IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1b91648b-0771-4a99-b9b2-056bc8087362.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1b91648b-0771-4a99-b9b2-056bc8087362.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7NIEWICM7F2IBVLF3C51.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FW7TA428R65O9ZNLNOZI.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json.tmp
JSON data
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2308 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2240 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c7b777d-2a26-4fbe-9330-9edfca496016} 6044 "\\.\pipe\gecko-crash-server-pipe.6044" 1bffe16ef10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4396 -parentBuildID 20230927232528 -prefsHandle 4388 -prefMapHandle 4384 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {57a82ab3-3010-46f8-acb6-a65d54e98571} 6044 "\\.\pipe\gecko-crash-server-pipe.6044" 1bf8e7d0e10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3380 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5300 -prefMapHandle 5296 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20381055-6d38-4858-a02c-8e8f38f6f4a2} 6044 "\\.\pipe\gecko-crash-server-pipe.6044" 1bf8dcc1d10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://youtube.com/account?=
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.195.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.17.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1BF909F9000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BFFFF64000
heap
page read and write
B00000
heap
page read and write
1BF965B9000
trusted library allocation
page read and write
1BF965A7000
trusted library allocation
page read and write
1BF8FDFD000
trusted library allocation
page read and write
1BF981B6000
trusted library allocation
page read and write
1BF8B28A000
trusted library allocation
page read and write
1BF8F4FB000
trusted library allocation
page read and write
1BF909C1000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF8DE5A000
trusted library allocation
page read and write
1BF8DE8A000
trusted library allocation
page read and write
1BF9A3E6000
trusted library allocation
page read and write
1BF8DD55000
trusted library allocation
page read and write
1BF8DD7F000
trusted library allocation
page read and write
1BFFFF50000
heap
page read and write
27EF139F000
trusted library allocation
page read and write
FC0000
heap
page read and write
1BF8E9C3000
trusted library allocation
page read and write
1BF8DECE000
trusted library allocation
page read and write
1BF96677000
trusted library allocation
page read and write
1BF9A853000
trusted library allocation
page read and write
1BF99FA1000
trusted library allocation
page read and write
1BF8F9A9000
trusted library allocation
page read and write
1BF981A4000
trusted library allocation
page read and write
1BF8F6BD000
trusted library allocation
page read and write
1BF909C7000
trusted library allocation
page read and write
1BF8DF6E000
trusted library allocation
page read and write
1BF9A3B1000
trusted library allocation
page read and write
1BF8F99D000
trusted library allocation
page read and write
27EF1F44000
heap
page read and write
1BF90973000
trusted library allocation
page read and write
1BF8F620000
trusted library allocation
page read and write
1BF8EA8E000
trusted library allocation
page read and write
1BFFFF4A000
heap
page read and write
1BF9A4C7000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BF8DD81000
trusted library allocation
page read and write
1BF8DF99000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF8E96E000
trusted library allocation
page read and write
1BF91BFB000
trusted library allocation
page read and write
1BF917FA000
trusted library allocation
page read and write
1BF9A247000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
27EF1E01000
heap
page read and write
1BF917D6000
trusted library allocation
page read and write
1BF90564000
trusted library allocation
page read and write
1BF8EAC3000
trusted library allocation
page read and write
1BF9A9E6000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF9A853000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF6A000
heap
page read and write
1BF9687C000
trusted library allocation
page read and write
1BF8E9E2000
trusted library allocation
page read and write
1BF8989E000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BFFFF3A000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BF8D6F5000
trusted library allocation
page read and write
27EF0DF0000
unclassified section
page readonly
1C8D4859000
heap
page read and write
1BFFFF62000
heap
page read and write
1BFFFF50000
heap
page read and write
1BF8E9DA000
trusted library allocation
page read and write
1BF9666E000
trusted library allocation
page read and write
1BF8F4FE000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BFFFFA8000
heap
page read and write
1BF909C1000
trusted library allocation
page read and write
1BF8F48D000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF97BC7000
trusted library allocation
page read and write
1BF8EA34000
trusted library allocation
page read and write
1BF8FA98000
trusted library allocation
page read and write
1BF9A2FE000
trusted library allocation
page read and write
1BFFFF70000
heap
page read and write
27EF1880000
heap
page read and write
1BFFFF64000
heap
page read and write
DA4000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF967E5000
trusted library allocation
page read and write
1BFFFF73000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BFFFFAB000
heap
page read and write
1BF8FDC5000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF91B94000
trusted library allocation
page read and write
F66F72D000
stack
page read and write
1BFFFF67000
heap
page read and write
1BFFFF4A000
heap
page read and write
1BF9179D000
trusted library allocation
page read and write
25D8605B000
trusted library allocation
page read and write
1BF9AA6F000
trusted library allocation
page read and write
1BF8D6DC000
trusted library allocation
page read and write
1BF969AF000
trusted library allocation
page read and write
1BFFFF8A000
heap
page read and write
1BF967DA000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BFFFF43000
heap
page read and write
1BFFFF5C000
heap
page read and write
1BF981B2000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF61000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF8F845000
trusted library allocation
page read and write
1BFFFF22000
heap
page read and write
27EF13C2000
trusted library allocation
page read and write
1BF8DECE000
trusted library allocation
page read and write
1BF97962000
trusted library allocation
page read and write
27EF10E4000
unkown
page execute read
1BF8F687000
trusted library allocation
page read and write
1BF9AADF000
trusted library allocation
page read and write
1BF97A2E000
trusted library allocation
page read and write
1BF99CFC000
trusted library allocation
page read and write
2860EC6B000
trusted library allocation
page read and write
1BF9093C000
trusted library allocation
page read and write
1BF8B23E000
trusted library allocation
page read and write
1BF8DF47000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
F8EF5EE000
unkown
page readonly
1BF8F302000
trusted library allocation
page read and write
27EF1E6C000
heap
page read and write
1BF8D809000
trusted library allocation
page read and write
1BF9A3D9000
trusted library allocation
page read and write
1BFFFF50000
heap
page read and write
1BF8FD3D000
trusted library allocation
page read and write
1BF8DE4F000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
F8DC1BE000
stack
page read and write
1BF8F9BB000
trusted library allocation
page read and write
1BF96032000
trusted library allocation
page read and write
1BF9169A000
trusted library allocation
page read and write
1BF9819F000
trusted library allocation
page read and write
1BF8F9E3000
trusted library allocation
page read and write
1BF96677000
trusted library allocation
page read and write
1BF929AC000
trusted library allocation
page read and write
1BF8FB2C000
trusted library allocation
page read and write
1BF909F4000
trusted library allocation
page read and write
1EEB1D00000
trusted library allocation
page read and write
1BF909F9000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF979E3000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF91BAE000
trusted library allocation
page read and write
1BF91B70000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BF90667000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF64000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF98CAC000
trusted library allocation
page read and write
1BF8DB8D000
heap
page read and write
1BFFFF64000
heap
page read and write
1BFFFF6A000
heap
page read and write
27EF10EE000
unkown
page execute read
F70000
heap
page read and write
1BFFFF46000
heap
page read and write
27EF0F40000
unclassified section
page read and write
1BFFFF3A000
heap
page read and write
1BF925A7000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF90946000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BFFFF67000
heap
page read and write
1BFFFF78000
heap
page read and write
1BFFFFB1000
heap
page read and write
1BFFFF67000
heap
page read and write
27EF10D0000
trusted library allocation
page read and write
1BF99F10000
trusted library allocation
page read and write
1BF95FE4000
trusted library allocation
page read and write
1BF9A40C000
heap
page read and write
1BF90ABC000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BF99FD1000
trusted library allocation
page read and write
1BF8F815000
trusted library allocation
page read and write
1BF8D672000
trusted library allocation
page read and write
1BF979F4000
trusted library allocation
page read and write
1BF91AB7000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF6A000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF9163E000
trusted library allocation
page read and write
1BF92993000
trusted library allocation
page read and write
1BF8F6AD000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF29000
heap
page read and write
1BF8FA97000
trusted library allocation
page read and write
1BF90AB7000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BF8FD8A000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF8DD93000
trusted library allocation
page read and write
1BF8AECA000
trusted library allocation
page read and write
1BFFFF4D000
heap
page read and write
1BFFFF46000
heap
page read and write
1BFFFFD9000
heap
page read and write
1BF89FEE000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF95FE3000
trusted library allocation
page read and write
1BF8AE3B000
trusted library allocation
page read and write
1BFFFF4B000
heap
page read and write
1BF8EA8C000
trusted library allocation
page read and write
27EF1F77000
heap
page read and write
1BFFFFAA000
heap
page read and write
1BFFFFB7000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF9A853000
trusted library allocation
page read and write
1BF8B2A6000
trusted library allocation
page read and write
1BF9A847000
trusted library allocation
page read and write
1BF90A9E000
trusted library allocation
page read and write
1BF8EA5E000
trusted library allocation
page read and write
1BF8FBD5000
trusted library allocation
page read and write
1BF8FD39000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF9094B000
trusted library allocation
page read and write
1BF8F5E4000
trusted library allocation
page read and write
1BF9A85F000
trusted library allocation
page read and write
1BF8B2BC000
trusted library allocation
page read and write
F9C000
heap
page read and write
1BF8B298000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BF906AD000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BF89FFC000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
1BF9A8A5000
trusted library allocation
page read and write
1BF90AFA000
trusted library allocation
page read and write
27EF1E60000
heap
page read and write
1BF8DE9E000
trusted library allocation
page read and write
1BF8E96E000
trusted library allocation
page read and write
1BFFFFAA000
heap
page read and write
1BF8F4A9000
trusted library allocation
page read and write
1BF91BC5000
trusted library allocation
page read and write
F8DC1FE000
unkown
page readonly
1BF8E3C5000
trusted library allocation
page read and write
1BF97AB6000
trusted library allocation
page read and write
2860EC03000
trusted library allocation
page read and write
1BF8B257000
trusted library allocation
page read and write
1C8D4848000
heap
page read and write
1BF8E31F000
trusted library allocation
page read and write
2860E9DA000
heap
page read and write
1BF9796F000
trusted library allocation
page read and write
1BF9669E000
trusted library allocation
page read and write
1BF965B9000
trusted library allocation
page read and write
1BF8F8DA000
trusted library allocation
page read and write
1BF8DE68000
trusted library allocation
page read and write
1BF9AA79000
trusted library allocation
page read and write
1BF8DF6C000
trusted library allocation
page read and write
1BF9AAFD000
trusted library allocation
page read and write
1BF96756000
trusted library allocation
page read and write
1BF916C4000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF97BB8000
trusted library allocation
page read and write
1BF8F4FE000
trusted library allocation
page read and write
1BF8FD3D000
trusted library allocation
page read and write
1BF98CC5000
trusted library allocation
page read and write
1BF95FCD000
trusted library allocation
page read and write
1BF909C4000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF966F2000
trusted library allocation
page read and write
1BF9A406000
heap
page read and write
1BF97B98000
trusted library allocation
page read and write
1BF8E382000
trusted library allocation
page read and write
1BF8E3F0000
trusted library allocation
page read and write
1BF89E2F000
trusted library allocation
page read and write
1BF8B2A8000
trusted library allocation
page read and write
1C8D2D6A000
heap
page read and write
1BF916CA000
trusted library allocation
page read and write
1BF99F3D000
trusted library allocation
page read and write
1BFFFF74000
heap
page read and write
1BF916F8000
trusted library allocation
page read and write
1BFFFF66000
heap
page read and write
1BF8DB22000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF8E9CF000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8DEA5000
trusted library allocation
page read and write
1BF969B4000
trusted library allocation
page read and write
1BF8B2EB000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF97BD4000
trusted library allocation
page read and write
1BF8E355000
trusted library allocation
page read and write
1BF99FB7000
trusted library allocation
page read and write
1BF8D676000
trusted library allocation
page read and write
1BF8F1D4000
trusted library allocation
page read and write
1BF97AAD000
trusted library allocation
page read and write
1BF8F6DF000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF8F822000
trusted library allocation
page read and write
27EF1386000
trusted library allocation
page read and write
1BF8EC86000
trusted library allocation
page read and write
27EF1E60000
heap
page read and write
1BF8EA48000
trusted library allocation
page read and write
1BF8FAAF000
trusted library allocation
page read and write
1BF8FD8E000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF97BBD000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF96677000
trusted library allocation
page read and write
1BF979DA000
trusted library allocation
page read and write
1BF8DB8C000
heap
page read and write
1BF8AECE000
trusted library allocation
page read and write
1BF9A863000
trusted library allocation
page read and write
1BF8F82A000
trusted library allocation
page read and write
1BF96739000
trusted library allocation
page read and write
1BFFFF70000
heap
page read and write
1BF8EAAE000
trusted library allocation
page read and write
1BF8DEA5000
trusted library allocation
page read and write
27EF1F3B000
heap
page read and write
2860ED24000
heap
page read and write
1BF90663000
trusted library allocation
page read and write
1BF9696A000
trusted library allocation
page read and write
1BF9819F000
trusted library allocation
page read and write
2860ECDA000
trusted library allocation
page read and write
1BF9A86D000
trusted library allocation
page read and write
1BF90ABC000
trusted library allocation
page read and write
1BF8DFD2000
trusted library allocation
page read and write
1BF97BF5000
trusted library allocation
page read and write
C7C6DFF000
stack
page read and write
1BFFFF67000
heap
page read and write
1BF968EB000
trusted library allocation
page read and write
25D8600D000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFF46000
heap
page read and write
27EF1F77000
heap
page read and write
1BFFFF24000
heap
page read and write
1BF90A92000
trusted library allocation
page read and write
1BF965D6000
trusted library allocation
page read and write
1BF9177F000
trusted library allocation
page read and write
1C8D2C40000
heap
page read and write
25D86139000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF906D5000
trusted library allocation
page read and write
1BF8E3FA000
trusted library allocation
page read and write
1BF8F69E000
trusted library allocation
page read and write
1BF96673000
trusted library allocation
page read and write
1BF97BBB000
trusted library allocation
page read and write
1BF8FD4A000
trusted library allocation
page read and write
1BF9653B000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF9A890000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1C8D2D6A000
heap
page read and write
1BF8DB22000
heap
page read and write
1BF8D662000
trusted library allocation
page read and write
1BF9A40B000
heap
page read and write
1BF8FD68000
trusted library allocation
page read and write
1BF8F68D000
trusted library allocation
page read and write
1BF8DE68000
trusted library allocation
page read and write
1BF91BF7000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
25D86103000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF48000
heap
page read and write
1BFFFF41000
heap
page read and write
1BF97911000
trusted library allocation
page read and write
27EF1EFD000
heap
page read and write
1BF8E3F0000
trusted library allocation
page read and write
1BF8DF79000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BFFFF42000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF8F852000
trusted library allocation
page read and write
25D86111000
trusted library allocation
page read and write
25D860E7000
trusted library allocation
page read and write
1BF99FD1000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF909F4000
trusted library allocation
page read and write
1BF999CC000
trusted library allocation
page read and write
1BF8F416000
trusted library allocation
page read and write
1BF969D0000
trusted library allocation
page read and write
1BF97BC3000
trusted library allocation
page read and write
1BFFFF6E000
heap
page read and write
1BF99FFC000
trusted library allocation
page read and write
1BF8F4B1000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1BF90A25000
trusted library allocation
page read and write
1BF8EAB0000
trusted library allocation
page read and write
1C8D485A000
heap
page read and write
9DB000
stack
page read and write
1BF8FD3D000
trusted library allocation
page read and write
1BFFFF50000
heap
page read and write
1BFFFF6B000
heap
page read and write
1BFFFF34000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF8AE3B000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF9A9B2000
trusted library allocation
page read and write
27EF10A0000
trusted library allocation
page read and write
1BF97985000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF91B98000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF91BCF000
trusted library allocation
page read and write
1BF8FBB2000
trusted library allocation
page read and write
1BF8D882000
trusted library allocation
page read and write
1BF8E96E000
trusted library allocation
page read and write
1BF979E0000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BF9995E000
trusted library allocation
page read and write
1BF90981000
trusted library allocation
page read and write
1BF97B91000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BF8DF3D000
trusted library allocation
page read and write
1BF9AAA0000
trusted library allocation
page read and write
1BF97AB8000
trusted library allocation
page read and write
1BF8F437000
trusted library allocation
page read and write
1BF8B2F2000
trusted library allocation
page read and write
1BF97976000
trusted library allocation
page read and write
2860EC72000
trusted library allocation
page read and write
1BF916CC000
trusted library allocation
page read and write
1BF981BA000
trusted library allocation
page read and write
1BF9A873000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF9A365000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BF8E9D7000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
25D86023000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BFFFF41000
heap
page read and write
1BF90AED000
trusted library allocation
page read and write
1BF979C6000
trusted library allocation
page read and write
1BF8F4B4000
trusted library allocation
page read and write
1BF966F6000
trusted library allocation
page read and write
1BF996FE000
trusted library allocation
page read and write
1BF8DB8D000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF909C7000
trusted library allocation
page read and write
1BFFFF22000
heap
page read and write
1BF97AA9000
trusted library allocation
page read and write
1BFFFFB0000
heap
page read and write
1BF965BB000
trusted library allocation
page read and write
25D86083000
trusted library allocation
page read and write
AF703FF000
stack
page read and write
1BFFFF62000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF9A3B1000
trusted library allocation
page read and write
1BF8F1FC000
trusted library allocation
page read and write
25D85E12000
unclassified section
page read and write
1BF97BE6000
trusted library allocation
page read and write
1BF9692D000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
1BF969EE000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF969FB000
trusted library allocation
page read and write
2860E810000
heap
page read and write
1BFFFF72000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF96671000
trusted library allocation
page read and write
1BF89F17000
trusted library allocation
page read and write
1BF8F664000
trusted library allocation
page read and write
1BF8DB3C000
heap
page read and write
BE2000
unkown
page readonly
1BF97BBB000
trusted library allocation
page read and write
1BF967B9000
trusted library allocation
page read and write
1BFFFFAA000
heap
page read and write
1BF9A405000
heap
page read and write
1BFFFFB0000
heap
page read and write
1BFFFF56000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF8F839000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1C8D4840000
heap
page read and write
27EF18B3000
heap
page read and write
1BF8DB1B000
heap
page read and write
1BF8F1F7000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BF9A86B000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BFFFF52000
heap
page read and write
1BFFFFAA000
heap
page read and write
1BF8E9E3000
trusted library allocation
page read and write
1BF9A47F000
heap
page read and write
1BFFFF3A000
heap
page read and write
1BF8B2F2000
trusted library allocation
page read and write
27EF1EF0000
heap
page read and write
25D85E00000
heap
page readonly
1BFFFFA8000
heap
page read and write
1BF8E351000
trusted library allocation
page read and write
1BF8F63B000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BF89898000
trusted library allocation
page read and write
1BFFFFAA000
heap
page read and write
1BF8EA24000
trusted library allocation
page read and write
1BF9166F000
trusted library allocation
page read and write
27EF1F77000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF90A20000
trusted library allocation
page read and write
1BF8F69E000
trusted library allocation
page read and write
1BF9A4EC000
heap
page read and write
1BF96673000
trusted library allocation
page read and write
1BF9057E000
trusted library allocation
page read and write
1BF909C7000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF20000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF8FABC000
trusted library allocation
page read and write
1BF8FD90000
trusted library allocation
page read and write
1BF981E3000
trusted library allocation
page read and write
1BF8F6B7000
trusted library allocation
page read and write
DA4000
heap
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF89FA7000
trusted library allocation
page read and write
1BF8F6F7000
trusted library allocation
page read and write
1BF90691000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF50000
heap
page read and write
1BFFFF5F000
heap
page read and write
1BF8EA90000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF9797E000
trusted library allocation
page read and write
1BFFFF4C000
heap
page read and write
1BF8F940000
trusted library allocation
page read and write
1BF9677F000
trusted library allocation
page read and write
1BF969C4000
trusted library allocation
page read and write
1BF92507000
trusted library allocation
page read and write
1BF97A9E000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF8F6B2000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
25D86100000
trusted library allocation
page read and write
1BF8F6A2000
trusted library allocation
page read and write
DA4000
heap
page read and write
1BF8F877000
trusted library allocation
page read and write
1BF8DE4B000
trusted library allocation
page read and write
DA4000
heap
page read and write
1BF9991C000
trusted library allocation
page read and write
1BF8DF8D000
trusted library allocation
page read and write
1BF9A393000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF8F69E000
trusted library allocation
page read and write
1BFFFF4A000
heap
page read and write
1BF8F69E000
trusted library allocation
page read and write
1BF979DC000
trusted library allocation
page read and write
1BF90A30000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF9168D000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF6B000
heap
page read and write
1BFFFF5F000
heap
page read and write
25D85BA0000
unclassified section
page readonly
1BFFFF40000
heap
page read and write
1BF9677F000
trusted library allocation
page read and write
1C8D2C70000
heap
page read and write
1BF96677000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF967EE000
trusted library allocation
page read and write
1BF90976000
trusted library allocation
page read and write
1BF8DECE000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BF9A861000
trusted library allocation
page read and write
1BF8B244000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF8DDF6000
trusted library allocation
page read and write
1BF8B1B6000
trusted library allocation
page read and write
1BF96943000
trusted library allocation
page read and write
1BF9698B000
trusted library allocation
page read and write
1BF969C4000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF96539000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFF53000
heap
page read and write
1BFFFF41000
heap
page read and write
1BFFFF40000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF8B2EB000
trusted library allocation
page read and write
1C8D4852000
heap
page read and write
DA0000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF8B2A8000
trusted library allocation
page read and write
1BF9A861000
trusted library allocation
page read and write
1BF906C5000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8EAFE000
trusted library allocation
page read and write
1BF8FAF3000
trusted library allocation
page read and write
1BF8FD6A000
trusted library allocation
page read and write
27EF0F42000
unclassified section
page read and write
1BF9A8A0000
trusted library allocation
page read and write
1BF8F841000
trusted library allocation
page read and write
1BF8EAFA000
trusted library allocation
page read and write
27EF1F00000
heap
page read and write
1BF91B98000
trusted library allocation
page read and write
1BF9A47C000
heap
page read and write
1BFFFF5F000
heap
page read and write
27EF1EE8000
heap
page read and write
1BFFFF71000
heap
page read and write
1BF904B9000
trusted library allocation
page read and write
1BFFFF4D000
heap
page read and write
1BF8B250000
trusted library allocation
page read and write
1BF8FBD5000
trusted library allocation
page read and write
1BF8F6D1000
trusted library allocation
page read and write
1BF8FBDB000
trusted library allocation
page read and write
1BFFFF25000
heap
page read and write
1BF8E375000
trusted library allocation
page read and write
1BF8F6F9000
trusted library allocation
page read and write
1BFFFF7B000
heap
page read and write
1BFFFFA7000
heap
page read and write
1EEB1AA0000
heap
page read and write
1BF8DE75000
trusted library allocation
page read and write
1BF8E390000
trusted library allocation
page read and write
F98000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BFFFF48000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF8FD6C000
trusted library allocation
page read and write
1BF8F67F000
trusted library allocation
page read and write
1BF8B242000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF99FFC000
trusted library allocation
page read and write
1BF9A2E7000
trusted library allocation
page read and write
1BF8DB32000
heap
page read and write
1BF8F8ED000
trusted library allocation
page read and write
1BF979FE000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF68000
heap
page read and write
1BFFFF67000
heap
page read and write
1BFFFF3A000
heap
page read and write
1BF8B2C7000
trusted library allocation
page read and write
1BF8F83B000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF8E984000
trusted library allocation
page read and write
1BF9AAFB000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF8DB01000
heap
page read and write
1BF96999000
trusted library allocation
page read and write
27EF1F58000
heap
page read and write
1BFFFF3A000
heap
page read and write
1BF97B94000
trusted library allocation
page read and write
1BF96739000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BF8DB74000
heap
page read and write
1BF90978000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF8E958000
trusted library allocation
page read and write
1BF8F1D7000
trusted library allocation
page read and write
1BF9819A000
trusted library allocation
page read and write
1BF90571000
trusted library allocation
page read and write
1BF8F433000
trusted library allocation
page read and write
1BF9666E000
trusted library allocation
page read and write
1BF9A85F000
trusted library allocation
page read and write
1BF8FD65000
trusted library allocation
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF8E948000
trusted library allocation
page read and write
299000
stack
page read and write
1BFFFF69000
heap
page read and write
27EF1E09000
heap
page read and write
1BF8B2BE000
trusted library allocation
page read and write
1BF8E964000
trusted library allocation
page read and write
25D85E10000
unclassified section
page read and write
1BF9A2EB000
trusted library allocation
page read and write
1BF9A2E9000
trusted library allocation
page read and write
1BF981F3000
trusted library allocation
page read and write
1BF979D3000
trusted library allocation
page read and write
1BF97A87000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
AF703FC000
stack
page read and write
1BF8FDAB000
trusted library allocation
page read and write
1BF8F4BA000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
25D85F00000
trusted library allocation
page read and write
1BF8F9F9000
trusted library allocation
page read and write
1BF8AE50000
trusted library allocation
page read and write
1BF8E371000
trusted library allocation
page read and write
1BF91DF1000
trusted library allocation
page read and write
1BF8E968000
trusted library allocation
page read and write
1BF9671E000
trusted library allocation
page read and write
1BF97BF5000
trusted library allocation
page read and write
1BF9A406000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF42000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF97B91000
trusted library allocation
page read and write
1BF8B2EB000
trusted library allocation
page read and write
1BF8F6F9000
trusted library allocation
page read and write
2860F000000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF8B298000
trusted library allocation
page read and write
1BF9A844000
trusted library allocation
page read and write
1BF8E9CF000
trusted library allocation
page read and write
1BF8F833000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF8DE66000
trusted library allocation
page read and write
1BFFFF61000
heap
page read and write
1BF9298A000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF9A2B6000
trusted library allocation
page read and write
1BF90AB7000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF70000
heap
page read and write
1BFFFF4B000
heap
page read and write
1BF8B820000
trusted library allocation
page read and write
1BF90671000
trusted library allocation
page read and write
1BF8F837000
trusted library allocation
page read and write
1BF8F4B4000
trusted library allocation
page read and write
1BF99CFA000
trusted library allocation
page read and write
1BF89F7E000
trusted library allocation
page read and write
F66F7AE000
stack
page read and write
BBC000
unkown
page readonly
1BFFFF4B000
heap
page read and write
F8D97D8000
stack
page read and write
1BFFFF48000
heap
page read and write
1BF981BA000
trusted library allocation
page read and write
1BF8F4DF000
trusted library allocation
page read and write
1BF91BC0000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF8F4FC000
trusted library allocation
page read and write
1BF898EF000
trusted library allocation
page read and write
1BF9A88A000
trusted library allocation
page read and write
27EF0E90000
heap
page read and write
27EF1F44000
heap
page read and write
1BFFFF57000
heap
page read and write
1BFFFF53000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF9A9D0000
trusted library allocation
page read and write
1BFFFF5E000
heap
page read and write
1BF8E340000
trusted library allocation
page read and write
1BF8F4F2000
trusted library allocation
page read and write
1BF9AAFD000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF97BA1000
trusted library allocation
page read and write
1BF8E94C000
trusted library allocation
page read and write
1BF8EA90000
trusted library allocation
page read and write
1BF9A371000
trusted library allocation
page read and write
1BF8F19E000
trusted library allocation
page read and write
1BF8AE21000
trusted library allocation
page read and write
1BF966A9000
trusted library allocation
page read and write
1BF9AA79000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF57000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF90907000
trusted library allocation
page read and write
1BF8E9D7000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BFFFF46000
heap
page read and write
1BFFFF57000
heap
page read and write
1C8D2F0A000
trusted library allocation
page read and write
1BF8E33B000
trusted library allocation
page read and write
1BF97AB4000
trusted library allocation
page read and write
1BF9A2E5000
trusted library allocation
page read and write
1BF8DE65000
trusted library allocation
page read and write
1BF9AA66000
trusted library allocation
page read and write
1BFFFFD9000
heap
page read and write
1BF8F5FD000
trusted library allocation
page read and write
1BF91B94000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BF91B64000
trusted library allocation
page read and write
1BF9A9D8000
trusted library allocation
page read and write
1BF8F024000
trusted library allocation
page read and write
25D85EF3000
heap
page read and write
1BF97BFC000
trusted library allocation
page read and write
1BFFFF47000
heap
page read and write
1BFFFF24000
heap
page read and write
1BFFFF46000
heap
page read and write
1BF91675000
trusted library allocation
page read and write
27EF10F2000
unkown
page execute read
1BF99CF4000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BFFFFB0000
heap
page read and write
1BFFFF6B000
heap
page read and write
1BF96717000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
27EF13C4000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF8D8D7000
trusted library allocation
page read and write
1BF8DB7F000
heap
page read and write
1BF8F6D7000
trusted library allocation
page read and write
1BF8DB32000
heap
page read and write
1BF9A8A5000
trusted library allocation
page read and write
1BF89FA7000
trusted library allocation
page read and write
1BF8FD7D000
trusted library allocation
page read and write
1BFFFF50000
heap
page read and write
1BF97B8F000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BF8B2BE000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF8F982000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
FA9000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF8EAF1000
trusted library allocation
page read and write
1BF8B2C1000
trusted library allocation
page read and write
1BF9A2ED000
trusted library allocation
page read and write
1BF96994000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF8F65C000
trusted library allocation
page read and write
1BF96988000
trusted library allocation
page read and write
1BF909D3000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BF90AC8000
trusted library allocation
page read and write
FA3000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF9AAE8000
trusted library allocation
page read and write
1BF8FDD8000
trusted library allocation
page read and write
35B1000
heap
page read and write
1BF9066F000
trusted library allocation
page read and write
27EF1377000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
BEC000
unkown
page write copy
1BF8FA91000
trusted library allocation
page read and write
1BF8D663000
trusted library allocation
page read and write
1BF8FAC4000
trusted library allocation
page read and write
1BF9A876000
trusted library allocation
page read and write
1BF8B338000
trusted library allocation
page read and write
1BF8F9E3000
trusted library allocation
page read and write
1BF96671000
trusted library allocation
page read and write
1BF9A861000
trusted library allocation
page read and write
1BF97B1E000
trusted library allocation
page read and write
1BF8E9C3000
trusted library allocation
page read and write
1BF916CC000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF909D3000
trusted library allocation
page read and write
1BF979FE000
trusted library allocation
page read and write
1BF8E975000
trusted library allocation
page read and write
1C8D2D4E000
heap
page read and write
1BFFFF51000
heap
page read and write
1BF9A431000
heap
page read and write
1BF8DFA3000
trusted library allocation
page read and write
1BFFFF4E000
heap
page read and write
1BF90700000
trusted library allocation
page read and write
1BF90626000
trusted library allocation
page read and write
1BF8E9BA000
trusted library allocation
page read and write
1BF9256D000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
F8F27FE000
unkown
page readonly
1BF97950000
trusted library allocation
page read and write
25D86047000
trusted library allocation
page read and write
1BF8D6F5000
trusted library allocation
page read and write
1BF9094D000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF8DFD0000
trusted library allocation
page read and write
1BFFFFAF000
heap
page read and write
1BF8E390000
trusted library allocation
page read and write
1BF9A4D8000
heap
page read and write
1BFFFF4D000
heap
page read and write
1BF96677000
trusted library allocation
page read and write
1BF906D1000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFFA1000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF8DE6C000
trusted library allocation
page read and write
1BF8F699000
trusted library allocation
page read and write
1BF8ECD8000
trusted library allocation
page read and write
1BF97A7D000
trusted library allocation
page read and write
25D85E40000
unclassified section
page readonly
1BF9A1EC000
trusted library allocation
page read and write
25D86003000
trusted library allocation
page read and write
1BF9A864000
trusted library allocation
page read and write
1BF967A3000
trusted library allocation
page read and write
1BF8F49D000
trusted library allocation
page read and write
1BF8B2C7000
trusted library allocation
page read and write
1BFFFFC1000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF909C1000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF8EA26000
trusted library allocation
page read and write
27EF1EE0000
heap
page read and write
1BF96650000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF8F699000
trusted library allocation
page read and write
1BF8F4FC000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
1BFFFF57000
heap
page read and write
1BFFFF78000
heap
page read and write
1C8D2F07000
trusted library allocation
page read and write
1BF91DCE000
trusted library allocation
page read and write
1C8D2B60000
heap
page read and write
1BF9A866000
trusted library allocation
page read and write
1BF8F69E000
trusted library allocation
page read and write
27EF1F44000
heap
page read and write
1BF97BA6000
trusted library allocation
page read and write
1BF909C4000
trusted library allocation
page read and write
1BF8B2A6000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFF69000
heap
page read and write
1BF9A371000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF8F4F2000
trusted library allocation
page read and write
1BF8F8DA000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF41000
heap
page read and write
F8D8DBC000
stack
page read and write
1BF9A213000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF8F4BA000
trusted library allocation
page read and write
1BF8B250000
trusted library allocation
page read and write
25D85C10000
remote allocation
page read and write
1BFFFF57000
heap
page read and write
1BF96959000
trusted library allocation
page read and write
1BF96664000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF42000
heap
page read and write
1BFFFF4A000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF90B7E000
trusted library allocation
page read and write
1BF9A4D8000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF8DB77000
heap
page read and write
1BF8E9DA000
trusted library allocation
page read and write
27EF1EF2000
heap
page read and write
1BF8D6C5000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF9A406000
heap
page read and write
1BF979D3000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF97AB2000
trusted library allocation
page read and write
1BF979FA000
trusted library allocation
page read and write
1BF8ECEE000
trusted library allocation
page read and write
27EF0E00000
unclassified section
page readonly
27EF1E64000
heap
page read and write
1BF909CF000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
1BF9677B000
trusted library allocation
page read and write
1BF8DE6A000
trusted library allocation
page read and write
1BF8E9DA000
trusted library allocation
page read and write
1BF8DF79000
trusted library allocation
page read and write
1BF99F88000
trusted library allocation
page read and write
1BFFFFAA000
heap
page read and write
1BF8B23E000
trusted library allocation
page read and write
1BF8F68D000
trusted library allocation
page read and write
1BF8F4C2000
trusted library allocation
page read and write
1BF96994000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF9046C000
trusted library allocation
page read and write
1BF8DEA5000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BFFFF42000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF96733000
trusted library allocation
page read and write
1BF99CC1000
trusted library allocation
page read and write
1BF969A9000
trusted library allocation
page read and write
1BF99F88000
trusted library allocation
page read and write
1BF9A88F000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BFFFF67000
heap
page read and write
1BFFFF5F000
heap
page read and write
1BF9A403000
heap
page read and write
1BF91642000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF981AE000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF8DD9D000
trusted library allocation
page read and write
1BF90CD1000
trusted library allocation
page read and write
1BF8AE32000
trusted library allocation
page read and write
1BF8D662000
trusted library allocation
page read and write
1BF8AE6D000
trusted library allocation
page read and write
1BF8DD36000
trusted library allocation
page read and write
27EF137A000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BFFFF61000
heap
page read and write
1BF9675A000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
F8EFFD8000
stack
page read and write
1BFFFF46000
heap
page read and write
1BFFFF78000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF925C5000
trusted library allocation
page read and write
1BF8F8F1000
trusted library allocation
page read and write
1BFFFF70000
heap
page read and write
1BF9250C000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BF9A853000
trusted library allocation
page read and write
1BF9A85F000
trusted library allocation
page read and write
1BF8E9EB000
trusted library allocation
page read and write
1BF8DEA5000
trusted library allocation
page read and write
1BFFFF4C000
heap
page read and write
1BF8DFBE000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF9A9FA000
trusted library allocation
page read and write
1BF97957000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF8DE47000
trusted library allocation
page read and write
1BF8DECE000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BF90C6E000
trusted library allocation
page read and write
1BF9A2E3000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BF8E9DE000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF96668000
trusted library allocation
page read and write
1BF9AA49000
trusted library allocation
page read and write
1BF9A8A3000
trusted library allocation
page read and write
1BF8F4B3000
trusted library allocation
page read and write
1BF96694000
trusted library allocation
page read and write
1BF97975000
trusted library allocation
page read and write
1BF916DC000
trusted library allocation
page read and write
1BF8FA97000
trusted library allocation
page read and write
1BFFFFA1000
heap
page read and write
1BF965A8000
trusted library allocation
page read and write
1BF9819A000
trusted library allocation
page read and write
DA4000
heap
page read and write
1BFFFF77000
heap
page read and write
1BF8F809000
trusted library allocation
page read and write
1BF8F993000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
27EF1F58000
heap
page read and write
1BF98192000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BFFFF3C000
heap
page read and write
1BFFFF39000
heap
page read and write
1BF9A40B000
heap
page read and write
1BF97BFC000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF981BE000
trusted library allocation
page read and write
1BF9AAE8000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF9A2E7000
trusted library allocation
page read and write
27EF132F000
trusted library allocation
page read and write
1BF8F60E000
trusted library allocation
page read and write
1BF91679000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
1BFFFF67000
heap
page read and write
27EF1366000
trusted library allocation
page read and write
1BF8FAC9000
trusted library allocation
page read and write
1BF8E3F2000
trusted library allocation
page read and write
1BF8D6DC000
trusted library allocation
page read and write
1BF909F9000
trusted library allocation
page read and write
1BF9090E000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF78000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BF9A866000
trusted library allocation
page read and write
FB4000
heap
page read and write
1BF909CF000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
27EF1E4D000
heap
page read and write
1BF92606000
trusted library allocation
page read and write
1BF9AA6F000
trusted library allocation
page read and write
1BF8EA98000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF52000
heap
page read and write
1BFFFF50000
heap
page read and write
1BF8F493000
trusted library allocation
page read and write
1BF8EAE4000
trusted library allocation
page read and write
1BF8DFBE000
trusted library allocation
page read and write
1BF8E389000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF91717000
trusted library allocation
page read and write
25D8602E000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BF89FBB000
trusted library allocation
page read and write
1BF8DE9E000
trusted library allocation
page read and write
1BF8F40C000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BFFFFB0000
heap
page read and write
1BF898CB000
trusted library allocation
page read and write
1BF8F4A2000
trusted library allocation
page read and write
1BFFFF4B000
heap
page read and write
1BF96000000
trusted library allocation
page read and write
1BF8F67C000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF917B4000
trusted library allocation
page read and write
1BF96982000
trusted library allocation
page read and write
1BF8DB5E000
heap
page read and write
1BF965E8000
trusted library allocation
page read and write
1BF97BBD000
trusted library allocation
page read and write
1BFFFFB7000
heap
page read and write
1BF8B250000
trusted library allocation
page read and write
1BFFFF2D000
heap
page read and write
1BF90AC4000
trusted library allocation
page read and write
1BF8DB32000
heap
page read and write
1BF8F412000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF8DF73000
trusted library allocation
page read and write
1BF8F879000
trusted library allocation
page read and write
1BFFFFB0000
heap
page read and write
1BFFFF32000
heap
page read and write
1BF96942000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF9A850000
trusted library allocation
page read and write
1BF979A3000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF97BF5000
trusted library allocation
page read and write
1BF8E382000
trusted library allocation
page read and write
27EF1EE8000
heap
page read and write
1BF8E351000
trusted library allocation
page read and write
1BF97B9C000
trusted library allocation
page read and write
25D86207000
heap
page read and write
1BF8DE77000
trusted library allocation
page read and write
27EF13F3000
trusted library allocation
page read and write
1BF8DE66000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF9A274000
trusted library allocation
page read and write
1BF969A1000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BF90700000
trusted library allocation
page read and write
1BF90696000
trusted library allocation
page read and write
1C8D2D63000
heap
page read and write
F6701D8000
stack
page read and write
1BFFFF48000
heap
page read and write
1BFFFF46000
heap
page read and write
1BF9668C000
trusted library allocation
page read and write
1BF96671000
trusted library allocation
page read and write
1BF8F68D000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF979FE000
trusted library allocation
page read and write
1BFFFFA8000
heap
page read and write
1BF8F493000
trusted library allocation
page read and write
1BF89FA3000
trusted library allocation
page read and write
1BF8E3C3000
trusted library allocation
page read and write
1BF9997C000
trusted library allocation
page read and write
1BF965AB000
trusted library allocation
page read and write
1BF8F6BD000
trusted library allocation
page read and write
1BF8EAB4000
trusted library allocation
page read and write
1BF8B29D000
trusted library allocation
page read and write
1BFFFF6E000
heap
page read and write
27EF1E60000
heap
page read and write
1BFFFF46000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF8F6DF000
trusted library allocation
page read and write
1BF98CA7000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF97BED000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
2860ECB6000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF90AA9000
trusted library allocation
page read and write
1BF99FFC000
trusted library allocation
page read and write
1BF96529000
trusted library allocation
page read and write
1BFFFFA1000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF8E9DA000
trusted library allocation
page read and write
1BFFFF4B000
heap
page read and write
1BF969A2000
trusted library allocation
page read and write
1BF97A84000
trusted library allocation
page read and write
F8DC17E000
unkown
page readonly
1BF9A2E9000
trusted library allocation
page read and write
1BF969C9000
trusted library allocation
page read and write
1BF8B1A3000
trusted library allocation
page read and write
1BFFFFB5000
heap
page read and write
1BF8E966000
trusted library allocation
page read and write
1BF8DB68000
heap
page read and write
A3E000
stack
page read and write
1BFFFF23000
heap
page read and write
1BF97BBB000
trusted library allocation
page read and write
FA6000
heap
page read and write
1EEB1E07000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF8F6D7000
trusted library allocation
page read and write
1BF8FAC4000
trusted library allocation
page read and write
1BF8B229000
trusted library allocation
page read and write
1BF8E9C3000
trusted library allocation
page read and write
1BF8F48E000
trusted library allocation
page read and write
1BFFFF39000
heap
page read and write
1BFFFF62000
heap
page read and write
27EF1E5C000
heap
page read and write
1BF8E9DA000
trusted library allocation
page read and write
1BF9172E000
trusted library allocation
page read and write
1BF96671000
trusted library allocation
page read and write
1BF8F805000
trusted library allocation
page read and write
1BF8E9E1000
trusted library allocation
page read and write
1BF979FC000
trusted library allocation
page read and write
1BF981E3000
trusted library allocation
page read and write
1BF9666B000
trusted library allocation
page read and write
1BF8DF7D000
trusted library allocation
page read and write
1BFFFF61000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF97990000
trusted library allocation
page read and write
1BF8F8CD000
trusted library allocation
page read and write
1BFFFF56000
heap
page read and write
1BFFFF6B000
heap
page read and write
1BF9A365000
trusted library allocation
page read and write
1BF8EA7E000
trusted library allocation
page read and write
1BF8F877000
trusted library allocation
page read and write
1BFFFF69000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BFFFF35000
heap
page read and write
1BFFFF5F000
heap
page read and write
1BF97B91000
trusted library allocation
page read and write
1BFFFFAA000
heap
page read and write
1BF9792C000
trusted library allocation
page read and write
1BF8FDD5000
trusted library allocation
page read and write
27EF1EF0000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF91B92000
trusted library allocation
page read and write
1BF90988000
trusted library allocation
page read and write
1BFFFFAB000
heap
page read and write
1BF98D2C000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BF9AA79000
trusted library allocation
page read and write
1BF9A24D000
trusted library allocation
page read and write
1BF8E984000
trusted library allocation
page read and write
1BF8DE7A000
trusted library allocation
page read and write
1BF981F8000
trusted library allocation
page read and write
27EF130A000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF95FC8000
trusted library allocation
page read and write
1BFFFF56000
heap
page read and write
1BFFFF5F000
heap
page read and write
1BF8DE61000
trusted library allocation
page read and write
1BF8E9C0000
trusted library allocation
page read and write
1BF8FD8A000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF57000
heap
page read and write
1BFFFF41000
heap
page read and write
1BF8FBDB000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF90988000
trusted library allocation
page read and write
1BF8D6CB000
trusted library allocation
page read and write
1BF8E988000
trusted library allocation
page read and write
27EF0ED0000
heap
page read and write
1BF91D2F000
trusted library allocation
page read and write
1BF8E9DB000
trusted library allocation
page read and write
1BF969A9000
trusted library allocation
page read and write
1BF97BC7000
trusted library allocation
page read and write
F98000
heap
page read and write
1EEB1B19000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF8F8DC000
trusted library allocation
page read and write
1BFFFF73000
heap
page read and write
1BF8E988000
trusted library allocation
page read and write
1BF90A2E000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF8FD7D000
trusted library allocation
page read and write
1BFFFF73000
heap
page read and write
1BF9A88F000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF8EAE0000
trusted library allocation
page read and write
1BFFFFB1000
heap
page read and write
1BF97BFC000
trusted library allocation
page read and write
1BF965E3000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BF8DD92000
trusted library allocation
page read and write
1BF8EAF4000
trusted library allocation
page read and write
1BF9094D000
trusted library allocation
page read and write
27EF1F2A000
heap
page read and write
1BF8E3D8000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
BE2000
unkown
page readonly
1BF969E3000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF9A87F000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BF8DB68000
heap
page read and write
1BF8B2F6000
trusted library allocation
page read and write
1BF8FA89000
trusted library allocation
page read and write
1BF9A9DA000
trusted library allocation
page read and write
1BF98600000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF96680000
trusted library allocation
page read and write
1BF8F6B5000
trusted library allocation
page read and write
1BF9A449000
heap
page read and write
1BF8EA24000
trusted library allocation
page read and write
1BF89FB2000
trusted library allocation
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF68000
heap
page read and write
1BFFFF74000
heap
page read and write
1BF96661000
trusted library allocation
page read and write
1BF8FD05000
trusted library allocation
page read and write
1BF8F8D8000
trusted library allocation
page read and write
27EF12E0000
heap
page read and write
1B6E000
stack
page read and write
27EF136F000
trusted library allocation
page read and write
1BF89F26000
trusted library allocation
page read and write
1BF97BB1000
trusted library allocation
page read and write
1BF9A450000
heap
page read and write
1BFFFF78000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF8DB7F000
heap
page read and write
1BF9AA4C000
trusted library allocation
page read and write
1BF90939000
trusted library allocation
page read and write
1BF8DEA5000
trusted library allocation
page read and write
2860EF07000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF8F4E1000
trusted library allocation
page read and write
1BF9A861000
trusted library allocation
page read and write
1BF9A815000
trusted library allocation
page read and write
27EF1300000
trusted library allocation
page read and write
1BF9A85F000
trusted library allocation
page read and write
1BF8DB32000
heap
page read and write
2860E770000
unclassified section
page readonly
1BF95FD6000
trusted library allocation
page read and write
1BF925E4000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF9A885000
trusted library allocation
page read and write
1BF8F1F1000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF9677D000
trusted library allocation
page read and write
1BF9A403000
heap
page read and write
1BF909D9000
trusted library allocation
page read and write
25D86205000
heap
page read and write
1BF9A866000
trusted library allocation
page read and write
1BF97BF7000
trusted library allocation
page read and write
1BF91BC3000
trusted library allocation
page read and write
1BF99935000
trusted library allocation
page read and write
1BF9A247000
trusted library allocation
page read and write
1BF90599000
trusted library allocation
page read and write
1BF8EAA3000
trusted library allocation
page read and write
1BFFFFB3000
heap
page read and write
1BF969FB000
trusted library allocation
page read and write
1BF96714000
trusted library allocation
page read and write
C7C65FE000
stack
page read and write
1BF8F4DF000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BF909C7000
trusted library allocation
page read and write
1BF8F9C6000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF9291C000
trusted library allocation
page read and write
1BF8FBCD000
trusted library allocation
page read and write
1BF9653B000
trusted library allocation
page read and write
1BF8B29A000
trusted library allocation
page read and write
1BF9666B000
trusted library allocation
page read and write
1BF8F6C7000
trusted library allocation
page read and write
1BF8DD2C000
trusted library allocation
page read and write
1BF8B2A1000
trusted library allocation
page read and write
1BF8F69D000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BF99400000
trusted library allocation
page read and write
1BF909CB000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BF9995E000
trusted library allocation
page read and write
1BFFFFD3000
heap
page read and write
1BF97BA1000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF9793B000
trusted library allocation
page read and write
F9F000
heap
page read and write
1BF9A876000
trusted library allocation
page read and write
1BFFFFD9000
heap
page read and write
1BF8B2BE000
trusted library allocation
page read and write
1BF906DD000
trusted library allocation
page read and write
27EF1F6A000
heap
page read and write
1BF91B1F000
trusted library allocation
page read and write
1BF9A863000
trusted library allocation
page read and write
1BF99970000
trusted library allocation
page read and write
1BF97BBB000
trusted library allocation
page read and write
27EF1F3B000
heap
page read and write
1BF8FBC6000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BF90963000
trusted library allocation
page read and write
1BFFFFA1000
heap
page read and write
1BF8DE47000
trusted library allocation
page read and write
1BF917CF000
trusted library allocation
page read and write
1BF8DB71000
heap
page read and write
1BFFFF78000
heap
page read and write
27EF1F58000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF9A817000
trusted library allocation
page read and write
1BF9666E000
trusted library allocation
page read and write
1BFFFF35000
heap
page read and write
C7C4DFD000
stack
page read and write
1BF9A9DE000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
1BF8B2BE000
trusted library allocation
page read and write
1BF8EAE9000
trusted library allocation
page read and write
1BF8F4AA000
trusted library allocation
page read and write
1BF96939000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF8F960000
trusted library allocation
page read and write
1BF9A45A000
heap
page read and write
1BF98C4D000
trusted library allocation
page read and write
1C8D2D6A000
heap
page read and write
27EF1E7D000
heap
page read and write
1BF9A40F000
heap
page read and write
1BF99CE0000
trusted library allocation
page read and write
1BF8DF79000
trusted library allocation
page read and write
1BF967B9000
trusted library allocation
page read and write
1BF90940000
trusted library allocation
page read and write
2860EA10000
unclassified section
page readonly
1BFFFFA7000
heap
page read and write
1BF909F9000
trusted library allocation
page read and write
1BF8FDA2000
trusted library allocation
page read and write
27EF1F58000
heap
page read and write
27EF1EF0000
heap
page read and write
1BF91825000
trusted library allocation
page read and write
1BF9A81B000
trusted library allocation
page read and write
1BFFFFD1000
heap
page read and write
1BF8EA38000
trusted library allocation
page read and write
1BFFFF49000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF40000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF967A3000
trusted library allocation
page read and write
1BF8E9A3000
trusted library allocation
page read and write
1BF8B229000
trusted library allocation
page read and write
1BF8F4B1000
trusted library allocation
page read and write
F6711FE000
stack
page read and write
1BF8F4FC000
trusted library allocation
page read and write
2860ED20000
heap
page read and write
1BF8B82E000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF4B000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF9A241000
trusted library allocation
page read and write
1BF8F66B000
trusted library allocation
page read and write
1BF979FC000
trusted library allocation
page read and write
1BFFFF51000
heap
page read and write
1BF99693000
trusted library allocation
page read and write
3ADF63A03000
trusted library allocation
page read and write
1BF91B8B000
trusted library allocation
page read and write
1BF91BFE000
trusted library allocation
page read and write
1BF9A35D000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BF8DE65000
trusted library allocation
page read and write
1BF9A9D8000
trusted library allocation
page read and write
27EF1890000
heap
page read and write
1BF97AC5000
trusted library allocation
page read and write
1BF979DC000
trusted library allocation
page read and write
1BF9A241000
trusted library allocation
page read and write
1BF90449000
trusted library allocation
page read and write
1BF97929000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF62000
heap
page read and write
1BF8B267000
trusted library allocation
page read and write
1BF96951000
trusted library allocation
page read and write
1BF9A847000
trusted library allocation
page read and write
1BF8DE9E000
trusted library allocation
page read and write
1BF8FBE5000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF97B88000
trusted library allocation
page read and write
27EF1EE1000
heap
page read and write
1BFFFF61000
heap
page read and write
1BFFFF32000
heap
page read and write
1BF8F4EF000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF8DEA5000
trusted library allocation
page read and write
1BF9A81C000
trusted library allocation
page read and write
1BF909F9000
trusted library allocation
page read and write
1BF99CEA000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF8AE33000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFF5F000
heap
page read and write
1BF9A456000
heap
page read and write
FC0000
heap
page read and write
1BFFFF48000
heap
page read and write
BF0000
unkown
page write copy
27EF1EB9000
heap
page read and write
27EF12E4000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF89EF6000
trusted library allocation
page read and write
27EF1F58000
heap
page read and write
1BF99F04000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF51000
heap
page read and write
25D86200000
heap
page read and write
1BF8E95F000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BF8F66B000
trusted library allocation
page read and write
1BF8FD6F000
trusted library allocation
page read and write
1BF90CE7000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BF97AA4000
trusted library allocation
page read and write
1BF8FD3D000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BF8D662000
trusted library allocation
page read and write
1BF898CD000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8DB75000
heap
page read and write
1BF90AD2000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BF99928000
trusted library allocation
page read and write
1BF979E5000
trusted library allocation
page read and write
1BF8DF90000
trusted library allocation
page read and write
1BF9A2B6000
trusted library allocation
page read and write
1BF95FEA000
trusted library allocation
page read and write
1BF8DB28000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF62000
heap
page read and write
1BF91B77000
trusted library allocation
page read and write
1BF8E9D7000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BFFFF67000
heap
page read and write
1BFFFF9A000
heap
page read and write
FBB000
heap
page read and write
25D85BB0000
unclassified section
page readonly
1BFFFF78000
heap
page read and write
1BF90C8C000
trusted library allocation
page read and write
27EF1E7D000
heap
page read and write
1BF8B242000
trusted library allocation
page read and write
1BF91AFB000
trusted library allocation
page read and write
1BF969F1000
trusted library allocation
page read and write
1BF8F4CA000
trusted library allocation
page read and write
1BF8F6D7000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BFFFF3A000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF8F615000
trusted library allocation
page read and write
1BF981B2000
trusted library allocation
page read and write
27EF1E8A000
heap
page read and write
1BFFFF29000
heap
page read and write
1BF9A870000
trusted library allocation
page read and write
1BF906D1000
trusted library allocation
page read and write
1BF8EAA3000
trusted library allocation
page read and write
1BF8DB68000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF3A000
heap
page read and write
1BFFFF3A000
heap
page read and write
1BF98177000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF97BDE000
trusted library allocation
page read and write
1BF8EAF9000
trusted library allocation
page read and write
1BFFFF69000
heap
page read and write
1BF965BB000
trusted library allocation
page read and write
1BF97BED000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
27EF1E7F000
heap
page read and write
1BF97BD0000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF969BB000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
2860E8A0000
heap
page readonly
1BF925A3000
trusted library allocation
page read and write
1BF9092C000
trusted library allocation
page read and write
1BFFFF66000
heap
page read and write
1BF8FDB1000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFFD1000
heap
page read and write
1BF968EB000
trusted library allocation
page read and write
1BF9A88A000
trusted library allocation
page read and write
1BF8D6F5000
trusted library allocation
page read and write
1BF909D5000
trusted library allocation
page read and write
1BF89881000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF8B283000
trusted library allocation
page read and write
1BF8FD36000
trusted library allocation
page read and write
1BF90665000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF34000
heap
page read and write
1BFFFFA0000
heap
page read and write
1BFFFF57000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BFFFF34000
heap
page read and write
1BF8F49D000
trusted library allocation
page read and write
1BF8F83E000
trusted library allocation
page read and write
25D85DA0000
heap
page read and write
1BF91BCF000
trusted library allocation
page read and write
1BF97BB8000
trusted library allocation
page read and write
27EF1E69000
heap
page read and write
1BFFFF29000
heap
page read and write
1BF904C4000
trusted library allocation
page read and write
1BFFFF71000
heap
page read and write
1BF898EF000
trusted library allocation
page read and write
1BFFFF5B000
heap
page read and write
1BF99CFA000
trusted library allocation
page read and write
1BF97AAB000
trusted library allocation
page read and write
1BF8F65C000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF68000
heap
page read and write
27EF13BF000
trusted library allocation
page read and write
1BF8F4B7000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BF8DD0A000
trusted library allocation
page read and write
1BF8DAE9000
heap
page read and write
27EF1F21000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BF91667000
trusted library allocation
page read and write
25D8610C000
trusted library allocation
page read and write
27EF1E60000
heap
page read and write
1BFFFF9A000
heap
page read and write
3BCC3E6D000
trusted library allocation
page execute read
1BFFFF40000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF97BF7000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BFFFF53000
heap
page read and write
25D85DD6000
heap
page read and write
1BF8DFC4000
trusted library allocation
page read and write
1BF8F8ED000
trusted library allocation
page read and write
1BF9AA11000
trusted library allocation
page read and write
1BFFFFD9000
heap
page read and write
1BF9247F000
trusted library allocation
page read and write
1BFFFF3D000
heap
page read and write
1BF8B298000
trusted library allocation
page read and write
1BF8DB77000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF8F6DF000
trusted library allocation
page read and write
1BF8DD4A000
trusted library allocation
page read and write
1BF9A88A000
trusted library allocation
page read and write
1BF8F183000
trusted library allocation
page read and write
1BF9A853000
trusted library allocation
page read and write
1C8D4843000
heap
page read and write
1BFFFF70000
heap
page read and write
27EF1F6A000
heap
page read and write
1BF98177000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF9667E000
trusted library allocation
page read and write
1BF98D57000
trusted library allocation
page read and write
1BF8B2DD000
trusted library allocation
page read and write
1BFFFF7B000
heap
page read and write
1BF8B244000
trusted library allocation
page read and write
1BF9A406000
heap
page read and write
1BFFFF57000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF8B245000
trusted library allocation
page read and write
1BF8F4B7000
trusted library allocation
page read and write
1BF8F43A000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BF9A85F000
trusted library allocation
page read and write
1BFFFF74000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF8F9BB000
trusted library allocation
page read and write
1C8D3090000
heap
page read and write
1BF9AACD000
trusted library allocation
page read and write
1BF9667B000
trusted library allocation
page read and write
1BF99F10000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF8F9C1000
trusted library allocation
page read and write
27EF0EB0000
heap
page read and write
1BF96677000
trusted library allocation
page read and write
1BFFFF56000
heap
page read and write
1BF90CAB000
trusted library allocation
page read and write
1BF91BF7000
trusted library allocation
page read and write
1BF8B211000
trusted library allocation
page read and write
1BF96782000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF99CD8000
trusted library allocation
page read and write
1BF8EA48000
trusted library allocation
page read and write
1BF8F8F3000
trusted library allocation
page read and write
1BF9A84E000
trusted library allocation
page read and write
27EF1348000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF909A1000
trusted library allocation
page read and write
1BF8F629000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF8F1ED000
trusted library allocation
page read and write
1BFFFF54000
heap
page read and write
1BF97F00000
trusted library allocation
page read and write
1BF9A495000
heap
page read and write
1BFFFF4E000
heap
page read and write
1BF8B28C000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
DB0000
trusted library allocation
page read and write
1BF97A80000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BF9667E000
trusted library allocation
page read and write
1BF8DB77000
heap
page read and write
1BF90A3F000
trusted library allocation
page read and write
1BF8E979000
trusted library allocation
page read and write
27EF0F5A000
heap
page read and write
27EF1F77000
heap
page read and write
1BF96814000
trusted library allocation
page read and write
1BF9991F000
trusted library allocation
page read and write
1BF90946000
trusted library allocation
page read and write
1BF8B2BC000
trusted library allocation
page read and write
1BF9A406000
heap
page read and write
1BF90CB5000
trusted library allocation
page read and write
1BF8B1A1000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF68000
heap
page read and write
1BF990A8000
trusted library allocation
page read and write
1BF965B1000
trusted library allocation
page read and write
1BFFFF68000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF9A844000
trusted library allocation
page read and write
1BF97B88000
trusted library allocation
page read and write
1BF9A405000
heap
page read and write
1BF9AA8C000
trusted library allocation
page read and write
27EF1060000
trusted library section
page readonly
1BF965A9000
trusted library allocation
page read and write
1BFFFFB0000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BF8DFBE000
trusted library allocation
page read and write
1BFFFF4A000
heap
page read and write
1BF8F882000
trusted library allocation
page read and write
1BF99CCF000
trusted library allocation
page read and write
1BF909F4000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF97BBF000
trusted library allocation
page read and write
1BFFFF5B000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF8DD63000
trusted library allocation
page read and write
1BF99CE0000
trusted library allocation
page read and write
1BF979F9000
trusted library allocation
page read and write
1BF966FE000
trusted library allocation
page read and write
1BF8F674000
trusted library allocation
page read and write
2860E99F000
unclassified section
page read and write
1BFFFF57000
heap
page read and write
1BF9798C000
trusted library allocation
page read and write
1BF8E9A8000
trusted library allocation
page read and write
1BF969FB000
trusted library allocation
page read and write
1BF966F6000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF91B64000
trusted library allocation
page read and write
1BF979B2000
trusted library allocation
page read and write
1BF9798E000
trusted library allocation
page read and write
1BF969E9000
trusted library allocation
page read and write
2860EC30000
trusted library allocation
page read and write
1BF9094E000
trusted library allocation
page read and write
1BF8F4BA000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF99FF0000
trusted library allocation
page read and write
1BF99F8A000
trusted library allocation
page read and write
1BF8B244000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF8B32A000
trusted library allocation
page read and write
1BF8D8F4000
trusted library allocation
page read and write
1BF8E95F000
trusted library allocation
page read and write
1C8D2D61000
heap
page read and write
1BF97B43000
trusted library allocation
page read and write
1BF9A863000
trusted library allocation
page read and write
1BF8E9D7000
trusted library allocation
page read and write
1BF9664D000
trusted library allocation
page read and write
1BF8F4FC000
trusted library allocation
page read and write
1BF96735000
trusted library allocation
page read and write
FC2000
heap
page read and write
1BF8FBE4000
trusted library allocation
page read and write
1BF90484000
trusted library allocation
page read and write
1BF9666B000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF9A86F000
trusted library allocation
page read and write
1BF8FD7A000
trusted library allocation
page read and write
1BF98C48000
trusted library allocation
page read and write
1BF8D6FB000
trusted library allocation
page read and write
1BF8B223000
trusted library allocation
page read and write
1C8D2D20000
heap
page read and write
25D860C7000
trusted library allocation
page read and write
1BF906DD000
trusted library allocation
page read and write
1BF898B3000
trusted library allocation
page read and write
1BF9A40B000
heap
page read and write
1BF906B5000
trusted library allocation
page read and write
1BF8B29D000
trusted library allocation
page read and write
2860EC13000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BF8B2AA000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF8EAE0000
trusted library allocation
page read and write
1BFFFF71000
heap
page read and write
25D8607B000
trusted library allocation
page read and write
1BF8FBF6000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF98B87000
trusted library allocation
page read and write
1BF909D5000
trusted library allocation
page read and write
1BF9AAB6000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BFFFFA1000
heap
page read and write
1BFFFF26000
heap
page read and write
1BF965B3000
trusted library allocation
page read and write
1BF909CB000
trusted library allocation
page read and write
1BF8E9A8000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
2860E990000
unclassified section
page read and write
1BFFFF3A000
heap
page read and write
1BF9160E000
trusted library allocation
page read and write
1BF9819F000
trusted library allocation
page read and write
1BF965E3000
trusted library allocation
page read and write
27EF135C000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF9677B000
trusted library allocation
page read and write
1BF9A878000
trusted library allocation
page read and write
1BF8F841000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFF42000
heap
page read and write
1BFFFF46000
heap
page read and write
1BF8F68D000
trusted library allocation
page read and write
1BF8EA7C000
trusted library allocation
page read and write
27EF1EAA000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF8B23E000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
27EF1F22000
heap
page read and write
1BF8B2A8000
trusted library allocation
page read and write
1BF8F456000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF9A2E5000
trusted library allocation
page read and write
25D86096000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
F9A000
heap
page read and write
1BFFFF51000
heap
page read and write
1BF8DD8D000
trusted library allocation
page read and write
1BFFFFB0000
heap
page read and write
1BF8F4CA000
trusted library allocation
page read and write
27EF1EE0000
heap
page read and write
1BF8DFCC000
trusted library allocation
page read and write
25D86000000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF99F7E000
trusted library allocation
page read and write
1BF8FD6C000
trusted library allocation
page read and write
1BF8F825000
trusted library allocation
page read and write
27EF1EF0000
heap
page read and write
1BF9AAB6000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFF61000
heap
page read and write
1BFFFF4E000
heap
page read and write
27EF13E9000
trusted library allocation
page read and write
1BF96664000
trusted library allocation
page read and write
1BF9667B000
trusted library allocation
page read and write
1BF91B6B000
trusted library allocation
page read and write
1BF8B186000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BF8D6E1000
trusted library allocation
page read and write
1BF9A84F000
trusted library allocation
page read and write
1BF97D00000
trusted library allocation
page read and write
1BFFFF70000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF916C7000
trusted library allocation
page read and write
1BF9A853000
trusted library allocation
page read and write
1BF8DFA3000
trusted library allocation
page read and write
1BF9667E000
trusted library allocation
page read and write
1BFFFF70000
heap
page read and write
27EF1EFD000
heap
page read and write
1BF9A365000
trusted library allocation
page read and write
1BF8F8F7000
trusted library allocation
page read and write
1BF8DE70000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFFB3000
heap
page read and write
1BF8D88F000
trusted library allocation
page read and write
1BF8E958000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BFFFF40000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BF8DFBE000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF9677D000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF9667E000
trusted library allocation
page read and write
1BF99F04000
trusted library allocation
page read and write
F66F7EE000
unkown
page readonly
1BF8F699000
trusted library allocation
page read and write
1BF8B2F2000
trusted library allocation
page read and write
1BF90C7D000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF8A000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF909D9000
trusted library allocation
page read and write
1BFFFF6A000
heap
page read and write
1BF8F688000
trusted library allocation
page read and write
1BF8E3FA000
trusted library allocation
page read and write
1BF8DFD2000
trusted library allocation
page read and write
1BF91B91000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF969DD000
trusted library allocation
page read and write
1BF8AEB3000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BF8FBAA000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF9A408000
heap
page read and write
1BF8EA82000
trusted library allocation
page read and write
1BF909C7000
trusted library allocation
page read and write
1BF8F6B5000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF8FBF6000
trusted library allocation
page read and write
27EF1E60000
heap
page read and write
2860E7E5000
remote allocation
page execute read
1BFFFF52000
heap
page read and write
1BFFFF24000
heap
page read and write
27EF1F21000
heap
page read and write
1BFFFFA0000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BF8DE84000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF90AC4000
trusted library allocation
page read and write
1BF8F6A2000
trusted library allocation
page read and write
25D860B7000
trusted library allocation
page read and write
1BFFFFC1000
heap
page read and write
1BF8E9EE000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF5B000
heap
page read and write
1BFFFF70000
heap
page read and write
1BF97B55000
trusted library allocation
page read and write
1BF9669F000
trusted library allocation
page read and write
1BF8F837000
trusted library allocation
page read and write
1BF8E988000
trusted library allocation
page read and write
27EF1E6C000
heap
page read and write
1BF8DF9B000
trusted library allocation
page read and write
FA2000
heap
page read and write
1BF97958000
trusted library allocation
page read and write
2860E8B0000
heap
page read and write
1BF9995E000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1BFFFF68000
heap
page read and write
1BF90973000
trusted library allocation
page read and write
1BF9A1E2000
trusted library allocation
page read and write
1BF8DD9F000
trusted library allocation
page read and write
1BF979E1000
trusted library allocation
page read and write
1BFFFF71000
heap
page read and write
1BFFFF7E000
heap
page read and write
1BF8EAE0000
trusted library allocation
page read and write
1BF979C8000
trusted library allocation
page read and write
1BF98C6D000
trusted library allocation
page read and write
1BF97A1E000
trusted library allocation
page read and write
1C8D484D000
heap
page read and write
1BF9AA4E000
trusted library allocation
page read and write
1BF916FD000
trusted library allocation
page read and write
1BF8F68D000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BFFFF5D000
heap
page read and write
F66F6EE000
unkown
page readonly
1BF8DF9B000
trusted library allocation
page read and write
1BFFFF72000
heap
page read and write
1BF8F872000
trusted library allocation
page read and write
1BF91D84000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
1BF99CC5000
trusted library allocation
page read and write
1BFFFFA9000
heap
page read and write
1BF8EAC3000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF42000
heap
page read and write
1BFFFF4B000
heap
page read and write
1BFFFFB0000
heap
page read and write
1BF8E9CF000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF979D3000
trusted library allocation
page read and write
1EEB1E0A000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF9A409000
heap
page read and write
27EF1E69000
heap
page read and write
F66F76E000
unkown
page readonly
1BF9A84E000
trusted library allocation
page read and write
1BF98BA3000
trusted library allocation
page read and write
1BF8DB9B000
heap
page read and write
1BFFFF72000
heap
page read and write
1BF966F2000
trusted library allocation
page read and write
1BF9652D000
trusted library allocation
page read and write
1BF96723000
trusted library allocation
page read and write
1BF90A92000
trusted library allocation
page read and write
1BF8F8CD000
trusted library allocation
page read and write
1BF89884000
trusted library allocation
page read and write
1BF9A393000
trusted library allocation
page read and write
1BF97B8F000
trusted library allocation
page read and write
F9B000
heap
page read and write
1BF8DFAE000
trusted library allocation
page read and write
1BF96737000
trusted library allocation
page read and write
1BF91B92000
trusted library allocation
page read and write
1BF981BE000
trusted library allocation
page read and write
1BFFFF6B000
heap
page read and write
1EEB1AC0000
heap
page read and write
1BF9A97F000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
DA4000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF9AAFB000
trusted library allocation
page read and write
1BFFFF3A000
heap
page read and write
1BF909C7000
trusted library allocation
page read and write
1BF9A40F000
heap
page read and write
1BF8F4B7000
trusted library allocation
page read and write
1BF9A28E000
trusted library allocation
page read and write
1BF99FE9000
trusted library allocation
page read and write
1BF97BFC000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
27EF1EE8000
heap
page read and write
1BFFFF7E000
heap
page read and write
1BF8DB22000
heap
page read and write
1BFFFF48000
heap
page read and write
1BFFFF29000
heap
page read and write
1BFFFF73000
heap
page read and write
27EF0F50000
heap
page read and write
1BF8E95F000
trusted library allocation
page read and write
1BF9A916000
trusted library allocation
page read and write
25D85C23000
remote allocation
page execute read
1BF8DFC4000
trusted library allocation
page read and write
1BF97962000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BF969C8000
trusted library allocation
page read and write
1BF8ECF0000
trusted library allocation
page read and write
1BF8F8C3000
trusted library allocation
page read and write
1BF969E9000
trusted library allocation
page read and write
1BF967C2000
trusted library allocation
page read and write
1BF8B28A000
trusted library allocation
page read and write
1BFFFF4C000
heap
page read and write
1BFFFF32000
heap
page read and write
1BF9A9F8000
trusted library allocation
page read and write
F66F6AE000
stack
page read and write
1BF8EC63000
trusted library allocation
page read and write
1BF89F82000
trusted library allocation
page read and write
1BF91B95000
trusted library allocation
page read and write
1BF97985000
trusted library allocation
page read and write
1BF90958000
trusted library allocation
page read and write
1BFFFF73000
heap
page read and write
1BF90AF4000
trusted library allocation
page read and write
27EF1F6A000
heap
page read and write
1BFFFF67000
heap
page read and write
1BFFFF78000
heap
page read and write
27EF12E6000
heap
page read and write
27EF1100000
trusted library allocation
page read and write
1BF979C6000
trusted library allocation
page read and write
1BF8E953000
trusted library allocation
page read and write
2860EC66000
trusted library allocation
page read and write
1BF98BE5000
trusted library allocation
page read and write
1BF966A9000
trusted library allocation
page read and write
1BF9A40B000
heap
page read and write
1BFFFF4B000
heap
page read and write
1BF909FD000
trusted library allocation
page read and write
1BF91B8B000
trusted library allocation
page read and write
1BFFFFA1000
heap
page read and write
1BF8DB1B000
heap
page read and write
1BF9A3D9000
trusted library allocation
page read and write
1BF8DD17000
trusted library allocation
page read and write
1BF8E3DB000
trusted library allocation
page read and write
1BF8D632000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8F832000
trusted library allocation
page read and write
DA4000
heap
page read and write
1BF8EAE7000
trusted library allocation
page read and write
1BF9A34B000
trusted library allocation
page read and write
1BF8EAB8000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1BFFFF62000
heap
page read and write
1BF8F4D2000
trusted library allocation
page read and write
27EF1310000
trusted library allocation
page read and write
1BF8F69D000
trusted library allocation
page read and write
1BF8B24E000
trusted library allocation
page read and write
27EF1323000
trusted library allocation
page read and write
F93000
heap
page read and write
1BF8B2DB000
trusted library allocation
page read and write
1BF8DE8C000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8DECE000
trusted library allocation
page read and write
101C1C903000
trusted library allocation
page read and write
1BF90A4B000
trusted library allocation
page read and write
1BF904F3000
trusted library allocation
page read and write
1BF8EA8E000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF90ADA000
trusted library allocation
page read and write
1BF8D805000
trusted library allocation
page read and write
1BF9A289000
trusted library allocation
page read and write
1BF8EAE0000
trusted library allocation
page read and write
B21000
unkown
page execute read
1BF98C07000
trusted library allocation
page read and write
1BF8DD32000
trusted library allocation
page read and write
1BF9A8A5000
trusted library allocation
page read and write
1EEB1E00000
trusted library allocation
page read and write
1BF979FC000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BF97BB4000
trusted library allocation
page read and write
2860E850000
heap
page read and write
1BF9092C000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
1BFFFF69000
heap
page read and write
1BF8DB1B000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF904F3000
trusted library allocation
page read and write
1C8D4853000
heap
page read and write
1BFFFF83000
heap
page read and write
1BFFFF9E000
heap
page read and write
F9D000
heap
page read and write
1BFFFF77000
heap
page read and write
1BFFFF56000
heap
page read and write
1BFFFF68000
heap
page read and write
1BFFFF64000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF89E76000
trusted library allocation
page read and write
1BF9A239000
trusted library allocation
page read and write
1BF9666D000
trusted library allocation
page read and write
1BF916CA000
trusted library allocation
page read and write
1BF8FDA9000
trusted library allocation
page read and write
1BF8B2C1000
trusted library allocation
page read and write
1BF967AE000
trusted library allocation
page read and write
1BFFFF4E000
heap
page read and write
1BF906C5000
trusted library allocation
page read and write
1BF904C7000
trusted library allocation
page read and write
1BF979E7000
trusted library allocation
page read and write
1BF8B2F6000
trusted library allocation
page read and write
1BF996E5000
trusted library allocation
page read and write
1BFFFF66000
heap
page read and write
1BFFFFA0000
heap
page read and write
1BF8DECE000
trusted library allocation
page read and write
1BF8F837000
trusted library allocation
page read and write
1BF8D6E5000
trusted library allocation
page read and write
1BF90A9E000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF8B257000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF8D61A000
trusted library allocation
page read and write
FBA000
heap
page read and write
27EF1E60000
heap
page read and write
1BFFFF68000
heap
page read and write
1C8D4845000
heap
page read and write
1BF8F8D8000
trusted library allocation
page read and write
1BFFFFA1000
heap
page read and write
1BFFFF52000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF965F7000
trusted library allocation
page read and write
1BF9A9F6000
trusted library allocation
page read and write
1BF91B5A000
trusted library allocation
page read and write
1BF909C4000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BF8E9E1000
trusted library allocation
page read and write
1BF90CFC000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF909CB000
trusted library allocation
page read and write
1BF8EA7E000
trusted library allocation
page read and write
1BF8FAAF000
trusted library allocation
page read and write
1BF8DE80000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF5C000
heap
page read and write
BBC000
unkown
page readonly
1BFFFF4B000
heap
page read and write
1BFFFFB0000
heap
page read and write
1BF8B2A5000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BF96527000
trusted library allocation
page read and write
1BF8DB2A000
heap
page read and write
1BF8FD6C000
trusted library allocation
page read and write
1BF99CF8000
trusted library allocation
page read and write
1BF9A2EF000
trusted library allocation
page read and write
1BF8E9BA000
trusted library allocation
page read and write
1BFFFF51000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BF981B6000
trusted library allocation
page read and write
35B1000
heap
page read and write
1BF9A86C000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1EEB1AE0000
heap
page read and write
1BF966F6000
trusted library allocation
page read and write
1BF9164F000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
2860EC5F000
trusted library allocation
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF7C000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF51000
heap
page read and write
DA4000
heap
page read and write
1BF8DD65000
trusted library allocation
page read and write
1BF9A40F000
heap
page read and write
1BF9A86D000
trusted library allocation
page read and write
1BF9AA84000
trusted library allocation
page read and write
1BF8DB77000
heap
page read and write
1BF8F4B7000
trusted library allocation
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF66000
heap
page read and write
1BF8F307000
trusted library allocation
page read and write
1BF8B209000
trusted library allocation
page read and write
1BF9093C000
trusted library allocation
page read and write
1BFFFF2D000
heap
page read and write
1BF97AA6000
trusted library allocation
page read and write
1BF9798A000
trusted library allocation
page read and write
1BF97BA6000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF9A86F000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF91BC3000
trusted library allocation
page read and write
1BF9AA8C000
trusted library allocation
page read and write
1BF8E3F0000
trusted library allocation
page read and write
F8F0FFE000
stack
page read and write
1BFFFF41000
heap
page read and write
1BF99CEA000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF916C7000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF41000
heap
page read and write
1BF90A5E000
trusted library allocation
page read and write
1BFFFF51000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BF97BAA000
trusted library allocation
page read and write
1BF91667000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF8B2F6000
trusted library allocation
page read and write
1BF8E968000
trusted library allocation
page read and write
1BF91B77000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BF909D3000
trusted library allocation
page read and write
1BF979E3000
trusted library allocation
page read and write
1BF8EA4D000
trusted library allocation
page read and write
1BF8E9D7000
trusted library allocation
page read and write
27EF1EF0000
heap
page read and write
1BF979C8000
trusted library allocation
page read and write
1BF967FA000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BFFFFB5000
heap
page read and write
1BFFFF78000
heap
page read and write
3E0000
heap
page read and write
1BF8FAC9000
trusted library allocation
page read and write
27EF1F3B000
heap
page read and write
1BF8DE9E000
trusted library allocation
page read and write
1BFFFFC1000
heap
page read and write
27EF1E63000
heap
page read and write
1BFFFFAF000
heap
page read and write
1BF96723000
trusted library allocation
page read and write
27EF1E60000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF8DDAF000
trusted library allocation
page read and write
1BF8DD1B000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF909D5000
trusted library allocation
page read and write
1BF8F5FA000
trusted library allocation
page read and write
1BF8DB7F000
heap
page read and write
1BF89FA3000
trusted library allocation
page read and write
1BF96737000
trusted library allocation
page read and write
1BFFFF4A000
heap
page read and write
27EF1870000
heap
page read and write
1BF8D885000
trusted library allocation
page read and write
1BF979B0000
trusted library allocation
page read and write
1BF966F2000
trusted library allocation
page read and write
1BF8B283000
trusted library allocation
page read and write
1BF9665D000
trusted library allocation
page read and write
1BF8D633000
trusted library allocation
page read and write
1BF91B2A000
trusted library allocation
page read and write
1BF8DB8D000
heap
page read and write
1BF8DD91000
trusted library allocation
page read and write
1BF8FDC3000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF89EFB000
trusted library allocation
page read and write
1BF8DADC000
heap
page read and write
1BF9A815000
trusted library allocation
page read and write
1BF965BB000
trusted library allocation
page read and write
1BF90A1E000
trusted library allocation
page read and write
1BF96664000
trusted library allocation
page read and write
1BF8B2C7000
trusted library allocation
page read and write
1BF92484000
trusted library allocation
page read and write
1BF8F809000
trusted library allocation
page read and write
1BF8F48E000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF57000
heap
page read and write
1BFFFF7E000
heap
page read and write
2860EC24000
trusted library allocation
page read and write
1BFFFFAA000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF66000
heap
page read and write
1BF90A86000
trusted library allocation
page read and write
1BFFFF3A000
heap
page read and write
1BF8E9CF000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF8F84F000
trusted library allocation
page read and write
1BF8B244000
trusted library allocation
page read and write
1BF8F6DF000
trusted library allocation
page read and write
1BF981F3000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF8AECE000
trusted library allocation
page read and write
27EF1373000
trusted library allocation
page read and write
1BF8FD71000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BF96999000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BF8F5EA000
trusted library allocation
page read and write
1BF9A873000
trusted library allocation
page read and write
F8EF56E000
unkown
page readonly
1BF9A86B000
trusted library allocation
page read and write
1BF8E9C3000
trusted library allocation
page read and write
1BF90976000
trusted library allocation
page read and write
1BF97909000
trusted library allocation
page read and write
1BF924A2000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BFFFF7E000
heap
page read and write
1BF8DD58000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF8DD3E000
trusted library allocation
page read and write
2860ED26000
heap
page read and write
1BF8EA8E000
trusted library allocation
page read and write
1BF8B28C000
trusted library allocation
page read and write
1BF8F9C1000
trusted library allocation
page read and write
1BF90978000
trusted library allocation
page read and write
1BFFFFA1000
heap
page read and write
1BF9A861000
trusted library allocation
page read and write
1BF979C8000
trusted library allocation
page read and write
1BF999CC000
trusted library allocation
page read and write
1BF9AA41000
trusted library allocation
page read and write
1BF8F900000
trusted library allocation
page read and write
1BF90BFD000
trusted library allocation
page read and write
1BF9A9D0000
trusted library allocation
page read and write
1BF8F8F1000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
27EF1EE3000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BF99FB7000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
FB4000
heap
page read and write
1BF99CD8000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF8DFD4000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
FB4000
heap
page read and write
1BF89FBA000
trusted library allocation
page read and write
F8EF4AB000
stack
page read and write
1BF8F9A9000
trusted library allocation
page read and write
1BF9798A000
trusted library allocation
page read and write
1BF9A270000
trusted library allocation
page read and write
1BFFFF7A000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF969ED000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF61000
heap
page read and write
C7C55FE000
stack
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF46000
heap
page read and write
1BF8EA4D000
trusted library allocation
page read and write
1BF9066D000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF99CF8000
trusted library allocation
page read and write
1BF965B3000
trusted library allocation
page read and write
3BCC3E81000
trusted library allocation
page execute read
1BF8DFD2000
trusted library allocation
page read and write
1BF8EAEC000
trusted library allocation
page read and write
1BF8B239000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
27EF1F6A000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BF91B6B000
trusted library allocation
page read and write
1BF96508000
trusted library allocation
page read and write
27EF1E69000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BFFFF29000
heap
page read and write
1BF8F684000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF8E3D8000
trusted library allocation
page read and write
27EF136A000
trusted library allocation
page read and write
1BFFFFB0000
heap
page read and write
1BF8B2C1000
trusted library allocation
page read and write
1BF8F687000
trusted library allocation
page read and write
1BF8D863000
trusted library allocation
page read and write
27EF0E62000
remote allocation
page execute read
1BFFFF48000
heap
page read and write
1BF9790D000
trusted library allocation
page read and write
1BF8F40E000
trusted library allocation
page read and write
1BF90A30000
trusted library allocation
page read and write
27EF1EE0000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF8B322000
trusted library allocation
page read and write
2860E8B3000
heap
page read and write
1BF8F66B000
trusted library allocation
page read and write
1BFFFF4B000
heap
page read and write
F6719FE000
unkown
page readonly
1BF96664000
trusted library allocation
page read and write
1BF8F48B000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1BF8F8FA000
trusted library allocation
page read and write
1BF8F41A000
trusted library allocation
page read and write
1BF8FAAF000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF9A86F000
trusted library allocation
page read and write
1BF9AA21000
trusted library allocation
page read and write
1BF92505000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BF99002000
trusted library allocation
page read and write
25D86072000
trusted library allocation
page read and write
1BF8D67A000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF9670D000
trusted library allocation
page read and write
1BF965A1000
trusted library allocation
page read and write
1BF8FD6A000
trusted library allocation
page read and write
1BF97BB8000
trusted library allocation
page read and write
1BF9AAF1000
trusted library allocation
page read and write
1BF8DE8A000
trusted library allocation
page read and write
1BF9A389000
trusted library allocation
page read and write
1BF8DE8E000
trusted library allocation
page read and write
1BF969F6000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BFFFF41000
heap
page read and write
1BF8FDA8000
trusted library allocation
page read and write
1BF8FDAF000
trusted library allocation
page read and write
3BCC3F31000
trusted library allocation
page execute read
1BF8B198000
trusted library allocation
page read and write
1BF97BE6000
trusted library allocation
page read and write
1BF8FABA000
trusted library allocation
page read and write
1BF90988000
trusted library allocation
page read and write
1BF979CE000
trusted library allocation
page read and write
1BF8EA4D000
trusted library allocation
page read and write
1BF8B2F6000
trusted library allocation
page read and write
1BF8F62F000
trusted library allocation
page read and write
1BF906D7000
trusted library allocation
page read and write
1BF9A40C000
heap
page read and write
1BF965E8000
trusted library allocation
page read and write
1BF90450000
trusted library allocation
page read and write
1BF90ADA000
trusted library allocation
page read and write
1BF966F6000
trusted library allocation
page read and write
1BF9A22F000
trusted library allocation
page read and write
1BF8B2BE000
trusted library allocation
page read and write
1BF8DB8C000
heap
page read and write
1BF96735000
trusted library allocation
page read and write
1BF979C2000
trusted library allocation
page read and write
1BF8F879000
trusted library allocation
page read and write
1BF95FF7000
trusted library allocation
page read and write
2860EC70000
trusted library allocation
page read and write
1BF9A213000
trusted library allocation
page read and write
1BF8DFA3000
trusted library allocation
page read and write
1BF8FD40000
trusted library allocation
page read and write
1BFFFFAA000
heap
page read and write
1BF8FD2E000
trusted library allocation
page read and write
1BF98636000
trusted library allocation
page read and write
1BFFFF68000
heap
page read and write
1BF8FAF3000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF909C4000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF97AF9000
trusted library allocation
page read and write
1BFFFFA0000
heap
page read and write
1BF8B242000
trusted library allocation
page read and write
1BFFFFAA000
heap
page read and write
1BF91B27000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF979DE000
trusted library allocation
page read and write
1BF8D6E5000
trusted library allocation
page read and write
1BF8B23C000
trusted library allocation
page read and write
1BF981A4000
trusted library allocation
page read and write
1BF9797E000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BFFFFB0000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF8EA43000
trusted library allocation
page read and write
1BF924E5000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BF8F18E000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF904BA000
trusted library allocation
page read and write
1BF97AAF000
trusted library allocation
page read and write
1BF8F4EF000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BF999CC000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF97BBE000
trusted library allocation
page read and write
1BF91615000
trusted library allocation
page read and write
1BF98614000
trusted library allocation
page read and write
1BF969B1000
trusted library allocation
page read and write
1BF981A8000
trusted library allocation
page read and write
1BF8FD8D000
trusted library allocation
page read and write
300000
heap
page read and write
1BF99682000
trusted library allocation
page read and write
1BF99F98000
trusted library allocation
page read and write
1BF96806000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF92657000
trusted library allocation
page read and write
1BF8F80D000
trusted library allocation
page read and write
1BF8DD73000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF904C4000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF9A86F000
trusted library allocation
page read and write
1BF9AA66000
trusted library allocation
page read and write
1BF8B267000
trusted library allocation
page read and write
1BF96739000
trusted library allocation
page read and write
1BFFFFA0000
heap
page read and write
1BF8DD36000
trusted library allocation
page read and write
F6721FE000
stack
page read and write
1BFFFF2D000
heap
page read and write
1BF8B2F2000
trusted library allocation
page read and write
1BF8B23C000
trusted library allocation
page read and write
1BFFFFAF000
heap
page read and write
1BF96735000
trusted library allocation
page read and write
1BF898DF000
trusted library allocation
page read and write
1BF965F7000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF9603C000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF8FBC4000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF9A81B000
trusted library allocation
page read and write
1BF9A3D9000
trusted library allocation
page read and write
1BFFFF73000
heap
page read and write
1BFFFFA0000
heap
page read and write
1BF8DFC4000
trusted library allocation
page read and write
1BF9683F000
trusted library allocation
page read and write
1BF9A40F000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF8B29D000
trusted library allocation
page read and write
1BF9A393000
trusted library allocation
page read and write
1BF8EAE0000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BFFFFB1000
heap
page read and write
1BFFFFAA000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BF8E33B000
trusted library allocation
page read and write
1BF8EA95000
trusted library allocation
page read and write
1BF8B233000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF96761000
trusted library allocation
page read and write
1BF8FDC5000
trusted library allocation
page read and write
1BF90610000
trusted library allocation
page read and write
1BF9694B000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF41000
heap
page read and write
1BF8EA4F000
trusted library allocation
page read and write
1BF8F822000
trusted library allocation
page read and write
1BF8F999000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BF909F9000
trusted library allocation
page read and write
1BF909F9000
trusted library allocation
page read and write
1BF9A211000
trusted library allocation
page read and write
1BF966F2000
trusted library allocation
page read and write
1BF8FA91000
trusted library allocation
page read and write
1BF8E94E000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF9166F000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BF8EAC3000
trusted library allocation
page read and write
1BF8E3C3000
trusted library allocation
page read and write
1BF99935000
trusted library allocation
page read and write
1BF8FD05000
trusted library allocation
page read and write
1BF9A3D6000
trusted library allocation
page read and write
1BFFFF4B000
heap
page read and write
1BF8D6D6000
trusted library allocation
page read and write
1BF9A86D000
trusted library allocation
page read and write
F8EF52D000
stack
page read and write
1BF8DE5D000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF96983000
trusted library allocation
page read and write
1BF8F999000
trusted library allocation
page read and write
1BF97A7B000
trusted library allocation
page read and write
1BF90C93000
trusted library allocation
page read and write
1BF9A403000
heap
page read and write
1BF909CB000
trusted library allocation
page read and write
1BF8B28C000
trusted library allocation
page read and write
1BFFFFBC000
heap
page read and write
1BF8F6B5000
trusted library allocation
page read and write
1BF8F882000
trusted library allocation
page read and write
1BF909F4000
trusted library allocation
page read and write
1BF89890000
trusted library allocation
page read and write
1BF904EC000
trusted library allocation
page read and write
1BF909F4000
trusted library allocation
page read and write
1BF91B6B000
trusted library allocation
page read and write
1BF8B1B0000
trusted library allocation
page read and write
1BF8E995000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF97BD4000
trusted library allocation
page read and write
1BF9666E000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BF8DECE000
trusted library allocation
page read and write
1BF91622000
trusted library allocation
page read and write
1BF91BFB000
trusted library allocation
page read and write
27EF1EE6000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BF9A88A000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF90591000
trusted library allocation
page read and write
1BF8F99D000
trusted library allocation
page read and write
1BF979BB000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BFFFF57000
heap
page read and write
B20000
unkown
page readonly
1BF99929000
trusted library allocation
page read and write
1BFFFF3A000
heap
page read and write
1BFFFFA2000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF99CFA000
trusted library allocation
page read and write
1BF9681D000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF981B2000
trusted library allocation
page read and write
1BF96673000
trusted library allocation
page read and write
1BF8F950000
trusted library allocation
page read and write
1BF8F46C000
trusted library allocation
page read and write
1BF8DB68000
heap
page read and write
1BF916DC000
trusted library allocation
page read and write
1BF8DB22000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF24000
heap
page read and write
1BF92D02000
trusted library allocation
page read and write
1BF90B57000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF8F82A000
trusted library allocation
page read and write
1BF90AED000
trusted library allocation
page read and write
25D86012000
trusted library allocation
page read and write
1BF97934000
trusted library allocation
page read and write
1BF8F46C000
trusted library allocation
page read and write
1BF90A34000
trusted library allocation
page read and write
1BF8DB93000
heap
page read and write
1BF8FBC2000
trusted library allocation
page read and write
1BF90AC8000
trusted library allocation
page read and write
1BF8FA91000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BF8DFBA000
trusted library allocation
page read and write
1BF9A83E000
trusted library allocation
page read and write
1BF981F3000
trusted library allocation
page read and write
1BF9A876000
trusted library allocation
page read and write
1BF91B3D000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF97AC5000
trusted library allocation
page read and write
1BF9A87B000
trusted library allocation
page read and write
1BF8EA38000
trusted library allocation
page read and write
1BF9667B000
trusted library allocation
page read and write
F8DB078000
stack
page read and write
1BF9A40B000
heap
page read and write
1BFFFF77000
heap
page read and write
1BF9A884000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF8F8DC000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF56000
heap
page read and write
1BFFFF51000
heap
page read and write
1BF9AACD000
trusted library allocation
page read and write
1BF967EB000
trusted library allocation
page read and write
1BF8B256000
trusted library allocation
page read and write
1BF90BC8000
trusted library allocation
page read and write
1BF92543000
trusted library allocation
page read and write
1BF9819A000
trusted library allocation
page read and write
1BF9A3B1000
trusted library allocation
page read and write
1BF97990000
trusted library allocation
page read and write
1BF8DB8C000
heap
page read and write
2860EC0C000
trusted library allocation
page read and write
1BF8B2EB000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF77000
heap
page read and write
1BF8FD6A000
trusted library allocation
page read and write
1BF9798E000
trusted library allocation
page read and write
176E000
stack
page read and write
1BF8E9A8000
trusted library allocation
page read and write
1BF9650F000
trusted library allocation
page read and write
1BF9A46A000
heap
page read and write
25D85DD4000
heap
page read and write
1BF979C0000
trusted library allocation
page read and write
FC2000
heap
page read and write
1BFFFF29000
heap
page read and write
1BFFFF34000
heap
page read and write
1BF8DEA5000
trusted library allocation
page read and write
1BF8B267000
trusted library allocation
page read and write
1BF9A4D8000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF9669E000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF8B229000
trusted library allocation
page read and write
27EF1E00000
heap
page read and write
1BF9A389000
trusted library allocation
page read and write
AF713FF000
stack
page read and write
1BF8B2DD000
trusted library allocation
page read and write
1BF9A86F000
trusted library allocation
page read and write
1BF8DD87000
trusted library allocation
page read and write
1BF8B23E000
trusted library allocation
page read and write
1BF9A40A000
heap
page read and write
1BFFFFB5000
heap
page read and write
1BF92548000
trusted library allocation
page read and write
1BF90B8F000
trusted library allocation
page read and write
1BF99FA1000
trusted library allocation
page read and write
1BF91BC7000
trusted library allocation
page read and write
1BF96661000
trusted library allocation
page read and write
1BF96673000
trusted library allocation
page read and write
1BF8B242000
trusted library allocation
page read and write
1BF8D8D7000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BF8B2F2000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF9675B000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF8E390000
trusted library allocation
page read and write
1BF96871000
trusted library allocation
page read and write
1BFFFFB3000
heap
page read and write
1BFFFF73000
heap
page read and write
1BFFFF64000
heap
page read and write
B20000
unkown
page readonly
1BF98656000
trusted library allocation
page read and write
1BF8D6AB000
trusted library allocation
page read and write
F8EF5AE000
stack
page read and write
1BFFFF3C000
heap
page read and write
1BF966F2000
trusted library allocation
page read and write
1BF9A3C2000
trusted library allocation
page read and write
1BFFFF74000
heap
page read and write
1BFFFF41000
heap
page read and write
1BF9667B000
trusted library allocation
page read and write
A7E000
stack
page read and write
1BF8DE9E000
trusted library allocation
page read and write
1BFFFF6B000
heap
page read and write
1BFFFF40000
heap
page read and write
1BFFFF48000
heap
page read and write
27EF1E5F000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF8E9FE000
trusted library allocation
page read and write
1BF9A389000
trusted library allocation
page read and write
1BF91BFB000
trusted library allocation
page read and write
1BFFFFB5000
heap
page read and write
1BFFFF73000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF99923000
trusted library allocation
page read and write
1BF8F8F3000
trusted library allocation
page read and write
1BF8F6F9000
trusted library allocation
page read and write
2860EC19000
trusted library allocation
page read and write
1BF8DE89000
trusted library allocation
page read and write
1BFFFF6E000
heap
page read and write
1BF8EAF4000
trusted library allocation
page read and write
1BF97BD6000
trusted library allocation
page read and write
1BF8F67C000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF8B23E000
trusted library allocation
page read and write
1BF9A2FE000
trusted library allocation
page read and write
1BF981A8000
trusted library allocation
page read and write
1BF8F684000
trusted library allocation
page read and write
1BF9A3D6000
trusted library allocation
page read and write
27EF13C7000
trusted library allocation
page read and write
1BF8D6C7000
trusted library allocation
page read and write
1BF8DFDB000
trusted library allocation
page read and write
1BF969E3000
trusted library allocation
page read and write
1BF909F9000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
27EF1E5C000
heap
page read and write
1BF966A9000
trusted library allocation
page read and write
1BF95FF3000
trusted library allocation
page read and write
1BF9792F000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF8B28A000
trusted library allocation
page read and write
1BF8F64B000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BF8F6F7000
trusted library allocation
page read and write
1BF99F98000
trusted library allocation
page read and write
1BF8F4F2000
trusted library allocation
page read and write
1BF9666B000
trusted library allocation
page read and write
1BFFFF27000
heap
page read and write
2860EC11000
trusted library allocation
page read and write
27EF1EE9000
heap
page read and write
1BFFFF77000
heap
page read and write
1BF904C4000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
2860E760000
unclassified section
page readonly
1BF9669E000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF8F4B2000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BF8DE7C000
trusted library allocation
page read and write
1BF97B67000
trusted library allocation
page read and write
1BF8F47B000
trusted library allocation
page read and write
1BF8D6F5000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF979E7000
trusted library allocation
page read and write
1BF99CF4000
trusted library allocation
page read and write
1BF969F5000
trusted library allocation
page read and write
1BFFFF47000
heap
page read and write
1BF96671000
trusted library allocation
page read and write
1BF95FA3000
trusted library allocation
page read and write
1BF8F8F7000
trusted library allocation
page read and write
1BF9AA84000
trusted library allocation
page read and write
35B0000
heap
page read and write
1BF9A86F000
trusted library allocation
page read and write
1BF965B3000
trusted library allocation
page read and write
2860EC8E000
trusted library allocation
page read and write
1BFFFF2D000
heap
page read and write
1BF969A2000
trusted library allocation
page read and write
1BF9A239000
trusted library allocation
page read and write
1BFFFF3A000
heap
page read and write
1BF8FD4A000
trusted library allocation
page read and write
1BF8FD4A000
trusted library allocation
page read and write
1BF8DFDB000
trusted library allocation
page read and write
1BFFFFD3000
heap
page read and write
1BF9A3EF000
trusted library allocation
page read and write
1BFFFF68000
heap
page read and write
1BF8DF9B000
trusted library allocation
page read and write
F8DC13E000
stack
page read and write
1BFFFFAA000
heap
page read and write
1BFFFF5F000
heap
page read and write
1BF8FD86000
trusted library allocation
page read and write
27EF19B0000
heap
page read and write
1BF8F47B000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF52000
heap
page read and write
1BFFFF32000
heap
page read and write
1BF91B8F000
trusted library allocation
page read and write
2860EC63000
trusted library allocation
page read and write
1BF90AA9000
trusted library allocation
page read and write
1BF9097D000
trusted library allocation
page read and write
1BF8D6D5000
trusted library allocation
page read and write
1BF8D8CF000
trusted library allocation
page read and write
1BF8E3AF000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BF8E9DA000
trusted library allocation
page read and write
1BF9A40B000
heap
page read and write
1BF97B4F000
trusted library allocation
page read and write
1BF90981000
trusted library allocation
page read and write
1BF979DE000
trusted library allocation
page read and write
1BFFFF2D000
heap
page read and write
E14000
heap
page read and write
27EF1F59000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF8B2EB000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF79000
heap
page read and write
25D86132000
trusted library allocation
page read and write
1BF8E9BE000
trusted library allocation
page read and write
1BF9094B000
trusted library allocation
page read and write
FC2000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF98C43000
trusted library allocation
page read and write
25D85E1F000
unclassified section
page read and write
1BFFFF40000
heap
page read and write
1BF8FD71000
trusted library allocation
page read and write
1BFFFFD9000
heap
page read and write
1BF8FBD1000
trusted library allocation
page read and write
1BF9066B000
trusted library allocation
page read and write
1BF8A000000
trusted library allocation
page read and write
1BFFFF61000
heap
page read and write
1BF90978000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF9A40F000
heap
page read and write
1BF8EAF1000
trusted library allocation
page read and write
1BFFFF2D000
heap
page read and write
1BF8DB8C000
heap
page read and write
1BFFFF52000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF97B86000
trusted library allocation
page read and write
1BF8FDD8000
trusted library allocation
page read and write
1BFFFF69000
heap
page read and write
1BF905CC000
trusted library allocation
page read and write
1BF8DC00000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF9A873000
trusted library allocation
page read and write
1BF9A9DA000
trusted library allocation
page read and write
1BF909F4000
trusted library allocation
page read and write
1BF9A2E1000
trusted library allocation
page read and write
F78000
heap
page read and write
1BF8E33D000
trusted library allocation
page read and write
1BFFFFD3000
heap
page read and write
1BF9A86B000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFF50000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF8F872000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BF96551000
trusted library allocation
page read and write
1BF97BE1000
trusted library allocation
page read and write
F8DAFFE000
unkown
page readonly
27EF1F2A000
heap
page read and write
1BF9A89B000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BF979FC000
trusted library allocation
page read and write
1BF98C05000
trusted library allocation
page read and write
1BF8F94C000
trusted library allocation
page read and write
27EF1EE9000
heap
page read and write
1BF924C8000
trusted library allocation
page read and write
1BFFFF4D000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF91B70000
trusted library allocation
page read and write
25D85E20000
heap
page read and write
1BF97B91000
trusted library allocation
page read and write
1BF8EACB000
trusted library allocation
page read and write
27EF1E5C000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF62000
heap
page read and write
1BFFFF7E000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF9A871000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BF9A274000
trusted library allocation
page read and write
1BF8F4B4000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF90A5E000
trusted library allocation
page read and write
1BF9A218000
trusted library allocation
page read and write
1BF9667E000
trusted library allocation
page read and write
1BFFFFBC000
heap
page read and write
1BF90632000
trusted library allocation
page read and write
1BF965A8000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BFFFFD9000
heap
page read and write
1BF9162F000
trusted library allocation
page read and write
1EEB1B10000
heap
page read and write
1BF91B70000
trusted library allocation
page read and write
1BF90BFC000
trusted library allocation
page read and write
1BF9A885000
trusted library allocation
page read and write
1BFFFF35000
heap
page read and write
1BF8FD12000
trusted library allocation
page read and write
24B69CA03000
trusted library allocation
page read and write
B21000
unkown
page execute read
1BF96991000
trusted library allocation
page read and write
1BF8DE84000
trusted library allocation
page read and write
9EF000
stack
page read and write
1BFFFF64000
heap
page read and write
1BF9A40F000
heap
page read and write
1BF8EA38000
trusted library allocation
page read and write
1BFFFF5B000
heap
page read and write
1BF966F2000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF49000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF91B1F000
trusted library allocation
page read and write
260BD5B24000
trusted library allocation
page read and write
FB4000
heap
page read and write
1BF9A2EF000
trusted library allocation
page read and write
1BF8B2BC000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF92967000
trusted library allocation
page read and write
1BF969C4000
trusted library allocation
page read and write
1BF966A9000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF8DF9B000
trusted library allocation
page read and write
1BF96857000
trusted library allocation
page read and write
1BF91712000
trusted library allocation
page read and write
1BF909D9000
trusted library allocation
page read and write
1BF8EA24000
trusted library allocation
page read and write
1BF9A270000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF8DFBC000
trusted library allocation
page read and write
1BF909F4000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF92937000
trusted library allocation
page read and write
1BF9669E000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF96959000
trusted library allocation
page read and write
1BF8F6AA000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
25D8605D000
trusted library allocation
page read and write
1BF96737000
trusted library allocation
page read and write
1BF90CF3000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
27EF1EE8000
heap
page read and write
1BF8D6E7000
trusted library allocation
page read and write
1BF96717000
trusted library allocation
page read and write
1BF8E9BA000
trusted library allocation
page read and write
1BF8DB22000
heap
page read and write
1BF8B2C1000
trusted library allocation
page read and write
25D85EF0000
heap
page read and write
1BFFFF68000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF9247B000
trusted library allocation
page read and write
1BF8F62B000
trusted library allocation
page read and write
1BF9A222000
trusted library allocation
page read and write
E10000
heap
page read and write
1BF9254D000
trusted library allocation
page read and write
1BF96871000
trusted library allocation
page read and write
1BF90495000
trusted library allocation
page read and write
1BF97A71000
trusted library allocation
page read and write
25D86137000
trusted library allocation
page read and write
1BF909F9000
trusted library allocation
page read and write
1BFFFF3F000
heap
page read and write
1C8D2E00000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF8ECE0000
trusted library allocation
page read and write
1BF9A371000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF9A8A9000
trusted library allocation
page read and write
DA4000
heap
page read and write
1BF97BBD000
trusted library allocation
page read and write
1BF8E312000
trusted library allocation
page read and write
1BF9092C000
trusted library allocation
page read and write
1BF8DFA3000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF67000
heap
page read and write
27EF0F4F000
unclassified section
page read and write
1BF8DB31000
heap
page read and write
1BFFFFB0000
heap
page read and write
1BFFFF64000
heap
page read and write
1BFFFF32000
heap
page read and write
1BF8DB7F000
heap
page read and write
1BFFFF5C000
heap
page read and write
1BFFFFD1000
heap
page read and write
1BF99FEF000
trusted library allocation
page read and write
1BFFFF44000
heap
page read and write
1BFFFF46000
heap
page read and write
1BF9A1E4000
trusted library allocation
page read and write
1BF8F9B6000
trusted library allocation
page read and write
1BFFFF47000
heap
page read and write
25D85D60000
heap
page read and write
1BF8F68F000
trusted library allocation
page read and write
1BF9A849000
trusted library allocation
page read and write
1BF8B296000
trusted library allocation
page read and write
1BF91675000
trusted library allocation
page read and write
1BF99F50000
trusted library allocation
page read and write
1BFFFF4B000
heap
page read and write
1BF97940000
trusted library allocation
page read and write
1BF90669000
trusted library allocation
page read and write
1BFFFFA8000
heap
page read and write
9BE000
stack
page read and write
F8DD1FE000
unkown
page readonly
1BFFFF4B000
heap
page read and write
1BF9A3B1000
trusted library allocation
page read and write
1BF91BA9000
trusted library allocation
page read and write
27EF1D03000
trusted library allocation
page read and write
1EEB1B00000
heap
page read and write
1BF969A9000
trusted library allocation
page read and write
1BF916E5000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF8F845000
trusted library allocation
page read and write
1BF8F8C5000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF8E966000
trusted library allocation
page read and write
1BF97BE1000
trusted library allocation
page read and write
1BF97BF7000
trusted library allocation
page read and write
2860EC77000
trusted library allocation
page read and write
1BFFFFA1000
heap
page read and write
1BF8F6BD000
trusted library allocation
page read and write
1BF9A4EF000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF9A2E3000
trusted library allocation
page read and write
1C8D3095000
heap
page read and write
1BF9967E000
trusted library allocation
page read and write
1BF8F6BD000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
2860ECFA000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BFFFF7E000
heap
page read and write
1BF8FA8C000
trusted library allocation
page read and write
1BFFFFB0000
heap
page read and write
1BF89E23000
trusted library allocation
page read and write
1BF8FD7A000
trusted library allocation
page read and write
1BF96723000
trusted library allocation
page read and write
1BF9A28E000
trusted library allocation
page read and write
1BF8FD4A000
trusted library allocation
page read and write
1BF8F9FD000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF9A3D6000
trusted library allocation
page read and write
1BF8EA41000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
27EF1E6C000
heap
page read and write
1BF8E3CE000
trusted library allocation
page read and write
1BF8DE8E000
trusted library allocation
page read and write
1BF9797A000
trusted library allocation
page read and write
1BF90A19000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF8F9C6000
trusted library allocation
page read and write
1BFFFF3A000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF53000
heap
page read and write
1BF8D6D9000
trusted library allocation
page read and write
1BF90A1B000
trusted library allocation
page read and write
F90000
heap
page read and write
1BF9A851000
trusted library allocation
page read and write
1BF9A2EB000
trusted library allocation
page read and write
1BF906F9000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
25D85D40000
heap
page read and write
1BF9A3FD000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF41000
heap
page read and write
1BF8EC7B000
trusted library allocation
page read and write
1BF8FD86000
trusted library allocation
page read and write
1BF9A83B000
trusted library allocation
page read and write
1BF97BF5000
trusted library allocation
page read and write
1BF9A366000
trusted library allocation
page read and write
2860E7F0000
unclassified section
page readonly
1BF8F4B4000
trusted library allocation
page read and write
2860ECB0000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFF4D000
heap
page read and write
1BF8DE9E000
trusted library allocation
page read and write
1EEB1B23000
heap
page read and write
FA3000
heap
page read and write
1BF97AC2000
trusted library allocation
page read and write
2860E9D0000
heap
page read and write
1BFFFF24000
heap
page read and write
1BFFFF52000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF8DFCF000
trusted library allocation
page read and write
1C8D2D59000
heap
page read and write
F8EF4EE000
unkown
page readonly
1BFFFF64000
heap
page read and write
1BF8FD68000
trusted library allocation
page read and write
1BF8F8F7000
trusted library allocation
page read and write
1BF981AE000
trusted library allocation
page read and write
27EF1312000
trusted library allocation
page read and write
1BF9262E000
trusted library allocation
page read and write
1BFFFF68000
heap
page read and write
1BF981E3000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BFFFFB0000
heap
page read and write
1BFFFF40000
heap
page read and write
1BFFFF5D000
heap
page read and write
27EF1F6A000
heap
page read and write
2860F00C000
trusted library allocation
page read and write
1BF90A13000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF8F30A000
trusted library allocation
page read and write
1BF90592000
trusted library allocation
page read and write
1BFFFF3D000
heap
page read and write
1BF89F26000
trusted library allocation
page read and write
1BF8DE65000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BFFFF73000
heap
page read and write
260BD5B1E000
trusted library allocation
page read and write
1BFFFF50000
heap
page read and write
1BF92601000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BF8B283000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
25D85DD0000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF8F982000
trusted library allocation
page read and write
27EF1F44000
heap
page read and write
1BF90C76000
trusted library allocation
page read and write
1BF8F81E000
trusted library allocation
page read and write
1BF98640000
trusted library allocation
page read and write
1BF90CDE000
trusted library allocation
page read and write
1BF91665000
trusted library allocation
page read and write
1BFFFFA1000
heap
page read and write
1BF8DB68000
heap
page read and write
1BF967EE000
trusted library allocation
page read and write
1BF909F4000
trusted library allocation
page read and write
1BFFFFA8000
heap
page read and write
1BF9A1E4000
trusted library allocation
page read and write
1BF90AD2000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF9AAC3000
trusted library allocation
page read and write
1BFFFF61000
heap
page read and write
1BF8FA87000
trusted library allocation
page read and write
BF4000
unkown
page readonly
1BFFFF68000
heap
page read and write
1BF8DD6D000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF9A40F000
heap
page read and write
1BF8EAB0000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF90963000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF91679000
trusted library allocation
page read and write
27EF10E2000
unkown
page execute read
1BF97937000
trusted library allocation
page read and write
1BF97AC1000
trusted library allocation
page read and write
1BF9A85F000
trusted library allocation
page read and write
1BFFFFB0000
heap
page read and write
BEC000
unkown
page read and write
1BFFFF46000
heap
page read and write
25D86210000
heap
page read and write
1BFFFF51000
heap
page read and write
1BF8F9B6000
trusted library allocation
page read and write
1BF90AF4000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF99CFC000
trusted library allocation
page read and write
1BF92950000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF8DF69000
trusted library allocation
page read and write
1BF8DD92000
trusted library allocation
page read and write
1BF90978000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
2860EC81000
trusted library allocation
page read and write
1BFFFFBC000
heap
page read and write
1BF97BED000
trusted library allocation
page read and write
1BF9046F000
trusted library allocation
page read and write
27EF1E9C000
heap
page read and write
1BFFFF29000
heap
page read and write
1BFFFF64000
heap
page read and write
1BFFFF42000
heap
page read and write
1BF8FDFD000
trusted library allocation
page read and write
1BF969D5000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
27EF1D26000
trusted library allocation
page read and write
1BF8DB32000
heap
page read and write
1BFFFF56000
heap
page read and write
1BF97B8F000
trusted library allocation
page read and write
1BF8E331000
trusted library allocation
page read and write
1BF89F13000
trusted library allocation
page read and write
1BF9667B000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BFFFF42000
heap
page read and write
27EF1F79000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF96661000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF90495000
trusted library allocation
page read and write
1BF8DB72000
heap
page read and write
1BF91BFE000
trusted library allocation
page read and write
1BF8FD71000
trusted library allocation
page read and write
1BFFFF35000
heap
page read and write
1BF8E952000
trusted library allocation
page read and write
25D86060000
trusted library allocation
page read and write
1BF8F4FB000
trusted library allocation
page read and write
1BF979C2000
trusted library allocation
page read and write
F8DB8FE000
stack
page read and write
1BFFFF67000
heap
page read and write
1BFFFF46000
heap
page read and write
1BF98C0C000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BFFFFAA000
heap
page read and write
1BF8DD4A000
trusted library allocation
page read and write
1BF8DECE000
trusted library allocation
page read and write
1BFFFF63000
heap
page read and write
27EF1F77000
heap
page read and write
1BF9A33B000
trusted library allocation
page read and write
25D85D6A000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF8F18A000
trusted library allocation
page read and write
1BF91B52000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF6F000
heap
page read and write
27EF1F77000
heap
page read and write
27EF1EE3000
heap
page read and write
DB0000
trusted library allocation
page read and write
1BF8DB28000
heap
page read and write
1BFFFF42000
heap
page read and write
1BFFFF2C000
heap
page read and write
1BF8EA2B000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
27EF1D00000
trusted library allocation
page read and write
1BF90C98000
trusted library allocation
page read and write
27EF1EA8000
heap
page read and write
1C8D2D30000
heap
page read and write
1BFFFF54000
heap
page read and write
1BF96661000
trusted library allocation
page read and write
1BF8DF80000
trusted library allocation
page read and write
1BF966F6000
trusted library allocation
page read and write
F8F1FFE000
stack
page read and write
1BF8FDC5000
trusted library allocation
page read and write
25D860B3000
trusted library allocation
page read and write
1BF9A9BE000
trusted library allocation
page read and write
1BF8E9BE000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8DB74000
heap
page read and write
1BF8D6E5000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF8F6F9000
trusted library allocation
page read and write
25D86118000
trusted library allocation
page read and write
1BF91BA1000
trusted library allocation
page read and write
1BF8F94C000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF9AADF000
trusted library allocation
page read and write
F8DB0FE000
unkown
page readonly
27EF1E8D000
heap
page read and write
1BF9A88A000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF8F621000
trusted library allocation
page read and write
1BF8F9F9000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF77000
heap
page read and write
1BF97BED000
trusted library allocation
page read and write
1BF8B2F6000
trusted library allocation
page read and write
1BF8F6DF000
trusted library allocation
page read and write
1BF9A389000
trusted library allocation
page read and write
1BFFFFAA000
heap
page read and write
1BFFFF5C000
heap
page read and write
1BF981A8000
trusted library allocation
page read and write
1BFFFF77000
heap
page read and write
1BFFFF78000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF90AA4000
trusted library allocation
page read and write
1BF8B244000
trusted library allocation
page read and write
1BF8E380000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFF57000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF9AAF1000
trusted library allocation
page read and write
25D8609E000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF99F50000
trusted library allocation
page read and write
1BF979D0000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF9169A000
trusted library allocation
page read and write
2860EC00000
trusted library allocation
page read and write
27EF1EA1000
heap
page read and write
1BF8F687000
trusted library allocation
page read and write
1BF909F4000
trusted library allocation
page read and write
1BF966A2000
trusted library allocation
page read and write
1BF916FD000
trusted library allocation
page read and write
1BF90CEB000
trusted library allocation
page read and write
1BF8FB23000
trusted library allocation
page read and write
1BF8FD90000
trusted library allocation
page read and write
1BF8D6BC000
trusted library allocation
page read and write
1BF8F8F7000
trusted library allocation
page read and write
1BFFFF51000
heap
page read and write
1BF966F8000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF90CF7000
trusted library allocation
page read and write
1BF8FD36000
trusted library allocation
page read and write
1BF98800000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF5C000
heap
page read and write
1BF90AFA000
trusted library allocation
page read and write
2860E9A0000
heap
page read and write
1C8D2D53000
heap
page read and write
1BFFFF54000
heap
page read and write
1BF8D6E5000
trusted library allocation
page read and write
1BF8E9FB000
trusted library allocation
page read and write
1BF96848000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BF98C86000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
2860EF03000
trusted library allocation
page read and write
1BF904B9000
trusted library allocation
page read and write
1BF9A2ED000
trusted library allocation
page read and write
27EF1F2D000
heap
page read and write
1BF92905000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BFFFF44000
heap
page read and write
1BF9A81B000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1C8D2F00000
trusted library allocation
page read and write
1BF967FA000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF40000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF8DB1B000
heap
page read and write
25D85C30000
unclassified section
page readonly
1BFFFFAA000
heap
page read and write
1BF99F4B000
trusted library allocation
page read and write
1BF969AB000
trusted library allocation
page read and write
1BF8B250000
trusted library allocation
page read and write
27EF0E70000
unclassified section
page readonly
1BF89F1B000
trusted library allocation
page read and write
1BF8FD6F000
trusted library allocation
page read and write
1BF8EAB7000
trusted library allocation
page read and write
1BF969DF000
trusted library allocation
page read and write
1BF9666B000
trusted library allocation
page read and write
27EF1F58000
heap
page read and write
1BF99CC1000
trusted library allocation
page read and write
1BFFFF3A000
heap
page read and write
1BF8D8CB000
trusted library allocation
page read and write
25D86010000
trusted library allocation
page read and write
1BF965D6000
trusted library allocation
page read and write
1BFFFF68000
heap
page read and write
1BF8B2BC000
trusted library allocation
page read and write
1BF9798C000
trusted library allocation
page read and write
1BF996D0000
trusted library allocation
page read and write
1BF8E923000
trusted library allocation
page read and write
FA4000
heap
page read and write
1BF8B2C7000
trusted library allocation
page read and write
1BF96788000
trusted library allocation
page read and write
1BF981A4000
trusted library allocation
page read and write
1BF981F8000
trusted library allocation
page read and write
1BF8E3D8000
trusted library allocation
page read and write
1BF981AE000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF96857000
trusted library allocation
page read and write
1BF9A862000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF8DD97000
trusted library allocation
page read and write
1BF8B28A000
trusted library allocation
page read and write
1BF981F8000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF45000
heap
page read and write
2860ECF4000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF59000
heap
page read and write
1BF97AAE000
trusted library allocation
page read and write
1BFFFF73000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BF8FD2E000
trusted library allocation
page read and write
1BF8F83A000
trusted library allocation
page read and write
1BFFFFB5000
heap
page read and write
1BFFFF2D000
heap
page read and write
1BF905B0000
trusted library allocation
page read and write
1BFFFF61000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF97B98000
trusted library allocation
page read and write
1BF8DB05000
heap
page read and write
1BFFFF46000
heap
page read and write
1BF9A841000
trusted library allocation
page read and write
1BF9A95E000
trusted library allocation
page read and write
1BF8D6DB000
trusted library allocation
page read and write
1BF8DECE000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF3B000
heap
page read and write
1BF9AAC3000
trusted library allocation
page read and write
1BF8D6F8000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BF97B98000
trusted library allocation
page read and write
1BF9A40F000
heap
page read and write
1BF90937000
trusted library allocation
page read and write
1BF8F6F7000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1BF9A1EE000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1BF8B28C000
trusted library allocation
page read and write
1BF8DE49000
trusted library allocation
page read and write
1BF8F4FE000
trusted library allocation
page read and write
1BF8FBF6000
trusted library allocation
page read and write
1BF91BFE000
trusted library allocation
page read and write
1BF981BA000
trusted library allocation
page read and write
1BF8B23E000
trusted library allocation
page read and write
1BF9A876000
trusted library allocation
page read and write
1BF969DF000
trusted library allocation
page read and write
1BF97B69000
trusted library allocation
page read and write
1BF97BE1000
trusted library allocation
page read and write
1BF98C41000
trusted library allocation
page read and write
1BF8FAAF000
trusted library allocation
page read and write
1BF90CA2000
trusted library allocation
page read and write
1BF8F63B000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF66000
heap
page read and write
1BF96994000
trusted library allocation
page read and write
1BFFFFD3000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF8AECA000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8F699000
trusted library allocation
page read and write
1BF979F9000
trusted library allocation
page read and write
1BFFFF74000
heap
page read and write
1BF8B2F0000
trusted library allocation
page read and write
1BF92541000
trusted library allocation
page read and write
1BF9093C000
trusted library allocation
page read and write
1BF90BCD000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF97940000
trusted library allocation
page read and write
27EF12D0000
trusted library allocation
page read and write
1BF8EA19000
trusted library allocation
page read and write
1BF8F695000
trusted library allocation
page read and write
1BFFFFA7000
heap
page read and write
1BF8E9BA000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF90ACC000
trusted library allocation
page read and write
1BFFFF41000
heap
page read and write
1BFFFF66000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF9A443000
heap
page read and write
1BF8FD1D000
trusted library allocation
page read and write
1BF9A3DD000
trusted library allocation
page read and write
BF4000
unkown
page readonly
1BF8E335000
trusted library allocation
page read and write
1BF8F4FE000
trusted library allocation
page read and write
1BF9815D000
trusted library allocation
page read and write
1BF8DB22000
heap
page read and write
1BF89E71000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BF969FD000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF981BE000
trusted library allocation
page read and write
1BFFFF61000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BFFFF78000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF965E1000
trusted library allocation
page read and write
1BF969E9000
trusted library allocation
page read and write
27EF1381000
trusted library allocation
page read and write
1BFFFF69000
heap
page read and write
1BF8E975000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF8F62D000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1C8D2D58000
heap
page read and write
1BF909C4000
trusted library allocation
page read and write
1BF99F17000
trusted library allocation
page read and write
1BF90B7A000
trusted library allocation
page read and write
1BF8DF3B000
trusted library allocation
page read and write
1BF9094B000
trusted library allocation
page read and write
1BF898C3000
trusted library allocation
page read and write
1BF9262C000
trusted library allocation
page read and write
2860ED30000
heap
page read and write
1BF8DE1F000
trusted library allocation
page read and write
1BF8F6B5000
trusted library allocation
page read and write
1BF8DE55000
trusted library allocation
page read and write
1BF9A84F000
trusted library allocation
page read and write
25D8611C000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF909CF000
trusted library allocation
page read and write
1BF8EA82000
trusted library allocation
page read and write
1BF8F825000
trusted library allocation
page read and write
1BF969D0000
trusted library allocation
page read and write
1BF8B335000
trusted library allocation
page read and write
1BF8DE9E000
trusted library allocation
page read and write
1BF981B6000
trusted library allocation
page read and write
1BF979E1000
trusted library allocation
page read and write
1BFFFF83000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF8F63B000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF965B9000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF29000
heap
page read and write
1BF8F993000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BFFFF35000
heap
page read and write
1BFFFF78000
heap
page read and write
F8D8DFE000
unkown
page readonly
1BFFFF52000
heap
page read and write
F94000
heap
page read and write
1BFFFF34000
heap
page read and write
1BF8F4BA000
trusted library allocation
page read and write
1BF8B29D000
trusted library allocation
page read and write
1BF8DE3C000
trusted library allocation
page read and write
1BF916F8000
trusted library allocation
page read and write
1BF8FD90000
trusted library allocation
page read and write
1BF90A4B000
trusted library allocation
page read and write
C7C45FF000
stack
page read and write
1BF9A86D000
trusted library allocation
page read and write
1BF8F1F3000
trusted library allocation
page read and write
1BF9A844000
trusted library allocation
page read and write
1BFFFFA9000
heap
page read and write
1BF8D61D000
trusted library allocation
page read and write
1BF905A1000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
1BF8F6DF000
trusted library allocation
page read and write
1BF8FD8A000
trusted library allocation
page read and write
1BF9697F000
trusted library allocation
page read and write
1BF9680C000
trusted library allocation
page read and write
1BF8DB77000
heap
page read and write
1BF8EABF000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF8B2DB000
trusted library allocation
page read and write
1BF8EAB8000
trusted library allocation
page read and write
DA4000
heap
page read and write
1BFFFF72000
heap
page read and write
1BF8FD1D000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF97AA0000
trusted library allocation
page read and write
1BF8F8C3000
trusted library allocation
page read and write
1BF91B98000
trusted library allocation
page read and write
1BF90A34000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1BFFFF57000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BF8FDFD000
trusted library allocation
page read and write
27EF1F77000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF8FAB1000
trusted library allocation
page read and write
1BF97AFA000
trusted library allocation
page read and write
1BF909F9000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF9669E000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1BFFFFA0000
heap
page read and write
1BFFFF48000
heap
page read and write
2860EC49000
trusted library allocation
page read and write
1BF89F9E000
trusted library allocation
page read and write
1BFFFF3A000
heap
page read and write
1BF96951000
trusted library allocation
page read and write
1BFFFF71000
heap
page read and write
1BF97BA1000
trusted library allocation
page read and write
F6729FE000
unkown
page readonly
1BFFFFA1000
heap
page read and write
1BF8E9FE000
trusted library allocation
page read and write
1BF9667B000
trusted library allocation
page read and write
1BF979C0000
trusted library allocation
page read and write
1BF9A876000
trusted library allocation
page read and write
1BF9A861000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF8EAE9000
trusted library allocation
page read and write
1BFFFF61000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF8DE45000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF8AE50000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8AEFC000
trusted library allocation
page read and write
1BF8F6B7000
trusted library allocation
page read and write
1BFFFF3A000
heap
page read and write
1BFFFF52000
heap
page read and write
27EF1362000
trusted library allocation
page read and write
1BF8DE61000
trusted library allocation
page read and write
1BF9A2E1000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BFFFF7E000
heap
page read and write
1BF91B4A000
trusted library allocation
page read and write
1BF979A3000
trusted library allocation
page read and write
1BF95FFE000
trusted library allocation
page read and write
1BF91BCC000
trusted library allocation
page read and write
1BF8EAE4000
trusted library allocation
page read and write
1BF90946000
trusted library allocation
page read and write
1BF966B1000
trusted library allocation
page read and write
1BF99780000
trusted library allocation
page read and write
1BF96754000
trusted library allocation
page read and write
1BFFFF68000
heap
page read and write
1BFFFF6B000
heap
page read and write
1C8D4857000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF8EA52000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF90CBB000
trusted library allocation
page read and write
1BF8F6F7000
trusted library allocation
page read and write
1BF8F67F000
trusted library allocation
page read and write
1BF8D6E5000
trusted library allocation
page read and write
1BF97B8C000
trusted library allocation
page read and write
1BF8FD43000
trusted library allocation
page read and write
1BF905C3000
trusted library allocation
page read and write
1BF905D0000
trusted library allocation
page read and write
1BF9A9DE000
trusted library allocation
page read and write
1BF8F813000
trusted library allocation
page read and write
1BF98CE4000
trusted library allocation
page read and write
1BF8F837000
trusted library allocation
page read and write
1BF9A984000
trusted library allocation
page read and write
1BFFFF56000
heap
page read and write
1BF8DD7B000
trusted library allocation
page read and write
1BF8B2A6000
trusted library allocation
page read and write
1BFFFF2C000
heap
page read and write
1BFFFFAF000
heap
page read and write
1BF89FFC000
trusted library allocation
page read and write
25D86066000
trusted library allocation
page read and write
1BF9815B000
trusted library allocation
page read and write
1BF967AE000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
1BFFFF4D000
heap
page read and write
1BF966F2000
trusted library allocation
page read and write
1BF8DE61000
trusted library allocation
page read and write
1BFFFF51000
heap
page read and write
1BF8B1B3000
trusted library allocation
page read and write
1BF97BD6000
trusted library allocation
page read and write
1BF909C1000
trusted library allocation
page read and write
1BF96788000
trusted library allocation
page read and write
1BF9A22F000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF8DE6E000
trusted library allocation
page read and write
1BF89F1E000
trusted library allocation
page read and write
1BF999CC000
trusted library allocation
page read and write
1BF9A393000
trusted library allocation
page read and write
1BF8DDB6000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
27EF1EFD000
heap
page read and write
DA4000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF62000
heap
page read and write
1BFFFF34000
heap
page read and write
1BF969E6000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BFFFFB0000
heap
page read and write
1BF8FAC6000
trusted library allocation
page read and write
1BF917E3000
trusted library allocation
page read and write
1BF95FE4000
trusted library allocation
page read and write
1BF8B1DA000
trusted library allocation
page read and write
1BF91BF7000
trusted library allocation
page read and write
1BF8F69E000
trusted library allocation
page read and write
1BF8EA8C000
trusted library allocation
page read and write
1BF97BBB000
trusted library allocation
page read and write
F8F17FE000
unkown
page readonly
1BFFFF40000
heap
page read and write
F9D000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF8F4A9000
trusted library allocation
page read and write
1BF96837000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF91633000
trusted library allocation
page read and write
1BF9A86F000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF8DE9E000
trusted library allocation
page read and write
1BF8F5E0000
trusted library allocation
page read and write
1BF99CC5000
trusted library allocation
page read and write
2860E7D0000
remote allocation
page read and write
1BF965E1000
trusted library allocation
page read and write
1BF97BAA000
trusted library allocation
page read and write
1BFFFF3C000
heap
page read and write
25D86064000
trusted library allocation
page read and write
1BF91B6B000
trusted library allocation
page read and write
1BF8B2C7000
trusted library allocation
page read and write
1BF8F6F7000
trusted library allocation
page read and write
1BF8E3DA000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF966B0000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
1BFFFF6F000
heap
page read and write
1BFFFF41000
heap
page read and write
1BFFFF67000
heap
page read and write
1BF9A371000
trusted library allocation
page read and write
1BF8EA1F000
trusted library allocation
page read and write
1BF96760000
trusted library allocation
page read and write
1BF89EFE000
trusted library allocation
page read and write
1BF9A92E000
trusted library allocation
page read and write
1BF9048E000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BFFFFA0000
heap
page read and write
1BF9675A000
trusted library allocation
page read and write
1BF97BBE000
trusted library allocation
page read and write
1BFFFF48000
heap
page read and write
1BF96997000
trusted library allocation
page read and write
1BF8F913000
trusted library allocation
page read and write
1BFFFF66000
heap
page read and write
1BFFFF49000
heap
page read and write
1BFFFF52000
heap
page read and write
1BF966F6000
trusted library allocation
page read and write
1BF979FC000
trusted library allocation
page read and write
27EF1EF0000
heap
page read and write
1BFFFF5D000
heap
page read and write
1BF8F48B000
trusted library allocation
page read and write
1BF90ACC000
trusted library allocation
page read and write
1BF8F967000
trusted library allocation
page read and write
1BF97BC3000
trusted library allocation
page read and write
1BFFFF5C000
heap
page read and write
C7C5DFE000
stack
page read and write
1BF9047B000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF969B4000
trusted library allocation
page read and write
1BF8F4D2000
trusted library allocation
page read and write
1BF96982000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BFFFF50000
heap
page read and write
1BF90937000
trusted library allocation
page read and write
1BFFFF32000
heap
page read and write
1C8D2D37000
heap
page read and write
1BF98BC8000
trusted library allocation
page read and write
27EF1E8A000
heap
page read and write
1BF966B2000
trusted library allocation
page read and write
1BF99FD9000
trusted library allocation
page read and write
1BFFFFA1000
heap
page read and write
1BFFFFAF000
heap
page read and write
1BF966FE000
trusted library allocation
page read and write
1BF8FDBB000
trusted library allocation
page read and write
1BF99F4B000
trusted library allocation
page read and write
1BF99200000
trusted library allocation
page read and write
1BF8E9C3000
trusted library allocation
page read and write
1BF90973000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8F8C5000
trusted library allocation
page read and write
1BF9173C000
trusted library allocation
page read and write
1BFFFF67000
heap
page read and write
1BF96754000
trusted library allocation
page read and write
1BF99FD9000
trusted library allocation
page read and write
1BF8FD0A000
trusted library allocation
page read and write
1BF8E379000
trusted library allocation
page read and write
1BF8FAC6000
trusted library allocation
page read and write
1BF909F4000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8ECF4000
trusted library allocation
page read and write
1BF96661000
trusted library allocation
page read and write
1BF8DD3E000
trusted library allocation
page read and write
1BFFFF4D000
heap
page read and write
C7C45FA000
stack
page read and write
1BF97A1C000
trusted library allocation
page read and write
25D85C50000
heap
page read and write
AD0000
heap
page read and write
1BF9094D000
trusted library allocation
page read and write
1BF9687C000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BFFFF40000
heap
page read and write
1BF96673000
trusted library allocation
page read and write
27EF1E69000
heap
page read and write
1BF97B53000
trusted library allocation
page read and write
1BFFFF51000
heap
page read and write
1BF9669E000
trusted library allocation
page read and write
1BF8E3FA000
trusted library allocation
page read and write
1BFFFF6A000
heap
page read and write
1BF8E9DB000
trusted library allocation
page read and write
1BFFFF62000
heap
page read and write
1BF9A9E6000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF967C8000
trusted library allocation
page read and write
1BF8F632000
trusted library allocation
page read and write
1BF8DEA5000
trusted library allocation
page read and write
1BFFFF68000
heap
page read and write
1BF8F4D7000
trusted library allocation
page read and write
1BF96664000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF8DEA5000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BF8FDD5000
trusted library allocation
page read and write
2860E992000
unclassified section
page read and write
1BF967C6000
trusted library allocation
page read and write
1BFFFF5B000
heap
page read and write
F9D000
heap
page read and write
1BF8F841000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF979D3000
trusted library allocation
page read and write
1BF979E8000
trusted library allocation
page read and write
DA4000
heap
page read and write
F8DA7FE000
stack
page read and write
2860EC5D000
trusted library allocation
page read and write
1BF91631000
trusted library allocation
page read and write
1BF9797C000
trusted library allocation
page read and write
1BF9669E000
trusted library allocation
page read and write
1BF8E3C8000
trusted library allocation
page read and write
1BF96782000
trusted library allocation
page read and write
1BF909D3000
trusted library allocation
page read and write
1BF8F96B000
trusted library allocation
page read and write
1BFFFF54000
heap
page read and write
1BF99F7E000
trusted library allocation
page read and write
1BF8F6BD000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BFFFF40000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF99F4E000
trusted library allocation
page read and write
1BF97B5D000
trusted library allocation
page read and write
1BF925AC000
trusted library allocation
page read and write
1BF90AA4000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
2860ECC3000
trusted library allocation
page read and write
1BF98D2E000
trusted library allocation
page read and write
1BF8F6DF000
trusted library allocation
page read and write
1BF9652D000
trusted library allocation
page read and write
1BFFFF46000
heap
page read and write
1BF8FD2C000
trusted library allocation
page read and write
1BF8B283000
trusted library allocation
page read and write
1BF9A98F000
trusted library allocation
page read and write
1BF8F5DB000
trusted library allocation
page read and write
27EF1F2A000
heap
page read and write
1BF8F4F2000
trusted library allocation
page read and write
1BF909CF000
trusted library allocation
page read and write
1BFFFF6B000
heap
page read and write
1BF99F17000
trusted library allocation
page read and write
1BF8EA3D000
trusted library allocation
page read and write
1BF91B50000
trusted library allocation
page read and write
1BF8B1B6000
trusted library allocation
page read and write
F8DC9FE000
stack
page read and write
1BFFFF52000
heap
page read and write
1BF91BDE000
trusted library allocation
page read and write
9CE000
stack
page read and write
1BF8F6F7000
trusted library allocation
page read and write
1BFFFF57000
heap
page read and write
1BF8FDD8000
trusted library allocation
page read and write
1BF966F2000
trusted library allocation
page read and write
1BF99F3D000
trusted library allocation
page read and write
1BFFFF34000
heap
page read and write
1BF8E9ED000
trusted library allocation
page read and write
1BFFFF5D000
heap
page read and write
1BF99F4E000
trusted library allocation
page read and write
1BF9165B000
trusted library allocation
page read and write
1BF9A84B000
trusted library allocation
page read and write
27EF135F000
trusted library allocation
page read and write
1BFFFFB0000
heap
page read and write
1BF99CCE000
trusted library allocation
page read and write
1BF99935000
trusted library allocation
page read and write
1BF8F189000
trusted library allocation
page read and write
1BF97A14000
trusted library allocation
page read and write
1BF8FA85000
trusted library allocation
page read and write
1BF99F8A000
trusted library allocation
page read and write
1BF8B2E5000
trusted library allocation
page read and write
1BF90B60000
trusted library allocation
page read and write
1BF966F2000
trusted library allocation
page read and write
1BF8F93E000
trusted library allocation
page read and write
25D86113000
trusted library allocation
page read and write
1BF8EAAE000
trusted library allocation
page read and write
1BF8EC6F000
trusted library allocation
page read and write
1BF9048B000
trusted library allocation
page read and write
1BF91BCC000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BF8F1E5000
trusted library allocation
page read and write
27EF13B0000
trusted library allocation
page read and write
1BF92633000
trusted library allocation
page read and write
1BF9A888000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF8E9CF000
trusted library allocation
page read and write
1BFFFF24000
heap
page read and write
1BFFFF64000
heap
page read and write
1BF91B89000
trusted library allocation
page read and write
1BF97BE6000
trusted library allocation
page read and write
1BFFFF64000
heap
page read and write
1BF90937000
trusted library allocation
page read and write
1BF89F66000
trusted library allocation
page read and write
1BF8EAE0000
trusted library allocation
page read and write
1BF8F305000
trusted library allocation
page read and write
1BF909D9000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BFFFFA7000
heap
page read and write
1BF9A86B000
trusted library allocation
page read and write
1BF9A9F6000
trusted library allocation
page read and write
1BF98CA3000
trusted library allocation
page read and write
27EF1F6A000
heap
page read and write
1BFFFF32000
heap
page read and write
1BF8DFD4000
trusted library allocation
page read and write
1BF8E997000
trusted library allocation
page read and write
1BF91D9E000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BFFFF9A000
heap
page read and write
1BFFFF57000
heap
page read and write
1BF979C6000
trusted library allocation
page read and write
1BF96539000
trusted library allocation
page read and write
1BF8B257000
trusted library allocation
page read and write
1BF91D6D000
trusted library allocation
page read and write
1BFFFF7E000
heap
page read and write
1BF969F2000
trusted library allocation
page read and write
1BF8B233000
trusted library allocation
page read and write
1BFFFF68000
heap
page read and write
1BFFFF24000
heap
page read and write
1BF965D6000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF56000
heap
page read and write
1BF8B23C000
trusted library allocation
page read and write
1BF8F6B7000
trusted library allocation
page read and write
1BF8EA3C000
trusted library allocation
page read and write
1BF8B2DD000
trusted library allocation
page read and write
1BF8B2C1000
trusted library allocation
page read and write
1BF96859000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
1BFFFF48000
heap
page read and write
1BFFFFAF000
heap
page read and write
1BFFFF48000
heap
page read and write
1BFFFF40000
heap
page read and write
35B1000
heap
page read and write
1BF906D9000
trusted library allocation
page read and write
1BF8F841000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8F65C000
trusted library allocation
page read and write
1BF8DFC4000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF8F963000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF9E000
heap
page read and write
1BFFFFA1000
heap
page read and write
27EF1EE6000
heap
page read and write
1BF96016000
trusted library allocation
page read and write
1BF97A86000
trusted library allocation
page read and write
1BFFFF78000
heap
page read and write
1BFFFF5F000
heap
page read and write
27EF0F20000
heap
page readonly
2860E830000
heap
page read and write
1BF9AA4E000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF78000
heap
page read and write
1BF9A289000
trusted library allocation
page read and write
3BCC3E71000
trusted library allocation
page execute read
1BF8DE9E000
trusted library allocation
page read and write
1BF9A20D000
trusted library allocation
page read and write
1BF8F6DF000
trusted library allocation
page read and write
1BFFFF29000
heap
page read and write
1BF98D06000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF90CD6000
trusted library allocation
page read and write
1BF9048E000
trusted library allocation
page read and write
1BF969EE000
trusted library allocation
page read and write
1BF8E340000
trusted library allocation
page read and write
1BF91BCF000
trusted library allocation
page read and write
27EF10EA000
unkown
page execute read
1BF99923000
trusted library allocation
page read and write
1BF8E3D8000
trusted library allocation
page read and write
1BF98D01000
trusted library allocation
page read and write
1BFFFF42000
heap
page read and write
F8DB07B000
stack
page read and write
1BF96859000
trusted library allocation
page read and write
1BF90CA7000
trusted library allocation
page read and write
1BF8AEF4000
trusted library allocation
page read and write
1BF8F948000
trusted library allocation
page read and write
1BF966F6000
trusted library allocation
page read and write
1BF8FDD5000
trusted library allocation
page read and write
1BFFFF9A000
heap
page read and write
1BF9A24D000
trusted library allocation
page read and write
1BF916C4000
trusted library allocation
page read and write
1BF90CDC000
trusted library allocation
page read and write
1BF916E5000
trusted library allocation
page read and write
1BF98D33000
trusted library allocation
page read and write
1BF89F75000
trusted library allocation
page read and write
1BF91BCC000
trusted library allocation
page read and write
25D8606E000
trusted library allocation
page read and write
1BFFFF9E000
heap
page read and write
1BF91BA9000
trusted library allocation
page read and write
1BF8DE70000
trusted library allocation
page read and write
1BF8F6BD000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BF8DFAE000
trusted library allocation
page read and write
1BFFFF3A000
heap
page read and write
AF70BFE000
stack
page read and write
1BFFFF29000
heap
page read and write
1BFFFF29000
heap
page read and write
1BF909D3000
trusted library allocation
page read and write
1BF966F6000
trusted library allocation
page read and write
1BF92586000
trusted library allocation
page read and write
1BF8DF8A000
trusted library allocation
page read and write
1BF8FD33000
trusted library allocation
page read and write
1BF9A86B000
trusted library allocation
page read and write
1BF8EAB7000
trusted library allocation
page read and write
1BF967B9000
trusted library allocation
page read and write
1BF96733000
trusted library allocation
page read and write
1BF8F9FD000
trusted library allocation
page read and write
27EF1303000
trusted library allocation
page read and write
1BFFFF59000
heap
page read and write
1BF8B1D7000
trusted library allocation
page read and write
DA4000
heap
page read and write
2860EF00000
trusted library allocation
page read and write
1BF969F1000
trusted library allocation
page read and write
1BFFFF3F000
heap
page read and write
1BF97926000
trusted library allocation
page read and write
1BF9168D000
trusted library allocation
page read and write
1BF9862D000
trusted library allocation
page read and write
1BFFFF6F000
heap
page read and write
1BF90458000
trusted library allocation
page read and write
1BFFFF5F000
heap
page read and write
1BF969F6000
trusted library allocation
page read and write
1BF8F69D000
trusted library allocation
page read and write
2860EB00000
trusted library allocation
page read and write
1BF8E9DF000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BF8D6F5000
trusted library allocation
page read and write
1BF89FF0000
trusted library allocation
page read and write
1BF909D5000
trusted library allocation
page read and write
1BFFFF40000
heap
page read and write
1BFFFF78000
heap
page read and write
1BFFFF61000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF97BF5000
trusted library allocation
page read and write
1BF8E979000
trusted library allocation
page read and write
1BFFFF52000
heap
page read and write
1BFFFF48000
heap
page read and write
1BF96754000
trusted library allocation
page read and write
1BF97B91000
trusted library allocation
page read and write
9FE000
stack
page read and write
1BFFFF51000
heap
page read and write
There are 3990 hidden memdumps, click here to show them.