IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b361e58a-dc1e-4249-aca3-986e9eec1e50.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b361e58a-dc1e-4249-aca3-986e9eec1e50.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2248 -prefMapHandle 2240 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {681be74a-1bb9-45bf-a064-2568e5603787} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a056d310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -parentBuildID 20230927232528 -prefsHandle 3904 -prefMapHandle 3892 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8548365d-f205-4391-ba44-a87f283ec693} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197b276a710 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5124 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4732 -prefMapHandle 5108 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1499095d-2804-4cb1-b508-9ad3baa802c6} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a0574f10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://youtube.com/account?=htt==
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://www.olx.pl/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.253.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
172.217.18.14
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.78
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
151.101.1.91
services.addons.mozilla.org
United States
142.251.116.113
unknown
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
15CF000
heap
page read and write
malicious
15D6000
heap
page read and write
malicious
197B136D000
trusted library allocation
page read and write
21017158000
heap
page read and write
197B2D2C000
trusted library allocation
page read and write
197A7250000
heap
page read and write
3ED9E3E000
unkown
page readonly
197B898A000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B85DE000
trusted library allocation
page read and write
197B834D000
trusted library allocation
page read and write
197B1CE9000
trusted library allocation
page read and write
197BC09C000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B3BB0000
trusted library allocation
page read and write
21017179000
heap
page read and write
FA0000
unkown
page write copy
197ABCDF000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B01A5000
trusted library allocation
page read and write
21016578000
trusted library allocation
page read and write
197B1A62000
trusted library allocation
page read and write
197A728D000
heap
page read and write
197B1AE3000
trusted library allocation
page read and write
197B0DBA000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197BCF93000
trusted library allocation
page read and write
14D4000
heap
page read and write
197B89AD000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197AD4E8000
trusted library allocation
page read and write
197B8969000
trusted library allocation
page read and write
197B1CA7000
trusted library allocation
page read and write
197B9ED7000
trusted library allocation
page read and write
197A7275000
heap
page read and write
210170FD000
heap
page read and write
197A7265000
heap
page read and write
197A7267000
heap
page read and write
3ED7BDC000
stack
page read and write
197B8833000
trusted library allocation
page read and write
197B1CB1000
trusted library allocation
page read and write
197B1380000
trusted library allocation
page read and write
197A7262000
heap
page read and write
21017069000
heap
page read and write
197B88CD000
trusted library allocation
page read and write
197B3B61000
trusted library allocation
page read and write
23681C66000
trusted library allocation
page read and write
197B17F7000
trusted library allocation
page read and write
197B38F4000
trusted library allocation
page read and write
197B8F9D000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B851B000
trusted library allocation
page read and write
197B1721000
trusted library allocation
page read and write
197B8573000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197A7262000
heap
page read and write
197B0D9E000
trusted library allocation
page read and write
197B9C26000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197AFA9D000
trusted library allocation
page read and write
197B2DB2000
trusted library allocation
page read and write
197B8405000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B8950000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B38D1000
trusted library allocation
page read and write
197B177B000
trusted library allocation
page read and write
197B0D42000
trusted library allocation
page read and write
197BC043000
trusted library allocation
page read and write
197AD2F5000
trusted library allocation
page read and write
197B0D98000
trusted library allocation
page read and write
197B8FF6000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197BBA40000
trusted library allocation
page read and write
21017100000
heap
page read and write
197B0D3A000
trusted library allocation
page read and write
197BC7E9000
trusted library allocation
page read and write
26968C80000
heap
page read and write
197A7275000
heap
page read and write
197B15DC000
trusted library allocation
page read and write
197BBA9E000
trusted library allocation
page read and write
197A72A6000
heap
page read and write
197BC7E2000
trusted library allocation
page read and write
197B15B3000
trusted library allocation
page read and write
197B89CC000
trusted library allocation
page read and write
197B1B54000
trusted library allocation
page read and write
197B37E6000
trusted library allocation
page read and write
18B51050000
heap
page read and write
197B1A59000
trusted library allocation
page read and write
197B3BA0000
trusted library allocation
page read and write
197B1707000
trusted library allocation
page read and write
197B3EC9000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B0938000
trusted library allocation
page read and write
197B00F6000
trusted library allocation
page read and write
197AF98E000
trusted library allocation
page read and write
197B87E7000
trusted library allocation
page read and write
197B9F07000
trusted library allocation
page read and write
197B82C2000
trusted library allocation
page read and write
197AD571000
trusted library allocation
page read and write
197B3EB2000
trusted library allocation
page read and write
197B87F9000
trusted library allocation
page read and write
197BC9B6000
heap
page read and write
18B510CF000
heap
page read and write
197A7262000
heap
page read and write
197AC34E000
trusted library allocation
page read and write
197B0DED000
trusted library allocation
page read and write
197A725A000
heap
page read and write
197A726F000
heap
page read and write
197B1C40000
trusted library allocation
page read and write
2101655F000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197BC812000
trusted library allocation
page read and write
53F985B000
stack
page read and write
197B8F8F000
trusted library allocation
page read and write
197B2D77000
trusted library allocation
page read and write
197A7256000
heap
page read and write
197B0D9E000
trusted library allocation
page read and write
197B85FD000
trusted library allocation
page read and write
21017060000
heap
page read and write
197B1AA9000
trusted library allocation
page read and write
210165C2000
trusted library allocation
page read and write
197B0DC0000
trusted library allocation
page read and write
197B8973000
trusted library allocation
page read and write
197B00CF000
trusted library allocation
page read and write
197B1A60000
trusted library allocation
page read and write
197A72B3000
heap
page read and write
197B3708000
trusted library allocation
page read and write
197B1CEC000
trusted library allocation
page read and write
197BC821000
trusted library allocation
page read and write
3EDC83E000
stack
page read and write
197A7275000
heap
page read and write
197B2DCE000
trusted library allocation
page read and write
197B1B58000
trusted library allocation
page read and write
197AC3BC000
trusted library allocation
page read and write
197B86CB000
trusted library allocation
page read and write
3ED9EBB000
stack
page read and write
197B1CC1000
trusted library allocation
page read and write
197B1ACE000
trusted library allocation
page read and write
197AFD26000
heap
page read and write
197BC85D000
trusted library allocation
page read and write
197B09CD000
trusted library allocation
page read and write
210170E9000
heap
page read and write
197B0D22000
trusted library allocation
page read and write
197B28AA000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197A7265000
heap
page read and write
197B13D6000
trusted library allocation
page read and write
197B1A48000
trusted library allocation
page read and write
197B0982000
trusted library allocation
page read and write
197B9C2C000
trusted library allocation
page read and write
197B8487000
trusted library allocation
page read and write
197B17CA000
trusted library allocation
page read and write
197B1787000
trusted library allocation
page read and write
197B1C3E000
trusted library allocation
page read and write
197A72D5000
heap
page read and write
197A726E000
heap
page read and write
197AFD4D000
heap
page read and write
197B1B98000
trusted library allocation
page read and write
197B02D2000
trusted library allocation
page read and write
197B0930000
trusted library allocation
page read and write
197AD4D7000
trusted library allocation
page read and write
197B1AA1000
trusted library allocation
page read and write
2101716E000
heap
page read and write
3DC0000
heap
page read and write
197B3BF8000
trusted library allocation
page read and write
197B1BFE000
trusted library allocation
page read and write
197B1A99000
trusted library allocation
page read and write
197B05D9000
trusted library allocation
page read and write
197B86D8000
trusted library allocation
page read and write
197B176C000
trusted library allocation
page read and write
197BC2FD000
trusted library allocation
page read and write
197B17BA000
trusted library allocation
page read and write
197B9C2E000
trusted library allocation
page read and write
197B9648000
trusted library allocation
page read and write
197AD481000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B1489000
trusted library allocation
page read and write
197ABCEF000
trusted library allocation
page read and write
197BC09C000
trusted library allocation
page read and write
197B8848000
trusted library allocation
page read and write
197BC049000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B84E6000
trusted library allocation
page read and write
197B1C97000
trusted library allocation
page read and write
197B1CD7000
trusted library allocation
page read and write
2101704D000
heap
page read and write
197A7273000
heap
page read and write
197B1A9C000
trusted library allocation
page read and write
23681DD4000
heap
page read and write
197B1575000
trusted library allocation
page read and write
197A725F000
heap
page read and write
197B8698000
trusted library allocation
page read and write
197B1572000
trusted library allocation
page read and write
197B019E000
trusted library allocation
page read and write
197BC814000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B0CC2000
trusted library allocation
page read and write
197A726F000
heap
page read and write
197B1BFC000
trusted library allocation
page read and write
197B16CA000
trusted library allocation
page read and write
197A7262000
heap
page read and write
23681B00000
trusted library allocation
page read and write
197B0181000
trusted library allocation
page read and write
197B86E0000
trusted library allocation
page read and write
197B0039000
trusted library allocation
page read and write
197B86C2000
trusted library allocation
page read and write
21016567000
trusted library allocation
page read and write
21017069000
heap
page read and write
197B28E7000
trusted library allocation
page read and write
197B0904000
trusted library allocation
page read and write
197B17F7000
trusted library allocation
page read and write
197AD5A3000
trusted library allocation
page read and write
197AD2F4000
trusted library allocation
page read and write
197B1CF8000
trusted library allocation
page read and write
197B9C42000
trusted library allocation
page read and write
197B29F9000
trusted library allocation
page read and write
197BC08A000
trusted library allocation
page read and write
197B1BBD000
trusted library allocation
page read and write
197B9E87000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197AC271000
trusted library allocation
page read and write
23681CA2000
trusted library allocation
page read and write
21016060000
unclassified section
page readonly
197B1BBA000
trusted library allocation
page read and write
197B17DE000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B0074000
trusted library allocation
page read and write
15EE000
heap
page read and write
197B156B000
trusted library allocation
page read and write
197B86D5000
trusted library allocation
page read and write
197B82AD000
trusted library allocation
page read and write
1873BB0C000
trusted library allocation
page read and write
197AD28E000
trusted library allocation
page read and write
197B86E5000
trusted library allocation
page read and write
197B8300000
trusted library allocation
page read and write
21016A60000
heap
page read and write
197B1C2F000
trusted library allocation
page read and write
2101713B000
heap
page read and write
197BC2EA000
trusted library allocation
page read and write
197B1C97000
trusted library allocation
page read and write
197AFD2D000
heap
page read and write
197BCFAC000
trusted library allocation
page read and write
197B25BA000
trusted library allocation
page read and write
197B26B9000
trusted library allocation
page read and write
197AD4F9000
trusted library allocation
page read and write
197B008D000
trusted library allocation
page read and write
197B0D13000
trusted library allocation
page read and write
197B2990000
trusted library allocation
page read and write
197A7281000
heap
page read and write
197BC053000
trusted library allocation
page read and write
197B88C8000
trusted library allocation
page read and write
197BC7EE000
trusted library allocation
page read and write
197B1334000
trusted library allocation
page read and write
197B17FB000
trusted library allocation
page read and write
197B1A45000
trusted library allocation
page read and write
197B851B000
trusted library allocation
page read and write
197B26E3000
trusted library allocation
page read and write
197B1CCC000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B86DD000
trusted library allocation
page read and write
197B1C54000
trusted library allocation
page read and write
FA4000
unkown
page readonly
197B15B1000
trusted library allocation
page read and write
197B013B000
trusted library allocation
page read and write
197B132B000
trusted library allocation
page read and write
197B0D58000
trusted library allocation
page read and write
197BC901000
heap
page read and write
197AC3BC000
trusted library allocation
page read and write
1873B979000
trusted library allocation
page read and write
197B05F6000
trusted library allocation
page read and write
197B1C31000
trusted library allocation
page read and write
23681C5F000
trusted library allocation
page read and write
197AD494000
trusted library allocation
page read and write
197BC946000
heap
page read and write
2101716E000
heap
page read and write
197B1C20000
trusted library allocation
page read and write
197B1B9F000
trusted library allocation
page read and write
18B51455000
heap
page read and write
197A7262000
heap
page read and write
197AD4EF000
trusted library allocation
page read and write
F6C000
unkown
page readonly
1873B560000
unclassified section
page readonly
197B29D6000
trusted library allocation
page read and write
197B88FE000
trusted library allocation
page read and write
197B88F9000
trusted library allocation
page read and write
197B1AAE000
trusted library allocation
page read and write
197B88E7000
trusted library allocation
page read and write
197B9E81000
trusted library allocation
page read and write
197B9800000
trusted library allocation
page read and write
197B0092000
trusted library allocation
page read and write
197B84F9000
trusted library allocation
page read and write
197B0DBA000
trusted library allocation
page read and write
197B164C000
trusted library allocation
page read and write
197B00D6000
trusted library allocation
page read and write
197B86B9000
trusted library allocation
page read and write
197B18DE000
trusted library allocation
page read and write
197B285F000
trusted library allocation
page read and write
197A728D000
heap
page read and write
2101646C000
unkown
page execute read
197A726E000
heap
page read and write
197B1ABD000
trusted library allocation
page read and write
197B0D1F000
trusted library allocation
page read and write
197B87EA000
trusted library allocation
page read and write
197B82F9000
trusted library allocation
page read and write
197B1A9C000
trusted library allocation
page read and write
15EE000
heap
page read and write
197A72D5000
heap
page read and write
197B186E000
trusted library allocation
page read and write
197B0D58000
trusted library allocation
page read and write
197B13C3000
trusted library allocation
page read and write
197A728D000
heap
page read and write
197AF962000
trusted library allocation
page read and write
197B175B000
trusted library allocation
page read and write
197B1B83000
trusted library allocation
page read and write
197A72A1000
heap
page read and write
197A7262000
heap
page read and write
197B9612000
trusted library allocation
page read and write
197B029E000
trusted library allocation
page read and write
197B05A2000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B298C000
trusted library allocation
page read and write
197BC2CF000
trusted library allocation
page read and write
197B1CC9000
trusted library allocation
page read and write
197A7245000
heap
page read and write
197B96A8000
trusted library allocation
page read and write
197B2D9B000
trusted library allocation
page read and write
197AF9F0000
trusted library allocation
page read and write
197B1BDF000
trusted library allocation
page read and write
197B15B3000
trusted library allocation
page read and write
2101705C000
heap
page read and write
197BC95A000
heap
page read and write
197B1AA1000
trusted library allocation
page read and write
197A7249000
heap
page read and write
197B854B000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B89F8000
trusted library allocation
page read and write
197B1761000
trusted library allocation
page read and write
197B9CD4000
trusted library allocation
page read and write
197B1CCF000
trusted library allocation
page read and write
197B82FD000
trusted library allocation
page read and write
197BC2CF000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B14A3000
trusted library allocation
page read and write
197B3762000
trusted library allocation
page read and write
197B05EB000
trusted library allocation
page read and write
197AD5F6000
trusted library allocation
page read and write
197B29A6000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197AFD24000
heap
page read and write
1873B96E000
trusted library allocation
page read and write
197B014F000
trusted library allocation
page read and write
197B13A9000
trusted library allocation
page read and write
197A726A000
heap
page read and write
197AC31E000
trusted library allocation
page read and write
21017177000
heap
page read and write
197BC2B8000
trusted library allocation
page read and write
197B852E000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197A7264000
heap
page read and write
197B8830000
trusted library allocation
page read and write
99D21FE000
stack
page read and write
197A7265000
heap
page read and write
1873B5A0000
heap
page read and write
197B0065000
trusted library allocation
page read and write
197B1AEF000
trusted library allocation
page read and write
197B1CC1000
trusted library allocation
page read and write
197B39F3000
trusted library allocation
page read and write
197B13AC000
trusted library allocation
page read and write
197BC885000
trusted library allocation
page read and write
197B82B1000
trusted library allocation
page read and write
197B26E8000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B0956000
trusted library allocation
page read and write
197B18F1000
trusted library allocation
page read and write
197B386D000
trusted library allocation
page read and write
197BC008000
trusted library allocation
page read and write
197AF992000
trusted library allocation
page read and write
197B1AB6000
trusted library allocation
page read and write
197B8FBB000
trusted library allocation
page read and write
197B1BB8000
trusted library allocation
page read and write
197A7249000
heap
page read and write
197B388E000
trusted library allocation
page read and write
197B1AAE000
trusted library allocation
page read and write
197A72A8000
heap
page read and write
197A7254000
heap
page read and write
197B1664000
trusted library allocation
page read and write
197AD5F6000
trusted library allocation
page read and write
197BCF05000
trusted library allocation
page read and write
197B13D2000
trusted library allocation
page read and write
197B14E7000
trusted library allocation
page read and write
197B85FD000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
3ED9F3E000
unkown
page readonly
197A7270000
heap
page read and write
197A7269000
heap
page read and write
197A726F000
heap
page read and write
197B17F2000
trusted library allocation
page read and write
197BC901000
heap
page read and write
197B0087000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197B05E1000
trusted library allocation
page read and write
197B1588000
trusted library allocation
page read and write
197B02EE000
trusted library allocation
page read and write
197A725E000
heap
page read and write
197A7267000
heap
page read and write
197B1A48000
trusted library allocation
page read and write
197B3CE7000
trusted library allocation
page read and write
197B1355000
trusted library allocation
page read and write
197B017C000
trusted library allocation
page read and write
139B000
stack
page read and write
18B510BE000
heap
page read and write
197A7269000
heap
page read and write
197AD4F9000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197A726E000
heap
page read and write
197B86D8000
trusted library allocation
page read and write
197AD4E4000
trusted library allocation
page read and write
197AFD63000
heap
page read and write
197B1A99000
trusted library allocation
page read and write
197BC01D000
trusted library allocation
page read and write
197BC93E000
heap
page read and write
197B0D83000
trusted library allocation
page read and write
F9C000
unkown
page write copy
197A7269000
heap
page read and write
197A7250000
heap
page read and write
197B86CB000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B851B000
trusted library allocation
page read and write
197AC326000
trusted library allocation
page read and write
197B1702000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197B82CA000
trusted library allocation
page read and write
197AFD41000
heap
page read and write
197B14B5000
trusted library allocation
page read and write
197AC2F6000
trusted library allocation
page read and write
197BC8A7000
trusted library allocation
page read and write
197ABCA6000
trusted library allocation
page read and write
197B013B000
trusted library allocation
page read and write
197B0D52000
trusted library allocation
page read and write
2101716E000
heap
page read and write
197B02E9000
trusted library allocation
page read and write
197AF974000
trusted library allocation
page read and write
21017177000
heap
page read and write
E50000
heap
page read and write
197AD2EC000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197B1CB8000
trusted library allocation
page read and write
14D4000
heap
page read and write
197AD5E0000
trusted library allocation
page read and write
99D01D8000
stack
page read and write
197A7250000
heap
page read and write
197BC039000
trusted library allocation
page read and write
15B0000
heap
page read and write
197A72BA000
heap
page read and write
197BC171000
trusted library allocation
page read and write
197A7261000
heap
page read and write
197AFD3A000
heap
page read and write
18B510B0000
heap
page read and write
197B2DD8000
trusted library allocation
page read and write
197B9F0C000
trusted library allocation
page read and write
197A726F000
heap
page read and write
197B13A5000
trusted library allocation
page read and write
197A7271000
heap
page read and write
197B9C5D000
trusted library allocation
page read and write
197B17EB000
trusted library allocation
page read and write
197B8ED2000
trusted library allocation
page read and write
197B0D17000
trusted library allocation
page read and write
197AD23F000
trusted library allocation
page read and write
210170AA000
heap
page read and write
197B85AD000
trusted library allocation
page read and write
269688E8000
heap
page read and write
197A7262000
heap
page read and write
197B17CC000
trusted library allocation
page read and write
197B88FE000
trusted library allocation
page read and write
197B0930000
trusted library allocation
page read and write
15B8000
heap
page read and write
197B2992000
trusted library allocation
page read and write
21016F09000
trusted library allocation
page read and write
197B0D35000
trusted library allocation
page read and write
197B0D3A000
trusted library allocation
page read and write
197AFAC9000
trusted library allocation
page read and write
197B87D9000
trusted library allocation
page read and write
197B13C3000
trusted library allocation
page read and write
197AFD26000
heap
page read and write
197B1772000
trusted library allocation
page read and write
197B1C62000
trusted library allocation
page read and write
197BC1E4000
trusted library allocation
page read and write
197B1BD2000
trusted library allocation
page read and write
210162A0000
heap
page readonly
197B1C4E000
trusted library allocation
page read and write
197BC08A000
trusted library allocation
page read and write
197B1B98000
trusted library allocation
page read and write
197B1BBA000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197AF98B000
trusted library allocation
page read and write
197B84E9000
trusted library allocation
page read and write
197B02A3000
trusted library allocation
page read and write
197B1795000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197BC1D8000
trusted library allocation
page read and write
197B87C7000
trusted library allocation
page read and write
197B9664000
trusted library allocation
page read and write
197BC037000
trusted library allocation
page read and write
197B1AFA000
trusted library allocation
page read and write
197B37F2000
trusted library allocation
page read and write
197B1763000
trusted library allocation
page read and write
197B97EE000
trusted library allocation
page read and write
197B0550000
trusted library allocation
page read and write
197B1C65000
trusted library allocation
page read and write
197AFD24000
heap
page read and write
197B0945000
trusted library allocation
page read and write
197A725E000
heap
page read and write
197B288E000
trusted library allocation
page read and write
197B3E98000
trusted library allocation
page read and write
197A726A000
heap
page read and write
197B25F5000
trusted library allocation
page read and write
197B1C65000
trusted library allocation
page read and write
18B510D1000
heap
page read and write
197B97EE000
trusted library allocation
page read and write
197B38C8000
trusted library allocation
page read and write
210170EC000
heap
page read and write
197B1B37000
trusted library allocation
page read and write
197B154E000
trusted library allocation
page read and write
197A727B000
heap
page read and write
197AD52F000
trusted library allocation
page read and write
197A7281000
heap
page read and write
197B0266000
trusted library allocation
page read and write
197B85E3000
trusted library allocation
page read and write
197B0180000
trusted library allocation
page read and write
197B29D4000
trusted library allocation
page read and write
197B0297000
trusted library allocation
page read and write
197B9F86000
trusted library allocation
page read and write
197B29ED000
trusted library allocation
page read and write
197B3E4A000
trusted library allocation
page read and write
197B1A60000
trusted library allocation
page read and write
197B13A4000
trusted library allocation
page read and write
197BBAFA000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B05EB000
trusted library allocation
page read and write
3EC0000
trusted library allocation
page read and write
197B0DAA000
trusted library allocation
page read and write
197B0D35000
trusted library allocation
page read and write
197B8522000
trusted library allocation
page read and write
197B179C000
trusted library allocation
page read and write
18B5130A000
trusted library allocation
page read and write
197BC11F000
trusted library allocation
page read and write
197A725E000
heap
page read and write
197BC11F000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B1CFD000
trusted library allocation
page read and write
197B167B000
trusted library allocation
page read and write
197B1B42000
trusted library allocation
page read and write
197B2DB2000
trusted library allocation
page read and write
197B1CA7000
trusted library allocation
page read and write
210170E0000
heap
page read and write
197B0092000
trusted library allocation
page read and write
197A725B000
heap
page read and write
197AD4E8000
trusted library allocation
page read and write
197B13D2000
trusted library allocation
page read and write
197B89D9000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197B37DD000
trusted library allocation
page read and write
197AFA8D000
trusted library allocation
page read and write
197AFD26000
heap
page read and write
197A726E000
heap
page read and write
197B007F000
trusted library allocation
page read and write
197B8522000
trusted library allocation
page read and write
197B8FD2000
trusted library allocation
page read and write
197B17B2000
trusted library allocation
page read and write
197B1330000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B00D2000
trusted library allocation
page read and write
197B8549000
trusted library allocation
page read and write
197B02F9000
trusted library allocation
page read and write
197B1A92000
trusted library allocation
page read and write
197AF9E0000
trusted library allocation
page read and write
197B18FE000
trusted library allocation
page read and write
197B1B58000
trusted library allocation
page read and write
210170A8000
heap
page read and write
197B1C3E000
trusted library allocation
page read and write
197BC2D7000
trusted library allocation
page read and write
3ED9DFE000
unkown
page readonly
197B82E0000
trusted library allocation
page read and write
197BC2B8000
trusted library allocation
page read and write
197BC039000
trusted library allocation
page read and write
197B267E000
trusted library allocation
page read and write
197B1BBE000
trusted library allocation
page read and write
1873B620000
heap
page read and write
197B3BEF000
trusted library allocation
page read and write
197BC82E000
trusted library allocation
page read and write
197B3B66000
trusted library allocation
page read and write
197B02E4000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197B1CEC000
trusted library allocation
page read and write
197B1539000
trusted library allocation
page read and write
197B8EF2000
trusted library allocation
page read and write
15E2000
heap
page read and write
197B82CE000
trusted library allocation
page read and write
197BC034000
trusted library allocation
page read and write
197B17F2000
trusted library allocation
page read and write
197B1AEF000
trusted library allocation
page read and write
197B25D4000
trusted library allocation
page read and write
197A72B3000
heap
page read and write
197A7269000
heap
page read and write
197B09FC000
trusted library allocation
page read and write
197AF962000
trusted library allocation
page read and write
197B29FD000
trusted library allocation
page read and write
197AFAC2000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197AFD0C000
heap
page read and write
197B0DC0000
trusted library allocation
page read and write
197B1C62000
trusted library allocation
page read and write
197AFCFF000
heap
page read and write
197B9677000
trusted library allocation
page read and write
197B02B4000
trusted library allocation
page read and write
197A7254000
heap
page read and write
197AFD99000
heap
page read and write
197B3759000
trusted library allocation
page read and write
197AC3D6000
trusted library allocation
page read and write
197B8FD2000
trusted library allocation
page read and write
197B38B7000
trusted library allocation
page read and write
197B89E1000
trusted library allocation
page read and write
197B854B000
trusted library allocation
page read and write
197B1AFA000
trusted library allocation
page read and write
26968B07000
trusted library allocation
page read and write
197B267A000
trusted library allocation
page read and write
197B0D3A000
trusted library allocation
page read and write
197B14CD000
trusted library allocation
page read and write
197B02BA000
trusted library allocation
page read and write
197B017C000
trusted library allocation
page read and write
197B1C67000
trusted library allocation
page read and write
197B1479000
trusted library allocation
page read and write
197B29D2000
trusted library allocation
page read and write
197ABCBF000
trusted library allocation
page read and write
197BB402000
trusted library allocation
page read and write
197BC0FA000
trusted library allocation
page read and write
197BCF1C000
trusted library allocation
page read and write
197ABC84000
trusted library allocation
page read and write
197BC025000
trusted library allocation
page read and write
197B9FAC000
trusted library allocation
page read and write
15E0000
heap
page read and write
197B0D81000
trusted library allocation
page read and write
197B3749000
trusted library allocation
page read and write
197B1C9D000
trusted library allocation
page read and write
197B8FC5000
trusted library allocation
page read and write
197A72D6000
heap
page read and write
197B02EE000
trusted library allocation
page read and write
197B3BA8000
trusted library allocation
page read and write
197B84DF000
trusted library allocation
page read and write
23681C8F000
trusted library allocation
page read and write
197AFD6A000
heap
page read and write
197B028E000
trusted library allocation
page read and write
1873B981000
trusted library allocation
page read and write
197A72A8000
heap
page read and write
197B133A000
trusted library allocation
page read and write
197B9689000
trusted library allocation
page read and write
197A7273000
heap
page read and write
138F000
stack
page read and write
197B299A000
trusted library allocation
page read and write
197BC1DB000
trusted library allocation
page read and write
197B1A93000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B1C79000
trusted library allocation
page read and write
3EDC03E000
unkown
page readonly
197B14CC000
trusted library allocation
page read and write
197BC7C0000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197AFA87000
trusted library allocation
page read and write
197B8FEC000
trusted library allocation
page read and write
197AF998000
trusted library allocation
page read and write
197B0283000
trusted library allocation
page read and write
197A72A6000
heap
page read and write
21017177000
heap
page read and write
197B1B9D000
trusted library allocation
page read and write
197A726E000
heap
page read and write
2101709C000
heap
page read and write
197B897F000
trusted library allocation
page read and write
197B0291000
trusted library allocation
page read and write
197BC8A7000
trusted library allocation
page read and write
197B9CF2000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B02F3000
trusted library allocation
page read and write
197B87B0000
trusted library allocation
page read and write
197B3853000
trusted library allocation
page read and write
197AC375000
trusted library allocation
page read and write
197B8F8F000
trusted library allocation
page read and write
197AF939000
trusted library allocation
page read and write
197AC37F000
trusted library allocation
page read and write
197B1CEE000
trusted library allocation
page read and write
197A7252000
heap
page read and write
197A7250000
heap
page read and write
197B1CF8000
trusted library allocation
page read and write
197AF998000
trusted library allocation
page read and write
F92000
unkown
page readonly
197B1CC9000
trusted library allocation
page read and write
197B02DF000
trusted library allocation
page read and write
197B137C000
trusted library allocation
page read and write
1873B610000
heap
page readonly
197B8935000
trusted library allocation
page read and write
210170E1000
heap
page read and write
29F1F61E000
trusted library allocation
page read and write
197B84E6000
trusted library allocation
page read and write
197BC14C000
trusted library allocation
page read and write
197BBAE3000
trusted library allocation
page read and write
197BC1D6000
trusted library allocation
page read and write
197B1A9C000
trusted library allocation
page read and write
197B0945000
trusted library allocation
page read and write
197B09DB000
trusted library allocation
page read and write
197BC95B000
heap
page read and write
197A726E000
heap
page read and write
197AD435000
trusted library allocation
page read and write
197AD40D000
trusted library allocation
page read and write
197AD5A3000
trusted library allocation
page read and write
197BC0CD000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197BBAFA000
trusted library allocation
page read and write
197B1B83000
trusted library allocation
page read and write
197B84DD000
trusted library allocation
page read and write
197AD4E8000
trusted library allocation
page read and write
197B1BAE000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B8EF8000
trusted library allocation
page read and write
197BC027000
trusted library allocation
page read and write
197BC2E1000
trusted library allocation
page read and write
197A7261000
heap
page read and write
197A7251000
heap
page read and write
197BC7CB000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197AD492000
trusted library allocation
page read and write
197B01CE000
trusted library allocation
page read and write
197B9EAE000
trusted library allocation
page read and write
197B1CBA000
trusted library allocation
page read and write
197B1592000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197A7250000
heap
page read and write
197BC058000
trusted library allocation
page read and write
197BA001000
trusted library allocation
page read and write
197BB200000
trusted library allocation
page read and write
197B15F9000
trusted library allocation
page read and write
197AFA69000
trusted library allocation
page read and write
197B1C51000
trusted library allocation
page read and write
197BC01D000
trusted library allocation
page read and write
197A7262000
heap
page read and write
14D4000
heap
page read and write
197A7261000
heap
page read and write
197B1CD3000
trusted library allocation
page read and write
197AFCFF000
heap
page read and write
197B3793000
trusted library allocation
page read and write
197B28AA000
trusted library allocation
page read and write
197AC37D000
trusted library allocation
page read and write
197B17F7000
trusted library allocation
page read and write
197B289D000
trusted library allocation
page read and write
197B1518000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197A7252000
heap
page read and write
197B833C000
trusted library allocation
page read and write
197B88FE000
trusted library allocation
page read and write
197B1BF8000
trusted library allocation
page read and write
197B02D9000
trusted library allocation
page read and write
197B86EB000
trusted library allocation
page read and write
197B894E000
trusted library allocation
page read and write
197B298A000
trusted library allocation
page read and write
197AD2DC000
trusted library allocation
page read and write
197B0147000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197A726D000
heap
page read and write
197A7275000
heap
page read and write
197B8334000
trusted library allocation
page read and write
197B2D20000
trusted library allocation
page read and write
197B8893000
trusted library allocation
page read and write
197B178F000
trusted library allocation
page read and write
197A7258000
heap
page read and write
197A7252000
heap
page read and write
197AFA8D000
trusted library allocation
page read and write
1873BC00000
heap
page read and write
197B154A000
trusted library allocation
page read and write
197B134F000
trusted library allocation
page read and write
197B3BA8000
trusted library allocation
page read and write
197B0D31000
trusted library allocation
page read and write
197A72A8000
heap
page read and write
197B3ED6000
trusted library allocation
page read and write
197BC2A5000
trusted library allocation
page read and write
197BC7EB000
trusted library allocation
page read and write
197B26F8000
trusted library allocation
page read and write
197B1668000
trusted library allocation
page read and write
197B8549000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B1C4B000
trusted library allocation
page read and write
197B058C000
trusted library allocation
page read and write
197B8484000
trusted library allocation
page read and write
197B831E000
trusted library allocation
page read and write
197B1C49000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B1BDB000
trusted library allocation
page read and write
197B1CF3000
trusted library allocation
page read and write
197BC935000
heap
page read and write
197B17D6000
trusted library allocation
page read and write
197B16E8000
trusted library allocation
page read and write
197B8FBB000
trusted library allocation
page read and write
197B1592000
trusted library allocation
page read and write
197B094C000
trusted library allocation
page read and write
197AFD0C000
heap
page read and write
197B02EE000
trusted library allocation
page read and write
197B0CB5000
trusted library allocation
page read and write
197B0D22000
trusted library allocation
page read and write
197B02EE000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197B37E1000
trusted library allocation
page read and write
197B96D3000
trusted library allocation
page read and write
197B1BC4000
trusted library allocation
page read and write
197A7281000
heap
page read and write
197B3E9A000
trusted library allocation
page read and write
197B0D5C000
trusted library allocation
page read and write
197B0992000
trusted library allocation
page read and write
197B0DE9000
trusted library allocation
page read and write
23681CF6000
trusted library allocation
page read and write
197B1AEF000
trusted library allocation
page read and write
197B8EF2000
trusted library allocation
page read and write
197B82CA000
trusted library allocation
page read and write
197B0D35000
trusted library allocation
page read and write
197B86C4000
trusted library allocation
page read and write
197B96C9000
trusted library allocation
page read and write
197B007B000
trusted library allocation
page read and write
197B1B92000
trusted library allocation
page read and write
197B18F1000
trusted library allocation
page read and write
197B137A000
trusted library allocation
page read and write
197B007B000
trusted library allocation
page read and write
197B0D80000
trusted library allocation
page read and write
197B0284000
trusted library allocation
page read and write
197A7267000
heap
page read and write
13AF000
stack
page read and write
197B38F4000
trusted library allocation
page read and write
197B97F5000
trusted library allocation
page read and write
197B01CE000
trusted library allocation
page read and write
197B9E45000
trusted library allocation
page read and write
197B88AB000
trusted library allocation
page read and write
197A7279000
heap
page read and write
197B287F000
trusted library allocation
page read and write
197BA926000
trusted library allocation
page read and write
197B1B56000
trusted library allocation
page read and write
197B269A000
trusted library allocation
page read and write
197B01CE000
trusted library allocation
page read and write
197AD2D3000
trusted library allocation
page read and write
197B88B2000
trusted library allocation
page read and write
197B1C9D000
trusted library allocation
page read and write
197A7241000
heap
page read and write
197A7261000
heap
page read and write
197A726F000
heap
page read and write
53FCC3E000
unkown
page readonly
197B0D35000
trusted library allocation
page read and write
197B1683000
trusted library allocation
page read and write
197B008D000
trusted library allocation
page read and write
197B1BD7000
trusted library allocation
page read and write
197B84A9000
trusted library allocation
page read and write
197B15A5000
trusted library allocation
page read and write
197B0D35000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197BC826000
trusted library allocation
page read and write
197B14FC000
trusted library allocation
page read and write
197A72C7000
heap
page read and write
197A7281000
heap
page read and write
1873B550000
unclassified section
page readonly
197B97FA000
trusted library allocation
page read and write
197B966C000
trusted library allocation
page read and write
15E2000
heap
page read and write
197B135F000
trusted library allocation
page read and write
197B854E000
trusted library allocation
page read and write
197A72A1000
heap
page read and write
197B3E4A000
trusted library allocation
page read and write
197ABC98000
trusted library allocation
page read and write
197B09F9000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B39A5000
trusted library allocation
page read and write
197B29CD000
trusted library allocation
page read and write
22D0000
heap
page read and write
197B18DB000
trusted library allocation
page read and write
197B007E000
trusted library allocation
page read and write
197B0062000
trusted library allocation
page read and write
197B87FB000
trusted library allocation
page read and write
23681C82000
trusted library allocation
page read and write
197BC901000
heap
page read and write
ED0000
unkown
page readonly
197B17F7000
trusted library allocation
page read and write
197BCF50000
trusted library allocation
page read and write
197AFA90000
trusted library allocation
page read and write
197B0D3A000
trusted library allocation
page read and write
197BA947000
trusted library allocation
page read and write
197B1C97000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197A726A000
heap
page read and write
197B1AA4000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197AD4AB000
trusted library allocation
page read and write
197B188C000
trusted library allocation
page read and write
14D4000
heap
page read and write
197BCF67000
trusted library allocation
page read and write
197B1C49000
trusted library allocation
page read and write
197B1C67000
trusted library allocation
page read and write
197B15DC000
trusted library allocation
page read and write
197B1C2A000
trusted library allocation
page read and write
197B1C2A000
trusted library allocation
page read and write
197B9640000
trusted library allocation
page read and write
197B9CC2000
trusted library allocation
page read and write
197B3EA6000
trusted library allocation
page read and write
197B960A000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197A7261000
heap
page read and write
197B092B000
trusted library allocation
page read and write
197B17F4000
trusted library allocation
page read and write
197B83A4000
trusted library allocation
page read and write
197B1680000
trusted library allocation
page read and write
197B8964000
trusted library allocation
page read and write
197BC2F3000
trusted library allocation
page read and write
197BB16D000
trusted library allocation
page read and write
197A726F000
heap
page read and write
197B02C0000
trusted library allocation
page read and write
197A7265000
heap
page read and write
14D4000
heap
page read and write
197B3718000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B13F3000
trusted library allocation
page read and write
197AFD02000
heap
page read and write
18B52C1B000
heap
page read and write
21017060000
heap
page read and write
34AAA061000
trusted library allocation
page execute read
197B37D9000
trusted library allocation
page read and write
197A7261000
heap
page read and write
197B0953000
trusted library allocation
page read and write
197B16E2000
trusted library allocation
page read and write
197B163E000
trusted library allocation
page read and write
197B1A49000
trusted library allocation
page read and write
197B855A000
trusted library allocation
page read and write
197B1589000
trusted library allocation
page read and write
197B12EC000
trusted library allocation
page read and write
197AFAA9000
trusted library allocation
page read and write
21017009000
heap
page read and write
197B0283000
trusted library allocation
page read and write
197B0092000
trusted library allocation
page read and write
197B1AEF000
trusted library allocation
page read and write
197AFD3A000
heap
page read and write
197B1C80000
trusted library allocation
page read and write
197B1355000
trusted library allocation
page read and write
21017159000
heap
page read and write
197B05EB000
trusted library allocation
page read and write
197B29D1000
trusted library allocation
page read and write
197B84D6000
trusted library allocation
page read and write
197B84B0000
trusted library allocation
page read and write
197B84B2000
trusted library allocation
page read and write
197B381E000
trusted library allocation
page read and write
197B1740000
trusted library allocation
page read and write
197B1A89000
trusted library allocation
page read and write
197B83B5000
trusted library allocation
page read and write
197BC85A000
trusted library allocation
page read and write
197B13B3000
trusted library allocation
page read and write
197B2990000
trusted library allocation
page read and write
197B1C52000
trusted library allocation
page read and write
197B05DD000
trusted library allocation
page read and write
197B28B4000
trusted library allocation
page read and write
197B3883000
trusted library allocation
page read and write
1873B740000
heap
page read and write
197AFD99000
heap
page read and write
197A7251000
heap
page read and write
197B299F000
trusted library allocation
page read and write
2101712A000
heap
page read and write
197B1BFE000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197AF962000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B1C67000
trusted library allocation
page read and write
197B8FA6000
trusted library allocation
page read and write
197B17DE000
trusted library allocation
page read and write
1873B9AB000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B1896000
trusted library allocation
page read and write
21016A82000
heap
page read and write
197B1C2C000
trusted library allocation
page read and write
197AFD3A000
heap
page read and write
197B89D4000
trusted library allocation
page read and write
197B1B54000
trusted library allocation
page read and write
197BC945000
heap
page read and write
197A7279000
heap
page read and write
197A726B000
heap
page read and write
197BC00E000
trusted library allocation
page read and write
197B0DC8000
trusted library allocation
page read and write
197B16AC000
trusted library allocation
page read and write
197B13EF000
trusted library allocation
page read and write
197B1AE3000
trusted library allocation
page read and write
197BC027000
trusted library allocation
page read and write
197B0039000
trusted library allocation
page read and write
197B8F8F000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
197B12E9000
trusted library allocation
page read and write
197B84E6000
trusted library allocation
page read and write
197B1C79000
trusted library allocation
page read and write
197B145D000
trusted library allocation
page read and write
197AFD1B000
heap
page read and write
197B0D43000
trusted library allocation
page read and write
99CF6CD000
stack
page read and write
197B16E4000
trusted library allocation
page read and write
197BC2F3000
trusted library allocation
page read and write
197B8529000
trusted library allocation
page read and write
197B1BFC000
trusted library allocation
page read and write
197B1A9C000
trusted library allocation
page read and write
197B1C88000
trusted library allocation
page read and write
197A7252000
heap
page read and write
197B1A9C000
trusted library allocation
page read and write
197B9CF5000
trusted library allocation
page read and write
197BC2FD000
trusted library allocation
page read and write
197A7254000
heap
page read and write
197A72B3000
heap
page read and write
197B896E000
trusted library allocation
page read and write
197B9743000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197BC00E000
trusted library allocation
page read and write
3EC0000
trusted library allocation
page read and write
197B17F2000
trusted library allocation
page read and write
197B89E6000
trusted library allocation
page read and write
197AD494000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197AFA7C000
trusted library allocation
page read and write
197A7269000
heap
page read and write
F92000
unkown
page readonly
197B3BFD000
trusted library allocation
page read and write
197BA948000
trusted library allocation
page read and write
197B867B000
trusted library allocation
page read and write
197AF9ED000
trusted library allocation
page read and write
197B0C79000
trusted library allocation
page read and write
99D31FE000
stack
page read and write
197B0D23000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B17D6000
trusted library allocation
page read and write
197B0945000
trusted library allocation
page read and write
197B89EB000
trusted library allocation
page read and write
197B17D6000
trusted library allocation
page read and write
197B8FA6000
trusted library allocation
page read and write
197B017C000
trusted library allocation
page read and write
197BBA57000
trusted library allocation
page read and write
197B17A8000
trusted library allocation
page read and write
197B17FE000
trusted library allocation
page read and write
197B89EB000
trusted library allocation
page read and write
197B86E5000
trusted library allocation
page read and write
197B1A56000
trusted library allocation
page read and write
197A72A1000
heap
page read and write
197B89CA000
trusted library allocation
page read and write
197A7275000
heap
page read and write
269688F1000
heap
page read and write
197B1BA8000
trusted library allocation
page read and write
197B84C0000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197AC3B1000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
1DAE000
stack
page read and write
197B1534000
trusted library allocation
page read and write
197AC382000
trusted library allocation
page read and write
197B1A56000
trusted library allocation
page read and write
197B86C2000
trusted library allocation
page read and write
1873B9E9000
trusted library allocation
page read and write
197BC7EB000
trusted library allocation
page read and write
197B86D5000
trusted library allocation
page read and write
197B84AC000
trusted library allocation
page read and write
197AF962000
trusted library allocation
page read and write
197AD492000
trusted library allocation
page read and write
197B0D3A000
trusted library allocation
page read and write
197BC04C000
trusted library allocation
page read and write
197AD481000
trusted library allocation
page read and write
269688E0000
heap
page read and write
197A726E000
heap
page read and write
1873B4D3000
heap
page read and write
197AFD21000
heap
page read and write
197B1CB1000
trusted library allocation
page read and write
197B0C85000
trusted library allocation
page read and write
1873B90D000
trusted library allocation
page read and write
15DD000
heap
page read and write
197B8994000
trusted library allocation
page read and write
197B1380000
trusted library allocation
page read and write
197B1C0D000
trusted library allocation
page read and write
197B83A4000
trusted library allocation
page read and write
197B02CB000
trusted library allocation
page read and write
197BC126000
trusted library allocation
page read and write
197B17DE000
trusted library allocation
page read and write
197B9FE4000
trusted library allocation
page read and write
197B14AB000
trusted library allocation
page read and write
21017177000
heap
page read and write
197A7269000
heap
page read and write
197B88F9000
trusted library allocation
page read and write
197B189D000
trusted library allocation
page read and write
197B02E6000
trusted library allocation
page read and write
197BC1E2000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B8839000
trusted library allocation
page read and write
197B1B49000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B89D4000
trusted library allocation
page read and write
197B1CBA000
trusted library allocation
page read and write
197B84CB000
trusted library allocation
page read and write
197BB1CE000
trusted library allocation
page read and write
197B26C6000
trusted library allocation
page read and write
197B1A4D000
trusted library allocation
page read and write
197B0950000
trusted library allocation
page read and write
197B2DBC000
trusted library allocation
page read and write
197B37E6000
trusted library allocation
page read and write
197BC16F000
trusted library allocation
page read and write
197B0C95000
trusted library allocation
page read and write
197B1CFD000
trusted library allocation
page read and write
197B1CC1000
trusted library allocation
page read and write
197B2D1C000
trusted library allocation
page read and write
197B0DD1000
trusted library allocation
page read and write
210170F2000
heap
page read and write
197B166B000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B8EF8000
trusted library allocation
page read and write
21017122000
heap
page read and write
197B17B2000
trusted library allocation
page read and write
197B3BED000
trusted library allocation
page read and write
197B0D52000
trusted library allocation
page read and write
197B37F6000
trusted library allocation
page read and write
197B1BD7000
trusted library allocation
page read and write
197B38FC000
trusted library allocation
page read and write
3ED95FE000
stack
page read and write
197B1AE6000
trusted library allocation
page read and write
197ABCEF000
trusted library allocation
page read and write
197AFD26000
heap
page read and write
197B8964000
trusted library allocation
page read and write
197B1BCF000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197A726E000
heap
page read and write
197BC053000
trusted library allocation
page read and write
197B8FF1000
trusted library allocation
page read and write
197B18EE000
trusted library allocation
page read and write
21017158000
heap
page read and write
197A7269000
heap
page read and write
197A7280000
heap
page read and write
197A726C000
heap
page read and write
197AFD99000
heap
page read and write
197B134F000
trusted library allocation
page read and write
197B1340000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197AF94C000
trusted library allocation
page read and write
197B0920000
trusted library allocation
page read and write
197B8381000
trusted library allocation
page read and write
197B39C8000
trusted library allocation
page read and write
197B86D9000
trusted library allocation
page read and write
21017121000
heap
page read and write
210170E3000
heap
page read and write
197B4623000
trusted library allocation
page read and write
197B0237000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B1A81000
trusted library allocation
page read and write
197BC010000
trusted library allocation
page read and write
197B9EC8000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197A72A8000
heap
page read and write
197B17F9000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B0DE9000
trusted library allocation
page read and write
197B29D6000
trusted library allocation
page read and write
197AD434000
trusted library allocation
page read and write
197B8390000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B1899000
trusted library allocation
page read and write
197B13B0000
trusted library allocation
page read and write
197B1A4D000
trusted library allocation
page read and write
197AD56B000
trusted library allocation
page read and write
197B16F5000
trusted library allocation
page read and write
197B0DA7000
trusted library allocation
page read and write
197BC053000
trusted library allocation
page read and write
197B1566000
trusted library allocation
page read and write
197B132B000
trusted library allocation
page read and write
197AF99E000
trusted library allocation
page read and write
23681C62000
trusted library allocation
page read and write
197BC02A000
trusted library allocation
page read and write
23681F00000
trusted library allocation
page read and write
197B1B98000
trusted library allocation
page read and write
197A7259000
heap
page read and write
197AFACF000
trusted library allocation
page read and write
197B133E000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B1BE7000
trusted library allocation
page read and write
197B29D4000
trusted library allocation
page read and write
197BC960000
heap
page read and write
21016100000
heap
page read and write
197B1A9C000
trusted library allocation
page read and write
197B16CA000
trusted library allocation
page read and write
197B02E2000
trusted library allocation
page read and write
197B9E27000
trusted library allocation
page read and write
197B16F5000
trusted library allocation
page read and write
197B8FE6000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B01CE000
trusted library allocation
page read and write
197A726A000
heap
page read and write
21017060000
heap
page read and write
197B1BDF000
trusted library allocation
page read and write
19A0003F000
trusted library allocation
page read and write
197B896E000
trusted library allocation
page read and write
197B9CE7000
trusted library allocation
page read and write
197AC344000
trusted library allocation
page read and write
197A7254000
heap
page read and write
197B9CFD000
trusted library allocation
page read and write
197A7260000
heap
page read and write
197BC8A7000
trusted library allocation
page read and write
197B894C000
trusted library allocation
page read and write
197B8973000
trusted library allocation
page read and write
197B82DA000
trusted library allocation
page read and write
197B896B000
trusted library allocation
page read and write
210162C2000
unclassified section
page read and write
197B155E000
trusted library allocation
page read and write
197AF98B000
trusted library allocation
page read and write
197B0D83000
trusted library allocation
page read and write
197B1553000
trusted library allocation
page read and write
23681CB6000
trusted library allocation
page read and write
197BBA9F000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197A7262000
heap
page read and write
197A726E000
heap
page read and write
197AFF00000
trusted library allocation
page read and write
197A726A000
heap
page read and write
197B1C39000
trusted library allocation
page read and write
197BA033000
trusted library allocation
page read and write
197B17D6000
trusted library allocation
page read and write
197B96AC000
trusted library allocation
page read and write
1873B967000
trusted library allocation
page read and write
197B14A3000
trusted library allocation
page read and write
197B389F000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197B0DB8000
trusted library allocation
page read and write
197BC1E4000
trusted library allocation
page read and write
197B1AE6000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197A7280000
heap
page read and write
18B510A0000
heap
page read and write
197B1AB6000
trusted library allocation
page read and write
23681C1B000
trusted library allocation
page read and write
197B86E3000
trusted library allocation
page read and write
197B17D4000
trusted library allocation
page read and write
197B006D000
trusted library allocation
page read and write
197B17FB000
trusted library allocation
page read and write
197B132B000
trusted library allocation
page read and write
18B51450000
heap
page read and write
197B01A5000
trusted library allocation
page read and write
197B0DE3000
trusted library allocation
page read and write
197B1A6B000
trusted library allocation
page read and write
197B1B44000
trusted library allocation
page read and write
197B87B7000
trusted library allocation
page read and write
197B17E3000
trusted library allocation
page read and write
197AF963000
trusted library allocation
page read and write
197AD569000
trusted library allocation
page read and write
197B8342000
trusted library allocation
page read and write
197B002F000
trusted library allocation
page read and write
197B0181000
trusted library allocation
page read and write
197A7269000
heap
page read and write
ED1000
unkown
page execute read
197A726E000
heap
page read and write
197B2656000
trusted library allocation
page read and write
197B3834000
trusted library allocation
page read and write
197B02F3000
trusted library allocation
page read and write
197B3B5F000
trusted library allocation
page read and write
197A72A8000
heap
page read and write
197B3E82000
trusted library allocation
page read and write
197B1777000
trusted library allocation
page read and write
197B1CDF000
trusted library allocation
page read and write
197B1C3A000
trusted library allocation
page read and write
197B1CDF000
trusted library allocation
page read and write
197B1668000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B29F9000
trusted library allocation
page read and write
197B0963000
trusted library allocation
page read and write
197B1BC4000
trusted library allocation
page read and write
197B1792000
trusted library allocation
page read and write
197B3860000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B0949000
trusted library allocation
page read and write
197BC143000
trusted library allocation
page read and write
197A728D000
heap
page read and write
210165C7000
trusted library allocation
page read and write
197B1BAE000
trusted library allocation
page read and write
197B17F9000
trusted library allocation
page read and write
197B87E2000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197A726E000
heap
page read and write
197AC22F000
trusted library allocation
page read and write
197B15A3000
trusted library allocation
page read and write
197B0D5F000
trusted library allocation
page read and write
197AFD26000
heap
page read and write
197AF995000
trusted library allocation
page read and write
1873BB1D000
trusted library allocation
page read and write
197BC077000
trusted library allocation
page read and write
197B967E000
trusted library allocation
page read and write
197B1467000
trusted library allocation
page read and write
197B1492000
trusted library allocation
page read and write
197B1CF0000
trusted library allocation
page read and write
18B510A7000
heap
page read and write
197A7266000
heap
page read and write
197B3BED000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B13B9000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197B0D0D000
trusted library allocation
page read and write
197BC023000
trusted library allocation
page read and write
197B3CD5000
trusted library allocation
page read and write
197B8374000
trusted library allocation
page read and write
197AD5F6000
trusted library allocation
page read and write
26968870000
heap
page read and write
197B17CA000
trusted library allocation
page read and write
197B0277000
trusted library allocation
page read and write
197B88E5000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
197B3BED000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197A725E000
heap
page read and write
197AFD3A000
heap
page read and write
197B0518000
trusted library allocation
page read and write
26968840000
heap
page read and write
197BC02A000
trusted library allocation
page read and write
197B15D5000
trusted library allocation
page read and write
210170E6000
heap
page read and write
197B1C65000
trusted library allocation
page read and write
197B02BA000
trusted library allocation
page read and write
197B1A93000
trusted library allocation
page read and write
197B82DA000
trusted library allocation
page read and write
23681C30000
trusted library allocation
page read and write
197BC04C000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197AFA8A000
trusted library allocation
page read and write
197AD4D7000
trusted library allocation
page read and write
197B8FE6000
trusted library allocation
page read and write
197B8FB5000
trusted library allocation
page read and write
197B96CC000
trusted library allocation
page read and write
197A725E000
heap
page read and write
197B82D2000
trusted library allocation
page read and write
197B87E5000
trusted library allocation
page read and write
197B1C5B000
trusted library allocation
page read and write
197AC313000
trusted library allocation
page read and write
197B1C0D000
trusted library allocation
page read and write
197AD56D000
trusted library allocation
page read and write
197B0D15000
trusted library allocation
page read and write
197B299A000
trusted library allocation
page read and write
197B17C2000
trusted library allocation
page read and write
197B05FB000
trusted library allocation
page read and write
197B1C44000
trusted library allocation
page read and write
197AD4E4000
trusted library allocation
page read and write
197B1479000
trusted library allocation
page read and write
197B1454000
trusted library allocation
page read and write
197B8558000
trusted library allocation
page read and write
197B1C97000
trusted library allocation
page read and write
197B39ED000
trusted library allocation
page read and write
197B1BF8000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197BC87F000
trusted library allocation
page read and write
197AFD3F000
heap
page read and write
6F12FFE000
stack
page read and write
197B01CE000
trusted library allocation
page read and write
197A725A000
heap
page read and write
210170E6000
heap
page read and write
197A726E000
heap
page read and write
197AFD1B000
heap
page read and write
197B1772000
trusted library allocation
page read and write
197B1A4D000
trusted library allocation
page read and write
197B02EA000
trusted library allocation
page read and write
197B02A4000
trusted library allocation
page read and write
197B1649000
trusted library allocation
page read and write
197B86E8000
trusted library allocation
page read and write
197B14A1000
trusted library allocation
page read and write
197B3867000
trusted library allocation
page read and write
197B38F6000
trusted library allocation
page read and write
197B38B6000
trusted library allocation
page read and write
197B1CC9000
trusted library allocation
page read and write
197AFD3F000
heap
page read and write
197A7245000
heap
page read and write
197AC271000
trusted library allocation
page read and write
21016180000
heap
page read and write
197B269F000
trusted library allocation
page read and write
197B1CE8000
trusted library allocation
page read and write
197AF9ED000
trusted library allocation
page read and write
197B02D2000
trusted library allocation
page read and write
197B1CAF000
trusted library allocation
page read and write
197B1BE7000
trusted library allocation
page read and write
197B396C000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B0DC3000
trusted library allocation
page read and write
197BC150000
trusted library allocation
page read and write
197BB000000
trusted library allocation
page read and write
197A7261000
heap
page read and write
23681A83000
heap
page read and write
197BC01D000
trusted library allocation
page read and write
197B84A5000
trusted library allocation
page read and write
210170F1000
heap
page read and write
197BC826000
trusted library allocation
page read and write
197B18DB000
trusted library allocation
page read and write
197AD5A3000
trusted library allocation
page read and write
197B1BBA000
trusted library allocation
page read and write
23681AD0000
heap
page readonly
99CF78E000
unkown
page readonly
197B2654000
trusted library allocation
page read and write
197B018D000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B00D6000
trusted library allocation
page read and write
197B1BD8000
trusted library allocation
page read and write
197B166B000
trusted library allocation
page read and write
197B9695000
trusted library allocation
page read and write
197B83CC000
trusted library allocation
page read and write
197B9CC0000
trusted library allocation
page read and write
21016548000
trusted library allocation
page read and write
197A7234000
heap
page read and write
197A72A8000
heap
page read and write
197B85B8000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B854B000
trusted library allocation
page read and write
197B897F000
trusted library allocation
page read and write
21016545000
trusted library allocation
page read and write
1873BA14000
heap
page read and write
197AD538000
trusted library allocation
page read and write
197B187F000
trusted library allocation
page read and write
197B0D22000
trusted library allocation
page read and write
197B2647000
trusted library allocation
page read and write
1873BB1F000
trusted library allocation
page read and write
197B29F9000
trusted library allocation
page read and write
197B0C8E000
trusted library allocation
page read and write
197BB1F1000
trusted library allocation
page read and write
197B1A66000
trusted library allocation
page read and write
197B84DF000
trusted library allocation
page read and write
197AFD3F000
heap
page read and write
197B0DB8000
trusted library allocation
page read and write
1873BB32000
trusted library allocation
page read and write
197B17A0000
trusted library allocation
page read and write
197AFA3D000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
197AD439000
trusted library allocation
page read and write
197BC027000
trusted library allocation
page read and write
197B96A8000
trusted library allocation
page read and write
197B0D35000
trusted library allocation
page read and write
197B86CF000
trusted library allocation
page read and write
197A7238000
heap
page read and write
197B14C7000
trusted library allocation
page read and write
197BBACD000
trusted library allocation
page read and write
197B84C4000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B3814000
trusted library allocation
page read and write
197B02F5000
trusted library allocation
page read and write
3EDB83E000
stack
page read and write
197B84D6000
trusted library allocation
page read and write
197B0D1D000
trusted library allocation
page read and write
210170F1000
heap
page read and write
197AF9ED000
trusted library allocation
page read and write
197B1C23000
trusted library allocation
page read and write
197BC053000
trusted library allocation
page read and write
197B82FD000
trusted library allocation
page read and write
197B87EA000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197AF9EF000
trusted library allocation
page read and write
197BC873000
trusted library allocation
page read and write
197B1C97000
trusted library allocation
page read and write
197A72D2000
heap
page read and write
197AFA14000
trusted library allocation
page read and write
197B85C1000
trusted library allocation
page read and write
197B1A5B000
trusted library allocation
page read and write
197A725E000
heap
page read and write
197B84C4000
trusted library allocation
page read and write
197B1BFC000
trusted library allocation
page read and write
6F10FFE000
stack
page read and write
197BC008000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197A72A8000
heap
page read and write
197B96CC000
trusted library allocation
page read and write
197B1BBA000
trusted library allocation
page read and write
197B853A000
trusted library allocation
page read and write
197B1BFC000
trusted library allocation
page read and write
197B1B83000
trusted library allocation
page read and write
197AD5F6000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197A7251000
heap
page read and write
197B1C97000
trusted library allocation
page read and write
197B1ABD000
trusted library allocation
page read and write
197B1B92000
trusted library allocation
page read and write
197B1BDF000
trusted library allocation
page read and write
210170E3000
heap
page read and write
197B2DF0000
trusted library allocation
page read and write
197AD566000
trusted library allocation
page read and write
197B8532000
trusted library allocation
page read and write
197A7281000
heap
page read and write
197B1371000
trusted library allocation
page read and write
197BC15A000
trusted library allocation
page read and write
197B0D43000
trusted library allocation
page read and write
197B17F9000
trusted library allocation
page read and write
197B2D93000
trusted library allocation
page read and write
197B145D000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
197B8FCD000
trusted library allocation
page read and write
197AD4EA000
trusted library allocation
page read and write
23681CC4000
trusted library allocation
page read and write
1873BB07000
trusted library allocation
page read and write
14D4000
heap
page read and write
197B37BB000
trusted library allocation
page read and write
197B14CA000
trusted library allocation
page read and write
197AD48A000
trusted library allocation
page read and write
197B011F000
trusted library allocation
page read and write
197B85D5000
trusted library allocation
page read and write
197B84E9000
trusted library allocation
page read and write
197B019E000
trusted library allocation
page read and write
197B82AF000
trusted library allocation
page read and write
197B025C000
trusted library allocation
page read and write
197B1AB6000
trusted library allocation
page read and write
197B1512000
trusted library allocation
page read and write
197B1A56000
trusted library allocation
page read and write
197B89B5000
trusted library allocation
page read and write
197B8444000
trusted library allocation
page read and write
197B86C4000
trusted library allocation
page read and write
197B862C000
trusted library allocation
page read and write
197AFD49000
heap
page read and write
197A7267000
heap
page read and write
197BCF37000
trusted library allocation
page read and write
197A7262000
heap
page read and write
21017000000
heap
page read and write
197B17F9000
trusted library allocation
page read and write
197B014F000
trusted library allocation
page read and write
197B17F9000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197AC375000
trusted library allocation
page read and write
197B02F5000
trusted library allocation
page read and write
197B1581000
trusted library allocation
page read and write
197BC2DA000
trusted library allocation
page read and write
6F137FF000
stack
page read and write
197B1CC9000
trusted library allocation
page read and write
197B15A7000
trusted library allocation
page read and write
197BC96E000
heap
page read and write
197B05BA000
trusted library allocation
page read and write
197B17C7000
trusted library allocation
page read and write
197B9695000
trusted library allocation
page read and write
197B285F000
trusted library allocation
page read and write
13BE000
stack
page read and write
197B1C97000
trusted library allocation
page read and write
210170B9000
heap
page read and write
197B0D42000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197AD59F000
trusted library allocation
page read and write
197BC80D000
trusted library allocation
page read and write
197A727B000
heap
page read and write
197A7262000
heap
page read and write
197B88E5000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B0DA7000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B9E06000
trusted library allocation
page read and write
210170EC000
heap
page read and write
197A7274000
heap
page read and write
197B1C62000
trusted library allocation
page read and write
197B1CEC000
trusted library allocation
page read and write
197B832D000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B02FB000
trusted library allocation
page read and write
197B8994000
trusted library allocation
page read and write
197B1BC4000
trusted library allocation
page read and write
197B1C4C000
trusted library allocation
page read and write
197B0247000
trusted library allocation
page read and write
197B26A2000
trusted library allocation
page read and write
197B13BF000
trusted library allocation
page read and write
197B9657000
trusted library allocation
page read and write
197B1AA4000
trusted library allocation
page read and write
197B8324000
trusted library allocation
page read and write
53F999E000
unkown
page readonly
21016494000
heap
page read and write
197B0969000
trusted library allocation
page read and write
197B0907000
trusted library allocation
page read and write
197B29D4000
trusted library allocation
page read and write
197B17FB000
trusted library allocation
page read and write
197B1870000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197A726F000
heap
page read and write
197A724A000
heap
page read and write
197B1AB6000
trusted library allocation
page read and write
197B023B000
trusted library allocation
page read and write
197B8423000
trusted library allocation
page read and write
2101712A000
heap
page read and write
197BC058000
trusted library allocation
page read and write
197B9E2C000
trusted library allocation
page read and write
2101706C000
heap
page read and write
197B9CB9000
trusted library allocation
page read and write
197B1A38000
trusted library allocation
page read and write
197B2D77000
trusted library allocation
page read and write
197B85DE000
trusted library allocation
page read and write
197B0907000
trusted library allocation
page read and write
197BC037000
trusted library allocation
page read and write
236818E0000
remote allocation
page read and write
197B1BFE000
trusted library allocation
page read and write
197B1AF9000
trusted library allocation
page read and write
197B1A60000
trusted library allocation
page read and write
197B1A9C000
trusted library allocation
page read and write
197B1A6B000
trusted library allocation
page read and write
197B84DD000
trusted library allocation
page read and write
197B0924000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B84C1000
trusted library allocation
page read and write
197B1BAE000
trusted library allocation
page read and write
197B88E7000
trusted library allocation
page read and write
1873BA16000
heap
page read and write
197AC400000
trusted library allocation
page read and write
197AF97A000
trusted library allocation
page read and write
23681AE2000
unclassified section
page read and write
197B38FC000
trusted library allocation
page read and write
197B1C51000
trusted library allocation
page read and write
197B14CC000
trusted library allocation
page read and write
1873B923000
trusted library allocation
page read and write
197B85E3000
trusted library allocation
page read and write
197B1B88000
trusted library allocation
page read and write
197B82C2000
trusted library allocation
page read and write
197AF933000
trusted library allocation
page read and write
23681AE0000
unclassified section
page read and write
197B17F7000
trusted library allocation
page read and write
197B1A56000
trusted library allocation
page read and write
197B17BA000
trusted library allocation
page read and write
197B0DA4000
trusted library allocation
page read and write
197B3E71000
trusted library allocation
page read and write
197B1481000
trusted library allocation
page read and write
26968B00000
trusted library allocation
page read and write
197BB680000
trusted library allocation
page read and write
197B82C6000
trusted library allocation
page read and write
197B0183000
trusted library allocation
page read and write
197B3B6C000
trusted library allocation
page read and write
197B8573000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B0CB8000
trusted library allocation
page read and write
197ABCEF000
trusted library allocation
page read and write
197B14FC000
trusted library allocation
page read and write
21017069000
heap
page read and write
6F107FA000
stack
page read and write
2101707D000
heap
page read and write
197B1B9F000
trusted library allocation
page read and write
21016120000
heap
page read and write
2101708D000
heap
page read and write
53FB3FE000
stack
page read and write
197BC181000
trusted library allocation
page read and write
197BC213000
trusted library allocation
page read and write
197B1AE5000
trusted library allocation
page read and write
21017144000
heap
page read and write
2101708A000
heap
page read and write
197B3BEF000
trusted library allocation
page read and write
197AD4B8000
trusted library allocation
page read and write
21016490000
heap
page read and write
197B88E5000
trusted library allocation
page read and write
197AC3F9000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197A724A000
heap
page read and write
197A7265000
heap
page read and write
197AD413000
trusted library allocation
page read and write
197B1BF7000
trusted library allocation
page read and write
197B1B23000
trusted library allocation
page read and write
197B023D000
trusted library allocation
page read and write
197B13D6000
trusted library allocation
page read and write
197B0081000
trusted library allocation
page read and write
197AFD76000
heap
page read and write
197B1ADE000
trusted library allocation
page read and write
197B1680000
trusted library allocation
page read and write
197B2DE3000
trusted library allocation
page read and write
99CF74E000
stack
page read and write
197B139E000
trusted library allocation
page read and write
197BC09C000
trusted library allocation
page read and write
197A72C7000
heap
page read and write
197BC0CD000
trusted library allocation
page read and write
197B12DB000
trusted library allocation
page read and write
197AD56D000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B1C33000
trusted library allocation
page read and write
197B1CFD000
trusted library allocation
page read and write
197A7281000
heap
page read and write
197BC1DB000
trusted library allocation
page read and write
197B1C3E000
trusted library allocation
page read and write
197BC88F000
trusted library allocation
page read and write
3EDAFBE000
unkown
page readonly
197B268B000
trusted library allocation
page read and write
197AFCFE000
heap
page read and write
197A72D5000
heap
page read and write
197BC08F000
trusted library allocation
page read and write
197B84C8000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197A72C7000
heap
page read and write
23681DD6000
heap
page read and write
197B88E7000
trusted library allocation
page read and write
197A7261000
heap
page read and write
197B17DE000
trusted library allocation
page read and write
197B89B0000
trusted library allocation
page read and write
197B0155000
trusted library allocation
page read and write
197B1C50000
trusted library allocation
page read and write
197B8547000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197B02D2000
trusted library allocation
page read and write
197B17ED000
trusted library allocation
page read and write
197B1C3E000
trusted library allocation
page read and write
197B9680000
trusted library allocation
page read and write
197B02F9000
trusted library allocation
page read and write
23681C6B000
trusted library allocation
page read and write
197A7249000
heap
page read and write
197A7262000
heap
page read and write
197A726E000
heap
page read and write
197BC94C000
heap
page read and write
197BC1D6000
trusted library allocation
page read and write
197B16E4000
trusted library allocation
page read and write
197AF9EF000
trusted library allocation
page read and write
197AD439000
trusted library allocation
page read and write
197B0DDF000
trusted library allocation
page read and write
197BC1BA000
trusted library allocation
page read and write
B6D2FFE000
stack
page read and write
197A7267000
heap
page read and write
197AD4B8000
trusted library allocation
page read and write
197B15AA000
trusted library allocation
page read and write
197AC31B000
trusted library allocation
page read and write
197A728D000
heap
page read and write
197AFD3F000
heap
page read and write
197B1B9D000
trusted library allocation
page read and write
197B896B000
trusted library allocation
page read and write
197B3BA8000
trusted library allocation
page read and write
197AFD0D000
heap
page read and write
197B84B2000
trusted library allocation
page read and write
23681C18000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B87F4000
trusted library allocation
page read and write
197A7281000
heap
page read and write
197B85FD000
trusted library allocation
page read and write
197B8FE2000
trusted library allocation
page read and write
197BC1B4000
trusted library allocation
page read and write
197A726B000
heap
page read and write
197B171F000
trusted library allocation
page read and write
197AFD3F000
heap
page read and write
197A7259000
heap
page read and write
197B02C0000
trusted library allocation
page read and write
197B0D17000
trusted library allocation
page read and write
197AD4B8000
trusted library allocation
page read and write
197B14A3000
trusted library allocation
page read and write
197B018D000
trusted library allocation
page read and write
197BC901000
heap
page read and write
197B187A000
trusted library allocation
page read and write
197B8FEC000
trusted library allocation
page read and write
197AFD24000
heap
page read and write
197A7275000
heap
page read and write
197B88C8000
trusted library allocation
page read and write
197AC354000
trusted library allocation
page read and write
197B9CD4000
trusted library allocation
page read and write
197A724F000
heap
page read and write
197B1380000
trusted library allocation
page read and write
197A72A1000
heap
page read and write
197B1B58000
trusted library allocation
page read and write
197B1896000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197A72A6000
heap
page read and write
197B02F9000
trusted library allocation
page read and write
210170E8000
heap
page read and write
197B1CED000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B01CE000
trusted library allocation
page read and write
197AF962000
trusted library allocation
page read and write
197B179C000
trusted library allocation
page read and write
197B84D4000
trusted library allocation
page read and write
197B02E7000
trusted library allocation
page read and write
197BC15A000
trusted library allocation
page read and write
197BC2F3000
trusted library allocation
page read and write
197B14D2000
trusted library allocation
page read and write
197B9611000
trusted library allocation
page read and write
197BBB00000
trusted library allocation
page read and write
197AFA63000
trusted library allocation
page read and write
197B02D0000
trusted library allocation
page read and write
197B16E2000
trusted library allocation
page read and write
197AC2FB000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B1BC5000
trusted library allocation
page read and write
15DF000
heap
page read and write
197BA02E000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197A7250000
heap
page read and write
197BC820000
trusted library allocation
page read and write
197B019E000
trusted library allocation
page read and write
197B175D000
trusted library allocation
page read and write
197BC187000
trusted library allocation
page read and write
197B8E41000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B16E4000
trusted library allocation
page read and write
197B1A69000
trusted library allocation
page read and write
197A7259000
heap
page read and write
197AD4D7000
trusted library allocation
page read and write
21016140000
heap
page read and write
197B0DE3000
trusted library allocation
page read and write
21016400000
trusted library section
page readonly
197B1AB6000
trusted library allocation
page read and write
197B872C000
trusted library allocation
page read and write
197B1774000
trusted library allocation
page read and write
26968760000
heap
page read and write
1873B730000
unclassified section
page read and write
197B25C4000
trusted library allocation
page read and write
197B8978000
trusted library allocation
page read and write
197B165B000
trusted library allocation
page read and write
197B17CC000
trusted library allocation
page read and write
197AD413000
trusted library allocation
page read and write
197B2D2E000
trusted library allocation
page read and write
197B9C26000
trusted library allocation
page read and write
197B3B9B000
trusted library allocation
page read and write
197B2D3E000
trusted library allocation
page read and write
197B02E4000
trusted library allocation
page read and write
210160DB000
remote allocation
page execute read
197BC84C000
trusted library allocation
page read and write
197B157F000
trusted library allocation
page read and write
197BC80D000
trusted library allocation
page read and write
197B1346000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B25B1000
trusted library allocation
page read and write
197B1CD4000
trusted library allocation
page read and write
197B1C49000
trusted library allocation
page read and write
197AD47D000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B0034000
trusted library allocation
page read and write
197A7270000
heap
page read and write
197A7251000
heap
page read and write
197B1CA2000
trusted library allocation
page read and write
197B96A8000
trusted library allocation
page read and write
197B37AF000
trusted library allocation
page read and write
197B0DBA000
trusted library allocation
page read and write
1873B760000
unclassified section
page readonly
197B37E1000
trusted library allocation
page read and write
197B1CC9000
trusted library allocation
page read and write
197B097C000
trusted library allocation
page read and write
197BC7BC000
trusted library allocation
page read and write
197BC7CB000
trusted library allocation
page read and write
197B84B6000
trusted library allocation
page read and write
197B1A64000
trusted library allocation
page read and write
197B02E7000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197AF9E7000
trusted library allocation
page read and write
197B86E3000
trusted library allocation
page read and write
197AFD2D000
heap
page read and write
197A724A000
heap
page read and write
197A7250000
heap
page read and write
197A7269000
heap
page read and write
210165E9000
trusted library allocation
page read and write
197B84C4000
trusted library allocation
page read and write
197B02E4000
trusted library allocation
page read and write
197BC7ED000
trusted library allocation
page read and write
1873BB00000
trusted library allocation
page read and write
197B0966000
trusted library allocation
page read and write
197AF9A4000
trusted library allocation
page read and write
197B3838000
trusted library allocation
page read and write
14D4000
heap
page read and write
197BB12F000
trusted library allocation
page read and write
197BC2EA000
trusted library allocation
page read and write
23681D20000
unclassified section
page readonly
197BC0C8000
trusted library allocation
page read and write
197B1CC1000
trusted library allocation
page read and write
210170E0000
heap
page read and write
236818FC000
remote allocation
page execute read
197AF9DC000
trusted library allocation
page read and write
197B86BA000
trusted library allocation
page read and write
197B0911000
trusted library allocation
page read and write
18B51307000
trusted library allocation
page read and write
197B1C39000
trusted library allocation
page read and write
197B025A000
trusted library allocation
page read and write
197B855E000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B16D1000
trusted library allocation
page read and write
1873B994000
trusted library allocation
page read and write
197B17E3000
trusted library allocation
page read and write
197B13C2000
trusted library allocation
page read and write
197B15A3000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B3BA9000
trusted library allocation
page read and write
197AC3BA000
trusted library allocation
page read and write
197B1A4D000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197B1896000
trusted library allocation
page read and write
197A72D6000
heap
page read and write
197B1C2A000
trusted library allocation
page read and write
197B135F000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B84CA000
trusted library allocation
page read and write
197AFD0D000
heap
page read and write
197B26D4000
trusted library allocation
page read and write
23681CB2000
trusted library allocation
page read and write
197BA92E000
trusted library allocation
page read and write
197B3741000
trusted library allocation
page read and write
197B2699000
trusted library allocation
page read and write
197B0D8A000
trusted library allocation
page read and write
197B0D35000
trusted library allocation
page read and write
197BC7D7000
trusted library allocation
page read and write
197B14CE000
trusted library allocation
page read and write
197B1572000
trusted library allocation
page read and write
197B013C000
trusted library allocation
page read and write
197A726A000
heap
page read and write
197B017C000
trusted library allocation
page read and write
197B13D8000
trusted library allocation
page read and write
197B1B9D000
trusted library allocation
page read and write
197B17F7000
trusted library allocation
page read and write
197B84A5000
trusted library allocation
page read and write
197B9C8C000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B1C94000
trusted library allocation
page read and write
197B1BA4000
trusted library allocation
page read and write
197B09E2000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B1AF9000
trusted library allocation
page read and write
197A7262000
heap
page read and write
21016300000
trusted library allocation
page read and write
197B89F8000
trusted library allocation
page read and write
197A7256000
heap
page read and write
197B960A000
trusted library allocation
page read and write
197B0954000
trusted library allocation
page read and write
197AD4E8000
trusted library allocation
page read and write
197B84A3000
trusted library allocation
page read and write
197B167B000
trusted library allocation
page read and write
197AD21B000
trusted library allocation
page read and write
3ED9EB8000
stack
page read and write
197B1A93000
trusted library allocation
page read and write
2101706C000
heap
page read and write
197BBAEE000
trusted library allocation
page read and write
197BC010000
trusted library allocation
page read and write
197B9FC5000
trusted library allocation
page read and write
6F11FFE000
stack
page read and write
197B13EE000
trusted library allocation
page read and write
197BC0B2000
trusted library allocation
page read and write
197AF9EF000
trusted library allocation
page read and write
197A726C000
heap
page read and write
197A7275000
heap
page read and write
197A7269000
heap
page read and write
99D19FE000
unkown
page readonly
197B2A00000
trusted library allocation
page read and write
197B14EC000
trusted library allocation
page read and write
23681C49000
trusted library allocation
page read and write
197AC3AD000
trusted library allocation
page read and write
197B88AA000
trusted library allocation
page read and write
197B1CC9000
trusted library allocation
page read and write
197B1C50000
trusted library allocation
page read and write
197B87E7000
trusted library allocation
page read and write
197B1A62000
trusted library allocation
page read and write
197B8EF8000
trusted library allocation
page read and write
197B0911000
trusted library allocation
page read and write
23681870000
unclassified section
page readonly
210170A1000
heap
page read and write
197B2DA9000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B0933000
trusted library allocation
page read and write
197A728D000
heap
page read and write
197B1BA8000
trusted library allocation
page read and write
197BC053000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197A724A000
heap
page read and write
197B8663000
trusted library allocation
page read and write
197BC8D5000
trusted library allocation
page read and write
197B1BA8000
trusted library allocation
page read and write
197A727B000
heap
page read and write
197BC0E3000
trusted library allocation
page read and write
E9D000
stack
page read and write
197B05DF000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197A724A000
heap
page read and write
197B0D3A000
trusted library allocation
page read and write
197B3BCD000
trusted library allocation
page read and write
197B026F000
trusted library allocation
page read and write
21016450000
trusted library allocation
page read and write
197B1740000
trusted library allocation
page read and write
197B1B9D000
trusted library allocation
page read and write
197B8996000
trusted library allocation
page read and write
197A7251000
heap
page read and write
23681F03000
trusted library allocation
page read and write
197AD417000
trusted library allocation
page read and write
197AD4D9000
trusted library allocation
page read and write
197B3713000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B17A0000
trusted library allocation
page read and write
197AFD1E000
heap
page read and write
197B8FC5000
trusted library allocation
page read and write
197B17C5000
trusted library allocation
page read and write
197B29E1000
trusted library allocation
page read and write
197B0065000
trusted library allocation
page read and write
197B39E2000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B37D9000
trusted library allocation
page read and write
197B13EE000
trusted library allocation
page read and write
197A7249000
heap
page read and write
2101707F000
heap
page read and write
197B0911000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197A7245000
heap
page read and write
23681C05000
trusted library allocation
page read and write
197B29A6000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197A7262000
heap
page read and write
197A7261000
heap
page read and write
197BA02C000
trusted library allocation
page read and write
197B028B000
trusted library allocation
page read and write
197B9CC1000
trusted library allocation
page read and write
197B1ABC000
trusted library allocation
page read and write
197B1B9D000
trusted library allocation
page read and write
197B0CDE000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B1C4B000
trusted library allocation
page read and write
197B88E7000
trusted library allocation
page read and write
197B8885000
trusted library allocation
page read and write
197B1BAE000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B13D2000
trusted library allocation
page read and write
197B1A99000
trusted library allocation
page read and write
197B1A93000
trusted library allocation
page read and write
197B16BA000
trusted library allocation
page read and write
197B8730000
trusted library allocation
page read and write
197B0964000
trusted library allocation
page read and write
34AAA046000
trusted library allocation
page execute read
197B1C4B000
trusted library allocation
page read and write
197B0938000
trusted library allocation
page read and write
197ABCB3000
trusted library allocation
page read and write
197B094C000
trusted library allocation
page read and write
197B17BA000
trusted library allocation
page read and write
197B1A83000
trusted library allocation
page read and write
197BC7DD000
trusted library allocation
page read and write
197BC130000
trusted library allocation
page read and write
197AC37D000
trusted library allocation
page read and write
197B88B7000
trusted library allocation
page read and write
197B0277000
trusted library allocation
page read and write
197AFD49000
heap
page read and write
197B84B5000
trusted library allocation
page read and write
1873B97B000
trusted library allocation
page read and write
197B02B7000
trusted library allocation
page read and write
197B837D000
trusted library allocation
page read and write
197BC885000
trusted library allocation
page read and write
197B29E9000
trusted library allocation
page read and write
197BC812000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197AD5DE000
trusted library allocation
page read and write
53FBBFE000
unkown
page readonly
197AD626000
trusted library allocation
page read and write
197B2988000
trusted library allocation
page read and write
197B1C2A000
trusted library allocation
page read and write
197B2DF0000
trusted library allocation
page read and write
197B1BAE000
trusted library allocation
page read and write
21016564000
trusted library allocation
page read and write
197B29CF000
trusted library allocation
page read and write
197AFD3D000
heap
page read and write
197B97E5000
trusted library allocation
page read and write
197AFD22000
heap
page read and write
197AD5EB000
trusted library allocation
page read and write
197B1BA8000
trusted library allocation
page read and write
197B2DFD000
trusted library allocation
page read and write
197B1BBE000
trusted library allocation
page read and write
197ABCC0000
trusted library allocation
page read and write
197B8547000
trusted library allocation
page read and write
197AD531000
trusted library allocation
page read and write
B6D1FFC000
stack
page read and write
197B97E7000
trusted library allocation
page read and write
197B1334000
trusted library allocation
page read and write
210164A0000
unkown
page execute read
197B96A8000
trusted library allocation
page read and write
210170F1000
heap
page read and write
15D2000
heap
page read and write
22A0000
heap
page read and write
197B17FB000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197AF972000
trusted library allocation
page read and write
197AD4E4000
trusted library allocation
page read and write
197B1C31000
trusted library allocation
page read and write
197AC318000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197AFA98000
trusted library allocation
page read and write
21016070000
unclassified section
page readonly
197A7269000
heap
page read and write
197B019E000
trusted library allocation
page read and write
197B185F000
trusted library allocation
page read and write
197AD480000
trusted library allocation
page read and write
197B17F9000
trusted library allocation
page read and write
197B0104000
trusted library allocation
page read and write
197B865C000
trusted library allocation
page read and write
197B87DC000
trusted library allocation
page read and write
197AD4E8000
trusted library allocation
page read and write
197B3956000
trusted library allocation
page read and write
197B84D6000
trusted library allocation
page read and write
197B09BD000
trusted library allocation
page read and write
197B84C0000
trusted library allocation
page read and write
197B84C0000
trusted library allocation
page read and write
197BC988000
heap
page read and write
197B02EE000
trusted library allocation
page read and write
197AC3AD000
trusted library allocation
page read and write
197B2DE0000
trusted library allocation
page read and write
197B85C8000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B8978000
trusted library allocation
page read and write
18B52C00000
heap
page read and write
197B1D00000
trusted library allocation
page read and write
197AC326000
trusted library allocation
page read and write
197B1C4B000
trusted library allocation
page read and write
197AD5D8000
trusted library allocation
page read and write
197B0074000
trusted library allocation
page read and write
21017144000
heap
page read and write
197B3BF8000
trusted library allocation
page read and write
197B1C49000
trusted library allocation
page read and write
197B179C000
trusted library allocation
page read and write
197B1CA4000
trusted library allocation
page read and write
197B15DA000
trusted library allocation
page read and write
197B2998000
trusted library allocation
page read and write
197B872E000
trusted library allocation
page read and write
197B1A56000
trusted library allocation
page read and write
197B17BA000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B1B4D000
trusted library allocation
page read and write
197B9F4D000
trusted library allocation
page read and write
197A725B000
heap
page read and write
1873B4C0000
unclassified section
page readonly
197B12E6000
trusted library allocation
page read and write
197B0283000
trusted library allocation
page read and write
197B82C6000
trusted library allocation
page read and write
197B0DAA000
trusted library allocation
page read and write
197B1B33000
trusted library allocation
page read and write
197A726E000
heap
page read and write
14D4000
heap
page read and write
197B026F000
trusted library allocation
page read and write
197A7279000
heap
page read and write
197B87FB000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B88C8000
trusted library allocation
page read and write
197B3976000
trusted library allocation
page read and write
2101712A000
heap
page read and write
197B1C52000
trusted library allocation
page read and write
1873B4D0000
heap
page read and write
197B02D6000
trusted library allocation
page read and write
197B9641000
trusted library allocation
page read and write
197BBAFA000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197BC0C8000
trusted library allocation
page read and write
21017158000
heap
page read and write
210170F1000
heap
page read and write
197BC040000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197A726F000
heap
page read and write
197B0DB8000
trusted library allocation
page read and write
197BC130000
trusted library allocation
page read and write
197B0277000
trusted library allocation
page read and write
197B009D000
trusted library allocation
page read and write
197B0070000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197AC3F9000
trusted library allocation
page read and write
197B8969000
trusted library allocation
page read and write
197AFAF4000
trusted library allocation
page read and write
197B0CC5000
trusted library allocation
page read and write
197A7279000
heap
page read and write
197A7250000
heap
page read and write
197B165F000
trusted library allocation
page read and write
197B0107000
trusted library allocation
page read and write
197B0904000
trusted library allocation
page read and write
197B0907000
trusted library allocation
page read and write
1873B910000
trusted library allocation
page read and write
197B3B9B000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197A72A1000
heap
page read and write
197BC126000
trusted library allocation
page read and write
197B1330000
trusted library allocation
page read and write
197BC901000
heap
page read and write
197B9F41000
trusted library allocation
page read and write
197B8EF8000
trusted library allocation
page read and write
197B17E3000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B1825000
trusted library allocation
page read and write
197AFD27000
heap
page read and write
1873B900000
trusted library allocation
page read and write
197AD531000
trusted library allocation
page read and write
197AFD09000
heap
page read and write
197B17CA000
trusted library allocation
page read and write
197B8996000
trusted library allocation
page read and write
197B059A000
trusted library allocation
page read and write
170D07503000
trusted library allocation
page read and write
197B86D9000
trusted library allocation
page read and write
197B85FD000
trusted library allocation
page read and write
197B89E1000
trusted library allocation
page read and write
197B1B92000
trusted library allocation
page read and write
197B8397000
trusted library allocation
page read and write
197B0087000
trusted library allocation
page read and write
197B0D15000
trusted library allocation
page read and write
210170F1000
heap
page read and write
197B1AA9000
trusted library allocation
page read and write
197B097C000
trusted library allocation
page read and write
197B1492000
trusted library allocation
page read and write
197B8650000
trusted library allocation
page read and write
197A7259000
heap
page read and write
197ABC90000
trusted library allocation
page read and write
197A726C000
heap
page read and write
197A7251000
heap
page read and write
197B8436000
trusted library allocation
page read and write
197B1CB1000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
210170F1000
heap
page read and write
197B02E4000
trusted library allocation
page read and write
197B86E3000
trusted library allocation
page read and write
197B0104000
trusted library allocation
page read and write
197BC2C1000
trusted library allocation
page read and write
21017060000
heap
page read and write
197BC7BC000
trusted library allocation
page read and write
18B51300000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B1C1A000
trusted library allocation
page read and write
197A726A000
heap
page read and write
197B0D17000
trusted library allocation
page read and write
197B8FB6000
trusted library allocation
page read and write
197B96B1000
trusted library allocation
page read and write
EA0000
heap
page read and write
197AFD1B000
heap
page read and write
197B8FF9000
trusted library allocation
page read and write
197B02C0000
trusted library allocation
page read and write
197B1C5C000
trusted library allocation
page read and write
23681D00000
heap
page read and write
197B9CEA000
trusted library allocation
page read and write
197B3BED000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197A726C000
heap
page read and write
197AFD0D000
heap
page read and write
197AFA0A000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B1AF9000
trusted library allocation
page read and write
197B3B66000
trusted library allocation
page read and write
197B097F000
trusted library allocation
page read and write
197AD2F4000
trusted library allocation
page read and write
21016500000
trusted library allocation
page read and write
197BC9E1000
heap
page read and write
23681C13000
trusted library allocation
page read and write
197B0D9C000
trusted library allocation
page read and write
197B0D5C000
trusted library allocation
page read and write
197A724C000
heap
page read and write
1E7167580000
trusted library allocation
page read and write
197A7251000
heap
page read and write
1873BB3D000
trusted library allocation
page read and write
197B1449000
trusted library allocation
page read and write
197A725B000
heap
page read and write
197B02BA000
trusted library allocation
page read and write
197B01CE000
trusted library allocation
page read and write
197B8FB5000
trusted library allocation
page read and write
197BC1F4000
trusted library allocation
page read and write
197AC39D000
trusted library allocation
page read and write
197B87C3000
trusted library allocation
page read and write
197B14FD000
trusted library allocation
page read and write
197B374B000
trusted library allocation
page read and write
197B86BD000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B853D000
trusted library allocation
page read and write
197BC043000
trusted library allocation
page read and write
197B05FB000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B8996000
trusted library allocation
page read and write
197B02F9000
trusted library allocation
page read and write
197B1AA1000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197AD544000
trusted library allocation
page read and write
197B9EA3000
trusted library allocation
page read and write
BE9000
stack
page read and write
197A7267000
heap
page read and write
210162D0000
trusted library allocation
page read and write
1873B9C8000
trusted library allocation
page read and write
197A726C000
heap
page read and write
197AF9D0000
trusted library allocation
page read and write
197A7269000
heap
page read and write
210170E8000
heap
page read and write
197A728D000
heap
page read and write
197B29EB000
trusted library allocation
page read and write
197B84E9000
trusted library allocation
page read and write
197B17B2000
trusted library allocation
page read and write
197B377F000
trusted library allocation
page read and write
197A7269000
heap
page read and write
1873B903000
trusted library allocation
page read and write
2101650C000
trusted library allocation
page read and write
197B02F5000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B97E9000
trusted library allocation
page read and write
197B837D000
trusted library allocation
page read and write
197AF9ED000
trusted library allocation
page read and write
F6C000
unkown
page readonly
21016470000
heap
page read and write
197A7269000
heap
page read and write
197B02D6000
trusted library allocation
page read and write
197B0147000
trusted library allocation
page read and write
1873BA10000
heap
page read and write
197B9664000
trusted library allocation
page read and write
210170E0000
heap
page read and write
197A726E000
heap
page read and write
197B17CA000
trusted library allocation
page read and write
197B88B4000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B29D6000
trusted library allocation
page read and write
197B88F9000
trusted library allocation
page read and write
2101656F000
trusted library allocation
page read and write
197B0949000
trusted library allocation
page read and write
197B3853000
trusted library allocation
page read and write
197B00B0000
trusted library allocation
page read and write
197A725E000
heap
page read and write
197B1C8E000
trusted library allocation
page read and write
197B37B9000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197A72BA000
heap
page read and write
197B8527000
trusted library allocation
page read and write
197B897A000
trusted library allocation
page read and write
197BC040000
trusted library allocation
page read and write
197B298E000
trusted library allocation
page read and write
197BC7D7000
trusted library allocation
page read and write
197B283B000
trusted library allocation
page read and write
197B0D99000
trusted library allocation
page read and write
197B1BFE000
trusted library allocation
page read and write
197B1777000
trusted library allocation
page read and write
197B1CC1000
trusted library allocation
page read and write
23681A80000
heap
page read and write
197A7251000
heap
page read and write
197A7257000
heap
page read and write
197B15F5000
trusted library allocation
page read and write
197B132B000
trusted library allocation
page read and write
197B3728000
trusted library allocation
page read and write
197B843D000
trusted library allocation
page read and write
197B1C2E000
trusted library allocation
page read and write
197B02C0000
trusted library allocation
page read and write
197B1B85000
trusted library allocation
page read and write
197B1CEC000
trusted library allocation
page read and write
197B96CC000
trusted library allocation
page read and write
197A7275000
heap
page read and write
21016440000
heap
page read and write
197AD492000
trusted library allocation
page read and write
197B8FA9000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197B155A000
trusted library allocation
page read and write
197B84DD000
trusted library allocation
page read and write
1873B580000
heap
page read and write
197B17FE000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197BC217000
trusted library allocation
page read and write
197AD5DE000
trusted library allocation
page read and write
197B056B000
trusted library allocation
page read and write
197AD52E000
trusted library allocation
page read and write
3EDA73E000
stack
page read and write
197B0CCB000
trusted library allocation
page read and write
197B38C8000
trusted library allocation
page read and write
197B14F4000
trusted library allocation
page read and write
197B9606000
trusted library allocation
page read and write
197B02EE000
trusted library allocation
page read and write
21017060000
heap
page read and write
2368200C000
trusted library allocation
page read and write
197B1CA7000
trusted library allocation
page read and write
197B9689000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197B8428000
trusted library allocation
page read and write
197B1BCF000
trusted library allocation
page read and write
197B9F05000
trusted library allocation
page read and write
197B97E9000
trusted library allocation
page read and write
197BC856000
trusted library allocation
page read and write
197B018B000
trusted library allocation
page read and write
197B84C4000
trusted library allocation
page read and write
197B13D2000
trusted library allocation
page read and write
197AFD2C000
heap
page read and write
197B3BA5000
trusted library allocation
page read and write
197AD2E6000
trusted library allocation
page read and write
197B0D55000
trusted library allocation
page read and write
197A726C000
heap
page read and write
197B8680000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197AFD24000
heap
page read and write
197A726D000
heap
page read and write
197B82CE000
trusted library allocation
page read and write
197B05D7000
trusted library allocation
page read and write
197B13A8000
trusted library allocation
page read and write
197AD622000
trusted library allocation
page read and write
197B02DA000
trusted library allocation
page read and write
197A726B000
heap
page read and write
197ABCEF000
trusted library allocation
page read and write
197ABCEF000
trusted library allocation
page read and write
197B1A6C000
trusted library allocation
page read and write
197AD5FE000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B1A93000
trusted library allocation
page read and write
197B84BB000
trusted library allocation
page read and write
197B18F4000
trusted library allocation
page read and write
21017060000
heap
page read and write
197B02EE000
trusted library allocation
page read and write
197B1CEE000
trusted library allocation
page read and write
197B0CB0000
trusted library allocation
page read and write
197B0D8A000
trusted library allocation
page read and write
197BC1C8000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197A7281000
heap
page read and write
197B1CB8000
trusted library allocation
page read and write
197B8FE6000
trusted library allocation
page read and write
197AF933000
trusted library allocation
page read and write
197B266E000
trusted library allocation
page read and write
197A7245000
heap
page read and write
21017060000
heap
page read and write
197B82BE000
trusted library allocation
page read and write
1873B732000
unclassified section
page read and write
197B14AB000
trusted library allocation
page read and write
197A725B000
heap
page read and write
197B26CC000
trusted library allocation
page read and write
197B97F8000
trusted library allocation
page read and write
197B84D6000
trusted library allocation
page read and write
1500000
heap
page read and write
197AC351000
trusted library allocation
page read and write
197B82D2000
trusted library allocation
page read and write
197BC86F000
trusted library allocation
page read and write
197B84D4000
trusted library allocation
page read and write
197A726C000
heap
page read and write
197B1CAD000
trusted library allocation
page read and write
197BB4A8000
trusted library allocation
page read and write
197A7266000
heap
page read and write
197B84E9000
trusted library allocation
page read and write
18B52C16000
heap
page read and write
197B1C3E000
trusted library allocation
page read and write
B6D27FE000
stack
page read and write
197BA006000
trusted library allocation
page read and write
197B3782000
trusted library allocation
page read and write
197BC034000
trusted library allocation
page read and write
23681880000
unclassified section
page readonly
197AFD30000
heap
page read and write
197B85E2000
trusted library allocation
page read and write
197B0063000
trusted library allocation
page read and write
197B852E000
trusted library allocation
page read and write
23681960000
heap
page read and write
197B3BF8000
trusted library allocation
page read and write
197B01CE000
trusted library allocation
page read and write
197AFD90000
heap
page read and write
197B1AA1000
trusted library allocation
page read and write
197B1B92000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197A7262000
heap
page read and write
197B1BBA000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B3EE9000
trusted library allocation
page read and write
197B172C000
trusted library allocation
page read and write
197B1A9C000
trusted library allocation
page read and write
197B3BA8000
trusted library allocation
page read and write
197B094C000
trusted library allocation
page read and write
197B9FA7000
trusted library allocation
page read and write
1873BB3F000
trusted library allocation
page read and write
197B17FB000
trusted library allocation
page read and write
197B2D9B000
trusted library allocation
page read and write
197B02A3000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197BC058000
trusted library allocation
page read and write
197AFD24000
heap
page read and write
197B007B000
trusted library allocation
page read and write
197B2866000
trusted library allocation
page read and write
197B2292000
trusted library allocation
page read and write
197B882E000
trusted library allocation
page read and write
197BC0FD000
trusted library allocation
page read and write
197AC271000
trusted library allocation
page read and write
197B84E6000
trusted library allocation
page read and write
197B1CC1000
trusted library allocation
page read and write
1873BB14000
trusted library allocation
page read and write
197B26CC000
trusted library allocation
page read and write
197BC199000
trusted library allocation
page read and write
197B87B0000
trusted library allocation
page read and write
197B37AD000
trusted library allocation
page read and write
197B05B6000
trusted library allocation
page read and write
197AF98B000
trusted library allocation
page read and write
197B13A8000
trusted library allocation
page read and write
197B13A4000
trusted library allocation
page read and write
197AD4E8000
trusted library allocation
page read and write
197B12F9000
trusted library allocation
page read and write
197B1A4D000
trusted library allocation
page read and write
197B1BDF000
trusted library allocation
page read and write
197A725A000
heap
page read and write
197A726E000
heap
page read and write
ED1000
unkown
page execute read
197A726E000
heap
page read and write
197B1A9C000
trusted library allocation
page read and write
3EDAFFE000
stack
page read and write
1873B92E000
trusted library allocation
page read and write
23681C76000
trusted library allocation
page read and write
197B0D35000
trusted library allocation
page read and write
197A7261000
heap
page read and write
197B135A000
trusted library allocation
page read and write
197AC3FB000
trusted library allocation
page read and write
197B1A4D000
trusted library allocation
page read and write
197B9C30000
trusted library allocation
page read and write
197B1C80000
trusted library allocation
page read and write
197B1C5B000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197A7256000
heap
page read and write
197B1BBE000
trusted library allocation
page read and write
197A726F000
heap
page read and write
197AD487000
trusted library allocation
page read and write
197B3E7B000
trusted library allocation
page read and write
197BC0F2000
trusted library allocation
page read and write
197A7252000
heap
page read and write
197B02EE000
trusted library allocation
page read and write
197B17F9000
trusted library allocation
page read and write
197B29D4000
trusted library allocation
page read and write
197AFD3D000
heap
page read and write
197B14F4000
trusted library allocation
page read and write
197B864B000
trusted library allocation
page read and write
197A72A6000
heap
page read and write
197B8379000
trusted library allocation
page read and write
23681A50000
heap
page read and write
197B02BA000
trusted library allocation
page read and write
197A7254000
heap
page read and write
197B8822000
trusted library allocation
page read and write
197B37DD000
trusted library allocation
page read and write
197B967D000
trusted library allocation
page read and write
197B26F8000
trusted library allocation
page read and write
197B840D000
trusted library allocation
page read and write
197B8EB2000
trusted library allocation
page read and write
197BC988000
heap
page read and write
197A726B000
heap
page read and write
197BA9FB000
trusted library allocation
page read and write
197AD48A000
trusted library allocation
page read and write
197B1AA4000
trusted library allocation
page read and write
197B17F2000
trusted library allocation
page read and write
197B84D4000
trusted library allocation
page read and write
197BC7EB000
trusted library allocation
page read and write
197B15F5000
trusted library allocation
page read and write
197B019E000
trusted library allocation
page read and write
197B0276000
trusted library allocation
page read and write
2101716E000
heap
page read and write
210170EC000
heap
page read and write
197B87F9000
trusted library allocation
page read and write
197AFA4B000
trusted library allocation
page read and write
15D7000
heap
page read and write
197A724A000
heap
page read and write
197B1B9D000
trusted library allocation
page read and write
197B1A8A000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B89ED000
trusted library allocation
page read and write
197B9689000
trusted library allocation
page read and write
197B0D31000
trusted library allocation
page read and write
197B968D000
trusted library allocation
page read and write
197AF998000
trusted library allocation
page read and write
197A7269000
heap
page read and write
21016586000
trusted library allocation
page read and write
197B896E000
trusted library allocation
page read and write
197B96BE000
trusted library allocation
page read and write
197B267E000
trusted library allocation
page read and write
197B88FE000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197AF9DC000
trusted library allocation
page read and write
197B2DE3000
trusted library allocation
page read and write
197B17F2000
trusted library allocation
page read and write
197B84CA000
trusted library allocation
page read and write
210170E9000
heap
page read and write
197B16CD000
trusted library allocation
page read and write
197B381A000
trusted library allocation
page read and write
197B97D3000
trusted library allocation
page read and write
197AFD0C000
heap
page read and write
197B17F7000
trusted library allocation
page read and write
197B1A9C000
trusted library allocation
page read and write
197A725A000
heap
page read and write
197B016D000
trusted library allocation
page read and write
197B1758000
trusted library allocation
page read and write
197B02F5000
trusted library allocation
page read and write
197BC7E2000
trusted library allocation
page read and write
197BC854000
trusted library allocation
page read and write
197B170A000
trusted library allocation
page read and write
197B17BA000
trusted library allocation
page read and write
197B1BC4000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B17A0000
trusted library allocation
page read and write
197B841D000
trusted library allocation
page read and write
197B1B83000
trusted library allocation
page read and write
1873B54B000
remote allocation
page execute read
197B2885000
trusted library allocation
page read and write
197B14C3000
trusted library allocation
page read and write
197B1BCF000
trusted library allocation
page read and write
197B02EE000
trusted library allocation
page read and write
197A7262000
heap
page read and write
21017177000
heap
page read and write
3DC1000
heap
page read and write
1873B960000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197B26E3000
trusted library allocation
page read and write
197B15A1000
trusted library allocation
page read and write
197B849B000
trusted library allocation
page read and write
197B1356000
trusted library allocation
page read and write
197A727B000
heap
page read and write
197B0953000
trusted library allocation
page read and write
26968A00000
trusted library allocation
page read and write
21017177000
heap
page read and write
1504000
heap
page read and write
197B3E84000
trusted library allocation
page read and write
197B1C65000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B84DD000
trusted library allocation
page read and write
197B89E7000
trusted library allocation
page read and write
197BC058000
trusted library allocation
page read and write
197BC7FB000
trusted library allocation
page read and write
197A7261000
heap
page read and write
197B02D6000
trusted library allocation
page read and write
197AD4D7000
trusted library allocation
page read and write
197B17B2000
trusted library allocation
page read and write
197B1A60000
trusted library allocation
page read and write
197B1C79000
trusted library allocation
page read and write
197B1B92000
trusted library allocation
page read and write
197A727B000
heap
page read and write
197B1344000
trusted library allocation
page read and write
197A7250000
heap
page read and write
210160E0000
unclassified section
page readonly
197B87C7000
trusted library allocation
page read and write
197B0950000
trusted library allocation
page read and write
197B019E000
trusted library allocation
page read and write
197B843F000
trusted library allocation
page read and write
1873BB1B000
trusted library allocation
page read and write
18B51060000
heap
page read and write
197A7273000
heap
page read and write
197B184E000
trusted library allocation
page read and write
18B510C3000
heap
page read and write
197A726E000
heap
page read and write
21017144000
heap
page read and write
197AFD06000
heap
page read and write
197B29E5000
trusted library allocation
page read and write
23682000000
trusted library allocation
page read and write
197BCF8A000
trusted library allocation
page read and write
197B1371000
trusted library allocation
page read and write
197B8820000
trusted library allocation
page read and write
197B3BD6000
trusted library allocation
page read and write
197B1CC1000
trusted library allocation
page read and write
197B84EE000
trusted library allocation
page read and write
197B8653000
trusted library allocation
page read and write
197A7262000
heap
page read and write
21016503000
trusted library allocation
page read and write
197B16A1000
trusted library allocation
page read and write
197B019E000
trusted library allocation
page read and write
197BC0B2000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B17B2000
trusted library allocation
page read and write
197AD4A1000
trusted library allocation
page read and write
197B135F000
trusted library allocation
page read and write
197AFA55000
trusted library allocation
page read and write
197B02A3000
trusted library allocation
page read and write
197B848C000
trusted library allocation
page read and write
197B17F2000
trusted library allocation
page read and write
197B1C3E000
trusted library allocation
page read and write
197B17CC000
trusted library allocation
page read and write
197BA92C000
trusted library allocation
page read and write
197B0D9E000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197B17EC000
trusted library allocation
page read and write
197B167E000
trusted library allocation
page read and write
197B84C0000
trusted library allocation
page read and write
197B0D98000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197B1B42000
trusted library allocation
page read and write
197BC8E5000
trusted library allocation
page read and write
197B01CE000
trusted library allocation
page read and write
197B176F000
trusted library allocation
page read and write
197B14ED000
trusted library allocation
page read and write
197B84DF000
trusted library allocation
page read and write
197B2D6A000
trusted library allocation
page read and write
197B1A79000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197A72A8000
heap
page read and write
197B05E1000
trusted library allocation
page read and write
197B863E000
trusted library allocation
page read and write
197B17F0000
trusted library allocation
page read and write
197BC810000
trusted library allocation
page read and write
197A725D000
heap
page read and write
197AFD99000
heap
page read and write
197AFA90000
trusted library allocation
page read and write
99D29FE000
unkown
page readonly
197B897A000
trusted library allocation
page read and write
197B87E7000
trusted library allocation
page read and write
197AD4E4000
trusted library allocation
page read and write
197AF998000
trusted library allocation
page read and write
197B018E000
trusted library allocation
page read and write
197B1AA4000
trusted library allocation
page read and write
197AF9FB000
trusted library allocation
page read and write
197B0963000
trusted library allocation
page read and write
197B83F7000
trusted library allocation
page read and write
197BC00D000
trusted library allocation
page read and write
197B2DA9000
trusted library allocation
page read and write
197A727B000
heap
page read and write
197B8FEC000
trusted library allocation
page read and write
197B29A2000
trusted library allocation
page read and write
197B898A000
trusted library allocation
page read and write
197AF9D9000
trusted library allocation
page read and write
197B1AE6000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197A72D2000
heap
page read and write
197B83AA000
trusted library allocation
page read and write
197A727B000
heap
page read and write
21017158000
heap
page read and write
3DC1000
heap
page read and write
197BC2C1000
trusted library allocation
page read and write
197B1C50000
trusted library allocation
page read and write
197B1529000
trusted library allocation
page read and write
197B9F6D000
trusted library allocation
page read and write
197B9EAC000
trusted library allocation
page read and write
197B178B000
trusted library allocation
page read and write
197B84E9000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B1677000
trusted library allocation
page read and write
197AD566000
trusted library allocation
page read and write
197B97EE000
trusted library allocation
page read and write
197B2994000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
197B855A000
trusted library allocation
page read and write
197AD4EF000
trusted library allocation
page read and write
197B0DAA000
trusted library allocation
page read and write
197BC82B000
trusted library allocation
page read and write
197B8549000
trusted library allocation
page read and write
197AFD2F000
heap
page read and write
197A7273000
heap
page read and write
197B15A5000
trusted library allocation
page read and write
197B1CBA000
trusted library allocation
page read and write
197BC14C000
trusted library allocation
page read and write
197A728D000
heap
page read and write
197A7259000
heap
page read and write
197A7265000
heap
page read and write
2101655C000
trusted library allocation
page read and write
197BC1D6000
trusted library allocation
page read and write
197B1CAA000
trusted library allocation
page read and write
197B1C18000
trusted library allocation
page read and write
197BC010000
trusted library allocation
page read and write
197AD4A9000
trusted library allocation
page read and write
197B16D1000
trusted library allocation
page read and write
197B17F9000
trusted library allocation
page read and write
2101713B000
heap
page read and write
21017060000
heap
page read and write
197B83AA000
trusted library allocation
page read and write
210170EC000
heap
page read and write
197B0D9C000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B3753000
trusted library allocation
page read and write
197B286D000
trusted library allocation
page read and write
197BC901000
heap
page read and write
18B52C0B000
heap
page read and write
197B3EF6000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197AD5E0000
trusted library allocation
page read and write
197B02F5000
trusted library allocation
page read and write
197B89B0000
trusted library allocation
page read and write
197A72A1000
heap
page read and write
197B1653000
trusted library allocation
page read and write
197BC058000
trusted library allocation
page read and write
23681C70000
trusted library allocation
page read and write
197B3CF7000
trusted library allocation
page read and write
197B858D000
trusted library allocation
page read and write
197AD48A000
trusted library allocation
page read and write
197B02E4000
trusted library allocation
page read and write
197B97E5000
trusted library allocation
page read and write
197B1AA4000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197B014F000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B1A3D000
trusted library allocation
page read and write
197B1705000
trusted library allocation
page read and write
197B1B88000
trusted library allocation
page read and write
197B84E9000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B1C67000
trusted library allocation
page read and write
197AD4F9000
trusted library allocation
page read and write
197B0039000
trusted library allocation
page read and write
197B1C2E000
trusted library allocation
page read and write
197AC3BA000
trusted library allocation
page read and write
2101716E000
heap
page read and write
197AD48A000
trusted library allocation
page read and write
197B2D31000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197AD4EA000
trusted library allocation
page read and write
197B1AA1000
trusted library allocation
page read and write
197BC814000
trusted library allocation
page read and write
197AC3F1000
trusted library allocation
page read and write
197B8EF2000
trusted library allocation
page read and write
197B16F5000
trusted library allocation
page read and write
197AD52F000
trusted library allocation
page read and write
197BC988000
heap
page read and write
197B25C4000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B1C18000
trusted library allocation
page read and write
197B9E23000
trusted library allocation
page read and write
197B15A1000
trusted library allocation
page read and write
197A726C000
heap
page read and write
197B3BEF000
trusted library allocation
page read and write
197B3732000
trusted library allocation
page read and write
197B8558000
trusted library allocation
page read and write
197B162D000
trusted library allocation
page read and write
197B17EB000
trusted library allocation
page read and write
197B13C2000
trusted library allocation
page read and write
210165BD000
trusted library allocation
page read and write
197B051C000
trusted library allocation
page read and write
197B1CC9000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B8560000
trusted library allocation
page read and write
21016581000
trusted library allocation
page read and write
197B1BCF000
trusted library allocation
page read and write
197B14FD000
trusted library allocation
page read and write
197BC7FB000
trusted library allocation
page read and write
197B17BB000
trusted library allocation
page read and write
197B1A49000
trusted library allocation
page read and write
197B17D6000
trusted library allocation
page read and write
197B0922000
trusted library allocation
page read and write
197B85EB000
trusted library allocation
page read and write
197B9CD4000
trusted library allocation
page read and write
197B86D1000
trusted library allocation
page read and write
1873B62A000
heap
page read and write
197B1C75000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197B1B6D000
trusted library allocation
page read and write
197BC885000
trusted library allocation
page read and write
197B3BF8000
trusted library allocation
page read and write
197AD4E4000
trusted library allocation
page read and write
197B17BF000
trusted library allocation
page read and write
197B157C000
trusted library allocation
page read and write
197A7260000
heap
page read and write
197B86CB000
trusted library allocation
page read and write
197B17FE000
trusted library allocation
page read and write
197B8532000
trusted library allocation
page read and write
197B8547000
trusted library allocation
page read and write
197B38F6000
trusted library allocation
page read and write
197B97F3000
trusted library allocation
page read and write
197BC155000
trusted library allocation
page read and write
197B86D9000
trusted library allocation
page read and write
197AFD04000
heap
page read and write
197B8FF1000
trusted library allocation
page read and write
197B1AA4000
trusted library allocation
page read and write
197B97EE000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B146A000
trusted library allocation
page read and write
197B8969000
trusted library allocation
page read and write
197B1CB3000
trusted library allocation
page read and write
197A7281000
heap
page read and write
197B09CF000
trusted library allocation
page read and write
197A725C000
heap
page read and write
197B0D5C000
trusted library allocation
page read and write
197B283B000
trusted library allocation
page read and write
197AFD48000
heap
page read and write
197B9677000
trusted library allocation
page read and write
197B1652000
trusted library allocation
page read and write
197AD4EF000
trusted library allocation
page read and write
53FA3D8000
stack
page read and write
197B29D4000
trusted library allocation
page read and write
197B84DA000
trusted library allocation
page read and write
197A7234000
heap
page read and write
197B1B83000
trusted library allocation
page read and write
197B832A000
trusted library allocation
page read and write
197B966E000
trusted library allocation
page read and write
197AC3F1000
trusted library allocation
page read and write
99CF70E000
unkown
page readonly
197B1BCF000
trusted library allocation
page read and write
197B0565000
trusted library allocation
page read and write
197B16BA000
trusted library allocation
page read and write
197B8535000
trusted library allocation
page read and write
197B9F48000
trusted library allocation
page read and write
197B05F9000
trusted library allocation
page read and write
197BC854000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197ABCF9000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197A7256000
heap
page read and write
197B14A3000
trusted library allocation
page read and write
2101716E000
heap
page read and write
197B8530000
trusted library allocation
page read and write
2101650A000
trusted library allocation
page read and write
197B0177000
trusted library allocation
page read and write
197B019E000
trusted library allocation
page read and write
197B83DC000
trusted library allocation
page read and write
197A726E000
heap
page read and write
14D0000
heap
page read and write
197B896B000
trusted library allocation
page read and write
26968B0A000
trusted library allocation
page read and write
18B52C09000
heap
page read and write
197A7269000
heap
page read and write
210170E8000
heap
page read and write
197B8408000
trusted library allocation
page read and write
197AC3B1000
trusted library allocation
page read and write
197B1CF0000
trusted library allocation
page read and write
197AFD27000
heap
page read and write
197B1CEC000
trusted library allocation
page read and write
197AD566000
trusted library allocation
page read and write
197B0187000
trusted library allocation
page read and write
197BC7EE000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197AF939000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B018D000
trusted library allocation
page read and write
1873B998000
trusted library allocation
page read and write
197B9A00000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B181F000
trusted library allocation
page read and write
21017144000
heap
page read and write
197B87CA000
trusted library allocation
page read and write
197B023B000
trusted library allocation
page read and write
197AF933000
trusted library allocation
page read and write
197BC88F000
trusted library allocation
page read and write
197B8573000
trusted library allocation
page read and write
197B179C000
trusted library allocation
page read and write
197B1C92000
trusted library allocation
page read and write
197B0D43000
trusted library allocation
page read and write
197B1A6B000
trusted library allocation
page read and write
197B0D4E000
trusted library allocation
page read and write
197B82E0000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B189D000
trusted library allocation
page read and write
2101652F000
trusted library allocation
page read and write
197B0966000
trusted library allocation
page read and write
197B16E8000
trusted library allocation
page read and write
18B511B0000
heap
page read and write
197B8722000
trusted library allocation
page read and write
197AD56D000
trusted library allocation
page read and write
197AC39D000
trusted library allocation
page read and write
197A7270000
heap
page read and write
197B8679000
trusted library allocation
page read and write
197B29F9000
trusted library allocation
page read and write
197B14A3000
trusted library allocation
page read and write
197B13B3000
trusted library allocation
page read and write
53FDC3E000
unkown
page readonly
197BC02A000
trusted library allocation
page read and write
197B8724000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B0950000
trusted library allocation
page read and write
197BC0B2000
trusted library allocation
page read and write
197B1A64000
trusted library allocation
page read and write
197B84DD000
trusted library allocation
page read and write
197B186E000
trusted library allocation
page read and write
23681C03000
trusted library allocation
page read and write
197B015A000
trusted library allocation
page read and write
197B1764000
trusted library allocation
page read and write
197B15F9000
trusted library allocation
page read and write
2368191A000
heap
page read and write
197B0CF4000
trusted library allocation
page read and write
197AFA6B000
trusted library allocation
page read and write
197B02B8000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B2986000
trusted library allocation
page read and write
197A72D5000
heap
page read and write
197A7251000
heap
page read and write
197A7271000
heap
page read and write
197BC28E000
trusted library allocation
page read and write
197B17E3000
trusted library allocation
page read and write
197B17BA000
trusted library allocation
page read and write
197B9E64000
trusted library allocation
page read and write
197B3891000
trusted library allocation
page read and write
197B1AA4000
trusted library allocation
page read and write
197B84C4000
trusted library allocation
page read and write
197B0D5C000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B1BFC000
trusted library allocation
page read and write
197B8499000
trusted library allocation
page read and write
197B1B98000
trusted library allocation
page read and write
197B02E9000
trusted library allocation
page read and write
197A725B000
heap
page read and write
197A72D2000
heap
page read and write
197B186E000
trusted library allocation
page read and write
197AFD3F000
heap
page read and write
14D4000
heap
page read and write
197B1CC1000
trusted library allocation
page read and write
197A728D000
heap
page read and write
1873B73F000
unclassified section
page read and write
197B019E000
trusted library allocation
page read and write
197B84D4000
trusted library allocation
page read and write
197A727B000
heap
page read and write
197B9650000
trusted library allocation
page read and write
197B1B98000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B1A56000
trusted library allocation
page read and write
197A7280000
heap
page read and write
197B1504000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197BBAF0000
trusted library allocation
page read and write
197B8441000
trusted library allocation
page read and write
197B008D000
trusted library allocation
page read and write
197AD4AE000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197A7272000
heap
page read and write
197A7262000
heap
page read and write
21017063000
heap
page read and write
21017158000
heap
page read and write
197AFD99000
heap
page read and write
197BC0F2000
trusted library allocation
page read and write
197B8342000
trusted library allocation
page read and write
197AC3B1000
trusted library allocation
page read and write
197B88B7000
trusted library allocation
page read and write
197AF9EF000
trusted library allocation
page read and write
197B1787000
trusted library allocation
page read and write
197BC83F000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B0CFE000
trusted library allocation
page read and write
197BC0E3000
trusted library allocation
page read and write
197BC850000
trusted library allocation
page read and write
197B14F4000
trusted library allocation
page read and write
197AFD2F000
heap
page read and write
197B17FE000
trusted library allocation
page read and write
197B86D1000
trusted library allocation
page read and write
197B868B000
trusted library allocation
page read and write
197B37DB000
trusted library allocation
page read and write
197AD52C000
trusted library allocation
page read and write
197B14CE000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B14AB000
trusted library allocation
page read and write
197B89D4000
trusted library allocation
page read and write
197B02E9000
trusted library allocation
page read and write
197B88B2000
trusted library allocation
page read and write
197B8F8F000
trusted library allocation
page read and write
197B2DF5000
trusted library allocation
page read and write
197AC3BA000
trusted library allocation
page read and write
197B186E000
trusted library allocation
page read and write
197AFD3D000
heap
page read and write
197BB184000
trusted library allocation
page read and write
197B84BB000
trusted library allocation
page read and write
197B0D64000
trusted library allocation
page read and write
197B1C05000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197B1AA4000
trusted library allocation
page read and write
197B88F9000
trusted library allocation
page read and write
197BC1D8000
trusted library allocation
page read and write
197BC199000
trusted library allocation
page read and write
197BC7E8000
trusted library allocation
page read and write
197B1C39000
trusted library allocation
page read and write
197B1A89000
trusted library allocation
page read and write
197B01CE000
trusted library allocation
page read and write
197BC84C000
trusted library allocation
page read and write
197B3931000
trusted library allocation
page read and write
53FD43E000
stack
page read and write
197B178B000
trusted library allocation
page read and write
197B1631000
trusted library allocation
page read and write
197B1CB3000
trusted library allocation
page read and write
197B02FC000
trusted library allocation
page read and write
197A7259000
heap
page read and write
197B02C3000
trusted library allocation
page read and write
197B2DBC000
trusted library allocation
page read and write
197B37B2000
trusted library allocation
page read and write
197B8411000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197A726E000
heap
page read and write
197B17F3000
trusted library allocation
page read and write
197B14EE000
trusted library allocation
page read and write
197AFD27000
heap
page read and write
1873B9CB000
trusted library allocation
page read and write
197B88CD000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B133A000
trusted library allocation
page read and write
197B167D000
trusted library allocation
page read and write
197B17E9000
trusted library allocation
page read and write
197B3844000
trusted library allocation
page read and write
197AD5EB000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197A726E000
heap
page read and write
197A72D6000
heap
page read and write
197AFD99000
heap
page read and write
197A7279000
heap
page read and write
197B85DB000
trusted library allocation
page read and write
197B969C000
trusted library allocation
page read and write
197B8630000
trusted library allocation
page read and write
197B9C89000
trusted library allocation
page read and write
197B86C9000
trusted library allocation
page read and write
197B14E5000
trusted library allocation
page read and write
197B3881000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B1896000
trusted library allocation
page read and write
197B05FE000
trusted library allocation
page read and write
197B895D000
trusted library allocation
page read and write
197B841A000
trusted library allocation
page read and write
197ABC81000
trusted library allocation
page read and write
197B0590000
trusted library allocation
page read and write
197B0D42000
trusted library allocation
page read and write
197B1A93000
trusted library allocation
page read and write
197B13B0000
trusted library allocation
page read and write
23681C24000
trusted library allocation
page read and write
197B897F000
trusted library allocation
page read and write
137F000
stack
page read and write
197B1BE7000
trusted library allocation
page read and write
197B05FE000
trusted library allocation
page read and write
197B86E1000
trusted library allocation
page read and write
197B370F000
trusted library allocation
page read and write
197B37A4000
trusted library allocation
page read and write
197B893E000
trusted library allocation
page read and write
197B9CED000
trusted library allocation
page read and write
197A727B000
heap
page read and write
197B8ED2000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B17EA000
trusted library allocation
page read and write
197B1334000
trusted library allocation
page read and write
197B14D2000
trusted library allocation
page read and write
197B019E000
trusted library allocation
page read and write
1873B972000
trusted library allocation
page read and write
197AD4E4000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B028B000
trusted library allocation
page read and write
197B17A0000
trusted library allocation
page read and write
197B9C2E000
trusted library allocation
page read and write
197B8954000
trusted library allocation
page read and write
197B1839000
trusted library allocation
page read and write
197B0D0A000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B84F4000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197B855E000
trusted library allocation
page read and write
197B83C8000
trusted library allocation
page read and write
197B023D000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B1B13000
trusted library allocation
page read and write
1873B800000
trusted library allocation
page read and write
197B8411000
trusted library allocation
page read and write
197A72A1000
heap
page read and write
197B87E5000
trusted library allocation
page read and write
197B017C000
trusted library allocation
page read and write
197B14AB000
trusted library allocation
page read and write
197B17CC000
trusted library allocation
page read and write
197AC3BC000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B1BA8000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197BC95E000
heap
page read and write
197BC901000
heap
page read and write
23681C5D000
trusted library allocation
page read and write
197A726C000
heap
page read and write
21017069000
heap
page read and write
FA4000
unkown
page readonly
197B8560000
trusted library allocation
page read and write
197B1BCF000
trusted library allocation
page read and write
197AD53D000
trusted library allocation
page read and write
197BC2FD000
trusted library allocation
page read and write
197B2667000
trusted library allocation
page read and write
197B84AC000
trusted library allocation
page read and write
23681900000
unclassified section
page readonly
197B85DE000
trusted library allocation
page read and write
197B0C9B000
trusted library allocation
page read and write
197AC2FE000
trusted library allocation
page read and write
197AFD26000
heap
page read and write
197B1A9C000
trusted library allocation
page read and write
197B84E0000
trusted library allocation
page read and write
197AFD0D000
heap
page read and write
197B17A8000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197AD423000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197AD59F000
trusted library allocation
page read and write
197B16E2000
trusted library allocation
page read and write
197AD540000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B1553000
trusted library allocation
page read and write
197AFD22000
heap
page read and write
197B17CC000
trusted library allocation
page read and write
197B89ED000
trusted library allocation
page read and write
197BC049000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B0D31000
trusted library allocation
page read and write
197B1B85000
trusted library allocation
page read and write
197B8431000
trusted library allocation
page read and write
197B38EC000
trusted library allocation
page read and write
197AF913000
trusted library allocation
page read and write
2101708A000
heap
page read and write
23681C78000
trusted library allocation
page read and write
197B89CA000
trusted library allocation
page read and write
197B1C1F000
trusted library allocation
page read and write
2101646E000
unkown
page execute read
197B5002000
trusted library allocation
page read and write
197AD26C000
trusted library allocation
page read and write
14D4000
heap
page read and write
197B8E92000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B87B7000
trusted library allocation
page read and write
197B966E000
trusted library allocation
page read and write
53F98DC000
stack
page read and write
197B14EE000
trusted library allocation
page read and write
197AD2EE000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197A7281000
heap
page read and write
197B1A45000
trusted library allocation
page read and write
197BC901000
heap
page read and write
197B8628000
trusted library allocation
page read and write
197B29F9000
trusted library allocation
page read and write
197B0DAA000
trusted library allocation
page read and write
197B960A000
trusted library allocation
page read and write
197B02BA000
trusted library allocation
page read and write
14D4000
heap
page read and write
197B0074000
trusted library allocation
page read and write
197A7268000
heap
page read and write
197B97D3000
trusted library allocation
page read and write
197B1C8E000
trusted library allocation
page read and write
197AFD24000
heap
page read and write
197B88B2000
trusted library allocation
page read and write
197AF9A2000
trusted library allocation
page read and write
197A7254000
heap
page read and write
197AFA98000
trusted library allocation
page read and write
197B1CEC000
trusted library allocation
page read and write
197B17A8000
trusted library allocation
page read and write
197B17CA000
trusted library allocation
page read and write
197B8FBB000
trusted library allocation
page read and write
197AD487000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197A7262000
heap
page read and write
197B02E9000
trusted library allocation
page read and write
197B396C000
trusted library allocation
page read and write
197BC7C5000
trusted library allocation
page read and write
197B1C22000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197A72A1000
heap
page read and write
2101713B000
heap
page read and write
2101712D000
heap
page read and write
197B1BF3000
trusted library allocation
page read and write
197AD571000
trusted library allocation
page read and write
1873B912000
trusted library allocation
page read and write
34AAA121000
trusted library allocation
page execute read
197BBA96000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B9EE5000
trusted library allocation
page read and write
197B0081000
trusted library allocation
page read and write
197B149E000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197A72B3000
heap
page read and write
197A7261000
heap
page read and write
197B3B71000
trusted library allocation
page read and write
197A7237000
heap
page read and write
197B1AF1000
trusted library allocation
page read and write
197B8669000
trusted library allocation
page read and write
197B1A89000
trusted library allocation
page read and write
197B1CC9000
trusted library allocation
page read and write
197B96A8000
trusted library allocation
page read and write
1873B9B7000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B1CF0000
trusted library allocation
page read and write
197B1760000
trusted library allocation
page read and write
197AF992000
trusted library allocation
page read and write
197B0982000
trusted library allocation
page read and write
197AF9DB000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197AFD99000
heap
page read and write
197B17FE000
trusted library allocation
page read and write
197B862C000
trusted library allocation
page read and write
197B89A2000
trusted library allocation
page read and write
197B17E3000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B84C4000
trusted library allocation
page read and write
197B17E3000
trusted library allocation
page read and write
197AFD2C000
heap
page read and write
14D4000
heap
page read and write
197AD487000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197B1BC4000
trusted library allocation
page read and write
197A7249000
heap
page read and write
197AFD43000
heap
page read and write
197A7265000
heap
page read and write
197B02C0000
trusted library allocation
page read and write
197B1C9A000
trusted library allocation
page read and write
197B84D4000
trusted library allocation
page read and write
15E5000
heap
page read and write
2101705C000
heap
page read and write
197B0087000
trusted library allocation
page read and write
197B1CB3000
trusted library allocation
page read and write
197B88B5000
trusted library allocation
page read and write
18B52D80000
heap
page read and write
197A7275000
heap
page read and write
21017064000
heap
page read and write
197A7262000
heap
page read and write
197B3960000
trusted library allocation
page read and write
197B1CE8000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197B1CF0000
trusted library allocation
page read and write
197B166B000
trusted library allocation
page read and write
197B1CE9000
trusted library allocation
page read and write
197B0D3A000
trusted library allocation
page read and write
197A7281000
heap
page read and write
197B29D6000
trusted library allocation
page read and write
197B15DA000
trusted library allocation
page read and write
197B1575000
trusted library allocation
page read and write
197B8FB5000
trusted library allocation
page read and write
197BC88F000
trusted library allocation
page read and write
197B0DB8000
trusted library allocation
page read and write
197B17F2000
trusted library allocation
page read and write
197B9CFD000
trusted library allocation
page read and write
210170FD000
heap
page read and write
197B2D37000
trusted library allocation
page read and write
197A72A6000
heap
page read and write
197B2643000
trusted library allocation
page read and write
197B1C3B000
trusted library allocation
page read and write
197B1485000
trusted library allocation
page read and write
197B02E2000
trusted library allocation
page read and write
197B1839000
trusted library allocation
page read and write
197B15B0000
trusted library allocation
page read and write
197A7261000
heap
page read and write
197AC366000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B8E48000
trusted library allocation
page read and write
197B8FBC000
trusted library allocation
page read and write
197BC077000
trusted library allocation
page read and write
197B8973000
trusted library allocation
page read and write
197BC88F000
trusted library allocation
page read and write
197B019E000
trusted library allocation
page read and write
197B0D31000
trusted library allocation
page read and write
197B17B2000
trusted library allocation
page read and write
29F1F624000
trusted library allocation
page read and write
197B1870000
trusted library allocation
page read and write
197B1754000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197B176F000
trusted library allocation
page read and write
1873B95D000
trusted library allocation
page read and write
1873B947000
trusted library allocation
page read and write
197B3922000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197B97E7000
trusted library allocation
page read and write
197ABCC7000
trusted library allocation
page read and write
197B1658000
trusted library allocation
page read and write
197B00CC000
trusted library allocation
page read and write
197B3B98000
trusted library allocation
page read and write
197B898A000
trusted library allocation
page read and write
197B894A000
trusted library allocation
page read and write
3EDD03E000
unkown
page readonly
197AFD1B000
heap
page read and write
197B84D6000
trusted library allocation
page read and write
197AFD2E000
heap
page read and write
197B1341000
trusted library allocation
page read and write
197B89A2000
trusted library allocation
page read and write
197B3EA6000
trusted library allocation
page read and write
197BC02A000
trusted library allocation
page read and write
197AFD8E000
heap
page read and write
197AD531000
trusted library allocation
page read and write
197B02CB000
trusted library allocation
page read and write
197B1C31000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B02FA000
trusted library allocation
page read and write
197B1B58000
trusted library allocation
page read and write
210170EC000
heap
page read and write
197B02AA000
trusted library allocation
page read and write
197B1330000
trusted library allocation
page read and write
197B88B9000
trusted library allocation
page read and write
197B84C0000
trusted library allocation
page read and write
197B897A000
trusted library allocation
page read and write
197B1CB1000
trusted library allocation
page read and write
197B853C000
trusted library allocation
page read and write
197AF9CC000
trusted library allocation
page read and write
197AD2D3000
trusted library allocation
page read and write
197AFD0D000
heap
page read and write
197A7262000
heap
page read and write
197ABCCF000
trusted library allocation
page read and write
197BC7C5000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197BC885000
trusted library allocation
page read and write
23681CF4000
trusted library allocation
page read and write
197A72A6000
heap
page read and write
197B13BF000
trusted library allocation
page read and write
197B8824000
trusted library allocation
page read and write
197B26B0000
trusted library allocation
page read and write
197B1B88000
trusted library allocation
page read and write
197B967D000
trusted library allocation
page read and write
197B1C22000
trusted library allocation
page read and write
197B1AB6000
trusted library allocation
page read and write
197B9993000
trusted library allocation
page read and write
210170FD000
heap
page read and write
21016523000
trusted library allocation
page read and write
3ED85D8000
stack
page read and write
21016480000
trusted library allocation
page read and write
210170E8000
heap
page read and write
2101706C000
heap
page read and write
197B1C7C000
trusted library allocation
page read and write
197B01A5000
trusted library allocation
page read and write
197AC3AD000
trusted library allocation
page read and write
1873B5C0000
heap
page read and write
197B023B000
trusted library allocation
page read and write
197BB800000
trusted library allocation
page read and write
197B84F9000
trusted library allocation
page read and write
197B0D3A000
trusted library allocation
page read and write
21016462000
unkown
page execute read
210170EC000
heap
page read and write
197B26B7000
trusted library allocation
page read and write
197B14E1000
trusted library allocation
page read and write
197A72D2000
heap
page read and write
197B0DDF000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197A7261000
heap
page read and write
197B1BD2000
trusted library allocation
page read and write
197AFD92000
heap
page read and write
53F989E000
unkown
page readonly
197A7270000
heap
page read and write
197B82D6000
trusted library allocation
page read and write
197AFCFE000
heap
page read and write
197B25F5000
trusted library allocation
page read and write
197B1898000
trusted library allocation
page read and write
197B1C5C000
trusted library allocation
page read and write
197BC82B000
trusted library allocation
page read and write
197BC8CC000
trusted library allocation
page read and write
197B2DD8000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B1B4D000
trusted library allocation
page read and write
21017177000
heap
page read and write
197A7258000
heap
page read and write
197B86D3000
trusted library allocation
page read and write
21AE000
stack
page read and write
ED0000
unkown
page readonly
197A7262000
heap
page read and write
197AFD2B000
heap
page read and write
197B0031000
trusted library allocation
page read and write
197B1BAE000
trusted library allocation
page read and write
197B1583000
trusted library allocation
page read and write
197B135F000
trusted library allocation
page read and write
197B17ED000
trusted library allocation
page read and write
197B0181000
trusted library allocation
page read and write
197B83BE000
trusted library allocation
page read and write
197B1BC4000
trusted library allocation
page read and write
197B3BA1000
trusted library allocation
page read and write
197B1A4A000
trusted library allocation
page read and write
197B26B0000
trusted library allocation
page read and write
197AFD2C000
heap
page read and write
197AC3BA000
trusted library allocation
page read and write
197B3B4A000
trusted library allocation
page read and write
197B371F000
trusted library allocation
page read and write
197B3980000
trusted library allocation
page read and write
197BC0E3000
trusted library allocation
page read and write
197AFD04000
heap
page read and write
197A7262000
heap
page read and write
197B37FE000
trusted library allocation
page read and write
197A7270000
heap
page read and write
197B8978000
trusted library allocation
page read and write
197B1B8A000
trusted library allocation
page read and write
197AD4D7000
trusted library allocation
page read and write
197B2D54000
trusted library allocation
page read and write
197B00C8000
trusted library allocation
page read and write
197B0DA2000
trusted library allocation
page read and write
197A7258000
heap
page read and write
197B854E000
trusted library allocation
page read and write
197B16E8000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B0D64000
trusted library allocation
page read and write
197B9CF7000
trusted library allocation
page read and write
197BC901000
heap
page read and write
197A7275000
heap
page read and write
197A7280000
heap
page read and write
197A7262000
heap
page read and write
21016575000
trusted library allocation
page read and write
197BC82E000
trusted library allocation
page read and write
197BC086000
trusted library allocation
page read and write
F9C000
unkown
page read and write
197B0053000
trusted library allocation
page read and write
197BC181000
trusted library allocation
page read and write
197B9689000
trusted library allocation
page read and write
197B0D4E000
trusted library allocation
page read and write
197B0943000
trusted library allocation
page read and write
1873B9A3000
trusted library allocation
page read and write
197B8FF1000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197A7269000
heap
page read and write
197B02A9000
trusted library allocation
page read and write
197B17A8000
trusted library allocation
page read and write
197B01CE000
trusted library allocation
page read and write
210165F3000
trusted library allocation
page read and write
197B1C67000
trusted library allocation
page read and write
197BC7E8000
trusted library allocation
page read and write
197AC39D000
trusted library allocation
page read and write
197A7270000
heap
page read and write
197B1CE9000
trusted library allocation
page read and write
197B86E9000
trusted library allocation
page read and write
21016F00000
trusted library allocation
page read and write
21017158000
heap
page read and write
197B02A5000
trusted library allocation
page read and write
197B0180000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197A7273000
heap
page read and write
3EDB03E000
unkown
page readonly
197ABC9E000
trusted library allocation
page read and write
197AFD2C000
heap
page read and write
197B8523000
trusted library allocation
page read and write
197B26A5000
trusted library allocation
page read and write
197B83D8000
trusted library allocation
page read and write
99D11FE000
stack
page read and write
197B15A7000
trusted library allocation
page read and write
23681C00000
trusted library allocation
page read and write
197A728D000
heap
page read and write
53F995E000
stack
page read and write
197B17DE000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B14ED000
trusted library allocation
page read and write
197BC187000
trusted library allocation
page read and write
197B87C3000
trusted library allocation
page read and write
197B1B88000
trusted library allocation
page read and write
197AFD3A000
heap
page read and write
197A7275000
heap
page read and write
23681CDB000
trusted library allocation
page read and write
197B14B5000
trusted library allocation
page read and write
197B9EB3000
trusted library allocation
page read and write
197ABCBF000
trusted library allocation
page read and write
197B83D1000
trusted library allocation
page read and write
197A72A6000
heap
page read and write
197B1AA1000
trusted library allocation
page read and write
197A7280000
heap
page read and write
197B97E5000
trusted library allocation
page read and write
197B1823000
trusted library allocation
page read and write
197BC0F2000
trusted library allocation
page read and write
197B89AD000
trusted library allocation
page read and write
197B005E000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B1C62000
trusted library allocation
page read and write
197B26B4000
trusted library allocation
page read and write
197AFD02000
heap
page read and write
15F4000
heap
page read and write
197B1BBE000
trusted library allocation
page read and write
197B860E000
trusted library allocation
page read and write
197B0949000
trusted library allocation
page read and write
197AD481000
trusted library allocation
page read and write
53F991E000
unkown
page readonly
197B3E09000
trusted library allocation
page read and write
197B960A000
trusted library allocation
page read and write
197B0D17000
trusted library allocation
page read and write
197B9CB9000
trusted library allocation
page read and write
197B1A89000
trusted library allocation
page read and write
197B17F7000
trusted library allocation
page read and write
197A724A000
heap
page read and write
197B1AF1000
trusted library allocation
page read and write
197B37DB000
trusted library allocation
page read and write
197AD2F2000
trusted library allocation
page read and write
197B139E000
trusted library allocation
page read and write
197A7273000
heap
page read and write
197B87DE000
trusted library allocation
page read and write
197BC85D000
trusted library allocation
page read and write
23681C11000
trusted library allocation
page read and write
197B29D2000
trusted library allocation
page read and write
197AFAA9000
trusted library allocation
page read and write
197BC199000
trusted library allocation
page read and write
197B1AB6000
trusted library allocation
page read and write
197B382B000
trusted library allocation
page read and write
197B8362000
trusted library allocation
page read and write
197AF9ED000
trusted library allocation
page read and write
23681DD0000
heap
page read and write
197BC2EA000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197B02E4000
trusted library allocation
page read and write
197B84D4000
trusted library allocation
page read and write
197A7261000
heap
page read and write
197B1AA9000
trusted library allocation
page read and write
197B02F5000
trusted library allocation
page read and write
197B13A9000
trusted library allocation
page read and write
197B14DB000
trusted library allocation
page read and write
197A725C000
heap
page read and write
197B17FE000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197B8332000
trusted library allocation
page read and write
197B9CE8000
trusted library allocation
page read and write
197B85DE000
trusted library allocation
page read and write
197BB19E000
trusted library allocation
page read and write
197B9C8D000
trusted library allocation
page read and write
197A72A6000
heap
page read and write
197B1BE1000
trusted library allocation
page read and write
197AD5EB000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197A72B3000
heap
page read and write
197A724C000
heap
page read and write
197A726F000
heap
page read and write
197B29D2000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197A7261000
heap
page read and write
197B006D000
trusted library allocation
page read and write
197B18E4000
trusted library allocation
page read and write
197B1652000
trusted library allocation
page read and write
197B8F9D000
trusted library allocation
page read and write
210162C0000
unclassified section
page read and write
197B13C9000
trusted library allocation
page read and write
197B1B80000
trusted library allocation
page read and write
197B9695000
trusted library allocation
page read and write
197B1CC1000
trusted library allocation
page read and write
197B3BAD000
trusted library allocation
page read and write
197B0D42000
trusted library allocation
page read and write
197B1B92000
trusted library allocation
page read and write
3DC1000
heap
page read and write
197AC3D6000
trusted library allocation
page read and write
21016512000
trusted library allocation
page read and write
6F127FF000
stack
page read and write
197A727B000
heap
page read and write
197B0D80000
trusted library allocation
page read and write
197B14F4000
trusted library allocation
page read and write
197B02D6000
trusted library allocation
page read and write
197B149E000
trusted library allocation
page read and write
197B388A000
trusted library allocation
page read and write
197B177C000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B89E7000
trusted library allocation
page read and write
197B82F9000
trusted library allocation
page read and write
197BC0C8000
trusted library allocation
page read and write
23681910000
heap
page read and write
197A7250000
heap
page read and write
1873B95B000
trusted library allocation
page read and write
23681AEF000
unclassified section
page read and write
197AD4B8000
trusted library allocation
page read and write
197B96BC000
trusted library allocation
page read and write
197B14C7000
trusted library allocation
page read and write
197B1AA9000
trusted library allocation
page read and write
197AFD3B000
heap
page read and write
197BC901000
heap
page read and write
197B02A7000
trusted library allocation
page read and write
197B8560000
trusted library allocation
page read and write
3EDAF3E000
unkown
page readonly
197A726E000
heap
page read and write
197B05EB000
trusted library allocation
page read and write
197B89E1000
trusted library allocation
page read and write
197B82D6000
trusted library allocation
page read and write
197B83BA000
trusted library allocation
page read and write
197B165F000
trusted library allocation
page read and write
197B3B44000
trusted library allocation
page read and write
197B098F000
trusted library allocation
page read and write
197B1C69000
trusted library allocation
page read and write
197AD4A2000
trusted library allocation
page read and write
197B13B9000
trusted library allocation
page read and write
197AFD0D000
heap
page read and write
197B1A9C000
trusted library allocation
page read and write
197B1458000
trusted library allocation
page read and write
197BC16D000
trusted library allocation
page read and write
197BA057000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197BBAF0000
trusted library allocation
page read and write
197B38EC000
trusted library allocation
page read and write
197B8966000
trusted library allocation
page read and write
6F117FE000
stack
page read and write
197B17A0000
trusted library allocation
page read and write
197AD40D000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197B157F000
trusted library allocation
page read and write
197B023D000
trusted library allocation
page read and write
197BC2E1000
trusted library allocation
page read and write
197B1BF7000
trusted library allocation
page read and write
197B0943000
trusted library allocation
page read and write
2101705C000
heap
page read and write
197B1BFC000
trusted library allocation
page read and write
197B02D2000
trusted library allocation
page read and write
197A726C000
heap
page read and write
197B009D000
trusted library allocation
page read and write
197B2650000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197A7250000
heap
page read and write
197B0D07000
trusted library allocation
page read and write
197A7245000
heap
page read and write
197BC143000
trusted library allocation
page read and write
197BC971000
heap
page read and write
197AFD08000
heap
page read and write
21017001000
heap
page read and write
197B18E0000
trusted library allocation
page read and write
197BC7E2000
trusted library allocation
page read and write
197B1A33000
trusted library allocation
page read and write
197A7265000
heap
page read and write
197B83FB000
trusted library allocation
page read and write
197A724F000
heap
page read and write
197B2D27000
trusted library allocation
page read and write
197BC1D8000
trusted library allocation
page read and write
197AFD3A000
heap
page read and write
197B1A95000
trusted library allocation
page read and write
197B02D2000
trusted library allocation
page read and write
197B0D3A000
trusted library allocation
page read and write
197B28BB000
trusted library allocation
page read and write
197BC2E1000
trusted library allocation
page read and write
197B9CED000
trusted library allocation
page read and write
197B8FA8000
trusted library allocation
page read and write
197A7251000
heap
page read and write
197AD548000
trusted library allocation
page read and write
197B1AA4000
trusted library allocation
page read and write
197A7275000
heap
page read and write
197AF9E1000
trusted library allocation
page read and write
197B028B000
trusted library allocation
page read and write
197A726E000
heap
page read and write
15E4000
heap
page read and write
197B87DA000
trusted library allocation
page read and write
197B1CA7000
trusted library allocation
page read and write
197B89A2000
trusted library allocation
page read and write
197BC9B6000
heap
page read and write
197BC7FB000
trusted library allocation
page read and write
197B149E000
trusted library allocation
page read and write
197AD48A000
trusted library allocation
page read and write
197B87FB000
trusted library allocation
page read and write
197A726E000
heap
page read and write
197B37B8000
trusted library allocation
page read and write
197B9C85000
trusted library allocation
page read and write
197B0DBA000
trusted library allocation
page read and write
197B2DCE000
trusted library allocation
page read and write
197BC0CD000
trusted library allocation
page read and write
197B378C000
trusted library allocation
page read and write
197B966C000
trusted library allocation
page read and write
197AFD02000
heap
page read and write
197A7273000
heap
page read and write
197B87FB000
trusted library allocation
page read and write
197B1A5B000
trusted library allocation
page read and write
2101707D000
heap
page read and write
99CF64E000
stack
page read and write
197BC9EC000
heap
page read and write
197A7265000
heap
page read and write
197B29D6000
trusted library allocation
page read and write
197B84CA000
trusted library allocation
page read and write
197A7273000
heap
page read and write
15DE000
heap
page read and write
197B18DE000
trusted library allocation
page read and write
197B17FB000
trusted library allocation
page read and write
197B8FA8000
trusted library allocation
page read and write
197B1BCF000
trusted library allocation
page read and write
197A7262000
heap
page read and write
197AFA62000
trusted library allocation
page read and write
197B2D34000
trusted library allocation
page read and write
197B25D4000
trusted library allocation
page read and write
197B02E9000
trusted library allocation
page read and write
197B84DF000
trusted library allocation
page read and write
23681C0C000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
6F107FF000
stack
page read and write
1873B964000
trusted library allocation
page read and write
197B00D2000
trusted library allocation
page read and write
197AFD3A000
heap
page read and write
197B0D35000
trusted library allocation
page read and write
197B137C000
trusted library allocation
page read and write
197B86CB000
trusted library allocation
page read and write
197A726D000
heap
page read and write
197B9695000
trusted library allocation
page read and write
197AD494000
trusted library allocation
page read and write
197B188B000
trusted library allocation
page read and write
197BC1D8000
trusted library allocation
page read and write
197B2DE0000
trusted library allocation
page read and write
14CE000
stack
page read and write
197B87B7000
trusted library allocation
page read and write
197B016C000
trusted library allocation
page read and write
1873B530000
remote allocation
page read and write
197BC2A5000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197AD4B8000
trusted library allocation
page read and write
197B0107000
trusted library allocation
page read and write
197B84B5000
trusted library allocation
page read and write
15F3000
heap
page read and write
197B86FB000
trusted library allocation
page read and write
197BC08A000
trusted library allocation
page read and write
197AD55F000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
197A726E000
heap
page read and write
197B029D000
trusted library allocation
page read and write
197B84D6000
trusted library allocation
page read and write
197B265D000
trusted library allocation
page read and write
197BC1F4000
trusted library allocation
page read and write
197AFD1B000
heap
page read and write
197B29CB000
trusted library allocation
page read and write
197A724C000
heap
page read and write
197B9E86000
trusted library allocation
page read and write
197B8316000
trusted library allocation
page read and write
197B0541000
trusted library allocation
page read and write
197A7252000
heap
page read and write
197B18EE000
trusted library allocation
page read and write
197A728D000
heap
page read and write
197B3B71000
trusted library allocation
page read and write
197B9648000
trusted library allocation
page read and write
197B0943000
trusted library allocation
page read and write
21017121000
heap
page read and write
15EE000
heap
page read and write
197B0527000
trusted library allocation
page read and write
197B0D35000
trusted library allocation
page read and write
197AFA2A000
trusted library allocation
page read and write
197A7250000
heap
page read and write
197AC223000
trusted library allocation
page read and write
197B13DE000
trusted library allocation
page read and write
197B189D000
trusted library allocation
page read and write
197B8FA9000
trusted library allocation
page read and write
197B173E000
trusted library allocation
page read and write
197B1C69000
trusted library allocation
page read and write
197B841A000
trusted library allocation
page read and write
197B165F000
trusted library allocation
page read and write
197B885D000
trusted library allocation
page read and write
197BC850000
trusted library allocation
page read and write
14D4000
heap
page read and write
197B1C1E000
trusted library allocation
page read and write
197B86ED000
trusted library allocation
page read and write
23681A90000
heap
page read and write
197B26F8000
trusted library allocation
page read and write
197B1CF3000
trusted library allocation
page read and write
210162CF000
unclassified section
page read and write
23681F07000
trusted library allocation
page read and write
197B17A8000
trusted library allocation
page read and write
197BC901000
heap
page read and write
197B3BEF000
trusted library allocation
page read and write
197B2D6A000
trusted library allocation
page read and write
197B8334000
trusted library allocation
page read and write
99D39FE000
unkown
page readonly
197A728D000
heap
page read and write
197B8994000
trusted library allocation
page read and write
197B1AF1000
trusted library allocation
page read and write
197B02D6000
trusted library allocation
page read and write
197B17A8000
trusted library allocation
page read and write
197A727B000
heap
page read and write
3EDAF7E000
stack
page read and write
197BC023000
trusted library allocation
page read and write
197B1A83000
trusted library allocation
page read and write
197A7267000
heap
page read and write
197A724A000
heap
page read and write
197B019E000
trusted library allocation
page read and write
197B14F4000
trusted library allocation
page read and write
2101618A000
heap
page read and write
197AD5F8000
trusted library allocation
page read and write
197B177E000
trusted library allocation
page read and write
197AF98B000
trusted library allocation
page read and write
197A728D000
heap
page read and write
197A7269000
heap
page read and write
21016510000
trusted library allocation
page read and write
197B01CE000
trusted library allocation
page read and write
23681DE0000
heap
page read and write
197B1664000
trusted library allocation
page read and write
197B3BB8000
trusted library allocation
page read and write
197B1BFE000
trusted library allocation
page read and write
197B38D1000
trusted library allocation
page read and write
197BC856000
trusted library allocation
page read and write
197B8864000
trusted library allocation
page read and write
21016F2B000
trusted library allocation
page read and write
197B2664000
trusted library allocation
page read and write
197B02D6000
trusted library allocation
page read and write
197BC7C0000
trusted library allocation
page read and write
197B02C0000
trusted library allocation
page read and write
197AFD19000
heap
page read and write
23681C72000
trusted library allocation
page read and write
21016496000
heap
page read and write
197B9F43000
trusted library allocation
page read and write
197A7281000
heap
page read and write
197AD54D000
trusted library allocation
page read and write
197A72A1000
heap
page read and write
197AC3BC000
trusted library allocation
page read and write
197B88E5000
trusted library allocation
page read and write
197B84A5000
trusted library allocation
page read and write
197B9FA3000
trusted library allocation
page read and write
197B1A3D000
trusted library allocation
page read and write
197AF9EF000
trusted library allocation
page read and write
197B1BFE000
trusted library allocation
page read and write
197B1C88000
trusted library allocation
page read and write
197B0097000
trusted library allocation
page read and write
197B96CC000
trusted library allocation
page read and write
197AD4B6000
trusted library allocation
page read and write
197B0D8A000
trusted library allocation
page read and write
197A7256000
heap
page read and write
197B0D0F000
trusted library allocation
page read and write
197B28FD000
trusted library allocation
page read and write
197B1CA4000
trusted library allocation
page read and write
197A7234000
heap
page read and write
197AC276000
trusted library allocation
page read and write
197B1BD2000
trusted library allocation
page read and write
197B89B0000
trusted library allocation
page read and write
197BC810000
trusted library allocation
page read and write
197B3941000
trusted library allocation
page read and write
197AFD1B000
heap
page read and write
197B2D93000
trusted library allocation
page read and write
197B1334000
trusted library allocation
page read and write
197A7269000
heap
page read and write
197B0DA2000
trusted library allocation
page read and write
197B84C1000
trusted library allocation
page read and write
197B3797000
trusted library allocation
page read and write
197BC155000
trusted library allocation
page read and write
197BC08F000
trusted library allocation
page read and write
197B0D3A000
trusted library allocation
page read and write
197A727B000
heap
page read and write
197B3824000
trusted library allocation
page read and write
197AFD0C000
heap
page read and write
197AD2D3000
trusted library allocation
page read and write
197B0969000
trusted library allocation
page read and write
197B397A000
trusted library allocation
page read and write
197A7256000
heap
page read and write
18B51200000
trusted library allocation
page read and write
197B1CB8000
trusted library allocation
page read and write
197AFD24000
heap
page read and write
197BC077000
trusted library allocation
page read and write
197A7252000
heap
page read and write
197BC96E000
heap
page read and write
197B165B000
trusted library allocation
page read and write
197B14AB000
trusted library allocation
page read and write
197B178B000
trusted library allocation
page read and write
197B1AA4000
trusted library allocation
page read and write
197BC1D6000
trusted library allocation
page read and write
B6D1FFF000
stack
page read and write
197B1BBE000
trusted library allocation
page read and write
197B39F3000
trusted library allocation
page read and write
197BC155000
trusted library allocation
page read and write
197B05D9000
trusted library allocation
page read and write
197B0D5F000
trusted library allocation
page read and write
197B0510000
trusted library allocation
page read and write
197AFD99000
heap
page read and write
99CF68E000
unkown
page readonly
53FC43E000
stack
page read and write
There are 3838 hidden memdumps, click here to show them.