IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_3921d251-4c84-4cb1-8ed6-1478a7460f31.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_3921d251-4c84-4cb1-8ed6-1478a7460f31.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 4, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2216 -prefMapHandle 2200 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5cf237a4-7973-4ec8-84ee-07681bc278bc} 8044 "\\.\pipe\gecko-crash-server-pipe.8044" 1bda816f510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4468 -parentBuildID 20230927232528 -prefsHandle 4460 -prefMapHandle 3996 -prefsLen 26265 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a5d1342-43e8-4a15-9f70-b771ca3599d0} 8044 "\\.\pipe\gecko-crash-server-pipe.8044" 1bdba5c3110 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5088 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 2504 -prefMapHandle 5108 -prefsLen 33093 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {15cd57e1-877b-49b0-a41c-7dabf754dcb4} 8044 "\\.\pipe\gecko-crash-server-pipe.8044" 1bda8172310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://youtube.com/account?=https://ac
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://blocked.cdn.mozilla.net/
unknown
https://profiler.firefox.com
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://youtube.com/account?=https://acd
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://support.mozilla.org/products/firefox
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://youtube.com/account?=https://acb
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.195.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
ax-0001.ax-msedge.net
150.171.27.10
fp2e7a.wpc.phicdn.net
192.229.221.95
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.17.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 23 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.181.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1BDAEECE000
heap
page read and write
1BDB8053000
trusted library allocation
page read and write
1BDC2999000
trusted library allocation
page read and write
1BDBB881000
trusted library allocation
page read and write
1BDB9BB1000
trusted library allocation
page read and write
1BDB5391000
trusted library allocation
page read and write
1BDB9B93000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDBCBCA000
trusted library allocation
page read and write
1BDC0ABE000
trusted library allocation
page read and write
1BDC0A32000
trusted library allocation
page read and write
1BDBAD7C000
trusted library allocation
page read and write
1BDB81BE000
trusted library allocation
page read and write
1BDB78F2000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDB96FE000
trusted library allocation
page read and write
1BDB43F0000
trusted library allocation
page read and write
1BDB810D000
trusted library allocation
page read and write
1BDAEF14000
heap
page read and write
1BDB858E000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDB9ECF000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
232A67B8000
heap
page read and write
1BDAEEBE000
heap
page read and write
1BDAEEEA000
heap
page read and write
165C000
heap
page read and write
1BDBC160000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDAEF19000
heap
page read and write
1BDB81D3000
trusted library allocation
page read and write
1BDB7994000
trusted library allocation
page read and write
1BDB9687000
trusted library allocation
page read and write
2064C416000
trusted library allocation
page read and write
1BDB3898000
trusted library allocation
page read and write
1BDB79FA000
trusted library allocation
page read and write
1BDB8D59000
trusted library allocation
page read and write
1BDB97FC000
trusted library allocation
page read and write
1BDC08F4000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
1BDB9AAC000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1C13A3C3000
trusted library allocation
page read and write
1BDB53AC000
trusted library allocation
page read and write
1BDBC1AD000
trusted library allocation
page read and write
1BDB91B6000
trusted library allocation
page read and write
1BDB97E7000
trusted library allocation
page read and write
1656000
heap
page read and write
1BDB95E8000
trusted library allocation
page read and write
1BDB79D0000
trusted library allocation
page read and write
1BDB97B5000
trusted library allocation
page read and write
1BDB8DAC000
trusted library allocation
page read and write
1C13A3F5000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDBBDDE000
trusted library allocation
page read and write
1BDB8D99000
trusted library allocation
page read and write
1BDC1E23000
trusted library allocation
page read and write
1BDB9B1D000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
2064C3E7000
trusted library allocation
page read and write
1BDBBDE2000
trusted library allocation
page read and write
1BDC2A21000
trusted library allocation
page read and write
1BDC1AF2000
trusted library allocation
page read and write
1BDC08EB000
trusted library allocation
page read and write
1BDAEECB000
heap
page read and write
1BDC3B01000
trusted library allocation
page read and write
1BDB81B4000
trusted library allocation
page read and write
1BDB8EEB000
trusted library allocation
page read and write
1BDB9D23000
trusted library allocation
page read and write
1BDB38A4000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
232A67A8000
heap
page read and write
2064C35B000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDAEF36000
heap
page read and write
1BDC088C000
trusted library allocation
page read and write
1BDB853A000
trusted library allocation
page read and write
1BDB7B82000
heap
page read and write
1BDC2C24000
trusted library allocation
page read and write
1BDC0A70000
trusted library allocation
page read and write
1BDB9D74000
trusted library allocation
page read and write
232A5AC2000
trusted library allocation
page read and write
232A57A0000
unclassified section
page read and write
1BDAEEEA000
heap
page read and write
1BDB9A46000
trusted library allocation
page read and write
1BDB85A2000
trusted library allocation
page read and write
1BDB9E34000
trusted library allocation
page read and write
1BDB7F6A000
trusted library allocation
page read and write
1BDBC179000
trusted library allocation
page read and write
1BDAEF16000
heap
page read and write
1BDBBDD6000
trusted library allocation
page read and write
1BDB809B000
trusted library allocation
page read and write
1BDBC2C2000
trusted library allocation
page read and write
1BDB8D9E000
trusted library allocation
page read and write
1BDB9FD3000
trusted library allocation
page read and write
1BDBBD1D000
trusted library allocation
page read and write
1BDB9E8C000
trusted library allocation
page read and write
1BDB7BAF000
heap
page read and write
1BDBBAC9000
trusted library allocation
page read and write
1BDB7B82000
heap
page read and write
1C13A1B0000
unclassified section
page readonly
1BDB9ABD000
trusted library allocation
page read and write
1BDB9F2B000
trusted library allocation
page read and write
1BDC0A7A000
trusted library allocation
page read and write
1BDB7B9C000
heap
page read and write
1BDB805D000
trusted library allocation
page read and write
1BDB43FE000
trusted library allocation
page read and write
1BDC29E7000
trusted library allocation
page read and write
1BDB56A1000
trusted library allocation
page read and write
1BDB969B000
trusted library allocation
page read and write
1BDB9B8A000
trusted library allocation
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDB78F2000
trusted library allocation
page read and write
1BDBAD63000
trusted library allocation
page read and write
1BDBBD39000
trusted library allocation
page read and write
1BDBC13B000
trusted library allocation
page read and write
22DB090A000
heap
page read and write
1BDBA251000
trusted library allocation
page read and write
1BDB9EDA000
trusted library allocation
page read and write
1BDB8150000
trusted library allocation
page read and write
1BDBC36A000
trusted library allocation
page read and write
1BDB9E80000
trusted library allocation
page read and write
22DB0B0A000
trusted library allocation
page read and write
1BDB8D16000
trusted library allocation
page read and write
1BDB81C1000
trusted library allocation
page read and write
1BDB9F8D000
trusted library allocation
page read and write
1BDB9D74000
trusted library allocation
page read and write
1BDBC09E000
trusted library allocation
page read and write
1BDB9F5A000
trusted library allocation
page read and write
1BDB9F5D000
trusted library allocation
page read and write
1BDB81A2000
trusted library allocation
page read and write
1BDB54EF000
trusted library allocation
page read and write
1BDB97B5000
trusted library allocation
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDC0AA2000
trusted library allocation
page read and write
1BDB9EBF000
trusted library allocation
page read and write
1BDC0AA2000
trusted library allocation
page read and write
1BDB9F4F000
trusted library allocation
page read and write
F2C000
unkown
page read and write
1BDBC0B9000
trusted library allocation
page read and write
1C139F50000
remote allocation
page read and write
1BDB9A6C000
trusted library allocation
page read and write
1BDC1E07000
trusted library allocation
page read and write
1BDB5617000
trusted library allocation
page read and write
1BDBA0E3000
trusted library allocation
page read and write
1BDB8D64000
trusted library allocation
page read and write
232A5AF5000
trusted library allocation
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDB9689000
trusted library allocation
page read and write
1BDBC141000
trusted library allocation
page read and write
1BDB8D24000
trusted library allocation
page read and write
1BDAEF18000
heap
page read and write
1BDAEECE000
heap
page read and write
1BDBA154000
trusted library allocation
page read and write
1BDBA02F000
trusted library allocation
page read and write
1BDBB7BF000
trusted library allocation
page read and write
1BDAEECB000
heap
page read and write
1BDB7B80000
heap
page read and write
1BDBBE94000
trusted library allocation
page read and write
232A5A48000
trusted library allocation
page read and write
1BDB9B37000
trusted library allocation
page read and write
1BDBC1A4000
trusted library allocation
page read and write
1BDB806E000
trusted library allocation
page read and write
1BDC1CBA000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDB543C000
trusted library allocation
page read and write
1BDBC267000
trusted library allocation
page read and write
1BDB9EE9000
trusted library allocation
page read and write
1BDBC16F000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDB538E000
trusted library allocation
page read and write
1BDBA8C2000
trusted library allocation
page read and write
1BDB9A34000
trusted library allocation
page read and write
1BDC2B7F000
heap
page read and write
22DB0B07000
trusted library allocation
page read and write
1BDBBE88000
trusted library allocation
page read and write
1BDBA285000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1BDC2863000
trusted library allocation
page read and write
1BDBC048000
trusted library allocation
page read and write
1BDB9ABD000
trusted library allocation
page read and write
1BDB85E8000
trusted library allocation
page read and write
1BDC0A87000
trusted library allocation
page read and write
1BDBACAE000
trusted library allocation
page read and write
EFC000
unkown
page readonly
1BDAEED8000
heap
page read and write
232A60B4000
unkown
page execute read
1653000
heap
page read and write
1BDB9FF7000
trusted library allocation
page read and write
232A5A86000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDB9D61000
trusted library allocation
page read and write
1BDC0A32000
trusted library allocation
page read and write
1BDBBDE6000
trusted library allocation
page read and write
1BDBA285000
trusted library allocation
page read and write
1BDBC0CC000
trusted library allocation
page read and write
1BDBBFE8000
trusted library allocation
page read and write
1BDB569A000
trusted library allocation
page read and write
1BDC0A31000
trusted library allocation
page read and write
1BDB9020000
trusted library allocation
page read and write
1BDB8DAC000
trusted library allocation
page read and write
22DB0840000
heap
page read and write
1BDC1E33000
trusted library allocation
page read and write
1BDB54A5000
trusted library allocation
page read and write
1BDBC33B000
trusted library allocation
page read and write
1BDB918E000
trusted library allocation
page read and write
1BDB8133000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
2064C347000
trusted library allocation
page read and write
1BDB8DC4000
trusted library allocation
page read and write
1BDB9D25000
trusted library allocation
page read and write
1BDB8EF8000
trusted library allocation
page read and write
1BDAEF14000
heap
page read and write
1BDAEEC0000
heap
page read and write
1BDB81D3000
trusted library allocation
page read and write
1BDAEF14000
heap
page read and write
1BDC08CD000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDBBD51000
trusted library allocation
page read and write
1C13A466000
heap
page read and write
1BDC0AF0000
trusted library allocation
page read and write
1BDBC080000
trusted library allocation
page read and write
1BDBC0E2000
trusted library allocation
page read and write
1BDB9709000
trusted library allocation
page read and write
1BDAEEC7000
heap
page read and write
1BDB9E8F000
trusted library allocation
page read and write
1BDB8D70000
trusted library allocation
page read and write
3B7DFE000
stack
page read and write
1BDB7BAE000
heap
page read and write
1BDB9F68000
trusted library allocation
page read and write
1BDBA222000
trusted library allocation
page read and write
1BDB9787000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDBC071000
trusted library allocation
page read and write
1BDB81AF000
trusted library allocation
page read and write
1BDBA886000
trusted library allocation
page read and write
1BDB8DC4000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
232A617D000
heap
page read and write
1BDB9624000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDAEED8000
heap
page read and write
1BDC0A78000
trusted library allocation
page read and write
1BDC0A74000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDAEF19000
heap
page read and write
1BDB9D37000
trusted library allocation
page read and write
1BDC063F000
trusted library allocation
page read and write
1BDB9F57000
trusted library allocation
page read and write
1BDB79D0000
trusted library allocation
page read and write
1BDC0A0C000
trusted library allocation
page read and write
1BDB78BC000
trusted library allocation
page read and write
1BDBC14C000
trusted library allocation
page read and write
1BDBA7D3000
trusted library allocation
page read and write
1BDB5410000
trusted library allocation
page read and write
1BDB7863000
trusted library allocation
page read and write
1BDB97FC000
trusted library allocation
page read and write
1BDAEEC2000
heap
page read and write
1BDB78B1000
trusted library allocation
page read and write
1BDBA209000
trusted library allocation
page read and write
1BDBC07D000
trusted library allocation
page read and write
1BDBC141000
trusted library allocation
page read and write
1BDB7FFC000
trusted library allocation
page read and write
1BDB9E98000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDB8D78000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDB7B80000
heap
page read and write
232A62B0000
heap
page read and write
1BDBC16B000
trusted library allocation
page read and write
1BDBBD8F000
trusted library allocation
page read and write
1BDC1E61000
trusted library allocation
page read and write
1BDC2B01000
heap
page read and write
1BDBBDDE000
trusted library allocation
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDC0A40000
trusted library allocation
page read and write
1BDB9D37000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDB7B73000
heap
page read and write
1BDB8DCC000
trusted library allocation
page read and write
1BDBBDA6000
trusted library allocation
page read and write
1BDB9066000
trusted library allocation
page read and write
1BDBC304000
trusted library allocation
page read and write
1BDB9E9B000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB97CB000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDAEEAF000
heap
page read and write
1BDAEF1E000
heap
page read and write
1BDBC169000
trusted library allocation
page read and write
1BDC2B8E000
heap
page read and write
1BDB97F8000
trusted library allocation
page read and write
1BDB97F6000
trusted library allocation
page read and write
1BDB9E59000
trusted library allocation
page read and write
1BDB9D1B000
trusted library allocation
page read and write
232A6762000
heap
page read and write
1BDB5328000
trusted library allocation
page read and write
1BDB43FE000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDB436A000
trusted library allocation
page read and write
1C13A324000
trusted library allocation
page read and write
1BDBA8B5000
trusted library allocation
page read and write
1BDB81DA000
trusted library allocation
page read and write
1BDB9DBC000
trusted library allocation
page read and write
1BDBC0A2000
trusted library allocation
page read and write
1BDB9F6D000
trusted library allocation
page read and write
1BDC06EE000
trusted library allocation
page read and write
1BDB8D8F000
trusted library allocation
page read and write
1BDB974F000
trusted library allocation
page read and write
1BDC2B01000
heap
page read and write
1BDB9AA1000
trusted library allocation
page read and write
1BDBA254000
trusted library allocation
page read and write
1BDB9E9B000
trusted library allocation
page read and write
1BDB9A2D000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDB9E7F000
trusted library allocation
page read and write
1BDB9DFB000
trusted library allocation
page read and write
1BDB9EFE000
trusted library allocation
page read and write
1BDB9DBC000
trusted library allocation
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDC295A000
trusted library allocation
page read and write
1BDAEEB8000
heap
page read and write
1BDB7B9C000
heap
page read and write
7117FBE000
unkown
page readonly
1BDC0AE1000
trusted library allocation
page read and write
1BDB9D4B000
trusted library allocation
page read and write
1BDBC16F000
trusted library allocation
page read and write
81899D8000
stack
page read and write
1BDB97F6000
trusted library allocation
page read and write
1BDB97F8000
trusted library allocation
page read and write
1BDBB7A7000
trusted library allocation
page read and write
1BDBC2BE000
trusted library allocation
page read and write
1BDB8010000
trusted library allocation
page read and write
1BDAEEBC000
heap
page read and write
1BDAEECB000
heap
page read and write
1BDBC0E2000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDAEEC5000
heap
page read and write
1BDB8DAE000
trusted library allocation
page read and write
BD0000
heap
page read and write
1BDB8DAF000
trusted library allocation
page read and write
1BDAEF19000
heap
page read and write
1BDB8D64000
trusted library allocation
page read and write
1BDB9ED6000
trusted library allocation
page read and write
1BDB787A000
trusted library allocation
page read and write
232A679A000
heap
page read and write
1BDC17C2000
trusted library allocation
page read and write
1BDC0AF0000
trusted library allocation
page read and write
1BDB9AE1000
trusted library allocation
page read and write
1BDB9F57000
trusted library allocation
page read and write
1BDB9F6D000
trusted library allocation
page read and write
1BDBA2D1000
trusted library allocation
page read and write
1BDB9E7F000
trusted library allocation
page read and write
1BDC08E2000
trusted library allocation
page read and write
F30000
unkown
page write copy
1BDAEEEC000
heap
page read and write
1BDBBA83000
trusted library allocation
page read and write
1BDB81C1000
trusted library allocation
page read and write
1BDAEEB0000
heap
page read and write
1BDC0A61000
trusted library allocation
page read and write
1BDB81BD000
trusted library allocation
page read and write
1BDB9D9B000
trusted library allocation
page read and write
1BDAEECB000
heap
page read and write
1BDC29A4000
trusted library allocation
page read and write
EFC000
unkown
page readonly
1BDC08D1000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDB54F3000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1649000
heap
page read and write
210A8AC0000
heap
page read and write
1BDAEEC9000
heap
page read and write
1BDBC082000
trusted library allocation
page read and write
1BDC1EFE000
trusted library allocation
page read and write
1BDB8D32000
trusted library allocation
page read and write
232A61EC000
heap
page read and write
1BDC2AAD000
trusted library allocation
page read and write
1BDB9865000
trusted library allocation
page read and write
1BDB8592000
trusted library allocation
page read and write
2064C006000
heap
page read and write
1BDAEECF000
heap
page read and write
1BDAEF18000
heap
page read and write
1BDB9BB9000
trusted library allocation
page read and write
1BDBC1A1000
trusted library allocation
page read and write
1BDC290F000
trusted library allocation
page read and write
14A4000
heap
page read and write
1BDC2BBC000
heap
page read and write
1BDAEED7000
heap
page read and write
1BDC06AA000
trusted library allocation
page read and write
232A613D000
heap
page read and write
1BDB5670000
trusted library allocation
page read and write
1BDB9A5A000
trusted library allocation
page read and write
1BDC0A61000
trusted library allocation
page read and write
1BDC2804000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB9D9B000
trusted library allocation
page read and write
1BDB8181000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDB567A000
trusted library allocation
page read and write
1BDB80FA000
trusted library allocation
page read and write
1C13A378000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
232A57AF000
unclassified section
page read and write
1BDAEEAF000
heap
page read and write
1BDBBBE7000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB92DF000
trusted library allocation
page read and write
1BDB53B2000
trusted library allocation
page read and write
1BDBA23F000
trusted library allocation
page read and write
1BDBA263000
trusted library allocation
page read and write
1BDAEF0E000
heap
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDC17D2000
trusted library allocation
page read and write
1BDB9EB0000
trusted library allocation
page read and write
1BDC1ED7000
trusted library allocation
page read and write
1BDB8D7C000
trusted library allocation
page read and write
1BDC2BB1000
trusted library allocation
page read and write
1BDAEF29000
heap
page read and write
1BDBB7B2000
trusted library allocation
page read and write
1BDAEEE1000
heap
page read and write
1BDB9FC1000
trusted library allocation
page read and write
1BDB9725000
trusted library allocation
page read and write
CE24DFE000
stack
page read and write
1BDB78CD000
trusted library allocation
page read and write
1BDC39AE000
trusted library allocation
page read and write
1BDB85C0000
trusted library allocation
page read and write
1C13A300000
trusted library allocation
page read and write
1BDC0A99000
trusted library allocation
page read and write
1BDC3AF9000
trusted library allocation
page read and write
1BDB8076000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDB9E9A000
trusted library allocation
page read and write
1BDB9F62000
trusted library allocation
page read and write
1BDBC2D7000
trusted library allocation
page read and write
1BDBBD57000
trusted library allocation
page read and write
1BDB8D69000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDAEF17000
heap
page read and write
232A677C000
heap
page read and write
1BDC17DC000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDBC160000
trusted library allocation
page read and write
1BDBC257000
trusted library allocation
page read and write
14A4000
heap
page read and write
1BDAEECA000
heap
page read and write
1BDB43B3000
trusted library allocation
page read and write
1BDB8153000
trusted library allocation
page read and write
1BDC0A78000
trusted library allocation
page read and write
1BDBBF62000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDB973B000
trusted library allocation
page read and write
1BDBB7F7000
trusted library allocation
page read and write
1BDBA24D000
trusted library allocation
page read and write
1BDB9D45000
trusted library allocation
page read and write
1BDB9EE0000
trusted library allocation
page read and write
1BDB8D94000
trusted library allocation
page read and write
1BDB566E000
trusted library allocation
page read and write
1BDC0A40000
trusted library allocation
page read and write
1BDB97B5000
trusted library allocation
page read and write
1BDBC23C000
trusted library allocation
page read and write
1BDB9FA2000
trusted library allocation
page read and write
1BDB8D42000
trusted library allocation
page read and write
1BDAEF0E000
heap
page read and write
1BDB8DCC000
trusted library allocation
page read and write
1BDB9A1F000
trusted library allocation
page read and write
818DC3E000
stack
page read and write
232A5ABC000
trusted library allocation
page read and write
1BDBA2D1000
trusted library allocation
page read and write
1BDB8D69000
trusted library allocation
page read and write
2064C419000
trusted library allocation
page read and write
1BDBC09E000
trusted library allocation
page read and write
1BDB7B97000
heap
page read and write
1BDB9E6E000
trusted library allocation
page read and write
1BDB9F2E000
trusted library allocation
page read and write
2064C381000
trusted library allocation
page read and write
232A61D0000
heap
page read and write
1BDBA8CD000
trusted library allocation
page read and write
1BDB9E8C000
trusted library allocation
page read and write
1BDB97BE000
trusted library allocation
page read and write
2064C40C000
trusted library allocation
page read and write
1BDB43FE000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDB9DF9000
trusted library allocation
page read and write
1BDBC217000
trusted library allocation
page read and write
1BDB9FA4000
trusted library allocation
page read and write
14A4000
heap
page read and write
1BDB8D9B000
trusted library allocation
page read and write
1BDAEF1C000
heap
page read and write
1BDBC14C000
trusted library allocation
page read and write
1BDBAD2D000
trusted library allocation
page read and write
1BDB97F4000
trusted library allocation
page read and write
1BDB97CB000
trusted library allocation
page read and write
1BDB9FF4000
trusted library allocation
page read and write
1BDC0732000
trusted library allocation
page read and write
1BDB9A71000
trusted library allocation
page read and write
1BDC0A76000
trusted library allocation
page read and write
232A5660000
unclassified section
page readonly
1BDB97B9000
trusted library allocation
page read and write
145D000
stack
page read and write
1BDB7B7E000
heap
page read and write
1BDB5670000
trusted library allocation
page read and write
1BDBBBD9000
trusted library allocation
page read and write
1BDB9E84000
trusted library allocation
page read and write
1BDB9DA8000
trusted library allocation
page read and write
1BDB9A0A000
trusted library allocation
page read and write
1BDBBEAE000
trusted library allocation
page read and write
1BDB9EB9000
trusted library allocation
page read and write
232A5B00000
trusted library section
page readonly
1BDAEF15000
heap
page read and write
1BDC0A6C000
trusted library allocation
page read and write
1C13A38E000
trusted library allocation
page read and write
1BDB9D2A000
trusted library allocation
page read and write
1BDB567A000
trusted library allocation
page read and write
1BDB9D87000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDB78F2000
trusted library allocation
page read and write
1BDBAC58000
trusted library allocation
page read and write
1BDB81CB000
trusted library allocation
page read and write
1BDC0A6E000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDB96C8000
trusted library allocation
page read and write
1BDB78E1000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDBBDD4000
trusted library allocation
page read and write
1BDB78A7000
trusted library allocation
page read and write
1BDB9878000
trusted library allocation
page read and write
1BDB53B2000
trusted library allocation
page read and write
1BDC2B89000
trusted library allocation
page read and write
22DB091D000
heap
page read and write
1BDBBFB4000
trusted library allocation
page read and write
1BDBAC42000
trusted library allocation
page read and write
1BDB9066000
trusted library allocation
page read and write
1BDBC15C000
trusted library allocation
page read and write
1BDB9745000
trusted library allocation
page read and write
1BDB7999000
trusted library allocation
page read and write
1BDB97D1000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
232A616F000
heap
page read and write
1BDBA231000
trusted library allocation
page read and write
7116EFE000
stack
page read and write
1BDB7B82000
heap
page read and write
1BDAEF0E000
heap
page read and write
1BDB9AEF000
trusted library allocation
page read and write
232A61E2000
heap
page read and write
1BDB9E9B000
trusted library allocation
page read and write
1BDC2AD5000
trusted library allocation
page read and write
1BDBC068000
trusted library allocation
page read and write
232A61E1000
heap
page read and write
1BDB9FF3000
trusted library allocation
page read and write
1BDBBB5E000
trusted library allocation
page read and write
1BDBC27E000
trusted library allocation
page read and write
1BDBC10E000
trusted library allocation
page read and write
1BDB9D37000
trusted library allocation
page read and write
1BDB5328000
trusted library allocation
page read and write
1BDAEECE000
heap
page read and write
1BDAEEC7000
heap
page read and write
1BDB9589000
trusted library allocation
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDC1EB3000
trusted library allocation
page read and write
1BDB9774000
trusted library allocation
page read and write
1BDB5670000
trusted library allocation
page read and write
232A677C000
heap
page read and write
1BDAEED8000
heap
page read and write
1BDB79D0000
trusted library allocation
page read and write
232A6785000
heap
page read and write
1BDB9E9A000
trusted library allocation
page read and write
1BDBC150000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDC08B1000
trusted library allocation
page read and write
1BDC39D4000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDB8163000
trusted library allocation
page read and write
1BDC1A4E000
trusted library allocation
page read and write
1BDB9DFD000
trusted library allocation
page read and write
1BDBA222000
trusted library allocation
page read and write
1BDBADBC000
trusted library allocation
page read and write
1BDBC0E3000
trusted library allocation
page read and write
232A61E1000
heap
page read and write
1BDB8DB2000
trusted library allocation
page read and write
818B23E000
unkown
page readonly
1BDAEEE0000
heap
page read and write
1BDB439F000
trusted library allocation
page read and write
1BDAEEC7000
heap
page read and write
1BDB79D3000
trusted library allocation
page read and write
1BDB959F000
trusted library allocation
page read and write
1BDC0A76000
trusted library allocation
page read and write
1C13A349000
trusted library allocation
page read and write
1BDC0A32000
trusted library allocation
page read and write
1BDBC0DC000
trusted library allocation
page read and write
1BDC2975000
trusted library allocation
page read and write
2064C361000
trusted library allocation
page read and write
1BDB7FFC000
trusted library allocation
page read and write
1BDB9A96000
trusted library allocation
page read and write
7116E3E000
unkown
page readonly
1BDB9B59000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
818D43E000
unkown
page readonly
1BDBA0DB000
trusted library allocation
page read and write
1BDB810B000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB8D4C000
trusted library allocation
page read and write
1BDB957B000
trusted library allocation
page read and write
1BDB9FAE000
trusted library allocation
page read and write
1BDC2C1A000
heap
page read and write
1BDAEEC6000
heap
page read and write
1BDB8136000
trusted library allocation
page read and write
1BDBC1B2000
trusted library allocation
page read and write
1BDBC1A7000
trusted library allocation
page read and write
232A616D000
heap
page read and write
1BDB9E4A000
trusted library allocation
page read and write
1BDB8187000
trusted library allocation
page read and write
1BDB9D74000
trusted library allocation
page read and write
1BDB81D3000
trusted library allocation
page read and write
1BDB9E6A000
trusted library allocation
page read and write
1BDB9D39000
trusted library allocation
page read and write
1BDBA20C000
trusted library allocation
page read and write
1BDBA23F000
trusted library allocation
page read and write
1BDB9EAB000
trusted library allocation
page read and write
1BDBAC3E000
trusted library allocation
page read and write
14A4000
heap
page read and write
1BDB90A1000
trusted library allocation
page read and write
1BDC0A40000
trusted library allocation
page read and write
1BDB8EEB000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDAEEBE000
heap
page read and write
1BDB81FA000
trusted library allocation
page read and write
1BDB9D87000
trusted library allocation
page read and write
1BDB9D3D000
trusted library allocation
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDBA88E000
trusted library allocation
page read and write
1BDB7B82000
heap
page read and write
1BDB9F22000
trusted library allocation
page read and write
1BDB9005000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDBBFAA000
trusted library allocation
page read and write
1BDB437D000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDBBE7B000
trusted library allocation
page read and write
1BDB9DAA000
trusted library allocation
page read and write
1BDB97D1000
trusted library allocation
page read and write
1BDBB79E000
trusted library allocation
page read and write
1BDC08F4000
trusted library allocation
page read and write
1BDB81DA000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB9ED1000
trusted library allocation
page read and write
166E000
heap
page read and write
1BDB9E73000
trusted library allocation
page read and write
1BDBC0A0000
trusted library allocation
page read and write
1BDB8039000
trusted library allocation
page read and write
232A67A8000
heap
page read and write
1BDC0A7A000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDB9F6B000
trusted library allocation
page read and write
1BDB9D2A000
trusted library allocation
page read and write
1BDBC0DA000
trusted library allocation
page read and write
1BDAEEC0000
heap
page read and write
1BDB56F6000
trusted library allocation
page read and write
1BDB95DF000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDC08A6000
trusted library allocation
page read and write
1640000
heap
page read and write
2064C403000
trusted library allocation
page read and write
1BDBA2D7000
trusted library allocation
page read and write
1BDB81CD000
trusted library allocation
page read and write
2064C3B2000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDBBEDE000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDB9E87000
trusted library allocation
page read and write
1BDB81FA000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB9AB8000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1BDB9F5A000
trusted library allocation
page read and write
1BDB8D4A000
trusted library allocation
page read and write
1BDB9AB8000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDB9B0B000
trusted library allocation
page read and write
1BDB9FA4000
trusted library allocation
page read and write
1BDBA052000
trusted library allocation
page read and write
232A61E1000
heap
page read and write
1BDB4400000
trusted library allocation
page read and write
1BDBC1A1000
trusted library allocation
page read and write
1C13A303000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
232A5A5C000
trusted library allocation
page read and write
1BDB97AD000
trusted library allocation
page read and write
1BDB8D06000
trusted library allocation
page read and write
1BDB9A98000
trusted library allocation
page read and write
1BDBC0B7000
trusted library allocation
page read and write
1BDC073C000
trusted library allocation
page read and write
1BDBBEC8000
trusted library allocation
page read and write
1BDB7FBE000
trusted library allocation
page read and write
1BDBC1F9000
trusted library allocation
page read and write
1BDB56E0000
trusted library allocation
page read and write
232A67B8000
heap
page read and write
1BDAEECB000
heap
page read and write
1BDAEEB5000
heap
page read and write
1BDB4317000
trusted library allocation
page read and write
14A4000
heap
page read and write
1BDB91A9000
trusted library allocation
page read and write
1BDBA8DB000
trusted library allocation
page read and write
1BDB9E8C000
trusted library allocation
page read and write
1BDB81B6000
trusted library allocation
page read and write
1BDB9AEF000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDAEED1000
heap
page read and write
3B425E000
stack
page read and write
1BDB9AAC000
trusted library allocation
page read and write
1BDB973D000
trusted library allocation
page read and write
1BDB7BB5000
heap
page read and write
1BDBA8AD000
trusted library allocation
page read and write
1BDC1EB8000
trusted library allocation
page read and write
1BDC2000000
trusted library allocation
page read and write
1BDBAC4E000
trusted library allocation
page read and write
232A67B8000
heap
page read and write
1BDBA2D1000
trusted library allocation
page read and write
1BDB81CF000
trusted library allocation
page read and write
1BDBBEAE000
trusted library allocation
page read and write
1BDBC05A000
trusted library allocation
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDBA21A000
trusted library allocation
page read and write
1BDC2B01000
heap
page read and write
1BDAEED8000
heap
page read and write
1BDB819C000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDC1E3F000
trusted library allocation
page read and write
1BDC0A87000
trusted library allocation
page read and write
1BDB9E9B000
trusted library allocation
page read and write
1BDBA065000
trusted library allocation
page read and write
1BDBACB0000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
221E000
stack
page read and write
1BDB9FA2000
trusted library allocation
page read and write
1BDC0A68000
trusted library allocation
page read and write
1BDB799F000
trusted library allocation
page read and write
1BDBA21A000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDB908B000
trusted library allocation
page read and write
1BDC08AC000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDB7833000
trusted library allocation
page read and write
1BDB7FA2000
trusted library allocation
page read and write
1BDB9583000
trusted library allocation
page read and write
1BDBBFFC000
trusted library allocation
page read and write
1BDBB78C000
trusted library allocation
page read and write
1BDC0A70000
trusted library allocation
page read and write
2064C303000
trusted library allocation
page read and write
1BDB79D3000
trusted library allocation
page read and write
1BDB9F9E000
trusted library allocation
page read and write
1BDB902A000
trusted library allocation
page read and write
1BDC3B24000
trusted library allocation
page read and write
22DB09C0000
heap
page read and write
1BDAEF0E000
heap
page read and write
1BDB8133000
trusted library allocation
page read and write
1BDBA8B5000
trusted library allocation
page read and write
F22000
unkown
page readonly
1BDAEF15000
heap
page read and write
1BDB9D39000
trusted library allocation
page read and write
1BDC0ABE000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDC2B01000
heap
page read and write
1BDB9A2B000
trusted library allocation
page read and write
2064C004000
heap
page read and write
1BDC29B6000
trusted library allocation
page read and write
1BDBC267000
trusted library allocation
page read and write
1BDB9FB1000
trusted library allocation
page read and write
1BDB85EE000
trusted library allocation
page read and write
1BDBC062000
trusted library allocation
page read and write
1BDB97B9000
trusted library allocation
page read and write
1BDBC0F1000
trusted library allocation
page read and write
1BDB9E37000
trusted library allocation
page read and write
232A5A67000
trusted library allocation
page read and write
1BDB53B2000
trusted library allocation
page read and write
1BDB8DC7000
trusted library allocation
page read and write
1BDBBEC8000
trusted library allocation
page read and write
1BDB7FFC000
trusted library allocation
page read and write
1BDBA0D7000
trusted library allocation
page read and write
1BDC0716000
trusted library allocation
page read and write
1BDC1ABF000
trusted library allocation
page read and write
1BDC2911000
trusted library allocation
page read and write
1C13A30C000
trusted library allocation
page read and write
2064BD20000
unclassified section
page readonly
1BDB9007000
trusted library allocation
page read and write
1BDAEEB0000
heap
page read and write
232A5A45000
trusted library allocation
page read and write
1BDBBECE000
trusted library allocation
page read and write
1BDBB7B2000
trusted library allocation
page read and write
1BDB97C3000
trusted library allocation
page read and write
1BDBC0DC000
trusted library allocation
page read and write
1BDB98FA000
trusted library allocation
page read and write
1BDB8D32000
trusted library allocation
page read and write
1BDB79FA000
trusted library allocation
page read and write
1BDBBF7A000
trusted library allocation
page read and write
1BDB9FC1000
trusted library allocation
page read and write
1BDB43FE000
trusted library allocation
page read and write
1BDAEF27000
heap
page read and write
1BDB9D63000
trusted library allocation
page read and write
1BDBA272000
trusted library allocation
page read and write
1BDB9D45000
trusted library allocation
page read and write
1BDB9ABD000
trusted library allocation
page read and write
1BDBC383000
trusted library allocation
page read and write
1BDBBAB4000
trusted library allocation
page read and write
1BDBB749000
trusted library allocation
page read and write
232A5B46000
heap
page read and write
1BDAEF22000
heap
page read and write
1BDB9DBE000
trusted library allocation
page read and write
1BDAEEE1000
heap
page read and write
1BDBA1FC000
trusted library allocation
page read and write
1BDB43FE000
trusted library allocation
page read and write
1BDB80FA000
trusted library allocation
page read and write
1BDBBFDB000
trusted library allocation
page read and write
1BDC3D00000
trusted library allocation
page read and write
1BDBACD2000
trusted library allocation
page read and write
1BDBA89C000
trusted library allocation
page read and write
232A6304000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDBA2C5000
trusted library allocation
page read and write
1BDB9D61000
trusted library allocation
page read and write
1BDB8D70000
trusted library allocation
page read and write
1BDB9D89000
trusted library allocation
page read and write
1BDB9DAA000
trusted library allocation
page read and write
1BDB974B000
trusted library allocation
page read and write
1BDB958D000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDB8D9E000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDB8D70000
trusted library allocation
page read and write
1BDB7B75000
heap
page read and write
1BDB9033000
trusted library allocation
page read and write
1BDB56BC000
trusted library allocation
page read and write
1BDBC141000
trusted library allocation
page read and write
1BDBC176000
trusted library allocation
page read and write
1BDBBFAC000
trusted library allocation
page read and write
1BDB439F000
trusted library allocation
page read and write
1BDAEEBC000
heap
page read and write
1BDAEEC5000
heap
page read and write
1BDB8D0C000
trusted library allocation
page read and write
1BDB5670000
trusted library allocation
page read and write
1BDC088A000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
1BDB98FC000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDBC210000
trusted library allocation
page read and write
1BDB9192000
trusted library allocation
page read and write
1BDBC116000
trusted library allocation
page read and write
1BDC3A85000
trusted library allocation
page read and write
1BDC2B01000
heap
page read and write
1BDC0A99000
trusted library allocation
page read and write
1BDB9FA2000
trusted library allocation
page read and write
2064C312000
trusted library allocation
page read and write
1BDC0AC7000
trusted library allocation
page read and write
1BDB7B9A000
heap
page read and write
1BDB9D25000
trusted library allocation
page read and write
1BDAEF14000
heap
page read and write
1BDAEF0B000
heap
page read and write
1BDAEEEA000
heap
page read and write
1BDBBDCA000
trusted library allocation
page read and write
1BDBA773000
trusted library allocation
page read and write
1BDC0A5F000
trusted library allocation
page read and write
1BDB9D25000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDAEF16000
heap
page read and write
1BDAEEEA000
heap
page read and write
1BDB56C1000
trusted library allocation
page read and write
1C13A370000
trusted library allocation
page read and write
1BDBA03A000
trusted library allocation
page read and write
1BDB7F7A000
trusted library allocation
page read and write
1BDB9A5D000
trusted library allocation
page read and write
1BDB9086000
trusted library allocation
page read and write
232A5710000
heap
page read and write
1BDBBF88000
trusted library allocation
page read and write
1BDB9F5C000
trusted library allocation
page read and write
1BDAEF22000
heap
page read and write
1BDB4375000
trusted library allocation
page read and write
1BDC2AC1000
trusted library allocation
page read and write
1BDB8187000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDB957F000
trusted library allocation
page read and write
1BDB81D3000
trusted library allocation
page read and write
1BDBBFE3000
trusted library allocation
page read and write
2064BFB0000
unclassified section
page readonly
1BDB9E8F000
trusted library allocation
page read and write
1BDB80FA000
trusted library allocation
page read and write
1BDB8D54000
trusted library allocation
page read and write
1BDB5488000
trusted library allocation
page read and write
1BDB814A000
trusted library allocation
page read and write
1BDBC285000
trusted library allocation
page read and write
1BDB9B87000
trusted library allocation
page read and write
1BDBBA5B000
trusted library allocation
page read and write
1BDB4326000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDC0A74000
trusted library allocation
page read and write
232A6150000
heap
page read and write
1BDC3A59000
trusted library allocation
page read and write
1BDB9FF3000
trusted library allocation
page read and write
1BDB9F37000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDAEEBF000
heap
page read and write
1BDC0700000
trusted library allocation
page read and write
1BDBA24A000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDC0A6C000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDB9ED7000
trusted library allocation
page read and write
1BDB9E4F000
trusted library allocation
page read and write
1BDC1A1A000
trusted library allocation
page read and write
1BDB9785000
trusted library allocation
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDB9F1C000
trusted library allocation
page read and write
1BDB9D2A000
trusted library allocation
page read and write
1BDBB73B000
trusted library allocation
page read and write
1BDB9DFB000
trusted library allocation
page read and write
1BDBADCD000
trusted library allocation
page read and write
1BDBAD95000
trusted library allocation
page read and write
22DB093A000
heap
page read and write
1BDB813E000
trusted library allocation
page read and write
1BDB9FD3000
trusted library allocation
page read and write
2064C3CB000
trusted library allocation
page read and write
1BDB97F8000
trusted library allocation
page read and write
232A6740000
heap
page read and write
1BDBADA2000
trusted library allocation
page read and write
1BDBC141000
trusted library allocation
page read and write
1BDB9FBB000
trusted library allocation
page read and write
232A61E1000
heap
page read and write
1BDB9717000
trusted library allocation
page read and write
1BDB8D16000
trusted library allocation
page read and write
1BDB79A5000
trusted library allocation
page read and write
1BDC2977000
trusted library allocation
page read and write
1BDB9785000
trusted library allocation
page read and write
1BDBA20C000
trusted library allocation
page read and write
1BDB9DBC000
trusted library allocation
page read and write
1BDB8D67000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDB9E94000
trusted library allocation
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDB431E000
trusted library allocation
page read and write
1BDC2B61000
trusted library allocation
page read and write
1BDB973D000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB81C9000
trusted library allocation
page read and write
1BDC2B2A000
heap
page read and write
1BDC06A6000
trusted library allocation
page read and write
818E43E000
unkown
page readonly
1BDBA2D5000
trusted library allocation
page read and write
164E000
heap
page read and write
232A5A79000
trusted library allocation
page read and write
1BDB9FF4000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDBA2F9000
trusted library allocation
page read and write
2064C010000
heap
page read and write
1BDB81DA000
trusted library allocation
page read and write
1BDB9FBB000
trusted library allocation
page read and write
1BDBC0E2000
trusted library allocation
page read and write
1BDB78BB000
trusted library allocation
page read and write
1BDB569D000
trusted library allocation
page read and write
1BDB9E7F000
trusted library allocation
page read and write
1BDB97C5000
trusted library allocation
page read and write
1BDBB7AF000
trusted library allocation
page read and write
1BDBAD26000
trusted library allocation
page read and write
1BDB9F5C000
trusted library allocation
page read and write
1BDC29A2000
trusted library allocation
page read and write
1BDBBD77000
trusted library allocation
page read and write
1BDAEECB000
heap
page read and write
1BDB7B9A000
heap
page read and write
1BDBA1FE000
trusted library allocation
page read and write
1BDAEEBC000
heap
page read and write
232A60D0000
trusted library allocation
page read and write
1BDB9ABD000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
232A6799000
heap
page read and write
1BDBC08C000
trusted library allocation
page read and write
1BDB78FD000
trusted library allocation
page read and write
1BDB9F5A000
trusted library allocation
page read and write
3B65FE000
unkown
page readonly
1BDAEF03000
heap
page read and write
1BDBB8F3000
trusted library allocation
page read and write
1BDB9ABD000
trusted library allocation
page read and write
CE265FF000
stack
page read and write
1BDC2968000
trusted library allocation
page read and write
1BDB8D58000
trusted library allocation
page read and write
1BDB8EE9000
trusted library allocation
page read and write
1BDB9D5A000
trusted library allocation
page read and write
1BDB566E000
trusted library allocation
page read and write
1BDBA7A3000
trusted library allocation
page read and write
1BDB9A77000
trusted library allocation
page read and write
1BDB97D1000
trusted library allocation
page read and write
1BDB79D3000
trusted library allocation
page read and write
1BDB9FBB000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDAEED0000
heap
page read and write
1BDBC14C000
trusted library allocation
page read and write
1BDB9A73000
trusted library allocation
page read and write
1BDB9FDA000
trusted library allocation
page read and write
1BDB9A6C000
trusted library allocation
page read and write
1BDB5663000
trusted library allocation
page read and write
1675000
heap
page read and write
1BDB91EA000
trusted library allocation
page read and write
1BDBC0B7000
trusted library allocation
page read and write
1BDB9EED000
trusted library allocation
page read and write
166B000
heap
page read and write
1BDB42FB000
trusted library allocation
page read and write
1BDB9D5C000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDB9D25000
trusted library allocation
page read and write
1BDB81C1000
trusted library allocation
page read and write
232A614C000
heap
page read and write
1BDB56BC000
trusted library allocation
page read and write
1BDB9EDD000
trusted library allocation
page read and write
1BDB9DBC000
trusted library allocation
page read and write
232A676B000
heap
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDB9E64000
trusted library allocation
page read and write
1BDC1711000
trusted library allocation
page read and write
1BDB9D1B000
trusted library allocation
page read and write
1BDBC150000
trusted library allocation
page read and write
1BDAEF29000
heap
page read and write
1BDAEEC6000
heap
page read and write
1BDB7F55000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDC0AC7000
trusted library allocation
page read and write
1BDAEEC9000
heap
page read and write
1BDB9EFB000
trusted library allocation
page read and write
1BDB9B29000
trusted library allocation
page read and write
164B000
heap
page read and write
1BDB56E5000
trusted library allocation
page read and write
1BDC1A6A000
trusted library allocation
page read and write
1BDB974F000
trusted library allocation
page read and write
1BDB9F2E000
trusted library allocation
page read and write
1BDBA8D9000
trusted library allocation
page read and write
1BDB56F8000
trusted library allocation
page read and write
1BDB9EB4000
trusted library allocation
page read and write
1BDB9AB8000
trusted library allocation
page read and write
1BDB566E000
trusted library allocation
page read and write
1BDC08CD000
trusted library allocation
page read and write
1BDB974B000
trusted library allocation
page read and write
232A5A9E000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDAEECE000
heap
page read and write
1BDB9741000
trusted library allocation
page read and write
1BDB9F8D000
trusted library allocation
page read and write
1BDB54F1000
trusted library allocation
page read and write
1BDB8D82000
trusted library allocation
page read and write
1BDB56DF000
trusted library allocation
page read and write
1BDBBB29000
trusted library allocation
page read and write
1BDB9D25000
trusted library allocation
page read and write
1BDBB7F7000
trusted library allocation
page read and write
1BDB7B9A000
heap
page read and write
1675000
heap
page read and write
1BDC1EF1000
trusted library allocation
page read and write
1BDB971D000
trusted library allocation
page read and write
1BDB9AB8000
trusted library allocation
page read and write
1BDB9ED8000
trusted library allocation
page read and write
1BDC0773000
trusted library allocation
page read and write
1BDB78A4000
trusted library allocation
page read and write
1BDC29A2000
trusted library allocation
page read and write
1BDBA000000
trusted library allocation
page read and write
1BDB78F2000
trusted library allocation
page read and write
1BDB9F81000
trusted library allocation
page read and write
1BDBA222000
trusted library allocation
page read and write
232A6150000
heap
page read and write
1BDB7891000
trusted library allocation
page read and write
1BDBACDE000
trusted library allocation
page read and write
1BDB4366000
trusted library allocation
page read and write
1BDBC068000
trusted library allocation
page read and write
1BDB9E8F000
trusted library allocation
page read and write
1BDB9A2B000
trusted library allocation
page read and write
F34000
unkown
page readonly
1C13A460000
heap
page read and write
1BDB91BA000
trusted library allocation
page read and write
818B1FE000
unkown
page readonly
1BDC1A69000
trusted library allocation
page read and write
1BDB9F57000
trusted library allocation
page read and write
1BDB9F54000
trusted library allocation
page read and write
1BDB3890000
trusted library allocation
page read and write
1BDBBD77000
trusted library allocation
page read and write
1BDB9BF2000
trusted library allocation
page read and write
1BDB7960000
trusted library allocation
page read and write
F2C000
unkown
page write copy
1BDB9E44000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDAEEEA000
heap
page read and write
1BDB9FBC000
trusted library allocation
page read and write
E3E000
stack
page read and write
1BDC08FC000
trusted library allocation
page read and write
1BDAEF19000
heap
page read and write
232A57A2000
unclassified section
page read and write
1BDBCC24000
trusted library allocation
page read and write
1BDB97E7000
trusted library allocation
page read and write
1BDB809B000
trusted library allocation
page read and write
1BDB9A71000
trusted library allocation
page read and write
1BDB81FA000
trusted library allocation
page read and write
1BDBC700000
trusted library allocation
page read and write
1BDC2AFC000
trusted library allocation
page read and write
1BDB9D9B000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
232A61D9000
heap
page read and write
1BDC39B6000
trusted library allocation
page read and write
1BDB9A28000
trusted library allocation
page read and write
1BDBA78A000
trusted library allocation
page read and write
1BDAEEAE000
heap
page read and write
1BDC2B01000
heap
page read and write
1BDBC169000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDB9EE9000
trusted library allocation
page read and write
1BDB96FB000
trusted library allocation
page read and write
1BDB9F24000
trusted library allocation
page read and write
1BDC2B27000
heap
page read and write
1BDAEEE0000
heap
page read and write
1BDAEF25000
heap
page read and write
1BDB9E7F000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDB8D56000
trusted library allocation
page read and write
1BDB85E6000
trusted library allocation
page read and write
CE26DFE000
stack
page read and write
1BDB9A13000
trusted library allocation
page read and write
22DB0928000
heap
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDBC257000
trusted library allocation
page read and write
1BDC2A4A000
trusted library allocation
page read and write
166B000
heap
page read and write
1BDB8D41000
trusted library allocation
page read and write
232A5A0C000
trusted library allocation
page read and write
1C13A470000
heap
page read and write
1BDBAD5C000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDC08CD000
trusted library allocation
page read and write
1BDC3658000
trusted library allocation
page read and write
1BDBA8FD000
trusted library allocation
page read and write
1BDB90AC000
trusted library allocation
page read and write
1BDB78A1000
trusted library allocation
page read and write
1BDAEF14000
heap
page read and write
1BDB85EB000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDC295A000
trusted library allocation
page read and write
1BDB9717000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDAEEBF000
heap
page read and write
1BDC1A37000
trusted library allocation
page read and write
1BDB9E8C000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
1BDB56BE000
trusted library allocation
page read and write
1BDB7FA2000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
1BDC3AFC000
trusted library allocation
page read and write
1BDB9DBC000
trusted library allocation
page read and write
1BDB9FA4000
trusted library allocation
page read and write
1BDC06EC000
trusted library allocation
page read and write
1BDB9FC1000
trusted library allocation
page read and write
1BDB78DB000
trusted library allocation
page read and write
1BDC2A38000
trusted library allocation
page read and write
1BDAEF17000
heap
page read and write
1BDAEEBE000
heap
page read and write
1BDC29B6000
trusted library allocation
page read and write
22DB23A9000
heap
page read and write
1BDB9787000
trusted library allocation
page read and write
1C139EF0000
unclassified section
page readonly
1BDAEEC5000
heap
page read and write
22DB093A000
heap
page read and write
2064BF40000
heap
page read and write
1BDB9A5A000
trusted library allocation
page read and write
1BDB85FC000
trusted library allocation
page read and write
223743A03000
trusted library allocation
page read and write
1BDC2BC5000
heap
page read and write
210A89A0000
heap
page read and write
1BDB9704000
trusted library allocation
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDBC0F7000
trusted library allocation
page read and write
232A5A12000
trusted library allocation
page read and write
232A6198000
heap
page read and write
1BDB9FD3000
trusted library allocation
page read and write
1BDBC27E000
trusted library allocation
page read and write
1657000
heap
page read and write
1BDB9162000
trusted library allocation
page read and write
1BDBC0E2000
trusted library allocation
page read and write
1BDB8076000
trusted library allocation
page read and write
1BDBC0F1000
trusted library allocation
page read and write
1BDBBA77000
trusted library allocation
page read and write
1BDC2B7E000
heap
page read and write
1BDBA21A000
trusted library allocation
page read and write
1BDAEEC9000
heap
page read and write
1BDBC0DF000
trusted library allocation
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDB7B75000
heap
page read and write
1BDAEF1E000
heap
page read and write
1643000
heap
page read and write
1BDBBD60000
trusted library allocation
page read and write
1BDB9FD3000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDC2968000
trusted library allocation
page read and write
1BDC0A6E000
trusted library allocation
page read and write
1BDBA081000
trusted library allocation
page read and write
1BDB9D2A000
trusted library allocation
page read and write
1BDBB893000
trusted library allocation
page read and write
1BDB7B82000
heap
page read and write
1BDBA89C000
trusted library allocation
page read and write
14A4000
heap
page read and write
1BDBC16B000
trusted library allocation
page read and write
1BDB7B9D000
heap
page read and write
1BDBBED5000
trusted library allocation
page read and write
1BDBAC73000
trusted library allocation
page read and write
1BDBA2D7000
trusted library allocation
page read and write
1BDBA79D000
trusted library allocation
page read and write
1BDB96F9000
trusted library allocation
page read and write
1BDBAC99000
trusted library allocation
page read and write
1BDB9F4B000
trusted library allocation
page read and write
1BDBB7B7000
trusted library allocation
page read and write
1BDB97F6000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
232A60C0000
unkown
page execute read
1BDB8122000
trusted library allocation
page read and write
1BDAEF02000
heap
page read and write
1BDBBAE4000
trusted library allocation
page read and write
1BDB78FD000
trusted library allocation
page read and write
1BDB9A34000
trusted library allocation
page read and write
1BDB9DAA000
trusted library allocation
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDB4271000
trusted library allocation
page read and write
1BDC2AA5000
trusted library allocation
page read and write
1BDB9DBC000
trusted library allocation
page read and write
1BDB818C000
trusted library allocation
page read and write
1BDC08D3000
trusted library allocation
page read and write
1BDBC07D000
trusted library allocation
page read and write
1BDB9598000
trusted library allocation
page read and write
1BDAEF27000
heap
page read and write
1BDAEF03000
heap
page read and write
1BDB9D87000
trusted library allocation
page read and write
1BDBA23B000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDB8EF0000
trusted library allocation
page read and write
1BDB54A7000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDBCB66000
trusted library allocation
page read and write
1BDBAC46000
trusted library allocation
page read and write
1BDBB7FC000
trusted library allocation
page read and write
1BDB9ECF000
trusted library allocation
page read and write
1BDAEECA000
heap
page read and write
1BDBB792000
trusted library allocation
page read and write
1BDC3AB4000
trusted library allocation
page read and write
1BDB78CD000
trusted library allocation
page read and write
1BDB81FA000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
22DB0895000
heap
page read and write
1BDB9743000
trusted library allocation
page read and write
1BDB95F3000
trusted library allocation
page read and write
232A5A89000
trusted library allocation
page read and write
1BDB81D3000
trusted library allocation
page read and write
1BDB96D8000
trusted library allocation
page read and write
1BDB9F21000
trusted library allocation
page read and write
1BDB97E5000
trusted library allocation
page read and write
1550000
heap
page read and write
1BDB81C9000
trusted library allocation
page read and write
1BDB79A3000
trusted library allocation
page read and write
1BDB977F000
trusted library allocation
page read and write
232A5A77000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDBA06F000
trusted library allocation
page read and write
1BDAEEE1000
heap
page read and write
818C3BE000
unkown
page readonly
1BDB7BB2000
heap
page read and write
1BDC0A68000
trusted library allocation
page read and write
1BDB7999000
trusted library allocation
page read and write
2064BF30000
heap
page readonly
1BDB7BAE000
heap
page read and write
1BDBAD95000
trusted library allocation
page read and write
1BDB97F6000
trusted library allocation
page read and write
1BDC0A72000
trusted library allocation
page read and write
232A6159000
heap
page read and write
1BDAEF19000
heap
page read and write
1BDB9FC1000
trusted library allocation
page read and write
1BDB8DC4000
trusted library allocation
page read and write
1BDBBAD9000
trusted library allocation
page read and write
1BDB8598000
trusted library allocation
page read and write
1BDC2B36000
heap
page read and write
1BDB9AB8000
trusted library allocation
page read and write
1BDB9FAE000
trusted library allocation
page read and write
1BDB81CF000
trusted library allocation
page read and write
1BDB562B000
trusted library allocation
page read and write
232A56F0000
heap
page read and write
1BDBB7FC000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDBBA78000
trusted library allocation
page read and write
1BDB9D61000
trusted library allocation
page read and write
1BDB9D89000
trusted library allocation
page read and write
1BDBC0F4000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDBBEBD000
trusted library allocation
page read and write
1BDB9F6D000
trusted library allocation
page read and write
1BDB9F9C000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDB9EC2000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDAEF25000
heap
page read and write
1BDC17A0000
trusted library allocation
page read and write
1BDB973B000
trusted library allocation
page read and write
1BDBA8AB000
trusted library allocation
page read and write
1BDB8EE1000
trusted library allocation
page read and write
1BDC3A5C000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDB9ABD000
trusted library allocation
page read and write
1BDB7E00000
trusted library allocation
page read and write
1BDBADF8000
trusted library allocation
page read and write
2064C000000
heap
page read and write
2064C300000
trusted library allocation
page read and write
1BDBA8D7000
trusted library allocation
page read and write
1BDB9E7F000
trusted library allocation
page read and write
1BDB8163000
trusted library allocation
page read and write
1BDB8D7C000
trusted library allocation
page read and write
1BDBC0A8000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
1BDB81C9000
trusted library allocation
page read and write
1BDB7B9D000
heap
page read and write
1BDBA07A000
trusted library allocation
page read and write
1BDB7B79000
heap
page read and write
1BDB96F9000
trusted library allocation
page read and write
1BDB9FAE000
trusted library allocation
page read and write
1BDB9A5A000
trusted library allocation
page read and write
1BDB8D61000
trusted library allocation
page read and write
1BDB8039000
trusted library allocation
page read and write
1BDB9E53000
trusted library allocation
page read and write
1BDB8187000
trusted library allocation
page read and write
1BDB5412000
trusted library allocation
page read and write
1BDC28E3000
trusted library allocation
page read and write
1BDBB753000
trusted library allocation
page read and write
1BDC1732000
trusted library allocation
page read and write
1D583141E000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
1BDC2ABA000
trusted library allocation
page read and write
1BDBADF2000
trusted library allocation
page read and write
1BDBA88F000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDAEF18000
heap
page read and write
1BDBA224000
trusted library allocation
page read and write
1BDB4398000
trusted library allocation
page read and write
1BDC2B59000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
1BDC0AAD000
trusted library allocation
page read and write
22DB0929000
heap
page read and write
1BDAEED8000
heap
page read and write
1BDAEF15000
heap
page read and write
1BDBC08E000
trusted library allocation
page read and write
232A61D1000
heap
page read and write
1BDBBE15000
trusted library allocation
page read and write
1BDB431B000
trusted library allocation
page read and write
1BDBA145000
trusted library allocation
page read and write
2064C3B7000
trusted library allocation
page read and write
1BDB9B82000
trusted library allocation
page read and write
1BDB96D6000
trusted library allocation
page read and write
1BDB974F000
trusted library allocation
page read and write
1BDB973D000
trusted library allocation
page read and write
2064BF82000
unclassified section
page read and write
1BDC08A6000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDAEEC9000
heap
page read and write
1BDBBA95000
trusted library allocation
page read and write
1678000
heap
page read and write
1BDB974B000
trusted library allocation
page read and write
1BDBBA5D000
trusted library allocation
page read and write
232A67B8000
heap
page read and write
147B3FC000
stack
page read and write
1BDB9EDD000
trusted library allocation
page read and write
2064BD30000
unclassified section
page readonly
1BDB9EE0000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDAEEDE000
heap
page read and write
1BDB787D000
trusted library allocation
page read and write
1BDB8DAC000
trusted library allocation
page read and write
1BDB95A7000
trusted library allocation
page read and write
1BDBA8D7000
trusted library allocation
page read and write
1BDB9F8A000
trusted library allocation
page read and write
1BDC06B8000
trusted library allocation
page read and write
1BDAEF16000
heap
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDB8D80000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDB78DD000
trusted library allocation
page read and write
1BDBBD39000
trusted library allocation
page read and write
232A61D3000
heap
page read and write
1BDBC1A4000
trusted library allocation
page read and write
1BDB98BE000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDAEEC9000
heap
page read and write
1BDB38C5000
trusted library allocation
page read and write
1BDBAC33000
trusted library allocation
page read and write
1BDBC1C7000
trusted library allocation
page read and write
1BDC17C7000
trusted library allocation
page read and write
1BDB7F9D000
trusted library allocation
page read and write
1BDB9DA8000
trusted library allocation
page read and write
14A4000
heap
page read and write
1C13A36B000
trusted library allocation
page read and write
1BDC1760000
trusted library allocation
page read and write
1BDC0A6E000
trusted library allocation
page read and write
1BDC0657000
trusted library allocation
page read and write
1BDB81D8000
trusted library allocation
page read and write
232A5AEB000
trusted library allocation
page read and write
1BDB9E4D000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDB9EC2000
trusted library allocation
page read and write
1C13A020000
heap
page readonly
1BDB9F57000
trusted library allocation
page read and write
1BDB7FC1000
trusted library allocation
page read and write
232A61D3000
heap
page read and write
1BDBACF5000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
14A4000
heap
page read and write
1BDC2904000
trusted library allocation
page read and write
1BDBAC2C000
trusted library allocation
page read and write
1BDC17EF000
trusted library allocation
page read and write
1BDB563E000
trusted library allocation
page read and write
1BDAEF1B000
heap
page read and write
2064BDB0000
unclassified section
page readonly
232A677C000
heap
page read and write
1BDB9B5F000
trusted library allocation
page read and write
1BDB96EC000
trusted library allocation
page read and write
1BDBADB5000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDB4398000
trusted library allocation
page read and write
1BDB95D6000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
232A5730000
heap
page read and write
7116E7C000
stack
page read and write
1675000
heap
page read and write
1BDAEF04000
heap
page read and write
2064BF8F000
unclassified section
page read and write
1BDB9A2D000
trusted library allocation
page read and write
232A5A03000
trusted library allocation
page read and write
1BDB8187000
trusted library allocation
page read and write
232A6799000
heap
page read and write
1BDB9745000
trusted library allocation
page read and write
1BDC1CFB000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDB9745000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB974F000
trusted library allocation
page read and write
232A616D000
heap
page read and write
1BDC2C01000
trusted library allocation
page read and write
22DB090F000
heap
page read and write
1BDB9DA8000
trusted library allocation
page read and write
1BDB9AE1000
trusted library allocation
page read and write
1BDB9FB1000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
1BDBC16F000
trusted library allocation
page read and write
1BDBBF5F000
trusted library allocation
page read and write
1BDB8EE1000
trusted library allocation
page read and write
232A5A14000
trusted library allocation
page read and write
232A6763000
heap
page read and write
1BDB9DAB000
trusted library allocation
page read and write
1BDBBFCC000
trusted library allocation
page read and write
1BDC06B0000
trusted library allocation
page read and write
1BDB56BC000
trusted library allocation
page read and write
1BDB78CD000
trusted library allocation
page read and write
1BDC0885000
trusted library allocation
page read and write
1BDB9A94000
trusted library allocation
page read and write
210A8C00000
trusted library allocation
page read and write
1BDB9F62000
trusted library allocation
page read and write
1BDB9D3D000
trusted library allocation
page read and write
1BDBA4F7000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDB9B1B000
trusted library allocation
page read and write
1BDB8DCC000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDC17EF000
trusted library allocation
page read and write
1BDB9DAA000
trusted library allocation
page read and write
1BDB9E53000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDC2865000
trusted library allocation
page read and write
1BDB9F36000
trusted library allocation
page read and write
1BDAEEE0000
heap
page read and write
1BDBA8B7000
trusted library allocation
page read and write
1BDC2B01000
heap
page read and write
1BDB8193000
trusted library allocation
page read and write
1BDB9ED5000
trusted library allocation
page read and write
1BDC17AF000
trusted library allocation
page read and write
1BDBBA83000
trusted library allocation
page read and write
22DB0922000
heap
page read and write
1BDB9007000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
232A617A000
heap
page read and write
1BDBAC35000
trusted library allocation
page read and write
1BDB9EBF000
trusted library allocation
page read and write
1BDB9E8C000
trusted library allocation
page read and write
1C13A607000
trusted library allocation
page read and write
1C13A0A0000
heap
page read and write
14A0000
heap
page read and write
1BDB9A1D000
trusted library allocation
page read and write
1BDBA258000
trusted library allocation
page read and write
1BDC0AF0000
trusted library allocation
page read and write
1C13A464000
heap
page read and write
1BDC0A72000
trusted library allocation
page read and write
1BDB5328000
trusted library allocation
page read and write
1C13A3A1000
trusted library allocation
page read and write
1BDC1A73000
trusted library allocation
page read and write
1BDB9B2A000
trusted library allocation
page read and write
1BDB9FF3000
trusted library allocation
page read and write
1BDB9D89000
trusted library allocation
page read and write
1BDAEEB0000
heap
page read and write
1BDB8143000
trusted library allocation
page read and write
1BDB9E33000
trusted library allocation
page read and write
1BDC0AB1000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDAEF25000
heap
page read and write
1BDC2B39000
heap
page read and write
1BDBA0AE000
trusted library allocation
page read and write
71187BE000
stack
page read and write
1BDB8D16000
trusted library allocation
page read and write
8188FFD000
stack
page read and write
1BDB96E9000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDBCAD9000
trusted library allocation
page read and write
22DB23A0000
heap
page read and write
1BDAEF27000
heap
page read and write
1BDB7BBD000
heap
page read and write
1BDAEEB5000
heap
page read and write
232A5FD1000
heap
page read and write
1BDB8D9B000
trusted library allocation
page read and write
1BDB5623000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
1BDC0A68000
trusted library allocation
page read and write
3B429E000
unkown
page readonly
1BDB9B5C000
trusted library allocation
page read and write
232A5780000
heap
page readonly
1BDAEED0000
heap
page read and write
1BDB97BE000
trusted library allocation
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDB9D25000
trusted library allocation
page read and write
1C13A3DA000
trusted library allocation
page read and write
1BDC08E8000
trusted library allocation
page read and write
1BDBBBDF000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
1BDBBDD4000
trusted library allocation
page read and write
7116DFE000
unkown
page readonly
1BDB9EC2000
trusted library allocation
page read and write
1BDC3A66000
trusted library allocation
page read and write
1BDBC1F7000
trusted library allocation
page read and write
1BDB9A2D000
trusted library allocation
page read and write
1BDB9E73000
trusted library allocation
page read and write
1BDC0AC7000
trusted library allocation
page read and write
1BDB9AAC000
trusted library allocation
page read and write
1BDB8D8A000
trusted library allocation
page read and write
1BDB79D0000
trusted library allocation
page read and write
1BDBB743000
trusted library allocation
page read and write
1BDBC0F1000
trusted library allocation
page read and write
2064C363000
trusted library allocation
page read and write
1BDB9D87000
trusted library allocation
page read and write
1BDC069A000
trusted library allocation
page read and write
1BDC0A42000
trusted library allocation
page read and write
1BDC2B06000
heap
page read and write
1BDB42FE000
trusted library allocation
page read and write
1BDC0A40000
trusted library allocation
page read and write
1BDBA254000
trusted library allocation
page read and write
1BDB9A21000
trusted library allocation
page read and write
3B75FE000
unkown
page readonly
1BDC17EF000
trusted library allocation
page read and write
CE23DFF000
stack
page read and write
1BDB56C1000
trusted library allocation
page read and write
1BDB81D3000
trusted library allocation
page read and write
1BDB9FA2000
trusted library allocation
page read and write
232A61E1000
heap
page read and write
1BDB9AEF000
trusted library allocation
page read and write
1BDB9DAB000
trusted library allocation
page read and write
1BDC2B34000
heap
page read and write
1BDC39D9000
trusted library allocation
page read and write
1BDAEEE1000
heap
page read and write
1BDB91FC000
trusted library allocation
page read and write
1BDB974B000
trusted library allocation
page read and write
1BDB9ECA000
trusted library allocation
page read and write
1BDB8D2D000
trusted library allocation
page read and write
1BDBA29F000
trusted library allocation
page read and write
1BDC0A78000
trusted library allocation
page read and write
1BDBC119000
trusted library allocation
page read and write
232A5A72000
trusted library allocation
page read and write
1BDB96F0000
trusted library allocation
page read and write
1BDBC150000
trusted library allocation
page read and write
1BDAEEBC000
heap
page read and write
1BDC29A6000
trusted library allocation
page read and write
1BDB8117000
trusted library allocation
page read and write
1BDB9DA8000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDB9D61000
trusted library allocation
page read and write
1BDB78C3000
trusted library allocation
page read and write
1BDBCB18000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDB81DA000
trusted library allocation
page read and write
1BDB9F5A000
trusted library allocation
page read and write
2064C366000
trusted library allocation
page read and write
1BDC17DC000
trusted library allocation
page read and write
1BDB9B40000
trusted library allocation
page read and write
1BDBB7BA000
trusted library allocation
page read and write
1BDAEEBF000
heap
page read and write
1BDB79C4000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
22DB0900000
heap
page read and write
1BDBC1F7000
trusted library allocation
page read and write
1BDB9F29000
trusted library allocation
page read and write
1BDB8059000
trusted library allocation
page read and write
1BDBA251000
trusted library allocation
page read and write
1BDB9E4F000
trusted library allocation
page read and write
1BDB7B81000
heap
page read and write
1BDAEEC5000
heap
page read and write
1BDBBF3E000
trusted library allocation
page read and write
1BDB9A69000
trusted library allocation
page read and write
1BDB8D9B000
trusted library allocation
page read and write
1BDB9E37000
trusted library allocation
page read and write
1BDB97C5000
trusted library allocation
page read and write
1BDB9A28000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDBB749000
trusted library allocation
page read and write
1BDC1A69000
trusted library allocation
page read and write
1BDBA2F9000
trusted library allocation
page read and write
1BDB8D79000
trusted library allocation
page read and write
1BDBC176000
trusted library allocation
page read and write
1BDB8DC1000
trusted library allocation
page read and write
1BDB7B9A000
heap
page read and write
1BDB85DD000
trusted library allocation
page read and write
1BDBA798000
trusted library allocation
page read and write
1BDAEF18000
heap
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDB9AAC000
trusted library allocation
page read and write
1BDB9EF3000
trusted library allocation
page read and write
1BDB5670000
trusted library allocation
page read and write
1BDB81BE000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDBC15C000
trusted library allocation
page read and write
1BDC088D000
trusted library allocation
page read and write
166B000
heap
page read and write
1BDB90A8000
trusted library allocation
page read and write
1BDB56C7000
trusted library allocation
page read and write
1BDBB7A7000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
1BDBBF40000
trusted library allocation
page read and write
22DB23BC000
heap
page read and write
1BDBB7B2000
trusted library allocation
page read and write
232A67A8000
heap
page read and write
1BDB8159000
trusted library allocation
page read and write
1BDB53AC000
trusted library allocation
page read and write
232A6799000
heap
page read and write
1BDB9A21000
trusted library allocation
page read and write
1BDB7FBE000
trusted library allocation
page read and write
1BDB8177000
trusted library allocation
page read and write
1BDAEF14000
heap
page read and write
1BDC17FA000
trusted library allocation
page read and write
232A5900000
trusted library allocation
page read and write
1BDBA2D5000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDB7BAE000
heap
page read and write
1BDB81C1000
trusted library allocation
page read and write
1BDBACE4000
trusted library allocation
page read and write
1BDB38BF000
trusted library allocation
page read and write
1BDB9ECF000
trusted library allocation
page read and write
1BDBBB3F000
trusted library allocation
page read and write
1BDAEF0E000
heap
page read and write
1BDAEF25000
heap
page read and write
1BDC2B34000
heap
page read and write
1BDB9D17000
trusted library allocation
page read and write
1BDBB792000
trusted library allocation
page read and write
1BDC2B18000
trusted library allocation
page read and write
1BDB9D54000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
1BDC0ABE000
trusted library allocation
page read and write
1BDAEF29000
heap
page read and write
1BDB9EF2000
trusted library allocation
page read and write
232A61E1000
heap
page read and write
1C13A313000
trusted library allocation
page read and write
1BDB9DAD000
trusted library allocation
page read and write
1BDB7FBC000
trusted library allocation
page read and write
1BDB79EB000
trusted library allocation
page read and write
1BDBA8E3000
trusted library allocation
page read and write
1BDBAC7B000
trusted library allocation
page read and write
1BDBC27E000
trusted library allocation
page read and write
1BDB9FBB000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDB5325000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDAEEE1000
heap
page read and write
210A89AA000
heap
page read and write
1BDB81CB000
trusted library allocation
page read and write
1BDB96F7000
trusted library allocation
page read and write
1BDB9FD3000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDB81D3000
trusted library allocation
page read and write
1BDB79A3000
trusted library allocation
page read and write
1BDB97B9000
trusted library allocation
page read and write
1BDBB7A7000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDB78CB000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDC0A99000
trusted library allocation
page read and write
1BDB8D70000
trusted library allocation
page read and write
1BDBA871000
trusted library allocation
page read and write
1656000
heap
page read and write
1BDB9A54000
trusted library allocation
page read and write
1BDB9EE9000
trusted library allocation
page read and write
1BDB9691000
trusted library allocation
page read and write
164D000
heap
page read and write
1BDB8D80000
trusted library allocation
page read and write
1E1E000
stack
page read and write
1BDBA220000
trusted library allocation
page read and write
1BDC08AC000
trusted library allocation
page read and write
1BDAEEE1000
heap
page read and write
1BDC1A3E000
trusted library allocation
page read and write
1BDBC119000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDB8D80000
trusted library allocation
page read and write
1BDBC280000
trusted library allocation
page read and write
1BDC1E1C000
trusted library allocation
page read and write
1BDB38CB000
trusted library allocation
page read and write
1BDB9ED5000
trusted library allocation
page read and write
1BDBA8DB000
trusted library allocation
page read and write
1BDB9F68000
trusted library allocation
page read and write
22DB23A8000
heap
page read and write
3DF0000
heap
page read and write
1BDBBDFE000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDBC11B000
trusted library allocation
page read and write
232A6300000
trusted library allocation
page read and write
1BDC2B01000
heap
page read and write
1BDB78FD000
trusted library allocation
page read and write
1BDC3500000
trusted library allocation
page read and write
1BDC08D3000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDB8141000
trusted library allocation
page read and write
1BDBAC82000
trusted library allocation
page read and write
1BDBB770000
trusted library allocation
page read and write
1BDB9EC2000
trusted library allocation
page read and write
133F000
stack
page read and write
1BDB78CD000
trusted library allocation
page read and write
1BDAEEC9000
heap
page read and write
1BDAEECB000
heap
page read and write
1C139FD0000
heap
page read and write
1BDB81BA000
trusted library allocation
page read and write
1BDB4271000
trusted library allocation
page read and write
1BDBA900000
trusted library allocation
page read and write
1BDBA78E000
trusted library allocation
page read and write
1BDB90FA000
trusted library allocation
page read and write
1C139F90000
heap
page read and write
1BDB38F7000
trusted library allocation
page read and write
1BDB9AB8000
trusted library allocation
page read and write
1BDAEED7000
heap
page read and write
1BDB9A23000
trusted library allocation
page read and write
1BDBC1C7000
trusted library allocation
page read and write
1BDAEEBC000
heap
page read and write
1BDC1E44000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDBA8E3000
trusted library allocation
page read and write
1BDB7872000
trusted library allocation
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDC2B6C000
heap
page read and write
22DB0B00000
trusted library allocation
page read and write
1BDB789D000
trusted library allocation
page read and write
1BDBB7BF000
trusted library allocation
page read and write
1BDB8122000
trusted library allocation
page read and write
1BDB567A000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDB91ED000
trusted library allocation
page read and write
1BDB9BE8000
trusted library allocation
page read and write
1BDBA2F9000
trusted library allocation
page read and write
1BDB97DF000
trusted library allocation
page read and write
1BDBAC68000
trusted library allocation
page read and write
E60000
unkown
page readonly
1C13A032000
unclassified section
page read and write
1BDC08AA000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDBA8C8000
trusted library allocation
page read and write
1BDB9020000
trusted library allocation
page read and write
1BDAEF1D000
heap
page read and write
1BDB8166000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDC3A89000
trusted library allocation
page read and write
1BDB7961000
trusted library allocation
page read and write
1BDB7963000
trusted library allocation
page read and write
232A61D8000
heap
page read and write
1BDBA21C000
trusted library allocation
page read and write
1BDC3900000
trusted library allocation
page read and write
1BDB96D2000
trusted library allocation
page read and write
818A9FE000
stack
page read and write
1BDAEEDE000
heap
page read and write
1C13A381000
trusted library allocation
page read and write
818B2BB000
stack
page read and write
1BDBA21E000
trusted library allocation
page read and write
1BDB8193000
trusted library allocation
page read and write
1BDB43B6000
trusted library allocation
page read and write
14A4000
heap
page read and write
1BDAEF14000
heap
page read and write
1BDB81CB000
trusted library allocation
page read and write
1BDBC160000
trusted library allocation
page read and write
1BDB79FA000
trusted library allocation
page read and write
1BDAEEDB000
heap
page read and write
232A614C000
heap
page read and write
232A614C000
heap
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDB9013000
trusted library allocation
page read and write
232A67B8000
heap
page read and write
1BDC1880000
trusted library allocation
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDAEEDE000
heap
page read and write
1BDB8DB0000
trusted library allocation
page read and write
1BDB56D8000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDB9FF5000
trusted library allocation
page read and write
1BDB9FB1000
trusted library allocation
page read and write
1BDB9F70000
trusted library allocation
page read and write
1BDBC08E000
trusted library allocation
page read and write
1BDB8D82000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDB971F000
trusted library allocation
page read and write
1BDC0A78000
trusted library allocation
page read and write
1BDC29D8000
trusted library allocation
page read and write
1BDC0AAD000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDB9D5C000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDBBDA9000
trusted library allocation
page read and write
1BDC2B34000
heap
page read and write
1BDB56F6000
trusted library allocation
page read and write
1BDBC2E8000
trusted library allocation
page read and write
1BDC0A40000
trusted library allocation
page read and write
232A60C8000
unkown
page execute read
1BDBB7B7000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDB789D000
trusted library allocation
page read and write
1BDC2A53000
trusted library allocation
page read and write
1BDB8D58000
trusted library allocation
page read and write
1BDB9F2E000
trusted library allocation
page read and write
1BDB8D16000
trusted library allocation
page read and write
2064C379000
trusted library allocation
page read and write
1BDB431E000
trusted library allocation
page read and write
1BDC1CB1000
trusted library allocation
page read and write
1BDB564D000
trusted library allocation
page read and write
1BDB9B8C000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDB957D000
trusted library allocation
page read and write
1BDB9EB8000
trusted library allocation
page read and write
1BDBB7BF000
trusted library allocation
page read and write
1BDBCB89000
trusted library allocation
page read and write
1BDC28EC000
trusted library allocation
page read and write
1BDB9D87000
trusted library allocation
page read and write
1BDB9D1B000
trusted library allocation
page read and write
1BDAEEB7000
heap
page read and write
1BDBC0F1000
trusted library allocation
page read and write
1BDC2BF9000
trusted library allocation
page read and write
1BDC0A6C000
trusted library allocation
page read and write
232A5AB2000
trusted library allocation
page read and write
1BDBA14C000
trusted library allocation
page read and write
1BDB8076000
trusted library allocation
page read and write
1BDBBD72000
trusted library allocation
page read and write
1BDC08F4000
trusted library allocation
page read and write
1BDB8032000
trusted library allocation
page read and write
22DB23AF000
heap
page read and write
1BDAEED1000
heap
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDB81FA000
trusted library allocation
page read and write
1BDB91C7000
trusted library allocation
page read and write
1BDB9A8C000
trusted library allocation
page read and write
1BDB79FA000
trusted library allocation
page read and write
1BDB9FDB000
trusted library allocation
page read and write
1BDB8133000
trusted library allocation
page read and write
1BDBA263000
trusted library allocation
page read and write
1BDAEECB000
heap
page read and write
1BDC08F4000
trusted library allocation
page read and write
1BDAEECA000
heap
page read and write
1BDAEED6000
heap
page read and write
1BDB9A07000
trusted library allocation
page read and write
232A61D9000
heap
page read and write
1BDB4326000
trusted library allocation
page read and write
1BDC1A5C000
trusted library allocation
page read and write
22DB0820000
heap
page read and write
1BDB7999000
trusted library allocation
page read and write
1BDB7B94000
heap
page read and write
1653000
heap
page read and write
232A5A64000
trusted library allocation
page read and write
1BDB8DC0000
trusted library allocation
page read and write
1BDB9F57000
trusted library allocation
page read and write
1675000
heap
page read and write
1BDAEECA000
heap
page read and write
1BDBC1A4000
trusted library allocation
page read and write
1BDB9E60000
trusted library allocation
page read and write
1BDBC156000
trusted library allocation
page read and write
1BDBBAD7000
trusted library allocation
page read and write
3DF1000
heap
page read and write
1BDAEED7000
heap
page read and write
1BDBA086000
trusted library allocation
page read and write
1BDB9E50000
trusted library allocation
page read and write
1BDB97EA000
trusted library allocation
page read and write
1BDBC1A4000
trusted library allocation
page read and write
1BDBACDE000
trusted library allocation
page read and write
2064BF90000
heap
page read and write
1BDB85C0000
trusted library allocation
page read and write
1BDB9B75000
trusted library allocation
page read and write
1BDB85F1000
trusted library allocation
page read and write
1BDBADF2000
trusted library allocation
page read and write
1BDBBDDA000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDB783A000
trusted library allocation
page read and write
1BDBBFD4000
trusted library allocation
page read and write
1BDBBAAD000
trusted library allocation
page read and write
1BDAEECA000
heap
page read and write
1BDC28D3000
trusted library allocation
page read and write
1BDB9E87000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDBC17E000
trusted library allocation
page read and write
1BDAEEE1000
heap
page read and write
1BDB9AF4000
trusted library allocation
page read and write
1BDC08E8000
trusted library allocation
page read and write
1BDB98C4000
trusted library allocation
page read and write
1BDBB763000
trusted library allocation
page read and write
1BDAEF1D000
heap
page read and write
1BDAEF06000
heap
page read and write
22DB0932000
heap
page read and write
1BDC2B4E000
heap
page read and write
1BDB9EE0000
trusted library allocation
page read and write
1BDB9F85000
trusted library allocation
page read and write
1BDB7999000
trusted library allocation
page read and write
1BDC2808000
trusted library allocation
page read and write
1BDB9F89000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDC0A6E000
trusted library allocation
page read and write
1BDB9FF3000
trusted library allocation
page read and write
1BDBA881000
trusted library allocation
page read and write
1BDB8D69000
trusted library allocation
page read and write
1BDBACB0000
trusted library allocation
page read and write
1BDB9AA9000
trusted library allocation
page read and write
1BDC29D8000
trusted library allocation
page read and write
1BDC0A7A000
trusted library allocation
page read and write
1BDAEF27000
heap
page read and write
1BDB96E5000
trusted library allocation
page read and write
1BDAEF31000
heap
page read and write
1BDB9AE1000
trusted library allocation
page read and write
1BDB9F89000
trusted library allocation
page read and write
1BDBA2C5000
trusted library allocation
page read and write
1BDB8D56000
trusted library allocation
page read and write
1BDBBAE6000
trusted library allocation
page read and write
1BDB919B000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDB9F36000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDAEF19000
heap
page read and write
1BDB9D5C000
trusted library allocation
page read and write
1BDBADF8000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDB9D9B000
trusted library allocation
page read and write
1BDC174F000
trusted library allocation
page read and write
1BDC29A2000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDC0A5F000
trusted library allocation
page read and write
1BDC08A3000
trusted library allocation
page read and write
232A6311000
trusted library allocation
page read and write
1BDB81FA000
trusted library allocation
page read and write
1BDBA152000
trusted library allocation
page read and write
1BDB98C2000
trusted library allocation
page read and write
1BDB812C000
trusted library allocation
page read and write
1BDB7B9C000
heap
page read and write
232A5650000
unclassified section
page readonly
1BDB56E5000
trusted library allocation
page read and write
1BDB9EE0000
trusted library allocation
page read and write
1BDBB745000
trusted library allocation
page read and write
1BDAEECB000
heap
page read and write
1BDB96AD000
trusted library allocation
page read and write
1BDB9E8F000
trusted library allocation
page read and write
1BDB7F5F000
trusted library allocation
page read and write
1BDB97DC000
trusted library allocation
page read and write
1BDC0AD3000
trusted library allocation
page read and write
1BDB9FD3000
trusted library allocation
page read and write
1BDBC164000
trusted library allocation
page read and write
1BDB9F4B000
trusted library allocation
page read and write
2064C3B9000
trusted library allocation
page read and write
1BDC0A65000
trusted library allocation
page read and write
1BDBBFB0000
trusted library allocation
page read and write
1BDB9A5A000
trusted library allocation
page read and write
1BDBBA89000
trusted library allocation
page read and write
1BDB9B99000
trusted library allocation
page read and write
1BDC2942000
trusted library allocation
page read and write
1BDB8EC3000
trusted library allocation
page read and write
1BDC28D9000
trusted library allocation
page read and write
1BDC0A76000
trusted library allocation
page read and write
1BDB9D9B000
trusted library allocation
page read and write
1BDBC14A000
trusted library allocation
page read and write
1BDC291C000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDB7BB0000
heap
page read and write
1BDB817A000
trusted library allocation
page read and write
1BDC0A87000
trusted library allocation
page read and write
1BDBC14A000
trusted library allocation
page read and write
166B000
heap
page read and write
1C13A600000
trusted library allocation
page read and write
1BDAEEE1000
heap
page read and write
1BDAEEC5000
heap
page read and write
1BDC0A74000
trusted library allocation
page read and write
1BDBB7BA000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDBA224000
trusted library allocation
page read and write
1BDB9DFB000
trusted library allocation
page read and write
1BDB9AEF000
trusted library allocation
page read and write
1BDB9863000
trusted library allocation
page read and write
1BDBBE8D000
trusted library allocation
page read and write
1BDB7B92000
heap
page read and write
7114BFB000
stack
page read and write
1BDC1AC6000
trusted library allocation
page read and write
1BDB9F17000
trusted library allocation
page read and write
1BDC2A2E000
trusted library allocation
page read and write
1BDB7B9C000
heap
page read and write
1BDB4276000
trusted library allocation
page read and write
1BDBBEF1000
trusted library allocation
page read and write
1BDC1EB6000
trusted library allocation
page read and write
1BDB79DF000
trusted library allocation
page read and write
1BDBBD72000
trusted library allocation
page read and write
1BDBC0DE000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDAEF16000
heap
page read and write
1BDC1A5C000
trusted library allocation
page read and write
1BDBBFF2000
trusted library allocation
page read and write
1BDB8121000
trusted library allocation
page read and write
1BDB8D8A000
trusted library allocation
page read and write
1BDB9D63000
trusted library allocation
page read and write
1653000
heap
page read and write
1BDB817D000
trusted library allocation
page read and write
1BDB8D54000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDB9A2B000
trusted library allocation
page read and write
1BDB81CF000
trusted library allocation
page read and write
1BDB43E4000
trusted library allocation
page read and write
1BDB7F7A000
trusted library allocation
page read and write
1BDC0A5F000
trusted library allocation
page read and write
1BDBADEE000
trusted library allocation
page read and write
1BDB8138000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDB9D0B000
trusted library allocation
page read and write
1BDB9F9C000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDB9B53000
trusted library allocation
page read and write
1C13A311000
trusted library allocation
page read and write
1BDB43F0000
trusted library allocation
page read and write
1BDC06B4000
trusted library allocation
page read and write
1BDB9F85000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDBC14A000
trusted library allocation
page read and write
1BDB81DA000
trusted library allocation
page read and write
1BDC299B000
trusted library allocation
page read and write
22DB0A00000
trusted library allocation
page read and write
3B85FE000
unkown
page readonly
1BDB9D79000
trusted library allocation
page read and write
1BDBA27D000
trusted library allocation
page read and write
1BDB8D82000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
1BDB9086000
trusted library allocation
page read and write
1BDBC050000
trusted library allocation
page read and write
1BDB43A2000
trusted library allocation
page read and write
1BDB9D74000
trusted library allocation
page read and write
1BDC088C000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
130F000
stack
page read and write
1BDBC176000
trusted library allocation
page read and write
1BDBC0FC000
trusted library allocation
page read and write
1BDB42F6000
trusted library allocation
page read and write
1BDBBDFB000
trusted library allocation
page read and write
1BDB9ADC000
trusted library allocation
page read and write
1BDB5698000
trusted library allocation
page read and write
1BDB97E7000
trusted library allocation
page read and write
1C13A200000
trusted library allocation
page read and write
1BDB538B000
trusted library allocation
page read and write
1BDBC267000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDB814A000
trusted library allocation
page read and write
1BDBAC82000
trusted library allocation
page read and write
1BDB9E8C000
trusted library allocation
page read and write
1BDB9A34000
trusted library allocation
page read and write
1BDC0A7C000
trusted library allocation
page read and write
1BDC0AE1000
trusted library allocation
page read and write
1BDB9A5A000
trusted library allocation
page read and write
1BDB9F24000
trusted library allocation
page read and write
1BDBA21E000
trusted library allocation
page read and write
1BDB9A8C000
trusted library allocation
page read and write
1BDC1A73000
trusted library allocation
page read and write
1BDB9AC4000
trusted library allocation
page read and write
1BDC17B8000
trusted library allocation
page read and write
1BDB56A6000
trusted library allocation
page read and write
1BDC29D8000
trusted library allocation
page read and write
1BDB9ED8000
trusted library allocation
page read and write
1BDC17D7000
trusted library allocation
page read and write
1BDAEECB000
heap
page read and write
1BDB9685000
trusted library allocation
page read and write
1BDBA4FB000
trusted library allocation
page read and write
232A676B000
heap
page read and write
1BDBBDBA000
trusted library allocation
page read and write
1BDB9DA8000
trusted library allocation
page read and write
232A5B40000
heap
page read and write
1BDB973B000
trusted library allocation
page read and write
1BDC2999000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDB7FC2000
trusted library allocation
page read and write
1BDBACF1000
trusted library allocation
page read and write
1BDBADD1000
trusted library allocation
page read and write
1C13A35F000
trusted library allocation
page read and write
1BDBADEE000
trusted library allocation
page read and write
1BDC1CBE000
trusted library allocation
page read and write
1BDC29A2000
trusted library allocation
page read and write
1BDB7BB3000
heap
page read and write
1BDB4271000
trusted library allocation
page read and write
1BDB79C5000
trusted library allocation
page read and write
232A5FB0000
heap
page read and write
1BDB9F62000
trusted library allocation
page read and write
1BDBA749000
trusted library allocation
page read and write
1BDB9591000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDC1A8F000
trusted library allocation
page read and write
1C13A03F000
unclassified section
page read and write
1BDB9045000
trusted library allocation
page read and write
1BDB92E6000
trusted library allocation
page read and write
1BDB9DF3000
trusted library allocation
page read and write
232A6799000
heap
page read and write
1BDB8D56000
trusted library allocation
page read and write
1BDBB7B7000
trusted library allocation
page read and write
1BDB96F2000
trusted library allocation
page read and write
1BDC08A8000
trusted library allocation
page read and write
1BDC1778000
trusted library allocation
page read and write
1BDB7F70000
trusted library allocation
page read and write
1BDAEF1C000
heap
page read and write
1BDAEF0F000
heap
page read and write
1BDC2904000
trusted library allocation
page read and write
1BDBA224000
trusted library allocation
page read and write
1BDAEF2A000
heap
page read and write
1BDAEF29000
heap
page read and write
1BDBC2AF000
trusted library allocation
page read and write
1BDAEF0B000
heap
page read and write
232A5A00000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDBAD51000
trusted library allocation
page read and write
1BDB9E49000
trusted library allocation
page read and write
1BDC2B0F000
heap
page read and write
1BDBCB59000
trusted library allocation
page read and write
1BDB56AA000
trusted library allocation
page read and write
1BDB812C000
trusted library allocation
page read and write
1BDBBBAA000
trusted library allocation
page read and write
1BDBB771000
trusted library allocation
page read and write
1BDB5694000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDBBD2E000
trusted library allocation
page read and write
1BDC06D6000
trusted library allocation
page read and write
1BDAEED7000
heap
page read and write
1BDB971B000
trusted library allocation
page read and write
1BDBA0C5000
trusted library allocation
page read and write
1BDC0A70000
trusted library allocation
page read and write
1BDAEF27000
heap
page read and write
1BDAEF17000
heap
page read and write
1BDB56A6000
trusted library allocation
page read and write
1BDC3B02000
trusted library allocation
page read and write
232A67A8000
heap
page read and write
1BDBBA8E000
trusted library allocation
page read and write
1BDB538E000
trusted library allocation
page read and write
1BDB974B000
trusted library allocation
page read and write
1BDB9FA4000
trusted library allocation
page read and write
1BDBBF66000
trusted library allocation
page read and write
1BDBA8A3000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDC2B6C000
heap
page read and write
1BDC2B34000
heap
page read and write
1BDB9D39000
trusted library allocation
page read and write
1BDB81DA000
trusted library allocation
page read and write
1BDBC169000
trusted library allocation
page read and write
1BDC0776000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDAEEBE000
heap
page read and write
1BDC08C2000
trusted library allocation
page read and write
1BDBC2D7000
trusted library allocation
page read and write
1BDB8D9E000
trusted library allocation
page read and write
1BDBC327000
trusted library allocation
page read and write
2064C37B000
trusted library allocation
page read and write
1BDC08E4000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
22DB23AE000
heap
page read and write
1BDB543C000
trusted library allocation
page read and write
E61000
unkown
page execute read
1BDBBEED000
trusted library allocation
page read and write
1BDAEED9000
heap
page read and write
1BDBACD8000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDBBAD7000
trusted library allocation
page read and write
1BDB79D9000
trusted library allocation
page read and write
1BDBA285000
trusted library allocation
page read and write
1BDC08E2000
trusted library allocation
page read and write
1BDB9A73000
trusted library allocation
page read and write
232A5B44000
heap
page read and write
1BDAEF25000
heap
page read and write
1BDBAC7B000
trusted library allocation
page read and write
1BDBC0C6000
trusted library allocation
page read and write
1BDBAD8F000
trusted library allocation
page read and write
1BDB78FD000
trusted library allocation
page read and write
1BDBA272000
trusted library allocation
page read and write
1BDB54F5000
trusted library allocation
page read and write
818B33E000
unkown
page readonly
1BDB9ABD000
trusted library allocation
page read and write
1BDBA8A3000
trusted library allocation
page read and write
1BDBA2D5000
trusted library allocation
page read and write
1BDC294A000
trusted library allocation
page read and write
1BDB970F000
trusted library allocation
page read and write
1BDBBD72000
trusted library allocation
page read and write
1BDB98E7000
trusted library allocation
page read and write
1BDB7B95000
heap
page read and write
1BDB9F6D000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
14A4000
heap
page read and write
1BDB38C1000
trusted library allocation
page read and write
1BDB78DB000
trusted library allocation
page read and write
1BDBADB3000
trusted library allocation
page read and write
232A60F1000
heap
page read and write
1BDBBE17000
trusted library allocation
page read and write
1BDB5733000
trusted library allocation
page read and write
1BDBB788000
trusted library allocation
page read and write
1BDB567A000
trusted library allocation
page read and write
1BDAEF1A000
heap
page read and write
1BDB9AAC000
trusted library allocation
page read and write
1BDB5429000
trusted library allocation
page read and write
1BDAEEE0000
heap
page read and write
1BDB9FAE000
trusted library allocation
page read and write
1C13A366000
trusted library allocation
page read and write
1BDB9F5A000
trusted library allocation
page read and write
1BDB9785000
trusted library allocation
page read and write
1BDBC0A8000
trusted library allocation
page read and write
1BDB9D74000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDC1E0C000
trusted library allocation
page read and write
232A60B1000
unkown
page execute read
1BDBCB85000
trusted library allocation
page read and write
1BDB9F4B000
trusted library allocation
page read and write
1BDB9D74000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB974F000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDB9D39000
trusted library allocation
page read and write
1BDB9743000
trusted library allocation
page read and write
1BDBB7AF000
trusted library allocation
page read and write
1BDC0AD3000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDB9D45000
trusted library allocation
page read and write
1BDBACB9000
trusted library allocation
page read and write
1BDB7B9E000
heap
page read and write
1BDB9D30000
trusted library allocation
page read and write
1BDB7B9C000
heap
page read and write
1BDAEEC0000
heap
page read and write
1BDAEEC5000
heap
page read and write
232A61D6000
heap
page read and write
1BDAEF03000
heap
page read and write
1BDB5373000
trusted library allocation
page read and write
1BDB8D19000
trusted library allocation
page read and write
1BDB9D9B000
trusted library allocation
page read and write
2064C400000
trusted library allocation
page read and write
1BDB9F79000
trusted library allocation
page read and write
1BDB56E0000
trusted library allocation
page read and write
1BDBBDFE000
trusted library allocation
page read and write
1BDBBAEC000
trusted library allocation
page read and write
1BDAEF0E000
heap
page read and write
1BDB9D9B000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDB9F6D000
trusted library allocation
page read and write
1BDB9E99000
trusted library allocation
page read and write
1BDB5386000
trusted library allocation
page read and write
1BDB9D4B000
trusted library allocation
page read and write
1BDB78E1000
trusted library allocation
page read and write
71155D8000
stack
page read and write
1BDB9EC0000
trusted library allocation
page read and write
1BDB7F6A000
trusted library allocation
page read and write
1BDC1A88000
trusted library allocation
page read and write
2064C130000
heap
page read and write
1BDBC0A0000
trusted library allocation
page read and write
1BDB806E000
trusted library allocation
page read and write
1BDAEEC0000
heap
page read and write
1BDB9FB1000
trusted library allocation
page read and write
1BDB7963000
trusted library allocation
page read and write
1BDB9EFE000
trusted library allocation
page read and write
1BDBBD88000
trusted library allocation
page read and write
1BDBA781000
trusted library allocation
page read and write
1BDA9A3C000
heap
page read and write
1BDB97E5000
trusted library allocation
page read and write
1BDC088A000
trusted library allocation
page read and write
1BDBBE98000
trusted library allocation
page read and write
CE245FE000
stack
page read and write
1BDAEEEA000
heap
page read and write
1BDC29E7000
trusted library allocation
page read and write
1BDC3696000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
818BB3E000
stack
page read and write
1BDB5391000
trusted library allocation
page read and write
1BDB9741000
trusted library allocation
page read and write
1BDBAD9B000
trusted library allocation
page read and write
1BDC2C04000
trusted library allocation
page read and write
1BDB9A17000
trusted library allocation
page read and write
1BDC0A65000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDB8D82000
trusted library allocation
page read and write
1BDBC2A6000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDB8D80000
trusted library allocation
page read and write
1BDB8D53000
trusted library allocation
page read and write
1BDB8EC9000
trusted library allocation
page read and write
1BDB9D45000
trusted library allocation
page read and write
1BDB8DC7000
trusted library allocation
page read and write
1BDC2B39000
heap
page read and write
232A676B000
heap
page read and write
1BDAEEAF000
heap
page read and write
1BDB9FC1000
trusted library allocation
page read and write
1BDAEF19000
heap
page read and write
1BDB9FD7000
trusted library allocation
page read and write
1BDB53AC000
trusted library allocation
page read and write
1BDC0885000
trusted library allocation
page read and write
1BDBA224000
trusted library allocation
page read and write
1BDB7B81000
heap
page read and write
1BDAEEAE000
heap
page read and write
1BDB96CA000
trusted library allocation
page read and write
1BDB9D61000
trusted library allocation
page read and write
1BDAEF02000
heap
page read and write
1BDB9F9C000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDBAC79000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDC0A87000
trusted library allocation
page read and write
1BDB902B000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDB9FD3000
trusted library allocation
page read and write
1BDBAC79000
trusted library allocation
page read and write
1BDB9B1F000
trusted library allocation
page read and write
1BDBBA4F000
trusted library allocation
page read and write
1BDB9D5A000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDB78BC000
trusted library allocation
page read and write
1BDB9F29000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDBC0ED000
trusted library allocation
page read and write
232A61D8000
heap
page read and write
1BDB95F5000
trusted library allocation
page read and write
818C43E000
unkown
page readonly
131F000
stack
page read and write
134E000
stack
page read and write
1C13A603000
trusted library allocation
page read and write
1BDC1A32000
trusted library allocation
page read and write
1BDB9734000
trusted library allocation
page read and write
1BDBC157000
trusted library allocation
page read and write
1BDB78E1000
trusted library allocation
page read and write
1BDB7B75000
heap
page read and write
1BDBCC01000
trusted library allocation
page read and write
1BDB8EF1000
trusted library allocation
page read and write
1BDB9F54000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
1BDB538E000
trusted library allocation
page read and write
1BDBC1C7000
trusted library allocation
page read and write
1BDB9DBC000
trusted library allocation
page read and write
1BDB78BB000
trusted library allocation
page read and write
232A5A19000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1C13A35D000
trusted library allocation
page read and write
1BDB7B92000
heap
page read and write
1BDAEED8000
heap
page read and write
1BDB5669000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
210A8C07000
trusted library allocation
page read and write
1BDBBDDE000
trusted library allocation
page read and write
1BDBACF1000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDB95D4000
trusted library allocation
page read and write
1BDBAD7C000
trusted library allocation
page read and write
1BDC0A6C000
trusted library allocation
page read and write
1BDB8DC4000
trusted library allocation
page read and write
2064C323000
trusted library allocation
page read and write
1BDBC361000
trusted library allocation
page read and write
1BDB7B75000
heap
page read and write
1C13A3B0000
trusted library allocation
page read and write
1BDB9A42000
trusted library allocation
page read and write
1BDB7B9D000
heap
page read and write
1BDC0AF0000
trusted library allocation
page read and write
1BDB9E8F000
trusted library allocation
page read and write
1BDB9D5C000
trusted library allocation
page read and write
232A67B8000
heap
page read and write
1BDC0683000
trusted library allocation
page read and write
1BDC17C5000
trusted library allocation
page read and write
1BDB8148000
trusted library allocation
page read and write
1BDC2B39000
heap
page read and write
1BDBA2F9000
trusted library allocation
page read and write
1BDC0A63000
trusted library allocation
page read and write
49A1221000
trusted library allocation
page execute read
1BDBC15E000
trusted library allocation
page read and write
1BDBCB61000
trusted library allocation
page read and write
1BDB9F78000
trusted library allocation
page read and write
1BDB9EDA000
trusted library allocation
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDC1727000
trusted library allocation
page read and write
1BDB7F54000
trusted library allocation
page read and write
1BDB9E47000
trusted library allocation
page read and write
1BDB9E94000
trusted library allocation
page read and write
1BDB806E000
trusted library allocation
page read and write
1BDB8D3C000
trusted library allocation
page read and write
1BDB9ED8000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDBC183000
trusted library allocation
page read and write
1BDAEECA000
heap
page read and write
1BDBBEF7000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDC0A68000
trusted library allocation
page read and write
1BDB38EF000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDBA2D7000
trusted library allocation
page read and write
1BDB5729000
trusted library allocation
page read and write
1BDBBFFC000
trusted library allocation
page read and write
1BDAEF0E000
heap
page read and write
1BDB9EE9000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDAEF15000
heap
page read and write
1BDBC126000
trusted library allocation
page read and write
1BDBA272000
trusted library allocation
page read and write
1BDB9729000
trusted library allocation
page read and write
1BDBA2B5000
trusted library allocation
page read and write
1BDBC0BF000
trusted library allocation
page read and write
1BDB9D54000
trusted library allocation
page read and write
1BDB789B000
trusted library allocation
page read and write
1BDC1A15000
trusted library allocation
page read and write
1BDB79D3000
trusted library allocation
page read and write
CE25DFE000
stack
page read and write
1BDB81CB000
trusted library allocation
page read and write
1BDB853B000
trusted library allocation
page read and write
1BDB9F8A000
trusted library allocation
page read and write
1BDB9D87000
trusted library allocation
page read and write
1BDB8D8F000
trusted library allocation
page read and write
1BDAEECF000
heap
page read and write
1BDB9B27000
trusted library allocation
page read and write
1BDBC07A000
trusted library allocation
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDBC0C9000
trusted library allocation
page read and write
1BDB8156000
trusted library allocation
page read and write
1BDB95C8000
trusted library allocation
page read and write
1BDB8DC7000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
1BDB9D54000
trusted library allocation
page read and write
22DB093A000
heap
page read and write
1BDB79D3000
trusted library allocation
page read and write
1BDBA7F6000
trusted library allocation
page read and write
1BDB5633000
trusted library allocation
page read and write
1BDB562B000
trusted library allocation
page read and write
1BDB7979000
trusted library allocation
page read and write
1BDBCAB6000
trusted library allocation
page read and write
1BDB9745000
trusted library allocation
page read and write
1BDB9F54000
trusted library allocation
page read and write
1BDB9E37000
trusted library allocation
page read and write
1BDB98AB000
trusted library allocation
page read and write
1BDC0ABE000
trusted library allocation
page read and write
1BDB9EDA000
trusted library allocation
page read and write
1BDB9F2B000
trusted library allocation
page read and write
1BDB9AEF000
trusted library allocation
page read and write
1BDBBEC0000
trusted library allocation
page read and write
1BDBA209000
trusted library allocation
page read and write
1BDBA251000
trusted library allocation
page read and write
1BDB9AA7000
trusted library allocation
page read and write
1BDB8D2D000
trusted library allocation
page read and write
1BDB7B9C000
heap
page read and write
1BDAEF06000
heap
page read and write
1BDB81BD000
trusted library allocation
page read and write
7118FBE000
unkown
page readonly
1BDBADB5000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDB9D2A000
trusted library allocation
page read and write
210A8990000
heap
page read and write
1BDAEEB5000
heap
page read and write
1BDC36AD000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDAEF06000
heap
page read and write
1BDB9E8F000
trusted library allocation
page read and write
F22000
unkown
page readonly
165B000
heap
page read and write
1BDC2B01000
heap
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDB81BE000
trusted library allocation
page read and write
1BDB9741000
trusted library allocation
page read and write
1BDB9A28000
trusted library allocation
page read and write
1BDBBACD000
trusted library allocation
page read and write
1BDB9EE9000
trusted library allocation
page read and write
1BDC0A72000
trusted library allocation
page read and write
1BDB9F57000
trusted library allocation
page read and write
1BDB7B9E000
heap
page read and write
1BDC0AA2000
trusted library allocation
page read and write
1BDB9ECB000
trusted library allocation
page read and write
1BDB78FD000
trusted library allocation
page read and write
210A8AE0000
heap
page read and write
1BDB814A000
trusted library allocation
page read and write
1BDBAC49000
trusted library allocation
page read and write
1BDBADB3000
trusted library allocation
page read and write
3B5DFE000
stack
page read and write
1BDAEF03000
heap
page read and write
1BDB78A7000
trusted library allocation
page read and write
1BDC3A61000
trusted library allocation
page read and write
232A630E000
trusted library allocation
page read and write
1BDC0A63000
trusted library allocation
page read and write
1BDB9D89000
trusted library allocation
page read and write
1BDB96EC000
trusted library allocation
page read and write
1BDC0A99000
trusted library allocation
page read and write
1BDB805D000
trusted library allocation
page read and write
1BDB9743000
trusted library allocation
page read and write
1BDB7BAF000
heap
page read and write
1BDAEF04000
heap
page read and write
1BDBBAC9000
trusted library allocation
page read and write
1BDC08D1000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDBC06E000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
166B000
heap
page read and write
1BDBA2F9000
trusted library allocation
page read and write
1BDB7B73000
heap
page read and write
1677000
heap
page read and write
1BDB8DCA000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDAEED0000
heap
page read and write
1BDAEEC6000
heap
page read and write
1BDC0A7A000
trusted library allocation
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDBC0EA000
trusted library allocation
page read and write
1BDC29B6000
trusted library allocation
page read and write
1BDB7B9C000
heap
page read and write
1BDB9F2E000
trusted library allocation
page read and write
1BDB78DC000
trusted library allocation
page read and write
1BDB9735000
trusted library allocation
page read and write
1BDC1767000
trusted library allocation
page read and write
1BDB9ED7000
trusted library allocation
page read and write
1BDB81CB000
trusted library allocation
page read and write
1BDB96F9000
trusted library allocation
page read and write
232A61D0000
heap
page read and write
1BDB811E000
trusted library allocation
page read and write
1BDB9ABD000
trusted library allocation
page read and write
2064C35D000
trusted library allocation
page read and write
1BDC2BE1000
heap
page read and write
1BDC0A76000
trusted library allocation
page read and write
1BDBBD55000
trusted library allocation
page read and write
1BDB90A9000
trusted library allocation
page read and write
1BDB9D79000
trusted library allocation
page read and write
1BDBB78C000
trusted library allocation
page read and write
1BDB9EE0000
trusted library allocation
page read and write
1BDB9B91000
trusted library allocation
page read and write
1BDB9F8D000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDC3ACA000
trusted library allocation
page read and write
1BDBBBCE000
trusted library allocation
page read and write
1BDBBEF7000
trusted library allocation
page read and write
1BDC17F8000
trusted library allocation
page read and write
1BDB5328000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDB8EF8000
trusted library allocation
page read and write
1BDB8D74000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDAEF06000
heap
page read and write
1BDB8D80000
trusted library allocation
page read and write
1BDAEEDE000
heap
page read and write
1BDB78B1000
trusted library allocation
page read and write
1BDB7886000
trusted library allocation
page read and write
1C13A040000
heap
page read and write
3DF1000
heap
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDAEF29000
heap
page read and write
1BDB78C3000
trusted library allocation
page read and write
1BDAEF19000
heap
page read and write
1BDBC17E000
trusted library allocation
page read and write
1BDB9F21000
trusted library allocation
page read and write
1BDB79CC000
trusted library allocation
page read and write
1BDB97DC000
trusted library allocation
page read and write
1BDBAD8F000
trusted library allocation
page read and write
1BDBC1F7000
trusted library allocation
page read and write
1BDB7FA4000
trusted library allocation
page read and write
1BDB9FB2000
trusted library allocation
page read and write
1BDC2B34000
heap
page read and write
2064C40E000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDB56C7000
trusted library allocation
page read and write
1BDB9DA8000
trusted library allocation
page read and write
14A4000
heap
page read and write
1BDB7B95000
heap
page read and write
1BDB9E8F000
trusted library allocation
page read and write
1BDB973D000
trusted library allocation
page read and write
1BDB81CD000
trusted library allocation
page read and write
818B2B7000
stack
page read and write
1BDBBDA6000
trusted library allocation
page read and write
1BDB78D6000
trusted library allocation
page read and write
1BDB9FD3000
trusted library allocation
page read and write
1BDB81CB000
trusted library allocation
page read and write
1BDB9F62000
trusted library allocation
page read and write
1BDBC183000
trusted library allocation
page read and write
3B439E000
unkown
page readonly
1BDB7B82000
heap
page read and write
1BDB439F000
trusted library allocation
page read and write
1BDBA879000
trusted library allocation
page read and write
1BDBBB48000
trusted library allocation
page read and write
1BDB95A7000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDAEEB5000
heap
page read and write
1BDAEEEA000
heap
page read and write
1BDB9FDA000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDB9F94000
trusted library allocation
page read and write
1BDB9782000
trusted library allocation
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDB56C1000
trusted library allocation
page read and write
1BDB9FD7000
trusted library allocation
page read and write
1BDB8D7D000
trusted library allocation
page read and write
1BDBACD8000
trusted library allocation
page read and write
1BDB439F000
trusted library allocation
page read and write
1BDBBBCE000
trusted library allocation
page read and write
1BDC2977000
trusted library allocation
page read and write
1BDB9769000
trusted library allocation
page read and write
1BDBBB97000
trusted library allocation
page read and write
232A6150000
heap
page read and write
1BDB9E73000
trusted library allocation
page read and write
1BDB81AF000
trusted library allocation
page read and write
1BDB9D37000
trusted library allocation
page read and write
1BDB9D74000
trusted library allocation
page read and write
1BDB97F8000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
1BDBA24D000
trusted library allocation
page read and write
1BDB8D99000
trusted library allocation
page read and write
1BDB9D3C000
trusted library allocation
page read and write
1C13A043000
heap
page read and write
1BDB9774000
trusted library allocation
page read and write
1BDC0AD3000
trusted library allocation
page read and write
1BDB7875000
trusted library allocation
page read and write
1BDB9A5F000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDBBFF0000
trusted library allocation
page read and write
1BDB8DCC000
trusted library allocation
page read and write
1628000
heap
page read and write
1BDB563E000
trusted library allocation
page read and write
232A61EC000
heap
page read and write
1BDBBD92000
trusted library allocation
page read and write
1BDB9FF7000
trusted library allocation
page read and write
1BDBB788000
trusted library allocation
page read and write
1BDBBBDF000
trusted library allocation
page read and write
1BDB422F000
trusted library allocation
page read and write
1659000
heap
page read and write
1BDB9D4E000
trusted library allocation
page read and write
1BDB8D9E000
trusted library allocation
page read and write
1BDB9EB8000
trusted library allocation
page read and write
1BDB9AAC000
trusted library allocation
page read and write
22DB0730000
heap
page read and write
1BDB92E6000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDAEED7000
heap
page read and write
1BDBC0ED000
trusted library allocation
page read and write
2064BF80000
unclassified section
page read and write
1BDB78DD000
trusted library allocation
page read and write
1D5831424000
trusted library allocation
page read and write
1BDB8132000
trusted library allocation
page read and write
1BDB9DAA000
trusted library allocation
page read and write
1BDB90FD000
trusted library allocation
page read and write
1BDAEEB1000
heap
page read and write
1BDBC0DC000
trusted library allocation
page read and write
1675000
heap
page read and write
1BDB9723000
trusted library allocation
page read and write
818CC3E000
stack
page read and write
1BDBC159000
trusted library allocation
page read and write
1BDB8180000
trusted library allocation
page read and write
1BDB972C000
trusted library allocation
page read and write
1BDBC217000
trusted library allocation
page read and write
1BDB9EEE000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDBA8F1000
trusted library allocation
page read and write
1BDBBD4D000
trusted library allocation
page read and write
1BDB818E000
trusted library allocation
page read and write
1BDAEEDB000
heap
page read and write
1BDB56D8000
trusted library allocation
page read and write
1BDBC110000
trusted library allocation
page read and write
1BDB567A000
trusted library allocation
page read and write
1BDB79FA000
trusted library allocation
page read and write
22DB0933000
heap
page read and write
1BDBC0CD000
trusted library allocation
page read and write
1BDB7B9F000
heap
page read and write
1BDB973B000
trusted library allocation
page read and write
1BDBA2D7000
trusted library allocation
page read and write
1BDB7B9A000
heap
page read and write
1BDBA8B7000
trusted library allocation
page read and write
1BDAEEDE000
heap
page read and write
1BDB7999000
trusted library allocation
page read and write
1BDB97DC000
trusted library allocation
page read and write
1BDBAC99000
trusted library allocation
page read and write
1BDBC1CF000
trusted library allocation
page read and write
1BDBBAD7000
trusted library allocation
page read and write
1BDB78FD000
trusted library allocation
page read and write
1BDBBA62000
trusted library allocation
page read and write
1BDB9E5A000
trusted library allocation
page read and write
1BDB9035000
trusted library allocation
page read and write
1BDAEEE1000
heap
page read and write
1BDAEEE1000
heap
page read and write
1BDC2914000
trusted library allocation
page read and write
49A1181000
trusted library allocation
page execute read
1BDBC1A1000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDAEEAE000
heap
page read and write
1BDB9F5A000
trusted library allocation
page read and write
1BDBC0DC000
trusted library allocation
page read and write
1BDB5649000
trusted library allocation
page read and write
1BDB7F9E000
trusted library allocation
page read and write
1BDB9ED8000
trusted library allocation
page read and write
1BDC2B01000
heap
page read and write
2064BF4A000
heap
page read and write
1BDB7947000
trusted library allocation
page read and write
1BDB9FAE000
trusted library allocation
page read and write
1BDBA224000
trusted library allocation
page read and write
1BDB9F68000
trusted library allocation
page read and write
1BDB9EED000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
2064C3C8000
trusted library allocation
page read and write
1BDB56F6000
trusted library allocation
page read and write
232A58F0000
trusted library allocation
page read and write
232A5A23000
trusted library allocation
page read and write
1BDB9EE0000
trusted library allocation
page read and write
1BDB564D000
trusted library allocation
page read and write
1BDB9F8D000
trusted library allocation
page read and write
1BDB56F8000
trusted library allocation
page read and write
F34000
unkown
page readonly
1BDB8076000
trusted library allocation
page read and write
1BDBBED5000
trusted library allocation
page read and write
1BDB9D5A000
trusted library allocation
page read and write
1BDBBB7C000
trusted library allocation
page read and write
1BDB973D000
trusted library allocation
page read and write
1BDBBAD9000
trusted library allocation
page read and write
1BDBBA62000
trusted library allocation
page read and write
1BDC06BC000
trusted library allocation
page read and write
1BDB97C5000
trusted library allocation
page read and write
1BDAEF1C000
heap
page read and write
1BDAEED9000
heap
page read and write
1BDBBACD000
trusted library allocation
page read and write
1BDB9A02000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDBBF73000
trusted library allocation
page read and write
1BDB92F3000
trusted library allocation
page read and write
1BDB9ABD000
trusted library allocation
page read and write
1BDB9AB8000
trusted library allocation
page read and write
1BDB9ED7000
trusted library allocation
page read and write
232A614F000
heap
page read and write
1BDB9F33000
trusted library allocation
page read and write
1BDB9E9B000
trusted library allocation
page read and write
2064BEC0000
heap
page read and write
1BDBBACD000
trusted library allocation
page read and write
232A60F0000
heap
page read and write
1BDB97BA000
trusted library allocation
page read and write
1BDB81C9000
trusted library allocation
page read and write
232A676E000
heap
page read and write
1BDB96F2000
trusted library allocation
page read and write
1BDC0AAD000
trusted library allocation
page read and write
1BDB92E2000
trusted library allocation
page read and write
1BDBC156000
trusted library allocation
page read and write
1BDB9ED6000
trusted library allocation
page read and write
1BDB9EDA000
trusted library allocation
page read and write
1BDC0A5F000
trusted library allocation
page read and write
1BDB95A2000
trusted library allocation
page read and write
1BDB9E37000
trusted library allocation
page read and write
1BDAEF19000
heap
page read and write
2064C43F000
trusted library allocation
page read and write
1BDBB78C000
trusted library allocation
page read and write
1BDB56BE000
trusted library allocation
page read and write
1BDB9DF9000
trusted library allocation
page read and write
1BDAEEDB000
heap
page read and write
3B6DFE000
stack
page read and write
1BDC0AB1000
trusted library allocation
page read and write
1BDB9EED000
trusted library allocation
page read and write
1BDB8DCC000
trusted library allocation
page read and write
1BDB9ED8000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDB8D9B000
trusted library allocation
page read and write
1BDB9EAB000
trusted library allocation
page read and write
1BDB5694000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDC2AC1000
trusted library allocation
page read and write
1BDC3700000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDB8D42000
trusted library allocation
page read and write
1BDB4223000
trusted library allocation
page read and write
1BDBA8A5000
trusted library allocation
page read and write
1BDB569D000
trusted library allocation
page read and write
1BDB9A1A000
trusted library allocation
page read and write
1BDB8D4A000
trusted library allocation
page read and write
1BDAEF14000
heap
page read and write
1BDAEF27000
heap
page read and write
1BDAEEE1000
heap
page read and write
1BDBBEA9000
trusted library allocation
page read and write
1BDB81CF000
trusted library allocation
page read and write
1BDB9D3C000
trusted library allocation
page read and write
1BDB8D0E000
trusted library allocation
page read and write
1BDB97E5000
trusted library allocation
page read and write
1BDB8DC4000
trusted library allocation
page read and write
1BDC29B6000
trusted library allocation
page read and write
1BDC2B34000
heap
page read and write
1BDAEECE000
heap
page read and write
1BDAEEDE000
heap
page read and write
1BDBAD6C000
trusted library allocation
page read and write
1BDB9F85000
trusted library allocation
page read and write
232A618C000
heap
page read and write
1BDB9F74000
trusted library allocation
page read and write
1BDBB745000
trusted library allocation
page read and write
1BDB8D8F000
trusted library allocation
page read and write
1BDB7B75000
heap
page read and write
1BDBCAB1000
trusted library allocation
page read and write
1BDB9F86000
trusted library allocation
page read and write
1BDBC2B8000
trusted library allocation
page read and write
1BDC0A44000
trusted library allocation
page read and write
1C13A37A000
trusted library allocation
page read and write
22DB0890000
heap
page read and write
1BDB9FA2000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDBA20A000
trusted library allocation
page read and write
1BDAEF22000
heap
page read and write
1BDAEECA000
heap
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
2064C421000
trusted library allocation
page read and write
1BDBC079000
trusted library allocation
page read and write
1BDB8D82000
trusted library allocation
page read and write
1BDB9F6D000
trusted library allocation
page read and write
1BDB8D9E000
trusted library allocation
page read and write
1BDB8538000
trusted library allocation
page read and write
1BDB85F1000
trusted library allocation
page read and write
2064BDD0000
heap
page read and write
1BDAEF04000
heap
page read and write
1BDC08D3000
trusted library allocation
page read and write
1BDB9DF8000
trusted library allocation
page read and write
1BDB9D39000
trusted library allocation
page read and write
1BDC2B01000
heap
page read and write
1BDB9A96000
trusted library allocation
page read and write
1BDBC723000
trusted library allocation
page read and write
1BDB9066000
trusted library allocation
page read and write
1BDC1E77000
trusted library allocation
page read and write
1BDC2B85000
trusted library allocation
page read and write
1BDBC0B8000
trusted library allocation
page read and write
1BDBA031000
trusted library allocation
page read and write
1BDB9B53000
trusted library allocation
page read and write
1BDB56A8000
trusted library allocation
page read and write
1BDBC15C000
trusted library allocation
page read and write
1BDBC152000
trusted library allocation
page read and write
1BDB8025000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDBCC04000
trusted library allocation
page read and write
1BDB9F9C000
trusted library allocation
page read and write
1BDAEEBB000
heap
page read and write
1BDB8D2F000
trusted library allocation
page read and write
1BDB9BB6000
trusted library allocation
page read and write
1BDB8D99000
trusted library allocation
page read and write
1BDBA720000
trusted library allocation
page read and write
3B431E000
unkown
page readonly
1BDB81D3000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
1BDBA27B000
trusted library allocation
page read and write
1BDB43B3000
trusted library allocation
page read and write
818C37E000
stack
page read and write
1BDC3BA8000
trusted library allocation
page read and write
1BDC1A88000
trusted library allocation
page read and write
232A617A000
heap
page read and write
232A6785000
heap
page read and write
1BDB9F21000
trusted library allocation
page read and write
1BDB9741000
trusted library allocation
page read and write
232A615C000
heap
page read and write
1BDB81AF000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDAEEB5000
heap
page read and write
1BDC1ABF000
trusted library allocation
page read and write
1BDB9D5A000
trusted library allocation
page read and write
1BDB8D99000
trusted library allocation
page read and write
1BDAEEAE000
heap
page read and write
1BDAEEAF000
heap
page read and write
1BDAEEC5000
heap
page read and write
1BDBCBB1000
trusted library allocation
page read and write
1BDB9D6B000
trusted library allocation
page read and write
1BDB81C6000
trusted library allocation
page read and write
1BDBAD22000
trusted library allocation
page read and write
1BDB9D17000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDAEF0C000
heap
page read and write
1BDAEEB5000
heap
page read and write
1BDAEF19000
heap
page read and write
1BDC17F8000
trusted library allocation
page read and write
1BDB8D4A000
trusted library allocation
page read and write
1BDAEEC0000
heap
page read and write
1BDB9D3C000
trusted library allocation
page read and write
1BDB9D5A000
trusted library allocation
page read and write
1BDBBAD9000
trusted library allocation
page read and write
1BDAEEBC000
heap
page read and write
1BDB9E87000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1660000
heap
page read and write
1BDB9D3D000
trusted library allocation
page read and write
232A6159000
heap
page read and write
1BDB8D58000
trusted library allocation
page read and write
1BDB5386000
trusted library allocation
page read and write
1BDBC150000
trusted library allocation
page read and write
1BDBC06A000
trusted library allocation
page read and write
1BDB85B4000
trusted library allocation
page read and write
1BDBA034000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDB38DF000
trusted library allocation
page read and write
1BDAEEC3000
heap
page read and write
232A61A9000
heap
page read and write
1BDB78FD000
trusted library allocation
page read and write
1BDAEEBC000
heap
page read and write
1BDAEEE0000
heap
page read and write
14A4000
heap
page read and write
1BDB9A49000
trusted library allocation
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDB56A6000
trusted library allocation
page read and write
1BDB7F64000
trusted library allocation
page read and write
1BDB900D000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDB9D5C000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDC0A65000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDC29A6000
trusted library allocation
page read and write
232A61EC000
heap
page read and write
1BDB9A54000
trusted library allocation
page read and write
232A60E0000
heap
page read and write
1BDB98DF000
trusted library allocation
page read and write
1BDB78B1000
trusted library allocation
page read and write
1C13A700000
trusted library allocation
page read and write
1BDBC0DC000
trusted library allocation
page read and write
1647000
heap
page read and write
210A8C0A000
trusted library allocation
page read and write
1BDBC783000
trusted library allocation
page read and write
1BDB91C4000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDB814A000
trusted library allocation
page read and write
232A67B8000
heap
page read and write
1BDBA762000
trusted library allocation
page read and write
1BDB85A2000
trusted library allocation
page read and write
1BDC2914000
trusted library allocation
page read and write
2064BEE0000
heap
page read and write
1C13A030000
unclassified section
page read and write
1BDB81CB000
trusted library allocation
page read and write
1BDBB751000
trusted library allocation
page read and write
1BDB54F3000
trusted library allocation
page read and write
232A61EC000
heap
page read and write
232A6758000
heap
page read and write
1BDBBBAB000
trusted library allocation
page read and write
1BDC0A42000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDB7FA5000
trusted library allocation
page read and write
232A6785000
heap
page read and write
1BDBBEDE000
trusted library allocation
page read and write
1BDB9F81000
trusted library allocation
page read and write
1BDB8D4A000
trusted library allocation
page read and write
1BDC17C7000
trusted library allocation
page read and write
1BDAEF03000
heap
page read and write
1BDC0A72000
trusted library allocation
page read and write
1BDBC123000
trusted library allocation
page read and write
1BDB4394000
trusted library allocation
page read and write
1BDB783A000
trusted library allocation
page read and write
1BDBC169000
trusted library allocation
page read and write
232A6758000
heap
page read and write
1BDB7B9D000
heap
page read and write
1BDB7B75000
heap
page read and write
1BDAEF17000
heap
page read and write
1BDC1A21000
trusted library allocation
page read and write
1BDBA231000
trusted library allocation
page read and write
1BDB9EDD000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDB9DF3000
trusted library allocation
page read and write
1BDB97AD000
trusted library allocation
page read and write
1BDC08D4000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDB9AFC000
trusted library allocation
page read and write
1BDB7F64000
trusted library allocation
page read and write
1BDC1E47000
trusted library allocation
page read and write
232A61D8000
heap
page read and write
1BDB56A8000
trusted library allocation
page read and write
1BDB901C000
trusted library allocation
page read and write
1BDB8D42000
trusted library allocation
page read and write
1BDB8D3C000
trusted library allocation
page read and write
1BDBA26C000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
166B000
heap
page read and write
1BDB7B9C000
heap
page read and write
1BDAEF19000
heap
page read and write
1BDC1CA8000
trusted library allocation
page read and write
1BDBCB5C000
trusted library allocation
page read and write
1BDAEEC0000
heap
page read and write
1BDB9FF4000
trusted library allocation
page read and write
232A6150000
heap
page read and write
1BDC08F0000
trusted library allocation
page read and write
1BDC08A8000
trusted library allocation
page read and write
1BDAEEBC000
heap
page read and write
1BDAEEB5000
heap
page read and write
1BDB9FA4000
trusted library allocation
page read and write
1BDC0A65000
trusted library allocation
page read and write
1BDB9725000
trusted library allocation
page read and write
1BDB8158000
trusted library allocation
page read and write
1BDB98CA000
trusted library allocation
page read and write
1BDC2BB4000
trusted library allocation
page read and write
1BDB7875000
trusted library allocation
page read and write
232A67B9000
heap
page read and write
1BDAEF1E000
heap
page read and write
1C13A0AA000
heap
page read and write
1BDB9EDA000
trusted library allocation
page read and write
1BDB9EAB000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDB98C0000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB9033000
trusted library allocation
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDB9DAA000
trusted library allocation
page read and write
1BDB7B9E000
heap
page read and write
3DF1000
heap
page read and write
1BDB8157000
trusted library allocation
page read and write
1BDC1CB6000
trusted library allocation
page read and write
1BDAEF0F000
heap
page read and write
1BDB9AEF000
trusted library allocation
page read and write
1BDB81C1000
trusted library allocation
page read and write
1BDB85B2000
trusted library allocation
page read and write
2064BDA7000
remote allocation
page execute read
1BDB8D53000
trusted library allocation
page read and write
1BDAEF19000
heap
page read and write
1BDBC159000
trusted library allocation
page read and write
1BDAEF18000
heap
page read and write
1BDAEF06000
heap
page read and write
1BDB9581000
trusted library allocation
page read and write
1BDC0A7A000
trusted library allocation
page read and write
1BDAEEB1000
heap
page read and write
1BDB9F8D000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDAEEC6000
heap
page read and write
1BDB78D9000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
232A619A000
heap
page read and write
1BDB8190000
trusted library allocation
page read and write
1BDB542E000
trusted library allocation
page read and write
1BDB9F4F000
trusted library allocation
page read and write
232A67A8000
heap
page read and write
1BDB8171000
trusted library allocation
page read and write
1BDB9FC1000
trusted library allocation
page read and write
1BDBADA0000
trusted library allocation
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDB9A76000
trusted library allocation
page read and write
1BDB974B000
trusted library allocation
page read and write
1BDC2B66000
trusted library allocation
page read and write
1BDBA1F7000
trusted library allocation
page read and write
1BDBBAC9000
trusted library allocation
page read and write
1BDB548A000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDB79C5000
trusted library allocation
page read and write
1BDBADA7000
trusted library allocation
page read and write
232A6191000
heap
page read and write
1BDB81C9000
trusted library allocation
page read and write
1BDB9F4B000
trusted library allocation
page read and write
1BDBC06A000
trusted library allocation
page read and write
1BDB9F6B000
trusted library allocation
page read and write
2064C32E000
trusted library allocation
page read and write
1BDB818F000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDB8DCC000
trusted library allocation
page read and write
1BDC2B06000
heap
page read and write
1BDB8D8A000
trusted library allocation
page read and write
1BDB7B9A000
heap
page read and write
1BDBA24A000
trusted library allocation
page read and write
232A57B0000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
1BDB9D89000
trusted library allocation
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDB8D80000
trusted library allocation
page read and write
1BDBACD2000
trusted library allocation
page read and write
132B000
stack
page read and write
1BDC0A61000
trusted library allocation
page read and write
1BDAEF29000
heap
page read and write
1BDB7999000
trusted library allocation
page read and write
1BDB8565000
trusted library allocation
page read and write
1BDBC1B5000
trusted library allocation
page read and write
1BDC3A18000
trusted library allocation
page read and write
1BDB7B9E000
heap
page read and write
1BDB9FFA000
trusted library allocation
page read and write
1BDBB7BA000
trusted library allocation
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDC29D8000
trusted library allocation
page read and write
1BDC0AA2000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDB9AEF000
trusted library allocation
page read and write
1BDB809B000
trusted library allocation
page read and write
1BDBCBB4000
trusted library allocation
page read and write
1BDB56BE000
trusted library allocation
page read and write
1BDBC0F1000
trusted library allocation
page read and write
1BDBC071000
trusted library allocation
page read and write
1BDBB7F7000
trusted library allocation
page read and write
1BDB812C000
trusted library allocation
page read and write
1BDB8160000
trusted library allocation
page read and write
1BDB78DB000
trusted library allocation
page read and write
14A4000
heap
page read and write
1BDC0894000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDC1A4E000
trusted library allocation
page read and write
1BDBA0CF000
trusted library allocation
page read and write
1BDB5669000
trusted library allocation
page read and write
1BDBC055000
trusted library allocation
page read and write
1BDAEECB000
heap
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDC08DC000
trusted library allocation
page read and write
1BDBC09E000
trusted library allocation
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDBC13B000
trusted library allocation
page read and write
1BDBC13B000
trusted library allocation
page read and write
1BDBC052000
trusted library allocation
page read and write
1BDC06E7000
trusted library allocation
page read and write
1BDBBFD1000
trusted library allocation
page read and write
1BDC08F4000
trusted library allocation
page read and write
BE0000
heap
page read and write
1BDB9719000
trusted library allocation
page read and write
1BDBACB6000
trusted library allocation
page read and write
1BDC2BA9000
heap
page read and write
1BDAEEAE000
heap
page read and write
1BDAEF25000
heap
page read and write
1BDAEEAF000
heap
page read and write
1BDAEED8000
heap
page read and write
1BDB9F36000
trusted library allocation
page read and write
1BDAEEE0000
heap
page read and write
1BDBA8AB000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDBCAD4000
trusted library allocation
page read and write
1BDB9D45000
trusted library allocation
page read and write
1C13A3B7000
trusted library allocation
page read and write
1BDB9A51000
trusted library allocation
page read and write
1BDB81FA000
trusted library allocation
page read and write
1BDB85B4000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDBA8FB000
trusted library allocation
page read and write
147BBFF000
stack
page read and write
1BDAEED8000
heap
page read and write
1BDB9D30000
trusted library allocation
page read and write
1BDBA224000
trusted library allocation
page read and write
1BDB806E000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDC17D2000
trusted library allocation
page read and write
1BDB97C3000
trusted library allocation
page read and write
71177BE000
stack
page read and write
1BDB9033000
trusted library allocation
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDB9A76000
trusted library allocation
page read and write
1BDB9D6B000
trusted library allocation
page read and write
1BDC1AFD000
trusted library allocation
page read and write
1BDB97CB000
trusted library allocation
page read and write
1BDB9ECA000
trusted library allocation
page read and write
1BDB8D29000
trusted library allocation
page read and write
1BDB85F3000
trusted library allocation
page read and write
1BDBBFA8000
trusted library allocation
page read and write
1BDB43B3000
trusted library allocation
page read and write
232A5A5F000
trusted library allocation
page read and write
1BDAEEC0000
heap
page read and write
1BDAEEC9000
heap
page read and write
1BDB9ED8000
trusted library allocation
page read and write
1BDB9033000
trusted library allocation
page read and write
1BDC1757000
trusted library allocation
page read and write
1BDB97BE000
trusted library allocation
page read and write
1BDC0780000
trusted library allocation
page read and write
2064C133000
heap
page read and write
1BDBA8D9000
trusted library allocation
page read and write
1BDAEEDE000
heap
page read and write
1BDB97AD000
trusted library allocation
page read and write
1BDBC1A9000
trusted library allocation
page read and write
1BDB7999000
trusted library allocation
page read and write
1BDB9ED5000
trusted library allocation
page read and write
1BDAEECA000
heap
page read and write
1BDB78F3000
trusted library allocation
page read and write
1BDB9E8F000
trusted library allocation
page read and write
1BDBC21D000
trusted library allocation
page read and write
1BDAEF19000
heap
page read and write
1BDAEF0C000
heap
page read and write
1BDB81CF000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDB9ED6000
trusted library allocation
page read and write
1BDC0AE1000
trusted library allocation
page read and write
232A60F9000
heap
page read and write
1BDC2942000
trusted library allocation
page read and write
1BDC2B01000
heap
page read and write
1BDB56C1000
trusted library allocation
page read and write
1BDBC1F9000
trusted library allocation
page read and write
1BDB97FC000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDAEF25000
heap
page read and write
1BDB96CC000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDBC1A1000
trusted library allocation
page read and write
1BDB9BE3000
trusted library allocation
page read and write
1BDBC073000
trusted library allocation
page read and write
1BDBC160000
trusted library allocation
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDB919F000
trusted library allocation
page read and write
1BDB56DF000
trusted library allocation
page read and write
1BDB79D0000
trusted library allocation
page read and write
1BDBBDA0000
trusted library allocation
page read and write
1BDBADCD000
trusted library allocation
page read and write
1BDBC2D7000
trusted library allocation
page read and write
1BDBA2D0000
trusted library allocation
page read and write
1BDAEEC9000
heap
page read and write
1659000
heap
page read and write
1BDB4398000
trusted library allocation
page read and write
1BDBBD6D000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDAEED8000
heap
page read and write
1BDB9D54000
trusted library allocation
page read and write
1BDB81C1000
trusted library allocation
page read and write
232A5AC7000
trusted library allocation
page read and write
1BDBA23B000
trusted library allocation
page read and write
1BDB78C5000
trusted library allocation
page read and write
1BDB9FC1000
trusted library allocation
page read and write
1BDB9B56000
trusted library allocation
page read and write
7116F3E000
unkown
page readonly
1BDB8DAC000
trusted library allocation
page read and write
2064C310000
trusted library allocation
page read and write
1BDB9F8A000
trusted library allocation
page read and write
1BDB9E87000
trusted library allocation
page read and write
1BDAEEC9000
heap
page read and write
1BDB53BD000
trusted library allocation
page read and write
1BDB8D41000
trusted library allocation
page read and write
1BDBC156000
trusted library allocation
page read and write
1BDC39FC000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDBBDE6000
trusted library allocation
page read and write
1BDBA0A9000
trusted library allocation
page read and write
1BDB9F27000
trusted library allocation
page read and write
1BDB9FB1000
trusted library allocation
page read and write
1BDB974F000
trusted library allocation
page read and write
1BDC1ABF000
trusted library allocation
page read and write
1BDB7B75000
heap
page read and write
1BDAEF0C000
heap
page read and write
1BDB9EB8000
trusted library allocation
page read and write
1C139F70000
unclassified section
page readonly
1BDB9785000
trusted library allocation
page read and write
1BDB9E80000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
1BDB9012000
trusted library allocation
page read and write
1BDB78A7000
trusted library allocation
page read and write
1BDB9F31000
trusted library allocation
page read and write
1BDC28CC000
trusted library allocation
page read and write
1554000
heap
page read and write
1BDAEF17000
heap
page read and write
1BDB7999000
trusted library allocation
page read and write
1BDB8D58000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDBA29E000
trusted library allocation
page read and write
1BDB97BF000
trusted library allocation
page read and write
1BDBBDB2000
trusted library allocation
page read and write
1BDB971B000
trusted library allocation
page read and write
1BDC2B71000
heap
page read and write
1BDB9FA5000
trusted library allocation
page read and write
1BDAEED7000
heap
page read and write
1BDB9F81000
trusted library allocation
page read and write
1BDBACAE000
trusted library allocation
page read and write
1BDB9AAC000
trusted library allocation
page read and write
1BDC08B3000
trusted library allocation
page read and write
1BDB79D3000
trusted library allocation
page read and write
1BDB85E6000
trusted library allocation
page read and write
1BDBBE40000
trusted library allocation
page read and write
1BDB9EC2000
trusted library allocation
page read and write
1BDBBAE6000
trusted library allocation
page read and write
1BDC175C000
trusted library allocation
page read and write
1BDBA74C000
trusted library allocation
page read and write
B69000
stack
page read and write
1BDBC14C000
trusted library allocation
page read and write
1BDB81CF000
trusted library allocation
page read and write
1BDBC071000
trusted library allocation
page read and write
1BDB43B3000
trusted library allocation
page read and write
1BDC0AB1000
trusted library allocation
page read and write
1BDB9A71000
trusted library allocation
page read and write
232A6159000
heap
page read and write
1BDB96DC000
trusted library allocation
page read and write
1BDB5669000
trusted library allocation
page read and write
1BDC299D000
trusted library allocation
page read and write
1BDB548A000
trusted library allocation
page read and write
1BDC29A2000
trusted library allocation
page read and write
232A6150000
heap
page read and write
1BDAEECB000
heap
page read and write
1BDAEF23000
heap
page read and write
1BDAEEDE000
heap
page read and write
1BDAEEE0000
heap
page read and write
1BDB5664000
trusted library allocation
page read and write
1BDBBE98000
trusted library allocation
page read and write
1BDB809B000
trusted library allocation
page read and write
1BDB7B59000
heap
page read and write
1BDAEED1000
heap
page read and write
1BDC287D000
trusted library allocation
page read and write
1BDAEEC9000
heap
page read and write
1BDB81BE000
trusted library allocation
page read and write
1BDBBEF1000
trusted library allocation
page read and write
1BDBC25E000
trusted library allocation
page read and write
1BDB9F9C000
trusted library allocation
page read and write
1BDB8D42000
trusted library allocation
page read and write
1BDB9EDD000
trusted library allocation
page read and write
1BDBA8A5000
trusted library allocation
page read and write
1BDBC052000
trusted library allocation
page read and write
1BDBA8F9000
trusted library allocation
page read and write
1BDB9A6C000
trusted library allocation
page read and write
165D000
heap
page read and write
1BDB9FBB000
trusted library allocation
page read and write
1BDAEEBA000
heap
page read and write
1BDBA219000
trusted library allocation
page read and write
1BDB9D37000
trusted library allocation
page read and write
1BDBC2E8000
trusted library allocation
page read and write
1BDB9ED7000
trusted library allocation
page read and write
1BDB97B5000
trusted library allocation
page read and write
1BDB78C3000
trusted library allocation
page read and write
232A5A81000
trusted library allocation
page read and write
165F000
heap
page read and write
1BDA9A3A000
heap
page read and write
1BDB7940000
trusted library allocation
page read and write
1BDB9F81000
trusted library allocation
page read and write
1BDB85E7000
trusted library allocation
page read and write
1BDB9018000
trusted library allocation
page read and write
232A6762000
heap
page read and write
1C13A050000
heap
page read and write
1BDB858C000
trusted library allocation
page read and write
1BDBBD4F000
trusted library allocation
page read and write
1BDB9ECE000
trusted library allocation
page read and write
1BDB9AAC000
trusted library allocation
page read and write
1BDBA0C0000
trusted library allocation
page read and write
232A61D0000
heap
page read and write
1BDB9BA8000
trusted library allocation
page read and write
1BDB9ECF000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDB79DD000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDB53AC000
trusted library allocation
page read and write
165A000
heap
page read and write
1BDC1AB1000
trusted library allocation
page read and write
1BDC08C1000
trusted library allocation
page read and write
1BDB79C4000
trusted library allocation
page read and write
1BDAEF1D000
heap
page read and write
1BDAEF29000
heap
page read and write
1BDB9A54000
trusted library allocation
page read and write
1BDBBB75000
trusted library allocation
page read and write
1BDB815B000
trusted library allocation
page read and write
71165FE000
stack
page read and write
1BDB796F000
trusted library allocation
page read and write
1BDBBAD9000
trusted library allocation
page read and write
1BDB9745000
trusted library allocation
page read and write
1BDB9A7C000
trusted library allocation
page read and write
1BDAEF0B000
heap
page read and write
1BDB9045000
trusted library allocation
page read and write
232A6159000
heap
page read and write
1BDB9E5D000
trusted library allocation
page read and write
232A6799000
heap
page read and write
1BDB81D3000
trusted library allocation
page read and write
1BDB9596000
trusted library allocation
page read and write
1BDB9F85000
trusted library allocation
page read and write
1BDC2BCA000
trusted library allocation
page read and write
1BDB90A8000
trusted library allocation
page read and write
1BDAEF14000
heap
page read and write
1BDC0A44000
trusted library allocation
page read and write
1BDC28D7000
trusted library allocation
page read and write
1BDBBD8D000
trusted library allocation
page read and write
1BDC0A31000
trusted library allocation
page read and write
1BDB56F6000
trusted library allocation
page read and write
1BDB78E1000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDB79FA000
trusted library allocation
page read and write
1BDBA224000
trusted library allocation
page read and write
1BDBBEED000
trusted library allocation
page read and write
1BDC0A70000
trusted library allocation
page read and write
E60000
unkown
page readonly
1BDB90B0000
trusted library allocation
page read and write
1BDB9AAC000
trusted library allocation
page read and write
1BDB9A73000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDB8D69000
trusted library allocation
page read and write
1BDBA7E9000
trusted library allocation
page read and write
1C13A70C000
trusted library allocation
page read and write
1BDBC16F000
trusted library allocation
page read and write
1BDB8186000
trusted library allocation
page read and write
1BDB9EB1000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDAEEE0000
heap
page read and write
1BDB8D64000
trusted library allocation
page read and write
232A60BF000
unkown
page execute read
1BDB971B000
trusted library allocation
page read and write
1C139F60000
remote allocation
page execute read
1BDAEF02000
heap
page read and write
2064C432000
trusted library allocation
page read and write
1BDB809B000
trusted library allocation
page read and write
232A615C000
heap
page read and write
1BDBA728000
trusted library allocation
page read and write
1BDAEEAE000
heap
page read and write
1BDB9AC4000
trusted library allocation
page read and write
1BDB97DE000
trusted library allocation
page read and write
1BDB9EAB000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDBBB8D000
trusted library allocation
page read and write
1BDB806E000
trusted library allocation
page read and write
1BDBA05D000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDC0AF3000
trusted library allocation
page read and write
1BDB9F54000
trusted library allocation
page read and write
1BDC0A63000
trusted library allocation
page read and write
1BDBC0E2000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
2064C200000
trusted library allocation
page read and write
1BDB9741000
trusted library allocation
page read and write
1490000
heap
page read and write
1BDB5698000
trusted library allocation
page read and write
1BDB8DB1000
trusted library allocation
page read and write
1650000
heap
page read and write
1BDB9782000
trusted library allocation
page read and write
210A8D80000
heap
page read and write
1BDB92C3000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDC2BFC000
trusted library allocation
page read and write
1BDB97E3000
trusted library allocation
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDB8143000
trusted library allocation
page read and write
1BDB9A96000
trusted library allocation
page read and write
1BDBCAAE000
trusted library allocation
page read and write
1672000
heap
page read and write
1BDB80FA000
trusted library allocation
page read and write
1BDBBDD6000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
1C139FB0000
heap
page read and write
1BDC0633000
trusted library allocation
page read and write
1BDB9E5A000
trusted library allocation
page read and write
1BDBBEBD000
trusted library allocation
page read and write
1BDB9F9C000
trusted library allocation
page read and write
1BDB79C5000
trusted library allocation
page read and write
1BDC0AE1000
trusted library allocation
page read and write
1BDBBBE7000
trusted library allocation
page read and write
1BDC1AD0000
trusted library allocation
page read and write
1BDB8136000
trusted library allocation
page read and write
1C139EE0000
unclassified section
page readonly
1BDAEF06000
heap
page read and write
1BDBBDFE000
trusted library allocation
page read and write
1BDB56E0000
trusted library allocation
page read and write
1BDB8076000
trusted library allocation
page read and write
1BDB8D8F000
trusted library allocation
page read and write
1BDB9E9B000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDC08A3000
trusted library allocation
page read and write
232A6799000
heap
page read and write
22DB23B9000
heap
page read and write
1BDBC183000
trusted library allocation
page read and write
1BDC0AD3000
trusted library allocation
page read and write
1BDB9EE7000
trusted library allocation
page read and write
1BDC2B95000
heap
page read and write
1BDB8D6C000
trusted library allocation
page read and write
1BDC17F8000
trusted library allocation
page read and write
1BDB38B3000
trusted library allocation
page read and write
1BDB97EE000
trusted library allocation
page read and write
1BDBBF44000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
232A60BA000
unkown
page execute read
1BDBAD36000
trusted library allocation
page read and write
1BDB95B2000
trusted library allocation
page read and write
1BDBBAD9000
trusted library allocation
page read and write
1BDB9012000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDB78A4000
trusted library allocation
page read and write
1BDB3881000
trusted library allocation
page read and write
1BDB80FA000
trusted library allocation
page read and write
1BDB9F9C000
trusted library allocation
page read and write
1BDB9AB8000
trusted library allocation
page read and write
1BDBC16B000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDAEED8000
heap
page read and write
1BDBC0CE000
trusted library allocation
page read and write
1BDBB7AF000
trusted library allocation
page read and write
1BDB439F000
trusted library allocation
page read and write
1BDB7B9E000
heap
page read and write
1BDB9D30000
trusted library allocation
page read and write
1BDB53B2000
trusted library allocation
page read and write
232A56D0000
unclassified section
page readonly
1BDB81DA000
trusted library allocation
page read and write
1BDC08E8000
trusted library allocation
page read and write
1BDB9741000
trusted library allocation
page read and write
1BDB8EC9000
trusted library allocation
page read and write
232A615C000
heap
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDAEEE0000
heap
page read and write
1BDC173D000
trusted library allocation
page read and write
1BDB9F68000
trusted library allocation
page read and write
1BDB7F66000
trusted library allocation
page read and write
818C33E000
unkown
page readonly
1BDC08AA000
trusted library allocation
page read and write
1BDB56C7000
trusted library allocation
page read and write
1BDB9A1A000
trusted library allocation
page read and write
1BDAEF25000
heap
page read and write
1BDB9D0F000
trusted library allocation
page read and write
1BDB85FD000
trusted library allocation
page read and write
1BDB9D2A000
trusted library allocation
page read and write
1BDBC183000
trusted library allocation
page read and write
1BDC1ABD000
trusted library allocation
page read and write
232A61D8000
heap
page read and write
1BDBACF5000
trusted library allocation
page read and write
232A5A6F000
trusted library allocation
page read and write
1BDB9A48000
trusted library allocation
page read and write
1BDB9D4E000
trusted library allocation
page read and write
1BDC17D7000
trusted library allocation
page read and write
1BDB5696000
trusted library allocation
page read and write
1BDBC115000
trusted library allocation
page read and write
1BDBBB62000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
232A61EC000
heap
page read and write
1BDB9696000
trusted library allocation
page read and write
1BDB9FF3000
trusted library allocation
page read and write
1BDB56C7000
trusted library allocation
page read and write
1BDBA767000
trusted library allocation
page read and write
1BDC0AC7000
trusted library allocation
page read and write
1BDB8D82000
trusted library allocation
page read and write
1BDBB7FC000
trusted library allocation
page read and write
1BDB96FE000
trusted library allocation
page read and write
1BDB9F68000
trusted library allocation
page read and write
1BDB8D9B000
trusted library allocation
page read and write
1BDBA285000
trusted library allocation
page read and write
1BDB90AC000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDAEECB000
heap
page read and write
1BDB97F0000
trusted library allocation
page read and write
1BDAEF04000
heap
page read and write
1BDBBECE000
trusted library allocation
page read and write
232A6150000
heap
page read and write
147B3FF000
stack
page read and write
1BDBBAE6000
trusted library allocation
page read and write
1BDB8D85000
trusted library allocation
page read and write
1BDB9FF3000
trusted library allocation
page read and write
1BDC39B1000
trusted library allocation
page read and write
1BDC1A3E000
trusted library allocation
page read and write
1BDB9FD3000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDC2B5C000
trusted library allocation
page read and write
E61000
unkown
page execute read
1BDAEF0C000
heap
page read and write
1BDB9EC2000
trusted library allocation
page read and write
1BDBC183000
trusted library allocation
page read and write
1BDAEF0D000
heap
page read and write
232A5A61000
trusted library allocation
page read and write
232A5A10000
trusted library allocation
page read and write
1BDB9E67000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDB9F62000
trusted library allocation
page read and write
232A67A8000
heap
page read and write
1BDBC13B000
trusted library allocation
page read and write
1BDB8DC4000
trusted library allocation
page read and write
1BDBBDFA000
trusted library allocation
page read and write
1BDBBF8F000
trusted library allocation
page read and write
1BDAEF0D000
heap
page read and write
1BDB8D69000
trusted library allocation
page read and write
1BDB78FD000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDB9745000
trusted library allocation
page read and write
1BDB81BE000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDB95F0000
trusted library allocation
page read and write
1BDBC257000
trusted library allocation
page read and write
1BDB9F4B000
trusted library allocation
page read and write
1BDB8D56000
trusted library allocation
page read and write
1BDC08E4000
trusted library allocation
page read and write
1BDB8D19000
trusted library allocation
page read and write
1BDB9F5A000
trusted library allocation
page read and write
1BDB7B9D000
heap
page read and write
232A6154000
heap
page read and write
1BDBC082000
trusted library allocation
page read and write
1620000
heap
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDBA29D000
trusted library allocation
page read and write
1BDB9EDD000
trusted library allocation
page read and write
1BDAEF29000
heap
page read and write
1BDB9860000
trusted library allocation
page read and write
1BDB53B2000
trusted library allocation
page read and write
1BDB4382000
trusted library allocation
page read and write
1BDB9785000
trusted library allocation
page read and write
1BDAEEC9000
heap
page read and write
1BDB9B37000
trusted library allocation
page read and write
1BDAEF2A000
heap
page read and write
1BDC17D2000
trusted library allocation
page read and write
3B4DD8000
stack
page read and write
1BDBBBAA000
trusted library allocation
page read and write
CE255FF000
stack
page read and write
1BDAEEC9000
heap
page read and write
1BDB902F000
trusted library allocation
page read and write
1BDB9E8F000
trusted library allocation
page read and write
1BDBBD6D000
trusted library allocation
page read and write
1BDB9ED8000
trusted library allocation
page read and write
1BDBC16B000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDAEED0000
heap
page read and write
1BDAEEB0000
heap
page read and write
3B42DE000
stack
page read and write
1BDB8D4A000
trusted library allocation
page read and write
1BDB9AFC000
trusted library allocation
page read and write
1BDC3F00000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
1BDBBF95000
trusted library allocation
page read and write
1BDB9EEE000
trusted library allocation
page read and write
1BDB9F62000
trusted library allocation
page read and write
1BDB8EF8000
trusted library allocation
page read and write
1BDBC078000
trusted library allocation
page read and write
1BDBD402000
trusted library allocation
page read and write
1BDB9F4B000
trusted library allocation
page read and write
CE23DFB000
stack
page read and write
1BDBADD1000
trusted library allocation
page read and write
1BDB9DA8000
trusted library allocation
page read and write
1BDAEED0000
heap
page read and write
1BDBBD53000
trusted library allocation
page read and write
1BDC0A74000
trusted library allocation
page read and write
1BDB9FAE000
trusted library allocation
page read and write
1BDB7B9A000
heap
page read and write
1BDC08D1000
trusted library allocation
page read and write
1580000
heap
page read and write
1BDB9796000
trusted library allocation
page read and write
1BDB9F68000
trusted library allocation
page read and write
1BDBC127000
trusted library allocation
page read and write
1BDB9F8E000
trusted library allocation
page read and write
1BDB9785000
trusted library allocation
page read and write
1BDC2B39000
heap
page read and write
232A6785000
heap
page read and write
1BDAEEBC000
heap
page read and write
1BDB538E000
trusted library allocation
page read and write
1BDC2BF0000
heap
page read and write
1BDB91BD000
trusted library allocation
page read and write
1BDB8D56000
trusted library allocation
page read and write
1BDBBD92000
trusted library allocation
page read and write
1BDB9DF2000
trusted library allocation
page read and write
1BDBC0F1000
trusted library allocation
page read and write
2064C396000
trusted library allocation
page read and write
1BDBC141000
trusted library allocation
page read and write
1BDC1A73000
trusted library allocation
page read and write
1BDBBDFB000
trusted library allocation
page read and write
1BDC294A000
trusted library allocation
page read and write
1BDC3B04000
trusted library allocation
page read and write
1BDB9591000
trusted library allocation
page read and write
1BDC06A2000
trusted library allocation
page read and write
2064C372000
trusted library allocation
page read and write
1BDAEF23000
heap
page read and write
147C3FF000
stack
page read and write
1BDBC267000
trusted library allocation
page read and write
1BDB8D9E000
trusted library allocation
page read and write
1BDBB8C8000
trusted library allocation
page read and write
1BDC29A0000
trusted library allocation
page read and write
1BDC2B4A000
heap
page read and write
1BDB9D54000
trusted library allocation
page read and write
1BDC0692000
trusted library allocation
page read and write
1BDBC0A8000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDB96E9000
trusted library allocation
page read and write
1BDBADCF000
trusted library allocation
page read and write
1BDB9BE6000
trusted library allocation
page read and write
1BDB91D1000
trusted library allocation
page read and write
1BDAEEDA000
heap
page read and write
1BDBA299000
trusted library allocation
page read and write
1BDAEF2A000
heap
page read and write
1BDC0A42000
trusted library allocation
page read and write
1BDAEEB5000
heap
page read and write
1BDC0AB1000
trusted library allocation
page read and write
1BDB78CD000
trusted library allocation
page read and write
1BDAEED1000
heap
page read and write
1BDC08E8000
trusted library allocation
page read and write
1BDBA2F9000
trusted library allocation
page read and write
1BDB5328000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDC077B000
trusted library allocation
page read and write
1BDAEEB6000
heap
page read and write
1BDAEEC0000
heap
page read and write
1BDB9A1D000
trusted library allocation
page read and write
1BDC17D7000
trusted library allocation
page read and write
1BDB78CD000
trusted library allocation
page read and write
1BDC0A63000
trusted library allocation
page read and write
1BDB9EDA000
trusted library allocation
page read and write
1BDB97C3000
trusted library allocation
page read and write
1BDB902A000
trusted library allocation
page read and write
1BDBA088000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDAEF0F000
heap
page read and write
1BDB7FC1000
trusted library allocation
page read and write
1BDBBBD9000
trusted library allocation
page read and write
1BDBBDB2000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDB9F54000
trusted library allocation
page read and write
1BDB9AEF000
trusted library allocation
page read and write
1BDAEEB6000
heap
page read and write
1C13A376000
trusted library allocation
page read and write
1BDB7B9D000
heap
page read and write
1BDC291C000
trusted library allocation
page read and write
1BDBBDA0000
trusted library allocation
page read and write
1BDBACB6000
trusted library allocation
page read and write
1BDBCBF9000
trusted library allocation
page read and write
1BDB9F4B000
trusted library allocation
page read and write
1BDBBBD9000
trusted library allocation
page read and write
1BDC08E2000
trusted library allocation
page read and write
1BDC08E4000
trusted library allocation
page read and write
1BDB8DC7000
trusted library allocation
page read and write
1BDB7B9E000
heap
page read and write
1BDB9ED1000
trusted library allocation
page read and write
1BDBBDCC000
trusted library allocation
page read and write
1BDBADCF000
trusted library allocation
page read and write
232A61D6000
heap
page read and write
1BDB79D0000
trusted library allocation
page read and write
1BDB902A000
trusted library allocation
page read and write
1BDB8D99000
trusted library allocation
page read and write
1BDB8D19000
trusted library allocation
page read and write
1BDB7999000
trusted library allocation
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDB9A05000
trusted library allocation
page read and write
1BDBBBCE000
trusted library allocation
page read and write
1BDC2B3F000
heap
page read and write
1BDAEF0C000
heap
page read and write
1BDB53AC000
trusted library allocation
page read and write
232A56C1000
remote allocation
page execute read
1BDB7B71000
heap
page read and write
1BDB8D30000
trusted library allocation
page read and write
1BDB8DC7000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDC1754000
trusted library allocation
page read and write
1BDBC2E8000
trusted library allocation
page read and write
1BDC176B000
trusted library allocation
page read and write
1BDAEEC0000
heap
page read and write
2064C36E000
trusted library allocation
page read and write
1BDB973B000
trusted library allocation
page read and write
1BDBC082000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDC2B34000
heap
page read and write
1BDAEEBC000
heap
page read and write
1BDB7BAE000
heap
page read and write
1BDB90F4000
trusted library allocation
page read and write
1BDB81CF000
trusted library allocation
page read and write
1BDC36E1000
trusted library allocation
page read and write
1BDB98EA000
trusted library allocation
page read and write
1BDB7999000
trusted library allocation
page read and write
1BDB9EF2000
trusted library allocation
page read and write
1BDBADA6000
trusted library allocation
page read and write
1BDC3AB1000
trusted library allocation
page read and write
1BDC08AC000
trusted library allocation
page read and write
1BDB9D39000
trusted library allocation
page read and write
1BDC1ABF000
trusted library allocation
page read and write
1BDBC0F1000
trusted library allocation
page read and write
1BDAEF0E000
heap
page read and write
1BDC0A61000
trusted library allocation
page read and write
1BDB9EE9000
trusted library allocation
page read and write
232A5ABA000
trusted library allocation
page read and write
1BDAEF0C000
heap
page read and write
1BDAEF0C000
heap
page read and write
1BDC1AC7000
trusted library allocation
page read and write
1BDB9EDD000
trusted library allocation
page read and write
1BDB9E76000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDBA877000
trusted library allocation
page read and write
1BDAEEEA000
heap
page read and write
1BDB85DD000
trusted library allocation
page read and write
1BDB79D0000
trusted library allocation
page read and write
1BDB9AB8000
trusted library allocation
page read and write
232A5A2F000
trusted library allocation
page read and write
1BDB54E5000
trusted library allocation
page read and write
818C3FE000
stack
page read and write
1BDB8D74000
trusted library allocation
page read and write
1BDB97FC000
trusted library allocation
page read and write
232A6150000
heap
page read and write
210A8B00000
trusted library allocation
page read and write
1BDB5682000
trusted library allocation
page read and write
1BDB9FA2000
trusted library allocation
page read and write
1BDB56BE000
trusted library allocation
page read and write
1BDB9F35000
trusted library allocation
page read and write
1BDB389E000
trusted library allocation
page read and write
1BDB9ABD000
trusted library allocation
page read and write
1BDBBA99000
trusted library allocation
page read and write
1BDB9F27000
trusted library allocation
page read and write
1BDAEF0D000
heap
page read and write
1BDB9A5A000
trusted library allocation
page read and write
1BDAEEAF000
heap
page read and write
1BDB9F57000
trusted library allocation
page read and write
1BDC1A35000
trusted library allocation
page read and write
1BDBCAFC000
trusted library allocation
page read and write
1BDB8D71000
trusted library allocation
page read and write
1BDB9DA8000
trusted library allocation
page read and write
1BDB9D87000
trusted library allocation
page read and write
1BDB79FA000
trusted library allocation
page read and write
1BDBBA9D000
trusted library allocation
page read and write
1BDBC04D000
trusted library allocation
page read and write
1BDC0AAD000
trusted library allocation
page read and write
1BDBBDD6000
trusted library allocation
page read and write
2064BD90000
remote allocation
page read and write
1BDB9F6D000
trusted library allocation
page read and write
1BDAEECE000
heap
page read and write
1BDB79A3000
trusted library allocation
page read and write
1BDB7BAF000
heap
page read and write
1BDB9A9B000
trusted library allocation
page read and write
1BDB9FB1000
trusted library allocation
page read and write
1BDBC141000
trusted library allocation
page read and write
1BDC2B34000
heap
page read and write
1BDAEECA000
heap
page read and write
1BDB9D37000
trusted library allocation
page read and write
1BDAEF1E000
heap
page read and write
1BDB9F70000
trusted library allocation
page read and write
1BDAEF15000
heap
page read and write
1BDB9775000
trusted library allocation
page read and write
1BDBBD20000
trusted library allocation
page read and write
1BDB569D000
trusted library allocation
page read and write
1BDAEED8000
heap
page read and write
1BDBA21A000
trusted library allocation
page read and write
1BDB9698000
trusted library allocation
page read and write
1BDAEF06000
heap
page read and write
1BDB9FB2000
trusted library allocation
page read and write
1BDC2B35000
heap
page read and write
1C13A330000
trusted library allocation
page read and write
1BDB8D8A000
trusted library allocation
page read and write
1BDB9ABB000
trusted library allocation
page read and write
1BDB9FF3000
trusted library allocation
page read and write
1BDB9018000
trusted library allocation
page read and write
1BDBC105000
trusted library allocation
page read and write
232A6153000
heap
page read and write
1BDB8DAC000
trusted library allocation
page read and write
1BDBB788000
trusted library allocation
page read and write
1BDB9D17000
trusted library allocation
page read and write
1BDB9F22000
trusted library allocation
page read and write
2064C41B000
trusted library allocation
page read and write
1BDB8139000
trusted library allocation
page read and write
1BDB4313000
trusted library allocation
page read and write
1BDAEEBE000
heap
page read and write
1BDB7BAE000
heap
page read and write
1BDC065D000
trusted library allocation
page read and write
1BDBCBFC000
trusted library allocation
page read and write
232A57C0000
heap
page read and write
1BDBA8F1000
trusted library allocation
page read and write
1BDB9E70000
trusted library allocation
page read and write
232A57CA000
heap
page read and write
1BDB85B2000
trusted library allocation
page read and write
1BDB900D000
trusted library allocation
page read and write
1BDB9EEE000
trusted library allocation
page read and write
1BDB42F6000
trusted library allocation
page read and write
7116EBE000
unkown
page readonly
1BDB9785000
trusted library allocation
page read and write
1BDAEEE1000
heap
page read and write
1BDB9743000
trusted library allocation
page read and write
1BDB9B40000
trusted library allocation
page read and write
1BDBC1F9000
trusted library allocation
page read and write
1BDB8568000
trusted library allocation
page read and write
1BDB8D85000
trusted library allocation
page read and write
1BDAEEC6000
heap
page read and write
1BDAEEE1000
heap
page read and write
1BDB79D3000
trusted library allocation
page read and write
1BDB973D000
trusted library allocation
page read and write
1BDC280D000
trusted library allocation
page read and write
1BDB7BAE000
heap
page read and write
1BDBC06A000
trusted library allocation
page read and write
1BDB9A3D000
trusted library allocation
page read and write
1BDC299B000
trusted library allocation
page read and write
1BDB43B3000
trusted library allocation
page read and write
1BDBB770000
trusted library allocation
page read and write
1BDAEF0E000
heap
page read and write
1BDAEF0F000
heap
page read and write
1BDB79A3000
trusted library allocation
page read and write
1BDB78BC000
trusted library allocation
page read and write
1BDBADBC000
trusted library allocation
page read and write
1BDB8DBE000
trusted library allocation
page read and write
1BDBAC73000
trusted library allocation
page read and write
1BDBC0B7000
trusted library allocation
page read and write
1BDC08C1000
trusted library allocation
page read and write
1BDB5614000
trusted library allocation
page read and write
1BDB5636000
trusted library allocation
page read and write
3B435E000
stack
page read and write
1BDBC068000
trusted library allocation
page read and write
164A000
heap
page read and write
1BDAEED1000
heap
page read and write
1BDBA2D7000
trusted library allocation
page read and write
1BDC1E44000
trusted library allocation
page read and write
1BDC2911000
trusted library allocation
page read and write
1BDBC07A000
trusted library allocation
page read and write
1BDB85F5000
trusted library allocation
page read and write
1BDAEEC7000
heap
page read and write
1BDB9FBB000
trusted library allocation
page read and write
1BDBC08E000
trusted library allocation
page read and write
1BDAEEC5000
heap
page read and write
There are 3860 hidden memdumps, click here to show them.