IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_45fcd96f-7d16-4a2c-b54a-73b2ba21a852.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_45fcd96f-7d16-4a2c-b54a-73b2ba21a852.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\bcdaee9a-4819-42be-85cc-d4aac6b371e9 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\bcdaee9a-4819-42be-85cc-d4aac6b371e9.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2240 -prefMapHandle 2224 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d28453ce-bbb3-47cc-a509-e2588d894b94} 7700 "\\.\pipe\gecko-crash-server-pipe.7700" 1b0c946f110 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4456 -parentBuildID 20230927232528 -prefsHandle 4216 -prefMapHandle 2752 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {60ec1ea3-4057-4a16-83ca-d99827d7004b} 7700 "\\.\pipe\gecko-crash-server-pipe.7700" 1b0db4da710 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5048 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3032 -prefMapHandle 3028 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9afbe1b9-40f8-47f5-924a-bbf70670cb96} 7700 "\\.\pipe\gecko-crash-server-pipe.7700" 1b0d9a1ed10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
http://detectportal.firefox.comX
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://vk.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.17.78
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1B0E147F000
trusted library allocation
page read and write
1B0DAA68000
trusted library allocation
page read and write
1B0DB591000
trusted library allocation
page read and write
1B0E12CD000
trusted library allocation
page read and write
1B0DB4CF000
trusted library allocation
page read and write
1B0E2CC5000
trusted library allocation
page read and write
1B0D018B000
heap
page read and write
1B0D9873000
trusted library allocation
page read and write
1B0E1458000
trusted library allocation
page read and write
1B0DC656000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
C2C000
unkown
page write copy
1B0D01D4000
heap
page read and write
1B0D0190000
heap
page read and write
1B0DA6E5000
trusted library allocation
page read and write
1B0D0235000
heap
page read and write
1B0D01CC000
heap
page read and write
1B0D0185000
heap
page read and write
1B0E5366000
trusted library allocation
page read and write
1B0DA2B4000
trusted library allocation
page read and write
1FF82FEA000
heap
page read and write
1B0E19EB000
trusted library allocation
page read and write
1B0DB8E7000
trusted library allocation
page read and write
1B0DC780000
trusted library allocation
page read and write
1B0DA1C3000
trusted library allocation
page read and write
1B0E601C000
trusted library allocation
page read and write
1B0E2C99000
trusted library allocation
page read and write
1B0DB545000
trusted library allocation
page read and write
1B0E53C0000
trusted library allocation
page read and write
9C216BE000
unkown
page readonly
E77DFFF000
stack
page read and write
1B0D0182000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D01D8000
heap
page read and write
1B0D88B5000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
26AC8C60000
unclassified section
page readonly
1B0E552B000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E48F8000
trusted library allocation
page read and write
1B0DA660000
trusted library allocation
page read and write
1B0E14D6000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0E1697000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0DAB9B000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0E19EF000
trusted library allocation
page read and write
3A0000
heap
page read and write
237F7578000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D0216000
heap
page read and write
1B0E1159000
trusted library allocation
page read and write
1B0E14DA000
trusted library allocation
page read and write
1B0DAA9B000
trusted library allocation
page read and write
1B0E5191000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0E19D1000
trusted library allocation
page read and write
1B0E1482000
trusted library allocation
page read and write
1B0DB335000
trusted library allocation
page read and write
1B0E4F84000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D63A1000
trusted library allocation
page read and write
1B0E16CA000
trusted library allocation
page read and write
1B0E14F3000
trusted library allocation
page read and write
1B0E11E2000
trusted library allocation
page read and write
1B0DCB20000
trusted library allocation
page read and write
1B0DAB59000
trusted library allocation
page read and write
1B0DAD72000
trusted library allocation
page read and write
1B0E2BAC000
trusted library allocation
page read and write
1B0DCBA7000
trusted library allocation
page read and write
1B0DAD82000
trusted library allocation
page read and write
237F75F4000
trusted library allocation
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0E1AD9000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0E1376000
trusted library allocation
page read and write
1B0D93CB000
trusted library allocation
page read and write
1B0DCBF2000
trusted library allocation
page read and write
1FF82F69000
heap
page read and write
1B0D91D8000
trusted library allocation
page read and write
1B0E53C6000
trusted library allocation
page read and write
1B0DADB2000
trusted library allocation
page read and write
1B0DC6A4000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D0190000
heap
page read and write
1B0DAD6F000
trusted library allocation
page read and write
1FF82FE0000
heap
page read and write
1B0D017A000
heap
page read and write
1B0E1A84000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E1959000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0E182C000
trusted library allocation
page read and write
1B0D9980000
trusted library allocation
page read and write
1B0D01D3000
heap
page read and write
1B0E1215000
trusted library allocation
page read and write
1B0E1148000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E11AE000
trusted library allocation
page read and write
1B0DB900000
trusted library allocation
page read and write
1B0DA6F0000
trusted library allocation
page read and write
1B0E546F000
trusted library allocation
page read and write
1B0D99AA000
trusted library allocation
page read and write
1B0DC6EF000
trusted library allocation
page read and write
1B0E19E1000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
F4A6DBE000
stack
page read and write
1B0D018F000
heap
page read and write
1B0DA360000
trusted library allocation
page read and write
1B0E48E0000
trusted library allocation
page read and write
1B0D9DB3000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0D018A000
heap
page read and write
1B0E2BBB000
trusted library allocation
page read and write
24587170000
heap
page read and write
1B0DCBFA000
trusted library allocation
page read and write
E04000
heap
page read and write
1B0DAA5D000
trusted library allocation
page read and write
1B0DA9B7000
trusted library allocation
page read and write
1B0D017F000
heap
page read and write
1B0D01CE000
heap
page read and write
1B0D017C000
heap
page read and write
1B0DADCD000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E4FD4000
trusted library allocation
page read and write
1B0E169E000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0DADCD000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0DC7F9000
trusted library allocation
page read and write
1B0E12BB000
trusted library allocation
page read and write
1B0E19D8000
trusted library allocation
page read and write
1B0D0185000
heap
page read and write
1B0DCB29000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D0190000
heap
page read and write
1B0D0169000
heap
page read and write
1B0E1A45000
trusted library allocation
page read and write
237F7800000
trusted library allocation
page read and write
1FF8232F000
trusted library allocation
page read and write
1B0D619C000
trusted library allocation
page read and write
1B0D930F000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0DA9ED000
trusted library allocation
page read and write
1B0E2DEB000
trusted library allocation
page read and write
1B0E1905000
trusted library allocation
page read and write
1B0DA9F9000
trusted library allocation
page read and write
1B0E4F9F000
trusted library allocation
page read and write
1B0E1159000
trusted library allocation
page read and write
1FF82F7D000
heap
page read and write
1B0DCBAD000
trusted library allocation
page read and write
1B0D91A5000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
1B0E1174000
trusted library allocation
page read and write
1B0D933D000
trusted library allocation
page read and write
1B0DAB99000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E1A6C000
trusted library allocation
page read and write
1B0E1167000
trusted library allocation
page read and write
1B0D9061000
trusted library allocation
page read and write
1B0E1652000
trusted library allocation
page read and write
1B0E12C8000
trusted library allocation
page read and write
1B0DAB07000
trusted library allocation
page read and write
1B0D63EC000
trusted library allocation
page read and write
F4A643E000
unkown
page readonly
1B0DABFE000
trusted library allocation
page read and write
1B0E53BF000
trusted library allocation
page read and write
1FF82950000
heap
page read and write
1B0E53BC000
trusted library allocation
page read and write
1B0D8F9C000
trusted library allocation
page read and write
1B0D93AF000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0DA988000
trusted library allocation
page read and write
1B0D01A1000
heap
page read and write
1B0DC7DC000
trusted library allocation
page read and write
1B0D0162000
heap
page read and write
1B0DB3B8000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0DA17F000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0DA6FB000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0D0192000
heap
page read and write
1B0DC7CC000
trusted library allocation
page read and write
1B0E5386000
trusted library allocation
page read and write
1B0D01A8000
heap
page read and write
1B0E10BB000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D9150000
trusted library allocation
page read and write
1B0E53DE000
trusted library allocation
page read and write
1B0DAB74000
trusted library allocation
page read and write
CE0000
heap
page read and write
1B0D018A000
heap
page read and write
1B0DC538000
trusted library allocation
page read and write
1B0D51FE000
trusted library allocation
page read and write
1B0E4FC9000
trusted library allocation
page read and write
1B0DAB71000
trusted library allocation
page read and write
1B0E54B9000
trusted library allocation
page read and write
1B0E16BB000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0DC5DF000
trusted library allocation
page read and write
1B0E3AA7000
trusted library allocation
page read and write
1B0E18CA000
trusted library allocation
page read and write
1B0E1278000
trusted library allocation
page read and write
1B0DAA80000
trusted library allocation
page read and write
1B0E5376000
trusted library allocation
page read and write
1B0D01F7000
heap
page read and write
1B0E57E1000
heap
page read and write
9DB000
stack
page read and write
1FF82303000
trusted library allocation
page read and write
1B0E11A9000
trusted library allocation
page read and write
1B0DB81B000
trusted library allocation
page read and write
1B0E14F6000
trusted library allocation
page read and write
1B0E2C58000
trusted library allocation
page read and write
1B0E5524000
trusted library allocation
page read and write
1B0E54B0000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0DB4B0000
trusted library allocation
page read and write
26AC92C6000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0DC886000
trusted library allocation
page read and write
1B0E10E7000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1FF82FB2000
heap
page read and write
1B0E14A3000
trusted library allocation
page read and write
1B0DABDE000
trusted library allocation
page read and write
1B0E1827000
trusted library allocation
page read and write
1B0E2C71000
trusted library allocation
page read and write
1B0E1184000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0E19EA000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0D01CD000
heap
page read and write
892113C000
stack
page read and write
1B0E5215000
trusted library allocation
page read and write
1B0E54F4000
trusted library allocation
page read and write
1B0E5277000
trusted library allocation
page read and write
1B0E2BC7000
trusted library allocation
page read and write
264899B1000
trusted library allocation
page execute read
1B0E53CF000
trusted library allocation
page read and write
1B0D9047000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0DB862000
trusted library allocation
page read and write
1B0D918E000
trusted library allocation
page read and write
1B0E136C000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
26AC8E72000
trusted library allocation
page read and write
1B0DB345000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D01AD000
heap
page read and write
1B0DAD0E000
trusted library allocation
page read and write
1B0DA23C000
trusted library allocation
page read and write
F4A63FE000
unkown
page readonly
1B0E53D1000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0DAB99000
trusted library allocation
page read and write
1B0D61F2000
trusted library allocation
page read and write
1B0E1174000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D016C000
heap
page read and write
1B0E1839000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D017A000
heap
page read and write
1FF82F60000
heap
page read and write
1B0D61EE000
trusted library allocation
page read and write
1B0DA1D2000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0DA25B000
trusted library allocation
page read and write
1B0D8963000
trusted library allocation
page read and write
1B0DABF7000
trusted library allocation
page read and write
1B0DAD8E000
trusted library allocation
page read and write
1B0D9077000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0E37C3000
trusted library allocation
page read and write
1B0D89F4000
trusted library allocation
page read and write
1B0DAB59000
trusted library allocation
page read and write
1B0E19D8000
trusted library allocation
page read and write
1B0D01AD000
heap
page read and write
1B0DC5E6000
trusted library allocation
page read and write
1B0D8FC9000
trusted library allocation
page read and write
1B0DB463000
trusted library allocation
page read and write
1B0D0182000
heap
page read and write
1B0D01D0000
heap
page read and write
1B0E1100000
trusted library allocation
page read and write
1FF8302D000
heap
page read and write
1B0D018F000
heap
page read and write
1B0D018F000
heap
page read and write
1B0E54DF000
trusted library allocation
page read and write
1B0DA2AC000
trusted library allocation
page read and write
1B0E51F3000
trusted library allocation
page read and write
1B0E18FD000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0E12BA000
trusted library allocation
page read and write
1B0E1ACA000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0E3744000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0DA2FA000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D018A000
heap
page read and write
1B0E116A000
trusted library allocation
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0E2BB3000
trusted library allocation
page read and write
1B0DCBD0000
trusted library allocation
page read and write
C30000
unkown
page write copy
1B0D0164000
heap
page read and write
1B0D63E5000
trusted library allocation
page read and write
1B0DB4B2000
trusted library allocation
page read and write
1B0E529E000
trusted library allocation
page read and write
1B0E2CC5000
trusted library allocation
page read and write
1B0E5540000
trusted library allocation
page read and write
1FF82FFD000
heap
page read and write
1B0D018F000
heap
page read and write
1B0DADC3000
trusted library allocation
page read and write
1FF82130000
heap
page read and write
1B0E4F97000
trusted library allocation
page read and write
1B0D99B3000
trusted library allocation
page read and write
1B0E1132000
trusted library allocation
page read and write
1B0E54B9000
trusted library allocation
page read and write
1B0E51F8000
trusted library allocation
page read and write
1B0E2D4B000
trusted library allocation
page read and write
3F0000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0DC5D9000
trusted library allocation
page read and write
1B0D91C4000
trusted library allocation
page read and write
1B0E146F000
trusted library allocation
page read and write
1B0E2D4B000
trusted library allocation
page read and write
1B0E5529000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0D01DE000
heap
page read and write
1B0DB827000
trusted library allocation
page read and write
1FF823F0000
trusted library allocation
page read and write
1B0E1582000
trusted library allocation
page read and write
1B0D8F58000
trusted library allocation
page read and write
26AC9112000
trusted library allocation
page read and write
1B0DA988000
trusted library allocation
page read and write
1B0E4FD4000
trusted library allocation
page read and write
E29000
heap
page read and write
E1C000
heap
page read and write
1B0DA9F6000
trusted library allocation
page read and write
1B0DA665000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0DCBAB000
trusted library allocation
page read and write
1B0DA2AC000
trusted library allocation
page read and write
1B0D01E6000
heap
page read and write
1B0DCBD0000
trusted library allocation
page read and write
1B0E536F000
trusted library allocation
page read and write
1B0DA916000
trusted library allocation
page read and write
1B0DABC6000
trusted library allocation
page read and write
1B0DA9E7000
trusted library allocation
page read and write
1B0E10C0000
trusted library allocation
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D01D8000
heap
page read and write
1B0DB890000
trusted library allocation
page read and write
1B0DA302000
trusted library allocation
page read and write
1B0E48C1000
trusted library allocation
page read and write
1B0E18C8000
trusted library allocation
page read and write
E2F000
heap
page read and write
1B0DC88D000
trusted library allocation
page read and write
1B0DABF7000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0D01CE000
heap
page read and write
1B0D0188000
heap
page read and write
1B0DC6EF000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DC5C1000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E4FA3000
trusted library allocation
page read and write
C22000
unkown
page readonly
9FE000
stack
page read and write
1B0D01F2000
heap
page read and write
1B0DCBCB000
trusted library allocation
page read and write
1B0D9068000
trusted library allocation
page read and write
1B0D0185000
heap
page read and write
1B0D018A000
heap
page read and write
19DE000
stack
page read and write
1B0E19ED000
trusted library allocation
page read and write
1FF82FF2000
heap
page read and write
1B0D018F000
heap
page read and write
1B0E52C2000
trusted library allocation
page read and write
1B0D908A000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0E15A2000
trusted library allocation
page read and write
1B0E2CD7000
trusted library allocation
page read and write
1B0E2D2E000
trusted library allocation
page read and write
1B0E53A0000
trusted library allocation
page read and write
237F7212000
remote allocation
page execute read
1B0D0180000
heap
page read and write
1B0DAA3F000
trusted library allocation
page read and write
237F7600000
unclassified section
page read and write
1B0E3737000
trusted library allocation
page read and write
1B0DB8ED000
trusted library allocation
page read and write
1B0D933A000
trusted library allocation
page read and write
1B0E52D7000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0DABE8000
trusted library allocation
page read and write
24588DBA000
heap
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0E37AB000
trusted library allocation
page read and write
1B0D9D8E000
trusted library allocation
page read and write
1FF823F3000
trusted library allocation
page read and write
26AC8EC8000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0DB324000
trusted library allocation
page read and write
1B0E12B2000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0D9072000
trusted library allocation
page read and write
1B0D61F4000
trusted library allocation
page read and write
1B0E1598000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0E16D6000
trusted library allocation
page read and write
1B0DC6D2000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E1820000
trusted library allocation
page read and write
1B0DB9F0000
trusted library allocation
page read and write
1B0DC75A000
trusted library allocation
page read and write
1B0D022C000
heap
page read and write
9BF000
stack
page read and write
1B0DA114000
trusted library allocation
page read and write
1B0DB8F2000
trusted library allocation
page read and write
1B0DA9ED000
trusted library allocation
page read and write
1B0E4883000
trusted library allocation
page read and write
1B0D0182000
heap
page read and write
1B0DA97A000
trusted library allocation
page read and write
1B0E1ACA000
trusted library allocation
page read and write
1B0E1972000
trusted library allocation
page read and write
1FF81FC0000
heap
page read and write
1B0D0188000
heap
page read and write
1B0D0196000
heap
page read and write
1B0E4FA3000
trusted library allocation
page read and write
1FF83067000
heap
page read and write
1B0DCBE3000
trusted library allocation
page read and write
1B0E54F4000
trusted library allocation
page read and write
1B0DABA6000
trusted library allocation
page read and write
35B1000
heap
page read and write
1B0D0190000
heap
page read and write
1B0D0196000
heap
page read and write
1B0D8860000
trusted library allocation
page read and write
1B0DA16A000
trusted library allocation
page read and write
1B0D90A5000
trusted library allocation
page read and write
1B0E1140000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E1840000
trusted library allocation
page read and write
1B0D01F7000
heap
page read and write
1B0DAD88000
trusted library allocation
page read and write
BFC000
unkown
page readonly
1B0D01E9000
heap
page read and write
1B0D018F000
heap
page read and write
1B0E114C000
trusted library allocation
page read and write
1B0D90A5000
trusted library allocation
page read and write
1B0DAD33000
trusted library allocation
page read and write
1B0E18DB000
trusted library allocation
page read and write
1B0DADB8000
trusted library allocation
page read and write
1B0DCBF2000
trusted library allocation
page read and write
1FF8235C000
trusted library allocation
page read and write
1B0D9DB5000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D88DA000
trusted library allocation
page read and write
1B0D91BB000
trusted library allocation
page read and write
1B0E18F0000
trusted library allocation
page read and write
1B0E1934000
trusted library allocation
page read and write
1B0D52BC000
trusted library allocation
page read and write
1B0D01AD000
heap
page read and write
1B0DC6E9000
trusted library allocation
page read and write
1B0E5520000
trusted library allocation
page read and write
1B0D908A000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E2D46000
trusted library allocation
page read and write
1B0E2AA5000
trusted library allocation
page read and write
1B0DA9C2000
trusted library allocation
page read and write
1B0E18CF000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
E09000
heap
page read and write
C9BD9FF000
stack
page read and write
1B0E53CF000
trusted library allocation
page read and write
1B0D6448000
trusted library allocation
page read and write
1B0E2D60000
trusted library allocation
page read and write
1B0E1A91000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D01CD000
heap
page read and write
1B0E19EB000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E19D1000
trusted library allocation
page read and write
1B0D909E000
trusted library allocation
page read and write
1FF82312000
trusted library allocation
page read and write
1B0E2D66000
trusted library allocation
page read and write
1B0DCBB1000
trusted library allocation
page read and write
1B0E3A07000
trusted library allocation
page read and write
1B0D8F78000
trusted library allocation
page read and write
1B0DB8F8000
trusted library allocation
page read and write
1B0D8F24000
trusted library allocation
page read and write
1B0E2C3B000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0E14BE000
trusted library allocation
page read and write
1B0DC77D000
trusted library allocation
page read and write
1B0D90A5000
trusted library allocation
page read and write
1B0D88DC000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0DA65E000
trusted library allocation
page read and write
1B0E19BD000
trusted library allocation
page read and write
1B0E2D31000
trusted library allocation
page read and write
1B0D904B000
trusted library allocation
page read and write
1B0DA167000
trusted library allocation
page read and write
1B0E5815000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0E18EA000
trusted library allocation
page read and write
1B0DA624000
trusted library allocation
page read and write
DE0000
heap
page read and write
1B0E2BB3000
trusted library allocation
page read and write
1B0E6093000
trusted library allocation
page read and write
1B0E4B00000
trusted library allocation
page read and write
1B0E3B06000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0D01A5000
heap
page read and write
26489921000
trusted library allocation
page execute read
1B0DABF3000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0DCB90000
trusted library allocation
page read and write
1B0E1140000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E4F9B000
trusted library allocation
page read and write
1B0DAB72000
trusted library allocation
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0D937D000
trusted library allocation
page read and write
1B0DADBA000
trusted library allocation
page read and write
1B0D9196000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0D908D000
trusted library allocation
page read and write
E36000
heap
page read and write
1B0E1297000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D8F18000
trusted library allocation
page read and write
1B0E48ED000
trusted library allocation
page read and write
1B0E52E9000
trusted library allocation
page read and write
1B0DAB9B000
trusted library allocation
page read and write
1B0E5521000
trusted library allocation
page read and write
35B1000
heap
page read and write
1B0D0189000
heap
page read and write
1B0E48AB000
trusted library allocation
page read and write
1B0DB8E1000
trusted library allocation
page read and write
1B0D6309000
trusted library allocation
page read and write
24587300000
trusted library allocation
page read and write
E36000
heap
page read and write
1B0E54EC000
trusted library allocation
page read and write
1B0E1697000
trusted library allocation
page read and write
1B0E1972000
trusted library allocation
page read and write
1B0D01F7000
heap
page read and write
1B0E16EF000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E14F3000
trusted library allocation
page read and write
1B0DA984000
trusted library allocation
page read and write
1B0E2AFB000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0DAD94000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D01D3000
heap
page read and write
B60000
unkown
page readonly
1B0E19ED000
trusted library allocation
page read and write
1B0DAB69000
trusted library allocation
page read and write
1B0E3A6D000
trusted library allocation
page read and write
1B0DAA42000
trusted library allocation
page read and write
1B0DA6B7000
trusted library allocation
page read and write
E2F000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D64BE000
trusted library allocation
page read and write
1B0E18FA000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0D0190000
heap
page read and write
1B0D01CE000
heap
page read and write
1B0E13EA000
trusted library allocation
page read and write
1B0DCBAB000
trusted library allocation
page read and write
1B0D01E6000
heap
page read and write
1B0DABFE000
trusted library allocation
page read and write
1B0E48BF000
trusted library allocation
page read and write
1B0DB87A000
trusted library allocation
page read and write
1B0E154F000
trusted library allocation
page read and write
1B0E53B0000
trusted library allocation
page read and write
1B0DC6D5000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D01D0000
heap
page read and write
1B0D0188000
heap
page read and write
1B0DB862000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0D01A1000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0DA2B7000
trusted library allocation
page read and write
1B0E53A4000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0DB6C4000
trusted library allocation
page read and write
1B0DA6F3000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
B61000
unkown
page execute read
1FF82F00000
heap
page read and write
1B0DA671000
trusted library allocation
page read and write
26AC92C4000
heap
page read and write
1B0DA161000
trusted library allocation
page read and write
1B0DCBA9000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0D64C7000
trusted library allocation
page read and write
1B0E2AF2000
trusted library allocation
page read and write
1B0D985B000
trusted library allocation
page read and write
1B0E16EC000
trusted library allocation
page read and write
1B0DB9DC000
trusted library allocation
page read and write
28D902D0000
heap
page read and write
1B0D52BF000
trusted library allocation
page read and write
1B0DB8E7000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0DB37B000
trusted library allocation
page read and write
1FF821AF000
unclassified section
page read and write
1B0DC6D1000
trusted library allocation
page read and write
1B0DA225000
trusted library allocation
page read and write
1B0DCBF2000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D93EF000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D0189000
heap
page read and write
1B0DA1D5000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0E52B8000
trusted library allocation
page read and write
1B0E18FA000
trusted library allocation
page read and write
1B0DADCD000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0E6067000
trusted library allocation
page read and write
8923C7E000
stack
page read and write
1B0DA676000
trusted library allocation
page read and write
1FF82000000
unclassified section
page readonly
E29000
heap
page read and write
1B0D0169000
heap
page read and write
1B0DC54B000
trusted library allocation
page read and write
C34000
unkown
page readonly
1B0D01CB000
heap
page read and write
E0B000
heap
page read and write
1B0E1839000
trusted library allocation
page read and write
1B0D01E7000
heap
page read and write
1FF8302A000
heap
page read and write
1B0E1689000
trusted library allocation
page read and write
1B0E5438000
trusted library allocation
page read and write
DD0000
heap
page read and write
1B0D64A5000
trusted library allocation
page read and write
1B0E3A05000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0D0182000
heap
page read and write
1B0D0190000
heap
page read and write
26AC910F000
trusted library allocation
page read and write
1B0D0193000
heap
page read and write
1B0DB8B6000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E1A6C000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0E3735000
trusted library allocation
page read and write
1B0E53C5000
trusted library allocation
page read and write
1B0E12FE000
trusted library allocation
page read and write
1B0E19BD000
trusted library allocation
page read and write
1B0E5277000
trusted library allocation
page read and write
1FF823C7000
trusted library allocation
page read and write
1B0E552B000
trusted library allocation
page read and write
F4A4BD8000
stack
page read and write
1B0E1809000
trusted library allocation
page read and write
1B0DA2D3000
trusted library allocation
page read and write
1B0E11BB000
trusted library allocation
page read and write
1B0E1972000
trusted library allocation
page read and write
9C215FE000
unkown
page readonly
1B0E14B7000
trusted library allocation
page read and write
1B0E10FE000
trusted library allocation
page read and write
1B0DA110000
trusted library allocation
page read and write
1B0DA931000
trusted library allocation
page read and write
9C1E33B000
stack
page read and write
1B0D0179000
heap
page read and write
1B0E16DA000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D019A000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0E53DE000
trusted library allocation
page read and write
1B0D0179000
heap
page read and write
1B0E18FD000
trusted library allocation
page read and write
1B0D0199000
heap
page read and write
1B0E11A9000
trusted library allocation
page read and write
1B0DA282000
trusted library allocation
page read and write
1B0D019B000
heap
page read and write
1B0DAD43000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D01AD000
heap
page read and write
1B0E54A1000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0DC6D5000
trusted library allocation
page read and write
1B0E52B8000
trusted library allocation
page read and write
1B0D01A1000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D01A2000
heap
page read and write
1B0DC558000
trusted library allocation
page read and write
1B0DA6F3000
trusted library allocation
page read and write
1B0E51FE000
trusted library allocation
page read and write
F4A64FE000
stack
page read and write
1B0DB6CB000
trusted library allocation
page read and write
1B0E195B000
trusted library allocation
page read and write
1B0DAACC000
trusted library allocation
page read and write
1B0D6382000
trusted library allocation
page read and write
1B0E2D41000
trusted library allocation
page read and write
1B0E16EF000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E561F000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D0180000
heap
page read and write
1B0D4BEF000
trusted library allocation
page read and write
1B0D01E0000
heap
page read and write
1B0DA2CB000
trusted library allocation
page read and write
1B0DAD0B000
trusted library allocation
page read and write
1B0DAB91000
trusted library allocation
page read and write
1B0E19F5000
trusted library allocation
page read and write
1B0DAB91000
trusted library allocation
page read and write
1B0E57E1000
heap
page read and write
1B0D017B000
heap
page read and write
1B0D0190000
heap
page read and write
1B0DA2CE000
trusted library allocation
page read and write
28D902DF000
heap
page read and write
1B0DCBAF000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D018A000
heap
page read and write
1B0DAAC1000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E5388000
trusted library allocation
page read and write
1FF82F64000
heap
page read and write
E2F000
heap
page read and write
1B0D8FCA000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E154A000
trusted library allocation
page read and write
1B0D018D000
heap
page read and write
1B0DC7FD000
trusted library allocation
page read and write
1B0E57E1000
heap
page read and write
1B0D01AD000
heap
page read and write
1B0E52D7000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0DC8D5000
trusted library allocation
page read and write
1FF82F5C000
heap
page read and write
1B0D63E5000
trusted library allocation
page read and write
1B0DB882000
trusted library allocation
page read and write
1FF81FBA000
remote allocation
page execute read
DE8000
heap
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0D01EF000
heap
page read and write
1B0DB55B000
trusted library allocation
page read and write
1B0E13A9000
trusted library allocation
page read and write
1B0D88F2000
trusted library allocation
page read and write
1B0DC5D4000
trusted library allocation
page read and write
E29000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0D0194000
heap
page read and write
1B0E2AA5000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E11F2000
trusted library allocation
page read and write
1B0D8BD0000
heap
page read and write
1B0DB890000
trusted library allocation
page read and write
1B0D0179000
heap
page read and write
892547E000
unkown
page readonly
1B0DADA8000
trusted library allocation
page read and write
1B0E10D4000
trusted library allocation
page read and write
237F760F000
unclassified section
page read and write
E36000
heap
page read and write
1B0E18D4000
trusted library allocation
page read and write
1B0D01E1000
heap
page read and write
1B0DA9FD000
trusted library allocation
page read and write
1FF82020000
heap
page read and write
1B0E1449000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0E53B5000
trusted library allocation
page read and write
1B0E1A75000
trusted library allocation
page read and write
237F7513000
trusted library allocation
page read and write
1B0DA6B9000
trusted library allocation
page read and write
1B0D98D8000
trusted library allocation
page read and write
1B0DACE4000
trusted library allocation
page read and write
1B0DC7BC000
trusted library allocation
page read and write
1B0E18C0000
trusted library allocation
page read and write
1B0D91FC000
trusted library allocation
page read and write
1B0D90A5000
trusted library allocation
page read and write
1B0DA9F9000
trusted library allocation
page read and write
1B0DCBA7000
trusted library allocation
page read and write
1B0E11E2000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D01D0000
heap
page read and write
1B0E108E000
trusted library allocation
page read and write
E39000
heap
page read and write
1B0E37EF000
trusted library allocation
page read and write
1B0E19F5000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0DC7E4000
trusted library allocation
page read and write
1B0E2DE9000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E4F9D000
trusted library allocation
page read and write
1B0DACB5000
trusted library allocation
page read and write
1B0DAD63000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0E53C9000
trusted library allocation
page read and write
1B0E5899000
heap
page read and write
1B0DC6E7000
trusted library allocation
page read and write
1B0E18E6000
trusted library allocation
page read and write
1B0DCE6D000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0DAB91000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D52AC000
trusted library allocation
page read and write
1B0DA2C5000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0D935A000
trusted library allocation
page read and write
1B0D021F000
heap
page read and write
1B0D8F9A000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D01D9000
heap
page read and write
1B0DA2D9000
trusted library allocation
page read and write
1B0E16DF000
trusted library allocation
page read and write
1B0E19D6000
trusted library allocation
page read and write
1B0E1835000
trusted library allocation
page read and write
1B0DB9C3000
trusted library allocation
page read and write
1B0E48F8000
trusted library allocation
page read and write
1B0E2CD7000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D018A000
heap
page read and write
1FF82110000
heap
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0DCBFA000
trusted library allocation
page read and write
1B0DA2E9000
trusted library allocation
page read and write
1FF8243A000
unkown
page execute read
1B0D01A5000
heap
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0E182C000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E18DD000
trusted library allocation
page read and write
1B0DA9A3000
trusted library allocation
page read and write
1B0DB8A5000
trusted library allocation
page read and write
1B0D0191000
heap
page read and write
1B0DB6EC000
trusted library allocation
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
CF0000
heap
page read and write
1B0DC5D4000
trusted library allocation
page read and write
1B0E145F000
trusted library allocation
page read and write
1B0D5300000
trusted library allocation
page read and write
1B0E1A45000
trusted library allocation
page read and write
1B0DCBA7000
trusted library allocation
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0E52B3000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1FF82F60000
heap
page read and write
1B0D0182000
heap
page read and write
1B0E14CA000
trusted library allocation
page read and write
1B0DA9ED000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D61F9000
trusted library allocation
page read and write
1FF82FE8000
heap
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0E2BCF000
trusted library allocation
page read and write
1B0E135E000
trusted library allocation
page read and write
1B0DAB35000
trusted library allocation
page read and write
24587130000
heap
page read and write
1B0D01D8000
heap
page read and write
1B0DADC3000
trusted library allocation
page read and write
1B0E2DEB000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0DB4CA000
trusted library allocation
page read and write
26AC8D70000
heap
page read and write
1B0E4870000
trusted library allocation
page read and write
1B0DA98F000
trusted library allocation
page read and write
1B0D01D7000
heap
page read and write
1B0D0169000
heap
page read and write
1B0D01F2000
heap
page read and write
1B0E2AF4000
trusted library allocation
page read and write
1B0D01DB000
heap
page read and write
1B0E4FA1000
trusted library allocation
page read and write
1FF83067000
heap
page read and write
1B0D01CE000
heap
page read and write
245871D2000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0E48ED000
trusted library allocation
page read and write
1FF8236F000
trusted library allocation
page read and write
1B0D01E7000
heap
page read and write
1B0DADB1000
trusted library allocation
page read and write
1B0D01EC000
heap
page read and write
1B0E3743000
trusted library allocation
page read and write
1B0D91A8000
trusted library allocation
page read and write
1B0DCBAF000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E48B9000
trusted library allocation
page read and write
237F7654000
heap
page read and write
1B0E18CF000
trusted library allocation
page read and write
1B0E1814000
trusted library allocation
page read and write
1B0E10DF000
trusted library allocation
page read and write
1B0E180E000
trusted library allocation
page read and write
1B0D017B000
heap
page read and write
1B0E5526000
trusted library allocation
page read and write
237F7190000
unclassified section
page readonly
1B0D017A000
heap
page read and write
1B0D91D8000
trusted library allocation
page read and write
1B0DAAE7000
trusted library allocation
page read and write
9C1FDFE000
stack
page read and write
E0C000
heap
page read and write
237F73D0000
heap
page read and write
1B0DC6D5000
trusted library allocation
page read and write
1B0DC8D1000
trusted library allocation
page read and write
1B0DC6E7000
trusted library allocation
page read and write
1B0DC764000
trusted library allocation
page read and write
1B0E2A98000
trusted library allocation
page read and write
1FF82FE1000
heap
page read and write
1B0E15CA000
trusted library allocation
page read and write
1B0DAB8A000
trusted library allocation
page read and write
1B0DC7B2000
trusted library allocation
page read and write
1B0E51B0000
trusted library allocation
page read and write
1B0D022F000
heap
page read and write
1B0E4FD4000
trusted library allocation
page read and write
1B0DAB6F000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
1B0D0196000
heap
page read and write
1B0D64BC000
trusted library allocation
page read and write
1B0D99D5000
trusted library allocation
page read and write
24588EC0000
heap
page read and write
1B0D017A000
heap
page read and write
1B0D0196000
heap
page read and write
1B0E1A84000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0DA2BE000
trusted library allocation
page read and write
26AC92D0000
heap
page read and write
1B0D4BCD000
trusted library allocation
page read and write
1B0DA2E9000
trusted library allocation
page read and write
1B0DAB5B000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0E1676000
trusted library allocation
page read and write
1B0E1476000
trusted library allocation
page read and write
1B0E197E000
trusted library allocation
page read and write
1B0E112E000
trusted library allocation
page read and write
1B0D9D23000
trusted library allocation
page read and write
1B0E5215000
trusted library allocation
page read and write
1B0E1539000
trusted library allocation
page read and write
1B0DCB09000
trusted library allocation
page read and write
1B0E11A6000
trusted library allocation
page read and write
26AC8E23000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0DA2E9000
trusted library allocation
page read and write
1B0D01ED000
heap
page read and write
1B0DCE2F000
trusted library allocation
page read and write
1B0D01F7000
heap
page read and write
1B0E52DF000
trusted library allocation
page read and write
1B0E1A52000
trusted library allocation
page read and write
1B0DA671000
trusted library allocation
page read and write
1B0D9175000
trusted library allocation
page read and write
1B0DCE9E000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D52C7000
trusted library allocation
page read and write
1B0DADC3000
trusted library allocation
page read and write
1B0E5386000
trusted library allocation
page read and write
1B0DC6C9000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0DA288000
trusted library allocation
page read and write
1B0DB886000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D01E7000
heap
page read and write
E2F000
heap
page read and write
1B0D99E7000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0DC66E000
trusted library allocation
page read and write
1B0DA3FC000
trusted library allocation
page read and write
1B0DAD92000
trusted library allocation
page read and write
237F7610000
heap
page read and write
1B0DA6A8000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E2CC5000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0D019A000
heap
page read and write
1B0DA935000
trusted library allocation
page read and write
1B0E114C000
trusted library allocation
page read and write
1B0E1A3F000
trusted library allocation
page read and write
1B0E1A3F000
trusted library allocation
page read and write
1B0D9179000
trusted library allocation
page read and write
1B0D9DFC000
trusted library allocation
page read and write
1B0DA9E1000
trusted library allocation
page read and write
1B0DCB63000
trusted library allocation
page read and write
1B0E1238000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0E128F000
trusted library allocation
page read and write
1B0E11AE000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0D0179000
heap
page read and write
1B0E4877000
trusted library allocation
page read and write
1B0D8860000
trusted library allocation
page read and write
1B0DA6FB000
trusted library allocation
page read and write
1B0E4852000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D63C5000
trusted library allocation
page read and write
1FF82FEA000
heap
page read and write
1B0E3A41000
trusted library allocation
page read and write
1B0DAAB1000
trusted library allocation
page read and write
237F7530000
trusted library allocation
page read and write
1B0E1694000
trusted library allocation
page read and write
1B0DB8A5000
trusted library allocation
page read and write
1B0E2BC7000
trusted library allocation
page read and write
1B0DC7DC000
trusted library allocation
page read and write
1B0D0182000
heap
page read and write
1B0DAA9B000
trusted library allocation
page read and write
1B0E53CC000
trusted library allocation
page read and write
1B0D9373000
trusted library allocation
page read and write
1FF8303B000
heap
page read and write
1B0E5492000
trusted library allocation
page read and write
1B0E1691000
trusted library allocation
page read and write
1B0DA3AE000
trusted library allocation
page read and write
1B0D8F9A000
trusted library allocation
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0DADC3000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0E11A4000
trusted library allocation
page read and write
26AC8F30000
unclassified section
page read and write
1B0DA2EB000
trusted library allocation
page read and write
1B0E2D60000
trusted library allocation
page read and write
1B0E48BD000
trusted library allocation
page read and write
1B0DAAE7000
trusted library allocation
page read and write
1B0D0238000
heap
page read and write
1FF82F7F000
heap
page read and write
1B0E1471000
trusted library allocation
page read and write
1B0D91BB000
trusted library allocation
page read and write
1B0DADBA000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D01E6000
heap
page read and write
1B0D613E000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D0192000
heap
page read and write
1B0D0192000
heap
page read and write
1B0D61F4000
trusted library allocation
page read and write
1B0DAD92000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0DAB94000
trusted library allocation
page read and write
1B0D93EC000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E4FA1000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0E1151000
trusted library allocation
page read and write
1B0E54E9000
trusted library allocation
page read and write
1B0E489B000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0E1116000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0DA12B000
trusted library allocation
page read and write
1B0D9068000
trusted library allocation
page read and write
1B0DA231000
trusted library allocation
page read and write
1B0DAC93000
trusted library allocation
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0DA2B1000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0D0190000
heap
page read and write
1B0E551B000
trusted library allocation
page read and write
1B0E3AC5000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0D018F000
heap
page read and write
1B0E5380000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D01D0000
heap
page read and write
1B0E53B7000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0DAB86000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D0180000
heap
page read and write
1B0DA22C000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D0181000
heap
page read and write
1B0E5527000
trusted library allocation
page read and write
1B0E14BC000
trusted library allocation
page read and write
1B0DAB99000
trusted library allocation
page read and write
1B0DC660000
trusted library allocation
page read and write
1B0DADBB000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E1565000
trusted library allocation
page read and write
1B0DA287000
trusted library allocation
page read and write
1B0DAA5D000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0DABB9000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
237F71A0000
unclassified section
page readonly
1B0DA900000
trusted library allocation
page read and write
1B0D017B000
heap
page read and write
1B0E51F8000
trusted library allocation
page read and write
1B0DAADB000
trusted library allocation
page read and write
1B0E18D7000
trusted library allocation
page read and write
1B0D8F84000
trusted library allocation
page read and write
26AC8EE6000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0DA2C2000
trusted library allocation
page read and write
1B0DA972000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DA33E000
trusted library allocation
page read and write
1B0D64F6000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D019A000
heap
page read and write
1B0D0188000
heap
page read and write
1B0D0169000
heap
page read and write
1B0DB446000
trusted library allocation
page read and write
1B0E14A0000
trusted library allocation
page read and write
1B0D61E3000
trusted library allocation
page read and write
1B0E1235000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0DA2C3000
trusted library allocation
page read and write
1B0D9DE3000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0DA633000
trusted library allocation
page read and write
1B0DAA7E000
trusted library allocation
page read and write
1B0DA142000
trusted library allocation
page read and write
245874F5000
heap
page read and write
1B0D8F71000
trusted library allocation
page read and write
1B0E15A4000
trusted library allocation
page read and write
1B0D933D000
trusted library allocation
page read and write
1B0E2D33000
trusted library allocation
page read and write
1B0E57EB000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0D019C000
heap
page read and write
1B0E11A6000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0DAD63000
trusted library allocation
page read and write
1B0E48DB000
trusted library allocation
page read and write
F4A7DBE000
stack
page read and write
1FF82386000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0DC88D000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D0185000
heap
page read and write
1B0D9175000
trusted library allocation
page read and write
1B0E2C48000
trusted library allocation
page read and write
1B0E14FD000
trusted library allocation
page read and write
E14000
heap
page read and write
1B0D52F5000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0D0192000
heap
page read and write
1B0E2AF6000
trusted library allocation
page read and write
1B0D9061000
trusted library allocation
page read and write
28D90507000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0DAB71000
trusted library allocation
page read and write
1B0D8F7C000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
1B0E2D66000
trusted library allocation
page read and write
1B0E2DED000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E121C000
trusted library allocation
page read and write
1B0E2D41000
trusted library allocation
page read and write
1B0DABA6000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0D0191000
heap
page read and write
1B0DA2E7000
trusted library allocation
page read and write
28D9050A000
trusted library allocation
page read and write
1B0E11F7000
trusted library allocation
page read and write
1B0DB3A8000
trusted library allocation
page read and write
1B0E3A4D000
trusted library allocation
page read and write
1B0DA645000
trusted library allocation
page read and write
1B0E18F5000
trusted library allocation
page read and write
1B0DB3E1000
trusted library allocation
page read and write
1B0DA9D2000
trusted library allocation
page read and write
1B0E15FC000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
24587500000
trusted library allocation
page read and write
1B0D9158000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DC7CC000
trusted library allocation
page read and write
1B0E12E5000
trusted library allocation
page read and write
1FF82315000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D0196000
heap
page read and write
1B0DA2F3000
trusted library allocation
page read and write
1B0D9DBC000
trusted library allocation
page read and write
1B0DAD83000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0E545F000
trusted library allocation
page read and write
1B0E2BCA000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0DCBAB000
trusted library allocation
page read and write
1B0DA676000
trusted library allocation
page read and write
E77BFFF000
stack
page read and write
1B0E14A6000
trusted library allocation
page read and write
1B0E16FE000
trusted library allocation
page read and write
1B0DC525000
trusted library allocation
page read and write
1FF82E1F000
trusted library allocation
page read and write
89210FE000
unkown
page readonly
1B0DB684000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DADBB000
trusted library allocation
page read and write
245871A7000
heap
page read and write
1B0D9193000
trusted library allocation
page read and write
1B0E5374000
trusted library allocation
page read and write
1B0DC5FA000
trusted library allocation
page read and write
1B0DAB90000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D019A000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0E18F2000
trusted library allocation
page read and write
1B0E2A9D000
trusted library allocation
page read and write
1B0DB5C8000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0E2AFB000
trusted library allocation
page read and write
1B0D913D000
trusted library allocation
page read and write
1B0E19D6000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E52AA000
trusted library allocation
page read and write
1B0DAD8C000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
C34000
unkown
page readonly
1B0DC563000
trusted library allocation
page read and write
1FF82FFD000
heap
page read and write
1B0D64DC000
trusted library allocation
page read and write
C22000
unkown
page readonly
1B0DB654000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0DB8BE000
trusted library allocation
page read and write
1B0DC8E5000
trusted library allocation
page read and write
1B0DAB90000
trusted library allocation
page read and write
1B0DABDE000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0D01B2000
heap
page read and write
1B0DAA74000
trusted library allocation
page read and write
1B0DAADD000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D0189000
heap
page read and write
1B0E53C1000
trusted library allocation
page read and write
1B0DA1C1000
trusted library allocation
page read and write
1B0D88E5000
trusted library allocation
page read and write
1B0E1A61000
trusted library allocation
page read and write
1B0D9376000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
1B0D018F000
heap
page read and write
1B0D0164000
heap
page read and write
1B0DA641000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0E4FA5000
trusted library allocation
page read and write
1B0DCBF2000
trusted library allocation
page read and write
1B0E5388000
trusted library allocation
page read and write
1B0D0191000
heap
page read and write
1B0D0192000
heap
page read and write
1B0E5542000
trusted library allocation
page read and write
1B0E19DB000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D01F2000
heap
page read and write
1B0D9DD6000
trusted library allocation
page read and write
1B0D8905000
trusted library allocation
page read and write
1B0DAB91000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E54CD000
trusted library allocation
page read and write
1B0DA2AE000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0DCE84000
trusted library allocation
page read and write
1B0E18C0000
trusted library allocation
page read and write
1B0D5226000
trusted library allocation
page read and write
1B0D9055000
trusted library allocation
page read and write
1B0DC5A9000
trusted library allocation
page read and write
1B0E3987000
trusted library allocation
page read and write
1B0E1438000
trusted library allocation
page read and write
1B0D018C000
heap
page read and write
1B0DA3E1000
trusted library allocation
page read and write
1B0DB8CC000
trusted library allocation
page read and write
1FF82FFD000
heap
page read and write
1B0E2D33000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0DB85D000
trusted library allocation
page read and write
1B0D9352000
trusted library allocation
page read and write
1B0E48C1000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0DBAA3000
trusted library allocation
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0D01E6000
heap
page read and write
1B0D01D3000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0E195B000
trusted library allocation
page read and write
26AC8ECB000
trusted library allocation
page read and write
1B0E2D4B000
trusted library allocation
page read and write
1B0E14D1000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E51EF000
trusted library allocation
page read and write
E3A000
heap
page read and write
1B0DAB86000
trusted library allocation
page read and write
1B0DA6FB000
trusted library allocation
page read and write
1B0D01E4000
heap
page read and write
F4A657E000
stack
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0DCF93000
trusted library allocation
page read and write
1B0E524E000
trusted library allocation
page read and write
1B0D63A1000
trusted library allocation
page read and write
1B0D01A8000
heap
page read and write
1B0E53BC000
trusted library allocation
page read and write
1B0E12CD000
trusted library allocation
page read and write
1B0E54B0000
trusted library allocation
page read and write
1B0DCBA9000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E19D3000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D0190000
heap
page read and write
237F7569000
trusted library allocation
page read and write
1B0E53D3000
trusted library allocation
page read and write
F4A85BE000
unkown
page readonly
1B0E2CFE000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E3AA3000
trusted library allocation
page read and write
1B0DABCE000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E12E5000
trusted library allocation
page read and write
1B0E12F6000
trusted library allocation
page read and write
1B0D901F000
trusted library allocation
page read and write
1B0DA927000
trusted library allocation
page read and write
1B0E5327000
trusted library allocation
page read and write
1B0E48FC000
trusted library allocation
page read and write
1B0D64F6000
trusted library allocation
page read and write
1B0E60AC000
trusted library allocation
page read and write
1B0DC744000
trusted library allocation
page read and write
1B0D99BA000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E51DD000
trusted library allocation
page read and write
1B0E159C000
trusted library allocation
page read and write
1B0E54CD000
trusted library allocation
page read and write
1B0E3AE4000
trusted library allocation
page read and write
1B0E529E000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0D0190000
heap
page read and write
1B0D8F15000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0DADBA000
trusted library allocation
page read and write
1B0D88BF000
trusted library allocation
page read and write
1B0E4855000
trusted library allocation
page read and write
26AC8F20000
heap
page readonly
1B0D01D0000
heap
page read and write
1B0D018F000
heap
page read and write
9C226BE000
unkown
page readonly
26AC8F32000
unclassified section
page read and write
1B0E52C2000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0D0181000
heap
page read and write
237F755F000
trusted library allocation
page read and write
237F7582000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D0238000
heap
page read and write
1B0DAB4B000
trusted library allocation
page read and write
1B0E52C7000
trusted library allocation
page read and write
1B0DACA3000
trusted library allocation
page read and write
1B0D61FB000
trusted library allocation
page read and write
1B0D61A4000
trusted library allocation
page read and write
F4A75BE000
unkown
page readonly
1B0D90A5000
trusted library allocation
page read and write
1B0D01B2000
heap
page read and write
1B0E10CE000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E10D8000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0DB4E4000
trusted library allocation
page read and write
1B0DC7E6000
trusted library allocation
page read and write
1B0E54DF000
trusted library allocation
page read and write
1B0E48BD000
trusted library allocation
page read and write
1B0DA980000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E2CBB000
trusted library allocation
page read and write
1B0D8F6D000
trusted library allocation
page read and write
1B0E2A8B000
trusted library allocation
page read and write
1B0E2A8E000
trusted library allocation
page read and write
1B0DAB90000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0E1A6C000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
B61000
unkown
page execute read
1B0E53E4000
trusted library allocation
page read and write
1B0D01DD000
heap
page read and write
1B0DAB5D000
trusted library allocation
page read and write
1B0DB9DE000
trusted library allocation
page read and write
245871B1000
heap
page read and write
1B0E52E9000
trusted library allocation
page read and write
1B0E543E000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0DA2A8000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0D0188000
heap
page read and write
1B0DA6F3000
trusted library allocation
page read and write
1B0DA1BC000
trusted library allocation
page read and write
26AC9000000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0E2BA9000
trusted library allocation
page read and write
1B0DCB63000
trusted library allocation
page read and write
1B0DB422000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0E49A8000
trusted library allocation
page read and write
1B0E52D9000
trusted library allocation
page read and write
1B0D018D000
heap
page read and write
1B0D8F71000
trusted library allocation
page read and write
1B0E15EE000
trusted library allocation
page read and write
1B0DA6F0000
trusted library allocation
page read and write
1B0D52C7000
trusted library allocation
page read and write
1B0D017D000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D0192000
heap
page read and write
1B0E1535000
trusted library allocation
page read and write
1B0D9DFE000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D8F54000
trusted library allocation
page read and write
1B0D0162000
heap
page read and write
1B0E16B3000
trusted library allocation
page read and write
1B0D9147000
trusted library allocation
page read and write
1B0E1151000
trusted library allocation
page read and write
1B0DA667000
trusted library allocation
page read and write
1B0E2BB6000
trusted library allocation
page read and write
1B0DB864000
trusted library allocation
page read and write
1B0D99C9000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E11D2000
trusted library allocation
page read and write
1B0D91D5000
trusted library allocation
page read and write
1B0E54A1000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0DCBE8000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D0166000
heap
page read and write
1B0D4B98000
trusted library allocation
page read and write
1FF82F69000
heap
page read and write
1B0D019A000
heap
page read and write
1B0DAD63000
trusted library allocation
page read and write
1B0E1363000
trusted library allocation
page read and write
1B0D938D000
trusted library allocation
page read and write
1B0E2D46000
trusted library allocation
page read and write
1B0DA6E5000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
237F7260000
heap
page read and write
1B0DA6B9000
trusted library allocation
page read and write
1B0D63C2000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
26AC8E67000
trusted library allocation
page read and write
1B0E2DC1000
trusted library allocation
page read and write
1B0E58C1000
heap
page read and write
1B0D61CE000
trusted library allocation
page read and write
1B0E19F5000
trusted library allocation
page read and write
26AC8E7B000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D017C000
heap
page read and write
1FF828C3000
unkown
page execute read
1B0DA2B9000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0DA244000
trusted library allocation
page read and write
1B0DA1B8000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DB8A5000
trusted library allocation
page read and write
1FF82300000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
E13000
heap
page read and write
1B0E48B9000
trusted library allocation
page read and write
1B0DAAB7000
trusted library allocation
page read and write
1B0E18DD000
trusted library allocation
page read and write
1B0D01EB000
heap
page read and write
1B0DC7C6000
trusted library allocation
page read and write
26AC8C80000
heap
page read and write
1B0D01A4000
heap
page read and write
1B0E1165000
trusted library allocation
page read and write
1B0E48F8000
trusted library allocation
page read and write
1B0E4867000
trusted library allocation
page read and write
1B0E1959000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D5123000
trusted library allocation
page read and write
1B0D01D9000
heap
page read and write
1B0D018A000
heap
page read and write
1B0E4F99000
trusted library allocation
page read and write
1B0DAB6A000
trusted library allocation
page read and write
1B0D01EB000
heap
page read and write
1B0DA244000
trusted library allocation
page read and write
1FF823C3000
trusted library allocation
page read and write
1B0E52A9000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E19E6000
trusted library allocation
page read and write
1B0E53CC000
trusted library allocation
page read and write
1B0DB3D6000
trusted library allocation
page read and write
237F7390000
heap
page read and write
1B0D01D0000
heap
page read and write
28D90400000
trusted library allocation
page read and write
1B0DADCD000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D0164000
heap
page read and write
1B0DA6B9000
trusted library allocation
page read and write
1B0E1694000
trusted library allocation
page read and write
1B0DADA8000
trusted library allocation
page read and write
1B0D938D000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0DC63F000
trusted library allocation
page read and write
1B0DA2BE000
trusted library allocation
page read and write
1B0DB8BE000
trusted library allocation
page read and write
1B0DA1BC000
trusted library allocation
page read and write
1B0DA2D9000
trusted library allocation
page read and write
1B0D8BB8000
heap
page read and write
1B0E487A000
trusted library allocation
page read and write
1B0D9045000
trusted library allocation
page read and write
1B0DAB9B000
trusted library allocation
page read and write
1B0D6141000
trusted library allocation
page read and write
1B0D8F8A000
trusted library allocation
page read and write
1B0E5834000
heap
page read and write
1B0D8FB3000
trusted library allocation
page read and write
1B0E14F6000
trusted library allocation
page read and write
1B0D91CC000
trusted library allocation
page read and write
1B0DA9D2000
trusted library allocation
page read and write
1B0E53CF000
trusted library allocation
page read and write
9C1E3BE000
unkown
page readonly
1B0E19DB000
trusted library allocation
page read and write
1B0DA2B4000
trusted library allocation
page read and write
1B0D99BE000
trusted library allocation
page read and write
1B0E19D8000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E165B000
trusted library allocation
page read and write
1B0E16DA000
trusted library allocation
page read and write
1B0DADA8000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D0169000
heap
page read and write
1B0D913B000
trusted library allocation
page read and write
1B0DA21A000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0E5191000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0DC6EF000
trusted library allocation
page read and write
1B0DA1DE000
trusted library allocation
page read and write
1B0E48F8000
trusted library allocation
page read and write
E34000
heap
page read and write
1B0DABDE000
trusted library allocation
page read and write
1FF82377000
trusted library allocation
page read and write
1B0E12F9000
trusted library allocation
page read and write
1B0D018E000
heap
page read and write
1B0E4FC9000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D01F7000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0E115C000
trusted library allocation
page read and write
1B0DA2E7000
trusted library allocation
page read and write
1B0E5524000
trusted library allocation
page read and write
E36000
heap
page read and write
1B0E57E1000
heap
page read and write
1B0D64AA000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0D0192000
heap
page read and write
1B0D018F000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0D01DF000
heap
page read and write
1B0DAB6F000
trusted library allocation
page read and write
1B0E147B000
trusted library allocation
page read and write
245871A0000
heap
page read and write
1B0D0192000
heap
page read and write
1B0DA6F0000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0DAB99000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0E11A6000
trusted library allocation
page read and write
1B0DA2A2000
trusted library allocation
page read and write
1B0D8889000
trusted library allocation
page read and write
1B0E5529000
trusted library allocation
page read and write
1B0D01F7000
heap
page read and write
1B0E2BA9000
trusted library allocation
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0DAD6F000
trusted library allocation
page read and write
1B0DC5F8000
trusted library allocation
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0E2BA4000
trusted library allocation
page read and write
1B0E2B23000
trusted library allocation
page read and write
1B0E10B9000
trusted library allocation
page read and write
1B0E5851000
heap
page read and write
1B0D01CB000
heap
page read and write
24588DA0000
heap
page read and write
1B0E11F9000
trusted library allocation
page read and write
1B0DABFE000
trusted library allocation
page read and write
1FF82F8A000
heap
page read and write
1B0E10C4000
trusted library allocation
page read and write
1B0DA3E9000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E1428000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E18F0000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0DA6B7000
trusted library allocation
page read and write
1B0DB492000
trusted library allocation
page read and write
1B0E19BD000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D5171000
trusted library allocation
page read and write
1B0E551D000
trusted library allocation
page read and write
1B0D01E3000
heap
page read and write
1B0D5217000
trusted library allocation
page read and write
1B0DB8D6000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D8FAC000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
E36000
heap
page read and write
1B0E16FD000
trusted library allocation
page read and write
1B0DA96A000
trusted library allocation
page read and write
1FF83022000
heap
page read and write
1B0DABE1000
trusted library allocation
page read and write
1B0DA22B000
trusted library allocation
page read and write
1B0E18C5000
trusted library allocation
page read and write
26AC8E12000
trusted library allocation
page read and write
1B0DC533000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0DABE6000
trusted library allocation
page read and write
1B0DAABB000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B30003F000
trusted library allocation
page read and write
1B0D61FB000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0DB3C7000
trusted library allocation
page read and write
1B0E48E5000
trusted library allocation
page read and write
1B0E54A0000
trusted library allocation
page read and write
1B0DA6B7000
trusted library allocation
page read and write
1B0E1378000
trusted library allocation
page read and write
1B0E3B2E000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0D01A1000
heap
page read and write
1B0E538B000
trusted library allocation
page read and write
1B0D93FE000
trusted library allocation
page read and write
1B0DCB63000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
E39000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0DCBB1000
trusted library allocation
page read and write
1B0E2CB9000
trusted library allocation
page read and write
1B0DA6A8000
trusted library allocation
page read and write
1B0DB870000
trusted library allocation
page read and write
1B0DA2D9000
trusted library allocation
page read and write
1B0E119E000
trusted library allocation
page read and write
1B0D637B000
trusted library allocation
page read and write
1B0D4BF8000
trusted library allocation
page read and write
1B0DC6E7000
trusted library allocation
page read and write
1B0E19E6000
trusted library allocation
page read and write
1B0DA6B9000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E1839000
trusted library allocation
page read and write
1B0DAD53000
trusted library allocation
page read and write
1B0DA22C000
trusted library allocation
page read and write
1B0D51F6000
trusted library allocation
page read and write
1B0D8872000
trusted library allocation
page read and write
1B0E51F3000
trusted library allocation
page read and write
1B0E10F5000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D0196000
heap
page read and write
1B0D512F000
trusted library allocation
page read and write
1B0D0165000
heap
page read and write
1B0D01CB000
heap
page read and write
E17000
heap
page read and write
26AC8E5B000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0D01CE000
heap
page read and write
1B0D01A5000
heap
page read and write
1B0DA66F000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E2AF2000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
26AC910C000
trusted library allocation
page read and write
1B0E2CD7000
trusted library allocation
page read and write
1B0DB59D000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1FF82F60000
heap
page read and write
1B0DCBE8000
trusted library allocation
page read and write
1B0DA643000
trusted library allocation
page read and write
1B0E52E9000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1FF82FF1000
heap
page read and write
1B0D91FC000
trusted library allocation
page read and write
1B0E14A0000
trusted library allocation
page read and write
1B0D019F000
heap
page read and write
1B0D01AB000
heap
page read and write
1B0D018D000
heap
page read and write
1B0DA6F5000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DA979000
trusted library allocation
page read and write
1B0DA6B7000
trusted library allocation
page read and write
1B0DA282000
trusted library allocation
page read and write
1B0D88C9000
trusted library allocation
page read and write
1B0D0175000
heap
page read and write
1B0D0196000
heap
page read and write
1B0E136A000
trusted library allocation
page read and write
1B0D93D5000
trusted library allocation
page read and write
1B0D017B000
heap
page read and write
1B0D99D1000
trusted library allocation
page read and write
26AC8E10000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D51F6000
trusted library allocation
page read and write
1B0E51CD000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0DAB4C000
trusted library allocation
page read and write
1FF823E9000
trusted library allocation
page read and write
1B0DCBAF000
trusted library allocation
page read and write
1B0E48C4000
trusted library allocation
page read and write
1B0DCBE3000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D016C000
heap
page read and write
1B0E19E1000
trusted library allocation
page read and write
1B0D8833000
trusted library allocation
page read and write
1B0E11E1000
trusted library allocation
page read and write
1B0D93F0000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D0160000
heap
page read and write
1B0E19FD000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DB875000
trusted library allocation
page read and write
1B0DA6F7000
trusted library allocation
page read and write
9C1E2BE000
unkown
page readonly
1B0E1939000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DA3CE000
trusted library allocation
page read and write
1B0D91FC000
trusted library allocation
page read and write
1B0D01F7000
heap
page read and write
1B0DB9F4000
trusted library allocation
page read and write
1B0E1A52000
trusted library allocation
page read and write
1B0D9147000
trusted library allocation
page read and write
1B0D8F54000
trusted library allocation
page read and write
1B0E16DA000
trusted library allocation
page read and write
1B0D0184000
heap
page read and write
1B0E16DA000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
E2F000
heap
page read and write
1B0D63E6000
trusted library allocation
page read and write
1B0E5479000
trusted library allocation
page read and write
1B0E2A98000
trusted library allocation
page read and write
1B0E5386000
trusted library allocation
page read and write
1FF82FA1000
heap
page read and write
1B0D017A000
heap
page read and write
1B0DA6E5000
trusted library allocation
page read and write
1B0DA2E7000
trusted library allocation
page read and write
1B0D93FB000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E2BA9000
trusted library allocation
page read and write
1B0E4FA1000
trusted library allocation
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D0194000
heap
page read and write
1B0D0180000
heap
page read and write
1B0DA660000
trusted library allocation
page read and write
1B0E1484000
trusted library allocation
page read and write
1B0E5315000
trusted library allocation
page read and write
1FF83020000
heap
page read and write
E20000
heap
page read and write
1B0D0192000
heap
page read and write
1B0E48ED000
trusted library allocation
page read and write
1FF82FF1000
heap
page read and write
26AC8E0D000
trusted library allocation
page read and write
1B0D01AD000
heap
page read and write
1B0E53CB000
trusted library allocation
page read and write
1B0D01E1000
heap
page read and write
E32000
heap
page read and write
1B0DA6F3000
trusted library allocation
page read and write
1B0D61F9000
trusted library allocation
page read and write
1B0D5266000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
1B0DAD9A000
trusted library allocation
page read and write
1B0E2DED000
trusted library allocation
page read and write
26AC92E0000
heap
page read and write
1B0D01DE000
heap
page read and write
1FF82FFD000
heap
page read and write
1B0E2CAC000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0DA6B5000
trusted library allocation
page read and write
26AC8E2E000
trusted library allocation
page read and write
1B0D938D000
trusted library allocation
page read and write
1B0E1691000
trusted library allocation
page read and write
1B0DADDC000
trusted library allocation
page read and write
1B0D01F1000
heap
page read and write
1B0D9175000
trusted library allocation
page read and write
1B0E37B1000
trusted library allocation
page read and write
1B0D019F000
heap
page read and write
1B0DCF67000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0D018F000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0DA1A7000
trusted library allocation
page read and write
1B0E51A4000
trusted library allocation
page read and write
1B0E11C1000
trusted library allocation
page read and write
1FF82454000
heap
page read and write
1B0D019F000
heap
page read and write
1B0D0188000
heap
page read and write
1B0D021F000
heap
page read and write
1B0D019A000
heap
page read and write
237F7240000
heap
page read and write
1B0DA2D9000
trusted library allocation
page read and write
1B0DB654000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0E1840000
trusted library allocation
page read and write
1B0D6356000
trusted library allocation
page read and write
1B0D908A000
trusted library allocation
page read and write
26AC9104000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D018F000
heap
page read and write
1B0D619C000
trusted library allocation
page read and write
9C1E338000
stack
page read and write
1B0E6050000
trusted library allocation
page read and write
1B0DA9F9000
trusted library allocation
page read and write
1B0D9189000
trusted library allocation
page read and write
1B0D01A6000
heap
page read and write
1B0DAB86000
trusted library allocation
page read and write
1B0E19EF000
trusted library allocation
page read and write
1B0DABC6000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0DC5D2000
trusted library allocation
page read and write
1B0D9179000
trusted library allocation
page read and write
1B0DA2B7000
trusted library allocation
page read and write
1B0D99F2000
trusted library allocation
page read and write
1B0DAD93000
trusted library allocation
page read and write
1B0DB4F2000
trusted library allocation
page read and write
1B0DCBAD000
trusted library allocation
page read and write
1B0D90A5000
trusted library allocation
page read and write
1B0E13EA000
trusted library allocation
page read and write
1B0DB4D6000
trusted library allocation
page read and write
1B0DADBD000
trusted library allocation
page read and write
CE4000
heap
page read and write
1B0D99CE000
trusted library allocation
page read and write
1B0E1817000
trusted library allocation
page read and write
1B0E1A91000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D0175000
heap
page read and write
1B0D019A000
heap
page read and write
237F7660000
heap
page read and write
1B0E1940000
trusted library allocation
page read and write
1B0E1289000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0E11CC000
trusted library allocation
page read and write
1B0E1067000
trusted library allocation
page read and write
1B0E10E7000
trusted library allocation
page read and write
1B0D01E8000
heap
page read and write
1B0D0192000
heap
page read and write
1B0E2CBB000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E53D3000
trusted library allocation
page read and write
1B0DA6F0000
trusted library allocation
page read and write
1B0D0175000
heap
page read and write
1B0DAB81000
trusted library allocation
page read and write
1B0D9DE8000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0DA907000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D0184000
heap
page read and write
1B0DAB2C000
trusted library allocation
page read and write
1B0DA6A8000
trusted library allocation
page read and write
1B0DAB06000
trusted library allocation
page read and write
1B0DA91A000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D9179000
trusted library allocation
page read and write
1B0E2CFE000
trusted library allocation
page read and write
1B0DA305000
trusted library allocation
page read and write
1B0DAB91000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0E48C7000
trusted library allocation
page read and write
BFC000
unkown
page readonly
1B0D63E5000
trusted library allocation
page read and write
1B0E5521000
trusted library allocation
page read and write
1B0E48F5000
trusted library allocation
page read and write
237F73D3000
heap
page read and write
1B0E6005000
trusted library allocation
page read and write
1B0D9DC0000
trusted library allocation
page read and write
1B0E529E000
trusted library allocation
page read and write
1B0D8F63000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
1B0DAA84000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0D9147000
trusted library allocation
page read and write
1B0DA2D9000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0E53D3000
trusted library allocation
page read and write
1B0DC6EB000
trusted library allocation
page read and write
1B0E544B000
trusted library allocation
page read and write
1B0DA1DE000
trusted library allocation
page read and write
1B0E48BF000
trusted library allocation
page read and write
1B0E2BA9000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0E18E6000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
26AC8F50000
heap
page read and write
1B0D51FB000
trusted library allocation
page read and write
1FF83020000
heap
page read and write
1B0E2CD0000
trusted library allocation
page read and write
28D902D9000
heap
page read and write
1FF8303B000
heap
page read and write
1B0D4BA8000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DB591000
trusted library allocation
page read and write
1B0E16DF000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0D631A000
trusted library allocation
page read and write
1B0E1939000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E2CD0000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0E16EC000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0D01DE000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0E2D3E000
trusted library allocation
page read and write
1B0DA6FB000
trusted library allocation
page read and write
1B0DC57F000
trusted library allocation
page read and write
1B0DABF7000
trusted library allocation
page read and write
1B0E19E1000
trusted library allocation
page read and write
1FF82361000
trusted library allocation
page read and write
1B0E16DF000
trusted library allocation
page read and write
1B0E2CBC000
trusted library allocation
page read and write
1B0D63C3000
trusted library allocation
page read and write
1B0E182C000
trusted library allocation
page read and write
1B0DAD5C000
trusted library allocation
page read and write
1B0D9877000
trusted library allocation
page read and write
1B0E1347000
trusted library allocation
page read and write
1B0E159E000
trusted library allocation
page read and write
1B0DA6B9000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0D9DDD000
trusted library allocation
page read and write
1B0E1151000
trusted library allocation
page read and write
1B0E15E9000
trusted library allocation
page read and write
1B0E48BD000
trusted library allocation
page read and write
1B0E2D3E000
trusted library allocation
page read and write
1B0E15A0000
trusted library allocation
page read and write
1B0DCF37000
trusted library allocation
page read and write
1B0D5176000
trusted library allocation
page read and write
1B0E197D000
trusted library allocation
page read and write
237F73F0000
heap
page readonly
1B0E18D4000
trusted library allocation
page read and write
1B0E18C0000
trusted library allocation
page read and write
1B0DAA7E000
trusted library allocation
page read and write
1B0D9182000
trusted library allocation
page read and write
1B0DAD9C000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0D018A000
heap
page read and write
1B0DB8D6000
trusted library allocation
page read and write
1B0D017B000
heap
page read and write
1B0D0189000
heap
page read and write
1B0E2AF4000
trusted library allocation
page read and write
1B0DCB1B000
trusted library allocation
page read and write
1B0E2CE2000
trusted library allocation
page read and write
1B0E1694000
trusted library allocation
page read and write
1B0DAB5B000
trusted library allocation
page read and write
1B0D017B000
heap
page read and write
1B0DA3AB000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E1346000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0D01D0000
heap
page read and write
1B0D018F000
heap
page read and write
1B0D918E000
trusted library allocation
page read and write
1B0DA2C2000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
9C21EBE000
stack
page read and write
1B0E5320000
trusted library allocation
page read and write
1FF82430000
unkown
page execute read
1B0DB47F000
trusted library allocation
page read and write
1B0E18C8000
trusted library allocation
page read and write
1B0E1839000
trusted library allocation
page read and write
1B0D8987000
trusted library allocation
page read and write
1B0DC746000
trusted library allocation
page read and write
1B0D8BCF000
heap
page read and write
1B0D64AB000
trusted library allocation
page read and write
1B0E11F9000
trusted library allocation
page read and write
1B0E14FD000
trusted library allocation
page read and write
1B0E19BD000
trusted library allocation
page read and write
1B0DA984000
trusted library allocation
page read and write
1B0D9D27000
trusted library allocation
page read and write
1B0DB8CC000
trusted library allocation
page read and write
1B0E2A9D000
trusted library allocation
page read and write
1B0D91DC000
trusted library allocation
page read and write
1B0E2CFE000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0D0190000
heap
page read and write
1B0E2CED000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
1B0D01EC000
heap
page read and write
1B0E11F2000
trusted library allocation
page read and write
1B0D0216000
heap
page read and write
1B0E552D000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0E52DB000
trusted library allocation
page read and write
1B0D61AA000
trusted library allocation
page read and write
26AC8E79000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0D01D0000
heap
page read and write
1FF82FEA000
heap
page read and write
1FF82FE6000
heap
page read and write
1B0E1174000
trusted library allocation
page read and write
1B0DABFC000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0D918E000
trusted library allocation
page read and write
1B0DA95C000
trusted library allocation
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0E4FA5000
trusted library allocation
page read and write
1B0D0199000
heap
page read and write
1B0DCBD0000
trusted library allocation
page read and write
1B0E2CD0000
trusted library allocation
page read and write
1B0E53C9000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0D908E000
trusted library allocation
page read and write
1B0D8F51000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0DA11C000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E2AF6000
trusted library allocation
page read and write
1B0E51FE000
trusted library allocation
page read and write
1B0E12C5000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E11CC000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E1A45000
trusted library allocation
page read and write
1B0E3AAC000
trusted library allocation
page read and write
1FF83058000
heap
page read and write
1B0DA676000
trusted library allocation
page read and write
1FF82FF1000
heap
page read and write
1B0D0190000
heap
page read and write
1B0DABC9000
trusted library allocation
page read and write
1B0E12EB000
trusted library allocation
page read and write
32A6E8603000
trusted library allocation
page read and write
89211BE000
stack
page read and write
1B0D9318000
trusted library allocation
page read and write
9C22EBE000
stack
page read and write
1B0D01A4000
heap
page read and write
1B0DACA5000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E2BCF000
trusted library allocation
page read and write
1B0E1A9D000
trusted library allocation
page read and write
1B0E56A7000
trusted library allocation
page read and write
1B0DA1D2000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E52C2000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0DA6F5000
trusted library allocation
page read and write
1B0E1827000
trusted library allocation
page read and write
1B0E3A48000
trusted library allocation
page read and write
1B0D01AD000
heap
page read and write
1B0D91A0000
trusted library allocation
page read and write
1B0E2BCA000
trusted library allocation
page read and write
1B0E2A8B000
trusted library allocation
page read and write
1B0D88E0000
trusted library allocation
page read and write
1B0E2A8E000
trusted library allocation
page read and write
1B0E5380000
trusted library allocation
page read and write
1B0D8F36000
trusted library allocation
page read and write
1B0E19BD000
trusted library allocation
page read and write
1B0E5524000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0D0190000
heap
page read and write
1B0DADCD000
trusted library allocation
page read and write
26AC911D000
trusted library allocation
page read and write
1B0DCBE8000
trusted library allocation
page read and write
1B0E181E000
trusted library allocation
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0DA13E000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0E5191000
trusted library allocation
page read and write
1B0E1A3E000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
E01000
heap
page read and write
24588DBD000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0E1A84000
trusted library allocation
page read and write
1B0D0185000
heap
page read and write
1B0DA2B9000
trusted library allocation
page read and write
1B0E1837000
trusted library allocation
page read and write
1B0E608A000
trusted library allocation
page read and write
1B0E18F8000
trusted library allocation
page read and write
1B0DC7EC000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0DA9E1000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E197E000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0D018F000
heap
page read and write
1B0D01DE000
heap
page read and write
1B0E1443000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D01F2000
heap
page read and write
1FF8237A000
trusted library allocation
page read and write
237F7500000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E1174000
trusted library allocation
page read and write
1B0E16D6000
trusted library allocation
page read and write
89211FE000
unkown
page readonly
1B0E51FE000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E2DC4000
trusted library allocation
page read and write
1B0E18F5000
trusted library allocation
page read and write
1B0E4FC9000
trusted library allocation
page read and write
1B0E525F000
trusted library allocation
page read and write
1FF82FE3000
heap
page read and write
1B0D91BE000
trusted library allocation
page read and write
1B0DABFE000
trusted library allocation
page read and write
1B0E529E000
trusted library allocation
page read and write
1B0DB9F0000
trusted library allocation
page read and write
1B0DCF05000
trusted library allocation
page read and write
26AC8C40000
remote allocation
page read and write
1B0D64A1000
trusted library allocation
page read and write
26AC8E81000
trusted library allocation
page read and write
1B0D8F1C000
trusted library allocation
page read and write
1FF8302A000
heap
page read and write
1B0DA2FD000
trusted library allocation
page read and write
1B0D6196000
trusted library allocation
page read and write
1B0E113A000
trusted library allocation
page read and write
1B0DB6F0000
trusted library allocation
page read and write
1B0D9387000
trusted library allocation
page read and write
1B0E18C0000
trusted library allocation
page read and write
2458750A000
trusted library allocation
page read and write
1B0DA1D2000
trusted library allocation
page read and write
1B0DAAA4000
trusted library allocation
page read and write
1B0D01A6000
heap
page read and write
E39000
heap
page read and write
1B0E19D1000
trusted library allocation
page read and write
1B0DC88D000
trusted library allocation
page read and write
1B0DCB37000
trusted library allocation
page read and write
1B0DA6B7000
trusted library allocation
page read and write
1B0D0182000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0E4FA3000
trusted library allocation
page read and write
1B0DCBCB000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0D8F7C000
trusted library allocation
page read and write
1B0DAB8B000
trusted library allocation
page read and write
1B0D93D7000
trusted library allocation
page read and write
1B0E1A61000
trusted library allocation
page read and write
E1F000
heap
page read and write
1B0D614F000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0D018A000
heap
page read and write
1B0DA16D000
trusted library allocation
page read and write
1B0E1112000
trusted library allocation
page read and write
1B0E18F5000
trusted library allocation
page read and write
1B0DAB72000
trusted library allocation
page read and write
1B0E1426000
trusted library allocation
page read and write
237F7562000
trusted library allocation
page read and write
1B0D9D94000
trusted library allocation
page read and write
1B0E3000000
trusted library allocation
page read and write
1B0DB4E4000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
F4A5BFE000
stack
page read and write
1B0DAAA4000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1FF83058000
heap
page read and write
1B0D01D0000
heap
page read and write
1FF82930000
heap
page read and write
1B0E19E6000
trusted library allocation
page read and write
1B0E2CAC000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D0184000
heap
page read and write
1B0E53D1000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D017A000
heap
page read and write
1B0D0190000
heap
page read and write
28D90500000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D01A6000
heap
page read and write
1B0E52A9000
trusted library allocation
page read and write
1B0E18CF000
trusted library allocation
page read and write
1B0D61F2000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0DAD93000
trusted library allocation
page read and write
1B0DC7FD000
trusted library allocation
page read and write
1B0E48B9000
trusted library allocation
page read and write
1B0DABA3000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E1148000
trusted library allocation
page read and write
1FF81FCA000
heap
page read and write
1B0DC6D5000
trusted library allocation
page read and write
1B0D90A5000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0DA9E7000
trusted library allocation
page read and write
1B0E488B000
trusted library allocation
page read and write
1B0E520C000
trusted library allocation
page read and write
1B0DB882000
trusted library allocation
page read and write
1B0DABBC000
trusted library allocation
page read and write
1B0D91D8000
trusted library allocation
page read and write
1FF82F60000
heap
page read and write
1B0E11D2000
trusted library allocation
page read and write
1B0E4FD4000
trusted library allocation
page read and write
1B0E180C000
trusted library allocation
page read and write
1B0DCECE000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0E15FE000
trusted library allocation
page read and write
1B0D88D5000
trusted library allocation
page read and write
1FF823BA000
trusted library allocation
page read and write
1B0DAD8F000
trusted library allocation
page read and write
1B0D01CD000
heap
page read and write
1B0DA6B9000
trusted library allocation
page read and write
245871BF000
heap
page read and write
1B0E12DA000
trusted library allocation
page read and write
1B0DA3B0000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D63C5000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
26AC8E03000
trusted library allocation
page read and write
1B0D0195000
heap
page read and write
1B0E486B000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E1476000
trusted library allocation
page read and write
1B0DCBFA000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D0182000
heap
page read and write
1B0E1288000
trusted library allocation
page read and write
1B0D91B3000
trusted library allocation
page read and write
1B0E19D3000
trusted library allocation
page read and write
1B0E18FA000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
E0E000
heap
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0E19DB000
trusted library allocation
page read and write
1B0DC8DD000
trusted library allocation
page read and write
1B0DA6EC000
trusted library allocation
page read and write
1B0E4FC9000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0DA13C000
trusted library allocation
page read and write
1B0D8BA7000
heap
page read and write
1B0D8FF3000
trusted library allocation
page read and write
1B0E18F0000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0D01A0000
heap
page read and write
237F7200000
remote allocation
page read and write
1B0D018A000
heap
page read and write
1FF83067000
heap
page read and write
1B0E1699000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0E11A9000
trusted library allocation
page read and write
F4A647E000
stack
page read and write
1B0DC5A4000
trusted library allocation
page read and write
1B0E1148000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0DAD86000
trusted library allocation
page read and write
1FF82F5C000
heap
page read and write
1B0E52B8000
trusted library allocation
page read and write
1B0E2C58000
trusted library allocation
page read and write
1B0D8833000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D01F2000
heap
page read and write
237F7524000
trusted library allocation
page read and write
1B0DB4CF000
trusted library allocation
page read and write
1B0E2D60000
trusted library allocation
page read and write
1B0E4F9F000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D0190000
heap
page read and write
1B0D0190000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0D019A000
heap
page read and write
1B0D01A5000
heap
page read and write
1B0D0184000
heap
page read and write
1FF82FF1000
heap
page read and write
1B0D93EE000
trusted library allocation
page read and write
1B0DB88A000
trusted library allocation
page read and write
1B0D63B0000
trusted library allocation
page read and write
1B0DAAD6000
trusted library allocation
page read and write
1B0DB8B0000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E1972000
trusted library allocation
page read and write
1B0DB488000
trusted library allocation
page read and write
1B0DA9FD000
trusted library allocation
page read and write
1B0DC5A9000
trusted library allocation
page read and write
1B0D6145000
trusted library allocation
page read and write
1B0DA295000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E3A0C000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0DB6BA000
trusted library allocation
page read and write
1B0E2BCA000
trusted library allocation
page read and write
1B0D9994000
trusted library allocation
page read and write
1B0E113C000
trusted library allocation
page read and write
1B0DA282000
trusted library allocation
page read and write
1B0E14FD000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0DA95C000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0DADC3000
trusted library allocation
page read and write
28D90280000
heap
page read and write
1B0E2D41000
trusted library allocation
page read and write
1B0DB5AD000
trusted library allocation
page read and write
1B0D52B0000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0DC6E9000
trusted library allocation
page read and write
1B0DAADD000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E5388000
trusted library allocation
page read and write
1B0E1840000
trusted library allocation
page read and write
1B0E52B8000
trusted library allocation
page read and write
1B0E19D1000
trusted library allocation
page read and write
1B0E2C21000
trusted library allocation
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0DC585000
trusted library allocation
page read and write
28D90650000
heap
page read and write
1B0D01D4000
heap
page read and write
26AC8BE0000
unclassified section
page readonly
1B0DA39D000
trusted library allocation
page read and write
1FF81F40000
unclassified section
page readonly
1B0E53E4000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0E18C0000
trusted library allocation
page read and write
1B0E122E000
trusted library allocation
page read and write
1B0D01A2000
heap
page read and write
1B0DA98F000
trusted library allocation
page read and write
1FF83044000
heap
page read and write
1B0E2C88000
trusted library allocation
page read and write
1B0DAB45000
trusted library allocation
page read and write
1B0E2A9B000
trusted library allocation
page read and write
24588DAC000
heap
page read and write
1B0D01CE000
heap
page read and write
1B0D8F6A000
trusted library allocation
page read and write
1FF82AB0000
heap
page read and write
E29000
heap
page read and write
1B0DB5C1000
trusted library allocation
page read and write
1B0E2D78000
trusted library allocation
page read and write
26AC8EE9000
trusted library allocation
page read and write
1B0E12E2000
trusted library allocation
page read and write
1B0E5529000
trusted library allocation
page read and write
E39000
heap
page read and write
1B0E18D4000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DB864000
trusted library allocation
page read and write
1B0E11BB000
trusted library allocation
page read and write
9C1E27D000
stack
page read and write
1B0DAA4C000
trusted library allocation
page read and write
1B0D8F58000
trusted library allocation
page read and write
1B0DA9B7000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0D0196000
heap
page read and write
1B0DC6DA000
trusted library allocation
page read and write
15DF000
stack
page read and write
1B0DB572000
trusted library allocation
page read and write
1B0DA480000
trusted library allocation
page read and write
1B0DB859000
trusted library allocation
page read and write
1B0E18EA000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E136A000
trusted library allocation
page read and write
1B0DCBA9000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E11F9000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0DB88A000
trusted library allocation
page read and write
1B0DB8BE000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0DC7BF000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0DC6CF000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0D0175000
heap
page read and write
1B0E2DE9000
trusted library allocation
page read and write
1B0DB8ED000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0DB4F2000
trusted library allocation
page read and write
1B0E53C5000
trusted library allocation
page read and write
1B0E2B4C000
trusted library allocation
page read and write
1B0DA2E7000
trusted library allocation
page read and write
1B0D8BD0000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0D527F000
trusted library allocation
page read and write
1B0D9068000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E19E1000
trusted library allocation
page read and write
1B0D9DD6000
trusted library allocation
page read and write
1B0D01A8000
heap
page read and write
1B0E146B000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D01CE000
heap
page read and write
1B0DC6CF000
trusted library allocation
page read and write
1B0DA39A000
trusted library allocation
page read and write
1B0E5277000
trusted library allocation
page read and write
1B0E2C48000
trusted library allocation
page read and write
1B0D9924000
trusted library allocation
page read and write
1B0D89CF000
trusted library allocation
page read and write
1B0E1A80000
trusted library allocation
page read and write
1B0D91C4000
trusted library allocation
page read and write
1B0E18DB000
trusted library allocation
page read and write
1B0DB8B6000
trusted library allocation
page read and write
26AC9117000
trusted library allocation
page read and write
1B0E11A9000
trusted library allocation
page read and write
1B0DA231000
trusted library allocation
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0E52C7000
trusted library allocation
page read and write
1B0E5831000
heap
page read and write
1B0DA90A000
trusted library allocation
page read and write
26AC8E6E000
trusted library allocation
page read and write
1B0DB819000
trusted library allocation
page read and write
1B0DADB1000
trusted library allocation
page read and write
1FF82E00000
trusted library allocation
page read and write
1B0DAAD6000
trusted library allocation
page read and write
1B0DA345000
trusted library allocation
page read and write
1B0E11A6000
trusted library allocation
page read and write
1B0DAB29000
trusted library allocation
page read and write
1B0DA2C3000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0DB8D6000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0E54B9000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0DA1DC000
trusted library allocation
page read and write
1B0E4F62000
trusted library allocation
page read and write
1B0E5879000
heap
page read and write
1B0E2AF7000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D8F36000
trusted library allocation
page read and write
1B0E4855000
trusted library allocation
page read and write
237F75AA000
trusted library allocation
page read and write
1B0DABCE000
trusted library allocation
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0D01EF000
heap
page read and write
1B0D88E0000
trusted library allocation
page read and write
1B0D6496000
trusted library allocation
page read and write
1FF82FA8000
heap
page read and write
237F75B5000
trusted library allocation
page read and write
28D903E0000
heap
page read and write
1B0D01DF000
heap
page read and write
1B0E4600000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E1238000
trusted library allocation
page read and write
1B0DA6FB000
trusted library allocation
page read and write
1B0DC762000
trusted library allocation
page read and write
1B0DB87A000
trusted library allocation
page read and write
1FF82FF1000
heap
page read and write
1B0DA3C6000
trusted library allocation
page read and write
1B0D01D7000
heap
page read and write
1B0D017A000
heap
page read and write
1B0D0188000
heap
page read and write
1B0D017D000
heap
page read and write
892117E000
unkown
page readonly
1B0D4B90000
trusted library allocation
page read and write
1B0E2C55000
trusted library allocation
page read and write
1B0E4FA3000
trusted library allocation
page read and write
26AC8BD0000
unclassified section
page readonly
1B0D01A2000
heap
page read and write
1B0DA6E5000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0D8F7E000
trusted library allocation
page read and write
1B0D64BE000
trusted library allocation
page read and write
1B0E19E1000
trusted library allocation
page read and write
1B0E552D000
trusted library allocation
page read and write
1B0DAD83000
trusted library allocation
page read and write
89210BB000
stack
page read and write
1B0E10F7000
trusted library allocation
page read and write
1B0DC8CA000
trusted library allocation
page read and write
1B0E13C3000
trusted library allocation
page read and write
1B0DC5E1000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E19EF000
trusted library allocation
page read and write
1B0DB829000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E1AAB000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0D91FC000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0E2B83000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E10CE000
trusted library allocation
page read and write
1B0DC66E000
trusted library allocation
page read and write
1B0D0182000
heap
page read and write
1FF82F6C000
heap
page read and write
E36000
heap
page read and write
1B0D526A000
trusted library allocation
page read and write
1B0DA194000
trusted library allocation
page read and write
1B0DA94A000
trusted library allocation
page read and write
1B0DA3B2000
trusted library allocation
page read and write
1FF8302A000
heap
page read and write
1B0D01B3000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0E137A000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0DA2BE000
trusted library allocation
page read and write
1B0D9175000
trusted library allocation
page read and write
1B0D8F78000
trusted library allocation
page read and write
1B0D90A5000
trusted library allocation
page read and write
237F7576000
trusted library allocation
page read and write
1B0E48E0000
trusted library allocation
page read and write
1B0DA9C2000
trusted library allocation
page read and write
1B0DAA8E000
trusted library allocation
page read and write
1B0DAB32000
trusted library allocation
page read and write
1B0E53CF000
trusted library allocation
page read and write
1B0DCD23000
trusted library allocation
page read and write
1B0DC689000
trusted library allocation
page read and write
1B0E137A000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0DB8E7000
trusted library allocation
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0DA267000
trusted library allocation
page read and write
1B0DA676000
trusted library allocation
page read and write
237F75C4000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
245871DA000
heap
page read and write
1B0E1837000
trusted library allocation
page read and write
1B0DA29C000
trusted library allocation
page read and write
1B0E1837000
trusted library allocation
page read and write
1B0D906F000
trusted library allocation
page read and write
1B0DB349000
trusted library allocation
page read and write
1B0DAD09000
trusted library allocation
page read and write
1B0DA6F5000
trusted library allocation
page read and write
1B0E1835000
trusted library allocation
page read and write
1B0E2AF6000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DDE02000
trusted library allocation
page read and write
1B0DB84E000
trusted library allocation
page read and write
1B0D01DF000
heap
page read and write
1B0DA14B000
trusted library allocation
page read and write
1B0D0182000
heap
page read and write
1B0E1A75000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E16EC000
trusted library allocation
page read and write
1B0DC7F9000
trusted library allocation
page read and write
1B0E18F0000
trusted library allocation
page read and write
1B0E129F000
trusted library allocation
page read and write
1B0DA660000
trusted library allocation
page read and write
1B0E4886000
trusted library allocation
page read and write
1B0D0184000
heap
page read and write
26AC8EB7000
trusted library allocation
page read and write
1B0DA6B7000
trusted library allocation
page read and write
1B0D88E2000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0D644E000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0DC656000
trusted library allocation
page read and write
1B0DCBC4000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0D01E7000
heap
page read and write
1B0E4883000
trusted library allocation
page read and write
1B0E18F5000
trusted library allocation
page read and write
1FF83058000
heap
page read and write
1B0D0180000
heap
page read and write
1B0DA6B7000
trusted library allocation
page read and write
1B0E4FA5000
trusted library allocation
page read and write
1B0E48E1000
trusted library allocation
page read and write
1B0DAB37000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0E51CA000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0E1ABC000
trusted library allocation
page read and write
1B0D9338000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0DB321000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0E19E6000
trusted library allocation
page read and write
1B0DCB4C000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
245871C4000
heap
page read and write
1B0D01E1000
heap
page read and write
1B0D019B000
heap
page read and write
1B0DA6B9000
trusted library allocation
page read and write
1B0E548E000
trusted library allocation
page read and write
1B0DA2D0000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0E48AB000
trusted library allocation
page read and write
1B0DA120000
trusted library allocation
page read and write
1B0D90A5000
trusted library allocation
page read and write
26AC8EA3000
trusted library allocation
page read and write
1B0D613A000
trusted library allocation
page read and write
1B0DA96C000
trusted library allocation
page read and write
1B0E1165000
trusted library allocation
page read and write
1B0E51F8000
trusted library allocation
page read and write
1B0D8B8B000
heap
page read and write
1B0D01D0000
heap
page read and write
1B0E16D8000
trusted library allocation
page read and write
1B0DACFD000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0D61F4000
trusted library allocation
page read and write
1B0D881D000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D0182000
heap
page read and write
1B0D01D8000
heap
page read and write
1B0D919E000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0E3B2C000
trusted library allocation
page read and write
1B0E182C000
trusted library allocation
page read and write
1B0D018E000
heap
page read and write
1B0DA667000
trusted library allocation
page read and write
1B0DAAC3000
trusted library allocation
page read and write
1B0E16B5000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0D016C000
heap
page read and write
1B0E5482000
trusted library allocation
page read and write
E77E7FF000
stack
page read and write
1B0D018A000
heap
page read and write
1B0E4902000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D017B000
heap
page read and write
1B0DC86F000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0E53CF000
trusted library allocation
page read and write
1B0E5529000
trusted library allocation
page read and write
1B0E116A000
trusted library allocation
page read and write
1B0DACE2000
trusted library allocation
page read and write
1B0DADBA000
trusted library allocation
page read and write
1B0D52A3000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E2DC4000
trusted library allocation
page read and write
E29000
heap
page read and write
1B0E54B0000
trusted library allocation
page read and write
1B0DCBE8000
trusted library allocation
page read and write
1B0D6356000
trusted library allocation
page read and write
1B0DADC3000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0DACB7000
trusted library allocation
page read and write
26AC8E00000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0D61FB000
trusted library allocation
page read and write
1B0D018E000
heap
page read and write
1B0E53E4000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D019F000
heap
page read and write
1B0D0192000
heap
page read and write
1B0D91AA000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1FF8243E000
unkown
page execute read
1B0D01E1000
heap
page read and write
1B0E51F8000
trusted library allocation
page read and write
1B0D6442000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0E1288000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D019A000
heap
page read and write
1B0D0169000
heap
page read and write
1B0D8BD0000
heap
page read and write
1B0D01A5000
heap
page read and write
1FF82348000
trusted library allocation
page read and write
1B0DCBAB000
trusted library allocation
page read and write
1B0D8BD0000
heap
page read and write
1B0D017C000
heap
page read and write
1B0D017A000
heap
page read and write
1B0E546C000
trusted library allocation
page read and write
1B0D8860000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1FF82180000
heap
page readonly
1B0DA6B7000
trusted library allocation
page read and write
1B0DA2E7000
trusted library allocation
page read and write
1B0DA6FE000
trusted library allocation
page read and write
C9BD1FC000
stack
page read and write
33A000
stack
page read and write
1B0D0182000
heap
page read and write
1B0E53A7000
trusted library allocation
page read and write
1B0E19F5000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D016C000
heap
page read and write
35B0000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0DA2BE000
trusted library allocation
page read and write
1B0D93E7000
trusted library allocation
page read and write
1B0DB814000
trusted library allocation
page read and write
1B0E12FE000
trusted library allocation
page read and write
1B0E4816000
trusted library allocation
page read and write
1B0E2CE1000
trusted library allocation
page read and write
1B0D637D000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0DC6F1000
trusted library allocation
page read and write
1B0D01B5000
heap
page read and write
1B0D0162000
heap
page read and write
1B0DA135000
trusted library allocation
page read and write
1B0E19EF000
trusted library allocation
page read and write
1B0D8B9F000
heap
page read and write
1B0D913B000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0E2DC2000
trusted library allocation
page read and write
1B0E51AA000
trusted library allocation
page read and write
1B0E51F6000
trusted library allocation
page read and write
1B0D0227000
heap
page read and write
1B0D0192000
heap
page read and write
1B0D0180000
heap
page read and write
1B0E11F7000
trusted library allocation
page read and write
1FF82F60000
heap
page read and write
1B0E54DF000
trusted library allocation
page read and write
1FF821B0000
trusted library section
page readonly
1B0DA288000
trusted library allocation
page read and write
1B0D01AD000
heap
page read and write
1B0D8F71000
trusted library allocation
page read and write
1B0DA97A000
trusted library allocation
page read and write
1B0D8F47000
trusted library allocation
page read and write
1B0E14B8000
trusted library allocation
page read and write
1B0E2CE1000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0E542C000
trusted library allocation
page read and write
1B0DADC0000
trusted library allocation
page read and write
1B0DABDE000
trusted library allocation
page read and write
1B0DAD93000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0E16E6000
trusted library allocation
page read and write
1B0E53A7000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
26AC92D4000
heap
page read and write
1B0D01E7000
heap
page read and write
1B0D0196000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0DA9A8000
trusted library allocation
page read and write
26AC8E5D000
trusted library allocation
page read and write
1B0DC61E000
trusted library allocation
page read and write
1B0E19F2000
trusted library allocation
page read and write
1B0E1AF8000
trusted library allocation
page read and write
1B0DC6E9000
trusted library allocation
page read and write
1B0E5473000
trusted library allocation
page read and write
1B0E14D1000
trusted library allocation
page read and write
1B0DB85D000
trusted library allocation
page read and write
1B0DADC0000
trusted library allocation
page read and write
1B0DC5C1000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
237F7570000
trusted library allocation
page read and write
1B0D6196000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D017A000
heap
page read and write
1B0D0184000
heap
page read and write
1FF82365000
trusted library allocation
page read and write
1B0D914C000
trusted library allocation
page read and write
237F7602000
unclassified section
page read and write
1B0E53DA000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0DAB2C000
trusted library allocation
page read and write
1B0D019B000
heap
page read and write
1B0D01D0000
heap
page read and write
1B0E4FA1000
trusted library allocation
page read and write
1B0D0182000
heap
page read and write
1B0E19EF000
trusted library allocation
page read and write
1B0E10E3000
trusted library allocation
page read and write
1FF82F6C000
heap
page read and write
C9BD1FF000
stack
page read and write
1B0D9153000
trusted library allocation
page read and write
1B0D01A8000
heap
page read and write
1B0D0188000
heap
page read and write
1B0E165F000
trusted library allocation
page read and write
1B0D93D5000
trusted library allocation
page read and write
1B0D8B8F000
heap
page read and write
1B0E2CD7000
trusted library allocation
page read and write
1B0D99F2000
trusted library allocation
page read and write
1B0DA198000
trusted library allocation
page read and write
1B0E3B01000
trusted library allocation
page read and write
1B0D88E0000
trusted library allocation
page read and write
1B0D9DFE000
trusted library allocation
page read and write
1B0DABE8000
trusted library allocation
page read and write
237F7566000
trusted library allocation
page read and write
1B0DA3FA000
trusted library allocation
page read and write
1B0D88E7000
trusted library allocation
page read and write
1B0D91D2000
trusted library allocation
page read and write
1B0E19DB000
trusted library allocation
page read and write
1B0E2E00000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0E39A3000
trusted library allocation
page read and write
1B0D99D5000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E4F95000
trusted library allocation
page read and write
1B0D5213000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
26AC8E96000
trusted library allocation
page read and write
1B0E51A4000
trusted library allocation
page read and write
1B0E16EC000
trusted library allocation
page read and write
1B0D99C6000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
DD4000
heap
page read and write
1B0DAB37000
trusted library allocation
page read and write
1B0D01AA000
heap
page read and write
892447E000
unkown
page readonly
1B0D0189000
heap
page read and write
1B0D0192000
heap
page read and write
1FF83058000
heap
page read and write
1B0DADA8000
trusted library allocation
page read and write
1FF82F60000
heap
page read and write
1B0DA9E1000
trusted library allocation
page read and write
1B0E18D4000
trusted library allocation
page read and write
237F7220000
unclassified section
page readonly
1B0DB886000
trusted library allocation
page read and write
1B0E10D4000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0DA676000
trusted library allocation
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0E4400000
trusted library allocation
page read and write
1B0D018B000
heap
page read and write
1B0E1AAB000
trusted library allocation
page read and write
1B0E12FE000
trusted library allocation
page read and write
1B0E11AE000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E2CD0000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E1954000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E53B5000
trusted library allocation
page read and write
1FF82F5C000
heap
page read and write
1B0DCBA7000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E48C4000
trusted library allocation
page read and write
1B0D8BD0000
heap
page read and write
1B0E538B000
trusted library allocation
page read and write
1B0E2D41000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
237F7760000
unclassified section
page readonly
1B0D018A000
heap
page read and write
1B0E129A000
trusted library allocation
page read and write
1B0DA21F000
trusted library allocation
page read and write
1B0DA6E5000
trusted library allocation
page read and write
1B0DB32A000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0DADB3000
trusted library allocation
page read and write
1B0D908A000
trusted library allocation
page read and write
1B0E1627000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0E373B000
trusted library allocation
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0DAD72000
trusted library allocation
page read and write
1B0E4D00000
trusted library allocation
page read and write
1B0DAD43000
trusted library allocation
page read and write
1B0E159A000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0D0196000
heap
page read and write
26AC8DAA000
heap
page read and write
1B0DA9A8000
trusted library allocation
page read and write
1B0D63C5000
trusted library allocation
page read and write
26AC9120000
trusted library allocation
page read and write
1B0E1358000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D8F47000
trusted library allocation
page read and write
1B0D91BE000
trusted library allocation
page read and write
1B0DB644000
trusted library allocation
page read and write
1B0E484B000
trusted library allocation
page read and write
1B0D4BC1000
trusted library allocation
page read and write
237F7656000
heap
page read and write
1FF82F7D000
heap
page read and write
1B0D01F2000
heap
page read and write
1B0D0216000
heap
page read and write
1B0D01B3000
heap
page read and write
1B0DA307000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0DB454000
trusted library allocation
page read and write
1B0D88C9000
trusted library allocation
page read and write
1B0E129C000
trusted library allocation
page read and write
1FF82E0C000
trusted library allocation
page read and write
1B0E10E3000
trusted library allocation
page read and write
1B0DA9A3000
trusted library allocation
page read and write
1B0DCBF7000
trusted library allocation
page read and write
1B0D6376000
trusted library allocation
page read and write
1B0E10D8000
trusted library allocation
page read and write
1B0DAB8A000
trusted library allocation
page read and write
1B0DA343000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D01D4000
heap
page read and write
1B0DABA6000
trusted library allocation
page read and write
37757FC1E000
trusted library allocation
page read and write
1B0E116A000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D8F35000
trusted library allocation
page read and write
1B0DB687000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E2CE1000
trusted library allocation
page read and write
1B0E1977000
trusted library allocation
page read and write
1B0DA6B7000
trusted library allocation
page read and write
1B0E14F3000
trusted library allocation
page read and write
1FF82F6C000
heap
page read and write
1B0D8F4F000
trusted library allocation
page read and write
1B0E547B000
trusted library allocation
page read and write
1B0DADCD000
trusted library allocation
page read and write
237F7803000
trusted library allocation
page read and write
1B0D934E000
trusted library allocation
page read and write
1B0E18FD000
trusted library allocation
page read and write
1B0E48E5000
trusted library allocation
page read and write
1B0E483A000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DAB09000
trusted library allocation
page read and write
1B0E11F5000
trusted library allocation
page read and write
1FF82450000
heap
page read and write
26AC8C5B000
remote allocation
page execute read
1B0DCBCB000
trusted library allocation
page read and write
1B0E1AAB000
trusted library allocation
page read and write
1B0D017C000
heap
page read and write
1B0DADCD000
trusted library allocation
page read and write
1B0D01E1000
heap
page read and write
1B0D9D2C000
trusted library allocation
page read and write
1B0D0179000
heap
page read and write
1B0D4BBF000
trusted library allocation
page read and write
1B0DABA3000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0E1940000
trusted library allocation
page read and write
1B0E18DB000
trusted library allocation
page read and write
1B0DAB94000
trusted library allocation
page read and write
1B0DA1D2000
trusted library allocation
page read and write
1FF8303B000
heap
page read and write
1B0E48E0000
trusted library allocation
page read and write
1B0D918E000
trusted library allocation
page read and write
1B0D9066000
trusted library allocation
page read and write
1FF81F50000
unclassified section
page readonly
24587140000
heap
page read and write
1B0D9DBC000
trusted library allocation
page read and write
1B0DAD63000
trusted library allocation
page read and write
1B0E2D33000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E5388000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0DA97B000
trusted library allocation
page read and write
1FF82FAA000
heap
page read and write
1B0DC6E9000
trusted library allocation
page read and write
1B0E10DF000
trusted library allocation
page read and write
1B0D8B98000
heap
page read and write
1FF83067000
heap
page read and write
1B0D9DB3000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0D0186000
heap
page read and write
1B0D6359000
trusted library allocation
page read and write
1FF8236A000
trusted library allocation
page read and write
1B0D88DB000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0D018A000
heap
page read and write
1B0E5382000
trusted library allocation
page read and write
1B0DB9F0000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0E54BF000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E181E000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0DADA0000
trusted library allocation
page read and write
1B0DADB7000
trusted library allocation
page read and write
26AC8EA0000
trusted library allocation
page read and write
1B0DA15B000
trusted library allocation
page read and write
1B0DABFE000
trusted library allocation
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0D88CD000
trusted library allocation
page read and write
1B0D90A5000
trusted library allocation
page read and write
1B0DAB09000
trusted library allocation
page read and write
1B0E53BA000
trusted library allocation
page read and write
1B0E16EF000
trusted library allocation
page read and write
1B0D9D97000
trusted library allocation
page read and write
1B0DC7C2000
trusted library allocation
page read and write
1B0D93E7000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0D0186000
heap
page read and write
1B0D0182000
heap
page read and write
1FF82310000
trusted library allocation
page read and write
1FF82FEA000
heap
page read and write
1FF83044000
heap
page read and write
1B0E13C3000
trusted library allocation
page read and write
1B0E54E9000
trusted library allocation
page read and write
1B0D4BEF000
trusted library allocation
page read and write
1B0E11D2000
trusted library allocation
page read and write
1B0DA63D000
trusted library allocation
page read and write
1B0E18C5000
trusted library allocation
page read and write
1B0DA362000
trusted library allocation
page read and write
1B0D0182000
heap
page read and write
1B0D01F1000
heap
page read and write
237F790C000
trusted library allocation
page read and write
1B0E196A000
trusted library allocation
page read and write
1B0E48C1000
trusted library allocation
page read and write
1B0DA2BE000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DA1D2000
trusted library allocation
page read and write
1B0DB4B2000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0D9352000
trusted library allocation
page read and write
89233FE000
unkown
page readonly
1B0D8909000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0D9338000
trusted library allocation
page read and write
1B0D918E000
trusted library allocation
page read and write
1B0DB9DE000
trusted library allocation
page read and write
1B0E48E7000
trusted library allocation
page read and write
1B0E1073000
trusted library allocation
page read and write
E2E000
heap
page read and write
1B0D99C9000
trusted library allocation
page read and write
1B0DAD23000
trusted library allocation
page read and write
1B0E11A6000
trusted library allocation
page read and write
26AC8E0B000
trusted library allocation
page read and write
1B0E521F000
trusted library allocation
page read and write
1B0E53C5000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0DADBB000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1FF82F4D000
heap
page read and write
237F7511000
trusted library allocation
page read and write
1B0E16E6000
trusted library allocation
page read and write
1B0DAD8F000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D0194000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0D0180000
heap
page read and write
1B0E2C88000
trusted library allocation
page read and write
237F7650000
heap
page read and write
E05000
heap
page read and write
1B0D0199000
heap
page read and write
1B0DCBC4000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0DC553000
trusted library allocation
page read and write
1B0D905A000
trusted library allocation
page read and write
1B0E1ABC000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0D0188000
heap
page read and write
1B0E2BCF000
trusted library allocation
page read and write
1B0E16C7000
trusted library allocation
page read and write
1B0E4870000
trusted library allocation
page read and write
1B0E53CC000
trusted library allocation
page read and write
1B0DC893000
trusted library allocation
page read and write
1B0E54F4000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0E11A4000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
E77D7FF000
stack
page read and write
1B0E2AF2000
trusted library allocation
page read and write
1B0DA9AB000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DA6A8000
trusted library allocation
page read and write
1B0D64DC000
trusted library allocation
page read and write
1B0DA3FE000
trusted library allocation
page read and write
1B0DB4CA000
trusted library allocation
page read and write
1B0D8B99000
heap
page read and write
1B0D9175000
trusted library allocation
page read and write
1B0DADCD000
trusted library allocation
page read and write
1B0E16E6000
trusted library allocation
page read and write
1B0DA6A8000
trusted library allocation
page read and write
1B0E18F8000
trusted library allocation
page read and write
1B0DB8CC000
trusted library allocation
page read and write
1B0DACC5000
trusted library allocation
page read and write
1B0E52B0000
trusted library allocation
page read and write
1B0DAB11000
trusted library allocation
page read and write
1B0D52B6000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
26AC8EA7000
trusted library allocation
page read and write
1B0E193E000
trusted library allocation
page read and write
1B0DC753000
trusted library allocation
page read and write
1B0E1A75000
trusted library allocation
page read and write
1B0D5275000
trusted library allocation
page read and write
1B0D8F90000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E51C4000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D0195000
heap
page read and write
1B0DA2AD000
trusted library allocation
page read and write
1B0E52B8000
trusted library allocation
page read and write
1B0D01AD000
heap
page read and write
E77BFFB000
stack
page read and write
1B0DA1D2000
trusted library allocation
page read and write
1B0DC519000
trusted library allocation
page read and write
1B0DAB8A000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0DA218000
trusted library allocation
page read and write
1B0E1ACA000
trusted library allocation
page read and write
1B0E10C8000
trusted library allocation
page read and write
1B0D017A000
heap
page read and write
1B0DB6D9000
trusted library allocation
page read and write
1B0D0167000
heap
page read and write
1B0DB943000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
E0D000
heap
page read and write
1B0D01E9000
heap
page read and write
1B0D0186000
heap
page read and write
1B0DC656000
trusted library allocation
page read and write
E39000
heap
page read and write
9EF000
stack
page read and write
1B0DC746000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E1376000
trusted library allocation
page read and write
1B0D88C7000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0DB4B0000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0E14A6000
trusted library allocation
page read and write
1B0E1159000
trusted library allocation
page read and write
1B0DA3C8000
trusted library allocation
page read and write
1B0DA1AC000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0DC7BF000
trusted library allocation
page read and write
1B0DCF50000
trusted library allocation
page read and write
1B0DB862000
trusted library allocation
page read and write
1B0E18DD000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0E52A9000
trusted library allocation
page read and write
1B0D01F1000
heap
page read and write
1B0E11C1000
trusted library allocation
page read and write
1B0DADC3000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0D5226000
trusted library allocation
page read and write
1B0E2CD0000
trusted library allocation
page read and write
1B0DA9C7000
trusted library allocation
page read and write
1B0DC6D5000
trusted library allocation
page read and write
1B0DB882000
trusted library allocation
page read and write
1B0E19ED000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0E1678000
trusted library allocation
page read and write
E29000
heap
page read and write
1B0DAA55000
trusted library allocation
page read and write
1B0E521B000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0E52A5000
trusted library allocation
page read and write
1B0DC5F4000
trusted library allocation
page read and write
1B0D63E6000
trusted library allocation
page read and write
1B0E1184000
trusted library allocation
page read and write
1FF82FB9000
heap
page read and write
1B0E2D33000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0DAAE9000
trusted library allocation
page read and write
1B0E48F2000
trusted library allocation
page read and write
1B0D01D3000
heap
page read and write
1B0DA287000
trusted library allocation
page read and write
1FF83069000
heap
page read and write
1B0E18C5000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0D0190000
heap
page read and write
1B0D018F000
heap
page read and write
1FF821A0000
unclassified section
page read and write
1B0DB69A000
trusted library allocation
page read and write
1B0E4FA5000
trusted library allocation
page read and write
1B0DAD81000
trusted library allocation
page read and write
1B0E11AE000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0E116A000
trusted library allocation
page read and write
1B0E1947000
trusted library allocation
page read and write
1B0E4889000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DA955000
trusted library allocation
page read and write
1B0DABA3000
trusted library allocation
page read and write
1B0DA6A8000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0E146B000
trusted library allocation
page read and write
1B0E18F8000
trusted library allocation
page read and write
1B0DA19D000
trusted library allocation
page read and write
1B0DADC3000
trusted library allocation
page read and write
8922BFE000
stack
page read and write
1B0DA1BC000
trusted library allocation
page read and write
1B0DCBCB000
trusted library allocation
page read and write
1B0E1AF8000
trusted library allocation
page read and write
1B0E2AFB000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E119E000
trusted library allocation
page read and write
1B0D01A1000
heap
page read and write
1B0D0169000
heap
page read and write
1B0DB49E000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
E1A000
heap
page read and write
1FF823BF000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0DB3B2000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0E5542000
trusted library allocation
page read and write
1B0DAA68000
trusted library allocation
page read and write
237F75B1000
trusted library allocation
page read and write
1B0DA66E000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D52A3000
trusted library allocation
page read and write
1B0E5380000
trusted library allocation
page read and write
1B0DA2E7000
trusted library allocation
page read and write
1B0D01ED000
heap
page read and write
1B0D0181000
heap
page read and write
1B0DCBB9000
trusted library allocation
page read and write
1B0E16CA000
trusted library allocation
page read and write
1B0DAB35000
trusted library allocation
page read and write
1B0D4B9E000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0E5380000
trusted library allocation
page read and write
1B0DAD12000
trusted library allocation
page read and write
1B0DAD0B000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E2DE9000
trusted library allocation
page read and write
1B0D614F000
trusted library allocation
page read and write
1B0DA2FA000
trusted library allocation
page read and write
1B0DA6EC000
trusted library allocation
page read and write
1B0DAD83000
trusted library allocation
page read and write
C9BE1FF000
stack
page read and write
1B0D0169000
heap
page read and write
1B0D8FB3000
trusted library allocation
page read and write
1FF82920000
heap
page read and write
1B0DA33B000
trusted library allocation
page read and write
26AC8E61000
trusted library allocation
page read and write
1B0E18EC000
trusted library allocation
page read and write
1B0E5522000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
245871DA000
heap
page read and write
1B0E1358000
trusted library allocation
page read and write
1B0E2CC5000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0DA9BF000
trusted library allocation
page read and write
1B0E37EF000
trusted library allocation
page read and write
1B0D8861000
trusted library allocation
page read and write
1B0DB85D000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DADCD000
trusted library allocation
page read and write
1B0DA941000
trusted library allocation
page read and write
1B0E1699000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E4876000
trusted library allocation
page read and write
1B0DCB34000
trusted library allocation
page read and write
1B0E135A000
trusted library allocation
page read and write
1B0D017B000
heap
page read and write
1B0E2CFE000
trusted library allocation
page read and write
1B0D61F2000
trusted library allocation
page read and write
1FF82FE3000
heap
page read and write
1B0DA6F7000
trusted library allocation
page read and write
1B0DB864000
trusted library allocation
page read and write
1FF82F60000
heap
page read and write
1B0E48B9000
trusted library allocation
page read and write
1B0DA292000
trusted library allocation
page read and write
1B0DAD8F000
trusted library allocation
page read and write
1FF82FE8000
heap
page read and write
1B0D0196000
heap
page read and write
1B0DABCE000
trusted library allocation
page read and write
1B0DA63F000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0DA6E5000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D0192000
heap
page read and write
245874F0000
heap
page read and write
1B0E489B000
trusted library allocation
page read and write
1B0E553A000
trusted library allocation
page read and write
1B0D9A9A000
trusted library allocation
page read and write
1B0DCE00000
trusted library allocation
page read and write
1B0E53C7000
trusted library allocation
page read and write
1FF821F0000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E12F4000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DAB94000
trusted library allocation
page read and write
1B0DB498000
trusted library allocation
page read and write
1B0E1174000
trusted library allocation
page read and write
1B0E19E6000
trusted library allocation
page read and write
1B0E11A9000
trusted library allocation
page read and write
1B0E2D33000
trusted library allocation
page read and write
1B0E5524000
trusted library allocation
page read and write
1B0E52DD000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0E543C000
trusted library allocation
page read and write
1B0DC594000
trusted library allocation
page read and write
1B0E48B9000
trusted library allocation
page read and write
237F7370000
heap
page read and write
1B0D932E000
trusted library allocation
page read and write
1B0DA16D000
trusted library allocation
page read and write
1B0DC5D2000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0D0194000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D017A000
heap
page read and write
1FF82381000
trusted library allocation
page read and write
1B0E109F000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D6451000
trusted library allocation
page read and write
1B0DB55A000
trusted library allocation
page read and write
1B0E48AB000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0DB9DE000
trusted library allocation
page read and write
1B0DAAD0000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DC542000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E2CBB000
trusted library allocation
page read and write
9C2163E000
unkown
page readonly
1B0DA676000
trusted library allocation
page read and write
1B0E1151000
trusted library allocation
page read and write
1B0DA9FB000
trusted library allocation
page read and write
1FF82F01000
heap
page read and write
1B0DC6E7000
trusted library allocation
page read and write
1B0E48C1000
trusted library allocation
page read and write
1FF8235F000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0E18F8000
trusted library allocation
page read and write
1FF82FEA000
heap
page read and write
1B0E11CC000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0E19ED000
trusted library allocation
page read and write
1B0E2AF2000
trusted library allocation
page read and write
1B0D01E7000
heap
page read and write
1FF82F60000
heap
page read and write
1B0E48F2000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E563F000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D931C000
trusted library allocation
page read and write
1B0E18DD000
trusted library allocation
page read and write
1B0E16D6000
trusted library allocation
page read and write
1B0D01B3000
heap
page read and write
1B0D0164000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0DA3C8000
trusted library allocation
page read and write
1B0D9087000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E2C94000
trusted library allocation
page read and write
1B0D01E1000
heap
page read and write
1B0E12B0000
trusted library allocation
page read and write
1B0E1837000
trusted library allocation
page read and write
1B0DB870000
trusted library allocation
page read and write
1B0DA6F3000
trusted library allocation
page read and write
1B0DC66E000
trusted library allocation
page read and write
1B0D0167000
heap
page read and write
1B0D0196000
heap
page read and write
1B0DAD74000
trusted library allocation
page read and write
1B0E18EA000
trusted library allocation
page read and write
1B0E2AFA000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D64C7000
trusted library allocation
page read and write
1FF82FE6000
heap
page read and write
1B0DABDE000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0D017C000
heap
page read and write
1B0D93C5000
trusted library allocation
page read and write
1B0E2AFB000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0D908A000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0E53AA000
trusted library allocation
page read and write
1B0E3A43000
trusted library allocation
page read and write
1B0D9DA2000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0D93E7000
trusted library allocation
page read and write
1B0DA9E7000
trusted library allocation
page read and write
1B0DAA8E000
trusted library allocation
page read and write
1B0E1A91000
trusted library allocation
page read and write
1B0D9867000
trusted library allocation
page read and write
1B0E5378000
trusted library allocation
page read and write
1B0D01E1000
heap
page read and write
1B0E48F2000
trusted library allocation
page read and write
1B0D0185000
heap
page read and write
1B0DB87A000
trusted library allocation
page read and write
26AC8DE0000
heap
page read and write
DD4000
heap
page read and write
1B0DCBC4000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E3B57000
trusted library allocation
page read and write
1B0E5445000
trusted library allocation
page read and write
1B0D9DC5000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
9C1E3FE000
stack
page read and write
1B0D0192000
heap
page read and write
1B0D019A000
heap
page read and write
1B0DA6FB000
trusted library allocation
page read and write
1B0D914E000
trusted library allocation
page read and write
1B0D903C000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0DABE9000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0E1835000
trusted library allocation
page read and write
1B0E37FB000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0D01A5000
heap
page read and write
1B0DA148000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D01E1000
heap
page read and write
1B0D0186000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0D016D000
heap
page read and write
1B0E10B9000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0DB684000
trusted library allocation
page read and write
1B0DAD84000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0DB859000
trusted library allocation
page read and write
F4A653E000
unkown
page readonly
1B0DAB29000
trusted library allocation
page read and write
1B0E53B5000
trusted library allocation
page read and write
1B0D4BB3000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
26AC92C0000
heap
page read and write
1B0DA2B1000
trusted library allocation
page read and write
1B0D9AD3000
trusted library allocation
page read and write
1B0E19D3000
trusted library allocation
page read and write
1B0E18F2000
trusted library allocation
page read and write
1B0D01A8000
heap
page read and write
1B0D0164000
heap
page read and write
1FF83067000
heap
page read and write
1B0E19EF000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0D017A000
heap
page read and write
1B0D01AD000
heap
page read and write
1B0D01A1000
heap
page read and write
1B0D61F2000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D019A000
heap
page read and write
1B0E52A9000
trusted library allocation
page read and write
1B0DB49E000
trusted library allocation
page read and write
1B0DAA84000
trusted library allocation
page read and write
1B0E2D61000
trusted library allocation
page read and write
1B0E112E000
trusted library allocation
page read and write
1B0D01B2000
heap
page read and write
1B0D01EC000
heap
page read and write
1B0E11A9000
trusted library allocation
page read and write
1B0DA9C2000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D016C000
heap
page read and write
1B0DA93C000
trusted library allocation
page read and write
1B0DA9F9000
trusted library allocation
page read and write
1B0DAB2E000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0E1835000
trusted library allocation
page read and write
1B0D64EB000
trusted library allocation
page read and write
1B0DAB56000
trusted library allocation
page read and write
1B0D88C8000
trusted library allocation
page read and write
1B0E2AF4000
trusted library allocation
page read and write
1B0DA282000
trusted library allocation
page read and write
1B0E11A4000
trusted library allocation
page read and write
1B0E4F9F000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
1B0DADBA000
trusted library allocation
page read and write
1B0E52A9000
trusted library allocation
page read and write
1B0DAAB9000
trusted library allocation
page read and write
1B0DA6A8000
trusted library allocation
page read and write
1B0E48C4000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
1B0D01D9000
heap
page read and write
1B0D01A1000
heap
page read and write
8921BD8000
stack
page read and write
1B0DC66E000
trusted library allocation
page read and write
1B0E10C0000
trusted library allocation
page read and write
1B0DCBE3000
trusted library allocation
page read and write
1B0DAB99000
trusted library allocation
page read and write
1B0DADA0000
trusted library allocation
page read and write
1B0D01E7000
heap
page read and write
1B0E114C000
trusted library allocation
page read and write
1B0D6141000
trusted library allocation
page read and write
1B0D907D000
trusted library allocation
page read and write
1B0DAADB000
trusted library allocation
page read and write
1B0DB8F2000
trusted library allocation
page read and write
B60000
unkown
page readonly
1FF82FE0000
heap
page read and write
1B0D0196000
heap
page read and write
237F758F000
trusted library allocation
page read and write
1B0DCBFA000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E11F9000
trusted library allocation
page read and write
1B0E19D3000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
B0E000
stack
page read and write
1B0D0226000
heap
page read and write
1B0DA2D9000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0E1378000
trusted library allocation
page read and write
237F755D000
trusted library allocation
page read and write
1B0D91B9000
trusted library allocation
page read and write
1B0D8F94000
trusted library allocation
page read and write
1B0E48C4000
trusted library allocation
page read and write
1B0DA94A000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0DAD93000
trusted library allocation
page read and write
1B0E536F000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E53D3000
trusted library allocation
page read and write
1B0E18F2000
trusted library allocation
page read and write
1B0D4B81000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E39C8000
trusted library allocation
page read and write
1B0D017B000
heap
page read and write
1B0D91C7000
trusted library allocation
page read and write
1B0D01F1000
heap
page read and write
1B0D0180000
heap
page read and write
1B0DA2D3000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
E29000
heap
page read and write
1B0E1479000
trusted library allocation
page read and write
1B0E2DFB000
trusted library allocation
page read and write
1B0E19F5000
trusted library allocation
page read and write
1B0DC594000
trusted library allocation
page read and write
1B0E11CC000
trusted library allocation
page read and write
1B0DAB4C000
trusted library allocation
page read and write
1B0D8F6A000
trusted library allocation
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
24588DAA000
heap
page read and write
1B0D0190000
heap
page read and write
26AC8DA0000
heap
page read and write
1B0D0196000
heap
page read and write
1B0E48C4000
trusted library allocation
page read and write
1B0DB9DC000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0E57E1000
heap
page read and write
1B0DC7E6000
trusted library allocation
page read and write
1B0E57E1000
heap
page read and write
1B0DA66B000
trusted library allocation
page read and write
1B0D914C000
trusted library allocation
page read and write
1B0E11BB000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
E77C7FE000
stack
page read and write
1B0DB660000
trusted library allocation
page read and write
1FF82FE8000
heap
page read and write
1B0DA1FB000
trusted library allocation
page read and write
1B0E18E6000
trusted library allocation
page read and write
1B0DA635000
trusted library allocation
page read and write
1B0DCBE3000
trusted library allocation
page read and write
1B0E19EB000
trusted library allocation
page read and write
1B0D0184000
heap
page read and write
1B0E51A4000
trusted library allocation
page read and write
9C2167E000
stack
page read and write
1B0D01EC000
heap
page read and write
1B0E51B1000
trusted library allocation
page read and write
1B0DA669000
trusted library allocation
page read and write
1B0DA943000
trusted library allocation
page read and write
1B0DC586000
trusted library allocation
page read and write
1B0E1A80000
trusted library allocation
page read and write
1FF83044000
heap
page read and write
1B0DC7BC000
trusted library allocation
page read and write
1B0DABB9000
trusted library allocation
page read and write
1B0E56AF000
trusted library allocation
page read and write
1B0E1159000
trusted library allocation
page read and write
1B0DAAD0000
trusted library allocation
page read and write
1B0D8F8A000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0DA6F0000
trusted library allocation
page read and write
1B0D01CE000
heap
page read and write
1B0DA6E5000
trusted library allocation
page read and write
1B0DABB9000
trusted library allocation
page read and write
1B0E117D000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0D88CD000
trusted library allocation
page read and write
1B0DCB48000
trusted library allocation
page read and write
1B0DA6F3000
trusted library allocation
page read and write
1B0E48F2000
trusted library allocation
page read and write
1B0E2DE9000
trusted library allocation
page read and write
1B0D01B9000
heap
page read and write
1B0D9179000
trusted library allocation
page read and write
1B0E1230000
trusted library allocation
page read and write
1B0D8B99000
heap
page read and write
1B0DA6B7000
trusted library allocation
page read and write
1B0E16C7000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D01CE000
heap
page read and write
1B0E5382000
trusted library allocation
page read and write
1B0DC510000
trusted library allocation
page read and write
1B0D98FC000
trusted library allocation
page read and write
1B0E147B000
trusted library allocation
page read and write
1B0DB8B0000
trusted library allocation
page read and write
1B0E1479000
trusted library allocation
page read and write
1B0E18F2000
trusted library allocation
page read and write
1B0E119E000
trusted library allocation
page read and write
1B0D01A4000
heap
page read and write
1B0DCBA9000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D01A5000
heap
page read and write
1B0DA34B000
trusted library allocation
page read and write
1B0E12E4000
trusted library allocation
page read and write
1B0DB875000
trusted library allocation
page read and write
1B0DA676000
trusted library allocation
page read and write
1B0E52C2000
trusted library allocation
page read and write
1B0D9DC1000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0D90CE000
trusted library allocation
page read and write
1B0E5234000
trusted library allocation
page read and write
1B0E135A000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0D01A1000
heap
page read and write
1B0D017A000
heap
page read and write
1FF82F69000
heap
page read and write
237F7549000
trusted library allocation
page read and write
26AC8F3F000
unclassified section
page read and write
1B0DA2D9000
trusted library allocation
page read and write
1B0E11BB000
trusted library allocation
page read and write
1B0E552C000
trusted library allocation
page read and write
1B0D0188000
heap
page read and write
E39000
heap
page read and write
1B0E53CF000
trusted library allocation
page read and write
1B0E19ED000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D017C000
heap
page read and write
1B0E5542000
trusted library allocation
page read and write
F4A41CE000
stack
page read and write
1B0DB4DF000
trusted library allocation
page read and write
1FF83044000
heap
page read and write
1B0D9195000
trusted library allocation
page read and write
1B0DC8E2000
trusted library allocation
page read and write
1B0D8F78000
trusted library allocation
page read and write
1B0E2DED000
trusted library allocation
page read and write
26AC8F70000
unclassified section
page readonly
1B0D017F000
heap
page read and write
1B0DB8B6000
trusted library allocation
page read and write
1B0DB8ED000
trusted library allocation
page read and write
1B0E52C2000
trusted library allocation
page read and write
1B0DC6EF000
trusted library allocation
page read and write
1B0D0216000
heap
page read and write
1B0D6532000
trusted library allocation
page read and write
1B0DB9E1000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D908A000
trusted library allocation
page read and write
1B0E1968000
trusted library allocation
page read and write
1B0DC6E7000
trusted library allocation
page read and write
1FF82F63000
heap
page read and write
1B0E51EF000
trusted library allocation
page read and write
1B0E14B8000
trusted library allocation
page read and write
1B0D0191000
heap
page read and write
1B0D8990000
trusted library allocation
page read and write
1B0E19D1000
trusted library allocation
page read and write
1B0DA6F5000
trusted library allocation
page read and write
1B0E54BF000
trusted library allocation
page read and write
1B0D01F7000
heap
page read and write
1B0DA979000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
26AC8E98000
trusted library allocation
page read and write
1B0E5191000
trusted library allocation
page read and write
1B0DC7C6000
trusted library allocation
page read and write
1B0E18EC000
trusted library allocation
page read and write
1B0E6037000
trusted library allocation
page read and write
1B0E2D46000
trusted library allocation
page read and write
1B0DA990000
trusted library allocation
page read and write
1B0E11AE000
trusted library allocation
page read and write
1B0D019D000
heap
page read and write
1B0E520A000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0E51CD000
trusted library allocation
page read and write
1B0E1A9D000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0E5482000
trusted library allocation
page read and write
9CE000
stack
page read and write
1B0DA339000
trusted library allocation
page read and write
1B0E18EA000
trusted library allocation
page read and write
1B0D913D000
trusted library allocation
page read and write
1B0DC7C2000
trusted library allocation
page read and write
1B0DA2D3000
trusted library allocation
page read and write
1B0E582D000
heap
page read and write
1B0D0182000
heap
page read and write
26AC8F40000
heap
page read and write
1B0E11AE000
trusted library allocation
page read and write
1B0E136C000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0D934E000
trusted library allocation
page read and write
1B0DABBE000
trusted library allocation
page read and write
E36000
heap
page read and write
1B0DA23C000
trusted library allocation
page read and write
1B0DA136000
trusted library allocation
page read and write
1B0D0186000
heap
page read and write
1B0DB42B000
trusted library allocation
page read and write
1B0DAD96000
trusted library allocation
page read and write
1B0E51B3000
trusted library allocation
page read and write
1B0DC573000
trusted library allocation
page read and write
1B0DAD72000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0DCF8A000
trusted library allocation
page read and write
1B0E53B0000
trusted library allocation
page read and write
1B0E2AFB000
trusted library allocation
page read and write
1B0DB644000
trusted library allocation
page read and write
1B0DAB59000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0D018F000
heap
page read and write
1B0DB8F8000
trusted library allocation
page read and write
1FF82FB9000
heap
page read and write
1B0E5520000
trusted library allocation
page read and write
1B0D9332000
trusted library allocation
page read and write
1B0D91D8000
trusted library allocation
page read and write
1B0E182C000
trusted library allocation
page read and write
1B0DAD8F000
trusted library allocation
page read and write
1B0E12E0000
trusted library allocation
page read and write
1B0E1A9D000
trusted library allocation
page read and write
1B0E1806000
trusted library allocation
page read and write
1B0D61A4000
trusted library allocation
page read and write
1B0DC73A000
trusted library allocation
page read and write
1B0E5698000
trusted library allocation
page read and write
1B0DA2E7000
trusted library allocation
page read and write
1B0E12A5000
trusted library allocation
page read and write
1B0DAB9B000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0DADA8000
trusted library allocation
page read and write
1B0E5367000
trusted library allocation
page read and write
1B0D8E00000
trusted library allocation
page read and write
1FF82FF1000
heap
page read and write
1B0DB6A1000
trusted library allocation
page read and write
9C236BE000
unkown
page readonly
1B0D01A0000
heap
page read and write
26AC8E47000
trusted library allocation
page read and write
1B0D919C000
trusted library allocation
page read and write
28D902A0000
heap
page read and write
E12000
heap
page read and write
1B0D0190000
heap
page read and write
1B0E2CAA000
trusted library allocation
page read and write
1B0DB81D000
trusted library allocation
page read and write
9C205FE000
unkown
page readonly
1B0D0196000
heap
page read and write
1B0DAB86000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0D01E9000
heap
page read and write
1B0D0182000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0DAB8A000
trusted library allocation
page read and write
1B0D0184000
heap
page read and write
E77CFFE000
stack
page read and write
237F7807000
trusted library allocation
page read and write
1B0D01A1000
heap
page read and write
1B0E1292000
trusted library allocation
page read and write
1B0D019B000
heap
page read and write
1B0DA30A000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0D0186000
heap
page read and write
1B0DABF1000
trusted library allocation
page read and write
1B0E4F75000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D01D0000
heap
page read and write
1B0D91CD000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0DAB47000
trusted library allocation
page read and write
1B0DCEF1000
trusted library allocation
page read and write
26AC9132000
trusted library allocation
page read and write
1B0E53E2000
trusted library allocation
page read and write
1B0DAB5B000
trusted library allocation
page read and write
1B0D0184000
heap
page read and write
1B0D01D8000
heap
page read and write
1B0E552D000
trusted library allocation
page read and write
1B0E486D000
trusted library allocation
page read and write
1B0DCB8B000
trusted library allocation
page read and write
1B0E16E6000
trusted library allocation
page read and write
1B0E11F2000
trusted library allocation
page read and write
1B0E16DF000
trusted library allocation
page read and write
1B0DADA6000
trusted library allocation
page read and write
1B0E1165000
trusted library allocation
page read and write
1B0E53E2000
trusted library allocation
page read and write
1B0E2BC7000
trusted library allocation
page read and write
1B0E2DEB000
trusted library allocation
page read and write
1B0DB9C7000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D019A000
heap
page read and write
1B0DAD23000
trusted library allocation
page read and write
1B0E19DB000
trusted library allocation
page read and write
1B0D4BDF000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0D0181000
heap
page read and write
1B0E1140000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0E553C000
trusted library allocation
page read and write
1B0D01E1000
heap
page read and write
1B0D0169000
heap
page read and write
1B0E5386000
trusted library allocation
page read and write
1B0DB3AA000
trusted library allocation
page read and write
1FF8239F000
trusted library allocation
page read and write
1B0D88E0000
trusted library allocation
page read and write
1B0E3A86000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0E51B3000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E10BB000
trusted library allocation
page read and write
1B0DACF6000
trusted library allocation
page read and write
1B0DA9B4000
trusted library allocation
page read and write
1B0D01A5000
heap
page read and write
1B0DABB8000
trusted library allocation
page read and write
1B0DAB6C000
trusted library allocation
page read and write
1B0DA970000
trusted library allocation
page read and write
1B0E529E000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D89C9000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0D017A000
heap
page read and write
1B0E5277000
trusted library allocation
page read and write
1B0E16FB000
trusted library allocation
page read and write
1B0DB809000
trusted library allocation
page read and write
1B0D8BD0000
heap
page read and write
1B0D0188000
heap
page read and write
1B0E2AF6000
trusted library allocation
page read and write
1B0DC5F2000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D9187000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0D9AFD000
trusted library allocation
page read and write
1B0DC86F000
trusted library allocation
page read and write
1B0E11E2000
trusted library allocation
page read and write
1B0E54CD000
trusted library allocation
page read and write
1B0DA106000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D01DE000
heap
page read and write
1B0D017A000
heap
page read and write
1B0E54BF000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0D019A000
heap
page read and write
1B0D01CC000
heap
page read and write
1B0D017C000
heap
page read and write
1B0D90A5000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0D01A4000
heap
page read and write
1B0DA6E5000
trusted library allocation
page read and write
1B0D8F47000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E18C5000
trusted library allocation
page read and write
1B0DAD6F000
trusted library allocation
page read and write
1B0E2BB6000
trusted library allocation
page read and write
1B0D01D3000
heap
page read and write
1B0E19F5000
trusted library allocation
page read and write
1B0DABF3000
trusted library allocation
page read and write
1B0DAAAF000
trusted library allocation
page read and write
1B0E1AF8000
trusted library allocation
page read and write
1FF82456000
heap
page read and write
1B0DAD23000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0DC6E9000
trusted library allocation
page read and write
1B0D913B000
trusted library allocation
page read and write
1B0E4F7A000
trusted library allocation
page read and write
1B0D8F84000
trusted library allocation
page read and write
1B0E486B000
trusted library allocation
page read and write
1B0E53AA000
trusted library allocation
page read and write
1B0E14C1000
trusted library allocation
page read and write
1B0DCBB9000
trusted library allocation
page read and write
1B0E14AA000
trusted library allocation
page read and write
1B0E16FE000
trusted library allocation
page read and write
1B0DADC3000
trusted library allocation
page read and write
1B0DA6B7000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
1B0DB8B0000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1FF82E17000
trusted library allocation
page read and write
1B0D9DC8000
trusted library allocation
page read and write
1B0DB689000
trusted library allocation
page read and write
1B0DA6FB000
trusted library allocation
page read and write
1B0DA176000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D01CE000
heap
page read and write
E1E000
heap
page read and write
1B0E53D1000
trusted library allocation
page read and write
1B0E2D41000
trusted library allocation
page read and write
1B0D913D000
trusted library allocation
page read and write
1B0E1585000
trusted library allocation
page read and write
1B0D8F5E000
trusted library allocation
page read and write
1B0E18E6000
trusted library allocation
page read and write
1B0E54EC000
trusted library allocation
page read and write
8924C7E000
stack
page read and write
1B0D01E7000
heap
page read and write
1B0D01F1000
heap
page read and write
1B0E37C3000
trusted library allocation
page read and write
1B0DAB9B000
trusted library allocation
page read and write
1B0D6196000
trusted library allocation
page read and write
1B0E18C8000
trusted library allocation
page read and write
1B0E51DD000
trusted library allocation
page read and write
1B0E14AF000
trusted library allocation
page read and write
1B0E12E5000
trusted library allocation
page read and write
1B0E2DFB000
trusted library allocation
page read and write
1B0D88DC000
trusted library allocation
page read and write
1B0E12E4000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
1B0D01CE000
heap
page read and write
1B0D016C000
heap
page read and write
1B0DCBC4000
trusted library allocation
page read and write
1B0E1A61000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0E1A52000
trusted library allocation
page read and write
1B0E12BA000
trusted library allocation
page read and write
1B0DB858000
trusted library allocation
page read and write
1B0E2D41000
trusted library allocation
page read and write
1B0E4886000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D016C000
heap
page read and write
1B0DB67B000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0E19E1000
trusted library allocation
page read and write
1B0D9061000
trusted library allocation
page read and write
1B0DB84E000
trusted library allocation
page read and write
E09000
heap
page read and write
1B0D521B000
trusted library allocation
page read and write
1B0D0169000
heap
page read and write
1B0D9053000
trusted library allocation
page read and write
1B0DAD0E000
trusted library allocation
page read and write
1B0D93C2000
trusted library allocation
page read and write
1B0D93D5000
trusted library allocation
page read and write
1B0D908C000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1FF83059000
heap
page read and write
1B0D88DB000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0DA21C000
trusted library allocation
page read and write
9C20DFE000
stack
page read and write
1B0DCBB9000
trusted library allocation
page read and write
1B0E2CBB000
trusted library allocation
page read and write
1B0D8984000
trusted library allocation
page read and write
1B0E14D1000
trusted library allocation
page read and write
1B0DB58B000
trusted library allocation
page read and write
E39000
heap
page read and write
1B0DCB8B000
trusted library allocation
page read and write
1B0D01F2000
heap
page read and write
1B0D01DE000
heap
page read and write
1B0D9370000
trusted library allocation
page read and write
1B0DA34D000
trusted library allocation
page read and write
1B0DA63D000
trusted library allocation
page read and write
1B0E52C2000
trusted library allocation
page read and write
1B0E19EB000
trusted library allocation
page read and write
1B0E11E2000
trusted library allocation
page read and write
1B0E4F9F000
trusted library allocation
page read and write
1B0DCFAC000
trusted library allocation
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0D01D7000
heap
page read and write
237F750C000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0E538E000
trusted library allocation
page read and write
1B0E13A9000
trusted library allocation
page read and write
1B0E538E000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D01A0000
heap
page read and write
237F7503000
trusted library allocation
page read and write
1B0DAB90000
trusted library allocation
page read and write
1B0E1228000
trusted library allocation
page read and write
1B0E19E6000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
1B0D0185000
heap
page read and write
1B0E14C1000
trusted library allocation
page read and write
1B0DB6BE000
trusted library allocation
page read and write
1B0D649A000
trusted library allocation
page read and write
1B0DA2F6000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0DB870000
trusted library allocation
page read and write
1B0E5382000
trusted library allocation
page read and write
1B0E3B33000
trusted library allocation
page read and write
1B0D619C000
trusted library allocation
page read and write
1B0D018A000
heap
page read and write
1B0E19ED000
trusted library allocation
page read and write
1B0D01E1000
heap
page read and write
1B0D0169000
heap
page read and write
1B0DAA50000
trusted library allocation
page read and write
E0A000
heap
page read and write
1B0D0164000
heap
page read and write
1B0D01DE000
heap
page read and write
1B0E5277000
trusted library allocation
page read and write
1FF83000000
heap
page read and write
1B0D01A0000
heap
page read and write
1B0DB4DF000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0E1697000
trusted library allocation
page read and write
1FF82FEA000
heap
page read and write
1B0DA6F0000
trusted library allocation
page read and write
1B0D01D4000
heap
page read and write
1B0E11A6000
trusted library allocation
page read and write
1B0E165B000
trusted library allocation
page read and write
1B0D649D000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
1B0DAA80000
trusted library allocation
page read and write
1B0D5282000
trusted library allocation
page read and write
1B0E5364000
trusted library allocation
page read and write
1B0DA6EC000
trusted library allocation
page read and write
1B0DCB37000
trusted library allocation
page read and write
1B0DB5BC000
trusted library allocation
page read and write
1B0DB88A000
trusted library allocation
page read and write
1B0E18DB000
trusted library allocation
page read and write
1B0D0186000
heap
page read and write
1B0DCBB9000
trusted library allocation
page read and write
1B0D63B0000
trusted library allocation
page read and write
1B0E53BC000
trusted library allocation
page read and write
245871D4000
heap
page read and write
1B0DAB9B000
trusted library allocation
page read and write
1B0DA9ED000
trusted library allocation
page read and write
1B0E1165000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0E2CFE000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0D9975000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0E1ABC000
trusted library allocation
page read and write
1B0D01D0000
heap
page read and write
1B0DC5A4000
trusted library allocation
page read and write
1B0D0182000
heap
page read and write
1B0D0180000
heap
page read and write
1B0DA2C3000
trusted library allocation
page read and write
1B0E584A000
heap
page read and write
1B0E1827000
trusted library allocation
page read and write
1B0E2CFE000
trusted library allocation
page read and write
1B0DAA74000
trusted library allocation
page read and write
1B0D64EB000
trusted library allocation
page read and write
1B0DA2C3000
trusted library allocation
page read and write
1B0E11C1000
trusted library allocation
page read and write
1FF82F69000
heap
page read and write
1B0DB890000
trusted library allocation
page read and write
1B0DAB83000
trusted library allocation
page read and write
1B0E2D33000
trusted library allocation
page read and write
1B0E5382000
trusted library allocation
page read and write
1B0DAB9B000
trusted library allocation
page read and write
1B0DC7EC000
trusted library allocation
page read and write
1B0E10C8000
trusted library allocation
page read and write
1B0D91CE000
trusted library allocation
page read and write
1B0E19CE000
trusted library allocation
page read and write
1B0D644E000
trusted library allocation
page read and write
1B0D018F000
heap
page read and write
1B0D527D000
trusted library allocation
page read and write
1B0E52D7000
trusted library allocation
page read and write
1B0DA262000
trusted library allocation
page read and write
1B0DB3F8000
trusted library allocation
page read and write
1B0D01F7000
heap
page read and write
DC0000
heap
page read and write
1B0D63ED000
trusted library allocation
page read and write
1B0E53C1000
trusted library allocation
page read and write
1B0E11F9000
trusted library allocation
page read and write
1B0E53BC000
trusted library allocation
page read and write
237F7400000
trusted library allocation
page read and write
1B0E18FD000
trusted library allocation
page read and write
1FF82FE0000
heap
page read and write
1B0DCB48000
trusted library allocation
page read and write
1B0DAA52000
trusted library allocation
page read and write
1B0D919D000
trusted library allocation
page read and write
1B0E1184000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0E2DD1000
trusted library allocation
page read and write
1B0D01E9000
heap
page read and write
1B0D0175000
heap
page read and write
1B0DA1D2000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1FF821A2000
unclassified section
page read and write
1B0E16EF000
trusted library allocation
page read and write
1B0E54E9000
trusted library allocation
page read and write
1B0DB875000
trusted library allocation
page read and write
1B0D0163000
heap
page read and write
C2C000
unkown
page read and write
1B0D887A000
trusted library allocation
page read and write
1B0D614F000
trusted library allocation
page read and write
1B0DA3C2000
trusted library allocation
page read and write
26AC9100000
trusted library allocation
page read and write
1B0DCBB1000
trusted library allocation
page read and write
1B0D93D5000
trusted library allocation
page read and write
26AC8F43000
heap
page read and write
1B0DA2A1000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D018A000
heap
page read and write
1B0D0190000
heap
page read and write
9C1EDD8000
stack
page read and write
1B0D0186000
heap
page read and write
1B0D01A5000
heap
page read and write
1B0D01A5000
heap
page read and write
1B0D99CF000
trusted library allocation
page read and write
1B0E18EC000
trusted library allocation
page read and write
1B0E1165000
trusted library allocation
page read and write
1B0D8B9A000
heap
page read and write
1B0D018C000
heap
page read and write
1B0DA6B5000
trusted library allocation
page read and write
1B0DCBAD000
trusted library allocation
page read and write
1B0E2CC5000
trusted library allocation
page read and write
1B0DADA0000
trusted library allocation
page read and write
26AC913D000
trusted library allocation
page read and write
1B0D8F61000
trusted library allocation
page read and write
1B0D0181000
heap
page read and write
1B0E2AFB000
trusted library allocation
page read and write
1B0DA3D7000
trusted library allocation
page read and write
1B0DA25D000
trusted library allocation
page read and write
1B0DAD92000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0D0189000
heap
page read and write
1B0DB886000
trusted library allocation
page read and write
1B0E1699000
trusted library allocation
page read and write
1B0DC7E4000
trusted library allocation
page read and write
1B0E1596000
trusted library allocation
page read and write
1B0DAB79000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0D01F1000
heap
page read and write
1B0E11D2000
trusted library allocation
page read and write
1B0E583C000
heap
page read and write
1B0D019B000
heap
page read and write
1B0DAD92000
trusted library allocation
page read and write
1B0E39E5000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1B0E18C5000
trusted library allocation
page read and write
1B0D016C000
heap
page read and write
237F7900000
trusted library allocation
page read and write
1B0DCBD0000
trusted library allocation
page read and write
1B0DA6EC000
trusted library allocation
page read and write
1B0E54EC000
trusted library allocation
page read and write
1FF82F09000
heap
page read and write
1B0DB54F000
trusted library allocation
page read and write
1B0D0164000
heap
page read and write
3EE000
stack
page read and write
1FF82F8A000
heap
page read and write
1B0DA9D2000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E10C4000
trusted library allocation
page read and write
1B0DA198000
trusted library allocation
page read and write
1B0DABF7000
trusted library allocation
page read and write
1B0DCBB1000
trusted library allocation
page read and write
1B0DA66E000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D9DE6000
trusted library allocation
page read and write
1B0E18FA000
trusted library allocation
page read and write
1B0E1840000
trusted library allocation
page read and write
1FF83067000
heap
page read and write
1B0D0196000
heap
page read and write
1B0E2DED000
trusted library allocation
page read and write
1B0DAD9F000
trusted library allocation
page read and write
24587507000
trusted library allocation
page read and write
1B0E48E5000
trusted library allocation
page read and write
1FF82440000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0E1827000
trusted library allocation
page read and write
1B0D88E0000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0E5322000
trusted library allocation
page read and write
1B0E10B1000
trusted library allocation
page read and write
1B0E1A80000
trusted library allocation
page read and write
1B0DA181000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0E19EB000
trusted library allocation
page read and write
F4A64BE000
unkown
page readonly
1FF82FE8000
heap
page read and write
1B0DA269000
trusted library allocation
page read and write
1B0D0199000
heap
page read and write
1B0E2BA6000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0E2A9B000
trusted library allocation
page read and write
1B0E132B000
trusted library allocation
page read and write
1B0DC8DE000
trusted library allocation
page read and write
1B0D0194000
heap
page read and write
E09000
heap
page read and write
1B0DCF1C000
trusted library allocation
page read and write
1B0DAB4B000
trusted library allocation
page read and write
1B0DC6D1000
trusted library allocation
page read and write
1B0D0180000
heap
page read and write
1B0D0189000
heap
page read and write
1B0D0199000
heap
page read and write
1B0D9152000
trusted library allocation
page read and write
1B0D637D000
trusted library allocation
page read and write
1B0D01DE000
heap
page read and write
1B0D9ACA000
trusted library allocation
page read and write
1B0DABB8000
trusted library allocation
page read and write
1B0E18EC000
trusted library allocation
page read and write
1B0E1691000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B0D01A0000
heap
page read and write
F4A65BE000
unkown
page readonly
1B0D01D4000
heap
page read and write
1B0D019A000
heap
page read and write
1B0D0196000
heap
page read and write
1B0E544B000
trusted library allocation
page read and write
1B0DAD3B000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0DABC9000
trusted library allocation
page read and write
1B0D019A000
heap
page read and write
1B0DB484000
trusted library allocation
page read and write
1B0D909E000
trusted library allocation
page read and write
1B0D0227000
heap
page read and write
1B0D521E000
trusted library allocation
page read and write
1B0E2CE1000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0E2C55000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
1B0DA676000
trusted library allocation
page read and write
1B0E2C94000
trusted library allocation
page read and write
1B0E116A000
trusted library allocation
page read and write
1B0E2DEB000
trusted library allocation
page read and write
1B0D93F0000
trusted library allocation
page read and write
237F726A000
heap
page read and write
35B1000
heap
page read and write
1B0D021F000
heap
page read and write
1B0E128D000
trusted library allocation
page read and write
1B0DAB74000
trusted library allocation
page read and write
1B0E2DC4000
trusted library allocation
page read and write
1B0E549E000
trusted library allocation
page read and write
1B0D01D8000
heap
page read and write
1FF82323000
trusted library allocation
page read and write
1FF82420000
trusted library allocation
page read and write
1B0D01DF000
heap
page read and write
1B0D917B000
trusted library allocation
page read and write
1B0E19DB000
trusted library allocation
page read and write
1B0D01CB000
heap
page read and write
1B0D521E000
trusted library allocation
page read and write
1FF83058000
heap
page read and write
1B0D899D000
trusted library allocation
page read and write
1B0E11C1000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1FF83058000
heap
page read and write
1B0D01A5000
heap
page read and write
1B0D016C000
heap
page read and write
237F75DB000
trusted library allocation
page read and write
1B0D0196000
heap
page read and write
1B0DB829000
trusted library allocation
page read and write
1B0D01F7000
heap
page read and write
1B0E53CC000
trusted library allocation
page read and write
1B0D0189000
heap
page read and write
1B0E14AA000
trusted library allocation
page read and write
26AC8E63000
trusted library allocation
page read and write
1B0D9869000
trusted library allocation
page read and write
237F75B8000
trusted library allocation
page read and write
1B0E16FB000
trusted library allocation
page read and write
1B0DAA52000
trusted library allocation
page read and write
1B0E48BF000
trusted library allocation
page read and write
1B0D0185000
heap
page read and write
1B0E2AF4000
trusted library allocation
page read and write
1B0D0192000
heap
page read and write
1B0D01CB000
heap
page read and write
1B0DA660000
trusted library allocation
page read and write
1B0D01A0000
heap
page read and write
1B0D018A000
heap
page read and write
1FF82200000
trusted library allocation
page read and write
1B0DA2B9000
trusted library allocation
page read and write
1B0E5324000
trusted library allocation
page read and write
1B0D0190000
heap
page read and write
There are 4146 hidden memdumps, click here to show them.