IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_6177e2b9-43cc-41b6-a182-369489dad001.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_6177e2b9-43cc-41b6-a182-369489dad001.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2192 -parentBuildID 20230927232528 -prefsHandle 2112 -prefMapHandle 2104 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {040d475b-23ba-41dd-9d91-b13c1b78ef59} 6360 "\\.\pipe\gecko-crash-server-pipe.6360" 183c576f910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2932 -parentBuildID 20230927232528 -prefsHandle 3668 -prefMapHandle 2972 -prefsLen 26395 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b8d51fc-0657-487f-8152-6ceae56b69c7} 6360 "\\.\pipe\gecko-crash-server-pipe.6360" 183d8109810 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2856 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5160 -prefMapHandle 5148 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3119b2c9-f0ad-4ad1-b076-5d919132fb83} 6360 "\\.\pipe\gecko-crash-server-pipe.6360" 183dd19b910 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
http://mozilla.o
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
http://detectportal.firefox.comP
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://crl3.digice
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
s-part-0035.t-0009.t-msedge.net
13.107.246.63
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.251.37.46
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.18.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 22 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
142.251.37.46
youtube.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
183D2EB9000
heap
page read and write
1B24F330000
heap
page read and write
183D2B73000
trusted library allocation
page read and write
183D8BC3000
trusted library allocation
page read and write
183D2CC3000
trusted library allocation
page read and write
183D1654000
trusted library allocation
page read and write
183DD1DC000
trusted library allocation
page read and write
183E0876000
trusted library allocation
page read and write
183D6750000
trusted library allocation
page read and write
183CC5BA000
heap
page read and write
183D78E2000
trusted library allocation
page read and write
183D7655000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183D5768000
trusted library allocation
page read and write
183E088F000
trusted library allocation
page read and write
183DD1C6000
trusted library allocation
page read and write
D8E000
stack
page read and write
25993C7B000
heap
page read and write
183D31A2000
trusted library allocation
page read and write
183DFFCB000
trusted library allocation
page read and write
183DD16D000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183D7733000
trusted library allocation
page read and write
183DD375000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183CC59E000
heap
page read and write
183CC55E000
heap
page read and write
183E0DB7000
trusted library allocation
page read and write
183E0D67000
trusted library allocation
page read and write
183E0E2C000
trusted library allocation
page read and write
183DD5D9000
trusted library allocation
page read and write
183D74DD000
trusted library allocation
page read and write
183CC571000
heap
page read and write
183CC5D4000
heap
page read and write
183E1AF9000
trusted library allocation
page read and write
1B24F3B6000
heap
page read and write
183D515A000
trusted library allocation
page read and write
183D558D000
trusted library allocation
page read and write
183D7768000
trusted library allocation
page read and write
183E0D85000
trusted library allocation
page read and write
183DFA78000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183E1B04000
trusted library allocation
page read and write
183E0D8D000
trusted library allocation
page read and write
183E0DA9000
trusted library allocation
page read and write
183CC5C9000
heap
page read and write
1B24F3C1000
heap
page read and write
183DD4B1000
trusted library allocation
page read and write
183D26D4000
trusted library allocation
page read and write
183D976B000
heap
page read and write
183CC59E000
heap
page read and write
183DF9C3000
trusted library allocation
page read and write
183D7773000
trusted library allocation
page read and write
183D75E5000
trusted library allocation
page read and write
183D8D72000
trusted library allocation
page read and write
1B24ECE6000
heap
page read and write
183D38B6000
trusted library allocation
page read and write
183DD582000
trusted library allocation
page read and write
183CC575000
heap
page read and write
183CC560000
heap
page read and write
183D7333000
trusted library allocation
page read and write
183D1675000
trusted library allocation
page read and write
183DF189000
trusted library allocation
page read and write
2994CD79000
trusted library allocation
page read and write
183D7A3E000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183CC5BA000
heap
page read and write
183E08DD000
trusted library allocation
page read and write
183D8126000
trusted library allocation
page read and write
38722FE000
unkown
page readonly
183E0D49000
trusted library allocation
page read and write
183D38C7000
trusted library allocation
page read and write
2423E018000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183D515A000
trusted library allocation
page read and write
25992300000
trusted library allocation
page read and write
183D7777000
trusted library allocation
page read and write
183D813C000
trusted library allocation
page read and write
183D8041000
trusted library allocation
page read and write
183D776B000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D6CAA000
trusted library allocation
page read and write
183D6FBD000
trusted library allocation
page read and write
45C0EE03000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183D577C000
trusted library allocation
page read and write
183DD37B000
trusted library allocation
page read and write
183D9BC6000
trusted library allocation
page read and write
183D7CE4000
trusted library allocation
page read and write
183D9366000
trusted library allocation
page read and write
DE4000
heap
page read and write
183D1626000
trusted library allocation
page read and write
183DFE9C000
trusted library allocation
page read and write
2994C9A6000
heap
page read and write
26C000
unkown
page readonly
183CC596000
heap
page read and write
36C1000
heap
page read and write
183D8045000
trusted library allocation
page read and write
1B24EAC0000
unkown
page execute read
183DFEDC000
trusted library allocation
page read and write
183DD94B000
trusted library allocation
page read and write
EE0000
heap
page read and write
183DFFEA000
trusted library allocation
page read and write
183D55DE000
trusted library allocation
page read and write
1B24F3BE000
heap
page read and write
183D775D000
trusted library allocation
page read and write
183DFEDC000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D8DAE000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183CC5C9000
heap
page read and write
183D2C38000
trusted library allocation
page read and write
183DFBBA000
trusted library allocation
page read and write
1B24F33C000
heap
page read and write
183DFBB8000
trusted library allocation
page read and write
183D5596000
trusted library allocation
page read and write
183D55AE000
trusted library allocation
page read and write
183DD193000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D5136000
trusted library allocation
page read and write
183D74B4000
trusted library allocation
page read and write
183DF9CE000
trusted library allocation
page read and write
183D7602000
trusted library allocation
page read and write
183D8BDC000
trusted library allocation
page read and write
183D7C4B000
trusted library allocation
page read and write
2423E0AE000
trusted library allocation
page read and write
183E08AE000
trusted library allocation
page read and write
183D2CB1000
trusted library allocation
page read and write
183DD925000
trusted library allocation
page read and write
183D269A000
trusted library allocation
page read and write
183DD777000
trusted library allocation
page read and write
183D8DB6000
trusted library allocation
page read and write
183DD7E7000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183DFF9C000
trusted library allocation
page read and write
183D75C6000
trusted library allocation
page read and write
183D67A3000
trusted library allocation
page read and write
183CC5BA000
heap
page read and write
183D8E04000
trusted library allocation
page read and write
183D3186000
trusted library allocation
page read and write
183E08E1000
trusted library allocation
page read and write
183D78E2000
trusted library allocation
page read and write
183D5DDA000
trusted library allocation
page read and write
183D2CDE000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183CC55F000
heap
page read and write
183D92FC000
trusted library allocation
page read and write
183E08DD000
trusted library allocation
page read and write
183D55BE000
trusted library allocation
page read and write
1B24ED68000
trusted library allocation
page read and write
183D5687000
trusted library allocation
page read and write
183D760A000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183E0D99000
trusted library allocation
page read and write
183D67A3000
trusted library allocation
page read and write
183DD5E7000
trusted library allocation
page read and write
183D9B4D000
trusted library allocation
page read and write
183DD23C000
trusted library allocation
page read and write
183DD317000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183D777E000
trusted library allocation
page read and write
183D2B6B000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183E0DA9000
trusted library allocation
page read and write
183CC5BA000
heap
page read and write
38711FE000
unkown
page readonly
183D5FF3000
trusted library allocation
page read and write
183D55F1000
trusted library allocation
page read and write
1B24ED6F000
trusted library allocation
page read and write
183E0D85000
trusted library allocation
page read and write
183D9B3E000
trusted library allocation
page read and write
183E08DD000
trusted library allocation
page read and write
183D6748000
trusted library allocation
page read and write
183DF1CF000
trusted library allocation
page read and write
C280FFE000
stack
page read and write
183CC55E000
heap
page read and write
183CC58B000
heap
page read and write
183D5678000
trusted library allocation
page read and write
183DF9B7000
trusted library allocation
page read and write
183DFA44000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D2CC7000
trusted library allocation
page read and write
183D8D91000
trusted library allocation
page read and write
183DF1E5000
trusted library allocation
page read and write
183D38BB000
trusted library allocation
page read and write
183DD240000
trusted library allocation
page read and write
183D673C000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
1B24F32C000
heap
page read and write
183D759F000
trusted library allocation
page read and write
2423DE84000
heap
page read and write
183D709A000
trusted library allocation
page read and write
183D267D000
trusted library allocation
page read and write
183D55A5000
trusted library allocation
page read and write
2994CDC4000
trusted library allocation
page read and write
183CC584000
heap
page read and write
183DD229000
trusted library allocation
page read and write
183DD23B000
trusted library allocation
page read and write
183D2E82000
heap
page read and write
183CC5C9000
heap
page read and write
183DD7F6000
trusted library allocation
page read and write
183D759A000
trusted library allocation
page read and write
2994CC00000
trusted library allocation
page read and write
183DFF52000
trusted library allocation
page read and write
183D70CE000
trusted library allocation
page read and write
183DF1CE000
trusted library allocation
page read and write
183D385E000
trusted library allocation
page read and write
25993C76000
heap
page read and write
183D73C5000
trusted library allocation
page read and write
183DF133000
trusted library allocation
page read and write
183D514D000
trusted library allocation
page read and write
1B24F969000
heap
page read and write
183DD4FC000
trusted library allocation
page read and write
183D74D0000
trusted library allocation
page read and write
183CC58D000
heap
page read and write
183DF149000
trusted library allocation
page read and write
183D2EF1000
heap
page read and write
183CC575000
heap
page read and write
183E0400000
trusted library allocation
page read and write
183E0EA5000
trusted library allocation
page read and write
2423DCBA000
heap
page read and write
386EF4E000
unkown
page readonly
183CC5CF000
heap
page read and write
183D74D7000
trusted library allocation
page read and write
183D0FDF000
trusted library allocation
page read and write
183D6CDC000
trusted library allocation
page read and write
183CC56F000
heap
page read and write
183D2E82000
heap
page read and write
183DFA52000
trusted library allocation
page read and write
183DD881000
trusted library allocation
page read and write
183D74C0000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183CC59E000
heap
page read and write
183D38B2000
trusted library allocation
page read and write
C2FFCFE000
stack
page read and write
183CC59E000
heap
page read and write
183D80C0000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D519E000
trusted library allocation
page read and write
183D7761000
trusted library allocation
page read and write
183D72D1000
trusted library allocation
page read and write
183D625F000
trusted library allocation
page read and write
183DD5E0000
trusted library allocation
page read and write
183DFFB5000
trusted library allocation
page read and write
183D567F000
trusted library allocation
page read and write
183CC575000
heap
page read and write
183D67F4000
trusted library allocation
page read and write
183D76ED000
trusted library allocation
page read and write
183D2CA3000
trusted library allocation
page read and write
183D579E000
trusted library allocation
page read and write
183D2EBF000
heap
page read and write
183D2C3D000
trusted library allocation
page read and write
183CC5D4000
heap
page read and write
183DFA89000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183DFF56000
trusted library allocation
page read and write
183D2C20000
trusted library allocation
page read and write
F18000
heap
page read and write
183DD1D4000
trusted library allocation
page read and write
183D7569000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183E0DA5000
trusted library allocation
page read and write
183D384A000
trusted library allocation
page read and write
183DD5F0000
trusted library allocation
page read and write
183D5D45000
trusted library allocation
page read and write
183CC5D9000
heap
page read and write
1B24F3B8000
heap
page read and write
183CC585000
heap
page read and write
1B24E94A000
heap
page read and write
183DD8D3000
trusted library allocation
page read and write
183D319C000
trusted library allocation
page read and write
183D748A000
trusted library allocation
page read and write
183D3153000
trusted library allocation
page read and write
183D64FE000
trusted library allocation
page read and write
183DD8AD000
trusted library allocation
page read and write
183E0EC3000
trusted library allocation
page read and write
183DFFF5000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D26D4000
trusted library allocation
page read and write
183D2EA7000
heap
page read and write
183D518B000
trusted library allocation
page read and write
183D70CC000
trusted library allocation
page read and write
183D73C5000
trusted library allocation
page read and write
183D728C000
trusted library allocation
page read and write
183D774F000
trusted library allocation
page read and write
183D7CA0000
trusted library allocation
page read and write
183D77C6000
trusted library allocation
page read and write
183DD82E000
trusted library allocation
page read and write
183D77B8000
trusted library allocation
page read and write
183D70CC000
trusted library allocation
page read and write
183D75AF000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183E156A000
trusted library allocation
page read and write
183CC5D9000
heap
page read and write
2423E203000
trusted library allocation
page read and write
183D1619000
trusted library allocation
page read and write
183D38CC000
trusted library allocation
page read and write
183CC5C4000
heap
page read and write
183D1643000
trusted library allocation
page read and write
183DF1B5000
trusted library allocation
page read and write
183D5DA9000
trusted library allocation
page read and write
BBE000
stack
page read and write
183CC5D4000
heap
page read and write
183D5DD8000
trusted library allocation
page read and write
183D26A3000
trusted library allocation
page read and write
183D77E7000
trusted library allocation
page read and write
183DD13B000
trusted library allocation
page read and write
183E0D4E000
trusted library allocation
page read and write
183D5FFC000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183E0602000
trusted library allocation
page read and write
183D55A7000
trusted library allocation
page read and write
183D55E2000
trusted library allocation
page read and write
1B24F3B0000
heap
page read and write
183DD915000
trusted library allocation
page read and write
183E1A18000
trusted library allocation
page read and write
183D5FFA000
trusted library allocation
page read and write
183DFBC2000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
DE4000
heap
page read and write
183D5665000
trusted library allocation
page read and write
183D318C000
trusted library allocation
page read and write
183D675A000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183DF1D3000
trusted library allocation
page read and write
183D55A7000
trusted library allocation
page read and write
183D57AA000
trusted library allocation
page read and write
183D383B000
trusted library allocation
page read and write
183D2C61000
trusted library allocation
page read and write
183E0EBB000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183DD897000
trusted library allocation
page read and write
183CC58E000
heap
page read and write
183D579B000
trusted library allocation
page read and write
183D5DAD000
trusted library allocation
page read and write
183D73A4000
trusted library allocation
page read and write
183D2EA1000
heap
page read and write
183DD848000
trusted library allocation
page read and write
183DFB08000
trusted library allocation
page read and write
183E0B00000
trusted library allocation
page read and write
183DD41B000
trusted library allocation
page read and write
183D74D0000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D6F96000
trusted library allocation
page read and write
183DF1D1000
trusted library allocation
page read and write
183D75A6000
trusted library allocation
page read and write
183DD4A8000
trusted library allocation
page read and write
183DD4E9000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D5112000
trusted library allocation
page read and write
183D553B000
trusted library allocation
page read and write
183DD5E3000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D9701000
heap
page read and write
183CC5BA000
heap
page read and write
183D5FE4000
trusted library allocation
page read and write
183D6023000
trusted library allocation
page read and write
183D164C000
trusted library allocation
page read and write
183D754A000
trusted library allocation
page read and write
183D55F1000
trusted library allocation
page read and write
183D8B4C000
trusted library allocation
page read and write
183DFC85000
trusted library allocation
page read and write
183E0D83000
trusted library allocation
page read and write
183D71FE000
trusted library allocation
page read and write
183D9706000
heap
page read and write
183E0E1B000
trusted library allocation
page read and write
183D78FB000
trusted library allocation
page read and write
F2F000
heap
page read and write
183DD883000
trusted library allocation
page read and write
183DFE65000
trusted library allocation
page read and write
183CC5C7000
heap
page read and write
183D78AF000
trusted library allocation
page read and write
183CC57D000
heap
page read and write
2423DE90000
heap
page read and write
F0C000
heap
page read and write
183CC5BA000
heap
page read and write
183DD244000
trusted library allocation
page read and write
183D7765000
trusted library allocation
page read and write
183D6289000
trusted library allocation
page read and write
183D74A6000
trusted library allocation
page read and write
183DD85F000
trusted library allocation
page read and write
183DF1E5000
trusted library allocation
page read and write
183D7765000
trusted library allocation
page read and write
183D674D000
trusted library allocation
page read and write
183E08A4000
trusted library allocation
page read and write
183D315C000
trusted library allocation
page read and write
183D93FC000
trusted library allocation
page read and write
183D26D9000
trusted library allocation
page read and write
183D8D72000
trusted library allocation
page read and write
183D2C2F000
trusted library allocation
page read and write
183DD8D6000
trusted library allocation
page read and write
183DD1AD000
trusted library allocation
page read and write
2423DEB0000
unclassified section
page readonly
1B24F330000
heap
page read and write
183E0DAB000
trusted library allocation
page read and write
183CC5D9000
heap
page read and write
183E0884000
trusted library allocation
page read and write
183E08A4000
trusted library allocation
page read and write
1B24EAE5000
unkown
page execute read
2423DF00000
trusted library allocation
page read and write
183E08C3000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183DD31A000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183D656F000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
1B24F339000
heap
page read and write
183D2E9E000
heap
page read and write
183D57FE000
trusted library allocation
page read and write
183D734C000
trusted library allocation
page read and write
183DD891000
trusted library allocation
page read and write
183DD5F1000
trusted library allocation
page read and write
183E0DB5000
trusted library allocation
page read and write
1B24EAB0000
trusted library allocation
page read and write
183D2E9E000
heap
page read and write
183DD8D6000
trusted library allocation
page read and write
183DF1D3000
trusted library allocation
page read and write
2423DE7F000
unclassified section
page read and write
2423E013000
trusted library allocation
page read and write
183D675E000
trusted library allocation
page read and write
29C000
unkown
page read and write
183D9B54000
trusted library allocation
page read and write
183E0D51000
trusted library allocation
page read and write
183E0D80000
trusted library allocation
page read and write
183DD897000
trusted library allocation
page read and write
183D7C90000
trusted library allocation
page read and write
183D556F000
trusted library allocation
page read and write
183DD5AF000
trusted library allocation
page read and write
183D2E9E000
heap
page read and write
183DFBBE000
trusted library allocation
page read and write
217BCC20000
heap
page read and write
1B24F3BE000
heap
page read and write
183CC5BB000
heap
page read and write
386EF8D000
stack
page read and write
183D319C000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183CC5C1000
heap
page read and write
183D602F000
trusted library allocation
page read and write
183D38C3000
trusted library allocation
page read and write
183D78AD000
trusted library allocation
page read and write
183D72D4000
trusted library allocation
page read and write
183D812F000
trusted library allocation
page read and write
183D8C7B000
trusted library allocation
page read and write
183DD117000
trusted library allocation
page read and write
183DF877000
trusted library allocation
page read and write
183D708E000
trusted library allocation
page read and write
1B24ED5F000
trusted library allocation
page read and write
183DFBC6000
trusted library allocation
page read and write
183D38FC000
trusted library allocation
page read and write
183DD8B6000
trusted library allocation
page read and write
183D9B22000
trusted library allocation
page read and write
183D26B1000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183D387D000
trusted library allocation
page read and write
183CC5D9000
heap
page read and write
183D55CD000
trusted library allocation
page read and write
183D38A7000
trusted library allocation
page read and write
183D80F7000
trusted library allocation
page read and write
183D6F79000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183DD1D4000
trusted library allocation
page read and write
183D26C7000
trusted library allocation
page read and write
183D67CB000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D5599000
trusted library allocation
page read and write
183DD2CD000
trusted library allocation
page read and write
183D31A2000
trusted library allocation
page read and write
183D1576000
trusted library allocation
page read and write
183DD85F000
trusted library allocation
page read and write
183DEB32000
trusted library allocation
page read and write
183DD2C3000
trusted library allocation
page read and write
183E084D000
trusted library allocation
page read and write
183D71D3000
trusted library allocation
page read and write
183D5ED9000
trusted library allocation
page read and write
183D75D9000
trusted library allocation
page read and write
183D75C5000
trusted library allocation
page read and write
183DD3DD000
trusted library allocation
page read and write
183CC58C000
heap
page read and write
183D75D1000
trusted library allocation
page read and write
183DD8F3000
trusted library allocation
page read and write
1B24F34D000
heap
page read and write
183CC5B6000
heap
page read and write
183D314C000
trusted library allocation
page read and write
183DD593000
trusted library allocation
page read and write
183D55E6000
trusted library allocation
page read and write
183CC5D1000
heap
page read and write
183E0D5E000
trusted library allocation
page read and write
183D7487000
trusted library allocation
page read and write
183D5EF7000
trusted library allocation
page read and write
183D5FC0000
trusted library allocation
page read and write
183DF1B7000
trusted library allocation
page read and write
183CC56C000
heap
page read and write
183CC5B6000
heap
page read and write
183D5112000
trusted library allocation
page read and write
183E0D80000
trusted library allocation
page read and write
183D31CB000
trusted library allocation
page read and write
183DD931000
trusted library allocation
page read and write
F29000
heap
page read and write
183CC5C1000
heap
page read and write
183E0D8D000
trusted library allocation
page read and write
183D74F8000
trusted library allocation
page read and write
183D728C000
trusted library allocation
page read and write
1B24F35A000
heap
page read and write
183CC55E000
heap
page read and write
183D38CA000
trusted library allocation
page read and write
183D674B000
trusted library allocation
page read and write
1B24EDBE000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
1B24F3CC000
heap
page read and write
183D55A0000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D5D2D000
trusted library allocation
page read and write
2599218A000
heap
page read and write
183DD385000
trusted library allocation
page read and write
183E0893000
trusted library allocation
page read and write
2423DE80000
heap
page read and write
183D9789000
heap
page read and write
183D7761000
trusted library allocation
page read and write
183D2B73000
trusted library allocation
page read and write
183CC576000
heap
page read and write
183D80BA000
trusted library allocation
page read and write
183E08F5000
trusted library allocation
page read and write
183D5562000
trusted library allocation
page read and write
1B24F3B8000
heap
page read and write
183D74A4000
trusted library allocation
page read and write
183DD5B7000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183CC560000
heap
page read and write
183DD335000
trusted library allocation
page read and write
183DD2F8000
trusted library allocation
page read and write
183D5FEA000
trusted library allocation
page read and write
183DDA94000
trusted library allocation
page read and write
183DFC66000
trusted library allocation
page read and write
183DD923000
trusted library allocation
page read and write
183CC573000
heap
page read and write
1B24F96D000
heap
page read and write
183CC5C1000
heap
page read and write
183DF852000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
1B24F97B000
heap
page read and write
183D1654000
trusted library allocation
page read and write
183CC5D4000
heap
page read and write
183CC596000
heap
page read and write
183D8B18000
trusted library allocation
page read and write
183D8B67000
trusted library allocation
page read and write
183DD250000
trusted library allocation
page read and write
183CC5BB000
heap
page read and write
183DD3DF000
trusted library allocation
page read and write
DE4000
heap
page read and write
183D7232000
trusted library allocation
page read and write
183D8D74000
trusted library allocation
page read and write
183D63D2000
trusted library allocation
page read and write
183D77CC000
trusted library allocation
page read and write
183D7C98000
trusted library allocation
page read and write
183D704F000
trusted library allocation
page read and write
183D8DFB000
trusted library allocation
page read and write
183DD9EF000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183D5D3E000
trusted library allocation
page read and write
183D9736000
heap
page read and write
183D80AA000
trusted library allocation
page read and write
183DD8D3000
trusted library allocation
page read and write
183E19FC000
trusted library allocation
page read and write
183D6519000
trusted library allocation
page read and write
183D77A8000
trusted library allocation
page read and write
183DD2B3000
trusted library allocation
page read and write
183D55F1000
trusted library allocation
page read and write
183D15F6000
trusted library allocation
page read and write
183D6021000
trusted library allocation
page read and write
183E088F000
trusted library allocation
page read and write
183DD2FA000
trusted library allocation
page read and write
183D75F8000
trusted library allocation
page read and write
183D77D2000
trusted library allocation
page read and write
1B24F9A7000
heap
page read and write
183DF1A4000
trusted library allocation
page read and write
183D15FB000
trusted library allocation
page read and write
183D7724000
trusted library allocation
page read and write
183D5163000
trusted library allocation
page read and write
2994CD6E000
trusted library allocation
page read and write
183E0D70000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183DD863000
trusted library allocation
page read and write
2423E030000
trusted library allocation
page read and write
183DD9EF000
trusted library allocation
page read and write
183DD91F000
trusted library allocation
page read and write
183D55AE000
trusted library allocation
page read and write
183D6CF4000
trusted library allocation
page read and write
2423DC90000
unclassified section
page readonly
183D77D7000
trusted library allocation
page read and write
183D5797000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183CC59E000
heap
page read and write
183D647B000
trusted library allocation
page read and write
183D269C000
trusted library allocation
page read and write
183D5645000
trusted library allocation
page read and write
183E0900000
trusted library allocation
page read and write
183D6FE2000
trusted library allocation
page read and write
183DD861000
trusted library allocation
page read and write
183DFCB4000
trusted library allocation
page read and write
183E08B8000
trusted library allocation
page read and write
183D3138000
trusted library allocation
page read and write
183CC568000
heap
page read and write
183D38AF000
trusted library allocation
page read and write
F29000
heap
page read and write
183CC58C000
heap
page read and write
183D2E7D000
heap
page read and write
183CC5D4000
heap
page read and write
183D77F4000
trusted library allocation
page read and write
1B24EDAC000
trusted library allocation
page read and write
183DD29F000
trusted library allocation
page read and write
183D75FD000
trusted library allocation
page read and write
217BC9C9000
heap
page read and write
183DF1F9000
trusted library allocation
page read and write
F15000
heap
page read and write
183D5DA2000
trusted library allocation
page read and write
183D9C14000
trusted library allocation
page read and write
183D608D000
trusted library allocation
page read and write
F15000
heap
page read and write
183D5D57000
trusted library allocation
page read and write
183D70B0000
trusted library allocation
page read and write
183D973F000
heap
page read and write
217BC940000
heap
page read and write
183DD4D2000
trusted library allocation
page read and write
183DFE97000
trusted library allocation
page read and write
183DD54A000
trusted library allocation
page read and write
183DD8F3000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183DF1F9000
trusted library allocation
page read and write
183E0D45000
trusted library allocation
page read and write
183D764D000
trusted library allocation
page read and write
183D76CC000
trusted library allocation
page read and write
183D8D8F000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183E0DA3000
trusted library allocation
page read and write
183D80EE000
trusted library allocation
page read and write
259924B0000
heap
page read and write
183CC560000
heap
page read and write
183D722F000
trusted library allocation
page read and write
183D55E6000
trusted library allocation
page read and write
183E0DAB000
trusted library allocation
page read and write
183D2C91000
trusted library allocation
page read and write
183DF141000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183DF186000
trusted library allocation
page read and write
183E0DB5000
trusted library allocation
page read and write
1B24F190000
heap
page read and write
183DD31D000
trusted library allocation
page read and write
183E086C000
trusted library allocation
page read and write
183E06A8000
trusted library allocation
page read and write
183DD8B6000
trusted library allocation
page read and write
183D6744000
trusted library allocation
page read and write
1B24ED03000
trusted library allocation
page read and write
183E0893000
trusted library allocation
page read and write
183D75A8000
trusted library allocation
page read and write
183D7733000
trusted library allocation
page read and write
183E153B000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
183D7CBC000
trusted library allocation
page read and write
183D756C000
trusted library allocation
page read and write
183E1A66000
trusted library allocation
page read and write
183D9404000
trusted library allocation
page read and write
183DDABF000
trusted library allocation
page read and write
2423DD30000
heap
page read and write
183D77C4000
trusted library allocation
page read and write
183D81AB000
trusted library allocation
page read and write
183D5BFE000
trusted library allocation
page read and write
183D577C000
trusted library allocation
page read and write
2423E063000
trusted library allocation
page read and write
183CC57F000
heap
page read and write
183D67FB000
trusted library allocation
page read and write
183D55E2000
trusted library allocation
page read and write
183D67AD000
trusted library allocation
page read and write
183D774F000
trusted library allocation
page read and write
183CC5BB000
heap
page read and write
183D16B9000
trusted library allocation
page read and write
183E0D83000
trusted library allocation
page read and write
183D26D9000
trusted library allocation
page read and write
F18000
heap
page read and write
183D6CCF000
trusted library allocation
page read and write
183D74E7000
trusted library allocation
page read and write
183D2EB5000
heap
page read and write
183DD5E3000
trusted library allocation
page read and write
183D674D000
trusted library allocation
page read and write
183D2C64000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183D7761000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183D2CDE000
trusted library allocation
page read and write
1B24F32C000
heap
page read and write
183E0E62000
trusted library allocation
page read and write
183D7CC5000
trusted library allocation
page read and write
183D2682000
trusted library allocation
page read and write
183E0DEA000
trusted library allocation
page read and write
183D73B1000
trusted library allocation
page read and write
183D78AD000
trusted library allocation
page read and write
183D56D4000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D578B000
trusted library allocation
page read and write
183D77F2000
trusted library allocation
page read and write
183D8B29000
trusted library allocation
page read and write
183CC5D4000
heap
page read and write
F1E000
heap
page read and write
183DD8B1000
trusted library allocation
page read and write
2AC9C12C000
trusted library allocation
page execute read
183D567F000
trusted library allocation
page read and write
183D7761000
trusted library allocation
page read and write
183D2BFC000
trusted library allocation
page read and write
183D65AB000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
F06000
heap
page read and write
183D6FDB000
trusted library allocation
page read and write
183DD897000
trusted library allocation
page read and write
183D7A1C000
trusted library allocation
page read and write
183DD94B000
trusted library allocation
page read and write
183CC58E000
heap
page read and write
183D709F000
trusted library allocation
page read and write
183E0DF2000
trusted library allocation
page read and write
183D2C5F000
trusted library allocation
page read and write
183E0D99000
trusted library allocation
page read and write
183D5DA9000
trusted library allocation
page read and write
183DFBC1000
trusted library allocation
page read and write
183DFC61000
trusted library allocation
page read and write
183DFCF9000
trusted library allocation
page read and write
183D557B000
trusted library allocation
page read and write
183D73BB000
trusted library allocation
page read and write
183D7A3C000
trusted library allocation
page read and write
183DD7FD000
trusted library allocation
page read and write
183D6750000
trusted library allocation
page read and write
183D74DD000
trusted library allocation
page read and write
183D76ED000
trusted library allocation
page read and write
183D55A5000
trusted library allocation
page read and write
183DD8A2000
trusted library allocation
page read and write
183D80C4000
trusted library allocation
page read and write
25992160000
heap
page read and write
183DFBC0000
trusted library allocation
page read and write
183CC5CC000
heap
page read and write
183DD41B000
trusted library allocation
page read and write
183D8DAB000
trusted library allocation
page read and write
183DD932000
trusted library allocation
page read and write
183D3188000
trusted library allocation
page read and write
183D16AE000
trusted library allocation
page read and write
183DD37E000
trusted library allocation
page read and write
183E0EF8000
trusted library allocation
page read and write
183D2C64000
trusted library allocation
page read and write
183D6437000
trusted library allocation
page read and write
183D77F9000
trusted library allocation
page read and write
183D8BED000
trusted library allocation
page read and write
183D383B000
trusted library allocation
page read and write
183DD24A000
trusted library allocation
page read and write
183E0DB2000
trusted library allocation
page read and write
183DD244000
trusted library allocation
page read and write
183D7866000
trusted library allocation
page read and write
183D2EA7000
heap
page read and write
183DD3E6000
trusted library allocation
page read and write
2994CDEB000
trusted library allocation
page read and write
183D55E6000
trusted library allocation
page read and write
183DFE8C000
trusted library allocation
page read and write
183E0878000
trusted library allocation
page read and write
183D5795000
trusted library allocation
page read and write
183E0DBD000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
183D57BA000
trusted library allocation
page read and write
183D8E3B000
trusted library allocation
page read and write
183DF1C7000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183D8DF3000
trusted library allocation
page read and write
183D2C8C000
trusted library allocation
page read and write
183E0D85000
trusted library allocation
page read and write
183D578B000
trusted library allocation
page read and write
183DF12A000
trusted library allocation
page read and write
183D70A1000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D67FB000
trusted library allocation
page read and write
1B24E8B0000
heap
page read and write
2423E0DB000
trusted library allocation
page read and write
183D67E7000
trusted library allocation
page read and write
183DFAE3000
trusted library allocation
page read and write
183E0DB5000
trusted library allocation
page read and write
2994CD96000
trusted library allocation
page read and write
183D77F2000
trusted library allocation
page read and write
183CC5D9000
heap
page read and write
183CC59E000
heap
page read and write
183DD200000
trusted library allocation
page read and write
183D80D1000
trusted library allocation
page read and write
183D75CF000
trusted library allocation
page read and write
183D7A42000
trusted library allocation
page read and write
183E08C4000
trusted library allocation
page read and write
183D75A6000
trusted library allocation
page read and write
183D7787000
trusted library allocation
page read and write
183D74CE000
trusted library allocation
page read and write
183D5FEC000
trusted library allocation
page read and write
183D2E51000
heap
page read and write
183E08B8000
trusted library allocation
page read and write
1B24EA50000
trusted library section
page readonly
183DDA92000
trusted library allocation
page read and write
183CC587000
heap
page read and write
183E0DD7000
trusted library allocation
page read and write
183D5FE6000
trusted library allocation
page read and write
183D16B9000
trusted library allocation
page read and write
183D7833000
trusted library allocation
page read and write
183D38FC000
trusted library allocation
page read and write
183DF848000
trusted library allocation
page read and write
183D6796000
trusted library allocation
page read and write
183D5570000
trusted library allocation
page read and write
183DD153000
trusted library allocation
page read and write
183D7BF6000
trusted library allocation
page read and write
183D7343000
trusted library allocation
page read and write
183DDADD000
trusted library allocation
page read and write
183D759F000
trusted library allocation
page read and write
183DD2D2000
trusted library allocation
page read and write
183D2E4D000
heap
page read and write
183DF137000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183D6771000
trusted library allocation
page read and write
183DD5D2000
trusted library allocation
page read and write
183DD33B000
trusted library allocation
page read and write
183D75D1000
trusted library allocation
page read and write
183DD9E8000
trusted library allocation
page read and write
183CC575000
heap
page read and write
183E08DD000
trusted library allocation
page read and write
183D7891000
trusted library allocation
page read and write
183D7084000
trusted library allocation
page read and write
183E1A5C000
trusted library allocation
page read and write
183D2C64000
trusted library allocation
page read and write
183DD5E7000
trusted library allocation
page read and write
183D81EF000
trusted library allocation
page read and write
183D70CE000
trusted library allocation
page read and write
183D558D000
trusted library allocation
page read and write
183D5FF3000
trusted library allocation
page read and write
183DD8B0000
trusted library allocation
page read and write
C2FDBD8000
stack
page read and write
183DD88D000
trusted library allocation
page read and write
183E0196000
trusted library allocation
page read and write
183D2A39000
trusted library allocation
page read and write
183D80B8000
trusted library allocation
page read and write
183D7035000
trusted library allocation
page read and write
183D7787000
trusted library allocation
page read and write
183DD280000
trusted library allocation
page read and write
183D16B2000
trusted library allocation
page read and write
2994C770000
unclassified section
page readonly
183D2EF2000
heap
page read and write
183DD89C000
trusted library allocation
page read and write
183D2B22000
trusted library allocation
page read and write
2423E05F000
trusted library allocation
page read and write
183DFF67000
trusted library allocation
page read and write
2423E000000
trusted library allocation
page read and write
183D2B65000
trusted library allocation
page read and write
183DD1E4000
trusted library allocation
page read and write
183DD9F3000
trusted library allocation
page read and write
183D5147000
trusted library allocation
page read and write
183DD74F000
trusted library allocation
page read and write
2423E200000
trusted library allocation
page read and write
1B24F969000
heap
page read and write
183D55AE000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D7014000
trusted library allocation
page read and write
183DD1C6000
trusted library allocation
page read and write
183D2C5F000
trusted library allocation
page read and write
183D57B4000
trusted library allocation
page read and write
DEE5BD8000
stack
page read and write
183D2C61000
trusted library allocation
page read and write
183E0DEE000
trusted library allocation
page read and write
183D7799000
trusted library allocation
page read and write
183D7753000
trusted library allocation
page read and write
183D3186000
trusted library allocation
page read and write
183D6F5A000
trusted library allocation
page read and write
183CC5D5000
heap
page read and write
183D0F98000
trusted library allocation
page read and write
183D8E61000
trusted library allocation
page read and write
183D9701000
heap
page read and write
183DFAD1000
trusted library allocation
page read and write
183E0DFC000
trusted library allocation
page read and write
183D7C1E000
trusted library allocation
page read and write
1B24E940000
heap
page read and write
183D7CDF000
trusted library allocation
page read and write
183E0D99000
trusted library allocation
page read and write
183D774F000
trusted library allocation
page read and write
183DFB2D000
trusted library allocation
page read and write
183D5647000
trusted library allocation
page read and write
386EF0B000
stack
page read and write
183E08B8000
trusted library allocation
page read and write
183E0EF8000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183CC5B6000
heap
page read and write
F39000
heap
page read and write
183D80F3000
trusted library allocation
page read and write
183D55BE000
trusted library allocation
page read and write
183DD470000
trusted library allocation
page read and write
183CC594000
heap
page read and write
25993DB0000
heap
page read and write
C281FFE000
stack
page read and write
2994CDAB000
trusted library allocation
page read and write
183D5768000
trusted library allocation
page read and write
183DDAF5000
trusted library allocation
page read and write
183DD94B000
trusted library allocation
page read and write
1B24F37A000
heap
page read and write
183D7376000
trusted library allocation
page read and write
183DFFC0000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183CC565000
heap
page read and write
183D5647000
trusted library allocation
page read and write
183D388F000
trusted library allocation
page read and write
183D770B000
trusted library allocation
page read and write
183DD94B000
trusted library allocation
page read and write
183D8BE9000
trusted library allocation
page read and write
183D76ED000
trusted library allocation
page read and write
183D38D5000
trusted library allocation
page read and write
183DF848000
trusted library allocation
page read and write
183DD7B4000
trusted library allocation
page read and write
183D9318000
trusted library allocation
page read and write
183D9701000
heap
page read and write
183D5136000
trusted library allocation
page read and write
183DFF50000
trusted library allocation
page read and write
183DD9FC000
trusted library allocation
page read and write
183D7355000
trusted library allocation
page read and write
1B24F3CC000
heap
page read and write
183CC594000
heap
page read and write
183D5582000
trusted library allocation
page read and write
183DD3DD000
trusted library allocation
page read and write
183D5D47000
trusted library allocation
page read and write
1B24E7D0000
unclassified section
page readonly
183E08D8000
trusted library allocation
page read and write
183DD9E8000
trusted library allocation
page read and write
25992180000
heap
page read and write
183D2CAD000
trusted library allocation
page read and write
183D6FE5000
trusted library allocation
page read and write
183D74F8000
trusted library allocation
page read and write
183D70C4000
trusted library allocation
page read and write
183D0F81000
trusted library allocation
page read and write
183D38B2000
trusted library allocation
page read and write
1B24ED23000
trusted library allocation
page read and write
183E0DC0000
trusted library allocation
page read and write
183DD1B8000
trusted library allocation
page read and write
183DFE65000
trusted library allocation
page read and write
183D16AE000
trusted library allocation
page read and write
183D167D000
trusted library allocation
page read and write
183DF1C7000
trusted library allocation
page read and write
183E08F4000
trusted library allocation
page read and write
183D7490000
trusted library allocation
page read and write
183E0DD0000
trusted library allocation
page read and write
183D16AE000
trusted library allocation
page read and write
183E0DA7000
trusted library allocation
page read and write
183D75F8000
trusted library allocation
page read and write
2423E070000
trusted library allocation
page read and write
183DDA8E000
trusted library allocation
page read and write
183DFF9C000
trusted library allocation
page read and write
183D80C8000
trusted library allocation
page read and write
183E0DA1000
trusted library allocation
page read and write
183DFB1E000
trusted library allocation
page read and write
183D5570000
trusted library allocation
page read and write
9EB09FF000
stack
page read and write
183E08A4000
trusted library allocation
page read and write
183E0876000
trusted library allocation
page read and write
183DF8E2000
trusted library allocation
page read and write
183D80B6000
trusted library allocation
page read and write
183DFBBA000
trusted library allocation
page read and write
183DF84B000
trusted library allocation
page read and write
183DD84F000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
183D6F39000
trusted library allocation
page read and write
183D2EA7000
heap
page read and write
183CC594000
heap
page read and write
183CC575000
heap
page read and write
183CC596000
heap
page read and write
1B24F3B8000
heap
page read and write
183D7733000
trusted library allocation
page read and write
183DFA73000
trusted library allocation
page read and write
183D269C000
trusted library allocation
page read and write
183DFBBE000
trusted library allocation
page read and write
183D67E7000
trusted library allocation
page read and write
183DFA9B000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183DF15B000
trusted library allocation
page read and write
183DD21E000
trusted library allocation
page read and write
183DF1A4000
trusted library allocation
page read and write
1B24F9A7000
heap
page read and write
183D5DA2000
trusted library allocation
page read and write
183DF1C7000
trusted library allocation
page read and write
183DFAA5000
trusted library allocation
page read and write
183DFAB2000
trusted library allocation
page read and write
183D16E9000
trusted library allocation
page read and write
183D556F000
trusted library allocation
page read and write
183CC56F000
heap
page read and write
183D93CA000
trusted library allocation
page read and write
183E0E3E000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D31A2000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183DFFF3000
trusted library allocation
page read and write
183E0D4F000
trusted library allocation
page read and write
183E08E9000
trusted library allocation
page read and write
183CC584000
heap
page read and write
183E0200000
trusted library allocation
page read and write
183D1651000
trusted library allocation
page read and write
183D778A000
trusted library allocation
page read and write
183D74CE000
trusted library allocation
page read and write
183D2BE1000
trusted library allocation
page read and write
1B24F33C000
heap
page read and write
183DF1D1000
trusted library allocation
page read and write
183D5DF8000
trusted library allocation
page read and write
183D5BA8000
trusted library allocation
page read and write
183D6CF1000
trusted library allocation
page read and write
183D2C32000
trusted library allocation
page read and write
183D678E000
trusted library allocation
page read and write
183D7714000
trusted library allocation
page read and write
183CC5CF000
heap
page read and write
183E08DA000
trusted library allocation
page read and write
183D2CF4000
trusted library allocation
page read and write
183D67F7000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183E19BA000
trusted library allocation
page read and write
183E0893000
trusted library allocation
page read and write
183D7723000
trusted library allocation
page read and write
183D8D77000
trusted library allocation
page read and write
183D9745000
heap
page read and write
183DD5E7000
trusted library allocation
page read and write
183DFAA9000
trusted library allocation
page read and write
183DD480000
trusted library allocation
page read and write
183D5DDC000
trusted library allocation
page read and write
183D2CAF000
trusted library allocation
page read and write
183E0DA5000
trusted library allocation
page read and write
183DDA28000
trusted library allocation
page read and write
1B24F97B000
heap
page read and write
183E08DA000
trusted library allocation
page read and write
183DD250000
trusted library allocation
page read and write
2423DD60000
heap
page read and write
183D2EF2000
heap
page read and write
183D7891000
trusted library allocation
page read and write
183D7088000
trusted library allocation
page read and write
183DD345000
trusted library allocation
page read and write
183D7C77000
trusted library allocation
page read and write
183D75FB000
trusted library allocation
page read and write
183D8D7D000
trusted library allocation
page read and write
183E0DBF000
trusted library allocation
page read and write
183E0883000
trusted library allocation
page read and write
183DF192000
trusted library allocation
page read and write
183DD576000
trusted library allocation
page read and write
183D0FDD000
trusted library allocation
page read and write
183D5569000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D0F9E000
trusted library allocation
page read and write
1B24F985000
heap
page read and write
183D764A000
trusted library allocation
page read and write
183D74E2000
trusted library allocation
page read and write
183DD5D9000
trusted library allocation
page read and write
183E0EBB000
trusted library allocation
page read and write
183D7790000
trusted library allocation
page read and write
183CC5C6000
heap
page read and write
183DD7F4000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183DF1B5000
trusted library allocation
page read and write
183D774F000
trusted library allocation
page read and write
183D55C7000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183CC5B6000
heap
page read and write
183DD8F3000
trusted library allocation
page read and write
183D8B80000
trusted library allocation
page read and write
183D64D3000
trusted library allocation
page read and write
183D57DD000
trusted library allocation
page read and write
183D16BB000
trusted library allocation
page read and write
183D2E9E000
heap
page read and write
183D7C23000
trusted library allocation
page read and write
183D5FDB000
trusted library allocation
page read and write
183DF1CF000
trusted library allocation
page read and write
183DFC5C000
trusted library allocation
page read and write
183D5D17000
trusted library allocation
page read and write
183DD8B4000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183CC5BA000
heap
page read and write
183D5F62000
trusted library allocation
page read and write
C2FD1DE000
unkown
page readonly
183D649D000
trusted library allocation
page read and write
183D55A5000
trusted library allocation
page read and write
183DFCFC000
trusted library allocation
page read and write
C2807FE000
unkown
page readonly
183D6FC3000
trusted library allocation
page read and write
F1E000
heap
page read and write
183CC5C1000
heap
page read and write
183D8B78000
trusted library allocation
page read and write
183DD8DC000
trusted library allocation
page read and write
183D579B000
trusted library allocation
page read and write
1B24F500000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D67F7000
trusted library allocation
page read and write
25993C60000
heap
page read and write
183D700E000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183D812D000
trusted library allocation
page read and write
183DD232000
trusted library allocation
page read and write
183DFBA9000
trusted library allocation
page read and write
183D1613000
trusted library allocation
page read and write
183D3839000
trusted library allocation
page read and write
183D74D0000
trusted library allocation
page read and write
183DD3DD000
trusted library allocation
page read and write
183CC575000
heap
page read and write
183D51D6000
trusted library allocation
page read and write
183D6295000
trusted library allocation
page read and write
183D5569000
trusted library allocation
page read and write
183D269A000
trusted library allocation
page read and write
183E0D5E000
trusted library allocation
page read and write
183DD895000
trusted library allocation
page read and write
183E0D80000
trusted library allocation
page read and write
183D384D000
trusted library allocation
page read and write
183DD891000
trusted library allocation
page read and write
183E0889000
trusted library allocation
page read and write
183D5FAE000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183E0D83000
trusted library allocation
page read and write
259921B2000
heap
page read and write
183D77B2000
trusted library allocation
page read and write
183D7781000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183CC5CF000
heap
page read and write
183D7A64000
trusted library allocation
page read and write
BCE000
stack
page read and write
183CC560000
heap
page read and write
183D31CB000
trusted library allocation
page read and write
183D8DA3000
trusted library allocation
page read and write
F29000
heap
page read and write
183DD476000
trusted library allocation
page read and write
183D2CBC000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183CC58B000
heap
page read and write
183D8D15000
trusted library allocation
page read and write
183E08DA000
trusted library allocation
page read and write
183D7CF7000
trusted library allocation
page read and write
183D7607000
trusted library allocation
page read and write
183D6FC1000
trusted library allocation
page read and write
183D38B8000
trusted library allocation
page read and write
183D2CAF000
trusted library allocation
page read and write
183D2EB2000
heap
page read and write
183CC5BA000
heap
page read and write
183D7B43000
trusted library allocation
page read and write
183D784D000
trusted library allocation
page read and write
183D5557000
trusted library allocation
page read and write
DEE943E000
unkown
page readonly
183DFF91000
trusted library allocation
page read and write
183DD37B000
trusted library allocation
page read and write
183D789D000
trusted library allocation
page read and write
183D2EB2000
heap
page read and write
183D2B5E000
trusted library allocation
page read and write
2994CD5B000
trusted library allocation
page read and write
183D2EE3000
heap
page read and write
183D75C6000
trusted library allocation
page read and write
183D7BF6000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183DD2E7000
trusted library allocation
page read and write
183E0DBD000
trusted library allocation
page read and write
183E08C7000
trusted library allocation
page read and write
183D74CA000
trusted library allocation
page read and write
183D75CF000
trusted library allocation
page read and write
183D2CDE000
trusted library allocation
page read and write
183D55C9000
trusted library allocation
page read and write
183D67A3000
trusted library allocation
page read and write
183D161B000
trusted library allocation
page read and write
183D315C000
trusted library allocation
page read and write
183E0D51000
trusted library allocation
page read and write
183DFA93000
trusted library allocation
page read and write
183DD7FD000
trusted library allocation
page read and write
259921B3000
heap
page read and write
374102C24000
trusted library allocation
page read and write
1B24F96B000
heap
page read and write
183DF13F000
trusted library allocation
page read and write
183DD3F6000
trusted library allocation
page read and write
183D7C39000
trusted library allocation
page read and write
183D2B6C000
trusted library allocation
page read and write
183D2B54000
trusted library allocation
page read and write
183D8E83000
trusted library allocation
page read and write
2994CE20000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183DD8A2000
trusted library allocation
page read and write
183D6FCE000
trusted library allocation
page read and write
183D7761000
trusted library allocation
page read and write
183E0E99000
trusted library allocation
page read and write
183D26A8000
trusted library allocation
page read and write
183DD586000
trusted library allocation
page read and write
183E0EA2000
trusted library allocation
page read and write
183DF186000
trusted library allocation
page read and write
183D5136000
trusted library allocation
page read and write
183D5700000
trusted library allocation
page read and write
183DD861000
trusted library allocation
page read and write
183D6F5D000
trusted library allocation
page read and write
183D1643000
trusted library allocation
page read and write
183DFF5E000
trusted library allocation
page read and write
C2FD19C000
stack
page read and write
183D51D9000
trusted library allocation
page read and write
183CC577000
heap
page read and write
183D164C000
trusted library allocation
page read and write
183D6FA4000
trusted library allocation
page read and write
183D7655000
trusted library allocation
page read and write
183E0893000
trusted library allocation
page read and write
C2FFDBE000
stack
page read and write
183D9B16000
trusted library allocation
page read and write
183E0D4E000
trusted library allocation
page read and write
183D775D000
trusted library allocation
page read and write
183DFE97000
trusted library allocation
page read and write
183DD923000
trusted library allocation
page read and write
183D5FF3000
trusted library allocation
page read and write
183D80B6000
trusted library allocation
page read and write
183D5122000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D8094000
trusted library allocation
page read and write
1B24F985000
heap
page read and write
183DFA85000
trusted library allocation
page read and write
183D557F000
trusted library allocation
page read and write
183D16A0000
trusted library allocation
page read and write
183E0DA9000
trusted library allocation
page read and write
183D7799000
trusted library allocation
page read and write
ED4000
heap
page read and write
1B24F9A7000
heap
page read and write
183E0D70000
trusted library allocation
page read and write
DE4000
heap
page read and write
183D77CE000
trusted library allocation
page read and write
183E0893000
trusted library allocation
page read and write
1B24EDE9000
trusted library allocation
page read and write
183D75ED000
trusted library allocation
page read and write
183D55B8000
trusted library allocation
page read and write
183D7605000
trusted library allocation
page read and write
183D71DA000
trusted library allocation
page read and write
183D1523000
trusted library allocation
page read and write
183CC58E000
heap
page read and write
183D8CC0000
trusted library allocation
page read and write
183DD74F000
trusted library allocation
page read and write
183CC5D9000
heap
page read and write
183DF1D3000
trusted library allocation
page read and write
183DD8B4000
trusted library allocation
page read and write
183DFFBF000
trusted library allocation
page read and write
183D5578000
trusted library allocation
page read and write
183D5153000
trusted library allocation
page read and write
1ADF000
stack
page read and write
183CC5B6000
heap
page read and write
183E0D67000
trusted library allocation
page read and write
F0B000
heap
page read and write
183D5EED000
trusted library allocation
page read and write
183DD15B000
trusted library allocation
page read and write
2423DCF0000
heap
page read and write
183CC575000
heap
page read and write
183D73CF000
trusted library allocation
page read and write
183D7768000
trusted library allocation
page read and write
183E08F3000
trusted library allocation
page read and write
1B24F3BE000
heap
page read and write
183D16E9000
trusted library allocation
page read and write
183D38A7000
trusted library allocation
page read and write
183D2656000
trusted library allocation
page read and write
2994CE17000
trusted library allocation
page read and write
183DD9FA000
trusted library allocation
page read and write
2994C9D0000
heap
page read and write
183DFA64000
trusted library allocation
page read and write
183DF1B5000
trusted library allocation
page read and write
183D7712000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
183D97E1000
heap
page read and write
183D315E000
trusted library allocation
page read and write
183D8D77000
trusted library allocation
page read and write
183CC596000
heap
page read and write
F0B000
heap
page read and write
183D7635000
trusted library allocation
page read and write
183CC5D4000
heap
page read and write
183DFECE000
trusted library allocation
page read and write
183DD5CB000
trusted library allocation
page read and write
F3A000
heap
page read and write
183D807F000
trusted library allocation
page read and write
183E0873000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183E0D83000
trusted library allocation
page read and write
183D2EA7000
heap
page read and write
183D3860000
trusted library allocation
page read and write
183CC5C4000
heap
page read and write
183D78AF000
trusted library allocation
page read and write
183D5776000
trusted library allocation
page read and write
183D3143000
trusted library allocation
page read and write
183D5596000
trusted library allocation
page read and write
183E08DD000
trusted library allocation
page read and write
2994CDC8000
trusted library allocation
page read and write
183CC56F000
heap
page read and write
183DFF76000
trusted library allocation
page read and write
183D2C6F000
trusted library allocation
page read and write
183D7569000
trusted library allocation
page read and write
183D5138000
trusted library allocation
page read and write
183DFACD000
trusted library allocation
page read and write
183CC5D9000
heap
page read and write
183D9701000
heap
page read and write
F14000
heap
page read and write
183DEB16000
trusted library allocation
page read and write
183D2686000
trusted library allocation
page read and write
183D16BB000
trusted library allocation
page read and write
183DD845000
trusted library allocation
page read and write
183DFBFC000
trusted library allocation
page read and write
183D73C5000
trusted library allocation
page read and write
183DD4DA000
trusted library allocation
page read and write
183E19D6000
trusted library allocation
page read and write
183D2CE9000
trusted library allocation
page read and write
183DD480000
trusted library allocation
page read and write
183E0E74000
trusted library allocation
page read and write
183D80F9000
trusted library allocation
page read and write
183D2B49000
trusted library allocation
page read and write
183D67F7000
trusted library allocation
page read and write
183D6CBD000
trusted library allocation
page read and write
25992307000
trusted library allocation
page read and write
183DD5FB000
trusted library allocation
page read and write
183D8DB6000
trusted library allocation
page read and write
183E08C7000
trusted library allocation
page read and write
183D2B54000
trusted library allocation
page read and write
183DD7F0000
trusted library allocation
page read and write
183D269A000
trusted library allocation
page read and write
2423DD10000
heap
page read and write
183D56C1000
trusted library allocation
page read and write
183D164A000
trusted library allocation
page read and write
183D5110000
trusted library allocation
page read and write
183D6728000
trusted library allocation
page read and write
183D38FC000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183D80F7000
trusted library allocation
page read and write
183DF1E5000
trusted library allocation
page read and write
183D388F000
trusted library allocation
page read and write
183D80E8000
trusted library allocation
page read and write
183D774C000
trusted library allocation
page read and write
183CC56B000
heap
page read and write
183D8D9C000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183D2EF2000
heap
page read and write
BFE000
stack
page read and write
183D764D000
trusted library allocation
page read and write
F03000
heap
page read and write
183CC5B6000
heap
page read and write
183D5D54000
trusted library allocation
page read and write
1B24F3B3000
heap
page read and write
183D67F4000
trusted library allocation
page read and write
183D3899000
trusted library allocation
page read and write
1B24F3CC000
heap
page read and write
183D775D000
trusted library allocation
page read and write
183D6F66000
trusted library allocation
page read and write
183CC584000
heap
page read and write
183CC579000
heap
page read and write
183D7773000
trusted library allocation
page read and write
183D764A000
trusted library allocation
page read and write
183DFFD2000
trusted library allocation
page read and write
183D8120000
trusted library allocation
page read and write
183D5D9D000
trusted library allocation
page read and write
183D77F2000
trusted library allocation
page read and write
183CC569000
heap
page read and write
183CC58E000
heap
page read and write
183E0F80000
trusted library allocation
page read and write
183D6497000
trusted library allocation
page read and write
183D7BF6000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D7CF4000
trusted library allocation
page read and write
183D9F02000
trusted library allocation
page read and write
183D5667000
trusted library allocation
page read and write
183D55E6000
trusted library allocation
page read and write
183D2EA8000
heap
page read and write
F29000
heap
page read and write
183DF186000
trusted library allocation
page read and write
183E0D47000
trusted library allocation
page read and write
183D2CAB000
trusted library allocation
page read and write
183E0DB0000
trusted library allocation
page read and write
183D55AE000
trusted library allocation
page read and write
2994CA60000
heap
page read and write
183D2CAF000
trusted library allocation
page read and write
1B24F9A7000
heap
page read and write
183DFB55000
trusted library allocation
page read and write
183D7596000
trusted library allocation
page read and write
183CC587000
heap
page read and write
183DD93A000
trusted library allocation
page read and write
183E0E74000
trusted library allocation
page read and write
2994CDA3000
trusted library allocation
page read and write
183DF189000
trusted library allocation
page read and write
183CC589000
heap
page read and write
183DDAE3000
trusted library allocation
page read and write
183D513D000
trusted library allocation
page read and write
183E08DD000
trusted library allocation
page read and write
183DFB3F000
trusted library allocation
page read and write
183E088F000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
F1A000
heap
page read and write
2994CD83000
trusted library allocation
page read and write
183D2E88000
heap
page read and write
1B24F3CC000
heap
page read and write
183D6481000
trusted library allocation
page read and write
183D55A7000
trusted library allocation
page read and write
183DF1D1000
trusted library allocation
page read and write
183DD468000
trusted library allocation
page read and write
183D8B59000
trusted library allocation
page read and write
183E0863000
trusted library allocation
page read and write
2423DE70000
unclassified section
page read and write
183D80E1000
trusted library allocation
page read and write
DEE51FE000
stack
page read and write
183D7021000
trusted library allocation
page read and write
183D5EBA000
trusted library allocation
page read and write
1B24F1B0000
heap
page read and write
183D38AF000
trusted library allocation
page read and write
183DFB19000
trusted library allocation
page read and write
1B24F35A000
heap
page read and write
183D8178000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183DD9E8000
trusted library allocation
page read and write
183DD4AE000
trusted library allocation
page read and write
183D38FC000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183CC58D000
heap
page read and write
183E0ED2000
trusted library allocation
page read and write
183CC57D000
heap
page read and write
183E0D99000
trusted library allocation
page read and write
183D778E000
trusted library allocation
page read and write
183CC58E000
heap
page read and write
183D2C20000
trusted library allocation
page read and write
183E0D99000
trusted library allocation
page read and write
183E08B8000
trusted library allocation
page read and write
183D38BC000
trusted library allocation
page read and write
183D802B000
trusted library allocation
page read and write
183DD5CF000
trusted library allocation
page read and write
1B24F339000
heap
page read and write
183D2C58000
trusted library allocation
page read and write
183D5783000
trusted library allocation
page read and write
183D8D36000
trusted library allocation
page read and write
183D550D000
trusted library allocation
page read and write
183D2CDE000
trusted library allocation
page read and write
183D9C05000
trusted library allocation
page read and write
183DD521000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D9424000
trusted library allocation
page read and write
183DF1B7000
trusted library allocation
page read and write
2994CD7B000
trusted library allocation
page read and write
183DD86D000
trusted library allocation
page read and write
183E088F000
trusted library allocation
page read and write
183DFBC2000
trusted library allocation
page read and write
183D5112000
trusted library allocation
page read and write
183D7BFC000
trusted library allocation
page read and write
183E0D80000
trusted library allocation
page read and write
183DD74A000
trusted library allocation
page read and write
183D748F000
trusted library allocation
page read and write
183DFE7D000
trusted library allocation
page read and write
183DD923000
trusted library allocation
page read and write
183D5791000
trusted library allocation
page read and write
183DD8AE000
trusted library allocation
page read and write
183E0D70000
trusted library allocation
page read and write
183D7753000
trusted library allocation
page read and write
183DD143000
trusted library allocation
page read and write
183D559F000
trusted library allocation
page read and write
1B24F333000
heap
page read and write
183D764F000
trusted library allocation
page read and write
183D55E2000
trusted library allocation
page read and write
183D81BE000
trusted library allocation
page read and write
183D8165000
trusted library allocation
page read and write
183E1B01000
trusted library allocation
page read and write
183DD785000
trusted library allocation
page read and write
183D6F99000
trusted library allocation
page read and write
183CC5C5000
heap
page read and write
183D675E000
trusted library allocation
page read and write
183E0DA9000
trusted library allocation
page read and write
183D8043000
trusted library allocation
page read and write
183D513D000
trusted library allocation
page read and write
183DEE32000
trusted library allocation
page read and write
183DF13F000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183CC59E000
heap
page read and write
183DFACD000
trusted library allocation
page read and write
183D55BE000
trusted library allocation
page read and write
183D77F2000
trusted library allocation
page read and write
183DD4B6000
trusted library allocation
page read and write
183E08C3000
trusted library allocation
page read and write
183DF15B000
trusted library allocation
page read and write
183DD938000
trusted library allocation
page read and write
183E0DA0000
trusted library allocation
page read and write
183D7643000
trusted library allocation
page read and write
183D164A000
trusted library allocation
page read and write
183D75CF000
trusted library allocation
page read and write
183CC5CE000
heap
page read and write
183CC5BC000
heap
page read and write
2994CD81000
trusted library allocation
page read and write
2423E0B2000
trusted library allocation
page read and write
183D5582000
trusted library allocation
page read and write
183D64EC000
trusted library allocation
page read and write
2994C920000
heap
page read and write
183E1A61000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D55BE000
trusted library allocation
page read and write
183D5577000
trusted library allocation
page read and write
183DD79F000
trusted library allocation
page read and write
183D2A36000
trusted library allocation
page read and write
183D7768000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
183D38BC000
trusted library allocation
page read and write
F36000
heap
page read and write
183D7753000
trusted library allocation
page read and write
183D6441000
trusted library allocation
page read and write
183DFFFA000
trusted library allocation
page read and write
183D5596000
trusted library allocation
page read and write
183DD92B000
trusted library allocation
page read and write
183D722C000
trusted library allocation
page read and write
183DFFB8000
trusted library allocation
page read and write
183D7CDF000
trusted library allocation
page read and write
183D7C75000
trusted library allocation
page read and write
183D75C5000
trusted library allocation
page read and write
183D80AC000
trusted library allocation
page read and write
3872AFE000
stack
page read and write
9EAE1FB000
stack
page read and write
183DDADA000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183D76F3000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D7761000
trusted library allocation
page read and write
183D7CEA000
trusted library allocation
page read and write
183DD5A0000
trusted library allocation
page read and write
183DDA5F000
trusted library allocation
page read and write
183E08DD000
trusted library allocation
page read and write
183D2CDE000
trusted library allocation
page read and write
183D55B8000
trusted library allocation
page read and write
183CC560000
heap
page read and write
1B24F382000
heap
page read and write
183D7CDF000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183D2EAD000
heap
page read and write
183D2B6B000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D318A000
trusted library allocation
page read and write
183D6FCE000
trusted library allocation
page read and write
183D5678000
trusted library allocation
page read and write
183D78D8000
trusted library allocation
page read and write
183D2C63000
trusted library allocation
page read and write
183D92BA000
trusted library allocation
page read and write
183D7C76000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
1B24F3BE000
heap
page read and write
183D7712000
trusted library allocation
page read and write
2994C7E7000
remote allocation
page execute read
183D78E2000
trusted library allocation
page read and write
1B24F330000
heap
page read and write
183CC596000
heap
page read and write
183D75FB000
trusted library allocation
page read and write
183CC584000
heap
page read and write
183D6781000
trusted library allocation
page read and write
183D7875000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D57FE000
trusted library allocation
page read and write
2994CE32000
trusted library allocation
page read and write
183DD252000
trusted library allocation
page read and write
183D8DAB000
trusted library allocation
page read and write
1B24EACF000
unkown
page execute read
183CC585000
heap
page read and write
183DF1B7000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183E0EB7000
trusted library allocation
page read and write
183DF8ED000
trusted library allocation
page read and write
183D81EB000
trusted library allocation
page read and write
183D7754000
trusted library allocation
page read and write
183D2C4D000
trusted library allocation
page read and write
183CC565000
heap
page read and write
1B24F3B9000
heap
page read and write
183D2B73000
trusted library allocation
page read and write
183D5138000
trusted library allocation
page read and write
183DEB00000
trusted library allocation
page read and write
183D2CA0000
trusted library allocation
page read and write
183E0D92000
trusted library allocation
page read and write
183CC5C9000
heap
page read and write
183CC58E000
heap
page read and write
183E0E8F000
trusted library allocation
page read and write
183DD2F8000
trusted library allocation
page read and write
183D8C86000
trusted library allocation
page read and write
183D6796000
trusted library allocation
page read and write
183D2CEF000
trusted library allocation
page read and write
183D55B8000
trusted library allocation
page read and write
183D77B2000
trusted library allocation
page read and write
2994CD47000
trusted library allocation
page read and write
F38000
heap
page read and write
183D78AD000
trusted library allocation
page read and write
183D2B70000
trusted library allocation
page read and write
183D26C1000
trusted library allocation
page read and write
183D7C46000
trusted library allocation
page read and write
183D8136000
trusted library allocation
page read and write
183DFC89000
trusted library allocation
page read and write
183D2B70000
trusted library allocation
page read and write
183D8D0D000
trusted library allocation
page read and write
183D7761000
trusted library allocation
page read and write
183D319C000
trusted library allocation
page read and write
183CC5D4000
heap
page read and write
183CC584000
heap
page read and write
183D38CE000
trusted library allocation
page read and write
1B24F969000
heap
page read and write
183D2E52000
heap
page read and write
183D2B70000
trusted library allocation
page read and write
183DF1A8000
trusted library allocation
page read and write
183D7777000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D67AD000
trusted library allocation
page read and write
183D9C0D000
trusted library allocation
page read and write
183E08A4000
trusted library allocation
page read and write
183D5D43000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D9389000
trusted library allocation
page read and write
183D8B9B000
trusted library allocation
page read and write
DEE6BFE000
stack
page read and write
183D67F7000
trusted library allocation
page read and write
183D775D000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183DD853000
trusted library allocation
page read and write
183D26A8000
trusted library allocation
page read and write
183D57DD000
trusted library allocation
page read and write
1B24EDC6000
trusted library allocation
page read and write
2994CE15000
trusted library allocation
page read and write
183D8D2D000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D78E7000
trusted library allocation
page read and write
DE4000
heap
page read and write
183E0D83000
trusted library allocation
page read and write
183CC5D5000
heap
page read and write
183D5197000
trusted library allocation
page read and write
1B24ED2F000
trusted library allocation
page read and write
183E0D80000
trusted library allocation
page read and write
183D38C6000
trusted library allocation
page read and write
183DD5EC000
trusted library allocation
page read and write
183DFC59000
trusted library allocation
page read and write
2AC9C211000
trusted library allocation
page execute read
183CC56A000
heap
page read and write
183D2CA0000
trusted library allocation
page read and write
183E0D67000
trusted library allocation
page read and write
183D80C6000
trusted library allocation
page read and write
183D81FE000
trusted library allocation
page read and write
1B24F378000
heap
page read and write
183DD9F7000
trusted library allocation
page read and write
183DD289000
trusted library allocation
page read and write
183D8C8C000
trusted library allocation
page read and write
183CC5D9000
heap
page read and write
1D0000
unkown
page readonly
183CC5B6000
heap
page read and write
183D80B4000
trusted library allocation
page read and write
183D81D9000
trusted library allocation
page read and write
183D516C000
trusted library allocation
page read and write
183D75CF000
trusted library allocation
page read and write
183D80BA000
trusted library allocation
page read and write
183DD89C000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183DD4DA000
trusted library allocation
page read and write
183D5DA3000
trusted library allocation
page read and write
183D6F47000
trusted library allocation
page read and write
183D267D000
trusted library allocation
page read and write
183D5645000
trusted library allocation
page read and write
183D67F2000
trusted library allocation
page read and write
183D8B62000
trusted library allocation
page read and write
183CC584000
heap
page read and write
183E088F000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183D3895000
trusted library allocation
page read and write
183D9762000
heap
page read and write
183D2EF2000
heap
page read and write
183E0DB5000
trusted library allocation
page read and write
183D2EA7000
heap
page read and write
183D2B2A000
trusted library allocation
page read and write
183D38C0000
trusted library allocation
page read and write
2994CD66000
trusted library allocation
page read and write
2994CE39000
trusted library allocation
page read and write
183D2C9E000
trusted library allocation
page read and write
183D674B000
trusted library allocation
page read and write
183E0D37000
trusted library allocation
page read and write
183CC58E000
heap
page read and write
183DF84D000
trusted library allocation
page read and write
183D6C91000
trusted library allocation
page read and write
183DD38C000
trusted library allocation
page read and write
183DD2FA000
trusted library allocation
page read and write
183E0884000
trusted library allocation
page read and write
2423E300000
trusted library allocation
page read and write
183D74E4000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183DD1CC000
trusted library allocation
page read and write
183D2C58000
trusted library allocation
page read and write
183D319C000
trusted library allocation
page read and write
183D80D3000
trusted library allocation
page read and write
183D774C000
trusted library allocation
page read and write
183CC5CA000
heap
page read and write
183D9771000
heap
page read and write
183DDA8A000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
DE0000
heap
page read and write
183D70A3000
trusted library allocation
page read and write
183D5525000
trusted library allocation
page read and write
183E08FD000
trusted library allocation
page read and write
183D8DBB000
trusted library allocation
page read and write
183D5D3C000
trusted library allocation
page read and write
183CC5BF000
heap
page read and write
183DF15B000
trusted library allocation
page read and write
183D5151000
trusted library allocation
page read and write
183D6FDB000
trusted library allocation
page read and write
183D75F8000
trusted library allocation
page read and write
183DD8DC000
trusted library allocation
page read and write
183DFAE9000
trusted library allocation
page read and write
183CC5C2000
heap
page read and write
183DFA47000
trusted library allocation
page read and write
183E0D5E000
trusted library allocation
page read and write
183D2B6B000
trusted library allocation
page read and write
1B24F33C000
heap
page read and write
183DD899000
trusted library allocation
page read and write
183D67FB000
trusted library allocation
page read and write
183D9701000
heap
page read and write
183D7AE8000
trusted library allocation
page read and write
183D2CDE000
trusted library allocation
page read and write
183D6CE1000
trusted library allocation
page read and write
183CC576000
heap
page read and write
183CC576000
heap
page read and write
183DFBBA000
trusted library allocation
page read and write
183D9B0D000
trusted library allocation
page read and write
183E0D3D000
trusted library allocation
page read and write
183E08A4000
trusted library allocation
page read and write
2994C9B0000
heap
page readonly
183D38B6000
trusted library allocation
page read and write
183D6578000
trusted library allocation
page read and write
183CC5BB000
heap
page read and write
183D387D000
trusted library allocation
page read and write
183D7872000
trusted library allocation
page read and write
2A4000
unkown
page readonly
183D75A6000
trusted library allocation
page read and write
183D80D1000
trusted library allocation
page read and write
183D5599000
trusted library allocation
page read and write
183E08DF000
trusted library allocation
page read and write
183E0D9B000
trusted library allocation
page read and write
183D8D51000
trusted library allocation
page read and write
183DFB88000
trusted library allocation
page read and write
183DD8D6000
trusted library allocation
page read and write
183D38C3000
trusted library allocation
page read and write
183E088F000
trusted library allocation
page read and write
183DD89C000
trusted library allocation
page read and write
183E0D96000
trusted library allocation
page read and write
183DD36F000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183D80AE000
trusted library allocation
page read and write
183D5DA9000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D75B1000
trusted library allocation
page read and write
183D7C6B000
trusted library allocation
page read and write
183E0884000
trusted library allocation
page read and write
183D566B000
trusted library allocation
page read and write
183E08A4000
trusted library allocation
page read and write
183D818D000
trusted library allocation
page read and write
183DFEC1000
trusted library allocation
page read and write
183DD4FB000
trusted library allocation
page read and write
183D57E4000
trusted library allocation
page read and write
183D2E98000
heap
page read and write
183DD248000
trusted library allocation
page read and write
183D8B3A000
trusted library allocation
page read and write
183E08C3000
trusted library allocation
page read and write
183D7693000
trusted library allocation
page read and write
183D76EB000
trusted library allocation
page read and write
183D5158000
trusted library allocation
page read and write
183CC562000
heap
page read and write
183CC594000
heap
page read and write
183D67B0000
trusted library allocation
page read and write
183DD9E8000
trusted library allocation
page read and write
183D756E000
trusted library allocation
page read and write
183DF1CF000
trusted library allocation
page read and write
183D6485000
trusted library allocation
page read and write
183D8161000
trusted library allocation
page read and write
183E0DEE000
trusted library allocation
page read and write
183D7560000
trusted library allocation
page read and write
183D2B65000
trusted library allocation
page read and write
183CC5CF000
heap
page read and write
183DD1AE000
trusted library allocation
page read and write
183CC56B000
heap
page read and write
183D775D000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
2994C9C0000
unclassified section
page read and write
183CC560000
heap
page read and write
183D74CE000
trusted library allocation
page read and write
183D67B3000
trusted library allocation
page read and write
183D7799000
trusted library allocation
page read and write
183E08DD000
trusted library allocation
page read and write
183D75C1000
trusted library allocation
page read and write
183D81AF000
trusted library allocation
page read and write
183D514E000
trusted library allocation
page read and write
183D2EBF000
heap
page read and write
183D75FD000
trusted library allocation
page read and write
183D38C3000
trusted library allocation
page read and write
183D770F000
trusted library allocation
page read and write
183D38DC000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183CC587000
heap
page read and write
183D5791000
trusted library allocation
page read and write
183DD8C9000
trusted library allocation
page read and write
9EB01FF000
stack
page read and write
183DF1CF000
trusted library allocation
page read and write
2994CD5D000
trusted library allocation
page read and write
183E0D92000
trusted library allocation
page read and write
183D76F3000
trusted library allocation
page read and write
183D55C7000
trusted library allocation
page read and write
183D31A2000
trusted library allocation
page read and write
183CC573000
heap
page read and write
25992070000
heap
page read and write
183E0E9E000
trusted library allocation
page read and write
183DD8C5000
trusted library allocation
page read and write
183E0D70000
trusted library allocation
page read and write
183DFA82000
trusted library allocation
page read and write
183D8DAE000
trusted library allocation
page read and write
183D5FFA000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D6FC3000
trusted library allocation
page read and write
1B24ED48000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183CC5C9000
heap
page read and write
183D74D3000
trusted library allocation
page read and write
183D1675000
trusted library allocation
page read and write
C2FF4FE000
unkown
page readonly
1B24E841000
remote allocation
page execute read
183D7044000
trusted library allocation
page read and write
183D6761000
trusted library allocation
page read and write
183CC5C5000
heap
page read and write
183E0878000
trusted library allocation
page read and write
183D5783000
trusted library allocation
page read and write
183CC575000
heap
page read and write
183D74D7000
trusted library allocation
page read and write
183D78E7000
trusted library allocation
page read and write
183D67D5000
trusted library allocation
page read and write
183D5D66000
trusted library allocation
page read and write
183DF17F000
trusted library allocation
page read and write
183DD92F000
trusted library allocation
page read and write
183D2EC3000
heap
page read and write
183D75F1000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183D701C000
trusted library allocation
page read and write
183D5564000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D80F9000
trusted library allocation
page read and write
183D705A000
trusted library allocation
page read and write
183D2E7D000
heap
page read and write
183DF184000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D2C26000
trusted library allocation
page read and write
183D2A2B000
trusted library allocation
page read and write
183D38D9000
trusted library allocation
page read and write
183D7623000
trusted library allocation
page read and write
1B24F998000
heap
page read and write
183D77F9000
trusted library allocation
page read and write
183D389D000
trusted library allocation
page read and write
183D7799000
trusted library allocation
page read and write
183D3186000
trusted library allocation
page read and write
183E0DD4000
trusted library allocation
page read and write
2994C9F0000
unclassified section
page readonly
183D7753000
trusted library allocation
page read and write
183D80B8000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183D772E000
trusted library allocation
page read and write
183DD323000
trusted library allocation
page read and write
2994CA40000
heap
page read and write
183E0E04000
trusted library allocation
page read and write
183D5533000
trusted library allocation
page read and write
183D2C8C000
trusted library allocation
page read and write
183D2B61000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
183D5F40000
trusted library allocation
page read and write
183D5599000
trusted library allocation
page read and write
FD6AFFF000
stack
page read and write
183CC5C1000
heap
page read and write
183D7473000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183DD86D000
trusted library allocation
page read and write
183CC58C000
heap
page read and write
183D7765000
trusted library allocation
page read and write
183D388C000
trusted library allocation
page read and write
183D7576000
trusted library allocation
page read and write
1860003F000
trusted library allocation
page read and write
183DD751000
trusted library allocation
page read and write
183D72E5000
trusted library allocation
page read and write
183DD23B000
trusted library allocation
page read and write
183D80E4000
trusted library allocation
page read and write
183DDA90000
trusted library allocation
page read and write
183D2C38000
trusted library allocation
page read and write
2423E100000
heap
page read and write
183CC585000
heap
page read and write
183D75C7000
trusted library allocation
page read and write
183D7278000
trusted library allocation
page read and write
183DF973000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183D7781000
trusted library allocation
page read and write
183DFCCA000
trusted library allocation
page read and write
183DD35C000
trusted library allocation
page read and write
183E088F000
trusted library allocation
page read and write
183D26E2000
trusted library allocation
page read and write
183D2C20000
trusted library allocation
page read and write
2423E00C000
trusted library allocation
page read and write
183E0EB7000
trusted library allocation
page read and write
183D2EB5000
heap
page read and write
183D2C91000
trusted library allocation
page read and write
C2FFDFE000
unkown
page readonly
183D67F2000
trusted library allocation
page read and write
183E1A89000
trusted library allocation
page read and write
183DD468000
trusted library allocation
page read and write
183D76F7000
trusted library allocation
page read and write
183E1ACA000
trusted library allocation
page read and write
183D5763000
trusted library allocation
page read and write
183D2C61000
trusted library allocation
page read and write
1B24F3BE000
heap
page read and write
183D38D1000
trusted library allocation
page read and write
183D6794000
trusted library allocation
page read and write
2994C810000
heap
page read and write
1D1000
unkown
page execute read
183DD7F4000
trusted library allocation
page read and write
183D319C000
trusted library allocation
page read and write
183D75B7000
trusted library allocation
page read and write
183D385B000
trusted library allocation
page read and write
2994CD69000
trusted library allocation
page read and write
183E0DEA000
trusted library allocation
page read and write
183DD895000
trusted library allocation
page read and write
183D746D000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183DD856000
trusted library allocation
page read and write
183D26AD000
trusted library allocation
page read and write
183D67F5000
trusted library allocation
page read and write
183DD3E6000
trusted library allocation
page read and write
183D78AB000
trusted library allocation
page read and write
183D7CE4000
trusted library allocation
page read and write
183D64A6000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D2C91000
trusted library allocation
page read and write
1B24E870000
heap
page read and write
2A0000
unkown
page write copy
183E0DB2000
trusted library allocation
page read and write
C20000
heap
page read and write
183D75B6000
trusted library allocation
page read and write
1B24F389000
heap
page read and write
183E0E83000
trusted library allocation
page read and write
1B24F3B0000
heap
page read and write
183D2C64000
trusted library allocation
page read and write
183D5127000
trusted library allocation
page read and write
183D60E0000
trusted library allocation
page read and write
1B24ED00000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
183DFF91000
trusted library allocation
page read and write
183D8D7A000
trusted library allocation
page read and write
183D3147000
trusted library allocation
page read and write
2423E05D000
trusted library allocation
page read and write
183D0FC4000
trusted library allocation
page read and write
183D67FA000
trusted library allocation
page read and write
183DD79F000
trusted library allocation
page read and write
183D16B2000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183D75CF000
trusted library allocation
page read and write
183DFAE3000
trusted library allocation
page read and write
183D7765000
trusted library allocation
page read and write
2423E0C4000
trusted library allocation
page read and write
183DD888000
trusted library allocation
page read and write
183D2C6F000
trusted library allocation
page read and write
183D7724000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D31CB000
trusted library allocation
page read and write
183D55AB000
trusted library allocation
page read and write
183D316F000
trusted library allocation
page read and write
183CC587000
heap
page read and write
183DF13D000
trusted library allocation
page read and write
183DFF76000
trusted library allocation
page read and write
183E08F3000
trusted library allocation
page read and write
183DD415000
trusted library allocation
page read and write
183D7712000
trusted library allocation
page read and write
1B24F32C000
heap
page read and write
183D2C82000
trusted library allocation
page read and write
183D8B5E000
trusted library allocation
page read and write
183E0E62000
trusted library allocation
page read and write
2423E30C000
trusted library allocation
page read and write
183D93B1000
trusted library allocation
page read and write
183D9B33000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183E0883000
trusted library allocation
page read and write
183D0FEF000
trusted library allocation
page read and write
183DD5F5000
trusted library allocation
page read and write
183D71E6000
trusted library allocation
page read and write
183D67AF000
trusted library allocation
page read and write
183D7718000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183DD480000
trusted library allocation
page read and write
183D75B7000
trusted library allocation
page read and write
183D38B2000
trusted library allocation
page read and write
183D152F000
trusted library allocation
page read and write
183D0FF9000
trusted library allocation
page read and write
183D7790000
trusted library allocation
page read and write
183D7787000
trusted library allocation
page read and write
F1D000
heap
page read and write
183DD2F6000
trusted library allocation
page read and write
183D764F000
trusted library allocation
page read and write
183DD9F3000
trusted library allocation
page read and write
217BCB00000
trusted library allocation
page read and write
183DF15B000
trusted library allocation
page read and write
183D9359000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183D7889000
trusted library allocation
page read and write
183DD8B4000
trusted library allocation
page read and write
183DD5E7000
trusted library allocation
page read and write
183D26D4000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D552A000
trusted library allocation
page read and write
183D319C000
trusted library allocation
page read and write
183D7896000
trusted library allocation
page read and write
183D80C6000
trusted library allocation
page read and write
183D67C3000
trusted library allocation
page read and write
183DF9E9000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D5797000
trusted library allocation
page read and write
183D55A5000
trusted library allocation
page read and write
183E0DBD000
trusted library allocation
page read and write
2994CD64000
trusted library allocation
page read and write
183CC5C2000
heap
page read and write
183D774C000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183D722A000
trusted library allocation
page read and write
183D55E2000
trusted library allocation
page read and write
183D2EAD000
heap
page read and write
183D5687000
trusted library allocation
page read and write
183D675B000
trusted library allocation
page read and write
183DD20B000
trusted library allocation
page read and write
2599230A000
trusted library allocation
page read and write
183DD9EF000
trusted library allocation
page read and write
183D7C98000
trusted library allocation
page read and write
183D55A7000
trusted library allocation
page read and write
183E0DC0000
trusted library allocation
page read and write
183CC577000
heap
page read and write
183DFB6F000
trusted library allocation
page read and write
183DD5EC000
trusted library allocation
page read and write
183D6CEB000
trusted library allocation
page read and write
183E1504000
trusted library allocation
page read and write
183D81D9000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D2C9B000
trusted library allocation
page read and write
183E0DB9000
trusted library allocation
page read and write
183D5170000
trusted library allocation
page read and write
183D9C24000
trusted library allocation
page read and write
183D5DA2000
trusted library allocation
page read and write
1B24EDEF000
trusted library allocation
page read and write
183D38AC000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D80AE000
trusted library allocation
page read and write
183D576E000
trusted library allocation
page read and write
183DF186000
trusted library allocation
page read and write
183CC575000
heap
page read and write
183D70B0000
trusted library allocation
page read and write
183E0EE2000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183DD26C000
trusted library allocation
page read and write
183DD964000
trusted library allocation
page read and write
183E08D8000
trusted library allocation
page read and write
183E08DA000
trusted library allocation
page read and write
183D8D8A000
trusted library allocation
page read and write
183D8138000
trusted library allocation
page read and write
183DD248000
trusted library allocation
page read and write
183D0FB3000
trusted library allocation
page read and write
183DFFAE000
trusted library allocation
page read and write
183DD5F1000
trusted library allocation
page read and write
183D748D000
trusted library allocation
page read and write
183D75FD000
trusted library allocation
page read and write
183DD31F000
trusted library allocation
page read and write
183D67AB000
trusted library allocation
page read and write
183D93B4000
trusted library allocation
page read and write
5BA000
stack
page read and write
183E08A4000
trusted library allocation
page read and write
183DD3DD000
trusted library allocation
page read and write
183D67F4000
trusted library allocation
page read and write
183D9C35000
trusted library allocation
page read and write
183D167D000
trusted library allocation
page read and write
183E0EF8000
trusted library allocation
page read and write
183D2B49000
trusted library allocation
page read and write
183E08C7000
trusted library allocation
page read and write
DEE513E000
unkown
page readonly
183D7576000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
183CC5C2000
heap
page read and write
183D2CAD000
trusted library allocation
page read and write
183D516F000
trusted library allocation
page read and write
183D7C21000
trusted library allocation
page read and write
183D318C000
trusted library allocation
page read and write
183D8111000
trusted library allocation
page read and write
183D38B6000
trusted library allocation
page read and write
183E0DBD000
trusted library allocation
page read and write
2423DCB0000
heap
page read and write
183CC5D9000
heap
page read and write
183D602B000
trusted library allocation
page read and write
2994C970000
heap
page read and write
183D2C6B000
trusted library allocation
page read and write
183D383B000
trusted library allocation
page read and write
183E0D8D000
trusted library allocation
page read and write
183D0F90000
trusted library allocation
page read and write
183D759F000
trusted library allocation
page read and write
183CC585000
heap
page read and write
9EAF1FE000
stack
page read and write
183D55CB000
trusted library allocation
page read and write
183D57DF000
trusted library allocation
page read and write
183D2BE7000
trusted library allocation
page read and write
183E08D8000
trusted library allocation
page read and write
183D5E7B000
trusted library allocation
page read and write
183DD5F5000
trusted library allocation
page read and write
183D75AE000
trusted library allocation
page read and write
183DD4B6000
trusted library allocation
page read and write
183DFFB8000
trusted library allocation
page read and write
183D2EAB000
heap
page read and write
1B24F96B000
heap
page read and write
183CC584000
heap
page read and write
183E0D5E000
trusted library allocation
page read and write
183D75A8000
trusted library allocation
page read and write
2423E0F6000
trusted library allocation
page read and write
183D813E000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D789D000
trusted library allocation
page read and write
183D38CE000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
183DF1CF000
trusted library allocation
page read and write
183D9B33000
trusted library allocation
page read and write
183DF133000
trusted library allocation
page read and write
183CC5D4000
heap
page read and write
183D7522000
trusted library allocation
page read and write
183D63C6000
trusted library allocation
page read and write
FD6B7FE000
stack
page read and write
183D6391000
trusted library allocation
page read and write
183D8108000
trusted library allocation
page read and write
183D5F90000
trusted library allocation
page read and write
183DD5FD000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D80C4000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
183D38C7000
trusted library allocation
page read and write
183DD418000
trusted library allocation
page read and write
183D167D000
trusted library allocation
page read and write
183D2B6B000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183E0D9E000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183E08F4000
trusted library allocation
page read and write
183D818D000
trusted library allocation
page read and write
183D38B2000
trusted library allocation
page read and write
183D8B8B000
trusted library allocation
page read and write
183E08DD000
trusted library allocation
page read and write
183DDA2F000
trusted library allocation
page read and write
183E0E9F000
trusted library allocation
page read and write
183D70A1000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183CC596000
heap
page read and write
2994C760000
unclassified section
page readonly
183CC560000
heap
page read and write
183DF189000
trusted library allocation
page read and write
183E08ED000
trusted library allocation
page read and write
183D2CBC000
trusted library allocation
page read and write
183E0DAB000
trusted library allocation
page read and write
183D55AE000
trusted library allocation
page read and write
183D31A2000
trusted library allocation
page read and write
183DDAD1000
trusted library allocation
page read and write
183DD92F000
trusted library allocation
page read and write
183D6FDE000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183DFBF0000
trusted library allocation
page read and write
183D31CB000
trusted library allocation
page read and write
183D2686000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183CC56C000
heap
page read and write
183D2CC3000
trusted library allocation
page read and write
183E1B24000
trusted library allocation
page read and write
183D756C000
trusted library allocation
page read and write
BEF000
stack
page read and write
183D5EE0000
trusted library allocation
page read and write
183E0D9B000
trusted library allocation
page read and write
183D76E8000
trusted library allocation
page read and write
183D76FA000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183DFBF0000
trusted library allocation
page read and write
183E0ED7000
trusted library allocation
page read and write
183DD919000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183D2C3D000
trusted library allocation
page read and write
183CC56C000
heap
page read and write
183D774F000
trusted library allocation
page read and write
183D803C000
trusted library allocation
page read and write
183D2EAB000
heap
page read and write
183CC584000
heap
page read and write
183D80B0000
trusted library allocation
page read and write
183DFE79000
trusted library allocation
page read and write
183D7C5B000
trusted library allocation
page read and write
183D75FB000
trusted library allocation
page read and write
183E0E90000
trusted library allocation
page read and write
183DD240000
trusted library allocation
page read and write
183DD5CF000
trusted library allocation
page read and write
1B24F3B6000
heap
page read and write
183D75B6000
trusted library allocation
page read and write
374102C1E000
trusted library allocation
page read and write
183E0868000
trusted library allocation
page read and write
183D2CDE000
trusted library allocation
page read and write
183E0D83000
trusted library allocation
page read and write
183DD8DC000
trusted library allocation
page read and write
DE4000
heap
page read and write
183D76ED000
trusted library allocation
page read and write
183D26D9000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D57AA000
trusted library allocation
page read and write
183D2CE9000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D9701000
heap
page read and write
183D2C32000
trusted library allocation
page read and write
9EAE1FF000
stack
page read and write
183D55C9000
trusted library allocation
page read and write
183D6071000
trusted library allocation
page read and write
183E1561000
trusted library allocation
page read and write
183D774C000
trusted library allocation
page read and write
183DD352000
trusted library allocation
page read and write
183D55C2000
trusted library allocation
page read and write
183DF13D000
trusted library allocation
page read and write
F29000
heap
page read and write
183E0DB5000
trusted library allocation
page read and write
183D7693000
trusted library allocation
page read and write
183D2C8F000
trusted library allocation
page read and write
1B24F330000
heap
page read and write
183DFBFA000
trusted library allocation
page read and write
183DFFCF000
trusted library allocation
page read and write
183DD7E7000
trusted library allocation
page read and write
183DFE77000
trusted library allocation
page read and write
183D8D9C000
trusted library allocation
page read and write
183DD90C000
trusted library allocation
page read and write
183D6380000
trusted library allocation
page read and write
183D2CA7000
trusted library allocation
page read and write
183CC575000
heap
page read and write
183CC55E000
heap
page read and write
183D782F000
trusted library allocation
page read and write
2423E00E000
trusted library allocation
page read and write
183D974D000
heap
page read and write
183DF14B000
trusted library allocation
page read and write
183DD4F4000
trusted library allocation
page read and write
183CC58D000
heap
page read and write
183CC59E000
heap
page read and write
183D8083000
trusted library allocation
page read and write
183DD9F7000
trusted library allocation
page read and write
183CC572000
heap
page read and write
183DD935000
trusted library allocation
page read and write
1D0000
unkown
page readonly
2994CB73000
heap
page read and write
183D5140000
trusted library allocation
page read and write
183DD4FC000
trusted library allocation
page read and write
183DD907000
trusted library allocation
page read and write
183D8DFB000
trusted library allocation
page read and write
217BCB0A000
trusted library allocation
page read and write
183D774F000
trusted library allocation
page read and write
183D77C2000
trusted library allocation
page read and write
183DF146000
trusted library allocation
page read and write
1B24ED66000
trusted library allocation
page read and write
183D26B1000
trusted library allocation
page read and write
183D77C9000
trusted library allocation
page read and write
1B24F3BE000
heap
page read and write
183D2C2F000
trusted library allocation
page read and write
183D1571000
trusted library allocation
page read and write
183D935C000
trusted library allocation
page read and write
1B24F371000
heap
page read and write
183D71CE000
trusted library allocation
page read and write
2AC9C161000
trusted library allocation
page execute read
183D77F2000
trusted library allocation
page read and write
183D73B5000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183CC576000
heap
page read and write
183D8D8D000
trusted library allocation
page read and write
183D7789000
trusted library allocation
page read and write
183DFBBC000
trusted library allocation
page read and write
183E0DBD000
trusted library allocation
page read and write
183D5665000
trusted library allocation
page read and write
183DF159000
trusted library allocation
page read and write
183E08FD000
trusted library allocation
page read and write
183DD5B9000
trusted library allocation
page read and write
183D75F8000
trusted library allocation
page read and write
183D78AB000
trusted library allocation
page read and write
183D8D86000
trusted library allocation
page read and write
183D5FE7000
trusted library allocation
page read and write
1B24ED86000
trusted library allocation
page read and write
183DD555000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
2994CD03000
trusted library allocation
page read and write
183D55BE000
trusted library allocation
page read and write
183E0DAB000
trusted library allocation
page read and write
1B24F2D9000
heap
page read and write
183D55F0000
trusted library allocation
page read and write
183D7C4E000
trusted library allocation
page read and write
183D80B4000
trusted library allocation
page read and write
1B24E7E0000
unclassified section
page readonly
183DF8E2000
trusted library allocation
page read and write
183D38D7000
trusted library allocation
page read and write
183D5FD2000
trusted library allocation
page read and write
183D5FD5000
trusted library allocation
page read and write
183E0D80000
trusted library allocation
page read and write
1B24F998000
heap
page read and write
183D5153000
trusted library allocation
page read and write
183D2EB5000
heap
page read and write
183CC560000
heap
page read and write
183E0D80000
trusted library allocation
page read and write
183D67A3000
trusted library allocation
page read and write
183D7C51000
trusted library allocation
page read and write
183D633A000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D16E9000
trusted library allocation
page read and write
217BC830000
heap
page read and write
183D51D2000
trusted library allocation
page read and write
183D7244000
trusted library allocation
page read and write
F1B000
heap
page read and write
183D38C6000
trusted library allocation
page read and write
183D75B6000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D6771000
trusted library allocation
page read and write
183D5D5F000
trusted library allocation
page read and write
183D76F6000
trusted library allocation
page read and write
183D75F8000
trusted library allocation
page read and write
183E0D49000
trusted library allocation
page read and write
292000
unkown
page readonly
183D2EF2000
heap
page read and write
183D5D34000
trusted library allocation
page read and write
2994C9C2000
unclassified section
page read and write
183D7C27000
trusted library allocation
page read and write
183E0D70000
trusted library allocation
page read and write
183E0D85000
trusted library allocation
page read and write
183E0893000
trusted library allocation
page read and write
183D7799000
trusted library allocation
page read and write
183E08B8000
trusted library allocation
page read and write
183D314A000
trusted library allocation
page read and write
183D7324000
trusted library allocation
page read and write
183D2C82000
trusted library allocation
page read and write
183D9701000
heap
page read and write
183CC5BA000
heap
page read and write
183CC58B000
heap
page read and write
183DD8A7000
trusted library allocation
page read and write
183E0000000
trusted library allocation
page read and write
183DD5BC000
trusted library allocation
page read and write
183D2B54000
trusted library allocation
page read and write
1B24F2D0000
heap
page read and write
DEE7C3E000
stack
page read and write
183CC59E000
heap
page read and write
2423E049000
trusted library allocation
page read and write
183E0877000
trusted library allocation
page read and write
183DD8C1000
trusted library allocation
page read and write
183D81E6000
trusted library allocation
page read and write
183D7C43000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183D6F7E000
trusted library allocation
page read and write
183DD385000
trusted library allocation
page read and write
183E0DAB000
trusted library allocation
page read and write
183D38B6000
trusted library allocation
page read and write
183CC5C6000
heap
page read and write
183D77C0000
trusted library allocation
page read and write
183CC5BB000
heap
page read and write
183E0835000
trusted library allocation
page read and write
183D57E4000
trusted library allocation
page read and write
183D6F77000
trusted library allocation
page read and write
183D2C3D000
trusted library allocation
page read and write
183D7554000
trusted library allocation
page read and write
183D2C17000
trusted library allocation
page read and write
183D2E9A000
heap
page read and write
183DD5BC000
trusted library allocation
page read and write
183D5DA9000
trusted library allocation
page read and write
16DD000
stack
page read and write
183D55CD000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183CC5D4000
heap
page read and write
183D75FD000
trusted library allocation
page read and write
183E086A000
trusted library allocation
page read and write
183D3186000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183CC5BB000
heap
page read and write
183D75F1000
trusted library allocation
page read and write
183D313D000
trusted library allocation
page read and write
183E085E000
trusted library allocation
page read and write
183DD1D0000
trusted library allocation
page read and write
183D7A0F000
trusted library allocation
page read and write
183D315D000
trusted library allocation
page read and write
183D313D000
trusted library allocation
page read and write
DE4000
heap
page read and write
183D7790000
trusted library allocation
page read and write
183D9B54000
trusted library allocation
page read and write
183DD10E000
trusted library allocation
page read and write
183D71EA000
trusted library allocation
page read and write
183D6041000
trusted library allocation
page read and write
183D2EBF000
heap
page read and write
183E0D85000
trusted library allocation
page read and write
183CC5BA000
heap
page read and write
183D7483000
trusted library allocation
page read and write
183DFBC4000
trusted library allocation
page read and write
183D8D7D000
trusted library allocation
page read and write
183DDAF1000
trusted library allocation
page read and write
183D783F000
trusted library allocation
page read and write
183D8CB9000
trusted library allocation
page read and write
183DD925000
trusted library allocation
page read and write
183E0817000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183DD1D8000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183DD3F4000
trusted library allocation
page read and write
183D1643000
trusted library allocation
page read and write
183DD3CD000
trusted library allocation
page read and write
183D0FEF000
trusted library allocation
page read and write
2423E065000
trusted library allocation
page read and write
183D2E4D000
heap
page read and write
183D55C7000
trusted library allocation
page read and write
183D319C000
trusted library allocation
page read and write
183D5596000
trusted library allocation
page read and write
1B24F96B000
heap
page read and write
183D7693000
trusted library allocation
page read and write
183DD5FB000
trusted library allocation
page read and write
183DF137000
trusted library allocation
page read and write
1B24F3C2000
heap
page read and write
183D7851000
trusted library allocation
page read and write
183D8D7A000
trusted library allocation
page read and write
183DD7CC000
trusted library allocation
page read and write
183CC5BA000
heap
page read and write
183D76C7000
trusted library allocation
page read and write
37C0000
trusted library allocation
page read and write
183CC594000
heap
page read and write
DE4000
heap
page read and write
183E0DBD000
trusted library allocation
page read and write
183E08F3000
trusted library allocation
page read and write
DE4000
heap
page read and write
183D3166000
trusted library allocation
page read and write
183D5794000
trusted library allocation
page read and write
183DFF5E000
trusted library allocation
page read and write
183D385E000
trusted library allocation
page read and write
183DD343000
trusted library allocation
page read and write
183D9361000
trusted library allocation
page read and write
183DD88D000
trusted library allocation
page read and write
183CC56C000
heap
page read and write
183DF159000
trusted library allocation
page read and write
183DD5F5000
trusted library allocation
page read and write
183DD488000
trusted library allocation
page read and write
183DF184000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183D777E000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
183D8D1C000
trusted library allocation
page read and write
183E0861000
trusted library allocation
page read and write
183D2C3D000
trusted library allocation
page read and write
183CC576000
heap
page read and write
183D8DA3000
trusted library allocation
page read and write
183D6FCE000
trusted library allocation
page read and write
183DF184000
trusted library allocation
page read and write
183D2E98000
heap
page read and write
183D1682000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
183D8B23000
trusted library allocation
page read and write
DE4000
heap
page read and write
183D77E7000
trusted library allocation
page read and write
183DD424000
trusted library allocation
page read and write
183DD53A000
trusted library allocation
page read and write
183D2BE1000
trusted library allocation
page read and write
183DD580000
trusted library allocation
page read and write
183D7D00000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D5596000
trusted library allocation
page read and write
183D57DF000
trusted library allocation
page read and write
183D70A7000
trusted library allocation
page read and write
183D6311000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183D2CBC000
trusted library allocation
page read and write
183D7761000
trusted library allocation
page read and write
183D2B65000
trusted library allocation
page read and write
183D9B09000
trusted library allocation
page read and write
183D5532000
trusted library allocation
page read and write
F0E000
heap
page read and write
183D705A000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
387123E000
stack
page read and write
183D15FE000
trusted library allocation
page read and write
183DFBB8000
trusted library allocation
page read and write
183DFB7B000
trusted library allocation
page read and write
183D5161000
trusted library allocation
page read and write
183D78AF000
trusted library allocation
page read and write
2423DC00000
unclassified section
page readonly
183D603B000
trusted library allocation
page read and write
183D75C5000
trusted library allocation
page read and write
183D2A23000
trusted library allocation
page read and write
183D7C51000
trusted library allocation
page read and write
2423DE60000
heap
page readonly
183DD222000
trusted library allocation
page read and write
183D3880000
trusted library allocation
page read and write
183D26A3000
trusted library allocation
page read and write
183E088F000
trusted library allocation
page read and write
2994CDA5000
trusted library allocation
page read and write
183CC560000
heap
page read and write
36C1000
heap
page read and write
183CC58B000
heap
page read and write
183D2669000
trusted library allocation
page read and write
183D6F91000
trusted library allocation
page read and write
36C0000
heap
page read and write
183D6FDE000
trusted library allocation
page read and write
183DD41B000
trusted library allocation
page read and write
183DD252000
trusted library allocation
page read and write
183D80E6000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
183E0D9B000
trusted library allocation
page read and write
183CC5C6000
heap
page read and write
183D2E86000
heap
page read and write
183D74DD000
trusted library allocation
page read and write
183DD891000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183D7718000
trusted library allocation
page read and write
D40000
heap
page read and write
2994C7D0000
remote allocation
page read and write
183D7780000
trusted library allocation
page read and write
183DD5E0000
trusted library allocation
page read and write
183D67D5000
trusted library allocation
page read and write
183D80DC000
trusted library allocation
page read and write
183D75B6000
trusted library allocation
page read and write
183D319C000
trusted library allocation
page read and write
183D75C5000
trusted library allocation
page read and write
183D2BE7000
trusted library allocation
page read and write
183DF9C8000
trusted library allocation
page read and write
183D26D9000
trusted library allocation
page read and write
183CC56C000
heap
page read and write
259921C0000
heap
page read and write
183DD5EC000
trusted library allocation
page read and write
183D601E000
trusted library allocation
page read and write
1B24F480000
heap
page read and write
183DD1DC000
trusted library allocation
page read and write
183D9701000
heap
page read and write
183D5E52000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183D75CF000
trusted library allocation
page read and write
183DD89F000
trusted library allocation
page read and write
183CC576000
heap
page read and write
183CC5B6000
heap
page read and write
183D161E000
trusted library allocation
page read and write
183D75A6000
trusted library allocation
page read and write
183DD911000
trusted library allocation
page read and write
183CC5C9000
heap
page read and write
183D60F0000
trusted library allocation
page read and write
259921A2000
heap
page read and write
183E0D51000
trusted library allocation
page read and write
F29000
heap
page read and write
183CC5CA000
heap
page read and write
183E0D5E000
trusted library allocation
page read and write
1B24F2D1000
heap
page read and write
183D8B96000
trusted library allocation
page read and write
183E0DAB000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183DD24A000
trusted library allocation
page read and write
183D7891000
trusted library allocation
page read and write
183D6470000
trusted library allocation
page read and write
2994CD61000
trusted library allocation
page read and write
183CC56C000
heap
page read and write
183D67F7000
trusted library allocation
page read and write
183D7774000
trusted library allocation
page read and write
183D75D1000
trusted library allocation
page read and write
183DFB3A000
trusted library allocation
page read and write
2423E003000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
2423DC8A000
remote allocation
page execute read
183D75B6000
trusted library allocation
page read and write
183D2666000
trusted library allocation
page read and write
183DF13F000
trusted library allocation
page read and write
183DF184000
trusted library allocation
page read and write
183DF8FD000
trusted library allocation
page read and write
183D16E4000
trusted library allocation
page read and write
183D67E5000
trusted library allocation
page read and write
183D7653000
trusted library allocation
page read and write
183DF1B7000
trusted library allocation
page read and write
183D80F7000
trusted library allocation
page read and write
183CC5CC000
heap
page read and write
2994CA44000
heap
page read and write
183D6C8E000
trusted library allocation
page read and write
183D708C000
trusted library allocation
page read and write
183D519A000
trusted library allocation
page read and write
183DD3C6000
trusted library allocation
page read and write
183D67F2000
trusted library allocation
page read and write
183D55A0000
trusted library allocation
page read and write
183DF18F000
trusted library allocation
page read and write
386F9D8000
stack
page read and write
183CC594000
heap
page read and write
183D75D1000
trusted library allocation
page read and write
183D2EAD000
heap
page read and write
183D71E8000
trusted library allocation
page read and write
183D3186000
trusted library allocation
page read and write
183D55C7000
trusted library allocation
page read and write
183D5128000
trusted library allocation
page read and write
183D5FEC000
trusted library allocation
page read and write
183D775D000
trusted library allocation
page read and write
183D519C000
trusted library allocation
page read and write
183E0817000
trusted library allocation
page read and write
183E0893000
trusted library allocation
page read and write
183E08D8000
trusted library allocation
page read and write
183D557B000
trusted library allocation
page read and write
C2FF3FE000
unkown
page readonly
183D55E2000
trusted library allocation
page read and write
183D775D000
trusted library allocation
page read and write
183DD899000
trusted library allocation
page read and write
183DF1D3000
trusted library allocation
page read and write
183D7773000
trusted library allocation
page read and write
183D5136000
trusted library allocation
page read and write
183DD7CC000
trusted library allocation
page read and write
183D5E3B000
trusted library allocation
page read and write
DEE517D000
stack
page read and write
183D2EAD000
heap
page read and write
387127E000
unkown
page readonly
183DF1B7000
trusted library allocation
page read and write
183D6F51000
trusted library allocation
page read and write
183D6750000
trusted library allocation
page read and write
183E0D49000
trusted library allocation
page read and write
183D75FB000
trusted library allocation
page read and write
2599219E000
heap
page read and write
183D70C8000
trusted library allocation
page read and write
2AC9C20F000
trusted library allocation
page execute read
183E0D9B000
trusted library allocation
page read and write
183D55E2000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D7790000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183D7088000
trusted library allocation
page read and write
183D752E000
trusted library allocation
page read and write
183CC5CE000
heap
page read and write
183E0D67000
trusted library allocation
page read and write
F01000
heap
page read and write
183D67AD000
trusted library allocation
page read and write
183D566B000
trusted library allocation
page read and write
183D756E000
trusted library allocation
page read and write
183DFFD2000
trusted library allocation
page read and write
183D7C2B000
trusted library allocation
page read and write
FD6AFFC000
stack
page read and write
183D2EB5000
heap
page read and write
183E0E7A000
trusted library allocation
page read and write
183E0836000
trusted library allocation
page read and write
183D6F44000
trusted library allocation
page read and write
183D75C5000
trusted library allocation
page read and write
183DD265000
trusted library allocation
page read and write
183D74E4000
trusted library allocation
page read and write
183DD8D3000
trusted library allocation
page read and write
183DD881000
trusted library allocation
page read and write
183D701E000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183D7753000
trusted library allocation
page read and write
183DD5EE000
trusted library allocation
page read and write
183D0FEF000
trusted library allocation
page read and write
183DD1D8000
trusted library allocation
page read and write
183D74DA000
trusted library allocation
page read and write
183D5FFA000
trusted library allocation
page read and write
183DD8D3000
trusted library allocation
page read and write
183DF1D1000
trusted library allocation
page read and write
183DEB3C000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183DDA33000
trusted library allocation
page read and write
183DD78C000
trusted library allocation
page read and write
183D5791000
trusted library allocation
page read and write
183D675E000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
1B24F3B8000
heap
page read and write
183D60F4000
trusted library allocation
page read and write
183D81DF000
trusted library allocation
page read and write
183D5110000
trusted library allocation
page read and write
183D8B7E000
trusted library allocation
page read and write
183D5FBC000
trusted library allocation
page read and write
183E08C3000
trusted library allocation
page read and write
183DF9DD000
trusted library allocation
page read and write
183E0DB5000
trusted library allocation
page read and write
183DF18A000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183DF189000
trusted library allocation
page read and write
183D7549000
trusted library allocation
page read and write
183D77A4000
trusted library allocation
page read and write
183DD8B4000
trusted library allocation
page read and write
183D702F000
trusted library allocation
page read and write
183D67AB000
trusted library allocation
page read and write
183D7753000
trusted library allocation
page read and write
183E08C3000
trusted library allocation
page read and write
2994CE1D000
trusted library allocation
page read and write
183D672E000
trusted library allocation
page read and write
183D80A6000
trusted library allocation
page read and write
183DFAA5000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183CC5BB000
heap
page read and write
183D38AF000
trusted library allocation
page read and write
2423DC70000
remote allocation
page read and write
183D57D7000
trusted library allocation
page read and write
183DFE65000
trusted library allocation
page read and write
183D55BE000
trusted library allocation
page read and write
183D2C76000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D75A8000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183E1A85000
trusted library allocation
page read and write
183D7C18000
trusted library allocation
page read and write
183E0835000
trusted library allocation
page read and write
183DFA5E000
trusted library allocation
page read and write
183D8D51000
trusted library allocation
page read and write
183D8E6A000
trusted library allocation
page read and write
183D774F000
trusted library allocation
page read and write
183DFE77000
trusted library allocation
page read and write
183D31CB000
trusted library allocation
page read and write
183D8142000
trusted library allocation
page read and write
183E0D51000
trusted library allocation
page read and write
183DD3D7000
trusted library allocation
page read and write
183D6FB8000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183DD4D2000
trusted library allocation
page read and write
183E0D83000
trusted library allocation
page read and write
183D5158000
trusted library allocation
page read and write
183D5170000
trusted library allocation
page read and write
183D2C38000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D314A000
trusted library allocation
page read and write
183E0DBD000
trusted library allocation
page read and write
183D704F000
trusted library allocation
page read and write
1B24F3B9000
heap
page read and write
183D7062000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D75FB000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183CC588000
heap
page read and write
183D2E9E000
heap
page read and write
183D38C7000
trusted library allocation
page read and write
183D2EE0000
heap
page read and write
183CC58F000
heap
page read and write
183D2EAF000
heap
page read and write
183DD91F000
trusted library allocation
page read and write
183DD93A000
trusted library allocation
page read and write
183D2E4D000
heap
page read and write
1B24F999000
heap
page read and write
183DD5CB000
trusted library allocation
page read and write
183CC5CF000
heap
page read and write
183E0833000
trusted library allocation
page read and write
183D789D000
trusted library allocation
page read and write
183D5F98000
trusted library allocation
page read and write
183D2CA0000
trusted library allocation
page read and write
183DD345000
trusted library allocation
page read and write
183D67A3000
trusted library allocation
page read and write
183D31CB000
trusted library allocation
page read and write
183D73AD000
trusted library allocation
page read and write
183D9BA6000
trusted library allocation
page read and write
183D2EB2000
heap
page read and write
183D778A000
trusted library allocation
page read and write
183D55CE000
trusted library allocation
page read and write
183E0D9D000
trusted library allocation
page read and write
183E08D8000
trusted library allocation
page read and write
183DF1C7000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183E01AD000
trusted library allocation
page read and write
183D267D000
trusted library allocation
page read and write
2423DE86000
heap
page read and write
183D6021000
trusted library allocation
page read and write
183D81AB000
trusted library allocation
page read and write
1B24E900000
heap
page readonly
183CC560000
heap
page read and write
183D80AA000
trusted library allocation
page read and write
183D38C0000
trusted library allocation
page read and write
183E08DA000
trusted library allocation
page read and write
183D7BFC000
trusted library allocation
page read and write
183D76E6000
trusted library allocation
page read and write
183D0FC0000
trusted library allocation
page read and write
183DD426000
trusted library allocation
page read and write
183CC585000
heap
page read and write
1B24F530000
trusted library allocation
page read and write
183D2B70000
trusted library allocation
page read and write
183D2B6B000
trusted library allocation
page read and write
1C70000
heap
page read and write
1B24F3C1000
heap
page read and write
183D6F81000
trusted library allocation
page read and write
183D57B5000
trusted library allocation
page read and write
183D2EAD000
heap
page read and write
183CC59E000
heap
page read and write
183D8165000
trusted library allocation
page read and write
1B24F3C1000
heap
page read and write
183D2CBC000
trusted library allocation
page read and write
183E0D9B000
trusted library allocation
page read and write
183D511A000
trusted library allocation
page read and write
183D55B8000
trusted library allocation
page read and write
183D7479000
trusted library allocation
page read and write
183DD905000
trusted library allocation
page read and write
183D80BE000
trusted library allocation
page read and write
183D708C000
trusted library allocation
page read and write
183D76D8000
trusted library allocation
page read and write
183D559E000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183CC568000
heap
page read and write
183DD8DC000
trusted library allocation
page read and write
183CC5BB000
heap
page read and write
183D0FCE000
trusted library allocation
page read and write
2994CD2E000
trusted library allocation
page read and write
183DF8E2000
trusted library allocation
page read and write
C2817FE000
unkown
page readonly
183D7CC5000
trusted library allocation
page read and write
183D514F000
trusted library allocation
page read and write
183D7CB5000
trusted library allocation
page read and write
183D55A5000
trusted library allocation
page read and write
183D80DC000
trusted library allocation
page read and write
183DFD24000
trusted library allocation
page read and write
183D8C83000
trusted library allocation
page read and write
183D775D000
trusted library allocation
page read and write
183DD2FA000
trusted library allocation
page read and write
183DFFF7000
trusted library allocation
page read and write
183D725F000
trusted library allocation
page read and write
183DF1B5000
trusted library allocation
page read and write
183DFFC0000
trusted library allocation
page read and write
183E0E74000
trusted library allocation
page read and write
183DD883000
trusted library allocation
page read and write
183D80BE000
trusted library allocation
page read and write
183D5F6A000
trusted library allocation
page read and write
183D55C9000
trusted library allocation
page read and write
183D551F000
trusted library allocation
page read and write
183D80DA000
trusted library allocation
page read and write
183DD8D3000
trusted library allocation
page read and write
183DD7F7000
trusted library allocation
page read and write
183CC5D4000
heap
page read and write
183D673A000
trusted library allocation
page read and write
183D75F8000
trusted library allocation
page read and write
183DD1E0000
trusted library allocation
page read and write
183DD92F000
trusted library allocation
page read and write
183E0DA9000
trusted library allocation
page read and write
183E1AFC000
trusted library allocation
page read and write
38732FE000
unkown
page readonly
DE4000
heap
page read and write
183D5582000
trusted library allocation
page read and write
183D7734000
trusted library allocation
page read and write
183D80E4000
trusted library allocation
page read and write
183D515A000
trusted library allocation
page read and write
183D2B86000
trusted library allocation
page read and write
C2FF47B000
stack
page read and write
183D977E000
heap
page read and write
183D67FC000
trusted library allocation
page read and write
183D7773000
trusted library allocation
page read and write
183D557E000
trusted library allocation
page read and write
183D774C000
trusted library allocation
page read and write
183D55A5000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D38FC000
trusted library allocation
page read and write
1B24F31D000
heap
page read and write
183DFBC0000
trusted library allocation
page read and write
183DDAE1000
trusted library allocation
page read and write
183D514D000
trusted library allocation
page read and write
183DD7F6000
trusted library allocation
page read and write
183E0EBB000
trusted library allocation
page read and write
183D3852000
trusted library allocation
page read and write
183DFA9B000
trusted library allocation
page read and write
183DF1DC000
trusted library allocation
page read and write
183D74D3000
trusted library allocation
page read and write
292000
unkown
page readonly
183D576E000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D7854000
trusted library allocation
page read and write
183D7761000
trusted library allocation
page read and write
183D2C32000
trusted library allocation
page read and write
183D77D7000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183DD899000
trusted library allocation
page read and write
183D38C3000
trusted library allocation
page read and write
183DDA4B000
trusted library allocation
page read and write
183DD5EC000
trusted library allocation
page read and write
183DF9CE000
trusted library allocation
page read and write
183D74D7000
trusted library allocation
page read and write
183D5588000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183E0D70000
trusted library allocation
page read and write
183DD1E0000
trusted library allocation
page read and write
183E08EB000
trusted library allocation
page read and write
183D16E4000
trusted library allocation
page read and write
2423E082000
trusted library allocation
page read and write
183DFA78000
trusted library allocation
page read and write
183DD91F000
trusted library allocation
page read and write
25993C72000
heap
page read and write
183CC5B6000
heap
page read and write
183D558D000
trusted library allocation
page read and write
183DD8C5000
trusted library allocation
page read and write
183D6794000
trusted library allocation
page read and write
183D7491000
trusted library allocation
page read and write
183CC5BB000
heap
page read and write
1B24ECE4000
heap
page read and write
183D642A000
trusted library allocation
page read and write
183D269C000
trusted library allocation
page read and write
183D2C73000
trusted library allocation
page read and write
183D1675000
trusted library allocation
page read and write
183D5156000
trusted library allocation
page read and write
183DD468000
trusted library allocation
page read and write
1B24ED18000
trusted library allocation
page read and write
183D5FAA000
trusted library allocation
page read and write
183DFBC4000
trusted library allocation
page read and write
F0A000
heap
page read and write
183D5CAF000
trusted library allocation
page read and write
183D8198000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183DD126000
trusted library allocation
page read and write
183D9799000
heap
page read and write
183D77D2000
trusted library allocation
page read and write
183D8B73000
trusted library allocation
page read and write
183D67FA000
trusted library allocation
page read and write
183D74D7000
trusted library allocation
page read and write
183D6CAE000
trusted library allocation
page read and write
183DEE3C000
trusted library allocation
page read and write
183D7799000
trusted library allocation
page read and write
183E0E9C000
trusted library allocation
page read and write
183D389C000
trusted library allocation
page read and write
183DD289000
trusted library allocation
page read and write
183D26A3000
trusted library allocation
page read and write
183D38C2000
trusted library allocation
page read and write
183DF12E000
trusted library allocation
page read and write
183D7A0D000
trusted library allocation
page read and write
183D2E7D000
heap
page read and write
183CC5B6000
heap
page read and write
183E1A59000
trusted library allocation
page read and write
183DFD01000
trusted library allocation
page read and write
183E0D67000
trusted library allocation
page read and write
183E0DD7000
trusted library allocation
page read and write
1B24ED78000
trusted library allocation
page read and write
183CC5C2000
heap
page read and write
183CC5CE000
heap
page read and write
183CC58B000
heap
page read and write
183DD3F4000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D9385000
trusted library allocation
page read and write
183D55F1000
trusted library allocation
page read and write
183E0DA7000
trusted library allocation
page read and write
183D3161000
trusted library allocation
page read and write
183D92D6000
trusted library allocation
page read and write
183D8DB3000
trusted library allocation
page read and write
183DD9FA000
trusted library allocation
page read and write
183DD7E5000
trusted library allocation
page read and write
183D8B12000
trusted library allocation
page read and write
183CC573000
heap
page read and write
1B24F3C1000
heap
page read and write
183CC585000
heap
page read and write
183D55AE000
trusted library allocation
page read and write
2994C7F0000
unclassified section
page readonly
183D78AB000
trusted library allocation
page read and write
183DFAC0000
trusted library allocation
page read and write
1B24F3C1000
heap
page read and write
183E0D70000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D2B92000
trusted library allocation
page read and write
183E0D80000
trusted library allocation
page read and write
183D63C6000
trusted library allocation
page read and write
183D65C4000
trusted library allocation
page read and write
183D8053000
trusted library allocation
page read and write
183CC5C4000
heap
page read and write
183E08D8000
trusted library allocation
page read and write
183DFFCF000
trusted library allocation
page read and write
183D5783000
trusted library allocation
page read and write
183E0D80000
trusted library allocation
page read and write
183D78E7000
trusted library allocation
page read and write
183D3895000
trusted library allocation
page read and write
29C000
unkown
page write copy
183DF13C000
trusted library allocation
page read and write
183D7693000
trusted library allocation
page read and write
183E0DB2000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D57D7000
trusted library allocation
page read and write
183D5642000
trusted library allocation
page read and write
183D73A4000
trusted library allocation
page read and write
183CC56A000
heap
page read and write
183D2B70000
trusted library allocation
page read and write
183D9BC6000
trusted library allocation
page read and write
2994CD10000
trusted library allocation
page read and write
183D75FB000
trusted library allocation
page read and write
1B24F32F000
heap
page read and write
183DD5FB000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183CC5B6000
heap
page read and write
183D7C70000
trusted library allocation
page read and write
183D6023000
trusted library allocation
page read and write
183DFA93000
trusted library allocation
page read and write
183D75B1000
trusted library allocation
page read and write
183CC5BB000
heap
page read and write
183D605B000
trusted library allocation
page read and write
183D16B9000
trusted library allocation
page read and write
183DFFBD000
trusted library allocation
page read and write
183DD9F3000
trusted library allocation
page read and write
183DD7F0000
trusted library allocation
page read and write
183D77F4000
trusted library allocation
page read and write
183DF133000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183DD9FA000
trusted library allocation
page read and write
183D7875000
trusted library allocation
page read and write
183CC5C9000
heap
page read and write
183CC59E000
heap
page read and write
183D2666000
trusted library allocation
page read and write
183D2EAD000
heap
page read and write
183D7C10000
trusted library allocation
page read and write
1B24ED10000
trusted library allocation
page read and write
183DD246000
trusted library allocation
page read and write
183D55C9000
trusted library allocation
page read and write
183D319C000
trusted library allocation
page read and write
183D7CE4000
trusted library allocation
page read and write
9EAF9FE000
stack
page read and write
183D167D000
trusted library allocation
page read and write
183D7C46000
trusted library allocation
page read and write
183D3181000
trusted library allocation
page read and write
183D55A5000
trusted library allocation
page read and write
183DD3E6000
trusted library allocation
page read and write
2994CE00000
trusted library allocation
page read and write
183D314C000
trusted library allocation
page read and write
183D31CB000
trusted library allocation
page read and write
183DF9DB000
trusted library allocation
page read and write
183E0D70000
trusted library allocation
page read and write
183D9B54000
trusted library allocation
page read and write
183D9401000
trusted library allocation
page read and write
DEE843E000
unkown
page readonly
183DD1F8000
trusted library allocation
page read and write
2423E07A000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
183DF1DC000
trusted library allocation
page read and write
183D774C000
trusted library allocation
page read and write
183D70C4000
trusted library allocation
page read and write
183D0FDD000
trusted library allocation
page read and write
183DF1D3000
trusted library allocation
page read and write
183D3184000
trusted library allocation
page read and write
183D25CA000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D601E000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
2994C9CF000
unclassified section
page read and write
183CC58C000
heap
page read and write
183CC59E000
heap
page read and write
2423E207000
trusted library allocation
page read and write
183DF1D1000
trusted library allocation
page read and write
183D81F6000
trusted library allocation
page read and write
1B24F50A000
trusted library allocation
page read and write
183D514D000
trusted library allocation
page read and write
183D63D2000
trusted library allocation
page read and write
183D55AE000
trusted library allocation
page read and write
183D5122000
trusted library allocation
page read and write
183D5D4D000
trusted library allocation
page read and write
183D75BA000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183CC596000
heap
page read and write
183CC5B6000
heap
page read and write
183DF137000
trusted library allocation
page read and write
183DD897000
trusted library allocation
page read and write
183DD89F000
trusted library allocation
page read and write
183E08B8000
trusted library allocation
page read and write
2AC9C1F1000
trusted library allocation
page execute read
9EAE9FE000
stack
page read and write
2994CD23000
trusted library allocation
page read and write
183DF1DC000
trusted library allocation
page read and write
183DD56C000
trusted library allocation
page read and write
183D55C7000
trusted library allocation
page read and write
183DD897000
trusted library allocation
page read and write
183D759A000
trusted library allocation
page read and write
183DDA1F000
trusted library allocation
page read and write
183D7799000
trusted library allocation
page read and write
1B24E930000
trusted library allocation
page read and write
183D6469000
trusted library allocation
page read and write
183D387D000
trusted library allocation
page read and write
183D31CB000
trusted library allocation
page read and write
183DFFF7000
trusted library allocation
page read and write
183DD5F2000
trusted library allocation
page read and write
1D1000
unkown
page execute read
DEE73FE000
unkown
page readonly
183CC59E000
heap
page read and write
183D2680000
trusted library allocation
page read and write
2423E024000
trusted library allocation
page read and write
183D8E27000
trusted library allocation
page read and write
183D6F72000
trusted library allocation
page read and write
183D7554000
trusted library allocation
page read and write
183E0DA9000
trusted library allocation
page read and write
183DFB88000
trusted library allocation
page read and write
183D1675000
trusted library allocation
page read and write
183D7525000
trusted library allocation
page read and write
183CC562000
heap
page read and write
183DD4A8000
trusted library allocation
page read and write
183D7556000
trusted library allocation
page read and write
259924B5000
heap
page read and write
183DD323000
trusted library allocation
page read and write
183D6FCE000
trusted library allocation
page read and write
183D776B000
trusted library allocation
page read and write
183D80C2000
trusted library allocation
page read and write
183D70A3000
trusted library allocation
page read and write
183DFE77000
trusted library allocation
page read and write
183E0893000
trusted library allocation
page read and write
183D7773000
trusted library allocation
page read and write
183D76EB000
trusted library allocation
page read and write
183D74D7000
trusted library allocation
page read and write
183E0DDA000
trusted library allocation
page read and write
183DD30D000
trusted library allocation
page read and write
183D8124000
trusted library allocation
page read and write
183DD843000
trusted library allocation
page read and write
183D5E5B000
trusted library allocation
page read and write
183D7829000
trusted library allocation
page read and write
183CC5D1000
heap
page read and write
1B24F3B1000
heap
page read and write
183DF9C7000
trusted library allocation
page read and write
183D6FA4000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D2EB3000
heap
page read and write
25992200000
trusted library allocation
page read and write
183D71D4000
trusted library allocation
page read and write
183D5158000
trusted library allocation
page read and write
183D8BFC000
trusted library allocation
page read and write
183E0870000
trusted library allocation
page read and write
183D2B70000
trusted library allocation
page read and write
183DD3DD000
trusted library allocation
page read and write
2994CE03000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
1B24F3CC000
heap
page read and write
183CC59E000
heap
page read and write
183D0FC0000
trusted library allocation
page read and write
183CC58E000
heap
page read and write
183D71FE000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183CC5B6000
heap
page read and write
183CC5A2000
heap
page read and write
183E08DA000
trusted library allocation
page read and write
183D6746000
trusted library allocation
page read and write
183D1693000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183D38FC000
trusted library allocation
page read and write
183D80AC000
trusted library allocation
page read and write
183DD8AE000
trusted library allocation
page read and write
183D67B0000
trusted library allocation
page read and write
183D8D80000
trusted library allocation
page read and write
183D7E00000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D67AB000
trusted library allocation
page read and write
183D2E7D000
heap
page read and write
183DD9F7000
trusted library allocation
page read and write
1B24EAC2000
unkown
page execute read
183CC596000
heap
page read and write
183D5776000
trusted library allocation
page read and write
183D9747000
heap
page read and write
183D55B8000
trusted library allocation
page read and write
183D56FA000
trusted library allocation
page read and write
183E0DA5000
trusted library allocation
page read and write
183D75D1000
trusted library allocation
page read and write
183D57B1000
trusted library allocation
page read and write
183E1583000
trusted library allocation
page read and write
183DF1DC000
trusted library allocation
page read and write
1B24F34F000
heap
page read and write
183DD1E4000
trusted library allocation
page read and write
183D557B000
trusted library allocation
page read and write
183DD282000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183DD9F7000
trusted library allocation
page read and write
2994CE0D000
trusted library allocation
page read and write
183DD856000
trusted library allocation
page read and write
183D2EAD000
heap
page read and write
183D5F72000
trusted library allocation
page read and write
183D16B9000
trusted library allocation
page read and write
183D5587000
trusted library allocation
page read and write
183D80F9000
trusted library allocation
page read and write
183D2EAC000
heap
page read and write
183DD833000
trusted library allocation
page read and write
183DF975000
trusted library allocation
page read and write
183CC56F000
heap
page read and write
183D75B1000
trusted library allocation
page read and write
183D71E0000
trusted library allocation
page read and write
183D2B73000
trusted library allocation
page read and write
183CC599000
heap
page read and write
183E0DB2000
trusted library allocation
page read and write
183CC566000
heap
page read and write
183D8BD5000
trusted library allocation
page read and write
183D2C5F000
trusted library allocation
page read and write
183D2EF2000
heap
page read and write
183D2EF2000
heap
page read and write
183DD89C000
trusted library allocation
page read and write
183D74FD000
trusted library allocation
page read and write
183D80D1000
trusted library allocation
page read and write
183D7753000
trusted library allocation
page read and write
183D8D09000
trusted library allocation
page read and write
183E08C7000
trusted library allocation
page read and write
183DFA49000
trusted library allocation
page read and write
1B24ED5C000
trusted library allocation
page read and write
1B24F3C1000
heap
page read and write
183DD2BF000
trusted library allocation
page read and write
183D7799000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D7CEA000
trusted library allocation
page read and write
183D7653000
trusted library allocation
page read and write
183D1700000
trusted library allocation
page read and write
183D7896000
trusted library allocation
page read and write
183DD24A000
trusted library allocation
page read and write
183D7CC7000
trusted library allocation
page read and write
183DFFB0000
trusted library allocation
page read and write
183DD5F0000
trusted library allocation
page read and write
183D26D4000
trusted library allocation
page read and write
183E0D85000
trusted library allocation
page read and write
183D8085000
trusted library allocation
page read and write
183DD8B4000
trusted library allocation
page read and write
183DD1D0000
trusted library allocation
page read and write
183D9C16000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183CC596000
heap
page read and write
183D8B57000
trusted library allocation
page read and write
183D579D000
trusted library allocation
page read and write
C2827FE000
unkown
page readonly
183D7A3E000
trusted library allocation
page read and write
183D2CE9000
trusted library allocation
page read and write
183D6F75000
trusted library allocation
page read and write
183CC584000
heap
page read and write
183DD8D6000
trusted library allocation
page read and write
183CC596000
heap
page read and write
183DD8CD000
trusted library allocation
page read and write
1B24EDBA000
trusted library allocation
page read and write
183D51A1000
trusted library allocation
page read and write
F34000
heap
page read and write
2423E0A2000
trusted library allocation
page read and write
183D7B73000
trusted library allocation
page read and write
2994C900000
heap
page read and write
183D7C90000
trusted library allocation
page read and write
183D2B65000
trusted library allocation
page read and write
183DF97A000
trusted library allocation
page read and write
1B24ECE0000
heap
page read and write
183DFFE1000
trusted library allocation
page read and write
183D63B6000
trusted library allocation
page read and write
183DFFFE000
trusted library allocation
page read and write
183D2670000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183CC580000
heap
page read and write
183D7799000
trusted library allocation
page read and write
183DD89F000
trusted library allocation
page read and write
183D38C2000
trusted library allocation
page read and write
183D6758000
trusted library allocation
page read and write
183D7BF6000
trusted library allocation
page read and write
183E08BD000
trusted library allocation
page read and write
183DEE00000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
183CC5C0000
heap
page read and write
183D16F4000
trusted library allocation
page read and write
183D9BA6000
trusted library allocation
page read and write
183E08C3000
trusted library allocation
page read and write
183E08A4000
trusted library allocation
page read and write
183D57AE000
trusted library allocation
page read and write
183DD5E0000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183DD891000
trusted library allocation
page read and write
F13000
heap
page read and write
183D315E000
trusted library allocation
page read and write
183D2B65000
trusted library allocation
page read and write
183CC55E000
heap
page read and write
183CC5B6000
heap
page read and write
183D7CFE000
trusted library allocation
page read and write
183D77F2000
trusted library allocation
page read and write
183D5156000
trusted library allocation
page read and write
183D3153000
trusted library allocation
page read and write
183D78E2000
trusted library allocation
page read and write
183D67F2000
trusted library allocation
page read and write
183D5D25000
trusted library allocation
page read and write
183D7391000
trusted library allocation
page read and write
183DD891000
trusted library allocation
page read and write
183D55A7000
trusted library allocation
page read and write
183DD472000
trusted library allocation
page read and write
183E08D8000
trusted library allocation
page read and write
183D9B09000
trusted library allocation
page read and write
183D55DE000
trusted library allocation
page read and write
183D38A7000
trusted library allocation
page read and write
183D71EC000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D26F3000
trusted library allocation
page read and write
183D314C000
trusted library allocation
page read and write
183E0DA1000
trusted library allocation
page read and write
183DD5F1000
trusted library allocation
page read and write
183D2EB2000
heap
page read and write
183D5189000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
1B24ED0C000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183D269A000
trusted library allocation
page read and write
183D7790000
trusted library allocation
page read and write
183D8DF3000
trusted library allocation
page read and write
183D55F0000
trusted library allocation
page read and write
183D55BE000
trusted library allocation
page read and write
183DF1E5000
trusted library allocation
page read and write
183D80C2000
trusted library allocation
page read and write
183DD927000
trusted library allocation
page read and write
1B24F330000
heap
page read and write
183DD8D6000
trusted library allocation
page read and write
183D77D2000
trusted library allocation
page read and write
183CC5A2000
heap
page read and write
183D2C61000
trusted library allocation
page read and write
2423E08F000
trusted library allocation
page read and write
183DD20D000
trusted library allocation
page read and write
183D7765000
trusted library allocation
page read and write
183CC56C000
heap
page read and write
183D55B6000
trusted library allocation
page read and write
183E0D61000
trusted library allocation
page read and write
183D777E000
trusted library allocation
page read and write
183D515A000
trusted library allocation
page read and write
183D16B2000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
F15000
heap
page read and write
183D77F2000
trusted library allocation
page read and write
183D5158000
trusted library allocation
page read and write
183D77B2000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183D5153000
trusted library allocation
page read and write
1B24F334000
heap
page read and write
183DD227000
trusted library allocation
page read and write
183DD91B000
trusted library allocation
page read and write
183D6F99000
trusted library allocation
page read and write
183E0D51000
trusted library allocation
page read and write
183D576E000
trusted library allocation
page read and write
183DDAE5000
trusted library allocation
page read and write
183D73AD000
trusted library allocation
page read and write
183E0E9A000
trusted library allocation
page read and write
183D725D000
trusted library allocation
page read and write
183DD270000
trusted library allocation
page read and write
183DFD04000
trusted library allocation
page read and write
183D6FDE000
trusted library allocation
page read and write
183DD9EF000
trusted library allocation
page read and write
183DDA8C000
trusted library allocation
page read and write
183D6450000
trusted library allocation
page read and write
183E0D85000
trusted library allocation
page read and write
183D3860000
trusted library allocation
page read and write
183DFBEB000
trusted library allocation
page read and write
183D38CC000
trusted library allocation
page read and write
1B24F2C0000
heap
page read and write
183CC58B000
heap
page read and write
183D7799000
trusted library allocation
page read and write
183D6F70000
trusted library allocation
page read and write
183D55C6000
trusted library allocation
page read and write
1B24F3B0000
heap
page read and write
183E0883000
trusted library allocation
page read and write
183E0D51000
trusted library allocation
page read and write
183D7CF4000
trusted library allocation
page read and write
183DFB28000
trusted library allocation
page read and write
183D67EC000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183DD888000
trusted library allocation
page read and write
183CC594000
heap
page read and write
DE4000
heap
page read and write
183DF86C000
trusted library allocation
page read and write
183DFF67000
trusted library allocation
page read and write
183D674B000
trusted library allocation
page read and write
183D26B2000
trusted library allocation
page read and write
183D319C000
trusted library allocation
page read and write
183D2E87000
heap
page read and write
183CC5B6000
heap
page read and write
183D732E000
trusted library allocation
page read and write
183D3161000
trusted library allocation
page read and write
1B24F940000
heap
page read and write
C2FFD3E000
stack
page read and write
183D73CF000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183D70C8000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
1B24F339000
heap
page read and write
183D774C000
trusted library allocation
page read and write
F19000
heap
page read and write
183DD83C000
trusted library allocation
page read and write
183CC5CF000
heap
page read and write
183CC58F000
heap
page read and write
183CC5C5000
heap
page read and write
183D75FB000
trusted library allocation
page read and write
183D7CF4000
trusted library allocation
page read and write
183D8077000
trusted library allocation
page read and write
1B24F50C000
trusted library allocation
page read and write
183D812B000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D7C98000
trusted library allocation
page read and write
217BCA00000
trusted library allocation
page read and write
183E0D9C000
trusted library allocation
page read and write
183D75AF000
trusted library allocation
page read and write
183E0DBD000
trusted library allocation
page read and write
183DD37E000
trusted library allocation
page read and write
183CC5A2000
heap
page read and write
183DD91B000
trusted library allocation
page read and write
183DD8C9000
trusted library allocation
page read and write
183D978D000
heap
page read and write
183E0DA5000
trusted library allocation
page read and write
3871AFE000
stack
page read and write
2994CDB9000
trusted library allocation
page read and write
183D65CB000
trusted library allocation
page read and write
183DD285000
trusted library allocation
page read and write
183D7768000
trusted library allocation
page read and write
183D55C9000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
1B24ED75000
trusted library allocation
page read and write
183E08D8000
trusted library allocation
page read and write
1B24E850000
unclassified section
page readonly
1B24F985000
heap
page read and write
183D7576000
trusted library allocation
page read and write
183DD2AA000
trusted library allocation
page read and write
183D51FD000
trusted library allocation
page read and write
183D2C64000
trusted library allocation
page read and write
183DD8F3000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183E08A4000
trusted library allocation
page read and write
183D8147000
trusted library allocation
page read and write
183D72E5000
trusted library allocation
page read and write
183DD246000
trusted library allocation
page read and write
183DF133000
trusted library allocation
page read and write
183D1666000
trusted library allocation
page read and write
1B24F9A7000
heap
page read and write
183D65DE000
trusted library allocation
page read and write
183CC58C000
heap
page read and write
183D579C000
trusted library allocation
page read and write
183CC575000
heap
page read and write
183D756C000
trusted library allocation
page read and write
183CC58E000
heap
page read and write
183CC5C6000
heap
page read and write
183DD175000
trusted library allocation
page read and write
183CC5BC000
heap
page read and write
183D6F6B000
trusted library allocation
page read and write
183D67D5000
trusted library allocation
page read and write
183D774F000
trusted library allocation
page read and write
183E0E8C000
trusted library allocation
page read and write
183D63BD000
trusted library allocation
page read and write
183D8179000
trusted library allocation
page read and write
183E0D5E000
trusted library allocation
page read and write
183D55E6000
trusted library allocation
page read and write
183DD9F7000
trusted library allocation
page read and write
183DD3F6000
trusted library allocation
page read and write
183D775D000
trusted library allocation
page read and write
183DF9E6000
trusted library allocation
page read and write
183D2BA8000
trusted library allocation
page read and write
183D2EAC000
heap
page read and write
183CC573000
heap
page read and write
183E0D99000
trusted library allocation
page read and write
183D2B73000
trusted library allocation
page read and write
183D7A27000
trusted library allocation
page read and write
183DD3D3000
trusted library allocation
page read and write
183D2C4D000
trusted library allocation
page read and write
183D77E7000
trusted library allocation
page read and write
183D71DC000
trusted library allocation
page read and write
183D2C2F000
trusted library allocation
page read and write
183D9C31000
trusted library allocation
page read and write
183D56D8000
trusted library allocation
page read and write
183D75AF000
trusted library allocation
page read and write
FD6BFFE000
stack
page read and write
183D9726000
heap
page read and write
183D7D00000
trusted library allocation
page read and write
183D3839000
trusted library allocation
page read and write
183D703E000
trusted library allocation
page read and write
183D6794000
trusted library allocation
page read and write
183D5596000
trusted library allocation
page read and write
183DFFB5000
trusted library allocation
page read and write
183D6CDC000
trusted library allocation
page read and write
183D168D000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183DD8BC000
trusted library allocation
page read and write
1B24E920000
unclassified section
page read and write
183D2C64000
trusted library allocation
page read and write
183D551C000
trusted library allocation
page read and write
183DD7B4000
trusted library allocation
page read and write
183D770C000
trusted library allocation
page read and write
183D7C36000
trusted library allocation
page read and write
183D2CC7000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183CC594000
heap
page read and write
183DF1A0000
trusted library allocation
page read and write
183E1AB1000
trusted library allocation
page read and write
183D80DA000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183DEE16000
trusted library allocation
page read and write
183DF1C7000
trusted library allocation
page read and write
183D2B73000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183D2CA0000
trusted library allocation
page read and write
183E0158000
trusted library allocation
page read and write
183DD9EF000
trusted library allocation
page read and write
183DD584000
trusted library allocation
page read and write
183E0893000
trusted library allocation
page read and write
183DFAF6000
trusted library allocation
page read and write
183D6757000
trusted library allocation
page read and write
183CC594000
heap
page read and write
1B24EAD0000
trusted library allocation
page read and write
183D1626000
trusted library allocation
page read and write
183D2CC7000
trusted library allocation
page read and write
DEE8C3E000
stack
page read and write
183D5DA5000
trusted library allocation
page read and write
1B24F330000
heap
page read and write
183E083A000
trusted library allocation
page read and write
183CC567000
heap
page read and write
183D709F000
trusted library allocation
page read and write
183D2CC7000
trusted library allocation
page read and write
183DFBBC000
trusted library allocation
page read and write
183DD9E8000
trusted library allocation
page read and write
183DFBC6000
trusted library allocation
page read and write
183DFB21000
trusted library allocation
page read and write
38709FE000
stack
page read and write
183CC575000
heap
page read and write
183E0DC0000
trusted library allocation
page read and write
183DDA86000
trusted library allocation
page read and write
183D7611000
trusted library allocation
page read and write
183E0D51000
trusted library allocation
page read and write
183CC5D9000
heap
page read and write
183E0D5E000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183D2B65000
trusted library allocation
page read and write
183D16A0000
trusted library allocation
page read and write
183D25CA000
trusted library allocation
page read and write
183D8D80000
trusted library allocation
page read and write
183E0D5E000
trusted library allocation
page read and write
183DFFBD000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D55DE000
trusted library allocation
page read and write
183DD931000
trusted library allocation
page read and write
183CC57F000
heap
page read and write
183DD124000
trusted library allocation
page read and write
183CC577000
heap
page read and write
183D7837000
trusted library allocation
page read and write
183D385B000
trusted library allocation
page read and write
183D70A7000
trusted library allocation
page read and write
183CC56E000
heap
page read and write
183D80E8000
trusted library allocation
page read and write
183D57EA000
trusted library allocation
page read and write
183DFB17000
trusted library allocation
page read and write
D3E000
stack
page read and write
183D8D74000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
183D7535000
trusted library allocation
page read and write
183DD8A3000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183E1527000
trusted library allocation
page read and write
183D5599000
trusted library allocation
page read and write
183D73BB000
trusted library allocation
page read and write
183DD5F5000
trusted library allocation
page read and write
183D2EB2000
heap
page read and write
183D16A0000
trusted library allocation
page read and write
25993C7D000
heap
page read and write
183D6796000
trusted library allocation
page read and write
183D2B9F000
trusted library allocation
page read and write
2994CA46000
heap
page read and write
183CC573000
heap
page read and write
183DFC18000
trusted library allocation
page read and write
183D5527000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183DD8DC000
trusted library allocation
page read and write
183DD932000
trusted library allocation
page read and write
183D55C7000
trusted library allocation
page read and write
2994CD72000
trusted library allocation
page read and write
2994CB70000
heap
page read and write
183DD33B000
trusted library allocation
page read and write
183D5791000
trusted library allocation
page read and write
183D2CB1000
trusted library allocation
page read and write
183D7556000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183DFEB5000
trusted library allocation
page read and write
183D2C8C000
trusted library allocation
page read and write
2423E011000
trusted library allocation
page read and write
183D71CA000
trusted library allocation
page read and write
183D26B1000
trusted library allocation
page read and write
183E08E5000
trusted library allocation
page read and write
183D2B65000
trusted library allocation
page read and write
183DD21A000
trusted library allocation
page read and write
183DD8F3000
trusted library allocation
page read and write
25993C70000
heap
page read and write
183CC59E000
heap
page read and write
183E0D51000
trusted library allocation
page read and write
1B24F330000
heap
page read and write
EE8000
heap
page read and write
1B24F961000
heap
page read and write
183CC58B000
heap
page read and write
183D9701000
heap
page read and write
183CC594000
heap
page read and write
183CC5D9000
heap
page read and write
217BC910000
heap
page read and write
183E0D9B000
trusted library allocation
page read and write
183DD863000
trusted library allocation
page read and write
2423DC10000
unclassified section
page readonly
2994CD12000
trusted library allocation
page read and write
183D8134000
trusted library allocation
page read and write
183D7262000
trusted library allocation
page read and write
183D73BB000
trusted library allocation
page read and write
183CC565000
heap
page read and write
183CC594000
heap
page read and write
183E0DB5000
trusted library allocation
page read and write
183CC5C5000
heap
page read and write
183D5743000
trusted library allocation
page read and write
183D5592000
trusted library allocation
page read and write
183D5127000
trusted library allocation
page read and write
183D2EB5000
heap
page read and write
183DFCB1000
trusted library allocation
page read and write
183E08B8000
trusted library allocation
page read and write
183D75F5000
trusted library allocation
page read and write
183D2E86000
heap
page read and write
1B24E92F000
unclassified section
page read and write
1B24F9A9000
heap
page read and write
183D7232000
trusted library allocation
page read and write
183E0EA5000
trusted library allocation
page read and write
9EB11FE000
stack
page read and write
DEE743E000
unkown
page readonly
183D16F4000
trusted library allocation
page read and write
183D75E5000
trusted library allocation
page read and write
183D31A2000
trusted library allocation
page read and write
183D55E6000
trusted library allocation
page read and write
183DD1B8000
trusted library allocation
page read and write
183D73B1000
trusted library allocation
page read and write
183D6742000
trusted library allocation
page read and write
183DFAC1000
trusted library allocation
page read and write
183D2B73000
trusted library allocation
page read and write
183CC5C1000
heap
page read and write
183D2EF2000
heap
page read and write
183D5F54000
trusted library allocation
page read and write
183CC5CA000
heap
page read and write
183D75FD000
trusted library allocation
page read and write
183E08C3000
trusted library allocation
page read and write
183DDA88000
trusted library allocation
page read and write
183D558F000
trusted library allocation
page read and write
183D2C91000
trusted library allocation
page read and write
183D60E9000
trusted library allocation
page read and write
183D55A0000
trusted library allocation
page read and write
183D819C000
trusted library allocation
page read and write
183DD89C000
trusted library allocation
page read and write
183DFBEA000
trusted library allocation
page read and write
183CC5CF000
heap
page read and write
1B24F339000
heap
page read and write
183D7346000
trusted library allocation
page read and write
183E08DA000
trusted library allocation
page read and write
183D6FC9000
trusted library allocation
page read and write
C2FEBFE000
stack
page read and write
183DD252000
trusted library allocation
page read and write
183D7488000
trusted library allocation
page read and write
183D9771000
heap
page read and write
183D5174000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183D576C000
trusted library allocation
page read and write
183D2B70000
trusted library allocation
page read and write
183CC58F000
heap
page read and write
1B24ED9F000
trusted library allocation
page read and write
183CC5CE000
heap
page read and write
183CC589000
heap
page read and write
183D67E7000
trusted library allocation
page read and write
183D8DB3000
trusted library allocation
page read and write
183DF9BE000
trusted library allocation
page read and write
DEE50FE000
stack
page read and write
183D5D5F000
trusted library allocation
page read and write
183CC577000
heap
page read and write
183D6753000
trusted library allocation
page read and write
183D65EF000
trusted library allocation
page read and write
183D7CA0000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D31A2000
trusted library allocation
page read and write
183D6730000
trusted library allocation
page read and write
1B24EDBC000
trusted library allocation
page read and write
183DFB0D000
trusted library allocation
page read and write
183D7208000
trusted library allocation
page read and write
183D7734000
trusted library allocation
page read and write
183DD935000
trusted library allocation
page read and write
183E01E1000
trusted library allocation
page read and write
183DFB79000
trusted library allocation
page read and write
183D6CD2000
trusted library allocation
page read and write
183D55AE000
trusted library allocation
page read and write
183DF875000
trusted library allocation
page read and write
183D5110000
trusted library allocation
page read and write
183D516F000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D2EB5000
heap
page read and write
183D77B3000
trusted library allocation
page read and write
183DD14B000
trusted library allocation
page read and write
183E0D99000
trusted library allocation
page read and write
183D7787000
trusted library allocation
page read and write
183D78F7000
trusted library allocation
page read and write
183D578B000
trusted library allocation
page read and write
183D16E4000
trusted library allocation
page read and write
183D3145000
trusted library allocation
page read and write
183D7C43000
trusted library allocation
page read and write
183D8149000
trusted library allocation
page read and write
183CC5C4000
heap
page read and write
183DFEDC000
trusted library allocation
page read and write
183D3147000
trusted library allocation
page read and write
183D8CBE000
trusted library allocation
page read and write
183D7CA0000
trusted library allocation
page read and write
183D3839000
trusted library allocation
page read and write
183D55CE000
trusted library allocation
page read and write
183D8051000
trusted library allocation
page read and write
183E0DAB000
trusted library allocation
page read and write
183D55C9000
trusted library allocation
page read and write
183E0D9B000
trusted library allocation
page read and write
183D26C7000
trusted library allocation
page read and write
183D73D4000
trusted library allocation
page read and write
183D2E82000
heap
page read and write
183D57AD000
trusted library allocation
page read and write
183CC5BB000
heap
page read and write
183CC5B6000
heap
page read and write
183D55A5000
trusted library allocation
page read and write
183D759A000
trusted library allocation
page read and write
183CC58B000
heap
page read and write
183D6FDE000
trusted library allocation
page read and write
183D71EC000
trusted library allocation
page read and write
2423E068000
trusted library allocation
page read and write
183D8198000
trusted library allocation
page read and write
183D38B6000
trusted library allocation
page read and write
1B24F389000
heap
page read and write
183D7761000
trusted library allocation
page read and write
183CC586000
heap
page read and write
183CC5CE000
heap
page read and write
183D75F2000
trusted library allocation
page read and write
183DF1E5000
trusted library allocation
page read and write
183D55B8000
trusted library allocation
page read and write
183CC5C5000
heap
page read and write
183D74C9000
trusted library allocation
page read and write
183D57D7000
trusted library allocation
page read and write
183D6794000
trusted library allocation
page read and write
183D31CB000
trusted library allocation
page read and write
217BCB07000
trusted library allocation
page read and write
183D8DBB000
trusted library allocation
page read and write
183D2EB2000
heap
page read and write
F29000
heap
page read and write
386EFCE000
unkown
page readonly
DE4000
heap
page read and write
183D2686000
trusted library allocation
page read and write
183DF1DC000
trusted library allocation
page read and write
183D385B000
trusted library allocation
page read and write
183DDAC8000
trusted library allocation
page read and write
183CC573000
heap
page read and write
1B24ED12000
trusted library allocation
page read and write
183E0816000
trusted library allocation
page read and write
183D7B33000
trusted library allocation
page read and write
183D51D5000
trusted library allocation
page read and write
2994CD00000
trusted library allocation
page read and write
183DFFCD000
trusted library allocation
page read and write
183D71F5000
trusted library allocation
page read and write
2423DD63000
heap
page read and write
183D38FC000
trusted library allocation
page read and write
26C000
unkown
page readonly
183DD5D9000
trusted library allocation
page read and write
183D5153000
trusted library allocation
page read and write
183D311D000
trusted library allocation
page read and write
183D67F4000
trusted library allocation
page read and write
183CC566000
heap
page read and write
183E0D23000
trusted library allocation
page read and write
1B24E922000
unclassified section
page read and write
DEE51BE000
unkown
page readonly
183D819C000
trusted library allocation
page read and write
183D73CF000
trusted library allocation
page read and write
183D38C7000
trusted library allocation
page read and write
183D62A8000
trusted library allocation
page read and write
183DD770000
trusted library allocation
page read and write
183DD4FB000
trusted library allocation
page read and write
183D5667000
trusted library allocation
page read and write
183D2CB1000
trusted library allocation
page read and write
183D5D81000
trusted library allocation
page read and write
183D5FD8000
trusted library allocation
page read and write
183D80DA000
trusted library allocation
page read and write
183E0878000
trusted library allocation
page read and write
183CC560000
heap
page read and write
183D7C90000
trusted library allocation
page read and write
183DD25C000
trusted library allocation
page read and write
1B24F97B000
heap
page read and write
183D8BD3000
trusted library allocation
page read and write
183D2B8B000
trusted library allocation
page read and write
183D5DA9000
trusted library allocation
page read and write
183D93F9000
trusted library allocation
page read and write
183E08DA000
trusted library allocation
page read and write
183D7279000
trusted library allocation
page read and write
F0D000
heap
page read and write
1B24F3B3000
heap
page read and write
183D80B0000
trusted library allocation
page read and write
183DD12F000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183E0D4E000
trusted library allocation
page read and write
183D7592000
trusted library allocation
page read and write
183D5FEA000
trusted library allocation
page read and write
183DF1B5000
trusted library allocation
page read and write
183D57B1000
trusted library allocation
page read and write
183DFBF0000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D26D9000
trusted library allocation
page read and write
2423DE72000
unclassified section
page read and write
183D7213000
trusted library allocation
page read and write
183E0DA9000
trusted library allocation
page read and write
183D5789000
trusted library allocation
page read and write
183D5D55000
trusted library allocation
page read and write
183D38AF000
trusted library allocation
page read and write
183DFFD2000
trusted library allocation
page read and write
183D673F000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D385D000
trusted library allocation
page read and write
1B24ED63000
trusted library allocation
page read and write
183D7AE8000
trusted library allocation
page read and write
183D9701000
heap
page read and write
183CC5C6000
heap
page read and write
183CC587000
heap
page read and write
F36000
heap
page read and write
183DD1CC000
trusted library allocation
page read and write
183D2EB5000
heap
page read and write
1B24ED81000
trusted library allocation
page read and write
2423E078000
trusted library allocation
page read and write
183D97E1000
heap
page read and write
183DD92F000
trusted library allocation
page read and write
183D3899000
trusted library allocation
page read and write
2423E045000
trusted library allocation
page read and write
E80000
heap
page read and write
183DFFBD000
trusted library allocation
page read and write
183D7765000
trusted library allocation
page read and write
183CC585000
heap
page read and write
183D31A2000
trusted library allocation
page read and write
183D55A7000
trusted library allocation
page read and write
183D31A2000
trusted library allocation
page read and write
183D38D3000
trusted library allocation
page read and write
183D57D7000
trusted library allocation
page read and write
183D2C83000
trusted library allocation
page read and write
183D7524000
trusted library allocation
page read and write
183D8D86000
trusted library allocation
page read and write
183D38C3000
trusted library allocation
page read and write
183D57FA000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183DD4F6000
trusted library allocation
page read and write
C2FFD7E000
unkown
page readonly
183D26CA000
trusted library allocation
page read and write
183D2EB2000
heap
page read and write
183D71E0000
trusted library allocation
page read and write
F0F000
heap
page read and write
183CC573000
heap
page read and write
183DD4F4000
trusted library allocation
page read and write
183D9701000
heap
page read and write
183CC585000
heap
page read and write
183DD5E3000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
183CC5D4000
heap
page read and write
183D31CB000
trusted library allocation
page read and write
1B24EB00000
trusted library allocation
page read and write
183E0D8D000
trusted library allocation
page read and write
183D55B8000
trusted library allocation
page read and write
2994C97A000
heap
page read and write
183D2C9E000
trusted library allocation
page read and write
183D9C0F000
trusted library allocation
page read and write
183D5D61000
trusted library allocation
page read and write
183E0D67000
trusted library allocation
page read and write
183CC573000
heap
page read and write
183D7753000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183D75FD000
trusted library allocation
page read and write
183D2E4D000
heap
page read and write
183E0DA7000
trusted library allocation
page read and write
183D8D84000
trusted library allocation
page read and write
2423E076000
trusted library allocation
page read and write
183CC5D4000
heap
page read and write
183D7C5B000
trusted library allocation
page read and write
183D74D3000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D8B9F000
trusted library allocation
page read and write
183E1AB4000
trusted library allocation
page read and write
1B24E890000
heap
page read and write
183D5D71000
trusted library allocation
page read and write
183D80C0000
trusted library allocation
page read and write
183D8161000
trusted library allocation
page read and write
183E08B8000
trusted library allocation
page read and write
183CC59E000
heap
page read and write
183DDA31000
trusted library allocation
page read and write
183D5D98000
trusted library allocation
page read and write
183D75CF000
trusted library allocation
page read and write
1B24F961000
heap
page read and write
183CC5CA000
heap
page read and write
C2FF478000
stack
page read and write
183D3845000
trusted library allocation
page read and write
183D78E7000
trusted library allocation
page read and write
ED0000
heap
page read and write
183D702C000
trusted library allocation
page read and write
183D16BB000
trusted library allocation
page read and write
183CC5D4000
heap
page read and write
BDB000
stack
page read and write
183DD888000
trusted library allocation
page read and write
183E0D2F000
trusted library allocation
page read and write
183D2EB2000
heap
page read and write
1B24F998000
heap
page read and write
183CC5C3000
heap
page read and write
183E0DB2000
trusted library allocation
page read and write
183D746D000
trusted library allocation
page read and write
183CC594000
heap
page read and write
183D2CE9000
trusted library allocation
page read and write
183CC5C7000
heap
page read and write
183D6C8C000
trusted library allocation
page read and write
183DD5EC000
trusted library allocation
page read and write
183D71F5000
trusted library allocation
page read and write
183D8B87000
trusted library allocation
page read and write
183DFBA9000
trusted library allocation
page read and write
183D7CEA000
trusted library allocation
page read and write
183D631E000
trusted library allocation
page read and write
37C0000
trusted library allocation
page read and write
183D8B29000
trusted library allocation
page read and write
183E0DB5000
trusted library allocation
page read and write
183D75FD000
trusted library allocation
page read and write
183CC56C000
heap
page read and write
183CC59E000
heap
page read and write
183D7773000
trusted library allocation
page read and write
183D804F000
trusted library allocation
page read and write
183CC5CF000
heap
page read and write
183D31A2000
trusted library allocation
page read and write
183DF13D000
trusted library allocation
page read and write
183E0DA2000
trusted library allocation
page read and write
183D5133000
trusted library allocation
page read and write
183D6F81000
trusted library allocation
page read and write
1B24F34D000
heap
page read and write
183DF1A1000
trusted library allocation
page read and write
183D7043000
trusted library allocation
page read and write
36C1000
heap
page read and write
183CC565000
heap
page read and write
183D77D7000
trusted library allocation
page read and write
183CC5B6000
heap
page read and write
217BC9C0000
heap
page read and write
183D1651000
trusted library allocation
page read and write
2A4000
unkown
page readonly
183D804D000
trusted library allocation
page read and write
183D7560000
trusted library allocation
page read and write
183D76F0000
trusted library allocation
page read and write
183DD5EC000
trusted library allocation
page read and write
183D2EB2000
heap
page read and write
183D7BFC000
trusted library allocation
page read and write
183D5776000
trusted library allocation
page read and write
There are 3861 hidden memdumps, click here to show them.