IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_624a379a-9541-4898-b5f3-64994def33a0.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_624a379a-9541-4898-b5f3-64994def33a0.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
ASCII text, with very long lines (1769), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2268 -parentBuildID 20230927232528 -prefsHandle 2212 -prefMapHandle 2204 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4de06ef4-7b42-4cc5-b75b-16175537487e} 7992 "\\.\pipe\gecko-crash-server-pipe.7992" 1eb47a6f510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4104 -parentBuildID 20230927232528 -prefsHandle 4128 -prefMapHandle 4124 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c009cfd6-4e48-44af-ba60-856a4eeb6978} 7992 "\\.\pipe\gecko-crash-server-pipe.7992" 1eb59ad6c10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4992 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4984 -prefMapHandle 4980 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {77f7aa6d-255c-483f-8a66-dc6825b39511} 7992 "\\.\pipe\gecko-crash-server-pipe.7992" 1eb617f6910 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://mathiasbynens.be/notes/javascript-escapes#single
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://youtube.com/account?=htr
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://youtube.com/account?=htg
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://youtube.com/account?=ht;
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mathiasbynens.be/
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.174
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.212.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.186.174
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
11F0000
heap
page read and write
malicious
1EB57C7D000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB58C4E000
trusted library allocation
page read and write
1EB57E4F000
trusted library allocation
page read and write
1EB5FEAD000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
2B39150C000
trusted library allocation
page execute read
1EB59000000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB5B42A000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB59DDD000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E87C000
heap
page read and write
1EB5B5A1000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB5922F000
trusted library allocation
page read and write
1EB531EF000
trusted library allocation
page read and write
1EB63C7D000
trusted library allocation
page read and write
1EB63DAC000
heap
page read and write
1EB4E892000
heap
page read and write
1EB4E873000
heap
page read and write
1EB57A3E000
trusted library allocation
page read and write
1EB54AF9000
trusted library allocation
page read and write
1EB58BC5000
trusted library allocation
page read and write
1EB63C8D000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB5A2CA000
trusted library allocation
page read and write
1EB5B1CF000
trusted library allocation
page read and write
1EB5A2CC000
trusted library allocation
page read and write
1EB5FEA0000
trusted library allocation
page read and write
1EB59241000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
11FC000
heap
page read and write
1EB57A3E000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E86C000
heap
page read and write
1EB4E85F000
heap
page read and write
F15E27E000
unkown
page readonly
1EB576A8000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB4E865000
heap
page read and write
1EB4E85F000
heap
page read and write
28E8A9E3000
heap
page read and write
1EB58AA9000
trusted library allocation
page read and write
1EB64814000
trusted library allocation
page read and write
1EB56F4F000
trusted library allocation
page read and write
28E8999A000
heap
page read and write
1EB59AA2000
trusted library allocation
page read and write
1EB57AD3000
trusted library allocation
page read and write
1EB57CBC000
trusted library allocation
page read and write
1D036B00000
trusted library allocation
page read and write
28E89DC0000
trusted library allocation
page read and write
1EB5B598000
trusted library allocation
page read and write
1D0369E0000
heap
page read and write
1EB56EFE000
trusted library allocation
page read and write
1FA4E700000
trusted library allocation
page read and write
1EB59DF3000
trusted library allocation
page read and write
258C8FE000
unkown
page readonly
1EB56EF6000
trusted library allocation
page read and write
1EB5FF22000
trusted library allocation
page read and write
1EB59799000
trusted library allocation
page read and write
1EB5B447000
trusted library allocation
page read and write
1EB531BF000
trusted library allocation
page read and write
1EB64804000
trusted library allocation
page read and write
1EB5B743000
trusted library allocation
page read and write
1EB5B7C3000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB57E63000
trusted library allocation
page read and write
1EB57EC3000
trusted library allocation
page read and write
1EB617FB000
trusted library allocation
page read and write
1BE35C13000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB63CD4000
trusted library allocation
page read and write
1EB59AD2000
trusted library allocation
page read and write
1EB4E86C000
heap
page read and write
1EB4E82E000
heap
page read and write
1EB57AE9000
trusted library allocation
page read and write
1EB58A8D000
trusted library allocation
page read and write
1EB57CE0000
trusted library allocation
page read and write
1EB58BA4000
trusted library allocation
page read and write
1EB56FD2000
trusted library allocation
page read and write
1EB5FE6B000
trusted library allocation
page read and write
1EB5FF20000
trusted library allocation
page read and write
1EB597C7000
trusted library allocation
page read and write
1EB4E839000
heap
page read and write
1EB4E85B000
heap
page read and write
1EB59B7F000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB57A98000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB58A6A000
trusted library allocation
page read and write
1EB58E48000
trusted library allocation
page read and write
1EB5FEA7000
trusted library allocation
page read and write
1EB5B645000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
1EB58A8F000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB4E87C000
heap
page read and write
1EB60140000
trusted library allocation
page read and write
1EB54899000
trusted library allocation
page read and write
1BE357D0000
unclassified section
page readonly
1EB5B793000
trusted library allocation
page read and write
1EB53723000
trusted library allocation
page read and write
1EB5B5E2000
trusted library allocation
page read and write
101E000
stack
page read and write
139F1A00000
trusted library allocation
page read and write
1EB4E874000
heap
page read and write
1EB49363000
heap
page read and write
1EB4E876000
heap
page read and write
1EB4E878000
heap
page read and write
1EB4E858000
heap
page read and write
28E89E5F000
trusted library allocation
page read and write
1EB5B5A5000
trusted library allocation
page read and write
1EB4E84E000
heap
page read and write
1EB587B4000
trusted library allocation
page read and write
1EB592F1000
trusted library allocation
page read and write
1EB5FB8D000
trusted library allocation
page read and write
1EB577B5000
trusted library allocation
page read and write
1EB58AE5000
trusted library allocation
page read and write
28E8A9F0000
heap
page read and write
1EB617F6000
trusted library allocation
page read and write
1EB601B6000
trusted library allocation
page read and write
28E8A9A1000
heap
page read and write
1EB58A65000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB57AF0000
trusted library allocation
page read and write
28E8AA58000
heap
page read and write
1EB57AE6000
trusted library allocation
page read and write
1EB4E848000
heap
page read and write
1EB587E5000
trusted library allocation
page read and write
1EB59AEE000
trusted library allocation
page read and write
1EB601D6000
trusted library allocation
page read and write
1BE35CDB000
trusted library allocation
page read and write
1EB57CAD000
trusted library allocation
page read and write
1EB57E98000
trusted library allocation
page read and write
1EB5776B000
trusted library allocation
page read and write
1EB59758000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB57C37000
trusted library allocation
page read and write
FD4000
heap
page read and write
1EB60173000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E862000
heap
page read and write
1EB60066000
trusted library allocation
page read and write
1EB58B9A000
trusted library allocation
page read and write
28E89D70000
trusted library section
page readonly
1EB4E85F000
heap
page read and write
28E89DDC000
unkown
page execute read
1EB5A19B000
trusted library allocation
page read and write
1EB63CFE000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB57291000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB4E830000
heap
page read and write
1EB4E87B000
heap
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB4E877000
heap
page read and write
1EB5B443000
trusted library allocation
page read and write
1EB601D3000
trusted library allocation
page read and write
1EB58744000
trusted library allocation
page read and write
1EB6485E000
trusted library allocation
page read and write
1EB5B305000
trusted library allocation
page read and write
1EB537F6000
trusted library allocation
page read and write
28E8A800000
trusted library allocation
page read and write
28E89E76000
trusted library allocation
page read and write
1EB5B7B8000
trusted library allocation
page read and write
1EB58A7F000
trusted library allocation
page read and write
1EB58B68000
trusted library allocation
page read and write
1EB5FCD0000
trusted library allocation
page read and write
1FA4E8EB000
trusted library allocation
page read and write
1EB58F95000
trusted library allocation
page read and write
1EB57E21000
trusted library allocation
page read and write
1EB5B477000
trusted library allocation
page read and write
1EB63CA8000
trusted library allocation
page read and write
1EB61DE3000
trusted library allocation
page read and write
1EB58BC9000
trusted library allocation
page read and write
1EB57674000
trusted library allocation
page read and write
1EB57CB5000
trusted library allocation
page read and write
1EB4E831000
heap
page read and write
1EB4E892000
heap
page read and write
1EB4E892000
heap
page read and write
1EB58687000
trusted library allocation
page read and write
1EB5FE3E000
trusted library allocation
page read and write
1EB4E85B000
heap
page read and write
1EB4E886000
heap
page read and write
1EB4E836000
heap
page read and write
1EB57EE1000
trusted library allocation
page read and write
1FA4E872000
trusted library allocation
page read and write
130000
unkown
page readonly
1EB6476D000
trusted library allocation
page read and write
1EB5B5AF000
trusted library allocation
page read and write
1EB57CBA000
trusted library allocation
page read and write
1EB59AC0000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
28E8A9E8000
heap
page read and write
1EB63D96000
heap
page read and write
1EB6016F000
trusted library allocation
page read and write
1EB63B80000
trusted library allocation
page read and write
1EB5768A000
trusted library allocation
page read and write
1EB5AC2D000
trusted library allocation
page read and write
1EB4E86C000
heap
page read and write
1EB597C7000
trusted library allocation
page read and write
1EB54748000
trusted library allocation
page read and write
1EB4E885000
heap
page read and write
1EB4E82F000
heap
page read and write
1EB57AD6000
trusted library allocation
page read and write
1EB5B4D9000
trusted library allocation
page read and write
1EB57A51000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB4E88A000
heap
page read and write
1EB58FCC000
trusted library allocation
page read and write
1EB538DA000
trusted library allocation
page read and write
28E89900000
unclassified section
page readonly
1EB4E83F000
heap
page read and write
1EB4E865000
heap
page read and write
1EB59DE7000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB58A74000
trusted library allocation
page read and write
1EB648AB000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1EB57CEC000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1F2000
unkown
page readonly
1EB6017D000
trusted library allocation
page read and write
1EB63DBA000
heap
page read and write
20205FE000
stack
page read and write
1EB57AF5000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB4E873000
heap
page read and write
1EB5B7C3000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB57CAD000
trusted library allocation
page read and write
1EB61750000
trusted library allocation
page read and write
1EB57AAA000
trusted library allocation
page read and write
1EB56EA6000
trusted library allocation
page read and write
1EB59DE0000
trusted library allocation
page read and write
1EB4E83C000
heap
page read and write
1EB4E862000
heap
page read and write
1EB538FE000
trusted library allocation
page read and write
1EB64B8A000
trusted library allocation
page read and write
1EB58A55000
trusted library allocation
page read and write
1EB576A1000
trusted library allocation
page read and write
1EB57AAC000
trusted library allocation
page read and write
1EB4E8B3000
heap
page read and write
1EB58FD8000
trusted library allocation
page read and write
1EB58FD2000
trusted library allocation
page read and write
1D036C0A000
trusted library allocation
page read and write
1EB49378000
heap
page read and write
1EB58BEC000
trusted library allocation
page read and write
1EB5A2F1000
trusted library allocation
page read and write
28E89C40000
heap
page readonly
1EB63CE7000
trusted library allocation
page read and write
1FA4E5CF000
unclassified section
page read and write
1EB4E862000
heap
page read and write
1EB4E84A000
heap
page read and write
28E8AA77000
heap
page read and write
1EB4E892000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB57E7A000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB57ABC000
trusted library allocation
page read and write
1EB58BD8000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5B1DC000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB53826000
trusted library allocation
page read and write
FD4000
heap
page read and write
1BE35D30000
heap
page read and write
1EB617A5000
trusted library allocation
page read and write
1EB6016B000
trusted library allocation
page read and write
1EB575E5000
trusted library allocation
page read and write
1EB57680000
trusted library allocation
page read and write
1EB57E38000
trusted library allocation
page read and write
28E8A95C000
heap
page read and write
1EB58FD3000
trusted library allocation
page read and write
1EB57284000
heap
page read and write
1EB57CB5000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
28E8A9E0000
heap
page read and write
1FA4E90C000
trusted library allocation
page read and write
1EB57C9A000
trusted library allocation
page read and write
1EB547A5000
trusted library allocation
page read and write
1EB4E85B000
heap
page read and write
1EB63CE7000
trusted library allocation
page read and write
1EB58BE9000
trusted library allocation
page read and write
1EB59227000
trusted library allocation
page read and write
1EB64806000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB5779C000
trusted library allocation
page read and write
1EB59CA9000
trusted library allocation
page read and write
1EB6483B000
trusted library allocation
page read and write
1EB59AA2000
trusted library allocation
page read and write
1EB59218000
trusted library allocation
page read and write
1EB54A95000
trusted library allocation
page read and write
1EB5877D000
trusted library allocation
page read and write
1EB63EA1000
heap
page read and write
1EB531B3000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB5B735000
trusted library allocation
page read and write
1EB57CEC000
trusted library allocation
page read and write
1EB57CAD000
trusted library allocation
page read and write
1EB57772000
trusted library allocation
page read and write
1EB59799000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB5A1C7000
trusted library allocation
page read and write
1EB5A28B000
trusted library allocation
page read and write
1EB5B4E5000
trusted library allocation
page read and write
28E8A9F0000
heap
page read and write
1EB5FE97000
trusted library allocation
page read and write
1EB58B85000
trusted library allocation
page read and write
1EB634E1000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB4E876000
heap
page read and write
1EB5B122000
trusted library allocation
page read and write
1EB5B7E7000
trusted library allocation
page read and write
1EB4E874000
heap
page read and write
1EB59C43000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB587A6000
trusted library allocation
page read and write
1EB597F1000
trusted library allocation
page read and write
1EB5FC82000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
28E8A969000
heap
page read and write
1EB4E836000
heap
page read and write
1EB4E841000
heap
page read and write
1EB4E865000
heap
page read and write
28E8AA2A000
heap
page read and write
1EB6484A000
trusted library allocation
page read and write
1EB59AE1000
trusted library allocation
page read and write
1EB4E86E000
heap
page read and write
1EB57E67000
trusted library allocation
page read and write
1EB648E1000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB63D51000
heap
page read and write
1EB59000000
trusted library allocation
page read and write
1EB597EB000
trusted library allocation
page read and write
1EB5FEDC000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB587AC000
trusted library allocation
page read and write
1EB577C1000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB54A8E000
trusted library allocation
page read and write
1EB5A048000
trusted library allocation
page read and write
1EB5929F000
trusted library allocation
page read and write
1EB5FE8D000
trusted library allocation
page read and write
28E89ECA000
trusted library allocation
page read and write
1EB64820000
trusted library allocation
page read and write
1EB5FCF7000
trusted library allocation
page read and write
1EB5727A000
heap
page read and write
1EB57222000
heap
page read and write
1EB59A85000
trusted library allocation
page read and write
1EB57E2D000
trusted library allocation
page read and write
1EB6200C000
trusted library allocation
page read and write
1EB57AB4000
trusted library allocation
page read and write
FD4000
heap
page read and write
1EB5B71F000
trusted library allocation
page read and write
1EB5B7BE000
trusted library allocation
page read and write
1EB4E87D000
heap
page read and write
1EB4E859000
heap
page read and write
1EB58BF2000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB58A6D000
trusted library allocation
page read and write
1EB5FCB5000
trusted library allocation
page read and write
1EB5A197000
trusted library allocation
page read and write
1EB57E76000
trusted library allocation
page read and write
1FA4E903000
trusted library allocation
page read and write
1EB59A9E000
trusted library allocation
page read and write
1EB617B4000
trusted library allocation
page read and write
1EB58A65000
trusted library allocation
page read and write
1EB59A4A000
trusted library allocation
page read and write
1EB4E87E000
heap
page read and write
1EB4E83F000
heap
page read and write
1EB597C1000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
28E8A98A000
heap
page read and write
28E8A960000
heap
page read and write
1EB60162000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E886000
heap
page read and write
1BE3600C000
trusted library allocation
page read and write
1EB57E63000
trusted library allocation
page read and write
1EB64867000
trusted library allocation
page read and write
1EB59B4D000
trusted library allocation
page read and write
1EB4E881000
heap
page read and write
1EB57CB5000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB4E858000
heap
page read and write
1EB4E86E000
heap
page read and write
1EB58E80000
trusted library allocation
page read and write
1EB601D6000
trusted library allocation
page read and write
1EB601E8000
trusted library allocation
page read and write
1EB57A60000
trusted library allocation
page read and write
1EB54AC7000
trusted library allocation
page read and write
1FA4E922000
trusted library allocation
page read and write
1EB63F12000
heap
page read and write
F159F5E000
unkown
page readonly
1EB4E862000
heap
page read and write
1EB637F5000
trusted library allocation
page read and write
1EB4E876000
heap
page read and write
1EB4E86B000
heap
page read and write
1EB60195000
trusted library allocation
page read and write
1EB58BD3000
trusted library allocation
page read and write
1EB62005000
trusted library allocation
page read and write
1EB5B713000
trusted library allocation
page read and write
28E8A900000
heap
page read and write
1EB597C1000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB4E86C000
heap
page read and write
1EB4E86B000
heap
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB54B2C000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1EB57A51000
trusted library allocation
page read and write
1EB587FD000
trusted library allocation
page read and write
1EB57A60000
trusted library allocation
page read and write
1EB64748000
trusted library allocation
page read and write
1EB54AC1000
trusted library allocation
page read and write
1EB592B7000
trusted library allocation
page read and write
1EB57E7B000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB592E4000
trusted library allocation
page read and write
1EB59AA2000
trusted library allocation
page read and write
1EB64828000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB5AD2D000
trusted library allocation
page read and write
1EB57284000
heap
page read and write
1EB59726000
trusted library allocation
page read and write
28E89E5C000
trusted library allocation
page read and write
1EB57C7B000
trusted library allocation
page read and write
1EB634BF000
trusted library allocation
page read and write
1EB638FD000
trusted library allocation
page read and write
28E8AA44000
heap
page read and write
1EB57AB4000
trusted library allocation
page read and write
1EB5A27A000
trusted library allocation
page read and write
1EB61D71000
trusted library allocation
page read and write
1EB5B621000
trusted library allocation
page read and write
1EB54742000
trusted library allocation
page read and write
1EB57AB4000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
11F9000
heap
page read and write
1EB648A5000
trusted library allocation
page read and write
1EB57A4C000
trusted library allocation
page read and write
1EB57AA1000
trusted library allocation
page read and write
1EB57781000
trusted library allocation
page read and write
1EB57E9B000
trusted library allocation
page read and write
1EB5B5F8000
trusted library allocation
page read and write
1EB5B694000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB4E845000
heap
page read and write
1EB5FC4F000
trusted library allocation
page read and write
1EB57EFA000
trusted library allocation
page read and write
1EB57E06000
trusted library allocation
page read and write
1EB4E847000
heap
page read and write
1EB60191000
trusted library allocation
page read and write
820207D000
stack
page read and write
1EB4E865000
heap
page read and write
1EB4E86D000
heap
page read and write
1EB4E865000
heap
page read and write
1EB57284000
heap
page read and write
F15C1FE000
unkown
page readonly
1EB57A37000
trusted library allocation
page read and write
28E8AA77000
heap
page read and write
1EB4E830000
heap
page read and write
1EB4E858000
heap
page read and write
1EB57CC2000
trusted library allocation
page read and write
1EB57E9B000
trusted library allocation
page read and write
28E89EE9000
trusted library allocation
page read and write
1EB592E4000
trusted library allocation
page read and write
1EB600B9000
trusted library allocation
page read and write
1EB5FB81000
trusted library allocation
page read and write
1EB597F1000
trusted library allocation
page read and write
1FA4E879000
trusted library allocation
page read and write
1EB57A49000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB63C7D000
trusted library allocation
page read and write
1EB59241000
trusted library allocation
page read and write
1EB56E9A000
trusted library allocation
page read and write
1EB6017D000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB58BF6000
trusted library allocation
page read and write
1EB64828000
trusted library allocation
page read and write
1EB59770000
trusted library allocation
page read and write
1EB57AC8000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1BE35C11000
trusted library allocation
page read and write
139F1A07000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB57E67000
trusted library allocation
page read and write
1EB56E72000
trusted library allocation
page read and write
1EB56FFB000
trusted library allocation
page read and write
1EB5FE9B000
trusted library allocation
page read and write
1EB57AC8000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
28E8AA6B000
heap
page read and write
1EB5ADA2000
trusted library allocation
page read and write
1EB59DF5000
trusted library allocation
page read and write
1EB59AB1000
trusted library allocation
page read and write
1EB58AA5000
trusted library allocation
page read and write
1FA4E5F6000
heap
page read and write
1EB4E848000
heap
page read and write
1EB57220000
heap
page read and write
1EB4E845000
heap
page read and write
1BE358DF000
unclassified section
page read and write
1EB4E8AB000
heap
page read and write
1EB57C96000
trusted library allocation
page read and write
139F1900000
trusted library allocation
page read and write
1BE35D34000
heap
page read and write
1EB54A0F000
trusted library allocation
page read and write
1EB62093000
trusted library allocation
page read and write
1EB58BE1000
trusted library allocation
page read and write
1EB58B7C000
trusted library allocation
page read and write
1EB5A26A000
trusted library allocation
page read and write
28E8A94D000
heap
page read and write
1EB57CE6000
trusted library allocation
page read and write
201F5FE000
stack
page read and write
1BE35D40000
heap
page read and write
1EB57E84000
trusted library allocation
page read and write
2B391541000
trusted library allocation
page execute read
1EB4E862000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB4E84F000
heap
page read and write
28E8A9F0000
heap
page read and write
1EB5AD7B000
trusted library allocation
page read and write
1EB58E42000
trusted library allocation
page read and write
1EB63C35000
trusted library allocation
page read and write
1EB5922F000
trusted library allocation
page read and write
1EB5B7D8000
trusted library allocation
page read and write
1EB57AAC000
trusted library allocation
page read and write
1EB577C1000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB5FE5B000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB58A6D000
trusted library allocation
page read and write
1EB59AD2000
trusted library allocation
page read and write
1EB4E86B000
heap
page read and write
1EB5B1D8000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB57AE0000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB57E7A000
trusted library allocation
page read and write
1EB5A089000
trusted library allocation
page read and write
1EB59CAB000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1EB58FD2000
trusted library allocation
page read and write
1EB592E4000
trusted library allocation
page read and write
1EB6208A000
trusted library allocation
page read and write
1EB64BAC000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1EB5B5C4000
trusted library allocation
page read and write
1EB57E41000
trusted library allocation
page read and write
1EB4E875000
heap
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB57E63000
trusted library allocation
page read and write
1EB60134000
trusted library allocation
page read and write
1EB6015B000
trusted library allocation
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB57AC2000
trusted library allocation
page read and write
1EB59CE7000
trusted library allocation
page read and write
1EB601E8000
trusted library allocation
page read and write
1EB58AFE000
trusted library allocation
page read and write
1EB57AAC000
trusted library allocation
page read and write
1EB57E52000
trusted library allocation
page read and write
1EB58A85000
trusted library allocation
page read and write
1EB54A9A000
trusted library allocation
page read and write
1EB4E846000
heap
page read and write
1EB57563000
trusted library allocation
page read and write
1EB5FF0E000
trusted library allocation
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB5929F000
trusted library allocation
page read and write
1EB54A13000
trusted library allocation
page read and write
1EB5FE7A000
trusted library allocation
page read and write
1EB5767E000
trusted library allocation
page read and write
1EB5A2EF000
trusted library allocation
page read and write
1EB57CA7000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB548DB000
trusted library allocation
page read and write
1EB5FFFB000
trusted library allocation
page read and write
1EB5778E000
trusted library allocation
page read and write
1EB4E878000
heap
page read and write
1EB4E863000
heap
page read and write
1EB58BE2000
trusted library allocation
page read and write
1EB4E86E000
heap
page read and write
1120000
heap
page read and write
1EB4E871000
heap
page read and write
1EB57E74000
trusted library allocation
page read and write
1EB5B536000
trusted library allocation
page read and write
1EB57AF7000
trusted library allocation
page read and write
1EB63C29000
trusted library allocation
page read and write
1EB4935E000
heap
page read and write
1EB4E84E000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB58CE0000
trusted library allocation
page read and write
1EB4E87D000
heap
page read and write
1EB548DD000
trusted library allocation
page read and write
1EB6017B000
trusted library allocation
page read and write
1EB64865000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB63C96000
trusted library allocation
page read and write
1EB4E86C000
heap
page read and write
1EB60062000
trusted library allocation
page read and write
1EB57290000
heap
page read and write
1EB576D7000
trusted library allocation
page read and write
1EB58BF5000
trusted library allocation
page read and write
1EB57265000
heap
page read and write
1EB648D2000
trusted library allocation
page read and write
1EB5B733000
trusted library allocation
page read and write
1EB601A1000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB59BC5000
trusted library allocation
page read and write
258AFFE000
stack
page read and write
1EB57786000
trusted library allocation
page read and write
1EB57AE5000
trusted library allocation
page read and write
1EB587C6000
trusted library allocation
page read and write
1EB59227000
trusted library allocation
page read and write
139F1B10000
heap
page read and write
1EB4E862000
heap
page read and write
1EB58BFA000
trusted library allocation
page read and write
25894EE000
unkown
page readonly
1EB587C9000
trusted library allocation
page read and write
1EB6000C000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB4E846000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB617E8000
trusted library allocation
page read and write
1EB63D9C000
heap
page read and write
1EB4E82E000
heap
page read and write
1EB5970F000
trusted library allocation
page read and write
1EB5971B000
trusted library allocation
page read and write
1EB5B5D4000
trusted library allocation
page read and write
1EB58BD5000
trusted library allocation
page read and write
1EB587BD000
trusted library allocation
page read and write
1EB5B33F000
trusted library allocation
page read and write
1EB58BF6000
trusted library allocation
page read and write
1EB5B729000
trusted library allocation
page read and write
1EB4E87D000
heap
page read and write
1EB58CFE000
trusted library allocation
page read and write
1EB59DF3000
trusted library allocation
page read and write
139F1830000
heap
page read and write
1EB57CC3000
trusted library allocation
page read and write
1EB4E86D000
heap
page read and write
1EB4E860000
heap
page read and write
1BE357B0000
remote allocation
page read and write
1EB4E86B000
heap
page read and write
1EB4E886000
heap
page read and write
1EB4E88A000
heap
page read and write
1EB57AC8000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB592C9000
trusted library allocation
page read and write
1EB49376000
heap
page read and write
1EB58F8B000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB6011E000
trusted library allocation
page read and write
1EB5FB79000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
1EB538F0000
trusted library allocation
page read and write
1EB58BE6000
trusted library allocation
page read and write
1EB5976D000
trusted library allocation
page read and write
28E8A95C000
heap
page read and write
1EB63CDD000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
FD4000
heap
page read and write
1EB4E86D000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB57291000
heap
page read and write
1EB5FEA0000
trusted library allocation
page read and write
1EB5B112000
trusted library allocation
page read and write
1EB4E86D000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB6013C000
trusted library allocation
page read and write
1EB57CB2000
trusted library allocation
page read and write
1EB4E878000
heap
page read and write
1EB4E880000
heap
page read and write
1EB56E78000
trusted library allocation
page read and write
1EB538A5000
trusted library allocation
page read and write
1EB4E875000
heap
page read and write
1EB5B5DD000
trusted library allocation
page read and write
1EB5B5A1000
trusted library allocation
page read and write
1EB5B733000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB4E865000
heap
page read and write
1EB57E37000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
28E89DD9000
unkown
page execute read
1EB5FBA1000
trusted library allocation
page read and write
1EB4E844000
heap
page read and write
1EB4E836000
heap
page read and write
1EB58A43000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB538DF000
trusted library allocation
page read and write
1EB58DCC000
trusted library allocation
page read and write
1EB63D51000
heap
page read and write
1EB58BA7000
trusted library allocation
page read and write
1EB60125000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5A256000
trusted library allocation
page read and write
1EB57E95000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1EB58BEE000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB5A19F000
trusted library allocation
page read and write
1EB5721D000
heap
page read and write
1EB58BEC000
trusted library allocation
page read and write
1EB60184000
trusted library allocation
page read and write
1EB5726F000
heap
page read and write
1EB57A37000
trusted library allocation
page read and write
1EB57ADB000
trusted library allocation
page read and write
1EB57E84000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
11A0000
heap
page read and write
1EB4E862000
heap
page read and write
1EB58E12000
trusted library allocation
page read and write
1EB57AF7000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB60173000
trusted library allocation
page read and write
FD0000
heap
page read and write
1EB57CF5000
trusted library allocation
page read and write
1EB587CD000
trusted library allocation
page read and write
1EB648AB000
trusted library allocation
page read and write
1EB5FE40000
trusted library allocation
page read and write
1EB60188000
trusted library allocation
page read and write
1EB64804000
trusted library allocation
page read and write
1EB54748000
trusted library allocation
page read and write
1EB5A2F4000
trusted library allocation
page read and write
1EB586DE000
trusted library allocation
page read and write
1EB5A2C8000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB59AC0000
trusted library allocation
page read and write
1EB58BEC000
trusted library allocation
page read and write
1EB59DE3000
trusted library allocation
page read and write
1EB6004E000
trusted library allocation
page read and write
1EB4E869000
heap
page read and write
1EB59A92000
trusted library allocation
page read and write
1EB5ADE2000
trusted library allocation
page read and write
1EB4E84E000
heap
page read and write
1EB5FE52000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB58DC8000
trusted library allocation
page read and write
1EB59A96000
trusted library allocation
page read and write
39A0000
heap
page read and write
EC0000
heap
page read and write
1EB57CC0000
trusted library allocation
page read and write
1EB58FCC000
trusted library allocation
page read and write
1EB59DE9000
trusted library allocation
page read and write
139F32C0000
heap
page read and write
1EB617E4000
trusted library allocation
page read and write
1EB57E52000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB575C4000
trusted library allocation
page read and write
1EB61DBD000
trusted library allocation
page read and write
1EB63C5F000
trusted library allocation
page read and write
1EB601CD000
trusted library allocation
page read and write
258C7FE000
unkown
page readonly
1EB586DE000
trusted library allocation
page read and write
1EB62157000
trusted library allocation
page read and write
1EB587BD000
trusted library allocation
page read and write
1EB538AA000
trusted library allocation
page read and write
1EB548A4000
trusted library allocation
page read and write
1EB57222000
heap
page read and write
28E8A290000
heap
page read and write
1EB5FEDC000
trusted library allocation
page read and write
1EB56E98000
trusted library allocation
page read and write
1EB5FFB7000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB587BF000
trusted library allocation
page read and write
1EB5A17E000
trusted library allocation
page read and write
1EB57A97000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB59CD5000
trusted library allocation
page read and write
1EB57E22000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB4E836000
heap
page read and write
1EB57E17000
trusted library allocation
page read and write
1EB4E84E000
heap
page read and write
1EB59C53000
trusted library allocation
page read and write
1EB5FEE5000
trusted library allocation
page read and write
1EB4E85B000
heap
page read and write
1EB538CC000
trusted library allocation
page read and write
1EB57ACF000
trusted library allocation
page read and write
1EB58FDF000
trusted library allocation
page read and write
1EB4E889000
heap
page read and write
1EB5FED3000
trusted library allocation
page read and write
1EB59758000
trusted library allocation
page read and write
1EB57E4D000
trusted library allocation
page read and write
1EB4E83E000
heap
page read and write
1EB5FE84000
trusted library allocation
page read and write
28E8A9E3000
heap
page read and write
1EB5B7E1000
trusted library allocation
page read and write
1EB58A85000
trusted library allocation
page read and write
1EB4E885000
heap
page read and write
1EB63BB0000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB5B4BA000
trusted library allocation
page read and write
28E8A97D000
heap
page read and write
1EB4E846000
heap
page read and write
1EB634DD000
trusted library allocation
page read and write
1EB4E8B0000
heap
page read and write
1EB4E876000
heap
page read and write
1BE35B00000
trusted library allocation
page read and write
1EB58BF5000
trusted library allocation
page read and write
1EB57E5B000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB4E86E000
heap
page read and write
1EB57CEA000
trusted library allocation
page read and write
1EB4E86B000
heap
page read and write
1EB4E8B0000
heap
page read and write
1EB5B5A1000
trusted library allocation
page read and write
1EB64719000
trusted library allocation
page read and write
1EB64806000
trusted library allocation
page read and write
28E8AA2A000
heap
page read and write
1EB4E886000
heap
page read and write
1EB58C46000
trusted library allocation
page read and write
1EB634E1000
trusted library allocation
page read and write
1EB5B5B8000
trusted library allocation
page read and write
1EB4E886000
heap
page read and write
1EB4E879000
heap
page read and write
1EB57E98000
trusted library allocation
page read and write
1EB57E63000
trusted library allocation
page read and write
1EB58BA4000
trusted library allocation
page read and write
1EB57543000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB57E7A000
trusted library allocation
page read and write
FA0000
heap
page read and write
1EB58A71000
trusted library allocation
page read and write
1EB57EC8000
trusted library allocation
page read and write
1EB620AC000
trusted library allocation
page read and write
1EB57AF0000
trusted library allocation
page read and write
1EB57EDE000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
1EB6483B000
trusted library allocation
page read and write
1EB57A4C000
trusted library allocation
page read and write
1EB58CE2000
trusted library allocation
page read and write
1EB5B527000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E874000
heap
page read and write
1EB58BE2000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB53190000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5FE76000
trusted library allocation
page read and write
1EB5B5C6000
trusted library allocation
page read and write
1EB5A1D4000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB617E0000
trusted library allocation
page read and write
1EB64B93000
trusted library allocation
page read and write
1EB57CFD000
trusted library allocation
page read and write
1EB5B4EF000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB58BF2000
trusted library allocation
page read and write
1EB5B77B000
trusted library allocation
page read and write
1EB4E86B000
heap
page read and write
25894AC000
stack
page read and write
1EB57CAD000
trusted library allocation
page read and write
1EB57AAC000
trusted library allocation
page read and write
1EB5921D000
trusted library allocation
page read and write
1EB58DF9000
trusted library allocation
page read and write
1EB6017B000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB54AA1000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB5FBFD000
trusted library allocation
page read and write
1BE35CC4000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB57C8B000
trusted library allocation
page read and write
1EB4E866000
heap
page read and write
1EB4E84F000
heap
page read and write
1EB58A07000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB5FFFB000
trusted library allocation
page read and write
1EB6456D000
trusted library allocation
page read and write
1EB538F0000
trusted library allocation
page read and write
1EB5A1DF000
trusted library allocation
page read and write
1EB637E5000
trusted library allocation
page read and write
1EB57C9A000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB5B0B8000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E873000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB4E86D000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB4E87D000
heap
page read and write
1EB58B9D000
trusted library allocation
page read and write
1EB5B4D5000
trusted library allocation
page read and write
1EB5B3D0000
trusted library allocation
page read and write
28E8A96C000
heap
page read and write
1EB4E860000
heap
page read and write
1EB587C6000
trusted library allocation
page read and write
1EB58E42000
trusted library allocation
page read and write
1EB60171000
trusted library allocation
page read and write
1EB5FFA5000
trusted library allocation
page read and write
1EB61FA3000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1EB59799000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5B5C4000
trusted library allocation
page read and write
1EB60146000
trusted library allocation
page read and write
1EB57283000
heap
page read and write
1EB5B1AD000
trusted library allocation
page read and write
1EB4E85B000
heap
page read and write
1EB57299000
heap
page read and write
1EB587D6000
trusted library allocation
page read and write
1EB63CDB000
trusted library allocation
page read and write
1FA4E410000
remote allocation
page execute read
1BE358CC000
heap
page read and write
1EB4E836000
heap
page read and write
1EB57E93000
trusted library allocation
page read and write
1EB57CE0000
trusted library allocation
page read and write
139F32C2000
heap
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB571FD000
heap
page read and write
1EB5B3ED000
trusted library allocation
page read and write
1EB57E04000
trusted library allocation
page read and write
1EB59AC0000
trusted library allocation
page read and write
1EB57CB5000
trusted library allocation
page read and write
1EB57E06000
trusted library allocation
page read and write
1EB57AE4000
trusted library allocation
page read and write
1EB57CA7000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB538FE000
trusted library allocation
page read and write
1EB548B2000
trusted library allocation
page read and write
1EB57A49000
trusted library allocation
page read and write
1EB58FBC000
trusted library allocation
page read and write
1EB57E98000
trusted library allocation
page read and write
1EB57AD3000
trusted library allocation
page read and write
1EB57E83000
trusted library allocation
page read and write
1EB548CF000
trusted library allocation
page read and write
1EB601D3000
trusted library allocation
page read and write
1EB531EF000
trusted library allocation
page read and write
1EB59C6F000
trusted library allocation
page read and write
1EB58A65000
trusted library allocation
page read and write
1EB5FEF8000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
1EB56F7F000
trusted library allocation
page read and write
1EB5FFAC000
trusted library allocation
page read and write
1EB577B4000
trusted library allocation
page read and write
1EB5FF15000
trusted library allocation
page read and write
28E8A98A000
heap
page read and write
1EB57CE0000
trusted library allocation
page read and write
1EB59799000
trusted library allocation
page read and write
1EB62106000
trusted library allocation
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB4E83E000
heap
page read and write
1EB5A222000
trusted library allocation
page read and write
1EB6017D000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB4E885000
heap
page read and write
1EB4E84F000
heap
page read and write
1BE35C03000
trusted library allocation
page read and write
2B3914E6000
trusted library allocation
page execute read
1EB57AD6000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB58DCC000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1BE35C00000
trusted library allocation
page read and write
1EB5778B000
trusted library allocation
page read and write
1EB4E82F000
heap
page read and write
1EB6016F000
trusted library allocation
page read and write
1EB576A1000
trusted library allocation
page read and write
1EB63C29000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
1EB60053000
trusted library allocation
page read and write
FD4000
heap
page read and write
1EB57E39000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB4E86D000
heap
page read and write
1EB58BC4000
trusted library allocation
page read and write
1EB576A1000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB53198000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
28E89E79000
trusted library allocation
page read and write
1EB5B1BC000
trusted library allocation
page read and write
1EB587AB000
trusted library allocation
page read and write
1EB58A9C000
trusted library allocation
page read and write
1EB59A4A000
trusted library allocation
page read and write
1EB54AC7000
trusted library allocation
page read and write
1EB638AB000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB63B7E000
trusted library allocation
page read and write
1EB5B5C1000
trusted library allocation
page read and write
1EB61757000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB6173D000
trusted library allocation
page read and write
1EB5B7C7000
trusted library allocation
page read and write
1F2000
unkown
page readonly
1EB4E84F000
heap
page read and write
1EB5923B000
trusted library allocation
page read and write
1EB56E7A000
trusted library allocation
page read and write
1EB600B9000
trusted library allocation
page read and write
1BE36000000
trusted library allocation
page read and write
1EB58E17000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB6473F000
trusted library allocation
page read and write
1EB57AAC000
trusted library allocation
page read and write
1EB5720F000
heap
page read and write
1EB57AF5000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB58DCF000
trusted library allocation
page read and write
1EB64748000
trusted library allocation
page read and write
1EB59A96000
trusted library allocation
page read and write
1EB62157000
trusted library allocation
page read and write
1EB57A60000
trusted library allocation
page read and write
28E899E0000
heap
page read and write
1EB4E82E000
heap
page read and write
1EB57C9A000
trusted library allocation
page read and write
FD4000
heap
page read and write
1EB60173000
trusted library allocation
page read and write
1EB5AD0C000
trusted library allocation
page read and write
1EB587CD000
trusted library allocation
page read and write
1EB54AAA000
trusted library allocation
page read and write
1EB5A2DD000
trusted library allocation
page read and write
1EB5B5EC000
trusted library allocation
page read and write
1EB57282000
heap
page read and write
1EB59DE3000
trusted library allocation
page read and write
1EB56EF6000
trusted library allocation
page read and write
1EB57AD6000
trusted library allocation
page read and write
1EB5922F000
trusted library allocation
page read and write
201FDFE000
stack
page read and write
1EB57285000
heap
page read and write
1EB56E0F000
trusted library allocation
page read and write
1EB4E83C000
heap
page read and write
1EB6005A000
trusted library allocation
page read and write
1EB57E5B000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
28E89D64000
heap
page read and write
1EB592C9000
trusted library allocation
page read and write
1EB57EC8000
trusted library allocation
page read and write
1EB592E8000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E892000
heap
page read and write
1EB57E74000
trusted library allocation
page read and write
F159EDE000
unkown
page readonly
1EB601A1000
trusted library allocation
page read and write
1EB5FEDF000
trusted library allocation
page read and write
1EB58BA9000
trusted library allocation
page read and write
1EB5FB72000
trusted library allocation
page read and write
1EB58BC8000
trusted library allocation
page read and write
1EB638FD000
trusted library allocation
page read and write
1EB5FE9B000
trusted library allocation
page read and write
1EB57E93000
trusted library allocation
page read and write
1EB5774A000
trusted library allocation
page read and write
1EB57E67000
trusted library allocation
page read and write
1EB575D2000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E865000
heap
page read and write
1EB4E892000
heap
page read and write
1EB575CA000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB576A1000
trusted library allocation
page read and write
1EB548DD000
trusted library allocation
page read and write
139F32DA000
heap
page read and write
1EB4E86E000
heap
page read and write
1EB58B80000
trusted library allocation
page read and write
1EB4E849000
heap
page read and write
1EB63DC1000
heap
page read and write
1EB58B80000
trusted library allocation
page read and write
1EB58AF6000
trusted library allocation
page read and write
1EB58BA9000
trusted library allocation
page read and write
1EB59238000
trusted library allocation
page read and write
1EB57A9D000
trusted library allocation
page read and write
1EB4E841000
heap
page read and write
1EB57CEC000
trusted library allocation
page read and write
1EB58A7C000
trusted library allocation
page read and write
1EB5FE60000
trusted library allocation
page read and write
1EB5A129000
trusted library allocation
page read and write
1EB63DC1000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB58B59000
trusted library allocation
page read and write
1EB5A1AF000
trusted library allocation
page read and write
1EB58AEA000
trusted library allocation
page read and write
120E000
heap
page read and write
1EB58EE5000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB6001F000
trusted library allocation
page read and write
1EB4E83E000
heap
page read and write
1EB5B742000
trusted library allocation
page read and write
1EB592C9000
trusted library allocation
page read and write
1EB54877000
trusted library allocation
page read and write
1EB59E00000
trusted library allocation
page read and write
1EB58FDF000
trusted library allocation
page read and write
1EB538DA000
trusted library allocation
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB648C4000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB5B4A9000
trusted library allocation
page read and write
1EB63B6E000
trusted library allocation
page read and write
1EB5FBD8000
trusted library allocation
page read and write
1EB5AD9A000
trusted library allocation
page read and write
1EB5923D000
trusted library allocation
page read and write
1EB4E83C000
heap
page read and write
1EB58B59000
trusted library allocation
page read and write
1EB5728A000
heap
page read and write
1EB4E865000
heap
page read and write
1EB63CDD000
trusted library allocation
page read and write
1EB5974B000
trusted library allocation
page read and write
1EB57ABC000
trusted library allocation
page read and write
1EB63C46000
trusted library allocation
page read and write
1EB4E84B000
heap
page read and write
1EB648E1000
trusted library allocation
page read and write
1EB64873000
trusted library allocation
page read and write
1EB4E835000
heap
page read and write
1EB58AA5000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB62133000
trusted library allocation
page read and write
1EB597AD000
trusted library allocation
page read and write
1EB57AE4000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1EB57CFD000
trusted library allocation
page read and write
1EB57271000
heap
page read and write
1EB5B1AF000
trusted library allocation
page read and write
1EB58A05000
trusted library allocation
page read and write
1EB58DC8000
trusted library allocation
page read and write
1EB64812000
trusted library allocation
page read and write
28E8AA6B000
heap
page read and write
1EB63B7C000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB56E4E000
trusted library allocation
page read and write
1EB58CC4000
trusted library allocation
page read and write
1EB54759000
trusted library allocation
page read and write
1EB5B1AD000
trusted library allocation
page read and write
1EB59785000
trusted library allocation
page read and write
1EB57E76000
trusted library allocation
page read and write
1EB576D7000
trusted library allocation
page read and write
28E89E0C000
trusted library allocation
page read and write
1EB5B595000
trusted library allocation
page read and write
1EB56FCB000
trusted library allocation
page read and write
1EB54AC7000
trusted library allocation
page read and write
1EB57CAD000
trusted library allocation
page read and write
1EB57E21000
trusted library allocation
page read and write
1EB638FB000
trusted library allocation
page read and write
1EB597EB000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
1EB57205000
heap
page read and write
1EB4E873000
heap
page read and write
1EB4E881000
heap
page read and write
1EB4E858000
heap
page read and write
1EB4E863000
heap
page read and write
1EB4E879000
heap
page read and write
1EB4E84A000
heap
page read and write
1EB57E6F000
trusted library allocation
page read and write
28E8AA77000
heap
page read and write
1EB61FF1000
trusted library allocation
page read and write
1EB648CA000
trusted library allocation
page read and write
1EB54AF9000
trusted library allocation
page read and write
1BE35D36000
heap
page read and write
1EB57AED000
trusted library allocation
page read and write
1EB61D20000
trusted library allocation
page read and write
28E89980000
unclassified section
page readonly
1EB4E83F000
heap
page read and write
1EB4E84F000
heap
page read and write
1EB59231000
trusted library allocation
page read and write
1EB4E849000
heap
page read and write
1EB57CEC000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB54B22000
trusted library allocation
page read and write
19CE000
stack
page read and write
1EB57E1E000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5A18B000
trusted library allocation
page read and write
1EB60195000
trusted library allocation
page read and write
1EB4E848000
heap
page read and write
1EB5AD48000
trusted library allocation
page read and write
1EB57E74000
trusted library allocation
page read and write
1EB5B4E7000
trusted library allocation
page read and write
1EB5FC00000
trusted library allocation
page read and write
1EB60143000
trusted library allocation
page read and write
1EB5B7A4000
trusted library allocation
page read and write
1EB58EE5000
trusted library allocation
page read and write
1EB5B0C9000
trusted library allocation
page read and write
1EB4E86F000
heap
page read and write
1EB56E63000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB6470D000
trusted library allocation
page read and write
1EB548DA000
trusted library allocation
page read and write
1EB58AFE000
trusted library allocation
page read and write
1EB63CFE000
trusted library allocation
page read and write
1EB57AF7000
trusted library allocation
page read and write
1FA4E86E000
trusted library allocation
page read and write
1EB4E843000
heap
page read and write
1EB64719000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB58BA1000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1EB592C1000
trusted library allocation
page read and write
1EB57CBE000
trusted library allocation
page read and write
1EB64847000
trusted library allocation
page read and write
1EB53826000
trusted library allocation
page read and write
1EB634E1000
trusted library allocation
page read and write
1EB5B61C000
trusted library allocation
page read and write
1EB58B59000
trusted library allocation
page read and write
1EB59BA5000
trusted library allocation
page read and write
1BE35C70000
trusted library allocation
page read and write
1EB4E848000
heap
page read and write
28E8AA6B000
heap
page read and write
1EB58CC2000
trusted library allocation
page read and write
1EB54A6E000
trusted library allocation
page read and write
1EB4E857000
heap
page read and write
1EB58FD3000
trusted library allocation
page read and write
1EB5FCFD000
trusted library allocation
page read and write
1EB57AC2000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
1EB5726F000
heap
page read and write
1EB5878C000
trusted library allocation
page read and write
1EB57E5B000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB4E845000
heap
page read and write
1EB4E880000
heap
page read and write
1EB63C70000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB58BA5000
trusted library allocation
page read and write
1EB57AF5000
trusted library allocation
page read and write
1EB597F7000
trusted library allocation
page read and write
1EB57E6F000
trusted library allocation
page read and write
1EB57685000
trusted library allocation
page read and write
1EB5876E000
trusted library allocation
page read and write
1EB617FB000
trusted library allocation
page read and write
1EB587FD000
trusted library allocation
page read and write
1EB5B5E5000
trusted library allocation
page read and write
E3B000
stack
page read and write
1EB62050000
trusted library allocation
page read and write
1EB63CF6000
trusted library allocation
page read and write
1EB5FBFD000
trusted library allocation
page read and write
1EB5B3B6000
trusted library allocation
page read and write
1EB53817000
trusted library allocation
page read and write
1EB5923E000
trusted library allocation
page read and write
1EB58BEC000
trusted library allocation
page read and write
1EB60195000
trusted library allocation
page read and write
1EB57ACF000
trusted library allocation
page read and write
1EB5929F000
trusted library allocation
page read and write
1EB5755F000
trusted library allocation
page read and write
1EB5B5C4000
trusted library allocation
page read and write
1EB4E86B000
heap
page read and write
1EB57E2D000
trusted library allocation
page read and write
1EB587D9000
trusted library allocation
page read and write
1FA4E91C000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB601A7000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB4E877000
heap
page read and write
1EB4E836000
heap
page read and write
1EB5AD8C000
trusted library allocation
page read and write
1EB601A7000
trusted library allocation
page read and write
1EB63BFD000
trusted library allocation
page read and write
1EB56E4E000
trusted library allocation
page read and write
1BE35CB2000
trusted library allocation
page read and write
1EB634D1000
trusted library allocation
page read and write
1EB59238000
trusted library allocation
page read and write
1EB58BC5000
trusted library allocation
page read and write
1EB57ED6000
trusted library allocation
page read and write
1EB58BA4000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB4E862000
heap
page read and write
1EB5A1CD000
trusted library allocation
page read and write
1EB57E4D000
trusted library allocation
page read and write
1EB64820000
trusted library allocation
page read and write
1EB617E0000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB5B4CA000
trusted library allocation
page read and write
1EB5A09B000
trusted library allocation
page read and write
1EB4E8AE000
heap
page read and write
1EB617E0000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB576D7000
trusted library allocation
page read and write
1EB63D51000
heap
page read and write
1EB592B5000
trusted library allocation
page read and write
1EB5B6E7000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB548A9000
trusted library allocation
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB6177A000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB4E85B000
heap
page read and write
1EB60195000
trusted library allocation
page read and write
1EB63C55000
trusted library allocation
page read and write
1EB5B117000
trusted library allocation
page read and write
1EB57A9D000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB587F8000
trusted library allocation
page read and write
1EB61DE4000
trusted library allocation
page read and write
1EB56EDA000
trusted library allocation
page read and write
1EB64B50000
trusted library allocation
page read and write
1EB4E885000
heap
page read and write
1EB4E892000
heap
page read and write
1EB57E83000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
131000
unkown
page execute read
1EB64B05000
trusted library allocation
page read and write
1EB61D78000
trusted library allocation
page read and write
1EB587C4000
trusted library allocation
page read and write
1FA4E900000
trusted library allocation
page read and write
1EB54A86000
trusted library allocation
page read and write
1EB5FE42000
trusted library allocation
page read and write
1EB617E4000
trusted library allocation
page read and write
1EB57C8D000
trusted library allocation
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB5B445000
trusted library allocation
page read and write
1EB5B1B1000
trusted library allocation
page read and write
1EB57C89000
trusted library allocation
page read and write
1EB61760000
trusted library allocation
page read and write
1EB4E87D000
heap
page read and write
1EB58BA4000
trusted library allocation
page read and write
1EB62E00000
trusted library allocation
page read and write
1EB64847000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB58BC5000
trusted library allocation
page read and write
28E8A9AA000
heap
page read and write
1EB57222000
heap
page read and write
1EB59DF5000
trusted library allocation
page read and write
1EB5B523000
trusted library allocation
page read and write
1EB54A6E000
trusted library allocation
page read and write
1EB5B5E2000
trusted library allocation
page read and write
1EB61D95000
trusted library allocation
page read and write
1EB638BF000
trusted library allocation
page read and write
1EB5FF17000
trusted library allocation
page read and write
1EB637E0000
trusted library allocation
page read and write
1EB57CE6000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5AD74000
trusted library allocation
page read and write
1EB64748000
trusted library allocation
page read and write
1EB57CFD000
trusted library allocation
page read and write
1EB57C6A000
trusted library allocation
page read and write
1EB597AD000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB5FBA4000
trusted library allocation
page read and write
1EB59A96000
trusted library allocation
page read and write
1EB57AA9000
trusted library allocation
page read and write
1EB592FD000
trusted library allocation
page read and write
1EB57205000
heap
page read and write
1EB5B5AF000
trusted library allocation
page read and write
1EB5B7CE000
trusted library allocation
page read and write
1EB56FFB000
trusted library allocation
page read and write
1EB5759C000
trusted library allocation
page read and write
1EB5B729000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB59788000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB6013A000
trusted library allocation
page read and write
1EB63E08000
heap
page read and write
1EB620AC000
trusted library allocation
page read and write
28E89E23000
trusted library allocation
page read and write
1EB60045000
trusted library allocation
page read and write
1EB5B16F000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB57E5E000
trusted library allocation
page read and write
1EB57EB6000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB597F7000
trusted library allocation
page read and write
1EB62048000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
120E000
heap
page read and write
1EB5489D000
trusted library allocation
page read and write
1EB63D51000
heap
page read and write
82020FE000
stack
page read and write
1EB57E22000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1BE35C77000
trusted library allocation
page read and write
1EB5B1B1000
trusted library allocation
page read and write
1EB5ACCE000
trusted library allocation
page read and write
1EB58AB5000
trusted library allocation
page read and write
1EB4E86B000
heap
page read and write
1EB5B75F000
trusted library allocation
page read and write
1EB6017B000
trusted library allocation
page read and write
1EB61FC8000
trusted library allocation
page read and write
1EB5FE8B000
trusted library allocation
page read and write
1EB5B165000
trusted library allocation
page read and write
1EB5B5A5000
trusted library allocation
page read and write
1EB5A0F5000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1FA4E85D000
trusted library allocation
page read and write
1EB58BF5000
trusted library allocation
page read and write
1EB57ACF000
trusted library allocation
page read and write
1EB5B5D9000
trusted library allocation
page read and write
827FDDE000
stack
page read and write
1EB57CB2000
trusted library allocation
page read and write
1EB4E882000
heap
page read and write
1EB5A091000
trusted library allocation
page read and write
1EB5AD0A000
trusted library allocation
page read and write
2589568000
stack
page read and write
1EB54728000
trusted library allocation
page read and write
1EB57CEC000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB4E880000
heap
page read and write
1EB57CEC000
trusted library allocation
page read and write
1EB57573000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB56E99000
trusted library allocation
page read and write
1EB5757E000
trusted library allocation
page read and write
28E89DE0000
heap
page read and write
1EB592FD000
trusted library allocation
page read and write
1EB5AD29000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB57274000
heap
page read and write
1EB58BD6000
trusted library allocation
page read and write
1EB56EF6000
trusted library allocation
page read and write
28E8AA6B000
heap
page read and write
1EB6212E000
trusted library allocation
page read and write
1EB4E85B000
heap
page read and write
1EB5B7BE000
trusted library allocation
page read and write
1EB57C90000
trusted library allocation
page read and write
1EB4E86D000
heap
page read and write
1EB4E845000
heap
page read and write
1EB4E836000
heap
page read and write
1EB5B4A7000
trusted library allocation
page read and write
1EB5B7FB000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB537FE000
trusted library allocation
page read and write
28E89E10000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1FA4E390000
unclassified section
page readonly
1EB5B75F000
trusted library allocation
page read and write
1EB634BF000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB57AB4000
trusted library allocation
page read and write
1EB57E74000
trusted library allocation
page read and write
1EB587FC000
trusted library allocation
page read and write
1EB592D1000
trusted library allocation
page read and write
1EB5B5BF000
trusted library allocation
page read and write
1EB57E9B000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB58BE2000
trusted library allocation
page read and write
1EB5B328000
trusted library allocation
page read and write
1EB58DC8000
trusted library allocation
page read and write
1EB58BC4000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E862000
heap
page read and write
1EB59775000
trusted library allocation
page read and write
1EB64898000
trusted library allocation
page read and write
1EB592AB000
trusted library allocation
page read and write
1EB53893000
trusted library allocation
page read and write
1EB634B4000
trusted library allocation
page read and write
1EB571FB000
heap
page read and write
1EB4E874000
heap
page read and write
1EB61DE3000
trusted library allocation
page read and write
1EB4E86C000
heap
page read and write
1EB4E83E000
heap
page read and write
1EB57EC8000
trusted library allocation
page read and write
1EB5B521000
trusted library allocation
page read and write
1FA4E914000
trusted library allocation
page read and write
1EB57E43000
trusted library allocation
page read and write
1EB5FC93000
trusted library allocation
page read and write
1EB59C98000
trusted library allocation
page read and write
139F1872000
heap
page read and write
1EB4E845000
heap
page read and write
1EB58DC5000
trusted library allocation
page read and write
1EB58AB0000
trusted library allocation
page read and write
1EB5B6E9000
trusted library allocation
page read and write
1EB4E842000
heap
page read and write
1EB5B796000
trusted library allocation
page read and write
1EB62106000
trusted library allocation
page read and write
1EB58BE9000
trusted library allocation
page read and write
1EB5387F000
trusted library allocation
page read and write
1EB6002C000
trusted library allocation
page read and write
28E8AA79000
heap
page read and write
1EB4E83C000
heap
page read and write
1EB57AA1000
trusted library allocation
page read and write
28E8AA77000
heap
page read and write
1EB53893000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB5B328000
trusted library allocation
page read and write
1EB5A180000
trusted library allocation
page read and write
1EB57E6F000
trusted library allocation
page read and write
1EB57205000
heap
page read and write
FD4000
heap
page read and write
1EB538DA000
trusted library allocation
page read and write
28E8A960000
heap
page read and write
1EB57AEE000
trusted library allocation
page read and write
1EB57A35000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB58BC8000
trusted library allocation
page read and write
1EB59227000
trusted library allocation
page read and write
1EB58CD6000
trusted library allocation
page read and write
1EB57ABC000
trusted library allocation
page read and write
1EB56E61000
trusted library allocation
page read and write
1EB5A013000
trusted library allocation
page read and write
1EB57528000
trusted library allocation
page read and write
1EB4E85B000
heap
page read and write
1EB57222000
heap
page read and write
1EB4E892000
heap
page read and write
1BE35C65000
trusted library allocation
page read and write
F15CA7E000
stack
page read and write
1EB64730000
trusted library allocation
page read and write
1EB58AFE000
trusted library allocation
page read and write
1EB5B740000
trusted library allocation
page read and write
1EB61D5C000
trusted library allocation
page read and write
139F1B15000
heap
page read and write
1EB4E86C000
heap
page read and write
1EB4E85B000
heap
page read and write
1EB5FED3000
trusted library allocation
page read and write
1EB4E8B2000
heap
page read and write
1EB61FCE000
trusted library allocation
page read and write
1EB597C3000
trusted library allocation
page read and write
1EB587DC000
trusted library allocation
page read and write
1EB4E87F000
heap
page read and write
1EB5978F000
trusted library allocation
page read and write
1EB6006B000
trusted library allocation
page read and write
1EB60137000
trusted library allocation
page read and write
1EB60084000
trusted library allocation
page read and write
1EB59DF7000
trusted library allocation
page read and write
1EB57589000
trusted library allocation
page read and write
1EB6013A000
trusted library allocation
page read and write
1EB5B3B9000
trusted library allocation
page read and write
1EB617C2000
trusted library allocation
page read and write
28E89ED1000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB58AA5000
trusted library allocation
page read and write
1EB60045000
trusted library allocation
page read and write
1EB57E30000
trusted library allocation
page read and write
1EB57ACF000
trusted library allocation
page read and write
1EB57A59000
trusted library allocation
page read and write
1EB538DA000
trusted library allocation
page read and write
28E89D60000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB4E872000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB4E865000
heap
page read and write
1EB4E85B000
heap
page read and write
1EB4E889000
heap
page read and write
1EB4E892000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB5728E000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB63CFE000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E88A000
heap
page read and write
1EB57683000
trusted library allocation
page read and write
1BE35C49000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB57AED000
trusted library allocation
page read and write
1EB5B4BA000
trusted library allocation
page read and write
1EB538AA000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB58A7C000
trusted library allocation
page read and write
1EB58BFB000
trusted library allocation
page read and write
1EB57E37000
trusted library allocation
page read and write
1EB6204D000
trusted library allocation
page read and write
131000
unkown
page execute read
1EB4E886000
heap
page read and write
39A1000
heap
page read and write
1EB597E1000
trusted library allocation
page read and write
1EB49376000
heap
page read and write
1EB4E865000
heap
page read and write
1EB4E865000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB4E83C000
heap
page read and write
1EB5B343000
trusted library allocation
page read and write
1EB4E87D000
heap
page read and write
1EB57E41000
trusted library allocation
page read and write
1EB57AB4000
trusted library allocation
page read and write
1EB57679000
trusted library allocation
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB538CC000
trusted library allocation
page read and write
1EB5FFED000
trusted library allocation
page read and write
1EB59BFC000
trusted library allocation
page read and write
1EB60069000
trusted library allocation
page read and write
1EB57AB4000
trusted library allocation
page read and write
1BE357C8000
remote allocation
page execute read
1EB57CE6000
trusted library allocation
page read and write
1EB57A87000
trusted library allocation
page read and write
1EB5B785000
trusted library allocation
page read and write
1EB63D51000
heap
page read and write
1EB57A4C000
trusted library allocation
page read and write
F15DA7E000
stack
page read and write
1EB601D9000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
28E89E03000
trusted library allocation
page read and write
1EB576A8000
trusted library allocation
page read and write
1EB57783000
trusted library allocation
page read and write
1EB5FCF9000
trusted library allocation
page read and write
1EB576A8000
trusted library allocation
page read and write
1EB5FBB9000
trusted library allocation
page read and write
1EB5B598000
trusted library allocation
page read and write
1EB63CEA000
trusted library allocation
page read and write
1EB5A25D000
trusted library allocation
page read and write
FD4000
heap
page read and write
1EB4E830000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB5FEDF000
trusted library allocation
page read and write
28E8A3A4000
unkown
page execute read
1EB4E860000
heap
page read and write
1EB58B94000
trusted library allocation
page read and write
1EB5B581000
trusted library allocation
page read and write
1EB5A2E3000
trusted library allocation
page read and write
1EB576A8000
trusted library allocation
page read and write
25895EE000
unkown
page readonly
28E89E00000
trusted library allocation
page read and write
1EB58A35000
trusted library allocation
page read and write
28E8A97F000
heap
page read and write
1EB4E83E000
heap
page read and write
1EB57E76000
trusted library allocation
page read and write
1EB5B527000
trusted library allocation
page read and write
1EB4E848000
heap
page read and write
1EB547B8000
trusted library allocation
page read and write
28E8A960000
heap
page read and write
1EB592D1000
trusted library allocation
page read and write
1EB4E835000
heap
page read and write
1EB5FE97000
trusted library allocation
page read and write
1EB63E33000
heap
page read and write
1EB4E848000
heap
page read and write
1FA4E5C2000
unclassified section
page read and write
1EB5FC99000
trusted library allocation
page read and write
1EB57E87000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB58BDE000
trusted library allocation
page read and write
1EB57AC2000
trusted library allocation
page read and write
1EB59265000
trusted library allocation
page read and write
1EB57E7A000
trusted library allocation
page read and write
82017FE000
stack
page read and write
1EB57272000
heap
page read and write
28E89E15000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB57AA1000
trusted library allocation
page read and write
1EB57CBC000
trusted library allocation
page read and write
1EB592F0000
trusted library allocation
page read and write
1EB57265000
heap
page read and write
1EB58BC5000
trusted library allocation
page read and write
1EB6017B000
trusted library allocation
page read and write
1EB57E57000
trusted library allocation
page read and write
1EB620A7000
trusted library allocation
page read and write
1EB592E4000
trusted library allocation
page read and write
1EB58BF1000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB597F7000
trusted library allocation
page read and write
1EB638B7000
trusted library allocation
page read and write
28E89E64000
trusted library allocation
page read and write
1EB6201C000
trusted library allocation
page read and write
1EB58B8A000
trusted library allocation
page read and write
1EB601EC000
trusted library allocation
page read and write
1EB57E35000
trusted library allocation
page read and write
1EB5B3CB000
trusted library allocation
page read and write
1EB59DF5000
trusted library allocation
page read and write
1EB587C4000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB5A1D4000
trusted library allocation
page read and write
1EB57AD6000
trusted library allocation
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB58BE9000
trusted library allocation
page read and write
1EB57E52000
trusted library allocation
page read and write
1EB57A3E000
trusted library allocation
page read and write
1BE358E0000
heap
page read and write
1EB4E836000
heap
page read and write
1EB4E862000
heap
page read and write
1EB577B8000
trusted library allocation
page read and write
1EB577B6000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB60095000
trusted library allocation
page read and write
1EB59C59000
trusted library allocation
page read and write
1EB597E9000
trusted library allocation
page read and write
1EB4E889000
heap
page read and write
1EB5FC16000
trusted library allocation
page read and write
1EB59767000
trusted library allocation
page read and write
1EB57E6F000
trusted library allocation
page read and write
1EB57249000
heap
page read and write
28E8AA58000
heap
page read and write
1EB63CDD000
trusted library allocation
page read and write
1EB57ECE000
trusted library allocation
page read and write
1EB5FC82000
trusted library allocation
page read and write
1EB64812000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB53866000
trusted library allocation
page read and write
1EB57E99000
trusted library allocation
page read and write
1EB63C8F000
trusted library allocation
page read and write
139F32CA000
heap
page read and write
11D0000
heap
page read and write
1EB4E86F000
heap
page read and write
1EB4E862000
heap
page read and write
820203E000
unkown
page readonly
1EB5FEAD000
trusted library allocation
page read and write
1EB58BE5000
trusted library allocation
page read and write
28E8AA00000
heap
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E845000
heap
page read and write
1EB5FFA5000
trusted library allocation
page read and write
1EB59B4D000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
1EB57C72000
trusted library allocation
page read and write
1EB57AC2000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB58BF2000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
28E89E12000
trusted library allocation
page read and write
1EB57AC2000
trusted library allocation
page read and write
1EB61DE8000
trusted library allocation
page read and write
1EB576A1000
trusted library allocation
page read and write
1EB54A9D000
trusted library allocation
page read and write
1EB63D51000
heap
page read and write
1EB5B536000
trusted library allocation
page read and write
1FA4E89E000
trusted library allocation
page read and write
1EB57ECC000
trusted library allocation
page read and write
16EDFFF000
stack
page read and write
1EB4E85F000
heap
page read and write
1EB57E35000
trusted library allocation
page read and write
1EB5389F000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB53181000
trusted library allocation
page read and write
1EB63CEA000
trusted library allocation
page read and write
1EB59CCE000
trusted library allocation
page read and write
1EB63CD4000
trusted library allocation
page read and write
1EB5A19B000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB5873F000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
28E89AD0000
heap
page read and write
1EB57228000
heap
page read and write
1EB4E86F000
heap
page read and write
1EB4E83C000
heap
page read and write
1EB4E862000
heap
page read and write
1EB4E860000
heap
page read and write
1EB4E8AC000
heap
page read and write
1EB4E865000
heap
page read and write
1EB5B1FD000
trusted library allocation
page read and write
1EB57E22000
trusted library allocation
page read and write
1EB59ACB000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1EB4E8B2000
heap
page read and write
105E000
stack
page read and write
1EB4E86D000
heap
page read and write
1EB5FEA4000
trusted library allocation
page read and write
139F1800000
heap
page read and write
1BE358D2000
unclassified section
page read and write
1EB62041000
trusted library allocation
page read and write
1EB5A1B3000
trusted library allocation
page read and write
1EB4E86E000
heap
page read and write
28E8AA21000
heap
page read and write
1EB57A44000
trusted library allocation
page read and write
1EB58BA0000
trusted library allocation
page read and write
1EB4E87D000
heap
page read and write
1EB620C5000
trusted library allocation
page read and write
1EB57E4D000
trusted library allocation
page read and write
FD4000
heap
page read and write
1EB5381B000
trusted library allocation
page read and write
1EB58BF5000
trusted library allocation
page read and write
1EB60092000
trusted library allocation
page read and write
1EB57691000
trusted library allocation
page read and write
1EB59B6D000
trusted library allocation
page read and write
1EB5AD24000
trusted library allocation
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB4E83A000
heap
page read and write
1EB600B9000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E83A000
heap
page read and write
28E8A2B3000
heap
page read and write
1EB5978F000
trusted library allocation
page read and write
1EB5B4C2000
trusted library allocation
page read and write
1EB60134000
trusted library allocation
page read and write
1EB538AE000
trusted library allocation
page read and write
1EB59238000
trusted library allocation
page read and write
1EB57E2D000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB57EC8000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB57563000
trusted library allocation
page read and write
1EB577B0000
trusted library allocation
page read and write
1EB5FED5000
trusted library allocation
page read and write
1EB634D1000
trusted library allocation
page read and write
1EB597EB000
trusted library allocation
page read and write
1EB4E84C000
heap
page read and write
1EB58BF5000
trusted library allocation
page read and write
1EB5B0FD000
trusted library allocation
page read and write
1EB5B595000
trusted library allocation
page read and write
1EB57CE6000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB4E865000
heap
page read and write
1EB5754B000
trusted library allocation
page read and write
1EB58F91000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5B4CA000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB57E5B000
trusted library allocation
page read and write
1EB5A2C2000
trusted library allocation
page read and write
1EB4E87F000
heap
page read and write
1EB5A0B1000
trusted library allocation
page read and write
1EB61FA2000
trusted library allocation
page read and write
1EB601EC000
trusted library allocation
page read and write
1EB57CBE000
trusted library allocation
page read and write
1EB58BE9000
trusted library allocation
page read and write
1EB58C51000
trusted library allocation
page read and write
1EB57E98000
trusted library allocation
page read and write
28E8A963000
heap
page read and write
1EB56F8D000
trusted library allocation
page read and write
120E000
heap
page read and write
1EB58B8A000
trusted library allocation
page read and write
1EB592E4000
trusted library allocation
page read and write
1EB4E868000
heap
page read and write
1EB58BAC000
trusted library allocation
page read and write
1EB5B733000
trusted library allocation
page read and write
1EB4E87F000
heap
page read and write
28E8AA77000
heap
page read and write
1EB57CB2000
trusted library allocation
page read and write
16EEFFF000
stack
page read and write
1EB5929B000
trusted library allocation
page read and write
1EB4E857000
heap
page read and write
1EB57E67000
trusted library allocation
page read and write
1EB5FE78000
trusted library allocation
page read and write
1EB59A92000
trusted library allocation
page read and write
1EB57ACF000
trusted library allocation
page read and write
1EB56F87000
trusted library allocation
page read and write
1EB5FE7A000
trusted library allocation
page read and write
1EB6017D000
trusted library allocation
page read and write
1EB5B47E000
trusted library allocation
page read and write
1EB5921C000
trusted library allocation
page read and write
1EB548B5000
trusted library allocation
page read and write
1EB4E87D000
heap
page read and write
1BE35F03000
trusted library allocation
page read and write
28E89DF1000
unkown
page execute read
1EB4E86E000
heap
page read and write
1EB58BA7000
trusted library allocation
page read and write
1EB54AF6000
trusted library allocation
page read and write
1EB5AC63000
trusted library allocation
page read and write
1EB5A2F4000
trusted library allocation
page read and write
1EB59B8C000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
28E89EC8000
trusted library allocation
page read and write
1EB63CEA000
trusted library allocation
page read and write
1EB6012B000
trusted library allocation
page read and write
258C83E000
stack
page read and write
1EB62005000
trusted library allocation
page read and write
1EB58AAD000
trusted library allocation
page read and write
1EB5B0B8000
trusted library allocation
page read and write
1EB5B7D4000
trusted library allocation
page read and write
1EB57E37000
trusted library allocation
page read and write
1EB5759C000
trusted library allocation
page read and write
1EB648D0000
trusted library allocation
page read and write
28E89EC3000
trusted library allocation
page read and write
28E8A9E0000
heap
page read and write
1EB57A73000
trusted library allocation
page read and write
1EB601CB000
trusted library allocation
page read and write
1EB4E886000
heap
page read and write
1EB59467000
trusted library allocation
page read and write
1EB58778000
trusted library allocation
page read and write
1EB60173000
trusted library allocation
page read and write
1BE35993000
heap
page read and write
1EB5475C000
trusted library allocation
page read and write
1140000
heap
page read and write
1EB59473000
trusted library allocation
page read and write
1FC000
unkown
page write copy
1EB54AF6000
trusted library allocation
page read and write
1EB57CBC000
trusted library allocation
page read and write
1EB62101000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
258E8FE000
unkown
page readonly
1EB57A87000
trusted library allocation
page read and write
1EB576D7000
trusted library allocation
page read and write
1EB56E98000
trusted library allocation
page read and write
1EB58A85000
trusted library allocation
page read and write
1EB5A18F000
trusted library allocation
page read and write
1EB58A9C000
trusted library allocation
page read and write
1EB58A69000
trusted library allocation
page read and write
1BE35890000
heap
page read and write
1EB57E6F000
trusted library allocation
page read and write
1EB58A7C000
trusted library allocation
page read and write
1EB4E866000
heap
page read and write
1EB57E0C000
trusted library allocation
page read and write
1EB5978F000
trusted library allocation
page read and write
1EB56F63000
trusted library allocation
page read and write
1EB5873E000
trusted library allocation
page read and write
1EB57E80000
trusted library allocation
page read and write
1EB57CC0000
trusted library allocation
page read and write
1EB5FF24000
trusted library allocation
page read and write
1EB5B5D4000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB57A9D000
trusted library allocation
page read and write
1EB57666000
trusted library allocation
page read and write
1EB58DA3000
trusted library allocation
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB5B752000
trusted library allocation
page read and write
1EB58C14000
trusted library allocation
page read and write
1EB57AB4000
trusted library allocation
page read and write
1EB63BFB000
trusted library allocation
page read and write
258B7FE000
unkown
page readonly
28E89E48000
trusted library allocation
page read and write
1EB56ECA000
trusted library allocation
page read and write
1EB54A8E000
trusted library allocation
page read and write
1EB54ADD000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB64820000
trusted library allocation
page read and write
1EB4E874000
heap
page read and write
1EB4E87C000
heap
page read and write
1EB5FC32000
trusted library allocation
page read and write
1EB531A7000
trusted library allocation
page read and write
1EB57E99000
trusted library allocation
page read and write
1EB5AD4F000
trusted library allocation
page read and write
1EB4E86D000
heap
page read and write
1EB57A08000
trusted library allocation
page read and write
1207000
heap
page read and write
1EB57C72000
trusted library allocation
page read and write
1EB57581000
trusted library allocation
page read and write
1EB5929F000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
1EB57E26000
trusted library allocation
page read and write
1EB6483B000
trusted library allocation
page read and write
1200000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB4E845000
heap
page read and write
1EB4E862000
heap
page read and write
1EB4E858000
heap
page read and write
1EB62101000
trusted library allocation
page read and write
1EB4E86E000
heap
page read and write
1EB6014A000
trusted library allocation
page read and write
1EB5925E000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB5FEAA000
trusted library allocation
page read and write
1EB57AED000
trusted library allocation
page read and write
1EB58ABB000
trusted library allocation
page read and write
1EB57622000
trusted library allocation
page read and write
139F1884000
heap
page read and write
1EB59AE1000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB4E845000
heap
page read and write
1EB58BE9000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB58AFE000
trusted library allocation
page read and write
1EB58A7F000
trusted library allocation
page read and write
1FA4E939000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB59231000
trusted library allocation
page read and write
1EB53875000
trusted library allocation
page read and write
1EB57C34000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E82E000
heap
page read and write
1EB58ABB000
trusted library allocation
page read and write
1EB4E848000
heap
page read and write
1EB4E83C000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB6015B000
trusted library allocation
page read and write
1EB62037000
trusted library allocation
page read and write
1EB6017B000
trusted library allocation
page read and write
1EB58BE5000
trusted library allocation
page read and write
1EB57CA0000
trusted library allocation
page read and write
1EB58E42000
trusted library allocation
page read and write
1EB4E878000
heap
page read and write
1EB5B5D4000
trusted library allocation
page read and write
1EB57284000
heap
page read and write
1EB6016D000
trusted library allocation
page read and write
1EB57284000
heap
page read and write
1EB59C5E000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB57A97000
trusted library allocation
page read and write
1EB5B6A1000
trusted library allocation
page read and write
1EB59238000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB58B90000
trusted library allocation
page read and write
1EB57AC8000
trusted library allocation
page read and write
28E8A80D000
trusted library allocation
page read and write
1EB638FB000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB5B4AB000
trusted library allocation
page read and write
1EB587F5000
trusted library allocation
page read and write
1EB5B52E000
trusted library allocation
page read and write
1EB5727A000
heap
page read and write
1EB57E06000
trusted library allocation
page read and write
1EB58BF5000
trusted library allocation
page read and write
1EB58BF5000
trusted library allocation
page read and write
1EB57E63000
trusted library allocation
page read and write
1EB57E5B000
trusted library allocation
page read and write
1EB5B1FD000
trusted library allocation
page read and write
1EB58CA0000
trusted library allocation
page read and write
1EB5A1A3000
trusted library allocation
page read and write
1EB58B63000
trusted library allocation
page read and write
1EB5ACF4000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB58DCF000
trusted library allocation
page read and write
E5E000
stack
page read and write
1200000
heap
page read and write
1EB59215000
trusted library allocation
page read and write
1EB4E83C000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB58A7F000
trusted library allocation
page read and write
1EB577B4000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1CC000
unkown
page readonly
1EB5B5FE000
trusted library allocation
page read and write
1EB6016B000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E858000
heap
page read and write
1EB58CC9000
trusted library allocation
page read and write
1FA4E800000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB57E76000
trusted library allocation
page read and write
1EB58A43000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1EB4E858000
heap
page read and write
1EB597AD000
trusted library allocation
page read and write
1EB58E17000
trusted library allocation
page read and write
1EB57E26000
trusted library allocation
page read and write
1EB58DFA000
trusted library allocation
page read and write
1EB5B529000
trusted library allocation
page read and write
1FA4E8A9000
trusted library allocation
page read and write
1EB59BFC000
trusted library allocation
page read and write
1EB58724000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1FA4E861000
trusted library allocation
page read and write
1EB5A2E8000
trusted library allocation
page read and write
1EB5B4AD000
trusted library allocation
page read and write
1EB5B499000
trusted library allocation
page read and write
1EB58BF6000
trusted library allocation
page read and write
1EB5FE7E000
trusted library allocation
page read and write
1EB6015B000
trusted library allocation
page read and write
1EB5921C000
trusted library allocation
page read and write
1EB637D6000
trusted library allocation
page read and write
1EB587AC000
trusted library allocation
page read and write
1EB548B5000
trusted library allocation
page read and write
1EB5B52E000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1BE35C68000
trusted library allocation
page read and write
1EB59A9E000
trusted library allocation
page read and write
1EB58A85000
trusted library allocation
page read and write
1EB6013E000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
1EB5B527000
trusted library allocation
page read and write
1EB4E878000
heap
page read and write
1EB4E862000
heap
page read and write
1EB57AD6000
trusted library allocation
page read and write
1EB57CB5000
trusted library allocation
page read and write
1EB4E86B000
heap
page read and write
1EB60152000
trusted library allocation
page read and write
1EB57E74000
trusted library allocation
page read and write
1EB58B2E000
trusted library allocation
page read and write
120E000
heap
page read and write
1EB61DC5000
trusted library allocation
page read and write
1EB62007000
trusted library allocation
page read and write
F159FDE000
unkown
page readonly
1EB620C5000
trusted library allocation
page read and write
1EB5B5E2000
trusted library allocation
page read and write
1FA4E3A0000
unclassified section
page readonly
1EB57E76000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB57ADE000
trusted library allocation
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB64850000
trusted library allocation
page read and write
1EB645CE000
trusted library allocation
page read and write
1EB5B4A9000
trusted library allocation
page read and write
1EB58BEE000
trusted library allocation
page read and write
1EB58E12000
trusted library allocation
page read and write
1BE358D0000
unclassified section
page read and write
1EB58B82000
trusted library allocation
page read and write
1EB4E83E000
heap
page read and write
1EB4E83F000
heap
page read and write
1EB60138000
trusted library allocation
page read and write
1EB60162000
trusted library allocation
page read and write
1EB4E86D000
heap
page read and write
1EB5B49C000
trusted library allocation
page read and write
1EB56E63000
trusted library allocation
page read and write
1EB5FBD3000
trusted library allocation
page read and write
1EB57A73000
trusted library allocation
page read and write
1EB56E73000
trusted library allocation
page read and write
1EB63B58000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB57AF7000
trusted library allocation
page read and write
1EB5A0BC000
trusted library allocation
page read and write
1EB4E82F000
heap
page read and write
1EB4E830000
heap
page read and write
120E000
heap
page read and write
1EB6212E000
trusted library allocation
page read and write
1EB63EA3000
heap
page read and write
1EB63D51000
heap
page read and write
1EB57A43000
trusted library allocation
page read and write
1EB57C7B000
trusted library allocation
page read and write
1EB577BC000
trusted library allocation
page read and write
1EB5878C000
trusted library allocation
page read and write
1EB58B2E000
trusted library allocation
page read and write
FD4000
heap
page read and write
1EB5777A000
trusted library allocation
page read and write
1EB5B1CF000
trusted library allocation
page read and write
1EB4E877000
heap
page read and write
1EB620A7000
trusted library allocation
page read and write
1EB5475E000
trusted library allocation
page read and write
1EB57AA1000
trusted library allocation
page read and write
139F1858000
heap
page read and write
1EB54759000
trusted library allocation
page read and write
1EB4E847000
heap
page read and write
1EB57CB2000
trusted library allocation
page read and write
1EB4E84E000
heap
page read and write
1EB5B5CB000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB58B6D000
trusted library allocation
page read and write
1EB57AA1000
trusted library allocation
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB59A92000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB57292000
heap
page read and write
1EB4E88A000
heap
page read and write
1EB5B7F5000
trusted library allocation
page read and write
1EB63CA4000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB4E83E000
heap
page read and write
1EB4E836000
heap
page read and write
1EB5B618000
trusted library allocation
page read and write
1EB4E877000
heap
page read and write
1EB601B5000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB58764000
trusted library allocation
page read and write
1EB53900000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1BE357F0000
heap
page read and write
1EB6013C000
trusted library allocation
page read and write
1EB638B7000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E860000
heap
page read and write
1EB54A84000
trusted library allocation
page read and write
1EB5B61C000
trusted library allocation
page read and write
1EB5B595000
trusted library allocation
page read and write
1EB587E5000
trusted library allocation
page read and write
1EB4E874000
heap
page read and write
1EB57271000
heap
page read and write
1EB4E892000
heap
page read and write
1EB5727D000
heap
page read and write
1EB58A85000
trusted library allocation
page read and write
1EB5B461000
trusted library allocation
page read and write
1EB54A9A000
trusted library allocation
page read and write
1EB5387D000
trusted library allocation
page read and write
1EB5FCDE000
trusted library allocation
page read and write
1EB57C7B000
trusted library allocation
page read and write
1EB592AE000
trusted library allocation
page read and write
139F32C8000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB57ABC000
trusted library allocation
page read and write
1EB5B164000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB5B51D000
trusted library allocation
page read and write
1EB4E878000
heap
page read and write
1EB4E860000
heap
page read and write
28E8A901000
heap
page read and write
1EB57264000
heap
page read and write
1EB57AF7000
trusted library allocation
page read and write
1EB5B7EB000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB6489D000
trusted library allocation
page read and write
1EB5FFAC000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB634EA000
trusted library allocation
page read and write
1EB5372F000
trusted library allocation
page read and write
1EB57A9D000
trusted library allocation
page read and write
1EB4E877000
heap
page read and write
139F32CB000
heap
page read and write
1EB5A240000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB645F1000
trusted library allocation
page read and write
1EB62048000
trusted library allocation
page read and write
1EB60176000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB620E4000
trusted library allocation
page read and write
1EB6004E000
trusted library allocation
page read and write
1EB4E86E000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB4E8AB000
heap
page read and write
28E8A805000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB5FFE8000
trusted library allocation
page read and write
1EB5AD42000
trusted library allocation
page read and write
1EB4E872000
heap
page read and write
1EB5A197000
trusted library allocation
page read and write
28E8A960000
heap
page read and write
1EB58BEC000
trusted library allocation
page read and write
1EB6016C000
trusted library allocation
page read and write
1EB4E846000
heap
page read and write
1EB63D51000
heap
page read and write
200000
unkown
page write copy
1EB4E858000
heap
page read and write
1EB61DED000
trusted library allocation
page read and write
1EB538E4000
trusted library allocation
page read and write
258BFFE000
stack
page read and write
1EB5B130000
trusted library allocation
page read and write
1EB648B4000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB5B5C2000
trusted library allocation
page read and write
1BE35C82000
trusted library allocation
page read and write
1EB4E885000
heap
page read and write
1EB57AE0000
trusted library allocation
page read and write
28E8A96C000
heap
page read and write
1EB4E82E000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB59DF3000
trusted library allocation
page read and write
258956B000
stack
page read and write
1EB58BA2000
trusted library allocation
page read and write
1EB4E847000
heap
page read and write
1EB617E4000
trusted library allocation
page read and write
1EB57E52000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB4E8B2000
heap
page read and write
1EB59751000
trusted library allocation
page read and write
1EB587B4000
trusted library allocation
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB57AD6000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB4E892000
heap
page read and write
1EB5B735000
trusted library allocation
page read and write
1EB5A187000
trusted library allocation
page read and write
1EB4E832000
heap
page read and write
1EB601D6000
trusted library allocation
page read and write
1EB577C1000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB5B1D8000
trusted library allocation
page read and write
28E8A98D000
heap
page read and write
1EB5B649000
trusted library allocation
page read and write
1EB57A43000
trusted library allocation
page read and write
1EB63CD4000
trusted library allocation
page read and write
1EB61D90000
trusted library allocation
page read and write
1EB58BFA000
trusted library allocation
page read and write
1EB5B7EB000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E892000
heap
page read and write
1EB54728000
trusted library allocation
page read and write
1EB6016F000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1144000
heap
page read and write
1EB60134000
trusted library allocation
page read and write
1EB58665000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB638BE000
trusted library allocation
page read and write
1EB4E846000
heap
page read and write
1EB4E85F000
heap
page read and write
820393E000
stack
page read and write
1EB4E83F000
heap
page read and write
1EB4E848000
heap
page read and write
1EB4E860000
heap
page read and write
1EB5AD0A000
trusted library allocation
page read and write
1EB4E8B2000
heap
page read and write
1EB4E8AC000
heap
page read and write
1EB6014A000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E836000
heap
page read and write
1EB58C46000
trusted library allocation
page read and write
1EB587F8000
trusted library allocation
page read and write
1EB5971D000
trusted library allocation
page read and write
1EB601D9000
trusted library allocation
page read and write
1EB57271000
heap
page read and write
28E8AA21000
heap
page read and write
1EB5B0E3000
trusted library allocation
page read and write
1EB57CEC000
trusted library allocation
page read and write
1EB5AC68000
trusted library allocation
page read and write
1FA4E5D0000
heap
page read and write
1EB6017D000
trusted library allocation
page read and write
28E89D66000
heap
page read and write
1EB58BE6000
trusted library allocation
page read and write
1EB57C74000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB601E0000
trusted library allocation
page read and write
1EB58A6B000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB58E39000
trusted library allocation
page read and write
1EB5B4AD000
trusted library allocation
page read and write
1FA4EA00000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB4E862000
heap
page read and write
1EB648AB000
trusted library allocation
page read and write
1EB57E9B000
trusted library allocation
page read and write
1EB58BF5000
trusted library allocation
page read and write
1EB5FEF4000
trusted library allocation
page read and write
1EB587CD000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB5FC3F000
trusted library allocation
page read and write
1EB58A02000
trusted library allocation
page read and write
1EB5B69E000
trusted library allocation
page read and write
1EB5768E000
trusted library allocation
page read and write
1EB5FEAA000
trusted library allocation
page read and write
1EB5AD0C000
trusted library allocation
page read and write
1EB53813000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB54A84000
trusted library allocation
page read and write
1EB4E85B000
heap
page read and write
1EB57793000
trusted library allocation
page read and write
1EB5489B000
trusted library allocation
page read and write
1EB587D6000
trusted library allocation
page read and write
28E89D32000
unclassified section
page read and write
1EB601D3000
trusted library allocation
page read and write
1EB6016B000
trusted library allocation
page read and write
1EB5979E000
trusted library allocation
page read and write
1EB5B5D4000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB57A9D000
trusted library allocation
page read and write
1EB58A9F000
trusted library allocation
page read and write
1EB617F6000
trusted library allocation
page read and write
1EB63B72000
trusted library allocation
page read and write
1EB64832000
trusted library allocation
page read and write
1EB5B33F000
trusted library allocation
page read and write
1EB57CC0000
trusted library allocation
page read and write
1EB5B1C8000
trusted library allocation
page read and write
1EB601D9000
trusted library allocation
page read and write
1EB5FBA3000
trusted library allocation
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB56F34000
trusted library allocation
page read and write
1EB576A8000
trusted library allocation
page read and write
1EB59A4A000
trusted library allocation
page read and write
1EB63C3C000
trusted library allocation
page read and write
1EB5B7DE000
trusted library allocation
page read and write
1EB5A180000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E87F000
heap
page read and write
1EB57CE6000
trusted library allocation
page read and write
1EB57CE0000
trusted library allocation
page read and write
1EB58AA3000
trusted library allocation
page read and write
1EB5489F000
trusted library allocation
page read and write
28E89EC0000
trusted library allocation
page read and write
28E8A96C000
heap
page read and write
1EB58F8E000
trusted library allocation
page read and write
1EB5B0C9000
trusted library allocation
page read and write
2020DFE000
stack
page read and write
1EB58B2E000
trusted library allocation
page read and write
1EB58AFE000
trusted library allocation
page read and write
28E89973000
remote allocation
page execute read
1EB57261000
heap
page read and write
1EB5B0E1000
trusted library allocation
page read and write
1BE35750000
unclassified section
page readonly
1EB58A9C000
trusted library allocation
page read and write
1EB5AD15000
trusted library allocation
page read and write
1EB592D1000
trusted library allocation
page read and write
1EB4E84E000
heap
page read and write
1EB57E7F000
trusted library allocation
page read and write
28E8A9FD000
heap
page read and write
1FA4E540000
heap
page read and write
1EB637E5000
trusted library allocation
page read and write
1EB6003E000
trusted library allocation
page read and write
1EB57772000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB5B4AB000
trusted library allocation
page read and write
1EB6200C000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB4E84F000
heap
page read and write
1EB4E874000
heap
page read and write
1EB4E865000
heap
page read and write
1EB57A49000
trusted library allocation
page read and write
1EB63D51000
heap
page read and write
1EB57A33000
trusted library allocation
page read and write
1EB57AE9000
trusted library allocation
page read and write
1EB57E0C000
trusted library allocation
page read and write
1EB634DD000
trusted library allocation
page read and write
1EB538BF000
trusted library allocation
page read and write
1FA4E881000
trusted library allocation
page read and write
1D036A60000
heap
page read and write
1EB5929B000
trusted library allocation
page read and write
1EB60184000
trusted library allocation
page read and write
1EB58ABD000
trusted library allocation
page read and write
FD4000
heap
page read and write
28E8A99C000
heap
page read and write
1EB57E74000
trusted library allocation
page read and write
11FE000
heap
page read and write
1EB5A1A3000
trusted library allocation
page read and write
1EB57CBC000
trusted library allocation
page read and write
1EB638D4000
trusted library allocation
page read and write
1FA4E433000
heap
page read and write
1EB5ADAA000
trusted library allocation
page read and write
120E000
heap
page read and write
1EB601D3000
trusted library allocation
page read and write
1EB597F1000
trusted library allocation
page read and write
1EB57A73000
trusted library allocation
page read and write
1EB59227000
trusted library allocation
page read and write
1EB64B67000
trusted library allocation
page read and write
1EB576D7000
trusted library allocation
page read and write
1EB4E848000
heap
page read and write
1EB537FB000
trusted library allocation
page read and write
1EB53771000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
28E8AA58000
heap
page read and write
1EB4E83E000
heap
page read and write
1EB54793000
trusted library allocation
page read and write
1EB61D8E000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB4E876000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB4E862000
heap
page read and write
1EB5B5CB000
trusted library allocation
page read and write
1EB54ABC000
trusted library allocation
page read and write
1EB5B599000
trusted library allocation
page read and write
28E8A9E9000
heap
page read and write
1EB57AF0000
trusted library allocation
page read and write
1EB63B82000
trusted library allocation
page read and write
1FA4E430000
heap
page read and write
28E8A9F2000
heap
page read and write
1EB6454E000
trusted library allocation
page read and write
1EB63B48000
trusted library allocation
page read and write
1EB57C8B000
trusted library allocation
page read and write
1EB5B7E1000
trusted library allocation
page read and write
1EB5B5D4000
trusted library allocation
page read and write
1EB538BF000
trusted library allocation
page read and write
28E89D3F000
unclassified section
page read and write
1EB600C3000
trusted library allocation
page read and write
1EB57E76000
trusted library allocation
page read and write
1EB5B5B3000
trusted library allocation
page read and write
1EB5C902000
trusted library allocation
page read and write
1EB58B7D000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB4E87E000
heap
page read and write
1EB5B7D9000
trusted library allocation
page read and write
28E89B00000
trusted library allocation
page read and write
1EB63C55000
trusted library allocation
page read and write
1EB601D9000
trusted library allocation
page read and write
1EB5973E000
trusted library allocation
page read and write
1EB6013E000
trusted library allocation
page read and write
1EB4E885000
heap
page read and write
1EB58A98000
trusted library allocation
page read and write
28E8AA3B000
heap
page read and write
1EB4E85B000
heap
page read and write
1EB4E854000
heap
page read and write
1EB5FFB1000
trusted library allocation
page read and write
1EB5B7EB000
trusted library allocation
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB4E849000
heap
page read and write
1EB57222000
heap
page read and write
1EB4E862000
heap
page read and write
1EB60188000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB57AA9000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5B53D000
trusted library allocation
page read and write
1EB5B5B1000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
1EB4E886000
heap
page read and write
1EB59DE7000
trusted library allocation
page read and write
1EB5A2E3000
trusted library allocation
page read and write
1EB58E17000
trusted library allocation
page read and write
1EB4E872000
heap
page read and write
1EB4E862000
heap
page read and write
1EB4E85B000
heap
page read and write
1EB617E8000
trusted library allocation
page read and write
1EB57E6A000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB4E88A000
heap
page read and write
1EB62086000
trusted library allocation
page read and write
1EB62067000
trusted library allocation
page read and write
1EB5875D000
trusted library allocation
page read and write
1EB58E42000
trusted library allocation
page read and write
28E89E7E000
trusted library allocation
page read and write
1EB547DA000
trusted library allocation
page read and write
1EB63E33000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB57AF0000
trusted library allocation
page read and write
1EB60173000
trusted library allocation
page read and write
1EB6459E000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB5FCB5000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB587EE000
trusted library allocation
page read and write
1EB5B1E3000
trusted library allocation
page read and write
1EB4E84E000
heap
page read and write
1EB4E840000
heap
page read and write
1EB5B4A7000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
1EB6016B000
trusted library allocation
page read and write
1EB5B73D000
trusted library allocation
page read and write
2B391570000
trusted library allocation
page execute read
1EB5B589000
trusted library allocation
page read and write
1BE35C1C000
trusted library allocation
page read and write
1EB58CD0000
trusted library allocation
page read and write
1EB5B598000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E83C000
heap
page read and write
1EB64730000
trusted library allocation
page read and write
1EB59DC2000
trusted library allocation
page read and write
1EB53882000
trusted library allocation
page read and write
1EB592C2000
trusted library allocation
page read and write
1EB5B536000
trusted library allocation
page read and write
1EB4E86D000
heap
page read and write
1EB58B68000
trusted library allocation
page read and write
1EB57AA1000
trusted library allocation
page read and write
1EB620AC000
trusted library allocation
page read and write
1FA4E8B9000
trusted library allocation
page read and write
1EB54875000
trusted library allocation
page read and write
1EB637DD000
trusted library allocation
page read and write
1EB620A3000
trusted library allocation
page read and write
1EB57E63000
trusted library allocation
page read and write
F159F1C000
stack
page read and write
1EB4E865000
heap
page read and write
E1E000
stack
page read and write
1EB4E874000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB57A43000
trusted library allocation
page read and write
1EB5FC48000
trusted library allocation
page read and write
1EB5B7E7000
trusted library allocation
page read and write
1EB58E48000
trusted library allocation
page read and write
1EB57A87000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1EB5B3F7000
trusted library allocation
page read and write
1EB5B5C2000
trusted library allocation
page read and write
1EB60069000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E865000
heap
page read and write
1EB5FCD0000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1EB57E6F000
trusted library allocation
page read and write
1EB59C61000
trusted library allocation
page read and write
1EB5381E000
trusted library allocation
page read and write
1EB57781000
trusted library allocation
page read and write
1EB587C1000
trusted library allocation
page read and write
1EB58B59000
trusted library allocation
page read and write
1EB5AD78000
trusted library allocation
page read and write
1EB60188000
trusted library allocation
page read and write
1EB57AA1000
trusted library allocation
page read and write
1EB58BEE000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB57A9D000
trusted library allocation
page read and write
1EB5B0C9000
trusted library allocation
page read and write
1EB57E76000
trusted library allocation
page read and write
1EB587EE000
trusted library allocation
page read and write
1FA4E897000
trusted library allocation
page read and write
1EB57CC0000
trusted library allocation
page read and write
1EB5FEA0000
trusted library allocation
page read and write
1EB59DE5000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB57E87000
trusted library allocation
page read and write
1EB57A9D000
trusted library allocation
page read and write
1EB5ADF2000
trusted library allocation
page read and write
1EB60171000
trusted library allocation
page read and write
28E8A9E8000
heap
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB634C7000
trusted library allocation
page read and write
1EB58A65000
trusted library allocation
page read and write
1EB5FBB9000
trusted library allocation
page read and write
1EB57A35000
trusted library allocation
page read and write
1EB5B149000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E845000
heap
page read and write
1EB57E4D000
trusted library allocation
page read and write
1EB57ABC000
trusted library allocation
page read and write
1EB5B7E1000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1EB6017F000
trusted library allocation
page read and write
1EB59C8C000
trusted library allocation
page read and write
235933B24000
trusted library allocation
page read and write
1EB5A19F000
trusted library allocation
page read and write
28E8A9E0000
heap
page read and write
1BE35C0C000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5FE99000
trusted library allocation
page read and write
1EB59751000
trusted library allocation
page read and write
1EB4E847000
heap
page read and write
1EB5B7EB000
trusted library allocation
page read and write
1EB58AA3000
trusted library allocation
page read and write
1EB60036000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1FA4E5C0000
unclassified section
page read and write
1BE35F00000
trusted library allocation
page read and write
1EB54AF6000
trusted library allocation
page read and write
1EB57ABC000
trusted library allocation
page read and write
204000
unkown
page readonly
1EB5B15E000
trusted library allocation
page read and write
1EB63CE7000
trusted library allocation
page read and write
1EB5FE8B000
trusted library allocation
page read and write
1EB6016F000
trusted library allocation
page read and write
1EB63F12000
heap
page read and write
1EB597F1000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB59DE0000
trusted library allocation
page read and write
1EB5921C000
trusted library allocation
page read and write
1EB5720F000
heap
page read and write
1EB4E860000
heap
page read and write
1EB62A80000
trusted library allocation
page read and write
1EB63D85000
heap
page read and write
1EB5FEF4000
trusted library allocation
page read and write
11FF000
heap
page read and write
1EB601D3000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB57E74000
trusted library allocation
page read and write
1EB5A2F1000
trusted library allocation
page read and write
1EB57A9D000
trusted library allocation
page read and write
1EB57AF5000
trusted library allocation
page read and write
1EB586F1000
trusted library allocation
page read and write
1EB5B3BC000
trusted library allocation
page read and write
1EB61FE5000
trusted library allocation
page read and write
1EB64814000
trusted library allocation
page read and write
139F32C7000
heap
page read and write
28E8A960000
heap
page read and write
1EB61D37000
trusted library allocation
page read and write
1EB5ACDB000
trusted library allocation
page read and write
1EB5B7C7000
trusted library allocation
page read and write
1EB57CE0000
trusted library allocation
page read and write
1EB5FEDC000
trusted library allocation
page read and write
16EDFFC000
stack
page read and write
1EB58A3B000
trusted library allocation
page read and write
1EB59BCD000
trusted library allocation
page read and write
1EB5B5A5000
trusted library allocation
page read and write
1EB5B3E8000
trusted library allocation
page read and write
1EB57AD3000
trusted library allocation
page read and write
28E8A97D000
heap
page read and write
1DCF000
stack
page read and write
1EB61F9E000
trusted library allocation
page read and write
1EB547EF000
trusted library allocation
page read and write
1EB57AAC000
trusted library allocation
page read and write
F15A9D8000
stack
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB587C9000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E845000
heap
page read and write
1EB5B542000
trusted library allocation
page read and write
1EB4E833000
heap
page read and write
1EB4E877000
heap
page read and write
1EB57EE6000
trusted library allocation
page read and write
1EB58AA3000
trusted library allocation
page read and write
1EB58FAC000
trusted library allocation
page read and write
FD4000
heap
page read and write
1EB54A8E000
trusted library allocation
page read and write
1EB6018D000
trusted library allocation
page read and write
1EB57AE9000
trusted library allocation
page read and write
1EB59DF0000
trusted library allocation
page read and write
1EB6012B000
trusted library allocation
page read and write
1EB58E80000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB64538000
trusted library allocation
page read and write
1EB57AD6000
trusted library allocation
page read and write
1FA4E810000
trusted library allocation
page read and write
1EB5AEDC000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB5FC46000
trusted library allocation
page read and write
1EB648A5000
trusted library allocation
page read and write
28E8AA6B000
heap
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB4E862000
heap
page read and write
1EB57778000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB5879D000
trusted library allocation
page read and write
1EB57AC8000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1EB4E836000
heap
page read and write
1EB60113000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
1EB59CA3000
trusted library allocation
page read and write
1EB57E7F000
trusted library allocation
page read and write
1EB5B152000
trusted library allocation
page read and write
1EB57EB6000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1EB5FC80000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
82007D8000
stack
page read and write
11F7000
heap
page read and write
1EB59CA9000
trusted library allocation
page read and write
1EB61DED000
trusted library allocation
page read and write
1EB5A1DF000
trusted library allocation
page read and write
1EB600C3000
trusted library allocation
page read and write
1EB64832000
trusted library allocation
page read and write
1EB6485E000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB57CE6000
trusted library allocation
page read and write
1EB5B5B8000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB5FE37000
trusted library allocation
page read and write
1EB57C3E000
trusted library allocation
page read and write
1EB5A2DD000
trusted library allocation
page read and write
1EB6484A000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB60092000
trusted library allocation
page read and write
1EB577CB000
trusted library allocation
page read and write
1EB5B5E2000
trusted library allocation
page read and write
28E8AA6B000
heap
page read and write
1EB5877B000
trusted library allocation
page read and write
1EB5922C000
trusted library allocation
page read and write
201EDFF000
stack
page read and write
28E8AA58000
heap
page read and write
1EB587C9000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB4E878000
heap
page read and write
1EB57ADC000
trusted library allocation
page read and write
1EB5B305000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB57ABC000
trusted library allocation
page read and write
1EB4E86E000
heap
page read and write
1EB5A23B000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E830000
heap
page read and write
1EB63CDB000
trusted library allocation
page read and write
1EB5B6E5000
trusted library allocation
page read and write
82020BE000
unkown
page readonly
1EB57400000
trusted library allocation
page read and write
1EB5B1BC000
trusted library allocation
page read and write
28E8A9E8000
heap
page read and write
262585804000
trusted library allocation
page read and write
28E89D30000
unclassified section
page read and write
1EB5B7CC000
trusted library allocation
page read and write
1EB63D86000
heap
page read and write
1EB5756A000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
28E8A960000
heap
page read and write
1EB4E892000
heap
page read and write
1EB617FB000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB5B62F000
trusted library allocation
page read and write
1EB57AD3000
trusted library allocation
page read and write
1EB548DD000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB5B7D9000
trusted library allocation
page read and write
139F1720000
heap
page read and write
1EB5B477000
trusted library allocation
page read and write
1EB5B52E000
trusted library allocation
page read and write
1EB58A8B000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
20215FE000
stack
page read and write
1EB4E845000
heap
page read and write
820313E000
unkown
page readonly
1EB58E36000
trusted library allocation
page read and write
1EB5A0DE000
trusted library allocation
page read and write
1EB576D7000
trusted library allocation
page read and write
1EB5B1E3000
trusted library allocation
page read and write
1EB538A5000
trusted library allocation
page read and write
1EB57CE0000
trusted library allocation
page read and write
1EB5923D000
trusted library allocation
page read and write
1FA4E640000
unclassified section
page readonly
1EB600AE000
trusted library allocation
page read and write
1EB57E39000
trusted library allocation
page read and write
1BE35C63000
trusted library allocation
page read and write
1EB60140000
trusted library allocation
page read and write
1EB5977F000
trusted library allocation
page read and write
1EB57E33000
trusted library allocation
page read and write
1EB58657000
trusted library allocation
page read and write
1EB57CC0000
trusted library allocation
page read and write
1EB638AB000
trusted library allocation
page read and write
1FA4E420000
unclassified section
page readonly
1EB4E84F000
heap
page read and write
1EB5B431000
trusted library allocation
page read and write
1EB5FE56000
trusted library allocation
page read and write
1EB4E838000
heap
page read and write
1EB4E848000
heap
page read and write
1FA4E823000
trusted library allocation
page read and write
1EB63DDC000
heap
page read and write
1EB5B7E5000
trusted library allocation
page read and write
1EB5922C000
trusted library allocation
page read and write
1EB5FE9B000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1FA4E560000
heap
page read and write
1EB6016B000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB58E39000
trusted library allocation
page read and write
1EB58AFE000
trusted library allocation
page read and write
1EB57E3C000
trusted library allocation
page read and write
1EB5B618000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
28E8AA3B000
heap
page read and write
1EB58C5E000
trusted library allocation
page read and write
1EB57299000
heap
page read and write
1EB634EA000
trusted library allocation
page read and write
1BE35880000
heap
page readonly
1EB59AB1000
trusted library allocation
page read and write
1EB54AC1000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB58DB3000
trusted library allocation
page read and write
1EB577BC000
trusted library allocation
page read and write
1EB57A2F000
trusted library allocation
page read and write
1EB58A74000
trusted library allocation
page read and write
1EB57AA1000
trusted library allocation
page read and write
1EB58AFE000
trusted library allocation
page read and write
1EB59ACB000
trusted library allocation
page read and write
1EB638B5000
trusted library allocation
page read and write
1EB601EC000
trusted library allocation
page read and write
1EB58FB3000
trusted library allocation
page read and write
1EB57AE9000
trusted library allocation
page read and write
1EB58BAC000
trusted library allocation
page read and write
1EB58E36000
trusted library allocation
page read and write
1EB58C9E000
trusted library allocation
page read and write
1EB5A18F000
trusted library allocation
page read and write
1EB57CBE000
trusted library allocation
page read and write
1EB63B4E000
trusted library allocation
page read and write
1EB5B7E1000
trusted library allocation
page read and write
1EB577B0000
trusted library allocation
page read and write
1EB57AF5000
trusted library allocation
page read and write
1EB58DCF000
trusted library allocation
page read and write
1EB63BF9000
trusted library allocation
page read and write
1EB59ACB000
trusted library allocation
page read and write
1EB57E63000
trusted library allocation
page read and write
1EB57CBE000
trusted library allocation
page read and write
1EB58A38000
trusted library allocation
page read and write
1FA4E82E000
trusted library allocation
page read and write
1EB6483B000
trusted library allocation
page read and write
1EB592E4000
trusted library allocation
page read and write
1EB4E85D000
heap
page read and write
1EB64840000
trusted library allocation
page read and write
1EB4E83C000
heap
page read and write
1EB577FD000
trusted library allocation
page read and write
1EB58A85000
trusted library allocation
page read and write
1EB5977F000
trusted library allocation
page read and write
1EB531F9000
trusted library allocation
page read and write
1EB58BC9000
trusted library allocation
page read and write
1EB5A1C7000
trusted library allocation
page read and write
1EB637DD000
trusted library allocation
page read and write
1EB5FC46000
trusted library allocation
page read and write
1EB58BFA000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E88A000
heap
page read and write
1EB601E8000
trusted library allocation
page read and write
1EB57AD6000
trusted library allocation
page read and write
1EB5FEDF000
trusted library allocation
page read and write
139F3440000
heap
page read and write
1FA4E8C8000
trusted library allocation
page read and write
2589FD8000
stack
page read and write
1EB57EB6000
trusted library allocation
page read and write
1EB4E866000
heap
page read and write
1EB57A58000
trusted library allocation
page read and write
28E8A420000
heap
page read and write
1EB4E84F000
heap
page read and write
1EB597B7000
trusted library allocation
page read and write
1EB5B4CF000
trusted library allocation
page read and write
1EB4E8C3000
heap
page read and write
1CC000
unkown
page readonly
1EB63C46000
trusted library allocation
page read and write
1EB57AC2000
trusted library allocation
page read and write
1EB4E877000
heap
page read and write
1EB6016F000
trusted library allocation
page read and write
258C8BE000
stack
page read and write
1EB57ACF000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB57663000
trusted library allocation
page read and write
1EB4E889000
heap
page read and write
1EB57CBE000
trusted library allocation
page read and write
1EB5B1BC000
trusted library allocation
page read and write
1EB57222000
heap
page read and write
1EB5B0FD000
trusted library allocation
page read and write
1EB58BEE000
trusted library allocation
page read and write
1EB58DCC000
trusted library allocation
page read and write
1EB58CFB000
trusted library allocation
page read and write
1BE35CF6000
trusted library allocation
page read and write
1EB5FB7D000
trusted library allocation
page read and write
1EB5720F000
heap
page read and write
1EB648AB000
trusted library allocation
page read and write
1EB59788000
trusted library allocation
page read and write
1EB57E76000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB5FBD8000
trusted library allocation
page read and write
1EB5B1AB000
trusted library allocation
page read and write
1EB600CC000
trusted library allocation
page read and write
1EB60184000
trusted library allocation
page read and write
1EB4E87A000
heap
page read and write
1EB56ECA000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
1EB58AEB000
trusted library allocation
page read and write
1EB57A5D000
trusted library allocation
page read and write
1EB57ACF000
trusted library allocation
page read and write
1EB4E84E000
heap
page read and write
1EB5B4DD000
trusted library allocation
page read and write
1EB62041000
trusted library allocation
page read and write
1EB57ECC000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB577C1000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB634C7000
trusted library allocation
page read and write
1EB5B79B000
trusted library allocation
page read and write
1EB5472A000
trusted library allocation
page read and write
8201FFE000
unkown
page readonly
1EB5778E000
trusted library allocation
page read and write
1EB57A89000
trusted library allocation
page read and write
1EB5B1E3000
trusted library allocation
page read and write
1EB58F83000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB57A73000
trusted library allocation
page read and write
1EB61D95000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB58A7A000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB5ADEA000
trusted library allocation
page read and write
1EB57790000
trusted library allocation
page read and write
1EB4E849000
heap
page read and write
1EB5AD7D000
trusted library allocation
page read and write
1EB59766000
trusted library allocation
page read and write
1EB54A99000
trusted library allocation
page read and write
1EB634BF000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB5FC93000
trusted library allocation
page read and write
1EB4E8B2000
heap
page read and write
28E89DFC000
unkown
page execute read
1EB597B7000
trusted library allocation
page read and write
1EB58B7C000
trusted library allocation
page read and write
1EB54ADD000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E830000
heap
page read and write
1EB6013A000
trusted library allocation
page read and write
1BE35740000
unclassified section
page readonly
1EB4E836000
heap
page read and write
1BE3589A000
heap
page read and write
1EB5B5B8000
trusted library allocation
page read and write
1EB58A6B000
trusted library allocation
page read and write
1D036A50000
heap
page read and write
1EB64806000
trusted library allocation
page read and write
1EB58A65000
trusted library allocation
page read and write
1EB531BF000
trusted library allocation
page read and write
1EB61DE3000
trusted library allocation
page read and write
1FA4E883000
trusted library allocation
page read and write
1EB57CF0000
trusted library allocation
page read and write
1EB6204D000
trusted library allocation
page read and write
1EB5B7D1000
trusted library allocation
page read and write
1EB57C9A000
trusted library allocation
page read and write
1EB5FC99000
trusted library allocation
page read and write
1EB638FB000
trusted library allocation
page read and write
1EB648D2000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB5FE8D000
trusted library allocation
page read and write
1EB4E886000
heap
page read and write
1EB4E87D000
heap
page read and write
1EB58BC5000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB61F2F000
trusted library allocation
page read and write
1EB58AC9000
trusted library allocation
page read and write
1EB4E843000
heap
page read and write
1EB58BA7000
trusted library allocation
page read and write
1EB58B82000
trusted library allocation
page read and write
1EB577CE000
trusted library allocation
page read and write
1EB5B1D4000
trusted library allocation
page read and write
1EB5FC48000
trusted library allocation
page read and write
1EB5B5CB000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB576A1000
trusted library allocation
page read and write
1EB58BA9000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB5B1DC000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB58A9F000
trusted library allocation
page read and write
1EB5B128000
trusted library allocation
page read and write
1EB59A9E000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E88A000
heap
page read and write
1EB4E8AC000
heap
page read and write
1EB5777A000
trusted library allocation
page read and write
1EB5B0E3000
trusted library allocation
page read and write
1EB57A60000
trusted library allocation
page read and write
1EB58CE9000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB5B447000
trusted library allocation
page read and write
1EB60173000
trusted library allocation
page read and write
1EB57CEC000
trusted library allocation
page read and write
1EB57E33000
trusted library allocation
page read and write
1EB5B5A1000
trusted library allocation
page read and write
1BE35C30000
trusted library allocation
page read and write
2B3915F1000
trusted library allocation
page execute read
1EB4E866000
heap
page read and write
1EB61DEA000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB4E88A000
heap
page read and write
1EB5B71F000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
258E0FE000
stack
page read and write
28E8A9F0000
heap
page read and write
1EB58CF4000
trusted library allocation
page read and write
1EB58FD2000
trusted library allocation
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB56ECA000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
1EB58B5F000
trusted library allocation
page read and write
1EB58AA9000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5A053000
trusted library allocation
page read and write
1EB56F87000
trusted library allocation
page read and write
1EB57277000
heap
page read and write
1EB57CE6000
trusted library allocation
page read and write
1BE35C5D000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB5FE7E000
trusted library allocation
page read and write
1EB57271000
heap
page read and write
1EB60156000
trusted library allocation
page read and write
139F1850000
heap
page read and write
1EB60129000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB576A1000
trusted library allocation
page read and write
1EB5A21D000
trusted library allocation
page read and write
1FC000
unkown
page read and write
1EB62086000
trusted library allocation
page read and write
1EB617E8000
trusted library allocation
page read and write
1EB54ABE000
trusted library allocation
page read and write
1EB58BEC000
trusted library allocation
page read and write
1EB57A69000
trusted library allocation
page read and write
1EB64B1C000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB57AAC000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E860000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB5A069000
trusted library allocation
page read and write
1EB6017B000
trusted library allocation
page read and write
1BE35CA2000
trusted library allocation
page read and write
1EB60173000
trusted library allocation
page read and write
1EB5B1AB000
trusted library allocation
page read and write
1BE35C8F000
trusted library allocation
page read and write
1EB6014E000
trusted library allocation
page read and write
1EB4E866000
heap
page read and write
FD4000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB634D1000
trusted library allocation
page read and write
39A1000
heap
page read and write
1EB4E873000
heap
page read and write
1EB57793000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E848000
heap
page read and write
1EB63C9F000
trusted library allocation
page read and write
1EB587C6000
trusted library allocation
page read and write
1EB4E848000
heap
page read and write
1EB587D6000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB60188000
trusted library allocation
page read and write
1EB57589000
trusted library allocation
page read and write
1EB63B91000
trusted library allocation
page read and write
1EB64867000
trusted library allocation
page read and write
1EB57CC0000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB58794000
trusted library allocation
page read and write
1EB5875B000
trusted library allocation
page read and write
1EB57E37000
trusted library allocation
page read and write
1EB531EF000
trusted library allocation
page read and write
1EB64716000
trusted library allocation
page read and write
1EB587CD000
trusted library allocation
page read and write
1EB57EB6000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB5B166000
trusted library allocation
page read and write
139F1A0A000
trusted library allocation
page read and write
1EB571FD000
heap
page read and write
1EB57C93000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB59BA5000
trusted library allocation
page read and write
1EB58C66000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
28E89E68000
trusted library allocation
page read and write
1FA4E5F0000
heap
page read and write
1EB4E865000
heap
page read and write
1EB57A98000
trusted library allocation
page read and write
1EB57E93000
trusted library allocation
page read and write
1EB538B0000
trusted library allocation
page read and write
1EB538DF000
trusted library allocation
page read and write
1EB64898000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1EB64732000
trusted library allocation
page read and write
1EB637D6000
trusted library allocation
page read and write
1EB57CE6000
trusted library allocation
page read and write
1EB63C2F000
trusted library allocation
page read and write
1EB57270000
heap
page read and write
1EB4E84F000
heap
page read and write
1EB61D16000
trusted library allocation
page read and write
1EB5A129000
trusted library allocation
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB5FB85000
trusted library allocation
page read and write
1EB63D51000
heap
page read and write
1EB58A9A000
trusted library allocation
page read and write
1EB5962A000
trusted library allocation
page read and write
1EB57AF0000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB59CC2000
trusted library allocation
page read and write
1EB58AC9000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E843000
heap
page read and write
28E8A960000
heap
page read and write
1EB57CE0000
trusted library allocation
page read and write
1EB58BA4000
trusted library allocation
page read and write
1EB58A6D000
trusted library allocation
page read and write
1EB57CE0000
trusted library allocation
page read and write
1EB53184000
trusted library allocation
page read and write
1EB60109000
trusted library allocation
page read and write
1EB5B5BF000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB5FED6000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
28E8A9FD000
heap
page read and write
1EB57E63000
trusted library allocation
page read and write
1EB5777D000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E85A000
heap
page read and write
1EB54A20000
trusted library allocation
page read and write
1EB58B2E000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB4E865000
heap
page read and write
1EB57E5B000
trusted library allocation
page read and write
1EB4E876000
heap
page read and write
28E8A9A8000
heap
page read and write
28E89910000
unclassified section
page readonly
1EB587FD000
trusted library allocation
page read and write
1EB59AEE000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB634C7000
trusted library allocation
page read and write
1EB58CF0000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB4E830000
heap
page read and write
1EB5876B000
trusted library allocation
page read and write
1EB5779B000
trusted library allocation
page read and write
1EB59DF0000
trusted library allocation
page read and write
1EB6175C000
trusted library allocation
page read and write
1EB6017D000
trusted library allocation
page read and write
1EB63CDB000
trusted library allocation
page read and write
1EB5922C000
trusted library allocation
page read and write
1EB61F86000
trusted library allocation
page read and write
1EB59484000
trusted library allocation
page read and write
1EB58D53000
trusted library allocation
page read and write
28E8AA44000
heap
page read and write
1EB5B164000
trusted library allocation
page read and write
1EB61FC8000
trusted library allocation
page read and write
1EB59DF7000
trusted library allocation
page read and write
1EB59B8C000
trusted library allocation
page read and write
1EB57A97000
trusted library allocation
page read and write
1EB58BF6000
trusted library allocation
page read and write
28E8A9F0000
heap
page read and write
1EB5B1A5000
trusted library allocation
page read and write
1EB57CBC000
trusted library allocation
page read and write
1EB57E9B000
trusted library allocation
page read and write
1EB58BA5000
trusted library allocation
page read and write
1EB4E83C000
heap
page read and write
1EB58FBC000
trusted library allocation
page read and write
1EB634A9000
trusted library allocation
page read and write
1EB634F6000
trusted library allocation
page read and write
1FA4E937000
trusted library allocation
page read and write
1EB586F1000
trusted library allocation
page read and write
1EB58BC9000
trusted library allocation
page read and write
1EB59C4D000
trusted library allocation
page read and write
1EB6011E000
trusted library allocation
page read and write
1FA4E85B000
trusted library allocation
page read and write
1BE35C72000
trusted library allocation
page read and write
1EB64847000
trusted library allocation
page read and write
F15B9FE000
stack
page read and write
1EB57CEC000
trusted library allocation
page read and write
28E8AA22000
heap
page read and write
1EB63B54000
trusted library allocation
page read and write
1EB6010F000
trusted library allocation
page read and write
1EB592C1000
trusted library allocation
page read and write
1EB5B7E7000
trusted library allocation
page read and write
E2E000
stack
page read and write
1EB4E865000
heap
page read and write
1EB4E83A000
heap
page read and write
1EB56E72000
trusted library allocation
page read and write
1EB587B5000
trusted library allocation
page read and write
1EB5B3B9000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB638D4000
trusted library allocation
page read and write
139F32D6000
heap
page read and write
1EB601E8000
trusted library allocation
page read and write
1EB4E836000
heap
page read and write
1EB63CCC000
trusted library allocation
page read and write
1EB5B5C2000
trusted library allocation
page read and write
1EB60069000
trusted library allocation
page read and write
204000
unkown
page readonly
1EB4E830000
heap
page read and write
1EB5B7C3000
trusted library allocation
page read and write
1EB57C44000
trusted library allocation
page read and write
1EB57284000
heap
page read and write
1EB576A1000
trusted library allocation
page read and write
1EB59B93000
trusted library allocation
page read and write
1FA4E803000
trusted library allocation
page read and write
1EB57663000
trusted library allocation
page read and write
1EB58CA1000
trusted library allocation
page read and write
1EB58E12000
trusted library allocation
page read and write
1EB58A24000
trusted library allocation
page read and write
820413E000
unkown
page readonly
1FA4E847000
trusted library allocation
page read and write
1EB60064000
trusted library allocation
page read and write
1EB5AC6B000
trusted library allocation
page read and write
1EB58A74000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB538F0000
trusted library allocation
page read and write
1EB57AA9000
trusted library allocation
page read and write
1EB5B0B8000
trusted library allocation
page read and write
E4F000
stack
page read and write
1EB56FFB000
trusted library allocation
page read and write
28E8A909000
heap
page read and write
1EB56E39000
trusted library allocation
page read and write
1EB5A2D0000
trusted library allocation
page read and write
F159F9E000
stack
page read and write
1EB5FC3C000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB576D7000
trusted library allocation
page read and write
1EB5B3FE000
trusted library allocation
page read and write
1EB592C2000
trusted library allocation
page read and write
1EB5925E000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB58BE2000
trusted library allocation
page read and write
1EB57C6A000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB5B310000
trusted library allocation
page read and write
1EB59775000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5B1AF000
trusted library allocation
page read and write
1EB4E84E000
heap
page read and write
1D036A30000
heap
page read and write
1EB63CF6000
trusted library allocation
page read and write
28E8A9E9000
heap
page read and write
1EB63C5A000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB5B130000
trusted library allocation
page read and write
1EB648C6000
trusted library allocation
page read and write
1EB5389F000
trusted library allocation
page read and write
1EB620A3000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB5389F000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB61DE3000
trusted library allocation
page read and write
1BE35C5F000
trusted library allocation
page read and write
1EB62C00000
trusted library allocation
page read and write
1EB57E85000
trusted library allocation
page read and write
1EB58D13000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB58A9F000
trusted library allocation
page read and write
1EB58A85000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB58B8C000
trusted library allocation
page read and write
1EB5922C000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB58DCF000
trusted library allocation
page read and write
28E8A9FD000
heap
page read and write
1EB4E84E000
heap
page read and write
1EB54ABE000
trusted library allocation
page read and write
1EB5B621000
trusted library allocation
page read and write
1EB5B484000
trusted library allocation
page read and write
1EB5B73B000
trusted library allocation
page read and write
1EB62007000
trusted library allocation
page read and write
1EB5B7E1000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E842000
heap
page read and write
1EB60188000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
28E8AA2A000
heap
page read and write
1EB648CA000
trusted library allocation
page read and write
1EB57E67000
trusted library allocation
page read and write
1EB5B3FE000
trusted library allocation
page read and write
1EB4E86C000
heap
page read and write
1D036900000
heap
page read and write
1EB58B9F000
trusted library allocation
page read and write
1EB57E6F000
trusted library allocation
page read and write
1EB5AD29000
trusted library allocation
page read and write
1EB4E86E000
heap
page read and write
1EB6017D000
trusted library allocation
page read and write
1EB4E841000
heap
page read and write
28E8A9B9000
heap
page read and write
1EB5FEAD000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB4E86D000
heap
page read and write
1EB57291000
heap
page read and write
1FA4E60A000
heap
page read and write
1EB4E892000
heap
page read and write
1EB4E845000
heap
page read and write
1EB60140000
trusted library allocation
page read and write
1EB57E33000
trusted library allocation
page read and write
1EB5FED5000
trusted library allocation
page read and write
1EB5B7EF000
trusted library allocation
page read and write
1EB4E880000
heap
page read and write
1EB57EDE000
trusted library allocation
page read and write
1EB5B711000
trusted library allocation
page read and write
28E8A9E6000
heap
page read and write
1EB5B5E2000
trusted library allocation
page read and write
1EB5A219000
trusted library allocation
page read and write
1EB64812000
trusted library allocation
page read and write
1EB58FD8000
trusted library allocation
page read and write
1EB58BF5000
trusted library allocation
page read and write
1EB4E838000
heap
page read and write
1EB4E862000
heap
page read and write
1EB4E866000
heap
page read and write
1EB5B146000
trusted library allocation
page read and write
1BE35C24000
trusted library allocation
page read and write
1EB58BB1000
trusted library allocation
page read and write
1EB60129000
trusted library allocation
page read and write
1EB5ACD1000
trusted library allocation
page read and write
1EB538F0000
trusted library allocation
page read and write
28E89D40000
trusted library allocation
page read and write
1EB5B3BC000
trusted library allocation
page read and write
1EB63BF7000
trusted library allocation
page read and write
28E89C00000
heap
page read and write
1EB58F9B000
trusted library allocation
page read and write
1EB60084000
trusted library allocation
page read and write
820293E000
stack
page read and write
1EB58AC5000
trusted library allocation
page read and write
1EB6212C000
trusted library allocation
page read and write
1EB58BC5000
trusted library allocation
page read and write
1EB576D7000
trusted library allocation
page read and write
F15D27E000
unkown
page readonly
1EB4E84F000
heap
page read and write
1EB4E862000
heap
page read and write
1EB575D2000
trusted library allocation
page read and write
1EB4E87D000
heap
page read and write
1EB4E848000
heap
page read and write
1EB57793000
trusted library allocation
page read and write
1EB4E872000
heap
page read and write
1EB5B4F6000
trusted library allocation
page read and write
1EB59E00000
trusted library allocation
page read and write
1EB58755000
trusted library allocation
page read and write
1EB58AA9000
trusted library allocation
page read and write
28E8A9E1000
heap
page read and write
1EB5B707000
trusted library allocation
page read and write
1EB592C9000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB5B7A1000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1EB5B72E000
trusted library allocation
page read and write
28E8A964000
heap
page read and write
1EB4E865000
heap
page read and write
1EB5B5F7000
trusted library allocation
page read and write
1EB5AD24000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB58ABB000
trusted library allocation
page read and write
1EB57AAC000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB57A87000
trusted library allocation
page read and write
1EB57680000
trusted library allocation
page read and write
1EB57205000
heap
page read and write
1EB5B5FB000
trusted library allocation
page read and write
1EB5B0E1000
trusted library allocation
page read and write
1EB59B6D000
trusted library allocation
page read and write
1EB61DD7000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB57EC8000
trusted library allocation
page read and write
1EB5472A000
trusted library allocation
page read and write
1EB5B5BF000
trusted library allocation
page read and write
28E8A969000
heap
page read and write
1EB58B62000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB4E85B000
heap
page read and write
1EB5B5B8000
trusted library allocation
page read and write
1EB5A1AF000
trusted library allocation
page read and write
1EB648E0000
trusted library allocation
page read and write
1EB57A61000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB587FD000
trusted library allocation
page read and write
1EB62043000
trusted library allocation
page read and write
1EB531C7000
trusted library allocation
page read and write
1EB4E878000
heap
page read and write
1EB60092000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1D036C07000
trusted library allocation
page read and write
1EB4E83C000
heap
page read and write
1EB5FBD3000
trusted library allocation
page read and write
28E8A95C000
heap
page read and write
1FA4E5F4000
heap
page read and write
1EB57222000
heap
page read and write
1EB4E85F000
heap
page read and write
1EB5B7B8000
trusted library allocation
page read and write
1EB57277000
heap
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB63B88000
trusted library allocation
page read and write
1EB57ECE000
trusted library allocation
page read and write
1EB5FCF5000
trusted library allocation
page read and write
1EB58739000
trusted library allocation
page read and write
1EB634F9000
trusted library allocation
page read and write
1EB597F7000
trusted library allocation
page read and write
1EB63BB4000
trusted library allocation
page read and write
1EB58FCC000
trusted library allocation
page read and write
1EB5FFB1000
trusted library allocation
page read and write
1EB538FE000
trusted library allocation
page read and write
1EB58DF9000
trusted library allocation
page read and write
1EB531DF000
trusted library allocation
page read and write
1EB547B0000
trusted library allocation
page read and write
1EB5979E000
trusted library allocation
page read and write
1EB57E63000
trusted library allocation
page read and write
1EB57CBE000
trusted library allocation
page read and write
1EB4E869000
heap
page read and write
1EB538E4000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB5B742000
trusted library allocation
page read and write
28E89E84000
trusted library allocation
page read and write
1EB4E847000
heap
page read and write
1EB61F84000
trusted library allocation
page read and write
28E8AA58000
heap
page read and write
1EB4E835000
heap
page read and write
1EB58E48000
trusted library allocation
page read and write
1EB5FC4F000
trusted library allocation
page read and write
1EB5ADA5000
trusted library allocation
page read and write
28E8AA77000
heap
page read and write
1EB548AC000
trusted library allocation
page read and write
1EB638BF000
trusted library allocation
page read and write
1EB59BCD000
trusted library allocation
page read and write
28E8AA3B000
heap
page read and write
1EB57CC0000
trusted library allocation
page read and write
1EB5727C000
heap
page read and write
28E8A95F000
heap
page read and write
1EB57CBC000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB63B67000
trusted library allocation
page read and write
1EB57E4D000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E836000
heap
page read and write
1EB6206D000
trusted library allocation
page read and write
1EB634B4000
trusted library allocation
page read and write
258D0FE000
stack
page read and write
1BE35830000
heap
page read and write
1EB61749000
trusted library allocation
page read and write
1EB5AD63000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB4E84F000
heap
page read and write
1EB57C13000
trusted library allocation
page read and write
1EB57AE6000
trusted library allocation
page read and write
1EB5B5AF000
trusted library allocation
page read and write
1EB59265000
trusted library allocation
page read and write
1EB57C7B000
trusted library allocation
page read and write
1EB57ABC000
trusted library allocation
page read and write
1EB5A212000
trusted library allocation
page read and write
1EB575ED000
trusted library allocation
page read and write
28E8AA58000
heap
page read and write
1EB57AAC000
trusted library allocation
page read and write
1EB57E87000
trusted library allocation
page read and write
1EB58BA7000
trusted library allocation
page read and write
1EB5A2E8000
trusted library allocation
page read and write
1EB60028000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB58BA7000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB58AEA000
trusted library allocation
page read and write
1EB548A1000
trusted library allocation
page read and write
1EB58C5E000
trusted library allocation
page read and write
1EB58BAB000
trusted library allocation
page read and write
1EB637F5000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB587C4000
trusted library allocation
page read and write
1EB60182000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB5B0E1000
trusted library allocation
page read and write
1EB58FCC000
trusted library allocation
page read and write
1EB575EF000
trusted library allocation
page read and write
1EB601C8000
trusted library allocation
page read and write
1EB58AB0000
trusted library allocation
page read and write
1EB4E873000
heap
page read and write
1EB57E87000
trusted library allocation
page read and write
1EB59231000
trusted library allocation
page read and write
1EB4E886000
heap
page read and write
1EB58A7F000
trusted library allocation
page read and write
28E89EF3000
trusted library allocation
page read and write
1EB531C3000
trusted library allocation
page read and write
1EB56EF6000
trusted library allocation
page read and write
11F3000
heap
page read and write
1EB4E862000
heap
page read and write
28E8AA44000
heap
page read and write
1EB58AFE000
trusted library allocation
page read and write
1EB638D4000
trusted library allocation
page read and write
1EB5B3F7000
trusted library allocation
page read and write
1EB57AC8000
trusted library allocation
page read and write
1EB4E885000
heap
page read and write
1EB4E877000
heap
page read and write
1EB57AF0000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB5B5B8000
trusted library allocation
page read and write
1EB58CA0000
trusted library allocation
page read and write
1EB4E84C000
heap
page read and write
1EB597E9000
trusted library allocation
page read and write
1EB601EC000
trusted library allocation
page read and write
1EB59B8C000
trusted library allocation
page read and write
1EB59A85000
trusted library allocation
page read and write
1EB5A17E000
trusted library allocation
page read and write
1EB54A86000
trusted library allocation
page read and write
1EB62005000
trusted library allocation
page read and write
1EB538E1000
trusted library allocation
page read and write
1BE35CF2000
trusted library allocation
page read and write
1EB58E80000
trusted library allocation
page read and write
1EB59AD2000
trusted library allocation
page read and write
1EB592C9000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB61502000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB58788000
trusted library allocation
page read and write
1EB5867B000
trusted library allocation
page read and write
28E8AA44000
heap
page read and write
1EB4E863000
heap
page read and write
1EB58ACA000
trusted library allocation
page read and write
1EB54724000
trusted library allocation
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB648D0000
trusted library allocation
page read and write
1EB5B78C000
trusted library allocation
page read and write
1EB5B1DE000
trusted library allocation
page read and write
1EB5B7A8000
trusted library allocation
page read and write
1EB57E26000
trusted library allocation
page read and write
28E89E74000
trusted library allocation
page read and write
1EB57A87000
trusted library allocation
page read and write
1EB61F87000
trusted library allocation
page read and write
1EB5FC80000
trusted library allocation
page read and write
1EB592BD000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1FA4E866000
trusted library allocation
page read and write
1EB59231000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB5B7CA000
trusted library allocation
page read and write
1EB5A1CD000
trusted library allocation
page read and write
1EB4E863000
heap
page read and write
1EB4E848000
heap
page read and write
1EB4E892000
heap
page read and write
1EB61DBD000
trusted library allocation
page read and write
1EB57AE5000
trusted library allocation
page read and write
1EB547EF000
trusted library allocation
page read and write
1EB4E83E000
heap
page read and write
258D8FE000
unkown
page readonly
1EB638FD000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB5A187000
trusted library allocation
page read and write
1EB57A56000
trusted library allocation
page read and write
1EB634D3000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB58BD8000
trusted library allocation
page read and write
1EB60088000
trusted library allocation
page read and write
1EB63CF6000
trusted library allocation
page read and write
1EB5B735000
trusted library allocation
page read and write
1EB592F1000
trusted library allocation
page read and write
1EB5B438000
trusted library allocation
page read and write
1EB5FCFB000
trusted library allocation
page read and write
1EB5B740000
trusted library allocation
page read and write
1EB577B4000
trusted library allocation
page read and write
1EB58DCF000
trusted library allocation
page read and write
1EB5B799000
trusted library allocation
page read and write
1EB648A5000
trusted library allocation
page read and write
1FA4E932000
trusted library allocation
page read and write
1EB58E36000
trusted library allocation
page read and write
1EB5879C000
trusted library allocation
page read and write
1EB57E93000
trusted library allocation
page read and write
1EB63C3C000
trusted library allocation
page read and write
1BE35810000
heap
page read and write
1EB57CE0000
trusted library allocation
page read and write
1EB600CC000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
28E8A969000
heap
page read and write
1EB58BC9000
trusted library allocation
page read and write
1EB54AA5000
trusted library allocation
page read and write
1EB56ECA000
trusted library allocation
page read and write
1EB577C1000
trusted library allocation
page read and write
1EB57AE4000
trusted library allocation
page read and write
1EB4E848000
heap
page read and write
1EB4E892000
heap
page read and write
1EB58E17000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB5B166000
trusted library allocation
page read and write
1EB58AE5000
trusted library allocation
page read and write
1EB57E95000
trusted library allocation
page read and write
1EB4E8AC000
heap
page read and write
28E89E6F000
trusted library allocation
page read and write
1EB5B1FD000
trusted library allocation
page read and write
1EB58BF8000
trusted library allocation
page read and write
1EB6014A000
trusted library allocation
page read and write
1EB57CE6000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB59770000
trusted library allocation
page read and write
1EB59B7F000
trusted library allocation
page read and write
1EB63C69000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB5B1D4000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB59A85000
trusted library allocation
page read and write
1EB592AB000
trusted library allocation
page read and write
1EB5B3ED000
trusted library allocation
page read and write
1EB5B3D6000
trusted library allocation
page read and write
1EB5A1B3000
trusted library allocation
page read and write
1EB5A18B000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB56F61000
trusted library allocation
page read and write
28E8AA2D000
heap
page read and write
1EB592B7000
trusted library allocation
page read and write
1EB576A8000
trusted library allocation
page read and write
1EB63C2F000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB634DD000
trusted library allocation
page read and write
1EB4E837000
heap
page read and write
1EB57AC2000
trusted library allocation
page read and write
1EB60195000
trusted library allocation
page read and write
1EB58770000
trusted library allocation
page read and write
1EB4E84E000
heap
page read and write
1EB5B0FD000
trusted library allocation
page read and write
1EB57740000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
2B3914E6000
trusted library allocation
page execute read
1EB4E8AB000
heap
page read and write
1EB600A4000
trusted library allocation
page read and write
1EB575B6000
trusted library allocation
page read and write
1EB58E36000
trusted library allocation
page read and write
1EB64584000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB4E86E000
heap
page read and write
1EB5978F000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB5B120000
trusted library allocation
page read and write
1EB600C3000
trusted library allocation
page read and write
258C87E000
unkown
page readonly
1EB597E1000
trusted library allocation
page read and write
1EB5B74C000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB6016F000
trusted library allocation
page read and write
1EB60084000
trusted library allocation
page read and write
1EB5727A000
heap
page read and write
1EB57642000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
16EE7FE000
stack
page read and write
1EB58AAC000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB57524000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB587C9000
trusted library allocation
page read and write
1EB60191000
trusted library allocation
page read and write
1EB538FE000
trusted library allocation
page read and write
1EB59CEE000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB57CEC000
trusted library allocation
page read and write
1EB4E877000
heap
page read and write
1EB58BB5000
trusted library allocation
page read and write
1EB5FEFD000
trusted library allocation
page read and write
1EB61F6D000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB57AA1000
trusted library allocation
page read and write
1EB57793000
trusted library allocation
page read and write
1EB61D97000
trusted library allocation
page read and write
1EB5B1A5000
trusted library allocation
page read and write
1EB5AD9C000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB58A7C000
trusted library allocation
page read and write
1EB57581000
trusted library allocation
page read and write
1EB58DB3000
trusted library allocation
page read and write
1EB57A97000
trusted library allocation
page read and write
1EB6484A000
trusted library allocation
page read and write
1EB4E87C000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB5319E000
trusted library allocation
page read and write
1EB592FD000
trusted library allocation
page read and write
1EB49378000
heap
page read and write
130000
unkown
page readonly
1EB4E860000
heap
page read and write
1EB5B5BC000
trusted library allocation
page read and write
1EB58DB3000
trusted library allocation
page read and write
1EB58E1A000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB58DCC000
trusted library allocation
page read and write
1EB4E871000
heap
page read and write
1EB5AD2D000
trusted library allocation
page read and write
1EB60400000
trusted library allocation
page read and write
1EB4E839000
heap
page read and write
1EB5921D000
trusted library allocation
page read and write
28E8A9F0000
heap
page read and write
1EB57587000
trusted library allocation
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB60011000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB4E874000
heap
page read and write
1FA4E87B000
trusted library allocation
page read and write
1EB5B7C9000
trusted library allocation
page read and write
1EB5B70A000
trusted library allocation
page read and write
1EB4E862000
heap
page read and write
1EB5B5CB000
trusted library allocation
page read and write
1EB4E83E000
heap
page read and write
1EB4E874000
heap
page read and write
1EB648BC000
trusted library allocation
page read and write
1EB60195000
trusted library allocation
page read and write
1EB59B7F000
trusted library allocation
page read and write
1EB56F81000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB54724000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB58A6A000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB59BFC000
trusted library allocation
page read and write
1EB5B1B3000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB4E892000
heap
page read and write
1EB4E845000
heap
page read and write
1EB64845000
trusted library allocation
page read and write
1EB592D1000
trusted library allocation
page read and write
1EB548C8000
trusted library allocation
page read and write
1EB57658000
trusted library allocation
page read and write
1EB59DE0000
trusted library allocation
page read and write
1EB5B7C5000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB57E3A000
trusted library allocation
page read and write
1EB5B3CB000
trusted library allocation
page read and write
1EB57AED000
trusted library allocation
page read and write
F159E9B000
stack
page read and write
1EB4E84F000
heap
page read and write
28E89E2F000
trusted library allocation
page read and write
1EB4E86E000
heap
page read and write
1EB6017B000
trusted library allocation
page read and write
1EB5978A000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB57AC8000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB57E4D000
trusted library allocation
page read and write
1EB4E85B000
heap
page read and write
28E8A9E6000
heap
page read and write
1EB57AC2000
trusted library allocation
page read and write
1EB58AFE000
trusted library allocation
page read and write
1EB58A8E000
trusted library allocation
page read and write
1EB57EFD000
trusted library allocation
page read and write
1EB5B581000
trusted library allocation
page read and write
1EB5B19F000
trusted library allocation
page read and write
1EB57AD6000
trusted library allocation
page read and write
1EB60116000
trusted library allocation
page read and write
1FA4E450000
heap
page read and write
1EB5A2EF000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB4E862000
heap
page read and write
1EB4E8AB000
heap
page read and write
1EB5B1B3000
trusted library allocation
page read and write
1EB5B5BF000
trusted library allocation
page read and write
1EB58A23000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB57E4D000
trusted library allocation
page read and write
1EB5B51B000
trusted library allocation
page read and write
1EB59265000
trusted library allocation
page read and write
1EB5B5C4000
trusted library allocation
page read and write
1EB6014A000
trusted library allocation
page read and write
1EB57AB4000
trusted library allocation
page read and write
139F186D000
heap
page read and write
1EB57A56000
trusted library allocation
page read and write
1EB576A8000
trusted library allocation
page read and write
1EB57265000
heap
page read and write
1EB4E8AE000
heap
page read and write
1EB4E846000
heap
page read and write
1EB58AFE000
trusted library allocation
page read and write
1EB58C2E000
trusted library allocation
page read and write
1EB58CEE000
trusted library allocation
page read and write
1EB4E881000
heap
page read and write
1EB59AB1000
trusted library allocation
page read and write
1EB58AB0000
trusted library allocation
page read and write
1EB58CA0000
trusted library allocation
page read and write
1EB57AED000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB4E86C000
heap
page read and write
1EB62043000
trusted library allocation
page read and write
1EB4E83E000
heap
page read and write
1EB4E84F000
heap
page read and write
1EB4E84E000
heap
page read and write
1EB5AD15000
trusted library allocation
page read and write
1EB4E83F000
heap
page read and write
1EB57CBC000
trusted library allocation
page read and write
1EB4E86B000
heap
page read and write
1EB4E84F000
heap
page read and write
1EB538B0000
trusted library allocation
page read and write
1EB58CDA000
trusted library allocation
page read and write
1EB61FE5000
trusted library allocation
page read and write
235933B1E000
trusted library allocation
page read and write
1EB58A0A000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB58E39000
trusted library allocation
page read and write
1EB57E84000
trusted library allocation
page read and write
1EB5FE86000
trusted library allocation
page read and write
1EB6013E000
trusted library allocation
page read and write
1EB6016F000
trusted library allocation
page read and write
1EB59AE1000
trusted library allocation
page read and write
28E8A969000
heap
page read and write
1EB4E892000
heap
page read and write
1EB4E885000
heap
page read and write
1EB64832000
trusted library allocation
page read and write
1EB58BF2000
trusted library allocation
page read and write
1EB4E86E000
heap
page read and write
1EB577B4000
trusted library allocation
page read and write
1EB4E842000
heap
page read and write
1EB4E88A000
heap
page read and write
1EB59DF0000
trusted library allocation
page read and write
1EB4E877000
heap
page read and write
16DEB7B03000
trusted library allocation
page read and write
11FA000
heap
page read and write
1EB5AD92000
trusted library allocation
page read and write
1EB57ACF000
trusted library allocation
page read and write
1EB58BA7000
trusted library allocation
page read and write
1EB5979C000
trusted library allocation
page read and write
28E89990000
heap
page read and write
1EB637E0000
trusted library allocation
page read and write
1EB57CF5000
trusted library allocation
page read and write
1EB5757E000
trusted library allocation
page read and write
1EB58AAC000
trusted library allocation
page read and write
1EB615A8000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
1EB4E83F000
heap
page read and write
1EB6212C000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB63C3C000
trusted library allocation
page read and write
1EB5B310000
trusted library allocation
page read and write
1EB4E842000
heap
page read and write
1EB57AC2000
trusted library allocation
page read and write
1EB5B71C000
trusted library allocation
page read and write
1EB634EA000
trusted library allocation
page read and write
1FA4E600000
heap
page read and write
1EB54A69000
trusted library allocation
page read and write
1EB5877D000
trusted library allocation
page read and write
1D036C00000
trusted library allocation
page read and write
1EB6001B000
trusted library allocation
page read and write
1FA4E863000
trusted library allocation
page read and write
1EB56E33000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB5FE78000
trusted library allocation
page read and write
1EB59C9C000
trusted library allocation
page read and write
1EB4E85F000
heap
page read and write
1EB571FD000
heap
page read and write
1EB58A24000
trusted library allocation
page read and write
1EB4E892000
heap
page read and write
1EB620E4000
trusted library allocation
page read and write
1EB59DF7000
trusted library allocation
page read and write
1EB58BEE000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1BE35990000
heap
page read and write
820213E000
unkown
page readonly
1EB4E86E000
heap
page read and write
1EB59AEE000
trusted library allocation
page read and write
1FA4E812000
trusted library allocation
page read and write
1EB58A98000
trusted library allocation
page read and write
1EB57AF7000
trusted library allocation
page read and write
11D8000
heap
page read and write
1EB4E862000
heap
page read and write
1EB4E830000
heap
page read and write
1EB6016B000
trusted library allocation
page read and write
1EB59BA4000
trusted library allocation
page read and write
1EB592D1000
trusted library allocation
page read and write
1EB4E865000
heap
page read and write
1EB58CF9000
trusted library allocation
page read and write
1EB4E879000
heap
page read and write
1EB59C6D000
trusted library allocation
page read and write
1EB57CBC000
trusted library allocation
page read and write
1EB53776000
trusted library allocation
page read and write
1EB57CAD000
trusted library allocation
page read and write
1EB5977C000
trusted library allocation
page read and write
1EB59DE5000
trusted library allocation
page read and write
1EB61749000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB576A8000
trusted library allocation
page read and write
1EB5FE86000
trusted library allocation
page read and write
1EB58AAC000
trusted library allocation
page read and write
1EB57CB2000
trusted library allocation
page read and write
1EB587F3000
trusted library allocation
page read and write
28E8A390000
trusted library allocation
page read and write
1EB577B4000
trusted library allocation
page read and write
1EB5B0E3000
trusted library allocation
page read and write
1EB4E85A000
heap
page read and write
1EB61DF0000
trusted library allocation
page read and write
2B3915E1000
trusted library allocation
page execute read
39A1000
heap
page read and write
1EB5FE84000
trusted library allocation
page read and write
1EB57E4D000
trusted library allocation
page read and write
1D0369EF000
heap
page read and write
1EB57AAC000
trusted library allocation
page read and write
1EB4E8AB000
heap
page read and write
201EDFB000
stack
page read and write
1EB4E8AB000
heap
page read and write
1EB58AD1000
trusted library allocation
page read and write
1EB4E876000
heap
page read and write
1EB58FD2000
trusted library allocation
page read and write
1EB4E860000
heap
page read and write
1EB58E48000
trusted library allocation
page read and write
1EB587F8000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB5925E000
trusted library allocation
page read and write
28E8AA59000
heap
page read and write
1BE35900000
unclassified section
page readonly
1EB57A9D000
trusted library allocation
page read and write
1EB6483B000
trusted library allocation
page read and write
1EB4E84B000
heap
page read and write
1EB58BA7000
trusted library allocation
page read and write
1EB58B73000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB4E8AB000
heap
page read and write
28E8A9E8000
heap
page read and write
1EB57A73000
trusted library allocation
page read and write
1EB4E852000
heap
page read and write
1EB4E874000
heap
page read and write
1EB4E873000
heap
page read and write
1EB5B7C7000
trusted library allocation
page read and write
139F1883000
heap
page read and write
1EB57798000
trusted library allocation
page read and write
1EB617F6000
trusted library allocation
page read and write
1EB59BCD000
trusted library allocation
page read and write
1EB58A6D000
trusted library allocation
page read and write
1EB4E858000
heap
page read and write
1EB4E885000
heap
page read and write
1FA4E5B0000
heap
page readonly
28E89DD3000
unkown
page execute read
1EB63BC2000
trusted library allocation
page read and write
1EB57686000
trusted library allocation
page read and write
1EB5720F000
heap
page read and write
1EB587C6000
trusted library allocation
page read and write
1EB57583000
trusted library allocation
page read and write
1EB4E866000
heap
page read and write
1EB58A7C000
trusted library allocation
page read and write
1EB4E830000
heap
page read and write
1EB57E65000
trusted library allocation
page read and write
1EB60195000
trusted library allocation
page read and write
1EB5B7E7000
trusted library allocation
page read and write
1EB4E82E000
heap
page read and write
1EB4E862000
heap
page read and write
1FA4E400000
remote allocation
page read and write
1EB5773E000
trusted library allocation
page read and write
1EB5B6B5000
trusted library allocation
page read and write
1EB5FED3000
trusted library allocation
page read and write
1EB57CBE000
trusted library allocation
page read and write
1EB54742000
trusted library allocation
page read and write
1EB61DED000
trusted library allocation
page read and write
1EB5B461000
trusted library allocation
page read and write
1EB634B4000
trusted library allocation
page read and write
1EB4E84A000
heap
page read and write
1EB600CC000
trusted library allocation
page read and write
1EB62133000
trusted library allocation
page read and write
1EB592F0000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB5FFFD000
trusted library allocation
page read and write
1EB64B37000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB64820000
trusted library allocation
page read and write
1EB4E84F000
heap
page read and write
1EB4E830000
heap
page read and write
1EB57E9B000
trusted library allocation
page read and write
1EB57ACF000
trusted library allocation
page read and write
1EB4E87B000
heap
page read and write
1EB57AB4000
trusted library allocation
page read and write
1EB5B5E8000
trusted library allocation
page read and write
1EB5B4C2000
trusted library allocation
page read and write
1EB64832000
trusted library allocation
page read and write
1EB60200000
trusted library allocation
page read and write
1EB57A97000
trusted library allocation
page read and write
1EB57E5B000
trusted library allocation
page read and write
1EB58BA7000
trusted library allocation
page read and write
1EB58CF7000
trusted library allocation
page read and write
1EB57A6A000
trusted library allocation
page read and write
1EB58E39000
trusted library allocation
page read and write
1EB4E8AC000
heap
page read and write
1EB597E9000
trusted library allocation
page read and write
1EB4E885000
heap
page read and write
1EB5FFED000
trusted library allocation
page read and write
1EB58A78000
trusted library allocation
page read and write
1EB5B6B3000
trusted library allocation
page read and write
1BE35F07000
trusted library allocation
page read and write
1EB4E845000
heap
page read and write
1EB5971D000
trusted library allocation
page read and write
1EB4E88A000
heap
page read and write
1EB4E892000
heap
page read and write
1EB59B92000
trusted library allocation
page read and write
1EB5B5CB000
trusted library allocation
page read and write
1EB57ABC000
trusted library allocation
page read and write
A5A000
stack
page read and write
1EB4E865000
heap
page read and write
1EB597E9000
trusted library allocation
page read and write
1EB5AD35000
trusted library allocation
page read and write
1EB60188000
trusted library allocation
page read and write
1EB63EA3000
heap
page read and write
1EB57CBE000
trusted library allocation
page read and write
1EB61DF6000
trusted library allocation
page read and write
1EB58A7C000
trusted library allocation
page read and write
1D0369E9000
heap
page read and write
1EB6206D000
trusted library allocation
page read and write
1EB5B445000
trusted library allocation
page read and write
1EB5A24F000
trusted library allocation
page read and write
1EB5ADEC000
trusted library allocation
page read and write
1EB58ABD000
trusted library allocation
page read and write
28E8AA77000
heap
page read and write
139F32C4000
heap
page read and write
1EB57A56000
trusted library allocation
page read and write
There are 3947 hidden memdumps, click here to show them.