFE9188000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFE9188000
trusted library allocation
page read and write
1FFECA84000
trusted library allocation
page read and write
1FFE91DE000
trusted library allocation
page read and write
1FFEAAFB000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFF37DE000
trusted library allocation
page read and write
1458000
heap
page read and write
1FFE9879000
trusted library allocation
page read and write
1FFEA59B000
trusted library allocation
page read and write
1FFEB57E000
trusted library allocation
page read and write
1FFF552B000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
11DC8B7C000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFE6A86000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE48E8000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFE4906000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFE489F000
heap
page read and write
1FFEA546000
trusted library allocation
page read and write
1FFE48EE000
heap
page read and write
4EF8F2E000
stack
page read and write
1FFE91A5000
trusted library allocation
page read and write
1FFF176B000
trusted library allocation
page read and write
1FFED00C000
trusted library allocation
page read and write
1FFE986F000
trusted library allocation
page read and write
1FFF464D000
trusted library allocation
page read and write
1FFE9EF5000
trusted library allocation
page read and write
1FFE9E51000
trusted library allocation
page read and write
1FFECA80000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFF4B42000
trusted library allocation
page read and write
1FFEA932000
trusted library allocation
page read and write
1FFF547D000
trusted library allocation
page read and write
1FFEA966000
trusted library allocation
page read and write
1FFE9081000
trusted library allocation
page read and write
1FFE488B000
heap
page read and write
1FFE98AD000
trusted library allocation
page read and write
1FFE48F3000
heap
page read and write
1A7D5CD1000
heap
page read and write
1FFEBB3B000
trusted library allocation
page read and write
22ADD513000
trusted library allocation
page read and write
11DC8B85000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFEAAE5000
trusted library allocation
page read and write
1FFF549F000
trusted library allocation
page read and write
1FFE48E9000
heap
page read and write
1FFF4570000
trusted library allocation
page read and write
1FFF4567000
trusted library allocation
page read and write
1FFF4EFB000
trusted library allocation
page read and write
1FFE6A85000
heap
page read and write
1FFEC6B4000
trusted library allocation
page read and write
1FFE98A9000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFF11A1000
trusted library allocation
page read and write
1FFE91E3000
trusted library allocation
page read and write
1FFE6397000
trusted library allocation
page read and write
1FFEA557000
trusted library allocation
page read and write
11DC8B99000
heap
page read and write
1FFE5126000
trusted library allocation
page read and write
1FFE929E000
trusted library allocation
page read and write
1FFEA83F000
trusted library allocation
page read and write
1FFEA9A8000
trusted library allocation
page read and write
1FFE991D000
trusted library allocation
page read and write
1FFF4EDD000
trusted library allocation
page read and write
1FFE48E7000
heap
page read and write
1FFEC6C5000
trusted library allocation
page read and write
1FFF538C000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1FFF13B0000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1FFE6A45000
heap
page read and write
1FFE488D000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFF17B7000
trusted library allocation
page read and write
1FFE91B4000
trusted library allocation
page read and write
1FFE9831000
trusted library allocation
page read and write
1FFEB6A9000
trusted library allocation
page read and write
11DC8B26000
heap
page read and write
1FFE48F8000
heap
page read and write
1FFE4902000
heap
page read and write
1FFECA3E000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE489D000
heap
page read and write
1FFF13A4000
trusted library allocation
page read and write
1F82A61C000
trusted library allocation
page read and write
1FFE48E6000
heap
page read and write
1FFF4EFD000
trusted library allocation
page read and write
1FFEA580000
trusted library allocation
page read and write
1FFF18EA000
trusted library allocation
page read and write
1FFE675F000
trusted library allocation
page read and write
1FFE6068000
trusted library allocation
page read and write
1FFF174C000
trusted library allocation
page read and write
1FFF37CA000
trusted library allocation
page read and write
1FFEA539000
trusted library allocation
page read and write
1FFEA510000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1FFED584000
trusted library allocation
page read and write
1FFE50F6000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFF5676000
trusted library allocation
page read and write
1FFF591D000
heap
page read and write
1FFE4908000
heap
page read and write
1FFEA998000
trusted library allocation
page read and write
1FFEA9B7000
trusted library allocation
page read and write
11DC8B20000
heap
page read and write
1FFEADCB000
trusted library allocation
page read and write
1FFF54DE000
trusted library allocation
page read and write
4EFBA7E000
stack
page read and write
1FFE5117000
trusted library allocation
page read and write
1FFE4898000
heap
page read and write
1FFE489F000
heap
page read and write
11DC7E5C000
trusted library allocation
page read and write
1FFEA87C000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFEB416000
trusted library allocation
page read and write
1FFF106A000
trusted library allocation
page read and write
1FFEABAC000
trusted library allocation
page read and write
1FFF45B3000
trusted library allocation
page read and write
1FFE917A000
trusted library allocation
page read and write
1FFF46DF000
trusted library allocation
page read and write
1FFEA99A000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFE48B9000
heap
page read and write
1FFEA985000
trusted library allocation
page read and write
1FFF5495000
trusted library allocation
page read and write
11DC7E76000
trusted library allocation
page read and write
11DC7E9F000
trusted library allocation
page read and write
1FFF457C000
trusted library allocation
page read and write
1FFE6A4E000
heap
page read and write
1FFE4AF6000
trusted library allocation
page read and write
1FFF1133000
trusted library allocation
page read and write
1FFE9EF5000
trusted library allocation
page read and write
1FFEA4F4000
trusted library allocation
page read and write
1FFE4902000
heap
page read and write
229057A0000
heap
page read and write
1FFF53AC000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
4EF8FEE000
unkown
page readonly
1FFE9E81000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFE6A32000
heap
page read and write
1FFE9E7A000
trusted library allocation
page read and write
1FFEA97C000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFF58F6000
heap
page read and write
9EE227E000
stack
page read and write
1FFE48B6000
heap
page read and write
11DC83F0000
trusted library allocation
page read and write
1FFE61E9000
trusted library allocation
page read and write
1FFF55A3000
trusted library allocation
page read and write
304000
unkown
page readonly
22ADD0C0000
unclassified section
page readonly
1FFE674D000
trusted library allocation
page read and write
22ADD340000
heap
page read and write
1FFE489F000
heap
page read and write
1FFE9E2D000
trusted library allocation
page read and write
1FFEA5B4000
trusted library allocation
page read and write
1FFF18E5000
trusted library allocation
page read and write
1FFEC786000
trusted library allocation
page read and write
1FFE6A49000
heap
page read and write
1FFE48ED000
heap
page read and write
1FFECA80000
trusted library allocation
page read and write
1FFF45AA000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFE489D000
heap
page read and write
1FFEB4F7000
trusted library allocation
page read and write
1FFF4555000
trusted library allocation
page read and write
1FFE488A000
heap
page read and write
1FFEA9AA000
trusted library allocation
page read and write
1FFEC9F5000
trusted library allocation
page read and write
1FFE48F1000
heap
page read and write
1FFE48F3000
heap
page read and write
5C173FF000
stack
page read and write
1FFE4899000
heap
page read and write
1FFECAE4000
trusted library allocation
page read and write
1FFE48F4000
heap
page read and write
1FFEB787000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFEB7C5000
trusted library allocation
page read and write
1FFE48EE000
heap
page read and write
37CF0AE1E000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
11DC8B62000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFEA699000
trusted library allocation
page read and write
1FFE60AE000
trusted library allocation
page read and write
1FFE9923000
trusted library allocation
page read and write
1FFF1133000
trusted library allocation
page read and write
1FFF108B000
trusted library allocation
page read and write
1FFECACD000
trusted library allocation
page read and write
1FFE9EE3000
trusted library allocation
page read and write
6B33FE000
stack
page read and write
1FFE48C2000
heap
page read and write
1FFE6A4E000
heap
page read and write
1F82A0C0000
unclassified section
page readonly
1FFE487F000
heap
page read and write
11DC8A41000
heap
page read and write
1FFF119B000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFF1119000
trusted library allocation
page read and write
1FFE94E1000
trusted library allocation
page read and write
1FFE9E81000
trusted library allocation
page read and write
1FFE6075000
trusted library allocation
page read and write
1FFE48FD000
heap
page read and write
1FFE48EE000
heap
page read and write
1FFEA5F6000
trusted library allocation
page read and write
11DC8ABF000
heap
page read and write
1FFEA5B9000
trusted library allocation
page read and write
1FFEA93C000
trusted library allocation
page read and write
1FFE51B0000
trusted library allocation
page read and write
11DC7C90000
heap
page read and write
1FFF546F000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFF15B6000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFECC3E000
trusted library allocation
page read and write
1FFEABF5000
trusted library allocation
page read and write
3D01000
heap
page read and write
1FFF15B8000
trusted library allocation
page read and write
1FFEBB90000
trusted library allocation
page read and write
1FFE91BB000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFF4EAF000
trusted library allocation
page read and write
1FFEA97C000
trusted library allocation
page read and write
1FFF4555000
trusted library allocation
page read and write
1FFED56D000
trusted library allocation
page read and write
11DC8B29000
heap
page read and write
22ADD55D000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE90A7000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE4896000
heap
page read and write
1FFF4BC8000
trusted library allocation
page read and write
1FFEAA0D000
trusted library allocation
page read and write
11CF000
stack
page read and write
1FFEAD83000
trusted library allocation
page read and write
1FFF37E0000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
11DC7E64000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE6A87000
heap
page read and write
1FFE48BB000
heap
page read and write
1FFF4BF9000
trusted library allocation
page read and write
1FFE4898000
heap
page read and write
1FFEADA7000
trusted library allocation
page read and write
1FFEB55B000
trusted library allocation
page read and write
1FFE48A0000
heap
page read and write
3513CB503000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFF129B000
trusted library allocation
page read and write
1FFEA5FD000
trusted library allocation
page read and write
1FFEABF0000
trusted library allocation
page read and write
1FFF11E9000
trusted library allocation
page read and write
11EF000
stack
page read and write
1FFF4B42000
trusted library allocation
page read and write
1FFEC9F0000
trusted library allocation
page read and write
1FFF4E53000
trusted library allocation
page read and write
1FFE751D000
trusted library allocation
page read and write
1FFE998E000
trusted library allocation
page read and write
1FFE91AD000
trusted library allocation
page read and write
1FFF37E4000
trusted library allocation
page read and write
1FFF558C000
trusted library allocation
page read and write
1FFEA998000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFEAA20000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFF11CF000
trusted library allocation
page read and write
1FFE9804000
trusted library allocation
page read and write
1FFF45E5000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
2090000
heap
page read and write
CCBFBFF000
stack
page read and write
1FFE4908000
heap
page read and write
1FFF1280000
trusted library allocation
page read and write
1F82A579000
trusted library allocation
page read and write
1FFEB4A4000
trusted library allocation
page read and write
1FFEA5D4000
trusted library allocation
page read and write
1FFE61C2000
trusted library allocation
page read and write
1FFEA958000
trusted library allocation
page read and write
1FFF18FC000
trusted library allocation
page read and write
1FFF4EE9000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFF136F000
trusted library allocation
page read and write
1FFEA5B2000
trusted library allocation
page read and write
9EE083C000
stack
page read and write
1F82A700000
heap
page read and write
1FFF2C4D000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE9188000
trusted library allocation
page read and write
1FFECCAB000
trusted library allocation
page read and write
1FFE607C000
trusted library allocation
page read and write
1FFEC649000
trusted library allocation
page read and write
11DC7FD4000
heap
page read and write
1FFE487F000
heap
page read and write
1FFEB5C3000
trusted library allocation
page read and write
1FFE94FD000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFECAEA000
trusted library allocation
page read and write
1FFEBCB8000
trusted library allocation
page read and write
1FFE4902000
heap
page read and write
1FFF1078000
trusted library allocation
page read and write
1FFE6A0A000
heap
page read and write
1FFEBBE2000
trusted library allocation
page read and write
1FFE91CA000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1A7D42D2000
heap
page read and write
1FFE488F000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFE9E2F000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE99BD000
trusted library allocation
page read and write
1FFEA843000
trusted library allocation
page read and write
1FFE63DC000
trusted library allocation
page read and write
1FFF4595000
trusted library allocation
page read and write
1FFE4892000
heap
page read and write
1FFF4E34000
trusted library allocation
page read and write
22905A00000
trusted library allocation
page read and write
1FFE907F000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFEB40E000
trusted library allocation
page read and write
11DC8AA0000
heap
page read and write
1FFEC65E000
trusted library allocation
page read and write
1FFE9820000
trusted library allocation
page read and write
1FFEA5F8000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
22ADD360000
unclassified section
page readonly
1F82A50D000
trusted library allocation
page read and write
1FFF13C4000
trusted library allocation
page read and write
1FFF14D8000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE9E86000
trusted library allocation
page read and write
1FFEA499000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFE6376000
trusted library allocation
page read and write
1FFEA92D000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFF54B6000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFECCBD000
trusted library allocation
page read and write
1FFE63DD000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFF132F000
trusted library allocation
page read and write
1FFE9EF1000
trusted library allocation
page read and write
1FFE4898000
heap
page read and write
1FFEA4FC000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFE754E000
trusted library allocation
page read and write
1FFEA556000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFF5534000
trusted library allocation
page read and write
1FFEA5E8000
trusted library allocation
page read and write
1FFF457F000
trusted library allocation
page read and write
1FFF1836000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFF4E2C000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFE4892000
heap
page read and write
1FFE4902000
heap
page read and write
1FFEADD0000
trusted library allocation
page read and write
1FFF45AA000
trusted library allocation
page read and write
1FFECAA8000
trusted library allocation
page read and write
11DC83B0000
trusted library allocation
page read and write
1FFF548B000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFEC69A000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
22ADD578000
trusted library allocation
page read and write
1FFE48F3000
heap
page read and write
1FFF456E000
trusted library allocation
page read and write
1FFEADDF000
trusted library allocation
page read and write
1FFF5959000
heap
page read and write
1FFE48B9000
heap
page read and write
1FFF58D1000
heap
page read and write
1FFE98CD000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFEA4CF000
trusted library allocation
page read and write
1FFE48E9000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFF1764000
trusted library allocation
page read and write
1FFE98EF000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1F82A56E000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFF53EE000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
9EDEFD8000
stack
page read and write
1FFE51F5000
trusted library allocation
page read and write
1FFEA876000
trusted library allocation
page read and write
11DC8B3C000
heap
page read and write
1FFEA5EE000
trusted library allocation
page read and write
1FFEC9EE000
trusted library allocation
page read and write
11DC8B7C000
heap
page read and write
1FFEA4EC000
trusted library allocation
page read and write
1FFF5524000
trusted library allocation
page read and write
1FFF4B2E000
trusted library allocation
page read and write
1FFE91FA000
trusted library allocation
page read and write
1FFE9284000
trusted library allocation
page read and write
1FFF13F4000
trusted library allocation
page read and write
1FFE6A0A000
heap
page read and write
231000
unkown
page execute read
1FFF4E34000
trusted library allocation
page read and write
1FFF13C2000
trusted library allocation
page read and write
1FFE9E51000
trusted library allocation
page read and write
1FFEA4FE000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE6395000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
11DC8B20000
heap
page read and write
1399E727000
trusted library allocation
page execute read
1FFF11F5000
trusted library allocation
page read and write
1FFE488D000
heap
page read and write
1FFF4567000
trusted library allocation
page read and write
1FFE91FC000
trusted library allocation
page read and write
1FFEA947000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
11DC8AF9000
heap
page read and write
11DC8BAA000
heap
page read and write
11DC7B60000
heap
page read and write
1FFF5546000
trusted library allocation
page read and write
1FFEA9FE000
trusted library allocation
page read and write
11DC8AA4000
heap
page read and write
1FFE6A86000
heap
page read and write
1FFE487F000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFEADCB000
trusted library allocation
page read and write
1FFE91AD000
trusted library allocation
page read and write
1FFF53DF000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1FFE9E86000
trusted library allocation
page read and write
1FFEA971000
trusted library allocation
page read and write
1FFF2C41000
trusted library allocation
page read and write
1FFE7572000
trusted library allocation
page read and write
1FFE6A1C000
heap
page read and write
1FFEAC22000
trusted library allocation
page read and write
1FFEAA52000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFF5681000
trusted library allocation
page read and write
1FFE9936000
trusted library allocation
page read and write
1FFF18C5000
trusted library allocation
page read and write
1FFEAAD4000
trusted library allocation
page read and write
1FFE4905000
heap
page read and write
1FFF1081000
trusted library allocation
page read and write
1FFEA90E000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFF117B000
trusted library allocation
page read and write
1F82A15A000
heap
page read and write
1FFE980B000
trusted library allocation
page read and write
1FFE983C000
trusted library allocation
page read and write
CCBEBFC000
stack
page read and write
1FFE48A9000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE9879000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFEA59B000
trusted library allocation
page read and write
1FFF569A000
trusted library allocation
page read and write
1FFEAAD4000
trusted library allocation
page read and write
1FFEABE6000
trusted library allocation
page read and write
1FFE48A4000
heap
page read and write
1FFEA705000
trusted library allocation
page read and write
1FFE4898000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFE9E45000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFEADDA000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFE99A8000
trusted library allocation
page read and write
1FFED0E4000
trusted library allocation
page read and write
1FFEA55C000
trusted library allocation
page read and write
1FFEB800000
trusted library allocation
page read and write
1FFEB572000
trusted library allocation
page read and write
1FFEA50C000
trusted library allocation
page read and write
5C16BFE000
stack
page read and write
1FFE99CB000
trusted library allocation
page read and write
1FFECCB9000
trusted library allocation
page read and write
1FFEA9A6000
trusted library allocation
page read and write
1FFE4903000
heap
page read and write
1FFE9172000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFEB4D5000
trusted library allocation
page read and write
11DC8405000
unkown
page execute read
1FFE48C6000
heap
page read and write
1FFE6435000
trusted library allocation
page read and write
1FFE91E6000
trusted library allocation
page read and write
1FFE9E7A000
trusted library allocation
page read and write
1FFEBB64000
trusted library allocation
page read and write
1FFF110F000
trusted library allocation
page read and write
1FFEA9AA000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE4908000
heap
page read and write
1FFEA941000
trusted library allocation
page read and write
1FFEA5F8000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFEA809000
trusted library allocation
page read and write
1FFF54E9000
trusted library allocation
page read and write
11DC8B31000
heap
page read and write
1FFEA481000
trusted library allocation
page read and write
1FFE9851000
trusted library allocation
page read and write
1FFEA99D000
trusted library allocation
page read and write
1FFEA932000
trusted library allocation
page read and write
1FFF13B7000
trusted library allocation
page read and write
1F82A503000
trusted library allocation
page read and write
1FFF4E2C000
trusted library allocation
page read and write
1FFE635D000
trusted library allocation
page read and write
1FFF5546000
trusted library allocation
page read and write
1FFF559F000
trusted library allocation
page read and write
11DC8BB8000
heap
page read and write
1FFE4908000
heap
page read and write
1FFF11F5000
trusted library allocation
page read and write
1FFF569A000
trusted library allocation
page read and write
1FFF58D6000
heap
page read and write
1FFE489D000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFEA51F000
trusted library allocation
page read and write
1FFE9979000
trusted library allocation
page read and write
5C153FE000
stack
page read and write
1FFF107C000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFF55CE000
trusted library allocation
page read and write
1FFE6A83000
heap
page read and write
1FFF5915000
heap
page read and write
11DC7E10000
trusted library allocation
page read and write
1FFEA5C1000
trusted library allocation
page read and write
1FFE9E71000
trusted library allocation
page read and write
1FFE4AEF000
trusted library allocation
page read and write
1FFE96B8000
trusted library allocation
page read and write
1FFE630A000
trusted library allocation
page read and write
1FFE639D000
trusted library allocation
page read and write
6B2ABD000
stack
page read and write
9EE19BE000
stack
page read and write
1FFF142A000
trusted library allocation
page read and write
1FFE63F6000
trusted library allocation
page read and write
1FFE9E8A000
trusted library allocation
page read and write
1FFF557D000
trusted library allocation
page read and write
1FFF5969000
heap
page read and write
1FFEA518000
trusted library allocation
page read and write
1FFED0AC000
trusted library allocation
page read and write
1FFE48EA000
heap
page read and write
1FFE51F5000
trusted library allocation
page read and write
1FFED0C5000
trusted library allocation
page read and write
1FFE511E000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE9E92000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE48E6000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFEACFE000
trusted library allocation
page read and write
1FFF13AB000
trusted library allocation
page read and write
1FFE48B1000
heap
page read and write
1FFEA91C000
trusted library allocation
page read and write
1FFE9842000
trusted library allocation
page read and write
1FFF1425000
trusted library allocation
page read and write
1FFEA892000
trusted library allocation
page read and write
1FFEADB5000
trusted library allocation
page read and write
1FFECAE7000
trusted library allocation
page read and write
1FFE9896000
trusted library allocation
page read and write
1FFEA469000
trusted library allocation
page read and write
1FFF5594000
trusted library allocation
page read and write
1FFEBC93000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
4EF99D8000
stack
page read and write
1FFE4881000
heap
page read and write
1FFE48F7000
heap
page read and write
1FFF549F000
trusted library allocation
page read and write
1FFF13A7000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
1FFEAAD4000
trusted library allocation
page read and write
1FFF56AB000
trusted library allocation
page read and write
1FFEAABB000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE6A86000
heap
page read and write
1FFE48BB000
heap
page read and write
1FFF1069000
trusted library allocation
page read and write
1FFF10C9000
trusted library allocation
page read and write
1FFF45EF000
trusted library allocation
page read and write
1FFF11E8000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE488D000
heap
page read and write
1F82A547000
trusted library allocation
page read and write
1FFF56C2000
trusted library allocation
page read and write
1FFEAA4B000
trusted library allocation
page read and write
1FFE4898000
heap
page read and write
1FFF11C7000
trusted library allocation
page read and write
1399E6D1000
trusted library allocation
page execute read
1FFEB638000
trusted library allocation
page read and write
1FFF52E0000
trusted library allocation
page read and write
1FFEA4CF000
trusted library allocation
page read and write
1FFECA52000
trusted library allocation
page read and write
1FFE9824000
trusted library allocation
page read and write
1FFE99A8000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFF53AC000
trusted library allocation
page read and write
1FFF133F000
trusted library allocation
page read and write
1FFF117A000
trusted library allocation
page read and write
1FFEAC7E000
trusted library allocation
page read and write
1FFEAD9E000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFEA702000
trusted library allocation
page read and write
1FFEA592000
trusted library allocation
page read and write
1F82A360000
unclassified section
page readonly
1FFEB6FE000
trusted library allocation
page read and write
1FFF2CA7000
trusted library allocation
page read and write
1FFED157000
trusted library allocation
page read and write
11DC7E6F000
trusted library allocation
page read and write
1FFF453D000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1FFEB7F6000
trusted library allocation
page read and write
1FFF4BF9000
trusted library allocation
page read and write
1FFF18E5000
trusted library allocation
page read and write
1FFEA9D3000
trusted library allocation
page read and write
1FFE917A000
trusted library allocation
page read and write
1FFF110A000
trusted library allocation
page read and write
1FFF13A7000
trusted library allocation
page read and write
1FFE913F000
trusted library allocation
page read and write
1FFF5398000
trusted library allocation
page read and write
11DC8B28000
heap
page read and write
11DC8B31000
heap
page read and write
1FFEAAE2000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
1FFE6393000
trusted library allocation
page read and write
1FFEA9F5000
trusted library allocation
page read and write
1FFEC62F000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFE92A1000
trusted library allocation
page read and write
1FFEA55C000
trusted library allocation
page read and write
1FFEB505000
trusted library allocation
page read and write
1FFF4673000
trusted library allocation
page read and write
1FFE9988000
trusted library allocation
page read and write
1FFEB40E000
trusted library allocation
page read and write
1FFF18DE000
trusted library allocation
page read and write
1FFEA9A6000
trusted library allocation
page read and write
1FFE4AC4000
trusted library allocation
page read and write
1FFE6075000
trusted library allocation
page read and write
1FFEC67D000
trusted library allocation
page read and write
1FFECA8D000
trusted library allocation
page read and write
1FFECAF9000
trusted library allocation
page read and write
1FFEA9D0000
trusted library allocation
page read and write
1F82A581000
trusted library allocation
page read and write
1A7D4510000
heap
page read and write
11DC8B99000
heap
page read and write
1FFE48ED000
heap
page read and write
2290576A000
heap
page read and write
11DC7CD0000
heap
page readonly
1FFE48E8000
heap
page read and write
1FFE99FC000
trusted library allocation
page read and write
11DC8B99000
heap
page read and write
1FFEA50A000
trusted library allocation
page read and write
5C15BFE000
stack
page read and write
1FFE99C9000
trusted library allocation
page read and write
1FFEA957000
trusted library allocation
page read and write
1FFF53FE000
trusted library allocation
page read and write
1A7D42DA000
heap
page read and write
1FFEA9C9000
trusted library allocation
page read and write
1FFF13DA000
trusted library allocation
page read and write
22ADD120000
remote allocation
page read and write
1FFE6A3C000
heap
page read and write
1FFEAD00000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
11DC8ACD000
heap
page read and write
1FFE9971000
trusted library allocation
page read and write
1FFF2D01000
trusted library allocation
page read and write
1FFE75CA000
trusted library allocation
page read and write
1FFEA48E000
trusted library allocation
page read and write
1FFE9E8C000
trusted library allocation
page read and write
1F82A55D000
trusted library allocation
page read and write
1FFE63BE000
trusted library allocation
page read and write
1FFEADE2000
trusted library allocation
page read and write
1FFE51F0000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFE48B9000
heap
page read and write
1FFEA4C2000
trusted library allocation
page read and write
1FFEA892000
trusted library allocation
page read and write
1FFE91E6000
trusted library allocation
page read and write
1FFF2D2E000
trusted library allocation
page read and write
1FFE9168000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE4891000
heap
page read and write
1FFE63C7000
trusted library allocation
page read and write
1FFF544D000
trusted library allocation
page read and write
1FFF5932000
heap
page read and write
1FFEC6CF000
trusted library allocation
page read and write
1FFE6A15000
heap
page read and write
1FFE6A15000
heap
page read and write
1FFF539C000
trusted library allocation
page read and write
1FFE754E000
trusted library allocation
page read and write
1FFEA598000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFEA9B7000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE918F000
trusted library allocation
page read and write
1FFEAA3B000
trusted library allocation
page read and write
1FFF543F000
trusted library allocation
page read and write
1FFEB64B000
trusted library allocation
page read and write
1FFE6A2E000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFEADEE000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFE91BB000
trusted library allocation
page read and write
1FFE9EF5000
trusted library allocation
page read and write
1FFF2CE4000
trusted library allocation
page read and write
1FFEA579000
trusted library allocation
page read and write
1FFF58D1000
heap
page read and write
1FFF4567000
trusted library allocation
page read and write
1FFE6343000
trusted library allocation
page read and write
1FFEA4CF000
trusted library allocation
page read and write
22ADD5AB000
trusted library allocation
page read and write
1FFE928F000
trusted library allocation
page read and write
1FFEA966000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE99CB000
trusted library allocation
page read and write
1F82A33F000
unclassified section
page read and write
1FFEA4F1000
trusted library allocation
page read and write
1A7D42BD000
heap
page read and write
1FFE90D6000
trusted library allocation
page read and write
1FFECA82000
trusted library allocation
page read and write
11DC8ACA000
heap
page read and write
1FFF13E9000
trusted library allocation
page read and write
1FFF14A0000
trusted library allocation
page read and write
1FFE48F2000
heap
page read and write
1FFE489D000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFEA691000
trusted library allocation
page read and write
1FFF5357000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE6A85000
heap
page read and write
1FFEA9AA000
trusted library allocation
page read and write
1FFEAA73000
trusted library allocation
page read and write
1FFE9879000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFE60AE000
trusted library allocation
page read and write
1FFEA4C2000
trusted library allocation
page read and write
1FFECA84000
trusted library allocation
page read and write
1FFE48A4000
heap
page read and write
1FFEB4F2000
trusted library allocation
page read and write
1FFE48F3000
heap
page read and write
1FFEA50A000
trusted library allocation
page read and write
1FFE9E2D000
trusted library allocation
page read and write
1FFE6A56000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFE983F000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE48EB000
heap
page read and write
1FFEA4F4000
trusted library allocation
page read and write
1FFEC65C000
trusted library allocation
page read and write
1FFEBBC7000
trusted library allocation
page read and write
1FFE488D000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFF5360000
trusted library allocation
page read and write
1FFE48A4000
heap
page read and write
11DC8AA0000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE4886000
heap
page read and write
1FFF4E47000
trusted library allocation
page read and write
1FFE636E000
trusted library allocation
page read and write
1FFF1085000
trusted library allocation
page read and write
11DC840E000
unkown
page execute read
1FFECA1F000
trusted library allocation
page read and write
1FFF13CE000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE48FD000
heap
page read and write
1FFEA55C000
trusted library allocation
page read and write
1FFE639D000
trusted library allocation
page read and write
1FFEA5EC000
trusted library allocation
page read and write
1FFF53C3000
trusted library allocation
page read and write
1FFEA59B000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE9873000
trusted library allocation
page read and write
1FFEAE00000
trusted library allocation
page read and write
1FFEBB06000
trusted library allocation
page read and write
1FFE6A4E000
heap
page read and write
1FFE48F0000
heap
page read and write
1FFEADFA000
trusted library allocation
page read and write
1FFEA56B000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
9EE2A7E000
unkown
page readonly
1FFEA9A1000
trusted library allocation
page read and write
1FFEC7F7000
trusted library allocation
page read and write
1FFF1138000
trusted library allocation
page read and write
1FFECA7E000
trusted library allocation
page read and write
1FFF4555000
trusted library allocation
page read and write
1FFF1343000
trusted library allocation
page read and write
1FFE9289000
trusted library allocation
page read and write
1FFE92D3000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFF132D000
trusted library allocation
page read and write
11DC8B32000
heap
page read and write
1FFF1746000
trusted library allocation
page read and write
1FFE488F000
heap
page read and write
22ADD51A000
trusted library allocation
page read and write
1FFEBB60000
trusted library allocation
page read and write
1FFF4FE1000
trusted library allocation
page read and write
1F82A0D0000
unclassified section
page readonly
1FFE91BB000
trusted library allocation
page read and write
1FFEAA0A000
trusted library allocation
page read and write
1FFE98F2000
trusted library allocation
page read and write
22ADD707000
trusted library allocation
page read and write
1FFE9950000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFF15F7000
trusted library allocation
page read and write
1FFF1425000
trusted library allocation
page read and write
1FFE9916000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFF5577000
trusted library allocation
page read and write
22ADD511000
trusted library allocation
page read and write
1FFEBCF5000
trusted library allocation
page read and write
1FFE48F3000
heap
page read and write
1FFE48DD000
heap
page read and write
2F2000
unkown
page readonly
1FFEA421000
trusted library allocation
page read and write
1FFEA408000
trusted library allocation
page read and write
1FFE6787000
trusted library allocation
page read and write
1FFEB55F000
trusted library allocation
page read and write
1FFF45AA000
trusted library allocation
page read and write
1204000
heap
page read and write
1FFEA9A8000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFEA9C9000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFE8E00000
trusted library allocation
page read and write
1FFE913D000
trusted library allocation
page read and write
1FFEAA0A000
trusted library allocation
page read and write
1FFEA4F4000
trusted library allocation
page read and write
1FFEA437000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFEC7BF000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFF55D1000
trusted library allocation
page read and write
1FFF4FCF000
trusted library allocation
page read and write
1FFE604F000
trusted library allocation
page read and write
1FFEC6C1000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
9EE1A7E000
unkown
page readonly
1FFF15C3000
trusted library allocation
page read and write
1FFF18FD000
trusted library allocation
page read and write
1FFE99C9000
trusted library allocation
page read and write
1FFEAD91000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFF557D000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFE91CA000
trusted library allocation
page read and write
1F82A5B5000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
4EFCA7E000
stack
page read and write
1FFF4F3B000
trusted library allocation
page read and write
1FFEC9F9000
trusted library allocation
page read and write
1442000
heap
page read and write
1FFF4527000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFEAA52000
trusted library allocation
page read and write
1FFF1178000
trusted library allocation
page read and write
1FFF159E000
trusted library allocation
page read and write
1FFE609C000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1FFEA9CD000
trusted library allocation
page read and write
6B2B7E000
unkown
page readonly
6B11D8000
stack
page read and write
1FFE91E3000
trusted library allocation
page read and write
1FFE75E0000
trusted library allocation
page read and write
1FFF1758000
trusted library allocation
page read and write
1FFEAB6C000
trusted library allocation
page read and write
11DC8B26000
heap
page read and write
1FFF4FD3000
trusted library allocation
page read and write
1FFE7563000
trusted library allocation
page read and write
22ADD5DB000
trusted library allocation
page read and write
1FFEA6B1000
trusted library allocation
page read and write
142F000
heap
page read and write
1FFEC6BA000
trusted library allocation
page read and write
1FFEA92D000
trusted library allocation
page read and write
1FFE9836000
trusted library allocation
page read and write
1FFE9971000
trusted library allocation
page read and write
1FFF59B1000
heap
page read and write
1FFE601F000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFE489F000
heap
page read and write
1FFF5594000
trusted library allocation
page read and write
1FFF4659000
trusted library allocation
page read and write
1FFEADD8000
trusted library allocation
page read and write
1204000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFEB56F000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE9161000
trusted library allocation
page read and write
1FFF15C3000
trusted library allocation
page read and write
1F82A5CA000
trusted library allocation
page read and write
1FFF11A7000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
11DC7FD0000
heap
page read and write
1FFF2C0C000
trusted library allocation
page read and write
1FFE61D5000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFF559D000
trusted library allocation
page read and write
1FFE63C7000
trusted library allocation
page read and write
9EE07FE000
unkown
page readonly
1FFEB587000
trusted library allocation
page read and write
1FFE48C6000
heap
page read and write
1FFEA4F1000
trusted library allocation
page read and write
1FFE90A7000
trusted library allocation
page read and write
22ADD600000
heap
page read and write
1FFF557D000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFE48F7000
heap
page read and write
1FFE6A87000
heap
page read and write
1FFEAA04000
trusted library allocation
page read and write
1FFEBB94000
trusted library allocation
page read and write
1FFEABF0000
trusted library allocation
page read and write
13A0000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFEADC6000
trusted library allocation
page read and write
1FFEA5E4000
trusted library allocation
page read and write
1FFF53FE000
trusted library allocation
page read and write
11DC8AA0000
heap
page read and write
1FFE48DD000
heap
page read and write
1A7D42DA000
heap
page read and write
1FFE48ED000
heap
page read and write
1FFEADE2000
trusted library allocation
page read and write
1FFE9296000
trusted library allocation
page read and write
1FFF457C000
trusted library allocation
page read and write
1FFE4892000
heap
page read and write
1FFF55CC000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFE48E9000
heap
page read and write
1FFECFA2000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE4897000
heap
page read and write
200E000
stack
page read and write
1FFE48E5000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFEA59F000
trusted library allocation
page read and write
1FFE7563000
trusted library allocation
page read and write
1FFE63AA000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
1FFEA86F000
trusted library allocation
page read and write
1FFEBBF3000
trusted library allocation
page read and write
1FFF552E000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFF4584000
trusted library allocation
page read and write
22ADD220000
unclassified section
page read and write
1FFE916A000
trusted library allocation
page read and write
1FFE6A2C000
heap
page read and write
1FFE6A7B000
heap
page read and write
1FFEB675000
trusted library allocation
page read and write
1FFE9BBC000
trusted library allocation
page read and write
1FFEA5E4000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFE51DF000
trusted library allocation
page read and write
11DC8B6E000
heap
page read and write
1FFEADDF000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFF594E000
heap
page read and write
1FFE9899000
trusted library allocation
page read and write
1FFEAAE7000
trusted library allocation
page read and write
1FFEA539000
trusted library allocation
page read and write
1FFE9830000
trusted library allocation
page read and write
1FFEADB5000
trusted library allocation
page read and write
1FFF112B000
trusted library allocation
page read and write
1FFE91AD000
trusted library allocation
page read and write
1FFF1185000
trusted library allocation
page read and write
1FFE9E2D000
trusted library allocation
page read and write
1FFE638E000
trusted library allocation
page read and write
1FFF54DE000
trusted library allocation
page read and write
1A7D42A0000
heap
page read and write
1FFEA5D4000
trusted library allocation
page read and write
1FFEC6FA000
trusted library allocation
page read and write
1FFE48F8000
heap
page read and write
11DC7B08000
remote allocation
page execute read
1FFEA9A6000
trusted library allocation
page read and write
1FFE91A3000
trusted library allocation
page read and write
1FFE9845000
trusted library allocation
page read and write
1F82A1F0000
heap
page read and write
1FFE94DA000
trusted library allocation
page read and write
1FFF58D1000
heap
page read and write
1FFE489D000
heap
page read and write
1FFF18F6000
trusted library allocation
page read and write
1FFE5071000
trusted library allocation
page read and write
1FFE6A2D000
heap
page read and write
1FFE491A000
heap
page read and write
1FFE4898000
heap
page read and write
1FFEC69A000
trusted library allocation
page read and write
1FFE9E4C000
trusted library allocation
page read and write
1FFEC78C000
trusted library allocation
page read and write
22ADD1D3000
heap
page read and write
1FFE99F1000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFEA413000
trusted library allocation
page read and write
1FFF4B29000
trusted library allocation
page read and write
1FFF15BD000
trusted library allocation
page read and write
1F82A615000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
4EFB1FE000
unkown
page readonly
4EFC27E000
unkown
page readonly
1FFE99A8000
trusted library allocation
page read and write
1FFEA5C9000
trusted library allocation
page read and write
1FFE48F8000
heap
page read and write
1FFE4882000
heap
page read and write
1FFF53DF000
trusted library allocation
page read and write
2FC000
unkown
page write copy
1FFE4908000
heap
page read and write
1FFE9E9C000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFE5182000
trusted library allocation
page read and write
9EE1A3E000
stack
page read and write
1FFE489F000
heap
page read and write
1FFE605A000
trusted library allocation
page read and write
1FFF18D6000
trusted library allocation
page read and write
1FFE4902000
heap
page read and write
1FFEA9B7000
trusted library allocation
page read and write
1FFF608A000
trusted library allocation
page read and write
1FFED043000
trusted library allocation
page read and write
1A7D41B0000
heap
page read and write
1FFF136C000
trusted library allocation
page read and write
1FFE6A34000
heap
page read and write
1FFEB5EE000
trusted library allocation
page read and write
1FFF5916000
heap
page read and write
1FFE51D6000
trusted library allocation
page read and write
1FFEAA08000
trusted library allocation
page read and write
1FFE9873000
trusted library allocation
page read and write
1FFF52D8000
trusted library allocation
page read and write
1FFF11C2000
trusted library allocation
page read and write
1FFE9927000
trusted library allocation
page read and write
1FFF545A000
trusted library allocation
page read and write
1FFF176B000
trusted library allocation
page read and write
1FFE631D000
trusted library allocation
page read and write
1466000
heap
page read and write
1FFEA48C000
trusted library allocation
page read and write
22905890000
heap
page read and write
1FFE67FA000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE488D000
heap
page read and write
1FFF4F54000
trusted library allocation
page read and write
1FFF55D4000
trusted library allocation
page read and write
4EF8F6E000
unkown
page readonly
1FFE63F6000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFEAAD4000
trusted library allocation
page read and write
1FFE91C1000
trusted library allocation
page read and write
1FFEC6AF000
trusted library allocation
page read and write
11DC8BB8000
heap
page read and write
1FFF4F73000
trusted library allocation
page read and write
1FFF1095000
trusted library allocation
page read and write
1FFF534A000
trusted library allocation
page read and write
1FFE92A1000
trusted library allocation
page read and write
1FFF14D9000
trusted library allocation
page read and write
1FFE91A3000
trusted library allocation
page read and write
1FFE9867000
trusted library allocation
page read and write
1FFEB4EC000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFEA938000
trusted library allocation
page read and write
11DC8AA3000
heap
page read and write
1FFE61B9000
trusted library allocation
page read and write
1FFF3789000
trusted library allocation
page read and write
1FFE984A000
trusted library allocation
page read and write
1FFE9875000
trusted library allocation
page read and write
1FFEB416000
trusted library allocation
page read and write
1FFED06D000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
22ADD573000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
1FFE6399000
trusted library allocation
page read and write
1FFEA94A000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
11DC8B40000
heap
page read and write
11DC8B58000
heap
page read and write
1FFEA972000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFEA87C000
trusted library allocation
page read and write
6B2A7E000
unkown
page readonly
1FFE5200000
trusted library allocation
page read and write
1FFEB5F5000
trusted library allocation
page read and write
1FFF13AE000
trusted library allocation
page read and write
1FFEACF9000
trusted library allocation
page read and write
1FFE48FF000
heap
page read and write
1FFF558C000
trusted library allocation
page read and write
1FFEB446000
trusted library allocation
page read and write
1FFE4896000
heap
page read and write
1FFECCF5000
trusted library allocation
page read and write
1FFE91AD000
trusted library allocation
page read and write
1FFE4AAB000
trusted library allocation
page read and write
1FFF4EF8000
trusted library allocation
page read and write
3950000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE4881000
heap
page read and write
11DC8B31000
heap
page read and write
1FFEA5D4000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE6754000
trusted library allocation
page read and write
1FFE983C000
trusted library allocation
page read and write
1FFE48A4000
heap
page read and write
1FFF462D000
trusted library allocation
page read and write
1FFE945D000
trusted library allocation
page read and write
1FFEAD8F000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFF1341000
trusted library allocation
page read and write
1FFE99D5000
trusted library allocation
page read and write
1FFF58D1000
heap
page read and write
1F82A560000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFF3787000
trusted library allocation
page read and write
1FFF174A000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFEA565000
trusted library allocation
page read and write
1FFE9138000
trusted library allocation
page read and write
1FFF1115000
trusted library allocation
page read and write
1FFF13C4000
trusted library allocation
page read and write
1FFF138C000
trusted library allocation
page read and write
1FFF1748000
trusted library allocation
page read and write
1FFEC7A2000
trusted library allocation
page read and write
1FFF1195000
trusted library allocation
page read and write
1FFF17F3000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFF4E22000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFE4881000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFE984B000
trusted library allocation
page read and write
1FFEADB5000
trusted library allocation
page read and write
1FFE9892000
trusted library allocation
page read and write
1FFE98C8000
trusted library allocation
page read and write
1FFE91BB000
trusted library allocation
page read and write
1FFE9040000
trusted library allocation
page read and write
1FFEA539000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE48C6000
heap
page read and write
1FFF4EA1000
trusted library allocation
page read and write
1FFEA96F000
trusted library allocation
page read and write
1FFF45E5000
trusted library allocation
page read and write
1FFE91D6000
trusted library allocation
page read and write
1FFF5682000
trusted library allocation
page read and write
1FFE48B1000
heap
page read and write
1FFE4881000
heap
page read and write
1FFF4577000
trusted library allocation
page read and write
1FFE6A85000
heap
page read and write
1FFF45B3000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFEABE6000
trusted library allocation
page read and write
6B4BFE000
unkown
page readonly
1FFECAE4000
trusted library allocation
page read and write
1FFE90A0000
trusted library allocation
page read and write
1FFE908D000
trusted library allocation
page read and write
1FFF569A000
trusted library allocation
page read and write
1FFEAAE4000
trusted library allocation
page read and write
1FFF13AE000
trusted library allocation
page read and write
1FFECFE5000
trusted library allocation
page read and write
1FFE91EA000
trusted library allocation
page read and write
1FFE9867000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFE67D1000
trusted library allocation
page read and write
1FFF4E53000
trusted library allocation
page read and write
22ADD505000
trusted library allocation
page read and write
11DC7A90000
unclassified section
page readonly
1FFE679A000
trusted library allocation
page read and write
1FFEC714000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFF456E000
trusted library allocation
page read and write
1FFEA4EC000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE91EC000
trusted library allocation
page read and write
1FFEA9FE000
trusted library allocation
page read and write
1FFE6376000
trusted library allocation
page read and write
1FFED59E000
trusted library allocation
page read and write
1FFF1764000
trusted library allocation
page read and write
1FFE675C000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFE9159000
trusted library allocation
page read and write
1FFF4E54000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1FFEA562000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFE4891000
heap
page read and write
1FFEA6CC000
trusted library allocation
page read and write
11DC8AA9000
heap
page read and write
1FFEB5C5000
trusted library allocation
page read and write
1FFE4898000
heap
page read and write
1FFE61C7000
trusted library allocation
page read and write
1FFF4547000
trusted library allocation
page read and write
1FFE918B000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFF566F000
trusted library allocation
page read and write
1FFE48EE000
heap
page read and write
1FFE63A6000
trusted library allocation
page read and write
1399E72E000
trusted library allocation
page execute read
1FFEA5E8000
trusted library allocation
page read and write
1FFE4898000
heap
page read and write
1FFEA9B1000
trusted library allocation
page read and write
1FFF548B000
trusted library allocation
page read and write
1FFE91B4000
trusted library allocation
page read and write
1FFE605A000
trusted library allocation
page read and write
1FFE48FE000
heap
page read and write
1FFEC7FC000
trusted library allocation
page read and write
1FFEACE7000
trusted library allocation
page read and write
1FFE92D0000
trusted library allocation
page read and write
1FFE4896000
heap
page read and write
1FFEA596000
trusted library allocation
page read and write
1FFEA5E6000
trusted library allocation
page read and write
22ADD562000
trusted library allocation
page read and write
1FFE48F5000
heap
page read and write
1FFF6037000
trusted library allocation
page read and write
1FFEA9AA000
trusted library allocation
page read and write
1FFEC6FE000
trusted library allocation
page read and write
1FFEB66D000
trusted library allocation
page read and write
39B4000
heap
page read and write
1FFF10B9000
trusted library allocation
page read and write
1FFEAA21000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE489D000
heap
page read and write
1FFEA837000
trusted library allocation
page read and write
1FFECADD000
trusted library allocation
page read and write
1FFEC728000
trusted library allocation
page read and write
1FFEAA1E000
trusted library allocation
page read and write
1F82A523000
trusted library allocation
page read and write
1FFF1333000
trusted library allocation
page read and write
1FFE9993000
trusted library allocation
page read and write
1FFEA49A000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1FFE9EF8000
trusted library allocation
page read and write
1FFEBB68000
trusted library allocation
page read and write
1FFE4884000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFEA99A000
trusted library allocation
page read and write
1FFE7561000
trusted library allocation
page read and write
1FFE99CB000
trusted library allocation
page read and write
1F82A5BA000
trusted library allocation
page read and write
11DC7EAC000
trusted library allocation
page read and write
1FFE4920000
heap
page read and write
1FFEA93C000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFE48F7000
heap
page read and write
1FFE48E7000
heap
page read and write
1FFEC6A5000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFF11F1000
trusted library allocation
page read and write
1FFF18F8000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE75F9000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1FFF45E5000
trusted library allocation
page read and write
1FFE61BE000
trusted library allocation
page read and write
1FFE9164000
trusted library allocation
page read and write
1FFE99B5000
trusted library allocation
page read and write
1F82A638000
trusted library allocation
page read and write
1FFEAC8C000
trusted library allocation
page read and write
1FFF5425000
trusted library allocation
page read and write
1FFECA84000
trusted library allocation
page read and write
1FFE63C1000
trusted library allocation
page read and write
1FFE75D6000
trusted library allocation
page read and write
1FFE92A3000
trusted library allocation
page read and write
11DC8B6B000
heap
page read and write
1FFE4899000
heap
page read and write
1FFE607C000
trusted library allocation
page read and write
1FFE48FF000
heap
page read and write
229058B0000
heap
page read and write
1FFF4F60000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1FFF53F8000
trusted library allocation
page read and write
1FFEC6D9000
trusted library allocation
page read and write
1FFE60AB000
trusted library allocation
page read and write
1FFF3F02000
trusted library allocation
page read and write
1FFE943F000
trusted library allocation
page read and write
1FFE986F000
trusted library allocation
page read and write
1FFEA859000
trusted library allocation
page read and write
1FFEA868000
trusted library allocation
page read and write
1200000
heap
page read and write
1FFE48FD000
heap
page read and write
11DC8429000
unkown
page execute read
1FFE48F3000
heap
page read and write
1FFE9E4C000
trusted library allocation
page read and write
1FFF4E4D000
trusted library allocation
page read and write
1FFE636E000
trusted library allocation
page read and write
22905900000
trusted library allocation
page read and write
1FFE982F000
trusted library allocation
page read and write
1FFF138F000
trusted library allocation
page read and write
1FFE983F000
trusted library allocation
page read and write
1FFE6A5E000
heap
page read and write
1FFEB7ED000
trusted library allocation
page read and write
11DC8ACA000
heap
page read and write
1FFF13AE000
trusted library allocation
page read and write
20B0000
heap
page read and write
1FFF1777000
trusted library allocation
page read and write
11DC8B6B000
heap
page read and write
1F82A150000
heap
page read and write
1FFE91FA000
trusted library allocation
page read and write
1FFF6093000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFE606F000
trusted library allocation
page read and write
1FFEBB37000
trusted library allocation
page read and write
1FFE9182000
trusted library allocation
page read and write
1FFE994C000
trusted library allocation
page read and write
1FFF1368000
trusted library allocation
page read and write
1FFF5941000
heap
page read and write
1FFEBBF8000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFE48F1000
heap
page read and write
1FFF55A3000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE488F000
heap
page read and write
1FFE48E8000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE48F3000
heap
page read and write
1FFEA57F000
trusted library allocation
page read and write
1FFF4F60000
trusted library allocation
page read and write
1FFF5467000
trusted library allocation
page read and write
1FFEA9AF000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1FFEA990000
trusted library allocation
page read and write
1F82A600000
trusted library allocation
page read and write
1FFE91B4000
trusted library allocation
page read and write
1FFF5459000
trusted library allocation
page read and write
1FFEAC78000
trusted library allocation
page read and write
11DC7CF0000
unclassified section
page read and write
1FFE4898000
heap
page read and write
1FFF5941000
heap
page read and write
1FFF55D4000
trusted library allocation
page read and write
1FFEA598000
trusted library allocation
page read and write
1FFED693000
trusted library allocation
page read and write
1FFF55BF000
trusted library allocation
page read and write
1FFF3FA8000
trusted library allocation
page read and write
1FFEC611000
trusted library allocation
page read and write
1FFE4902000
heap
page read and write
1FFE4884000
heap
page read and write
1FFE94C8000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFEA479000
trusted library allocation
page read and write
1F82A5EB000
trusted library allocation
page read and write
1FFEC7A7000
trusted library allocation
page read and write
1FFF13B7000
trusted library allocation
page read and write
1462000
heap
page read and write
1FFEABF5000
trusted library allocation
page read and write
22ADD524000
trusted library allocation
page read and write
1FFEA96A000
trusted library allocation
page read and write
1FFF542A000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
1FFE48F8000
heap
page read and write
1FFEA935000
trusted library allocation
page read and write
1FFEB582000
trusted library allocation
page read and write
1FFE9EA0000
trusted library allocation
page read and write
1FFEACFE000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFE6A85000
heap
page read and write
1FFEB7DD000
trusted library allocation
page read and write
1FFE990F000
trusted library allocation
page read and write
1FFE92F8000
trusted library allocation
page read and write
1FFF5467000
trusted library allocation
page read and write
1FFEB796000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE60AE000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFE4902000
heap
page read and write
1FFF4EC7000
trusted library allocation
page read and write
1FFF18E1000
trusted library allocation
page read and write
1FFEA99D000
trusted library allocation
page read and write
9EE097E000
unkown
page readonly
1FFE48EE000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFF1095000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFF1180000
trusted library allocation
page read and write
1FFED007000
trusted library allocation
page read and write
1FFEA8D3000
trusted library allocation
page read and write
11DC8BB8000
heap
page read and write
1FFE48B1000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFF4546000
trusted library allocation
page read and write
1FFEBCCF000
trusted library allocation
page read and write
1FFE997A000
trusted library allocation
page read and write
1FFE7563000
trusted library allocation
page read and write
1FFEA67D000
trusted library allocation
page read and write
1204000
heap
page read and write
1460000
heap
page read and write
1FFE4886000
heap
page read and write
1FFEA6FC000
trusted library allocation
page read and write
1FFF559D000
trusted library allocation
page read and write
1FFEB7D9000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFF4537000
trusted library allocation
page read and write
1FFF179A000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFE90A7000
trusted library allocation
page read and write
1FFE7563000
trusted library allocation
page read and write
1FFEB5F5000
trusted library allocation
page read and write
1FFF13B0000
trusted library allocation
page read and write
1FFEC6B4000
trusted library allocation
page read and write
1FFE4906000
heap
page read and write
1FFE63F8000
trusted library allocation
page read and write
1458000
heap
page read and write
1FFE90A0000
trusted library allocation
page read and write
1FFE60AB000
trusted library allocation
page read and write
1FFE9182000
trusted library allocation
page read and write
1FFE90D6000
trusted library allocation
page read and write
1FFEB5C6000
trusted library allocation
page read and write
1FFEA9A8000
trusted library allocation
page read and write
1FFF11D8000
trusted library allocation
page read and write
1FFE635D000
trusted library allocation
page read and write
1FFEADA7000
trusted library allocation
page read and write
11DC8BAA000
heap
page read and write
22ADD703000
trusted library allocation
page read and write
1FFEA90A000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE983C000
trusted library allocation
page read and write
1FFE99B5000
trusted library allocation
page read and write
1FFE4902000
heap
page read and write
1A7D5CC5000
heap
page read and write
1FFF4EF8000
trusted library allocation
page read and write
1FFED133000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFE488D000
heap
page read and write
1D3C3F703000
trusted library allocation
page read and write
1FFEA592000
trusted library allocation
page read and write
1FFF4EAF000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE9E9F000
trusted library allocation
page read and write
135E000
stack
page read and write
1FFE517D000
trusted library allocation
page read and write
1FFF4E0A000
trusted library allocation
page read and write
1FFF12D9000
trusted library allocation
page read and write
1FFE607C000
trusted library allocation
page read and write
1FFEA9AA000
trusted library allocation
page read and write
1FFF1081000
trusted library allocation
page read and write
1A50E7C03000
trusted library allocation
page read and write
1FFE99B0000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFEA5F6000
trusted library allocation
page read and write
11DC7B30000
heap
page read and write
1FFE9867000
trusted library allocation
page read and write
1FFF13DE000
trusted library allocation
page read and write
1FFE63F6000
trusted library allocation
page read and write
1FFF59B1000
heap
page read and write
1FFF3000000
trusted library allocation
page read and write
22ADD210000
heap
page readonly
22ADD1B0000
heap
page read and write
1FFEA4B3000
trusted library allocation
page read and write
1FFE9979000
trusted library allocation
page read and write
1FFE6A57000
heap
page read and write
1FFE489D000
heap
page read and write
1FFE9956000
trusted library allocation
page read and write
1FFE48E7000
heap
page read and write
1FFE48DE000
heap
page read and write
11DC8B29000
heap
page read and write
1FFF11CF000
trusted library allocation
page read and write
1FFE9994000
trusted library allocation
page read and write
1FFF13B3000
trusted library allocation
page read and write
1FFF4567000
trusted library allocation
page read and write
1FFEA868000
trusted library allocation
page read and write
1FFE48EA000
heap
page read and write
1FFF546F000
trusted library allocation
page read and write
1FFF17A2000
trusted library allocation
page read and write
1FFEAA7B000
trusted library allocation
page read and write
1FFE6756000
trusted library allocation
page read and write
1FFE48F0000
heap
page read and write
1FFF4FD3000
trusted library allocation
page read and write
1FFF544A000
trusted library allocation
page read and write
1FFE9859000
trusted library allocation
page read and write
11DC7E03000
trusted library allocation
page read and write
1FFE48EF000
heap
page read and write
11DC8B21000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFF2BC8000
trusted library allocation
page read and write
1FFE6A56000
heap
page read and write
1FFF4527000
trusted library allocation
page read and write
1FFE6781000
trusted library allocation
page read and write
1FFF18D8000
trusted library allocation
page read and write
1FFE48EF000
heap
page read and write
1FFF464E000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFF1327000
trusted library allocation
page read and write
1FFEA421000
trusted library allocation
page read and write
1FFE9E46000
trusted library allocation
page read and write
1FFE6A0A000
heap
page read and write
1FFEA4C3000
trusted library allocation
page read and write
1FFECC97000
trusted library allocation
page read and write
1FFE6429000
trusted library allocation
page read and write
1FFEAA4E000
trusted library allocation
page read and write
1FFE7533000
trusted library allocation
page read and write
1FFF13D2000
trusted library allocation
page read and write
1FFE94B9000
trusted library allocation
page read and write
22ADD565000
trusted library allocation
page read and write
1FFEA892000
trusted library allocation
page read and write
1FFF5495000
trusted library allocation
page read and write
1FFE9863000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFE48F2000
heap
page read and write
1FFEA546000
trusted library allocation
page read and write
1FFE51AC000
trusted library allocation
page read and write
11DC8401000
unkown
page execute read
11DC8AA9000
heap
page read and write
1FFEAAFB000
trusted library allocation
page read and write
1FFED5CE000
trusted library allocation
page read and write
1FFF6067000
trusted library allocation
page read and write
1FFEBCEB000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFE4ABF000
trusted library allocation
page read and write
1FFEB781000
trusted library allocation
page read and write
1FFE9998000
trusted library allocation
page read and write
1FFECCF8000
trusted library allocation
page read and write
1FFE91D6000
trusted library allocation
page read and write
1FFEABFD000
trusted library allocation
page read and write
1FFE6A86000
heap
page read and write
1FFE639A000
trusted library allocation
page read and write
1FFF552E000
trusted library allocation
page read and write
1FFF1199000
trusted library allocation
page read and write
1FFE488F000
heap
page read and write
1FFE4899000
heap
page read and write
1FFE99CB000
trusted library allocation
page read and write
1448000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFE489D000
heap
page read and write
1FFF18F1000
trusted library allocation
page read and write
1FFE618C000
trusted library allocation
page read and write
1FFEC693000
trusted library allocation
page read and write
1FFF11E0000
trusted library allocation
page read and write
1FFECC70000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFF18E1000
trusted library allocation
page read and write
1FFE48EE000
heap
page read and write
11DC8AEA000
heap
page read and write
1FFECA67000
trusted library allocation
page read and write
1FFE92B8000
trusted library allocation
page read and write
1FFEDE02000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE7563000
trusted library allocation
page read and write
1FFF18D8000
trusted library allocation
page read and write
1FFF4EAF000
trusted library allocation
page read and write
1FFE9931000
trusted library allocation
page read and write
1FFE9481000
trusted library allocation
page read and write
1FFE9E97000
trusted library allocation
page read and write
1FFE905F000
trusted library allocation
page read and write
1FFEA581000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
1FFE9484000
trusted library allocation
page read and write
1F82A190000
unclassified section
page readonly
1FFE994A000
trusted library allocation
page read and write
1FFE9EDD000
trusted library allocation
page read and write
1204000
heap
page read and write
1FFEA57A000
trusted library allocation
page read and write
1FFE48EE000
heap
page read and write
1FFE48BB000
heap
page read and write
1FFE4882000
heap
page read and write
1FFE60AB000
trusted library allocation
page read and write
1FFECCB3000
trusted library allocation
page read and write
1FFEADAA000
trusted library allocation
page read and write
1FFE99B5000
trusted library allocation
page read and write
1FFE90D6000
trusted library allocation
page read and write
1FFF53F1000
trusted library allocation
page read and write
5C14BFA000
stack
page read and write
1FFE6A56000
heap
page read and write
1FFE48A8000
heap
page read and write
1FFE6385000
trusted library allocation
page read and write
11DC8AE1000
heap
page read and write
1FFE4899000
heap
page read and write
1FFEB7ED000
trusted library allocation
page read and write
1FFF2C43000
trusted library allocation
page read and write
1FFEB7E6000
trusted library allocation
page read and write
11DC7E5F000
trusted library allocation
page read and write
1FFE51DA000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE91F4000
trusted library allocation
page read and write
1FFEA8D3000
trusted library allocation
page read and write
1FFEB562000
trusted library allocation
page read and write
1FFE48F9000
heap
page read and write
1FFE489F000
heap
page read and write
1FFE4891000
heap
page read and write
1FFF13C4000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE61CA000
trusted library allocation
page read and write
1FFE91D6000
trusted library allocation
page read and write
1FFEB7D2000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
1FFF1085000
trusted library allocation
page read and write
1FFE9EF8000
trusted library allocation
page read and write
1FFF1769000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE63C7000
trusted library allocation
page read and write
1FFE9E71000
trusted library allocation
page read and write
1FFE982E000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE6A0A000
heap
page read and write
1FFF14A5000
trusted library allocation
page read and write
1FFE4883000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE9867000
trusted library allocation
page read and write
11DC8AA0000
heap
page read and write
1FFEA556000
trusted library allocation
page read and write
1FFE6A2F000
heap
page read and write
1FFF4567000
trusted library allocation
page read and write
1FFED12E000
trusted library allocation
page read and write
1FFEA56B000
trusted library allocation
page read and write
1FFE4905000
heap
page read and write
1FFE99FC000
trusted library allocation
page read and write
11DC8B99000
heap
page read and write
139E000
stack
page read and write
1FFEACF9000
trusted library allocation
page read and write
1FFF55CE000
trusted library allocation
page read and write
1FFE96CF000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFEAAE7000
trusted library allocation
page read and write
1FFEA530000
trusted library allocation
page read and write
1FFE998A000
trusted library allocation
page read and write
1FFE67BE000
trusted library allocation
page read and write
1FFF45AA000
trusted library allocation
page read and write
1FFEADA5000
trusted library allocation
page read and write
1FFEA87E000
trusted library allocation
page read and write
1438000
heap
page read and write
1FFEBB21000
trusted library allocation
page read and write
1FFF13D4000
trusted library allocation
page read and write
1462000
heap
page read and write
1FFE604F000
trusted library allocation
page read and write
1FFE61E9000
trusted library allocation
page read and write
1FFE6A45000
heap
page read and write
4EFD27E000
unkown
page readonly
1FFE48F2000
heap
page read and write
1FFE90A7000
trusted library allocation
page read and write
1FFEAD91000
trusted library allocation
page read and write
1FFF543C000
trusted library allocation
page read and write
1FFEAA4E000
trusted library allocation
page read and write
1FFE92D4000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFEAA20000
trusted library allocation
page read and write
1FFEA589000
trusted library allocation
page read and write
1FFE48FE000
heap
page read and write
1FFEA994000
trusted library allocation
page read and write
1FFF175A000
trusted library allocation
page read and write
1FFF5544000
trusted library allocation
page read and write
1FFE91D6000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFF1366000
trusted library allocation
page read and write
1FFEADE2000
trusted library allocation
page read and write
1FFEA83F000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFEB4F7000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFF52EC000
trusted library allocation
page read and write
1FFED5F1000
trusted library allocation
page read and write
1FFE606F000
trusted library allocation
page read and write
1FFE63A1000
trusted library allocation
page read and write
1FFE75C4000
trusted library allocation
page read and write
1FFF10B9000
trusted library allocation
page read and write
11DC8A9C000
heap
page read and write
1FFE919C000
trusted library allocation
page read and write
22ADD5F1000
trusted library allocation
page read and write
1FFE48F8000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFED086000
trusted library allocation
page read and write
1FFE9298000
trusted library allocation
page read and write
1FFEC7B7000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE63FE000
trusted library allocation
page read and write
11DC8B63000
heap
page read and write
1FFE490E000
heap
page read and write
1FFF11CA000
trusted library allocation
page read and write
9EE08F8000
stack
page read and write
1FFEA510000
trusted library allocation
page read and write
1FFE61DE000
trusted library allocation
page read and write
1FFEA9A1000
trusted library allocation
page read and write
11DC8B85000
heap
page read and write
1FFE489F000
heap
page read and write
1FFEC7B1000
trusted library allocation
page read and write
1FFEA973000
trusted library allocation
page read and write
1FFF1380000
trusted library allocation
page read and write
1FFE9297000
trusted library allocation
page read and write
1FFE48EE000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFE48EE000
heap
page read and write
1FFF4E4B000
trusted library allocation
page read and write
11DC8AA0000
heap
page read and write
1F82A60C000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFEB5A3000
trusted library allocation
page read and write
11DC7EC7000
trusted library allocation
page read and write
11DC7E0A000
trusted library allocation
page read and write
1FFE91B4000
trusted library allocation
page read and write
11DC7E7A000
trusted library allocation
page read and write
1FFEA4F0000
trusted library allocation
page read and write
1FFF5529000
trusted library allocation
page read and write
9EDFFFE000
stack
page read and write
1FFF11C4000
trusted library allocation
page read and write
1FFEA6AB000
trusted library allocation
page read and write
11DC8ADC000
heap
page read and write
1FFE9057000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFEA5CA000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE6763000
trusted library allocation
page read and write
1FFF544A000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE4891000
heap
page read and write
1FFE61A8000
trusted library allocation
page read and write
1FFE7561000
trusted library allocation
page read and write
1FFF5357000
trusted library allocation
page read and write
1FFE63F0000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE489F000
heap
page read and write
1FFE9E4E000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE91D6000
trusted library allocation
page read and write
1FFECCC4000
trusted library allocation
page read and write
1FFEA88D000
trusted library allocation
page read and write
1FFE9138000
trusted library allocation
page read and write
1FFEAA52000
trusted library allocation
page read and write
1399E761000
trusted library allocation
page execute read
1FFE6A56000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFE4891000
heap
page read and write
1FFED667000
trusted library allocation
page read and write
22ADD503000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFE48E7000
heap
page read and write
1FFF18C8000
trusted library allocation
page read and write
1FFE4AB3000
trusted library allocation
page read and write
1FFF559F000
trusted library allocation
page read and write
1FFE94A0000
trusted library allocation
page read and write
22ADD5A2000
trusted library allocation
page read and write
1FFEA9A1000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFE6437000
trusted library allocation
page read and write
1FFF55D1000
trusted library allocation
page read and write
22ADD576000
trusted library allocation
page read and write
1FFE67CB000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE4891000
heap
page read and write
1FFEAC25000
trusted library allocation
page read and write
1FFE90A0000
trusted library allocation
page read and write
1FFEBBE8000
trusted library allocation
page read and write
1FFEB77D000
trusted library allocation
page read and write
1FFE678C000
trusted library allocation
page read and write
1FFEB7F6000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE487F000
heap
page read and write
1FFEB4D5000
trusted library allocation
page read and write
1FFE997E000
trusted library allocation
page read and write
1FFE4904000
heap
page read and write
1FFEAAD0000
trusted library allocation
page read and write
1FFEADAA000
trusted library allocation
page read and write
1FFF5534000
trusted library allocation
page read and write
1FFEA88D000
trusted library allocation
page read and write
1FFF13A5000
trusted library allocation
page read and write
1FFE6A45000
heap
page read and write
1FFE4899000
heap
page read and write
11DC7CFF000
unclassified section
page read and write
1FFE48A9000
heap
page read and write
1FFEA5C2000
trusted library allocation
page read and write
1FFF1744000
trusted library allocation
page read and write
1FFEA499000
trusted library allocation
page read and write
22ADD500000
trusted library allocation
page read and write
1FFE9E9C000
trusted library allocation
page read and write
6B21FE000
stack
page read and write
1FFE4898000
heap
page read and write
1F82A330000
unclassified section
page read and write
1FFEA5D4000
trusted library allocation
page read and write
1FFEA55C000
trusted library allocation
page read and write
1FFEA9B7000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFE9869000
trusted library allocation
page read and write
1FFE631D000
trusted library allocation
page read and write
1FFE5113000
trusted library allocation
page read and write
1FFE99B0000
trusted library allocation
page read and write
1FFF2C07000
trusted library allocation
page read and write
1FFE9E7A000
trusted library allocation
page read and write
1FFE6A04000
heap
page read and write
1FFF4EA1000
trusted library allocation
page read and write
1FFE988B000
trusted library allocation
page read and write
1FFEADD1000
trusted library allocation
page read and write
1FFEADDA000
trusted library allocation
page read and write
1FFE9E4E000
trusted library allocation
page read and write
1A7D42D1000
heap
page read and write
1FFE4ADF000
trusted library allocation
page read and write
1FFE51DA000
trusted library allocation
page read and write
1FFEA569000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFEA9CE000
trusted library allocation
page read and write
1FFEADE8000
trusted library allocation
page read and write
1FFEA565000
trusted library allocation
page read and write
1FFEA938000
trusted library allocation
page read and write
1F82A596000
trusted library allocation
page read and write
1FFE92D9000
trusted library allocation
page read and write
1FFEA9BE000
trusted library allocation
page read and write
1FFE9E97000
trusted library allocation
page read and write
1FFEBCC1000
trusted library allocation
page read and write
1FFF1341000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFE48FD000
heap
page read and write
1FFF542B000
trusted library allocation
page read and write
1FFF378E000
trusted library allocation
page read and write
1FFEA596000
trusted library allocation
page read and write
1FFE4A9E000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFF1826000
trusted library allocation
page read and write
11DC8B3C000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFEB800000
trusted library allocation
page read and write
1FFE9E95000
trusted library allocation
page read and write
1FFF55A3000
trusted library allocation
page read and write
1204000
heap
page read and write
1FFECCAD000
trusted library allocation
page read and write
1FFEA92A000
trusted library allocation
page read and write
1FFF1178000
trusted library allocation
page read and write
1FFE48DE000
heap
page read and write
1FFF4537000
trusted library allocation
page read and write
1FFF4555000
trusted library allocation
page read and write
1FFEAA33000
trusted library allocation
page read and write
1FFEA96E000
trusted library allocation
page read and write
11DC8B85000
heap
page read and write
1FFE489D000
heap
page read and write
1FFE487F000
heap
page read and write
1FFE48EA000
heap
page read and write
1FFE4886000
heap
page read and write
1FFF1831000
trusted library allocation
page read and write
1FFF5472000
trusted library allocation
page read and write
1FFE9E51000
trusted library allocation
page read and write
1FFF1247000
trusted library allocation
page read and write
11DC8B31000
heap
page read and write
1432000
heap
page read and write
1FFE48EB000
heap
page read and write
1FFF5469000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFE4881000
heap
page read and write
3D01000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFF13D4000
trusted library allocation
page read and write
1FFEAC73000
trusted library allocation
page read and write
1FFEA480000
trusted library allocation
page read and write
1FFF5472000
trusted library allocation
page read and write
1FFE91BF000
trusted library allocation
page read and write
11DC7E6A000
trusted library allocation
page read and write
1FFE99F1000
trusted library allocation
page read and write
9EE08FB000
stack
page read and write
1FFE48DD000
heap
page read and write
1FFE9E45000
trusted library allocation
page read and write
1FFE9E90000
trusted library allocation
page read and write
1FFE4905000
heap
page read and write
1FFF117B000
trusted library allocation
page read and write
1FFE92D4000
trusted library allocation
page read and write
1FFE9E7E000
trusted library allocation
page read and write
1FFE5166000
trusted library allocation
page read and write
1FFEB441000
trusted library allocation
page read and write
1FFEC658000
trusted library allocation
page read and write
1FFE6764000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE992A000
trusted library allocation
page read and write
6B2A3B000
stack
page read and write
1FFF13B7000
trusted library allocation
page read and write
1FFEA923000
trusted library allocation
page read and write
1FFE635D000
trusted library allocation
page read and write
1FFF4BF9000
trusted library allocation
page read and write
1FFE61C1000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFF1376000
trusted library allocation
page read and write
1FFF558C000
trusted library allocation
page read and write
1FFEA93C000
trusted library allocation
page read and write
1FFF4555000
trusted library allocation
page read and write
1FFEA56D000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFF1737000
trusted library allocation
page read and write
1FFE6A0A000
heap
page read and write
1FFE9077000
trusted library allocation
page read and write
1FFE75F9000
trusted library allocation
page read and write
1FFF54F2000
trusted library allocation
page read and write
1FFE61DE000
trusted library allocation
page read and write
1FFF5369000
trusted library allocation
page read and write
1FFF4FC6000
trusted library allocation
page read and write
1FFE4918000
heap
page read and write
1FFE91CD000
trusted library allocation
page read and write
1FFF53D1000
trusted library allocation
page read and write
1FFE98A0000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE48FE000
heap
page read and write
1FFEA707000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFE48BB000
heap
page read and write
1FFE489F000
heap
page read and write
1FFE489D000
heap
page read and write
1FFE9848000
trusted library allocation
page read and write
22ADD1A0000
heap
page read and write
1FFE488B000
heap
page read and write
1FFEA97E000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFE48DD000
heap
page read and write
22ADD700000
trusted library allocation
page read and write
1FFE488B000
heap
page read and write
1FFF58D1000
heap
page read and write
1FFE4892000
heap
page read and write
1FFECCF8000
trusted library allocation
page read and write
1FFE5175000
trusted library allocation
page read and write
11DC8AA9000
heap
page read and write
1FFE48FD000
heap
page read and write
1FFF4EFB000
trusted library allocation
page read and write
1FFE4896000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFEB441000
trusted library allocation
page read and write
1FFE6341000
trusted library allocation
page read and write
1FFE48FD000
heap
page read and write
1FFE48EE000
heap
page read and write
1FFF2C48000
trusted library allocation
page read and write
1FFEA984000
trusted library allocation
page read and write
1FFEA9DD000
trusted library allocation
page read and write
1FFE9456000
trusted library allocation
page read and write
1FFED041000
trusted library allocation
page read and write
1FFE96FB000
trusted library allocation
page read and write
1445000
heap
page read and write
1FFEA874000
trusted library allocation
page read and write
1FFEA88B000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1F82A566000
trusted library allocation
page read and write
1FFE983F000
trusted library allocation
page read and write
1FFE984E000
trusted library allocation
page read and write
1FFE75F9000
trusted library allocation
page read and write
1FFE63BC000
trusted library allocation
page read and write
1FFF1078000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE4886000
heap
page read and write
1FFECA86000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFF55D4000
trusted library allocation
page read and write
1FFEA536000
trusted library allocation
page read and write
1FFEA5B4000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFF4570000
trusted library allocation
page read and write
1FFE48F5000
heap
page read and write
1F82A5C8000
trusted library allocation
page read and write
1FFE986F000
trusted library allocation
page read and write
1FFEA9FE000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFF18C1000
trusted library allocation
page read and write
1FFE48F0000
heap
page read and write
1FFF1193000
trusted library allocation
page read and write
1FFE61CA000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1F82A400000
trusted library allocation
page read and write
1FFECA8D000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFE995A000
trusted library allocation
page read and write
1418000
heap
page read and write
1FFEBBC4000
trusted library allocation
page read and write
1FFE9E2F000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFF1756000
trusted library allocation
page read and write
1FFE48F2000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFEA499000
trusted library allocation
page read and write
1FFE6A42000
heap
page read and write
1FFEA70A000
trusted library allocation
page read and write
22905A07000
trusted library allocation
page read and write
1FFF13C4000
trusted library allocation
page read and write
1FFEC738000
trusted library allocation
page read and write
1FFE48E6000
heap
page read and write
1FFEAC84000
trusted library allocation
page read and write
1FFE91FD000
trusted library allocation
page read and write
1FFF17C1000
trusted library allocation
page read and write
1F82A52E000
trusted library allocation
page read and write
1A7D5CC0000
heap
page read and write
1FFF456E000
trusted library allocation
page read and write
1FFF1343000
trusted library allocation
page read and write
1FFEA974000
trusted library allocation
page read and write
1FFF11ED000
trusted library allocation
page read and write
1FFE94C7000
trusted library allocation
page read and write
1FFF54C5000
trusted library allocation
page read and write
1FFE4A90000
trusted library allocation
page read and write
1FFF4E3E000
trusted library allocation
page read and write
1FFE6A64000
heap
page read and write
1FFEA8D3000
trusted library allocation
page read and write
1FFEA9B1000
trusted library allocation
page read and write
1FFECA7E000
trusted library allocation
page read and write
1FFEB5C8000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE4908000
heap
page read and write
1FFF138F000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFF37E2000
trusted library allocation
page read and write
1A7D5CCE000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFF1769000
trusted library allocation
page read and write
1FFEA569000
trusted library allocation
page read and write
1FFE75F9000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
1FFF45AA000
trusted library allocation
page read and write
1FFEADDC000
trusted library allocation
page read and write
1FFF13BF000
trusted library allocation
page read and write
1FFE61C7000
trusted library allocation
page read and write
1FFE6043000
trusted library allocation
page read and write
1FFE99A8000
trusted library allocation
page read and write
1FFEA843000
trusted library allocation
page read and write
1FFEA9B9000
trusted library allocation
page read and write
1FFE4905000
heap
page read and write
1FFF4E47000
trusted library allocation
page read and write
1FFE9838000
trusted library allocation
page read and write
1FFE488B000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE489F000
heap
page read and write
11DC7C70000
heap
page read and write
1FFF17AF000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFF4577000
trusted library allocation
page read and write
1F82A5B7000
trusted library allocation
page read and write
6B2AFE000
unkown
page readonly
1FFE91AD000
trusted library allocation
page read and write
1FFE6A16000
heap
page read and write
1FFF14A0000
trusted library allocation
page read and write
1FFEA9B7000
trusted library allocation
page read and write
1FFF1119000
trusted library allocation
page read and write
1FFE6343000
trusted library allocation
page read and write
11DC8AAC000
heap
page read and write
1FFE4881000
heap
page read and write
1FFE9188000
trusted library allocation
page read and write
1FFE6A2F000
heap
page read and write
1FFE48FF000
heap
page read and write
1FFE489F000
heap
page read and write
1FFEADDC000
trusted library allocation
page read and write
1FFEA5C3000
trusted library allocation
page read and write
1FFE6763000
trusted library allocation
page read and write
1FFE48F3000
heap
page read and write
1FFF134F000
trusted library allocation
page read and write
1FFECCC1000
trusted library allocation
page read and write
1FFE9E36000
trusted library allocation
page read and write
1FFEA92E000
trusted library allocation
page read and write
1FFE7561000
trusted library allocation
page read and write
11DC7B10000
unclassified section
page readonly
1A7D5CC6000
heap
page read and write
1FFE6A57000
heap
page read and write
11DC8B62000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFE4898000
heap
page read and write
1FFF4EDD000
trusted library allocation
page read and write
1FFE945A000
trusted library allocation
page read and write
22ADD160000
heap
page read and write
1FFE4891000
heap
page read and write
1FFE91E8000
trusted library allocation
page read and write
1FFE48B6000
heap
page read and write
1FFF5338000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1A7D5DC0000
heap
page read and write
1FFECF86000
trusted library allocation
page read and write
1FFE99C9000
trusted library allocation
page read and write
1FFE9EF1000
trusted library allocation
page read and write
1432000
heap
page read and write
1FFE61B7000
trusted library allocation
page read and write
1FFEA9FE000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE4908000
heap
page read and write
1FFEA46B000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE48BB000
heap
page read and write
1FFEA96F000
trusted library allocation
page read and write
1FFE90A7000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFEC67B000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFF4EC7000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE4908000
heap
page read and write
1FFE91E6000
trusted library allocation
page read and write
1FFEA4F4000
trusted library allocation
page read and write
1FFF4BFC000
trusted library allocation
page read and write
1FFF4E3E000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
1FFF13DA000
trusted library allocation
page read and write
1FFF18D8000
trusted library allocation
page read and write
1FFE48F3000
heap
page read and write
1FFE48F3000
heap
page read and write
1FFEC733000
trusted library allocation
page read and write
1FFE98A0000
trusted library allocation
page read and write
1F82A564000
trusted library allocation
page read and write
1FFE5023000
trusted library allocation
page read and write
1FFF5390000
trusted library allocation
page read and write
1FFF13AB000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFE4881000
heap
page read and write
1FFE995A000
trusted library allocation
page read and write
22ADD400000
trusted library allocation
page read and write
1440000
heap
page read and write
1204000
heap
page read and write
1FFE48A9000
heap
page read and write
11DC7EEF000
trusted library allocation
page read and write
1FFEA592000
trusted library allocation
page read and write
1204000
heap
page read and write
1FFE988E000
trusted library allocation
page read and write
1204000
heap
page read and write
1FFF53D1000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFE48E0000
heap
page read and write
1FFE9EF1000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFEAAFB000
trusted library allocation
page read and write
1FFE4905000
heap
page read and write
1FFEA5C1000
trusted library allocation
page read and write
11DC83E0000
heap
page read and write
1FFEC645000
trusted library allocation
page read and write
1FFEA87B000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFEA996000
trusted library allocation
page read and write
22ADD5B6000
trusted library allocation
page read and write
1FFF45B3000
trusted library allocation
page read and write
1FFE998E000
trusted library allocation
page read and write
1FFE48F1000
heap
page read and write
1FFE4893000
heap
page read and write
1FFF58D1000
heap
page read and write
1FFF53F8000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFEBC66000
trusted library allocation
page read and write
1FFF10CE000
trusted library allocation
page read and write
1FFEA56E000
trusted library allocation
page read and write
1FFE6341000
trusted library allocation
page read and write
1FFE9296000
trusted library allocation
page read and write
1FFF4BC8000
trusted library allocation
page read and write
1FFF1754000
trusted library allocation
page read and write
1FFEB789000
trusted library allocation
page read and write
1FFEAD9E000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFEC789000
trusted library allocation
page read and write
1FFE51D6000
trusted library allocation
page read and write
2CC000
unkown
page readonly
1FFE98A0000
trusted library allocation
page read and write
11DC8B85000
heap
page read and write
1FFED61C000
trusted library allocation
page read and write
1FFEA990000
trusted library allocation
page read and write
1FFECA16000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE4886000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFE6A34000
heap
page read and write
27B480503000
trusted library allocation
page read and write
1FFE6A5E000
heap
page read and write
1FFEABEE000
trusted library allocation
page read and write
22ADD80C000
trusted library allocation
page read and write
1FFE6A2F000
heap
page read and write
1FFEC6C1000
trusted library allocation
page read and write
1FFF11D6000
trusted library allocation
page read and write
1FFE9859000
trusted library allocation
page read and write
1FFEA4EC000
trusted library allocation
page read and write
1FFE9EF8000
trusted library allocation
page read and write
1FFF37D4000
trusted library allocation
page read and write
1FFEAA52000
trusted library allocation
page read and write
1FFF55C5000
trusted library allocation
page read and write
1FFE9284000
trusted library allocation
page read and write
1FFF14EC000
trusted library allocation
page read and write
11DC8B31000
heap
page read and write
1FFE928F000
trusted library allocation
page read and write
1FFEB58D000
trusted library allocation
page read and write
11DC8410000
trusted library allocation
page read and write
1FFF17C1000
trusted library allocation
page read and write
1FFF457C000
trusted library allocation
page read and write
1FFE48F2000
heap
page read and write
1FFE4891000
heap
page read and write
1FFEA892000
trusted library allocation
page read and write
1FFE63BE000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFE6A88000
heap
page read and write
11DC8B3C000
heap
page read and write
1FFED0A3000
trusted library allocation
page read and write
1FFF13AB000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFF5679000
trusted library allocation
page read and write
1FFE7509000
trusted library allocation
page read and write
1FFED0A7000
trusted library allocation
page read and write
1FFF1766000
trusted library allocation
page read and write
1FFE48F1000
heap
page read and write
1FFE48E9000
heap
page read and write
1FFE4891000
heap
page read and write
1FFEA841000
trusted library allocation
page read and write
2F2000
unkown
page readonly
9EE327E000
stack
page read and write
1FFEADA3000
trusted library allocation
page read and write
1FFF13BA000
trusted library allocation
page read and write
1FFEB7E6000
trusted library allocation
page read and write
1FFEC6BA000
trusted library allocation
page read and write
1FFF56E8000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFF4586000
trusted library allocation
page read and write
22ADD23A000
heap
page read and write
1FFE6761000
trusted library allocation
page read and write
1FFF13A7000
trusted library allocation
page read and write
1FFE48FD000
heap
page read and write
1FFF149D000
trusted library allocation
page read and write
1FFEB6A2000
trusted library allocation
page read and write
1FFEAB39000
trusted library allocation
page read and write
1FFF590F000
heap
page read and write
1FFE9089000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFF1811000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1442000
heap
page read and write
1FFF18C5000
trusted library allocation
page read and write
1FFEA8D3000
trusted library allocation
page read and write
1FFE90A0000
trusted library allocation
page read and write
1FFF18EA000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFEC693000
trusted library allocation
page read and write
304000
unkown
page readonly
6B29FE000
unkown
page readonly
1FFEA4F9000
trusted library allocation
page read and write
1FFE48F8000
heap
page read and write
4EF8FAD000
stack
page read and write
1FFEB7D2000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFECACD000
trusted library allocation
page read and write
1FFEAD8B000
trusted library allocation
page read and write
1FFF58D1000
heap
page read and write
1442000
heap
page read and write
1FFF553E000
trusted library allocation
page read and write
1FFECAEA000
trusted library allocation
page read and write
1FFEAC5D000
trusted library allocation
page read and write
1FFF1285000
trusted library allocation
page read and write
1FFF1791000
trusted library allocation
page read and write
1FFF559D000
trusted library allocation
page read and write
9EE19FE000
unkown
page readonly
1FFF17AF000
trusted library allocation
page read and write
1FFEADE2000
trusted library allocation
page read and write
1FFF4FE1000
trusted library allocation
page read and write
1FFE984A000
trusted library allocation
page read and write
1442000
heap
page read and write
1FFE9EF1000
trusted library allocation
page read and write
1FFE754E000
trusted library allocation
page read and write
1FFF538C000
trusted library allocation
page read and write
1FFE514B000
trusted library allocation
page read and write
1FFEA985000
trusted library allocation
page read and write
1FFE916B000
trusted library allocation
page read and write
1FFEA592000
trusted library allocation
page read and write
1FFF4BFC000
trusted library allocation
page read and write
1F82A240000
heap
page readonly
1FFE519E000
trusted library allocation
page read and write
22ADD582000
trusted library allocation
page read and write
1FFF13E9000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFF4EBE000
trusted library allocation
page read and write
1FFE48FD000
heap
page read and write
1F82A14B000
remote allocation
page execute read
1FFE48AF000
heap
page read and write
1FFEAA1E000
trusted library allocation
page read and write
1FFECCE4000
trusted library allocation
page read and write
1FFF2BA3000
trusted library allocation
page read and write
1FFEA5D4000
trusted library allocation
page read and write
1FFECA8D000
trusted library allocation
page read and write
11DC7E00000
trusted library allocation
page read and write
1F82A250000
heap
page read and write
1FFE63BE000
trusted library allocation
page read and write
1FFF108F000
trusted library allocation
page read and write
22ADD1D0000
heap
page read and write
1439000
heap
page read and write
1FFE9939000
trusted library allocation
page read and write
1FFEC783000
trusted library allocation
page read and write
1FFF2D2C000
trusted library allocation
page read and write
1FFEA57C000
trusted library allocation
page read and write
1FFE9883000
trusted library allocation
page read and write
1FFF4BC8000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE6A7A000
heap
page read and write
1FFED101000
trusted library allocation
page read and write
1FFE91F4000
trusted library allocation
page read and write
1FFE6027000
trusted library allocation
page read and write
1FFE91CA000
trusted library allocation
page read and write
1FFF37D0000
trusted library allocation
page read and write
1FFEB658000
trusted library allocation
page read and write
1FFE519E000
trusted library allocation
page read and write
1FFF558C000
trusted library allocation
page read and write
1FFE9161000
trusted library allocation
page read and write
1FFE96BA000
trusted library allocation
page read and write
1FFEAA1B000
trusted library allocation
page read and write
1FFE94F6000
trusted library allocation
page read and write
1FFEA9EC000
trusted library allocation
page read and write
1FFEAAD0000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE48F2000
heap
page read and write
22ADD5F6000
trusted library allocation
page read and write
22ADD1A4000
heap
page read and write
1FFE4898000
heap
page read and write
1FFE60DB000
trusted library allocation
page read and write
1FFEA544000
trusted library allocation
page read and write
1FFE917D000
trusted library allocation
page read and write
1FFE92B8000
trusted library allocation
page read and write
1FFE48CE000
heap
page read and write
1FFE9414000
trusted library allocation
page read and write
1FFF1199000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFEA556000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
11DC7EC4000
trusted library allocation
page read and write
1FFEA9A3000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1FFECFC8000
trusted library allocation
page read and write
1FFEC73A000
trusted library allocation
page read and write
1FFE48EB000
heap
page read and write
1FFE489F000
heap
page read and write
1FFE9880000
trusted library allocation
page read and write
1FFE91A5000
trusted library allocation
page read and write
11DC8B3C000
heap
page read and write
1FFEC662000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1FFF18FC000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
1FFECA86000
trusted library allocation
page read and write
1240000
heap
page read and write
1FFEA5F6000
trusted library allocation
page read and write
1FFE48F8000
heap
page read and write
1FFE48F0000
heap
page read and write
1FFE998A000
trusted library allocation
page read and write
11FE000
stack
page read and write
1FFE48EE000
heap
page read and write
1FFEA99A000
trusted library allocation
page read and write
1FFECA82000
trusted library allocation
page read and write
1FFEB5CA000
trusted library allocation
page read and write
1FFF1730000
trusted library allocation
page read and write
1FFE4892000
heap
page read and write
1FFED637000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFEB68C000
trusted library allocation
page read and write
1FFE985A000
trusted library allocation
page read and write
1FFF55C1000
trusted library allocation
page read and write
1FFF118C000
trusted library allocation
page read and write
1FFF54AD000
trusted library allocation
page read and write
1FFE7571000
trusted library allocation
page read and write
1FFE925B000
trusted library allocation
page read and write
1FFE48B1000
heap
page read and write
1FFF1805000
trusted library allocation
page read and write
1FFEAA0A000
trusted library allocation
page read and write
1FFEA544000
trusted library allocation
page read and write
1FFF1123000
trusted library allocation
page read and write
1FFF1777000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFEA522000
trusted library allocation
page read and write
1FFF1265000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFF1185000
trusted library allocation
page read and write
1A7D41D0000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE9875000
trusted library allocation
page read and write
1A7D4400000
trusted library allocation
page read and write
1FFF5390000
trusted library allocation
page read and write
1FFECA82000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFE63E5000
trusted library allocation
page read and write
1FFEA582000
trusted library allocation
page read and write
1FFEC609000
trusted library allocation
page read and write
1FFEC6BC000
trusted library allocation
page read and write
1FFE6A56000
heap
page read and write
1FFEA9B7000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFECAE4000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE61A5000
trusted library allocation
page read and write
1FFEA88B000
trusted library allocation
page read and write
1FFE9188000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFEAACD000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE4899000
heap
page read and write
1FFE635D000
trusted library allocation
page read and write
1FFE91A5000
trusted library allocation
page read and write
1442000
heap
page read and write
1438000
heap
page read and write
11DC84D0000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFEC6AF000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE9836000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFEAC31000
trusted library allocation
page read and write
35F12BE03000
trusted library allocation
page read and write
22ADD5B2000
trusted library allocation
page read and write
1FFE9E7A000
trusted library allocation
page read and write
1FFE92B5000
trusted library allocation
page read and write
1FFEA96B000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE9E90000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE489F000
heap
page read and write
1FFE4886000
heap
page read and write
1FFF4B20000
trusted library allocation
page read and write
1FFEC629000
trusted library allocation
page read and write
1FFE986F000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
22ADD800000
trusted library allocation
page read and write
1FFE9090000
trusted library allocation
page read and write
1FFEA4CF000
trusted library allocation
page read and write
1FFEADE2000
trusted library allocation
page read and write
1FFF1114000
trusted library allocation
page read and write
1FFF11D2000
trusted library allocation
page read and write
1FFE48B1000
heap
page read and write
1FFEA4EC000
trusted library allocation
page read and write
1FFE9E2F000
trusted library allocation
page read and write
1FFE9E4E000
trusted library allocation
page read and write
1FFE948E000
trusted library allocation
page read and write
1FFECA7E000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1FFF37E0000
trusted library allocation
page read and write
1FFEA5D4000
trusted library allocation
page read and write
1FFEA921000
trusted library allocation
page read and write
1204000
heap
page read and write
1FFF159B000
trusted library allocation
page read and write
1FFF2D57000
trusted library allocation
page read and write
1FFE9192000
trusted library allocation
page read and write
1FFEB4EC000
trusted library allocation
page read and write
1FFE6A88000
heap
page read and write
1FFE4886000
heap
page read and write
1FFEB4CA000
trusted library allocation
page read and write
1FFF4632000
trusted library allocation
page read and write
1FFF5469000
trusted library allocation
page read and write
1FFF15FE000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
1FFE4891000
heap
page read and write
1FFE48F7000
heap
page read and write
1FFEADDA000
trusted library allocation
page read and write
1FFEB7C5000
trusted library allocation
page read and write
1FFE9199000
trusted library allocation
page read and write
22ADD58F000
trusted library allocation
page read and write
1FFEA938000
trusted library allocation
page read and write
1FFEA9B1000
trusted library allocation
page read and write
1FFEA984000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFE48F2000
heap
page read and write
1FFE489D000
heap
page read and write
1FFE601F000
trusted library allocation
page read and write
1A7D4300000
trusted library allocation
page read and write
1FFE48B3000
heap
page read and write
1FFE4881000
heap
page read and write
1FFF60AC000
trusted library allocation
page read and write
1FFED106000
trusted library allocation
page read and write
1FFE63F6000
trusted library allocation
page read and write
1FFE91A5000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFE9869000
trusted library allocation
page read and write
1FFE48E7000
heap
page read and write
1FFE489D000
heap
page read and write
1FFE6A2E000
heap
page read and write
1FFE6043000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
143B000
heap
page read and write
1FFE4899000
heap
page read and write
1FFE96AC000
trusted library allocation
page read and write
1FFEB4BB000
trusted library allocation
page read and write
1FFF54E8000
trusted library allocation
page read and write
1FFF5594000
trusted library allocation
page read and write
1FFECCDB000
trusted library allocation
page read and write
1FFF5514000
trusted library allocation
page read and write
1FFE75F9000
trusted library allocation
page read and write
1FFE63DC000
trusted library allocation
page read and write
1FFEAA4C000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFEADDF000
trusted library allocation
page read and write
1FFF455A000
trusted library allocation
page read and write
1FFF5430000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1204000
heap
page read and write
1F82A1B0000
heap
page read and write
1FFF1182000
trusted library allocation
page read and write
1FFF534A000
trusted library allocation
page read and write
1FFEA874000
trusted library allocation
page read and write
1FFF5338000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFF37D0000
trusted library allocation
page read and write
1FFEADE2000
trusted library allocation
page read and write
1FFE6A7E000
heap
page read and write
1FFE6347000
trusted library allocation
page read and write
11DC8B28000
heap
page read and write
1FFE75E6000
trusted library allocation
page read and write
1FFE913F000
trusted library allocation
page read and write
1FFE75FA000
trusted library allocation
page read and write
1FFF37D0000
trusted library allocation
page read and write
11DC8B6B000
heap
page read and write
1FFE48BB000
heap
page read and write
1FFF18FD000
trusted library allocation
page read and write
11DC8B9A000
heap
page read and write
2FC000
unkown
page read and write
11DC8ABD000
heap
page read and write
1FFEAAFC000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFE630E000
trusted library allocation
page read and write
1FFE48BB000
heap
page read and write
1FFEAD91000
trusted library allocation
page read and write
1FFE9E23000
trusted library allocation
page read and write
1FFE502F000
trusted library allocation
page read and write
1FFEB7D9000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFE639A000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
1FFE9E64000
trusted library allocation
page read and write
1FFEAC81000
trusted library allocation
page read and write
1FFE487F000
heap
page read and write
1FFE4891000
heap
page read and write
1FFE489F000
heap
page read and write
1FFF58D1000
heap
page read and write
1FFECA76000
trusted library allocation
page read and write
1FFF4EBE000
trusted library allocation
page read and write
1FFECCB9000
trusted library allocation
page read and write
1FFF11CA000
trusted library allocation
page read and write
9EE197E000
unkown
page readonly
1FFF5439000
trusted library allocation
page read and write
1204000
heap
page read and write
1FFF12B3000
trusted library allocation
page read and write
1FFE9446000
trusted library allocation
page read and write
1FFF11D2000
trusted library allocation
page read and write
1FFE98FA000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFE9E36000
trusted library allocation
page read and write
1FFE929B000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFEAAD4000
trusted library allocation
page read and write
1FFF118F000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFEA9A3000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFF557D000
trusted library allocation
page read and write
BCA000
stack
page read and write
1FFEBB5C000
trusted library allocation
page read and write
1FFF4696000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFEA9DB000
trusted library allocation
page read and write
22ADD570000
trusted library allocation
page read and write
1FFE636E000
trusted library allocation
page read and write
1FFF4537000
trusted library allocation
page read and write
1458000
heap
page read and write
1FFE48EF000
heap
page read and write
1FFE48F2000
heap
page read and write
11DC8BB8000
heap
page read and write
1FFEA4F4000
trusted library allocation
page read and write
1FFF4513000
trusted library allocation
page read and write
1FFF4EDD000
trusted library allocation
page read and write
1FFE48F2000
heap
page read and write
1FFF18FC000
trusted library allocation
page read and write
1FFE9E8A000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
9EE087E000
unkown
page readonly
1FFEBBFD000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFE94F1000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFF1338000
trusted library allocation
page read and write
1FFF457C000
trusted library allocation
page read and write
11DC7E86000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE6A85000
heap
page read and write
1FFEB4CA000
trusted library allocation
page read and write
1FFEA88D000
trusted library allocation
page read and write
1FFEC6D5000
trusted library allocation
page read and write
1FFE50FB000
trusted library allocation
page read and write
1FFEA9CB000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFE91C6000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFEC6BC000
trusted library allocation
page read and write
1FFF5537000
trusted library allocation
page read and write
1FFF56CA000
trusted library allocation
page read and write
1FFE6A87000
heap
page read and write
1FFEA977000
trusted library allocation
page read and write
2CC000
unkown
page readonly
1FFED68A000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFF55A6000
trusted library allocation
page read and write
1FFF5360000
trusted library allocation
page read and write
1FFF175A000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
1FFF4EFD000
trusted library allocation
page read and write
1FFEA871000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFE489F000
heap
page read and write
1FFE514E000
trusted library allocation
page read and write
1FFE4880000
heap
page read and write
1FFE6077000
trusted library allocation
page read and write
1FFECACD000
trusted library allocation
page read and write
22ADD55F000
trusted library allocation
page read and write
1FFE48EE000
heap
page read and write
1FFEB78B000
trusted library allocation
page read and write
1FFE48A0000
heap
page read and write
1462000
heap
page read and write
1FFF1185000
trusted library allocation
page read and write
1FFE489D000
heap
page read and write
1FFF4659000
trusted library allocation
page read and write
1FFE99BD000
trusted library allocation
page read and write
11DC8AA9000
heap
page read and write
1FFEA9A8000
trusted library allocation
page read and write
1FFECAC8000
trusted library allocation
page read and write
1FFEB7D4000
trusted library allocation
page read and write
1FFEB4BB000
trusted library allocation
page read and write
1FFEB7DB000
trusted library allocation
page read and write
1FFEC67B000
trusted library allocation
page read and write
1FFE9465000
trusted library allocation
page read and write
1FFE988E000
trusted library allocation
page read and write
5C14BFF000
stack
page read and write
1FFE4881000
heap
page read and write
1FFF5540000
trusted library allocation
page read and write
1FFECCBD000
trusted library allocation
page read and write
1FFECCAF000
trusted library allocation
page read and write
1FFE90D6000
trusted library allocation
page read and write
1FFE51E1000
trusted library allocation
page read and write
1FFE636C000
trusted library allocation
page read and write
1A7D440A000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFE9847000
trusted library allocation
page read and write
1FFE9936000
trusted library allocation
page read and write
1FFE9182000
trusted library allocation
page read and write
1FFF15B4000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFF455B000
trusted library allocation
page read and write
1FFE9E3F000
trusted library allocation
page read and write
1FFEC76B000
trusted library allocation
page read and write
1FFECAC8000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFEB4A8000
trusted library allocation
page read and write
1FFF1233000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFE4886000
heap
page read and write
1FFF1260000
trusted library allocation
page read and write
1FFE9879000
trusted library allocation
page read and write
1FFECADD000
trusted library allocation
page read and write
1FFF45E5000
trusted library allocation
page read and write
22ADD50E000
trusted library allocation
page read and write
1FFE6369000
trusted library allocation
page read and write
1FFEA4FA000
trusted library allocation
page read and write
1FFF127B000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFEABE9000
trusted library allocation
page read and write
1FFF2CA3000
trusted library allocation
page read and write
1FFE4881000
heap
page read and write
1FFEB446000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFEBB54000
trusted library allocation
page read and write
1FFEC7BA000
trusted library allocation
page read and write
1FFEA9A1000
trusted library allocation
page read and write
1FFE6A15000
heap
page read and write
1FFE517F000
trusted library allocation
page read and write
1FFEA953000
trusted library allocation
page read and write
1FFECA78000
trusted library allocation
page read and write
1FFEC6C5000
trusted library allocation
page read and write
1FFECCF5000
trusted library allocation
page read and write
1FFEA9BE000
trusted library allocation
page read and write
1FFEB775000
trusted library allocation
page read and write
1FFE91F4000
trusted library allocation
page read and write
11DC8B23000
heap
page read and write
1FFE4891000
heap
page read and write
1F82A632000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE48BB000
heap
page read and write
11DC8AA0000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFEA5D4000
trusted library allocation
page read and write
1FFF107C000
trusted library allocation
page read and write
1FFE5076000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFE48F7000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFE947B000
trusted library allocation
page read and write
1FFE6A4E000
heap
page read and write
1FFEA9F5000
trusted library allocation
page read and write
1FFE6A0A000
heap
page read and write
1204000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFE5154000
trusted library allocation
page read and write
1FFECCE4000
trusted library allocation
page read and write
1FFF14EC000
trusted library allocation
page read and write
1FFF37E0000
trusted library allocation
page read and write
1FFE99B0000
trusted library allocation
page read and write
1FFE63F6000
trusted library allocation
page read and write
1FFF1116000
trusted library allocation
page read and write
1FFF2C86000
trusted library allocation
page read and write
1FFE48CE000
heap
page read and write
1FFF5531000
trusted library allocation
page read and write
1FFEADF3000
trusted library allocation
page read and write
1FFEA5F6000
trusted library allocation
page read and write
1FFE48DD000
heap
page read and write
1FFF4EBE000
trusted library allocation
page read and write
11DC8B99000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFF18D6000
trusted library allocation
page read and write
1FFEA598000
trusted library allocation
page read and write
22ADD22F000
unclassified section
page read and write
1FFF4570000
trusted library allocation
page read and write
1FFF58D1000
heap
page read and write
1FFEADE2000
trusted library allocation
page read and write
1FFEC6AD000
trusted library allocation
page read and write
1FFE94D0000
trusted library allocation
page read and write
145E000
heap
page read and write
1FFEA985000
trusted library allocation
page read and write
22ADD230000
heap
page read and write
1FFE48B9000
heap
page read and write
1FFE489D000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFF4E14000
trusted library allocation
page read and write
1FFF108F000
trusted library allocation
page read and write
1FFE6A4D000
heap
page read and write
1A7D4515000
heap
page read and write
22ADD0B0000
unclassified section
page readonly
1FFE98FA000
trusted library allocation
page read and write
1FFE48FD000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE48B2000
heap
page read and write
1FFE4AC1000
trusted library allocation
page read and write
1FFF4570000
trusted library allocation
page read and write
1FFF11A7000
trusted library allocation
page read and write
11DC7AA0000
unclassified section
page readonly
1FFE48F0000
heap
page read and write
1FFF121C000
trusted library allocation
page read and write
1FFE619C000
trusted library allocation
page read and write
1FFE48EF000
heap
page read and write
1FFF4EF8000
trusted library allocation
page read and write
1445000
heap
page read and write
143F000
heap
page read and write
6B3BFE000
unkown
page readonly
1FFE4893000
heap
page read and write
1FFE4887000
heap
page read and write
1FFE99CB000
trusted library allocation
page read and write
1FFEA544000
trusted library allocation
page read and write
1FFEB7DD000
trusted library allocation
page read and write
1FFF18E3000
trusted library allocation
page read and write
22ADD222000
unclassified section
page read and write
1FFE6197000
trusted library allocation
page read and write
1FFEA8D3000
trusted library allocation
page read and write
9EE3A7E000
unkown
page readonly
1FFEABFD000
trusted library allocation
page read and write
1FFEA582000
trusted library allocation
page read and write
1FFF45E5000
trusted library allocation
page read and write
1FFF45B6000
trusted library allocation
page read and write
1FFECCD2000
trusted library allocation
page read and write
1FFE61D5000
trusted library allocation
page read and write
1FFE50FE000
trusted library allocation
page read and write
1FFE48EB000
heap
page read and write
1FFF14A5000
trusted library allocation
page read and write
1FFE9918000
trusted library allocation
page read and write
11DC8B28000
heap
page read and write
1FFF559B000
trusted library allocation
page read and write
1FFF4681000
trusted library allocation
page read and write
11DC8AA0000
heap
page read and write
1FFE48EF000
heap
page read and write
1FFF53EE000
trusted library allocation
page read and write
1F82A500000
trusted library allocation
page read and write
1FFE75FA000
trusted library allocation
page read and write
1FFE75E4000
trusted library allocation
page read and write
1FFF2D06000
trusted library allocation
page read and write
1FFE6343000
trusted library allocation
page read and write
1FFE4886000
heap
page read and write
1FFE63C7000
trusted library allocation
page read and write
1FFEA9AA000
trusted library allocation
page read and write
1FFE48FD000
heap
page read and write
11DC7E12000
trusted library allocation
page read and write
1FFF18E3000
trusted library allocation
page read and write
1FFE489F000
heap
page read and write
1FFF45E5000
trusted library allocation
page read and write
1FFE7561000
trusted library allocation
page read and write
1FFEB7D4000
trusted library allocation
page read and write
1FFE9972000
trusted library allocation
page read and write
1FFEA938000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFF4577000
trusted library allocation
page read and write
1FFEA5F6000
trusted library allocation
page read and write
1FFF539C000
trusted library allocation
page read and write
1FFE9875000
trusted library allocation
page read and write
1FFE4899000
heap
page read and write
1FFE48E5000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFE63A8000
trusted library allocation
page read and write
1FFE4907000
heap
page read and write
1FFEA5B2000
trusted library allocation
page read and write
1FFEA88B000
trusted library allocation
page read and write
1FFE48B9000
heap
page read and write
5C163FF000
stack
page read and write
1FFEADD7000
trusted library allocation
page read and write
1FFEA55C000
trusted library allocation
page read and write
1FFE4892000
heap
page read and write
1FFE94A6000
trusted library allocation
page read and write
1FFEA911000
trusted library allocation
page read and write
1FFEC6D5000
trusted library allocation
page read and write
1FFE48EF000
heap
page read and write
1FFF4577000
trusted library allocation
page read and write
1FFE491A000
heap
page read and write
17654C203000
trusted library allocation
page read and write
1FFE4ACF000
trusted library allocation
page read and write
1FFE9827000
trusted library allocation
page read and write
1FFEA5F6000
trusted library allocation
page read and write
1FFF4570000
trusted library allocation
page read and write
1FFEA90C000
trusted library allocation
page read and write
1FFEBBF1000
trusted library allocation
page read and write
1FFEC67D000
trusted library allocation
page read and write
1FFE4892000
heap
page read and write
1FFE48BB000
heap
page read and write
1FFEA977000
trusted library allocation
page read and write
1FFF113C000
trusted library allocation
page read and write
1FFF5531000
trusted library allocation
page read and write
1FFEA88D000
trusted library allocation
page read and write
11DC7B6A000
heap
page read and write
1FFEC688000
trusted library allocation
page read and write
1F82A55B000
trusted library allocation
page read and write
1FFF1371000
trusted library allocation
page read and write
1FFEAAD0000
trusted library allocation
page read and write
1FFE48EE000
heap
page read and write
1FFF54E4000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1FFE609C000
trusted library allocation
page read and write
11DC7E78000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE4898000
heap
page read and write
1FFE48A9000
heap
page read and write
1FFE48FD000
heap
page read and write
1FFE48AF000
heap
page read and write
1FFE99BE000
trusted library allocation
page read and write
1FFE6347000
trusted library allocation
page read and write
11DC8BB8000
heap
page read and write
1FFE6343000
trusted library allocation
page read and write
1FFF546F000
trusted library allocation
page read and write
1FFF18E5000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFF11E0000
trusted library allocation
page read and write
1FFE4893000
heap
page read and write
1FFE4893000
heap
page read and write
1FFE48C2000
heap
page read and write
1FFE48FE000
heap
page read and write
1FFF559D000
trusted library allocation
page read and write
1FFEA4C2000
trusted library allocation
page read and write
1FFEAA52000
trusted library allocation
page read and write
11DC8BB9000
heap
page read and write
1FFE6077000
trusted library allocation
page read and write
1FFF4780000
trusted library allocation
page read and write
1FFEA88B000
trusted library allocation
page read and write
1FFF55CC000
trusted library allocation
page read and write
1FFF12C0000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFE48EE000
heap
page read and write
1FFE4899000
heap
page read and write
1FFEA46E000
trusted library allocation
page read and write
1FFEA5F3000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFECAC8000
trusted library allocation
page read and write
1FFEABEA000
trusted library allocation
page read and write
1FFECA10000
trusted library allocation
page read and write
1FFF15F6000
trusted library allocation
page read and write
1FFE48E9000
heap
page read and write
1458000
heap
page read and write
1FFEA8D3000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFE4891000
heap
page read and write
1FFEA48C000
trusted library allocation
page read and write
1FFEB681000
trusted library allocation
page read and write
1FFEA974000
trusted library allocation
page read and write
1FFE992E000
trusted library allocation
page read and write
1FFF4EA1000
trusted library allocation
page read and write
1FFEA9A6000
trusted library allocation
page read and write
1FFEA574000
trusted library allocation
page read and write
1FFEA886000
trusted library allocation
page read and write
1FFE51A5000
trusted library allocation
page read and write
1FFE90A0000
trusted library allocation
page read and write
1FFE913D000
trusted library allocation
page read and write
1FFF1385000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
11DC8A8D000
heap
page read and write
1FFEAAD0000
trusted library allocation
page read and write
1FFEABF5000
trusted library allocation
page read and write
11DC8A9C000
heap
page read and write
1FFF1238000
trusted library allocation
page read and write
1FFE48F7000
heap
page read and write
1FFF53F8000
trusted library allocation
page read and write
1FFF566B000
trusted library allocation
page read and write
1FFF55C8000
trusted library allocation
page read and write
1F82A572000
trusted library allocation
page read and write
1FFE91B4000
trusted library allocation
page read and write
1FFE91FA000
trusted library allocation
page read and write
1FFF13F2000
trusted library allocation
page read and write
1FFE48E0000
heap
page read and write
1FFE943D000
trusted library allocation
page read and write
1FFE6A49000
heap
page read and write
1F82A3E6000
heap
page read and write
1FFE488A000
heap
page read and write
1FFE489F000
heap
page read and write
1FFF6050000
trusted library allocation
page read and write
1FFF18C1000
trusted library allocation
page read and write
1FFEB78D000
trusted library allocation
page read and write
1FFF456E000
trusted library allocation
page read and write
1FFF45EF000
trusted library allocation
page read and write
1FFEA9FE000
trusted library allocation
page read and write
1FFED005000
trusted library allocation
page read and write
1FFE48E8000
heap
page read and write
1FFEA546000
trusted library allocation
page read and write
1FFE75DB000
trusted library allocation
page read and write
11DC7E23000
trusted library allocation
page read and write
1FFF4E4D000
trusted library allocation
page read and write
1FFF54C5000
trusted library allocation
page read and write
11DC7E48000
trusted library allocation
page read and write
1FFEADD7000
trusted library allocation
page read and write
1FFE9085000
trusted library allocation
page read and write
1FFE48B8000
heap
page read and write
1FFE6379000
trusted library allocation
page read and write
1FFE6A2D000
heap
page read and write
1FFEADE2000
trusted library allocation
page read and write
6B2B3E000
stack
page read and write
1FFF2BE5000
trusted library allocation
page read and write
1FFECA80000
trusted library allocation
page read and write
1FFEA527000
trusted library allocation
page read and write
1FFE90D6000
trusted library allocation
page read and write
1FFF1766000
trusted library allocation
page read and write
1FFE6A49000
heap
page read and write
1FFEAAD0000
trusted library allocation
page read and write
1FFE4882000
heap
page read and write
1FFE9E95000
trusted library allocation
page read and write
1FFF18E3000
trusted library allocation
page read and write
1FFE488F000
heap
page read and write
1FFE48C0000
heap
page read and write
1FFE9EEB000
trusted library allocation
page read and write
1FFF4567000
trusted library allocation
page read and write
1FFEA85B000
trusted library allocation
page read and write
1FFE48C2000
heap
page read and write
1FFE48B8000
heap
page read and write
1FFE48E6000
heap
page read and write
1FFF2CAC000
trusted library allocation
page read and write
1FFEAC31000
trusted library allocation
page read and write
1FFEC6FE000
trusted library allocation
page read and write
1FFF543C000
trusted library allocation
page read and write
4EFB23E000
stack
page read and write
1441000
heap
page read and write
11DC8B3C000
heap
page read and write
1FFE48EF000
heap
page read and write
22ADD180000
heap
page read and write
1FFE48DD000
heap
page read and write
1FFE9963000
trusted library allocation
page read and write
1FFE4920000
heap
page read and write
1FFF158C000
trusted library allocation
page read and write
1FFE4892000
heap
page read and write
1A7D5CCD000
heap
page read and write
1FFE4898000
heap
page read and write
22ADD131000
remote allocation
page execute read
1FFF18BA000
trusted library allocation
page read and write
1FFE4891000
heap
page read and write
1FFE679F000
trusted library allocation
page read and write
1FFEBBF3000
trusted library allocation
page read and write
1FFE48EB000
heap
page read and write
1FFF13AB000
trusted library allocation
page read and write
1FFEADDF000
trusted library allocation
page read and write
1FFE48E6000
heap
page read and write
1FFEA871000
trusted library allocation
page read and write
1FFF108B000
trusted library allocation
page read and write
1FFEB64B000
trusted library allocation
page read and write
1FFE48F0000
heap
page read and write
1FFF5467000
trusted library allocation
page read and write
1FFEA41B000
trusted library allocation
page read and write
1FFEADA3000
trusted library allocation
page read and write
1FFF17F7000
trusted library allocation
page read and write
1FFF17F3000
trusted library allocation
page read and write
1FFEA99A000
trusted library allocation
page read and write
1FFE989E000
trusted library allocation
page read and write
1FFE48B2000
heap
page read and write
1FFF4573000
trusted library allocation
page read and write
11DB000
stack
page read and write
1FFEA565000
trusted library allocation
page read and write
1FFE48E5000
heap
page read and write
1FFF55BF000
trusted library allocation
page read and write
1FFF56AA000
trusted library allocation
page read and write
1FFF13C4000
trusted library allocation
page read and write
1FFE9186000
trusted library allocation
page read and write
11DC84A0000
heap
page read and write
1FFEB7F6000
trusted library allocation
page read and write
1FFED048000
trusted library allocation
page read and write
1FFE9435000
trusted library allocation
page read and write
1FFE488D000
heap
page read and write
11DC7EC2000
trusted library allocation
page read and write
1FFE48AF000
heap
page read and write
1FFF55AB000
trusted library allocation
page read and write
1FFE9173000
trusted library allocation
page read and write
1FFE48A9000
heap
page read and write
1FFF58D1000
heap
page read and write
3D01000
heap
page read and write
1FFEAC73000
trusted library allocation
page read and write
1FFE61DD000
trusted library allocation
page read and write
1FFEA9A8000
trusted library allocation
page read and write
1FFEAC8C000
trusted library allocation
page read and write
1FFEA452000
trusted library allocation
page read and write
1FFE4908000
heap
page read and write
1F82A3E0000
heap
page read and write
There are 3649 hidden memdumps, click here to show them.