IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_c34f7ffa-8b78-4b9e-b500-910b29bb531a.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_c34f7ffa-8b78-4b9e-b500-910b29bb531a.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs-1.js
ASCII text, with very long lines (1765), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs.js (copy)
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 4, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25298 -prefMapSize 238442 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {40f9ba66-06f4-4dab-9656-3072865229ba} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 1955a66d510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3752 -parentBuildID 20230927232528 -prefsHandle 3756 -prefMapHandle 3516 -prefsLen 26313 -prefMapSize 238442 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f0a60b9-2db6-4005-8263-e31f930ef023} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 1955a68f610 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5172 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5148 -prefMapHandle 5132 -prefsLen 33353 -prefMapSize 238442 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc30be76-9e45-4799-906d-b5fb74197779} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 19572772b10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://mathiasbynens.be/notes/javascript-escapes#single
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://spocs.getpocket.com/CN=The
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mathiasbynens.be/
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.253.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.80
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
216.58.206.46
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.16.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
52.222.236.80
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
216.58.206.46
youtube.com
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
142.251.32.110
unknown
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
C3F000
heap
page read and write
malicious
195613F0000
heap
page read and write
19561428000
heap
page read and write
19567DEF000
heap
page read and write
1956E28D000
trusted library allocation
page read and write
1956BEC4000
trusted library allocation
page read and write
1956C2B8000
trusted library allocation
page read and write
19561432000
heap
page read and write
195613DF000
heap
page read and write
1956142C000
heap
page read and write
19561458000
heap
page read and write
C54000
heap
page read and write
19573EFD000
trusted library allocation
page read and write
253BDBA1000
heap
page read and write
1956E1D8000
trusted library allocation
page read and write
195675AE000
trusted library allocation
page read and write
1956E0F0000
trusted library allocation
page read and write
1956C83E000
trusted library allocation
page read and write
2929346E000
trusted library allocation
page read and write
1956C4A7000
trusted library allocation
page read and write
195728AD000
trusted library allocation
page read and write
253BDB5A000
heap
page read and write
1956BA4F000
trusted library allocation
page read and write
1956B5D7000
trusted library allocation
page read and write
1956BB90000
trusted library allocation
page read and write
1957389F000
trusted library allocation
page read and write
19561428000
heap
page read and write
195739E6000
trusted library allocation
page read and write
195734E9000
trusted library allocation
page read and write
19561417000
heap
page read and write
195613F5000
heap
page read and write
1956A8F9000
trusted library allocation
page read and write
1956CED5000
trusted library allocation
page read and write
1956CA56000
trusted library allocation
page read and write
19561457000
heap
page read and write
1956CA74000
trusted library allocation
page read and write
1956BA9B000
trusted library allocation
page read and write
1956E01F000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956E3E4000
trusted library allocation
page read and write
19561461000
heap
page read and write
1956E23E000
trusted library allocation
page read and write
19572A2E000
trusted library allocation
page read and write
1956BFA6000
trusted library allocation
page read and write
19567DE7000
heap
page read and write
19573FD5000
trusted library allocation
page read and write
6F08C7E000
stack
page read and write
253BDB58000
heap
page read and write
1956A3CD000
trusted library allocation
page read and write
1956BEFE000
trusted library allocation
page read and write
1956A4FE000
trusted library allocation
page read and write
F722A7E000
unkown
page readonly
195728C8000
trusted library allocation
page read and write
1956CA3D000
trusted library allocation
page read and write
1956C0A3000
trusted library allocation
page read and write
23ECCFE2000
heap
page read and write
1956C2FC000
trusted library allocation
page read and write
1956E28B000
trusted library allocation
page read and write
1956C0A3000
trusted library allocation
page read and write
19573FE9000
trusted library allocation
page read and write
1956E0E5000
trusted library allocation
page read and write
1956BFD3000
trusted library allocation
page read and write
1956C47D000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956C0D4000
trusted library allocation
page read and write
1956A4BE000
trusted library allocation
page read and write
195734E3000
trusted library allocation
page read and write
195742B5000
trusted library allocation
page read and write
1956C0E3000
trusted library allocation
page read and write
1956C364000
trusted library allocation
page read and write
1EECD3F4000
trusted library allocation
page read and write
1957287F000
trusted library allocation
page read and write
1956A6F7000
trusted library allocation
page read and write
1956C2FC000
trusted library allocation
page read and write
1957588F000
trusted library allocation
page read and write
195738B8000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956BE75000
trusted library allocation
page read and write
1957423E000
trusted library allocation
page read and write
1956142C000
heap
page read and write
19575D25000
trusted library allocation
page read and write
1956DDE2000
trusted library allocation
page read and write
19561457000
heap
page read and write
1956E0F4000
trusted library allocation
page read and write
1956C4C0000
trusted library allocation
page read and write
195674D5000
trusted library allocation
page read and write
1956E21C000
trusted library allocation
page read and write
1956143D000
heap
page read and write
1956BA3D000
trusted library allocation
page read and write
1956142C000
heap
page read and write
1956ADF0000
trusted library allocation
page read and write
19568CDC000
trusted library allocation
page read and write
19561445000
heap
page read and write
1956C0A9000
trusted library allocation
page read and write
195728C4000
trusted library allocation
page read and write
195740F6000
trusted library allocation
page read and write
195613F7000
heap
page read and write
1956B440000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1956C6F7000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1EECD1B0000
unclassified section
page read and write
1956C0FB000
trusted library allocation
page read and write
1956A177000
trusted library allocation
page read and write
1956C096000
trusted library allocation
page read and write
1956DD25000
trusted library allocation
page read and write
1956E2D2000
trusted library allocation
page read and write
1EECD1A0000
heap
page readonly
1956D965000
trusted library allocation
page read and write
253BD42F000
trusted library allocation
page read and write
1956E10E000
trusted library allocation
page read and write
1956E145000
trusted library allocation
page read and write
1956C3D6000
trusted library allocation
page read and write
19573E5E000
trusted library allocation
page read and write
19567741000
trusted library allocation
page read and write
1956E1CD000
trusted library allocation
page read and write
1956E2DF000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956AC99000
trusted library allocation
page read and write
1956E1AA000
trusted library allocation
page read and write
19572AC4000
trusted library allocation
page read and write
1956CA74000
trusted library allocation
page read and write
19565DDF000
trusted library allocation
page read and write
195613E6000
heap
page read and write
1956C4D2000
trusted library allocation
page read and write
19561452000
heap
page read and write
19573860000
trusted library allocation
page read and write
195613FB000
heap
page read and write
19572A8C000
trusted library allocation
page read and write
19561407000
heap
page read and write
195613DF000
heap
page read and write
253BDB98000
heap
page read and write
1956BA49000
trusted library allocation
page read and write
1956C836000
trusted library allocation
page read and write
1957656A000
heap
page read and write
19561433000
heap
page read and write
195734A3000
trusted library allocation
page read and write
19572AAE000
trusted library allocation
page read and write
19572ACC000
trusted library allocation
page read and write
1956C0A9000
trusted library allocation
page read and write
1956B446000
trusted library allocation
page read and write
1956BE9C000
trusted library allocation
page read and write
1956142C000
heap
page read and write
1956B8C0000
trusted library allocation
page read and write
1956BA44000
trusted library allocation
page read and write
1956BF90000
trusted library allocation
page read and write
19561467000
heap
page read and write
19567DE7000
heap
page read and write
1956BF69000
trusted library allocation
page read and write
19575F88000
trusted library allocation
page read and write
19568C95000
trusted library allocation
page read and write
1956C2B9000
trusted library allocation
page read and write
1956D9D9000
trusted library allocation
page read and write
19576501000
heap
page read and write
1956C0E7000
trusted library allocation
page read and write
195742B7000
trusted library allocation
page read and write
1956BAA8000
trusted library allocation
page read and write
253BE16A000
heap
page read and write
195728F3000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
19573862000
trusted library allocation
page read and write
1956145B000
heap
page read and write
195738CD000
trusted library allocation
page read and write
19572AAA000
trusted library allocation
page read and write
1956C274000
trusted library allocation
page read and write
1956DDE2000
trusted library allocation
page read and write
1956A16B000
trusted library allocation
page read and write
292934A5000
trusted library allocation
page read and write
B14000
heap
page read and write
19567DA3000
heap
page read and write
195613F6000
heap
page read and write
19573FE1000
trusted library allocation
page read and write
1956E3F3000
trusted library allocation
page read and write
19574B6A000
trusted library allocation
page read and write
1956E37D000
trusted library allocation
page read and write
19568CE0000
trusted library allocation
page read and write
195613F6000
heap
page read and write
195758C2000
trusted library allocation
page read and write
1956DDEF000
trusted library allocation
page read and write
195738D4000
trusted library allocation
page read and write
195728B1000
trusted library allocation
page read and write
1956CE2D000
trusted library allocation
page read and write
195677F2000
trusted library allocation
page read and write
19572898000
trusted library allocation
page read and write
1956E1DC000
trusted library allocation
page read and write
253BDB10000
heap
page read and write
1956145E000
heap
page read and write
1956A115000
trusted library allocation
page read and write
253BD3EE000
unkown
page execute read
19561443000
heap
page read and write
1956A448000
trusted library allocation
page read and write
1EECD303000
trusted library allocation
page read and write
1956C0D4000
trusted library allocation
page read and write
1956A38D000
trusted library allocation
page read and write
1956BFEF000
trusted library allocation
page read and write
1957657E000
heap
page read and write
1956C0B2000
trusted library allocation
page read and write
1956144F000
heap
page read and write
1EECD311000
trusted library allocation
page read and write
1956B4ED000
trusted library allocation
page read and write
19561428000
heap
page read and write
1830000
heap
page read and write
19574ABA000
trusted library allocation
page read and write
1956C43B000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956CE32000
trusted library allocation
page read and write
1956CEFB000
trusted library allocation
page read and write
19561466000
heap
page read and write
1956ACE0000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956E043000
trusted library allocation
page read and write
C62000
heap
page read and write
1956CE7D000
trusted library allocation
page read and write
195613F5000
heap
page read and write
1EECCFC1000
remote allocation
page execute read
1956CAA6000
trusted library allocation
page read and write
1956E2C6000
trusted library allocation
page read and write
1956BAA8000
trusted library allocation
page read and write
19573839000
trusted library allocation
page read and write
195665C3000
trusted library allocation
page read and write
19575F49000
trusted library allocation
page read and write
253BDB10000
heap
page read and write
195613F7000
heap
page read and write
19573890000
trusted library allocation
page read and write
195613F8000
heap
page read and write
1956C09B000
trusted library allocation
page read and write
1956C3A2000
trusted library allocation
page read and write
1956BE70000
trusted library allocation
page read and write
1956E01F000
trusted library allocation
page read and write
1956A4A2000
trusted library allocation
page read and write
253BDB69000
heap
page read and write
C28000
heap
page read and write
1956A4F9000
trusted library allocation
page read and write
1956E37B000
trusted library allocation
page read and write
19575822000
trusted library allocation
page read and write
1956A49F000
trusted library allocation
page read and write
19561417000
heap
page read and write
195739E6000
trusted library allocation
page read and write
195613F6000
heap
page read and write
EFFD7FC000
stack
page read and write
19561428000
heap
page read and write
19572816000
trusted library allocation
page read and write
19574AAD000
trusted library allocation
page read and write
195728FB000
trusted library allocation
page read and write
1956C29E000
trusted library allocation
page read and write
1956E299000
trusted library allocation
page read and write
1956A1CC000
trusted library allocation
page read and write
19575500000
trusted library allocation
page read and write
1956A171000
trusted library allocation
page read and write
19567D93000
heap
page read and write
1956C2E6000
trusted library allocation
page read and write
1957397E000
trusted library allocation
page read and write
1956BE92000
trusted library allocation
page read and write
1956144D000
heap
page read and write
19567DE7000
heap
page read and write
253BDBAD000
heap
page read and write
1956BEC4000
trusted library allocation
page read and write
1956CAE1000
trusted library allocation
page read and write
19575896000
trusted library allocation
page read and write
1956C099000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956C064000
trusted library allocation
page read and write
19561440000
heap
page read and write
1956A3A4000
trusted library allocation
page read and write
1EECD70C000
trusted library allocation
page read and write
1956DD91000
trusted library allocation
page read and write
1956C9D9000
trusted library allocation
page read and write
1956C31F000
trusted library allocation
page read and write
1956DDE7000
trusted library allocation
page read and write
19561443000
heap
page read and write
19567BC7000
trusted library allocation
page read and write
253BDBA1000
heap
page read and write
253BD3A0000
trusted library allocation
page read and write
E89B3FF000
stack
page read and write
1956B8AF000
trusted library allocation
page read and write
1956C45E000
trusted library allocation
page read and write
19568CF4000
trusted library allocation
page read and write
1956C0FB000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956A486000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956BBAB000
trusted library allocation
page read and write
19575F88000
trusted library allocation
page read and write
1956BF4D000
trusted library allocation
page read and write
1956AC8D000
trusted library allocation
page read and write
1956CEFB000
trusted library allocation
page read and write
1956B6F3000
trusted library allocation
page read and write
19561445000
heap
page read and write
195734E3000
trusted library allocation
page read and write
1956A19C000
trusted library allocation
page read and write
195734CF000
trusted library allocation
page read and write
1956C34E000
trusted library allocation
page read and write
195613F9000
heap
page read and write
1956CA3B000
trusted library allocation
page read and write
19574BB4000
trusted library allocation
page read and write
1956BFF8000
trusted library allocation
page read and write
1956BF0B000
trusted library allocation
page read and write
1956C0F6000
trusted library allocation
page read and write
253BDAB1000
heap
page read and write
253BDB93000
heap
page read and write
1956C099000
trusted library allocation
page read and write
1956143B000
heap
page read and write
19573981000
trusted library allocation
page read and write
19572A76000
trusted library allocation
page read and write
1956C06D000
trusted library allocation
page read and write
1956BA0A000
trusted library allocation
page read and write
19561407000
heap
page read and write
1956145F000
heap
page read and write
1956DDAB000
trusted library allocation
page read and write
195613F5000
heap
page read and write
1956BAE4000
trusted library allocation
page read and write
19573E8E000
trusted library allocation
page read and write
1956A3A4000
trusted library allocation
page read and write
1956B8B6000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
1956C038000
trusted library allocation
page read and write
19567DDF000
heap
page read and write
1956C9BD000
trusted library allocation
page read and write
1956E2D2000
trusted library allocation
page read and write
1956A43C000
trusted library allocation
page read and write
195613F5000
heap
page read and write
F71F73C000
stack
page read and write
19573825000
trusted library allocation
page read and write
19568CE7000
trusted library allocation
page read and write
195739CD000
trusted library allocation
page read and write
1956C0A9000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956D946000
trusted library allocation
page read and write
253BD344000
heap
page read and write
1956BD0B000
trusted library allocation
page read and write
1956BFEA000
trusted library allocation
page read and write
1956C2FE000
trusted library allocation
page read and write
1956CEF3000
trusted library allocation
page read and write
1956E2C2000
trusted library allocation
page read and write
1957383E000
trusted library allocation
page read and write
1956145E000
heap
page read and write
1956E3D9000
trusted library allocation
page read and write
195613F7000
heap
page read and write
19567B69000
trusted library allocation
page read and write
1956C4D6000
trusted library allocation
page read and write
253BD466000
trusted library allocation
page read and write
1956CAF4000
trusted library allocation
page read and write
19574BFC000
trusted library allocation
page read and write
1956BDBE000
trusted library allocation
page read and write
1956E043000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
1956143F000
heap
page read and write
1956E2CF000
trusted library allocation
page read and write
1956DDD4000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956E357000
trusted library allocation
page read and write
1EECD3D7000
trusted library allocation
page read and write
19567DE7000
heap
page read and write
1956D9C4000
trusted library allocation
page read and write
1956B4D1000
trusted library allocation
page read and write
1956B48E000
trusted library allocation
page read and write
1956641E000
trusted library allocation
page read and write
19561417000
heap
page read and write
195677A8000
trusted library allocation
page read and write
1956DD8F000
trusted library allocation
page read and write
292930B8000
remote allocation
page execute read
195742A8000
trusted library allocation
page read and write
1956BD07000
trusted library allocation
page read and write
1956C461000
trusted library allocation
page read and write
195677FE000
trusted library allocation
page read and write
27EDE980000
heap
page read and write
1956A67C000
trusted library allocation
page read and write
19561417000
heap
page read and write
19574ABA000
trusted library allocation
page read and write
195734C4000
trusted library allocation
page read and write
19561447000
heap
page read and write
1956E1FC000
trusted library allocation
page read and write
195728C8000
trusted library allocation
page read and write
1956E1C7000
trusted library allocation
page read and write
1957589F000
trusted library allocation
page read and write
1956DDB5000
trusted library allocation
page read and write
1956BE77000
trusted library allocation
page read and write
1956142C000
heap
page read and write
195734C2000
trusted library allocation
page read and write
253BDB2D000
heap
page read and write
19567DEF000
heap
page read and write
19573894000
trusted library allocation
page read and write
1956E3D6000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
2929326F000
unclassified section
page read and write
195728EE000
trusted library allocation
page read and write
292931D0000
heap
page read and write
19567DE5000
heap
page read and write
1956E125000
trusted library allocation
page read and write
1956C0E3000
trusted library allocation
page read and write
1956BEBD000
trusted library allocation
page read and write
1956CA8C000
trusted library allocation
page read and write
1956A69B000
trusted library allocation
page read and write
1956BD75000
trusted library allocation
page read and write
195613F6000
heap
page read and write
19572A78000
trusted library allocation
page read and write
1956DD69000
trusted library allocation
page read and write
1956D969000
trusted library allocation
page read and write
1956A488000
trusted library allocation
page read and write
19561452000
heap
page read and write
1956DD97000
trusted library allocation
page read and write
1956C232000
trusted library allocation
page read and write
1956BA5A000
trusted library allocation
page read and write
1956632F000
trusted library allocation
page read and write
1956C0A0000
trusted library allocation
page read and write
19561433000
heap
page read and write
253BDB93000
heap
page read and write
19575F88000
trusted library allocation
page read and write
987727E000
stack
page read and write
1956144E000
heap
page read and write
1956C0A9000
trusted library allocation
page read and write
19574B04000
trusted library allocation
page read and write
1956E3D6000
trusted library allocation
page read and write
19565DC4000
trusted library allocation
page read and write
19573890000
trusted library allocation
page read and write
19567DA3000
heap
page read and write
1956145C000
heap
page read and write
1956BA3D000
trusted library allocation
page read and write
19572A5A000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956DD69000
trusted library allocation
page read and write
19573996000
trusted library allocation
page read and write
195728BC000
trusted library allocation
page read and write
253BDB90000
heap
page read and write
19572A80000
trusted library allocation
page read and write
19561417000
heap
page read and write
23ECCF80000
heap
page read and write
195727DA000
trusted library allocation
page read and write
1956BBD0000
trusted library allocation
page read and write
3184000
heap
page read and write
1956C4C0000
trusted library allocation
page read and write
1956E1E1000
trusted library allocation
page read and write
1956D965000
trusted library allocation
page read and write
1956C06B000
trusted library allocation
page read and write
1956DC55000
trusted library allocation
page read and write
1956E1B2000
trusted library allocation
page read and write
19575FDF000
trusted library allocation
page read and write
1956C05B000
trusted library allocation
page read and write
1956BEEB000
trusted library allocation
page read and write
19573825000
trusted library allocation
page read and write
1956C07B000
trusted library allocation
page read and write
1956C45E000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956142C000
heap
page read and write
19573832000
trusted library allocation
page read and write
19572A84000
trusted library allocation
page read and write
19572A9B000
trusted library allocation
page read and write
195613FE000
heap
page read and write
19572789000
trusted library allocation
page read and write
253BE100000
heap
page read and write
19561433000
heap
page read and write
1956E142000
trusted library allocation
page read and write
1956C09B000
trusted library allocation
page read and write
195739FC000
trusted library allocation
page read and write
195613E6000
heap
page read and write
195728E9000
trusted library allocation
page read and write
1956C075000
trusted library allocation
page read and write
19572AEA000
trusted library allocation
page read and write
195728A3000
trusted library allocation
page read and write
195613FF000
heap
page read and write
19561402000
heap
page read and write
1956A4D0000
trusted library allocation
page read and write
1956A1FE000
trusted library allocation
page read and write
1956144E000
heap
page read and write
19561467000
heap
page read and write
195728C4000
trusted library allocation
page read and write
1956B5FA000
trusted library allocation
page read and write
19561445000
heap
page read and write
19561464000
heap
page read and write
195738AA000
trusted library allocation
page read and write
1956BBFC000
trusted library allocation
page read and write
195613F6000
heap
page read and write
1956C071000
trusted library allocation
page read and write
1956BA47000
trusted library allocation
page read and write
19573D49000
trusted library allocation
page read and write
1956E187000
trusted library allocation
page read and write
19572A8E000
trusted library allocation
page read and write
1956C2F1000
trusted library allocation
page read and write
19561461000
heap
page read and write
19572A86000
trusted library allocation
page read and write
19574B18000
trusted library allocation
page read and write
1956A39D000
trusted library allocation
page read and write
19573890000
trusted library allocation
page read and write
1956C359000
trusted library allocation
page read and write
1956C04B000
trusted library allocation
page read and write
B10000
heap
page read and write
1956A486000
trusted library allocation
page read and write
19573FF3000
trusted library allocation
page read and write
1956A39D000
trusted library allocation
page read and write
19566480000
trusted library allocation
page read and write
19573C00000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
19567DEF000
heap
page read and write
19561417000
heap
page read and write
1956BEEE000
trusted library allocation
page read and write
1956B56E000
trusted library allocation
page read and write
1956C4D2000
trusted library allocation
page read and write
19576501000
heap
page read and write
19574B89000
trusted library allocation
page read and write
1956A1A5000
trusted library allocation
page read and write
1956CEFB000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956DD9D000
trusted library allocation
page read and write
19561408000
heap
page read and write
1956D9C5000
trusted library allocation
page read and write
1956BA1F000
trusted library allocation
page read and write
1956BFF6000
trusted library allocation
page read and write
1956CAB4000
trusted library allocation
page read and write
19561445000
heap
page read and write
19572AF6000
trusted library allocation
page read and write
1956E179000
trusted library allocation
page read and write
1957386B000
trusted library allocation
page read and write
1956A364000
trusted library allocation
page read and write
1956A1F9000
trusted library allocation
page read and write
1956C39E000
trusted library allocation
page read and write
195734CF000
trusted library allocation
page read and write
253BD46F000
trusted library allocation
page read and write
1956779D000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956B4F2000
trusted library allocation
page read and write
1956DDD3000
trusted library allocation
page read and write
1956A6B0000
trusted library allocation
page read and write
1956BD3F000
trusted library allocation
page read and write
19568CF7000
trusted library allocation
page read and write
1956BF78000
trusted library allocation
page read and write
19575F2D000
trusted library allocation
page read and write
1EECD600000
trusted library allocation
page read and write
1956C099000
trusted library allocation
page read and write
1956C425000
trusted library allocation
page read and write
19572A9F000
trusted library allocation
page read and write
1956C484000
trusted library allocation
page read and write
1956BDAC000
trusted library allocation
page read and write
195677C7000
trusted library allocation
page read and write
1956C280000
trusted library allocation
page read and write
19575F4C000
trusted library allocation
page read and write
1956E1C4000
trusted library allocation
page read and write
19567BC8000
trusted library allocation
page read and write
1956C280000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956C023000
trusted library allocation
page read and write
253BD4BA000
trusted library allocation
page read and write
195613ED000
heap
page read and write
23ECEA85000
heap
page read and write
253BD320000
heap
page readonly
1EECD305000
trusted library allocation
page read and write
1956B478000
trusted library allocation
page read and write
C58000
heap
page read and write
1956C6F2000
trusted library allocation
page read and write
195738E9000
trusted library allocation
page read and write
1956AD7A000
trusted library allocation
page read and write
1957381B000
trusted library allocation
page read and write
1956C08E000
trusted library allocation
page read and write
1956E07A000
trusted library allocation
page read and write
1956A357000
trusted library allocation
page read and write
1956C099000
trusted library allocation
page read and write
1956A354000
trusted library allocation
page read and write
1956757A000
trusted library allocation
page read and write
195758B6000
trusted library allocation
page read and write
1956B822000
trusted library allocation
page read and write
1956DD69000
trusted library allocation
page read and write
E8993FF000
stack
page read and write
1956C0A5000
trusted library allocation
page read and write
292935A6000
heap
page read and write
19573860000
trusted library allocation
page read and write
253BD475000
trusted library allocation
page read and write
1956C29E000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956E2EA000
trusted library allocation
page read and write
19573832000
trusted library allocation
page read and write
19561404000
heap
page read and write
1956B42E000
trusted library allocation
page read and write
195613E6000
heap
page read and write
19574B18000
trusted library allocation
page read and write
2929347D000
trusted library allocation
page read and write
195765B8000
heap
page read and write
19573905000
trusted library allocation
page read and write
1956B561000
trusted library allocation
page read and write
1956BDC9000
trusted library allocation
page read and write
1956BA4F000
trusted library allocation
page read and write
1956B426000
trusted library allocation
page read and write
1956D9D9000
trusted library allocation
page read and write
1956E3F3000
trusted library allocation
page read and write
19561417000
heap
page read and write
29293410000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956E1CB000
trusted library allocation
page read and write
1956DF9E000
trusted library allocation
page read and write
19561467000
heap
page read and write
19561438000
heap
page read and write
195613FF000
heap
page read and write
19567DEF000
heap
page read and write
1956BECD000
trusted library allocation
page read and write
1956BBAD000
trusted library allocation
page read and write
19573827000
trusted library allocation
page read and write
19572AA6000
trusted library allocation
page read and write
1956CA45000
trusted library allocation
page read and write
19561466000
heap
page read and write
195734F8000
trusted library allocation
page read and write
19567B47000
trusted library allocation
page read and write
1956DAD6000
trusted library allocation
page read and write
1956A4D9000
trusted library allocation
page read and write
19575FB6000
trusted library allocation
page read and write
195734A3000
trusted library allocation
page read and write
19572A8C000
trusted library allocation
page read and write
19567DA3000
heap
page read and write
19572A8A000
trusted library allocation
page read and write
1956CAD0000
trusted library allocation
page read and write
23ECEA8F000
heap
page read and write
19575FD2000
trusted library allocation
page read and write
1956C282000
trusted library allocation
page read and write
1957396A000
trusted library allocation
page read and write
19573DDD000
trusted library allocation
page read and write
1956C0B2000
trusted library allocation
page read and write
19575F30000
trusted library allocation
page read and write
1956CA88000
trusted library allocation
page read and write
19561402000
heap
page read and write
19561417000
heap
page read and write
1956D9EE000
trusted library allocation
page read and write
1956C082000
trusted library allocation
page read and write
1956DD22000
trusted library allocation
page read and write
1956C0D8000
trusted library allocation
page read and write
19561428000
heap
page read and write
8CC6BE0000
trusted library allocation
page execute read
1956C461000
trusted library allocation
page read and write
19574AD6000
trusted library allocation
page read and write
1956C0F1000
trusted library allocation
page read and write
19567DA9000
heap
page read and write
1956A469000
trusted library allocation
page read and write
1956C089000
trusted library allocation
page read and write
1956E1D3000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956C0C4000
trusted library allocation
page read and write
1956B5C0000
trusted library allocation
page read and write
19568CE0000
trusted library allocation
page read and write
1956C0D8000
trusted library allocation
page read and write
19575FBA000
trusted library allocation
page read and write
1956C0E3000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956C4D6000
trusted library allocation
page read and write
1956C45E000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956DF22000
trusted library allocation
page read and write
1956C6D7000
trusted library allocation
page read and write
1956A367000
trusted library allocation
page read and write
B14000
heap
page read and write
1956E1F9000
trusted library allocation
page read and write
19573940000
trusted library allocation
page read and write
19573816000
trusted library allocation
page read and write
19568C33000
trusted library allocation
page read and write
1EECD300000
trusted library allocation
page read and write
1957386B000
trusted library allocation
page read and write
29293403000
trusted library allocation
page read and write
1956CA97000
trusted library allocation
page read and write
19561445000
heap
page read and write
19567DE5000
heap
page read and write
1956C2FC000
trusted library allocation
page read and write
195664C2000
trusted library allocation
page read and write
1956C0B6000
trusted library allocation
page read and write
19575FB1000
trusted library allocation
page read and write
19561445000
heap
page read and write
19573839000
trusted library allocation
page read and write
1957387E000
trusted library allocation
page read and write
1956C0F6000
trusted library allocation
page read and write
1957390A000
trusted library allocation
page read and write
1956B428000
trusted library allocation
page read and write
1957390C000
trusted library allocation
page read and write
19561433000
heap
page read and write
1957278D000
trusted library allocation
page read and write
1956C086000
trusted library allocation
page read and write
1956E1F3000
trusted library allocation
page read and write
1956D976000
trusted library allocation
page read and write
19572AEA000
trusted library allocation
page read and write
1956A3CD000
trusted library allocation
page read and write
C46000
heap
page read and write
1956B5C0000
trusted library allocation
page read and write
19575F81000
trusted library allocation
page read and write
195613F5000
heap
page read and write
19576501000
heap
page read and write
1956B561000
trusted library allocation
page read and write
23ECEA89000
heap
page read and write
1956A39D000
trusted library allocation
page read and write
1956A49D000
trusted library allocation
page read and write
1956C093000
trusted library allocation
page read and write
19572A31000
trusted library allocation
page read and write
1956C0C7000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956145C000
heap
page read and write
19574099000
trusted library allocation
page read and write
1956C0B2000
trusted library allocation
page read and write
1956C359000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
1956DFA1000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956C0E3000
trusted library allocation
page read and write
1956AC88000
trusted library allocation
page read and write
19572AD5000
trusted library allocation
page read and write
19568C77000
trusted library allocation
page read and write
1956BD99000
trusted library allocation
page read and write
1956E2B4000
trusted library allocation
page read and write
195728E4000
trusted library allocation
page read and write
1956C4DC000
trusted library allocation
page read and write
1956A195000
trusted library allocation
page read and write
1956DD28000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
1956E2EF000
trusted library allocation
page read and write
1956D8DD000
trusted library allocation
page read and write
19572AB2000
trusted library allocation
page read and write
1956C02E000
trusted library allocation
page read and write
1956ADA0000
trusted library allocation
page read and write
1956BAF3000
trusted library allocation
page read and write
19572ABA000
trusted library allocation
page read and write
19573925000
trusted library allocation
page read and write
1956144D000
heap
page read and write
2768F0703000
trusted library allocation
page read and write
6F060EE000
unkown
page readonly
195613ED000
heap
page read and write
1956BF27000
trusted library allocation
page read and write
1956BA58000
trusted library allocation
page read and write
19575D6E000
trusted library allocation
page read and write
1956B468000
trusted library allocation
page read and write
195663FE000
trusted library allocation
page read and write
1956C0EF000
trusted library allocation
page read and write
19568C63000
trusted library allocation
page read and write
1956C4A9000
trusted library allocation
page read and write
19568CE5000
trusted library allocation
page read and write
987723E000
unkown
page readonly
1956DDF7000
trusted library allocation
page read and write
195613F1000
heap
page read and write
1956E2D7000
trusted library allocation
page read and write
19575840000
trusted library allocation
page read and write
1956CE65000
trusted library allocation
page read and write
98771FE000
unkown
page readonly
1956A7C1000
trusted library allocation
page read and write
1956BA5A000
trusted library allocation
page read and write
19575D6E000
trusted library allocation
page read and write
1956BA3F000
trusted library allocation
page read and write
195728D0000
trusted library allocation
page read and write
1956142C000
heap
page read and write
1956C3B1000
trusted library allocation
page read and write
1956B5B8000
trusted library allocation
page read and write
1956144E000
heap
page read and write
19561445000
heap
page read and write
1957284C000
trusted library allocation
page read and write
1956E125000
trusted library allocation
page read and write
195613E0000
heap
page read and write
19567D84000
heap
page read and write
1956E1D5000
trusted library allocation
page read and write
19572A98000
trusted library allocation
page read and write
1956C499000
trusted library allocation
page read and write
B14000
heap
page read and write
1956C2B9000
trusted library allocation
page read and write
1956E1F3000
trusted library allocation
page read and write
1956C0F1000
trusted library allocation
page read and write
1956C227000
trusted library allocation
page read and write
1956A465000
trusted library allocation
page read and write
1956C0F8000
trusted library allocation
page read and write
253BDB19000
heap
page read and write
1956A49C000
trusted library allocation
page read and write
1956B489000
trusted library allocation
page read and write
195675A0000
trusted library allocation
page read and write
19561402000
heap
page read and write
195613E4000
heap
page read and write
C58000
heap
page read and write
195738CF000
trusted library allocation
page read and write
1956DD9D000
trusted library allocation
page read and write
1956BEA3000
trusted library allocation
page read and write
27EDE960000
heap
page read and write
19572A8E000
trusted library allocation
page read and write
19576227000
trusted library allocation
page read and write
2929360C000
trusted library allocation
page read and write
1956BE69000
trusted library allocation
page read and write
253BDB1C000
heap
page read and write
253BE12A000
heap
page read and write
19561417000
heap
page read and write
195728AA000
trusted library allocation
page read and write
19561457000
heap
page read and write
19561438000
heap
page read and write
19573E83000
trusted library allocation
page read and write
195613F0000
heap
page read and write
1956C35B000
trusted library allocation
page read and write
19561433000
heap
page read and write
987833E000
unkown
page readonly
1956C0F6000
trusted library allocation
page read and write
1956A388000
trusted library allocation
page read and write
1956C099000
trusted library allocation
page read and write
253BE144000
heap
page read and write
1956C086000
trusted library allocation
page read and write
253BDA69000
unkown
page execute read
19561438000
heap
page read and write
195674BE000
trusted library allocation
page read and write
1956E2A1000
trusted library allocation
page read and write
1956BD28000
trusted library allocation
page read and write
1956B820000
trusted library allocation
page read and write
1956B82B000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1956BF69000
trusted library allocation
page read and write
1957586E000
trusted library allocation
page read and write
1957386D000
trusted library allocation
page read and write
19561449000
heap
page read and write
195727C4000
trusted library allocation
page read and write
1956BFFD000
trusted library allocation
page read and write
195664F2000
trusted library allocation
page read and write
1956BA41000
trusted library allocation
page read and write
1956145C000
heap
page read and write
19575F53000
trusted library allocation
page read and write
1956C9D3000
trusted library allocation
page read and write
253BD340000
heap
page read and write
1956C3B5000
trusted library allocation
page read and write
19561402000
heap
page read and write
19574BF9000
trusted library allocation
page read and write
1956B4A8000
trusted library allocation
page read and write
1956E182000
trusted library allocation
page read and write
19561417000
heap
page read and write
19561448000
heap
page read and write
1957623B000
trusted library allocation
page read and write
1956B4A2000
trusted library allocation
page read and write
1956DDCE000
trusted library allocation
page read and write
195758A7000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956B4D4000
trusted library allocation
page read and write
195613F5000
heap
page read and write
19561438000
heap
page read and write
1956DDE2000
trusted library allocation
page read and write
195728A3000
trusted library allocation
page read and write
253BCFE0000
unclassified section
page readonly
1956C0A3000
trusted library allocation
page read and write
1957390C000
trusted library allocation
page read and write
1956CA97000
trusted library allocation
page read and write
1EECD3B1000
trusted library allocation
page read and write
195742A8000
trusted library allocation
page read and write
1956BA3F000
trusted library allocation
page read and write
1956BA44000
trusted library allocation
page read and write
19567DE6000
heap
page read and write
19573996000
trusted library allocation
page read and write
19568C9D000
trusted library allocation
page read and write
1956B5E2000
trusted library allocation
page read and write
19573834000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
1956AD77000
trusted library allocation
page read and write
1956B8FA000
trusted library allocation
page read and write
1957383E000
trusted library allocation
page read and write
195728B3000
trusted library allocation
page read and write
1956C2B3000
trusted library allocation
page read and write
19572AA4000
trusted library allocation
page read and write
1956D935000
trusted library allocation
page read and write
195728EE000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956143F000
heap
page read and write
1956BF64000
trusted library allocation
page read and write
195728B3000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956B5FA000
trusted library allocation
page read and write
1957380A000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956CA8C000
trusted library allocation
page read and write
195728F6000
trusted library allocation
page read and write
1956C0FD000
trusted library allocation
page read and write
F71F7F8000
stack
page read and write
1956E1D5000
trusted library allocation
page read and write
29293260000
unclassified section
page read and write
1956DD60000
trusted library allocation
page read and write
1956B489000
trusted library allocation
page read and write
F721A7E000
unkown
page readonly
1956BA49000
trusted library allocation
page read and write
1956A4AC000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1956DC8E000
trusted library allocation
page read and write
27EDEB00000
trusted library allocation
page read and write
1956A1E0000
trusted library allocation
page read and write
1956C089000
trusted library allocation
page read and write
1957425E000
trusted library allocation
page read and write
19561433000
heap
page read and write
195739F3000
trusted library allocation
page read and write
1956B5BC000
trusted library allocation
page read and write
1956B57B000
trusted library allocation
page read and write
1956CAB4000
trusted library allocation
page read and write
1956E0A2000
trusted library allocation
page read and write
19561402000
heap
page read and write
19574261000
trusted library allocation
page read and write
19567DEE000
heap
page read and write
1956C0D4000
trusted library allocation
page read and write
195613E0000
heap
page read and write
195613E1000
heap
page read and write
1956BA97000
trusted library allocation
page read and write
1EECD382000
trusted library allocation
page read and write
1956E0FC000
trusted library allocation
page read and write
1956CA61000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956BE96000
trusted library allocation
page read and write
1956D8B7000
trusted library allocation
page read and write
1956C443000
trusted library allocation
page read and write
1956E1CB000
trusted library allocation
page read and write
1956D9C9000
trusted library allocation
page read and write
1956BA89000
trusted library allocation
page read and write
1956C3CC000
trusted library allocation
page read and write
1956D9D6000
trusted library allocation
page read and write
1957382D000
trusted library allocation
page read and write
19561448000
heap
page read and write
1956B468000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956C00C000
trusted library allocation
page read and write
1957386B000
trusted library allocation
page read and write
195613EF000
heap
page read and write
195739D2000
trusted library allocation
page read and write
1957396A000
trusted library allocation
page read and write
195728C8000
trusted library allocation
page read and write
3180000
heap
page read and write
1956142C000
heap
page read and write
19561402000
heap
page read and write
195734D1000
trusted library allocation
page read and write
29293412000
trusted library allocation
page read and write
19572AB2000
trusted library allocation
page read and write
23ECD245000
heap
page read and write
19561440000
heap
page read and write
1EECCF40000
unclassified section
page readonly
1956DAC1000
trusted library allocation
page read and write
1956C4D2000
trusted library allocation
page read and write
1956B5C4000
trusted library allocation
page read and write
195675DB000
trusted library allocation
page read and write
1956E18F000
trusted library allocation
page read and write
19575F7E000
trusted library allocation
page read and write
19573810000
trusted library allocation
page read and write
1956E2E8000
trusted library allocation
page read and write
19572895000
trusted library allocation
page read and write
29293464000
trusted library allocation
page read and write
19573879000
trusted library allocation
page read and write
1956A48C000
trusted library allocation
page read and write
1956A85D000
trusted library allocation
page read and write
B14000
heap
page read and write
19566466000
trusted library allocation
page read and write
19561451000
heap
page read and write
195613FF000
heap
page read and write
1956DDAD000
trusted library allocation
page read and write
23ECD10A000
trusted library allocation
page read and write
1956CAFC000
trusted library allocation
page read and write
1956D9CD000
trusted library allocation
page read and write
1956C099000
trusted library allocation
page read and write
19574095000
trusted library allocation
page read and write
19573860000
trusted library allocation
page read and write
1956B8F7000
trusted library allocation
page read and write
1956B56B000
trusted library allocation
page read and write
1956DDEF000
trusted library allocation
page read and write
253BE144000
heap
page read and write
1956C06D000
trusted library allocation
page read and write
1956A1FB000
trusted library allocation
page read and write
B14000
heap
page read and write
1956A362000
trusted library allocation
page read and write
1956C67A000
trusted library allocation
page read and write
1956143D000
heap
page read and write
1956C257000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
195613FF000
heap
page read and write
1956E2FE000
trusted library allocation
page read and write
1956BEFE000
trusted library allocation
page read and write
29293472000
trusted library allocation
page read and write
E89ABFF000
stack
page read and write
19567DA3000
heap
page read and write
1956A39D000
trusted library allocation
page read and write
1956BE92000
trusted library allocation
page read and write
1956E191000
trusted library allocation
page read and write
253BDB2D000
heap
page read and write
1957387E000
trusted library allocation
page read and write
195613F6000
heap
page read and write
195739DF000
trusted library allocation
page read and write
1956BBBF000
trusted library allocation
page read and write
1956B76F000
trusted library allocation
page read and write
195613F5000
heap
page read and write
1956BBA0000
trusted library allocation
page read and write
19561449000
heap
page read and write
195613FE000
heap
page read and write
195613F5000
heap
page read and write
195728F6000
trusted library allocation
page read and write
1956143F000
heap
page read and write
1956BBDA000
trusted library allocation
page read and write
1956DDE2000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1957583D000
trusted library allocation
page read and write
253BDB10000
heap
page read and write
1956142C000
heap
page read and write
19567DDF000
heap
page read and write
1956143D000
heap
page read and write
1956BA4F000
trusted library allocation
page read and write
1956C2A6000
trusted library allocation
page read and write
F724B7E000
unkown
page readonly
F71F7FB000
stack
page read and write
1956CAD0000
trusted library allocation
page read and write
19567796000
trusted library allocation
page read and write
19573D18000
trusted library allocation
page read and write
19567DA3000
heap
page read and write
195728EC000
trusted library allocation
page read and write
1956C20B000
trusted library allocation
page read and write
1956C0A9000
trusted library allocation
page read and write
253BDB1C000
heap
page read and write
1980003F000
trusted library allocation
page read and write
19573E06000
trusted library allocation
page read and write
253BD346000
heap
page read and write
1956C0C0000
trusted library allocation
page read and write
19568CE5000
trusted library allocation
page read and write
1956C6B8000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956A38D000
trusted library allocation
page read and write
253BD4F3000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956C0A5000
trusted library allocation
page read and write
19573964000
trusted library allocation
page read and write
1956DDF2000
trusted library allocation
page read and write
1956E187000
trusted library allocation
page read and write
19575870000
trusted library allocation
page read and write
1956E3E4000
trusted library allocation
page read and write
1956C9FE000
trusted library allocation
page read and write
1956BAC7000
trusted library allocation
page read and write
1956E04F000
trusted library allocation
page read and write
1850000
heap
page read and write
1956B440000
trusted library allocation
page read and write
1956A4D8000
trusted library allocation
page read and write
195613E4000
heap
page read and write
1956BA0C000
trusted library allocation
page read and write
1956C080000
trusted library allocation
page read and write
1956DD60000
trusted library allocation
page read and write
195613ED000
heap
page read and write
19561445000
heap
page read and write
1956C0D0000
trusted library allocation
page read and write
1956143D000
heap
page read and write
1956C13C000
trusted library allocation
page read and write
1956E3E4000
trusted library allocation
page read and write
253BE159000
heap
page read and write
1EECCF50000
unclassified section
page readonly
19561458000
heap
page read and write
19573463000
trusted library allocation
page read and write
1956E0CB000
trusted library allocation
page read and write
19561446000
heap
page read and write
1956E2FE000
trusted library allocation
page read and write
1956BA3D000
trusted library allocation
page read and write
1956C082000
trusted library allocation
page read and write
19575F53000
trusted library allocation
page read and write
19561433000
heap
page read and write
B14000
heap
page read and write
19575879000
trusted library allocation
page read and write
19573EAF000
trusted library allocation
page read and write
195727D4000
trusted library allocation
page read and write
195727F3000
trusted library allocation
page read and write
1956144D000
heap
page read and write
1956143B000
heap
page read and write
19561433000
heap
page read and write
1956A3A4000
trusted library allocation
page read and write
1956DF8E000
trusted library allocation
page read and write
1956E299000
trusted library allocation
page read and write
29293492000
trusted library allocation
page read and write
19561449000
heap
page read and write
19561410000
heap
page read and write
1956DDEB000
trusted library allocation
page read and write
1957383E000
trusted library allocation
page read and write
195613E6000
heap
page read and write
1956B495000
trusted library allocation
page read and write
19561449000
heap
page read and write
19567BCE000
trusted library allocation
page read and write
195613F9000
heap
page read and write
1956C099000
trusted library allocation
page read and write
1956142C000
heap
page read and write
19561449000
heap
page read and write
1956C2FE000
trusted library allocation
page read and write
1956CA78000
trusted library allocation
page read and write
1956C9E6000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956B8FE000
trusted library allocation
page read and write
195675CB000
trusted library allocation
page read and write
1956B74C000
trusted library allocation
page read and write
19573FCB000
trusted library allocation
page read and write
1956BFFA000
trusted library allocation
page read and write
1956DDB3000
trusted library allocation
page read and write
195674E4000
trusted library allocation
page read and write
1956C2FA000
trusted library allocation
page read and write
195758C2000
trusted library allocation
page read and write
1956BA0C000
trusted library allocation
page read and write
1956E2FE000
trusted library allocation
page read and write
1956A656000
trusted library allocation
page read and write
19561408000
heap
page read and write
1956DDBC000
trusted library allocation
page read and write
195728B1000
trusted library allocation
page read and write
195613ED000
heap
page read and write
1956E0A2000
trusted library allocation
page read and write
6F060AB000
stack
page read and write
253BDB0C000
heap
page read and write
19561438000
heap
page read and write
19567DE5000
heap
page read and write
19575F58000
trusted library allocation
page read and write
2929345D000
trusted library allocation
page read and write
19575D6E000
trusted library allocation
page read and write
1956C9C6000
trusted library allocation
page read and write
1956C06B000
trusted library allocation
page read and write
1956BA41000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
19561466000
heap
page read and write
195742A8000
trusted library allocation
page read and write
1956E243000
trusted library allocation
page read and write
195613F5000
heap
page read and write
1956BA56000
trusted library allocation
page read and write
1956BBAB000
trusted library allocation
page read and write
1956A1CA000
trusted library allocation
page read and write
1956BFD9000
trusted library allocation
page read and write
253BD403000
trusted library allocation
page read and write
1956A4FE000
trusted library allocation
page read and write
195613E6000
heap
page read and write
1956E09E000
trusted library allocation
page read and write
1956B4E3000
trusted library allocation
page read and write
1956B7B0000
trusted library allocation
page read and write
1956DDF7000
trusted library allocation
page read and write
1956C0FB000
trusted library allocation
page read and write
1956C071000
trusted library allocation
page read and write
195734E9000
trusted library allocation
page read and write
19561417000
heap
page read and write
1957380A000
trusted library allocation
page read and write
1956C0D4000
trusted library allocation
page read and write
1956B56B000
trusted library allocation
page read and write
1956B82D000
trusted library allocation
page read and write
1956A725000
trusted library allocation
page read and write
19573FFC000
trusted library allocation
page read and write
1956D91A000
trusted library allocation
page read and write
1956E135000
trusted library allocation
page read and write
1956C8A9000
trusted library allocation
page read and write
19568CE5000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956A197000
trusted library allocation
page read and write
1956C071000
trusted library allocation
page read and write
19561402000
heap
page read and write
19575879000
trusted library allocation
page read and write
19574B61000
trusted library allocation
page read and write
1956E22C000
trusted library allocation
page read and write
195613F7000
heap
page read and write
1EECD1B2000
unclassified section
page read and write
1956C9DB000
trusted library allocation
page read and write
1956E381000
trusted library allocation
page read and write
1957288C000
trusted library allocation
page read and write
253BE00E000
trusted library allocation
page read and write
195663FB000
trusted library allocation
page read and write
1956E288000
trusted library allocation
page read and write
1956A8F6000
trusted library allocation
page read and write
1956C0C3000
trusted library allocation
page read and write
195677E4000
trusted library allocation
page read and write
253BD486000
trusted library allocation
page read and write
1957582A000
trusted library allocation
page read and write
1956BA62000
trusted library allocation
page read and write
1956BF45000
trusted library allocation
page read and write
19572ACC000
trusted library allocation
page read and write
1956BA58000
trusted library allocation
page read and write
19572799000
trusted library allocation
page read and write
1956BFF8000
trusted library allocation
page read and write
19561402000
heap
page read and write
19574097000
trusted library allocation
page read and write
19572A7C000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
195728C5000
trusted library allocation
page read and write
1956E2AF000
trusted library allocation
page read and write
1956C0FB000
trusted library allocation
page read and write
1956C0AD000
trusted library allocation
page read and write
23ECD000000
trusted library allocation
page read and write
1957426E000
trusted library allocation
page read and write
1956DD8C000
trusted library allocation
page read and write
29293603000
trusted library allocation
page read and write
1956E3F5000
trusted library allocation
page read and write
19572AA2000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956B598000
trusted library allocation
page read and write
1956C213000
trusted library allocation
page read and write
195728C0000
trusted library allocation
page read and write
1956142C000
heap
page read and write
1956C483000
trusted library allocation
page read and write
19561433000
heap
page read and write
19573E68000
trusted library allocation
page read and write
9874F4E000
stack
page read and write
19574062000
trusted library allocation
page read and write
1956BE92000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956D8A6000
trusted library allocation
page read and write
1956C0F8000
trusted library allocation
page read and write
1956DD95000
trusted library allocation
page read and write
23ECEA80000
heap
page read and write
1956A46C000
trusted library allocation
page read and write
19572AAE000
trusted library allocation
page read and write
19574C01000
trusted library allocation
page read and write
19567751000
trusted library allocation
page read and write
1956A360000
trusted library allocation
page read and write
1956E2F6000
trusted library allocation
page read and write
19561431000
heap
page read and write
1957348F000
trusted library allocation
page read and write
19572AA4000
trusted library allocation
page read and write
1956B42E000
trusted library allocation
page read and write
19561440000
heap
page read and write
19567DEF000
heap
page read and write
19561448000
heap
page read and write
195728C0000
trusted library allocation
page read and write
195738A5000
trusted library allocation
page read and write
1956E180000
trusted library allocation
page read and write
1956CE67000
trusted library allocation
page read and write
1956A3A4000
trusted library allocation
page read and write
19561457000
heap
page read and write
1956C05B000
trusted library allocation
page read and write
1956C0D4000
trusted library allocation
page read and write
1956A3CD000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956B8B6000
trusted library allocation
page read and write
1956A484000
trusted library allocation
page read and write
1956C0E3000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956143F000
heap
page read and write
253BE177000
heap
page read and write
1956C2E6000
trusted library allocation
page read and write
1956C0B2000
trusted library allocation
page read and write
1956A1C2000
trusted library allocation
page read and write
253BD35F000
unclassified section
page read and write
1956DDE7000
trusted library allocation
page read and write
195727F8000
trusted library allocation
page read and write
1956C0D7000
trusted library allocation
page read and write
19561402000
heap
page read and write
C60000
heap
page read and write
19568C0B000
trusted library allocation
page read and write
1EECD35D000
trusted library allocation
page read and write
1956C4C7000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1956C082000
trusted library allocation
page read and write
29293700000
heap
page read and write
1956BD1F000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956C0AE000
trusted library allocation
page read and write
19561446000
heap
page read and write
19572AC8000
trusted library allocation
page read and write
F72227E000
stack
page read and write
1956C0A5000
trusted library allocation
page read and write
195739D3000
trusted library allocation
page read and write
253BE158000
heap
page read and write
195613F9000
heap
page read and write
1956C0EF000
trusted library allocation
page read and write
1EECD3B7000
trusted library allocation
page read and write
195613ED000
heap
page read and write
1956782B000
trusted library allocation
page read and write
1956C06B000
trusted library allocation
page read and write
1956B573000
trusted library allocation
page read and write
195728B5000
trusted library allocation
page read and write
19561429000
heap
page read and write
1956D9D6000
trusted library allocation
page read and write
19574032000
trusted library allocation
page read and write
1956C4DC000
trusted library allocation
page read and write
1956C05B000
trusted library allocation
page read and write
1956DFF7000
trusted library allocation
page read and write
E89A3FE000
stack
page read and write
195613FA000
heap
page read and write
1956DC9C000
trusted library allocation
page read and write
195675F5000
trusted library allocation
page read and write
19561408000
heap
page read and write
1956C8E5000
trusted library allocation
page read and write
1956E3E4000
trusted library allocation
page read and write
195674C9000
trusted library allocation
page read and write
19568CDC000
trusted library allocation
page read and write
19574231000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
1956C082000
trusted library allocation
page read and write
1956C499000
trusted library allocation
page read and write
1956DC69000
trusted library allocation
page read and write
253BE158000
heap
page read and write
19561408000
heap
page read and write
1956C0F8000
trusted library allocation
page read and write
1956C0F1000
trusted library allocation
page read and write
1956779D000
trusted library allocation
page read and write
1956CABA000
trusted library allocation
page read and write
195613EF000
heap
page read and write
6F0A47E000
unkown
page readonly
195613FF000
heap
page read and write
1956A3CD000
trusted library allocation
page read and write
1956AD8B000
trusted library allocation
page read and write
19561458000
heap
page read and write
19561466000
heap
page read and write
19568CE0000
trusted library allocation
page read and write
1956A18E000
trusted library allocation
page read and write
1956B440000
trusted library allocation
page read and write
1956A4F9000
trusted library allocation
page read and write
195674E0000
trusted library allocation
page read and write
1956C3F5000
trusted library allocation
page read and write
1956C252000
trusted library allocation
page read and write
1956E1E1000
trusted library allocation
page read and write
19561408000
heap
page read and write
1956C4F4000
trusted library allocation
page read and write
19567DA3000
heap
page read and write
253BDB90000
heap
page read and write
195738BC000
trusted library allocation
page read and write
1956C086000
trusted library allocation
page read and write
195728E0000
trusted library allocation
page read and write
19575865000
trusted library allocation
page read and write
1956C26F000
trusted library allocation
page read and write
1956C252000
trusted library allocation
page read and write
195728EE000
trusted library allocation
page read and write
1956DAED000
trusted library allocation
page read and write
19572AAA000
trusted library allocation
page read and write
1956B4ED000
trusted library allocation
page read and write
19573972000
trusted library allocation
page read and write
195738D6000
trusted library allocation
page read and write
195738A5000
trusted library allocation
page read and write
1956A38C000
trusted library allocation
page read and write
1957279D000
trusted library allocation
page read and write
1956C480000
trusted library allocation
page read and write
1956E2D2000
trusted library allocation
page read and write
1956BD42000
trusted library allocation
page read and write
195728D4000
trusted library allocation
page read and write
1956E1CD000
trusted library allocation
page read and write
195613E0000
heap
page read and write
1956BE6E000
trusted library allocation
page read and write
1956BFF8000
trusted library allocation
page read and write
19561417000
heap
page read and write
1957409B000
trusted library allocation
page read and write
1956E0D1000
trusted library allocation
page read and write
1957389B000
trusted library allocation
page read and write
1956C268000
trusted library allocation
page read and write
1956C0B2000
trusted library allocation
page read and write
195734D1000
trusted library allocation
page read and write
1956B5C2000
trusted library allocation
page read and write
195613F5000
heap
page read and write
195677BE000
trusted library allocation
page read and write
253BD481000
trusted library allocation
page read and write
F7211FE000
stack
page read and write
195613E6000
heap
page read and write
F722AFE000
unkown
page readonly
1956143B000
heap
page read and write
19572A82000
trusted library allocation
page read and write
141E000
stack
page read and write
1956A3CD000
trusted library allocation
page read and write
1956BAC3000
trusted library allocation
page read and write
1956C048000
trusted library allocation
page read and write
1956C0F8000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956CEAC000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956A3CD000
trusted library allocation
page read and write
1956E199000
trusted library allocation
page read and write
195613F6000
heap
page read and write
B14000
heap
page read and write
19572A82000
trusted library allocation
page read and write
19561449000
heap
page read and write
1956144A000
heap
page read and write
1956B8E2000
trusted library allocation
page read and write
19573818000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956E135000
trusted library allocation
page read and write
1956E132000
trusted library allocation
page read and write
19561454000
heap
page read and write
1956C0B2000
trusted library allocation
page read and write
1956C096000
trusted library allocation
page read and write
1956E1FC000
trusted library allocation
page read and write
1956E2C2000
trusted library allocation
page read and write
1956C0F6000
trusted library allocation
page read and write
1956C83E000
trusted library allocation
page read and write
19568C1D000
trusted library allocation
page read and write
1956B553000
trusted library allocation
page read and write
1956C889000
trusted library allocation
page read and write
195664E4000
trusted library allocation
page read and write
1956D9A3000
trusted library allocation
page read and write
1956DAC9000
trusted library allocation
page read and write
1956BFF6000
trusted library allocation
page read and write
195758B7000
trusted library allocation
page read and write
19572768000
trusted library allocation
page read and write
1956C2F6000
trusted library allocation
page read and write
1957659B000
heap
page read and write
1956B478000
trusted library allocation
page read and write
1956C0F6000
trusted library allocation
page read and write
1956C064000
trusted library allocation
page read and write
1957421F000
trusted library allocation
page read and write
253BE16A000
heap
page read and write
195613F5000
heap
page read and write
195613E6000
heap
page read and write
1956C4CC000
trusted library allocation
page read and write
19573885000
trusted library allocation
page read and write
1956E1D9000
trusted library allocation
page read and write
195613DF000
heap
page read and write
1956E2E4000
trusted library allocation
page read and write
195728EC000
trusted library allocation
page read and write
1957381F000
trusted library allocation
page read and write
1956BECD000
trusted library allocation
page read and write
1956BA5A000
trusted library allocation
page read and write
1956DCB0000
trusted library allocation
page read and write
253BE12D000
heap
page read and write
1956C38F000
trusted library allocation
page read and write
1956C0F1000
trusted library allocation
page read and write
1956A39D000
trusted library allocation
page read and write
195613F8000
heap
page read and write
EFFDFFE000
stack
page read and write
1EECD1E6000
heap
page read and write
19574B85000
trusted library allocation
page read and write
253BDAB0000
heap
page read and write
19573A00000
trusted library allocation
page read and write
987733E000
unkown
page readonly
19561417000
heap
page read and write
1956C0F8000
trusted library allocation
page read and write
19574B61000
trusted library allocation
page read and write
195728E0000
trusted library allocation
page read and write
195613F9000
heap
page read and write
1956C0A9000
trusted library allocation
page read and write
19572A9D000
trusted library allocation
page read and write
1956E3F5000
trusted library allocation
page read and write
1956E1D8000
trusted library allocation
page read and write
1956CE3E000
trusted library allocation
page read and write
1956A448000
trusted library allocation
page read and write
195728AD000
trusted library allocation
page read and write
195740EE000
trusted library allocation
page read and write
1956BE14000
trusted library allocation
page read and write
253BCFF0000
unclassified section
page readonly
19561449000
heap
page read and write
253BDB1C000
heap
page read and write
19574005000
trusted library allocation
page read and write
195675D0000
trusted library allocation
page read and write
19574091000
trusted library allocation
page read and write
1956C991000
trusted library allocation
page read and write
C53000
heap
page read and write
19575FB1000
trusted library allocation
page read and write
29293619000
trusted library allocation
page read and write
1956BF36000
trusted library allocation
page read and write
1956C282000
trusted library allocation
page read and write
1956B4F2000
trusted library allocation
page read and write
19567DE8000
heap
page read and write
19561438000
heap
page read and write
195613FE000
heap
page read and write
19568C72000
trusted library allocation
page read and write
253BD080000
heap
page read and write
19573862000
trusted library allocation
page read and write
1956C2B8000
trusted library allocation
page read and write
195613FE000
heap
page read and write
19575F77000
trusted library allocation
page read and write
195675F5000
trusted library allocation
page read and write
195677F6000
trusted library allocation
page read and write
1956140D000
heap
page read and write
1956A1D5000
trusted library allocation
page read and write
1EECD050000
heap
page read and write
195613EF000
heap
page read and write
1956E293000
trusted library allocation
page read and write
19561453000
heap
page read and write
1956BD68000
trusted library allocation
page read and write
1956DF73000
trusted library allocation
page read and write
253BE177000
heap
page read and write
1956C0FD000
trusted library allocation
page read and write
1956C0EF000
trusted library allocation
page read and write
19573920000
trusted library allocation
page read and write
1956142C000
heap
page read and write
19566482000
trusted library allocation
page read and write
1956C042000
trusted library allocation
page read and write
19561402000
heap
page read and write
253BDB99000
heap
page read and write
1956C2F0000
trusted library allocation
page read and write
1956B8FE000
trusted library allocation
page read and write
27EDEB0A000
trusted library allocation
page read and write
19561448000
heap
page read and write
19574093000
trusted library allocation
page read and write
19561408000
heap
page read and write
F71F77E000
unkown
page readonly
1956A47C000
trusted library allocation
page read and write
1956C3B7000
trusted library allocation
page read and write
19573E94000
trusted library allocation
page read and write
1956A667000
trusted library allocation
page read and write
19572A72000
trusted library allocation
page read and write
1956C086000
trusted library allocation
page read and write
1956BE9C000
trusted library allocation
page read and write
1956DD8C000
trusted library allocation
page read and write
1956B4F2000
trusted library allocation
page read and write
1956A6E5000
trusted library allocation
page read and write
1956C443000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
1956BDA3000
trusted library allocation
page read and write
195677BE000
trusted library allocation
page read and write
19567DDF000
heap
page read and write
19561428000
heap
page read and write
1956CEE5000
trusted library allocation
page read and write
1956AD0E000
trusted library allocation
page read and write
1956C298000
trusted library allocation
page read and write
1956CAF0000
trusted library allocation
page read and write
195613FF000
heap
page read and write
19561408000
heap
page read and write
1956BE8F000
trusted library allocation
page read and write
1956BBAD000
trusted library allocation
page read and write
1956C34D000
trusted library allocation
page read and write
195728E0000
trusted library allocation
page read and write
1956DD8F000
trusted library allocation
page read and write
195613ED000
heap
page read and write
19561402000
heap
page read and write
253BDB99000
heap
page read and write
1956C2AE000
trusted library allocation
page read and write
1956E2DF000
trusted library allocation
page read and write
195728E0000
trusted library allocation
page read and write
1956DDD4000
trusted library allocation
page read and write
195613E6000
heap
page read and write
6F0947E000
unkown
page readonly
1956DD93000
trusted library allocation
page read and write
1957388E000
trusted library allocation
page read and write
19573832000
trusted library allocation
page read and write
1956A45F000
trusted library allocation
page read and write
1956E2EA000
trusted library allocation
page read and write
1956C342000
trusted library allocation
page read and write
1956D88E000
trusted library allocation
page read and write
E8993FB000
stack
page read and write
1956C280000
trusted library allocation
page read and write
1956E145000
trusted library allocation
page read and write
19561467000
heap
page read and write
253BE177000
heap
page read and write
1956BEDE000
trusted library allocation
page read and write
19568CE5000
trusted library allocation
page read and write
195728F6000
trusted library allocation
page read and write
1956DF95000
trusted library allocation
page read and write
1956A360000
trusted library allocation
page read and write
19561467000
heap
page read and write
1957386B000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956BBFE000
trusted library allocation
page read and write
19568C7A000
trusted library allocation
page read and write
1956DD54000
trusted library allocation
page read and write
195727DA000
trusted library allocation
page read and write
19575819000
trusted library allocation
page read and write
1956C2B8000
trusted library allocation
page read and write
1956C470000
trusted library allocation
page read and write
1956C0FD000
trusted library allocation
page read and write
1956E163000
trusted library allocation
page read and write
1956C35E000
trusted library allocation
page read and write
19561450000
heap
page read and write
19573879000
trusted library allocation
page read and write
1956C0B2000
trusted library allocation
page read and write
1956CE7D000
trusted library allocation
page read and write
1956D9B9000
trusted library allocation
page read and write
1956C4C7000
trusted library allocation
page read and write
29293467000
trusted library allocation
page read and write
1956A195000
trusted library allocation
page read and write
19573916000
trusted library allocation
page read and write
1956DDD3000
trusted library allocation
page read and write
1956B5E8000
trusted library allocation
page read and write
1956C2FC000
trusted library allocation
page read and write
1956A137000
trusted library allocation
page read and write
19567757000
trusted library allocation
page read and write
195739F7000
trusted library allocation
page read and write
29293300000
trusted library allocation
page read and write
1956C3AC000
trusted library allocation
page read and write
19567B44000
trusted library allocation
page read and write
1956C256000
trusted library allocation
page read and write
1956ADFD000
trusted library allocation
page read and write
19575F58000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956CEAE000
trusted library allocation
page read and write
1956BEAE000
trusted library allocation
page read and write
1956BECB000
trusted library allocation
page read and write
19567DDF000
heap
page read and write
1956DD93000
trusted library allocation
page read and write
1956C0BC000
trusted library allocation
page read and write
1956ADF7000
trusted library allocation
page read and write
19573872000
trusted library allocation
page read and write
1956145F000
heap
page read and write
1956B452000
trusted library allocation
page read and write
19574C04000
trusted library allocation
page read and write
1956BFE7000
trusted library allocation
page read and write
1956C483000
trusted library allocation
page read and write
195613FA000
heap
page read and write
1956A4FE000
trusted library allocation
page read and write
1956B430000
trusted library allocation
page read and write
1956C0B2000
trusted library allocation
page read and write
1956DCE4000
trusted library allocation
page read and write
1956C270000
trusted library allocation
page read and write
1956C0F1000
trusted library allocation
page read and write
1956D969000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956B4ED000
trusted library allocation
page read and write
19566323000
trusted library allocation
page read and write
23ECCFC0000
heap
page read and write
1956C4D6000
trusted library allocation
page read and write
195677F6000
trusted library allocation
page read and write
1956CA91000
trusted library allocation
page read and write
1956B5D0000
trusted library allocation
page read and write
1956BF88000
trusted library allocation
page read and write
1956ACF9000
trusted library allocation
page read and write
1956BFF3000
trusted library allocation
page read and write
1956A39D000
trusted library allocation
page read and write
19576501000
heap
page read and write
1956DDE7000
trusted library allocation
page read and write
1956E3F5000
trusted library allocation
page read and write
253BDB90000
heap
page read and write
1956B8EF000
trusted library allocation
page read and write
19567DC6000
heap
page read and write
1956A47F000
trusted library allocation
page read and write
1956D969000
trusted library allocation
page read and write
1956BBAD000
trusted library allocation
page read and write
19575F5F000
trusted library allocation
page read and write
1956A164000
trusted library allocation
page read and write
19568CAC000
trusted library allocation
page read and write
1956C0FD000
trusted library allocation
page read and write
253BDB13000
heap
page read and write
1956DF90000
trusted library allocation
page read and write
1956145C000
heap
page read and write
1956BDB6000
trusted library allocation
page read and write
19575F98000
trusted library allocation
page read and write
19573E47000
trusted library allocation
page read and write
1956BA0F000
trusted library allocation
page read and write
1956C278000
trusted library allocation
page read and write
19572ACC000
trusted library allocation
page read and write
253BDB0C000
heap
page read and write
195728DD000
trusted library allocation
page read and write
1956C83E000
trusted library allocation
page read and write
195738A5000
trusted library allocation
page read and write
1956E2FE000
trusted library allocation
page read and write
1956C494000
trusted library allocation
page read and write
1956E0DB000
trusted library allocation
page read and write
1956BF4D000
trusted library allocation
page read and write
195739F5000
trusted library allocation
page read and write
29293639000
trusted library allocation
page read and write
1957382A000
trusted library allocation
page read and write
195739DF000
trusted library allocation
page read and write
19575DBE000
trusted library allocation
page read and write
1956A1A5000
trusted library allocation
page read and write
1956E1AA000
trusted library allocation
page read and write
292931F0000
heap
page read and write
195613FF000
heap
page read and write
195677C1000
trusted library allocation
page read and write
195728DF000
trusted library allocation
page read and write
1956C4DC000
trusted library allocation
page read and write
195738D6000
trusted library allocation
page read and write
1956E1FC000
trusted library allocation
page read and write
1956DD3A000
trusted library allocation
page read and write
19561467000
heap
page read and write
195613E6000
heap
page read and write
19561445000
heap
page read and write
1956C142000
trusted library allocation
page read and write
1957347A000
trusted library allocation
page read and write
292934E7000
trusted library allocation
page read and write
195734E3000
trusted library allocation
page read and write
1956143F000
heap
page read and write
1EECD1E4000
heap
page read and write
1956C260000
trusted library allocation
page read and write
1956A3CD000
trusted library allocation
page read and write
19573862000
trusted library allocation
page read and write
195613DF000
heap
page read and write
19561466000
heap
page read and write
6F061EE000
unkown
page readonly
1956C463000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956C0A9000
trusted library allocation
page read and write
1956143B000
heap
page read and write
195613E6000
heap
page read and write
253BDBA1000
heap
page read and write
19574C24000
trusted library allocation
page read and write
195738D6000
trusted library allocation
page read and write
195728B1000
trusted library allocation
page read and write
1956BA41000
trusted library allocation
page read and write
1956C3EF000
trusted library allocation
page read and write
34D1000
heap
page read and write
6F061AE000
stack
page read and write
1956BA41000
trusted library allocation
page read and write
19567DE2000
heap
page read and write
1956142C000
heap
page read and write
29293479000
trusted library allocation
page read and write
1956BEE9000
trusted library allocation
page read and write
1956DD8C000
trusted library allocation
page read and write
19573890000
trusted library allocation
page read and write
19575F55000
trusted library allocation
page read and write
1956BECB000
trusted library allocation
page read and write
195740E7000
trusted library allocation
page read and write
1956B40B000
trusted library allocation
page read and write
19561463000
heap
page read and write
1956CAC1000
trusted library allocation
page read and write
19561402000
heap
page read and write
253BE144000
heap
page read and write
1956143B000
heap
page read and write
1956BFF3000
trusted library allocation
page read and write
195613F9000
heap
page read and write
195738E6000
trusted library allocation
page read and write
1956E1CB000
trusted library allocation
page read and write
1956A33A000
trusted library allocation
page read and write
19568C56000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956C9CE000
trusted library allocation
page read and write
195613F9000
heap
page read and write
1956A6FD000
trusted library allocation
page read and write
1956E199000
trusted library allocation
page read and write
1956CA61000
trusted library allocation
page read and write
195727F1000
trusted library allocation
page read and write
1956C0EF000
trusted library allocation
page read and write
19567752000
trusted library allocation
page read and write
1956B5E8000
trusted library allocation
page read and write
195613DF000
heap
page read and write
1956CA40000
trusted library allocation
page read and write
19573974000
trusted library allocation
page read and write
1956E396000
trusted library allocation
page read and write
1956A4CA000
trusted library allocation
page read and write
292930C0000
unclassified section
page readonly
1956BA58000
trusted library allocation
page read and write
1957382F000
trusted library allocation
page read and write
1956DC7C000
trusted library allocation
page read and write
1956B495000
trusted library allocation
page read and write
19561402000
heap
page read and write
195765E3000
heap
page read and write
1956C85D000
trusted library allocation
page read and write
253BDBA2000
heap
page read and write
1956C200000
trusted library allocation
page read and write
19561402000
heap
page read and write
19567DEE000
heap
page read and write
1956BFEA000
trusted library allocation
page read and write
1956143B000
heap
page read and write
19575F5F000
trusted library allocation
page read and write
195758FE000
trusted library allocation
page read and write
1956B4E9000
trusted library allocation
page read and write
1956C0F6000
trusted library allocation
page read and write
19575F55000
trusted library allocation
page read and write
253BDB14000
heap
page read and write
1956D996000
trusted library allocation
page read and write
1956B5FA000
trusted library allocation
page read and write
195738E9000
trusted library allocation
page read and write
195763E1000
trusted library allocation
page read and write
19561448000
heap
page read and write
19561428000
heap
page read and write
195742B5000
trusted library allocation
page read and write
19575D25000
trusted library allocation
page read and write
1956DDB5000
trusted library allocation
page read and write
1956BA34000
trusted library allocation
page read and write
19575F53000
trusted library allocation
page read and write
19561451000
heap
page read and write
19566323000
trusted library allocation
page read and write
1956B598000
trusted library allocation
page read and write
1956E1C2000
trusted library allocation
page read and write
19572789000
trusted library allocation
page read and write
253BDB3A000
heap
page read and write
1956A34E000
trusted library allocation
page read and write
1956A1EB000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956A3A4000
trusted library allocation
page read and write
9874F8E000
unkown
page readonly
12C000
unkown
page write copy
1956B4AF000
trusted library allocation
page read and write
1956A6D3000
trusted library allocation
page read and write
19561449000
heap
page read and write
1956BA3A000
trusted library allocation
page read and write
19567DE4000
heap
page read and write
195738C8000
trusted library allocation
page read and write
253BE12A000
heap
page read and write
1956778C000
trusted library allocation
page read and write
19567BCA000
trusted library allocation
page read and write
1956C4ED000
trusted library allocation
page read and write
9FE000
stack
page read and write
1956B5C0000
trusted library allocation
page read and write
1956A1E8000
trusted library allocation
page read and write
195727DA000
trusted library allocation
page read and write
195728EE000
trusted library allocation
page read and write
1956E3F9000
trusted library allocation
page read and write
1957424E000
trusted library allocation
page read and write
195675D4000
trusted library allocation
page read and write
6F06BD8000
stack
page read and write
195728F6000
trusted library allocation
page read and write
19573D57000
trusted library allocation
page read and write
19561438000
heap
page read and write
19576396000
trusted library allocation
page read and write
1956C089000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956A33E000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956BA97000
trusted library allocation
page read and write
1956C0E3000
trusted library allocation
page read and write
1956C87F000
trusted library allocation
page read and write
1956A39D000
trusted library allocation
page read and write
1956BA44000
trusted library allocation
page read and write
1956DDE7000
trusted library allocation
page read and write
1956B5C2000
trusted library allocation
page read and write
1956DDEB000
trusted library allocation
page read and write
195738C6000
trusted library allocation
page read and write
195728E0000
trusted library allocation
page read and write
19574B85000
trusted library allocation
page read and write
1956BECB000
trusted library allocation
page read and write
195613E0000
heap
page read and write
195765E1000
heap
page read and write
1956E1E9000
trusted library allocation
page read and write
1956BEA8000
trusted library allocation
page read and write
1EECD368000
trusted library allocation
page read and write
195742FB000
trusted library allocation
page read and write
23ECCF60000
heap
page read and write
1957589F000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956C0EC000
trusted library allocation
page read and write
19566475000
trusted library allocation
page read and write
1956D99C000
trusted library allocation
page read and write
1956B585000
trusted library allocation
page read and write
19567DE8000
heap
page read and write
19561438000
heap
page read and write
1956143D000
heap
page read and write
19572AD5000
trusted library allocation
page read and write
1957397E000
trusted library allocation
page read and write
1956B7D5000
trusted library allocation
page read and write
1957658B000
heap
page read and write
1956BA3F000
trusted library allocation
page read and write
253BD200000
trusted library allocation
page read and write
19568C61000
trusted library allocation
page read and write
1956A364000
trusted library allocation
page read and write
1956BEEE000
trusted library allocation
page read and write
1957408F000
trusted library allocation
page read and write
1956DD17000
trusted library allocation
page read and write
253BD4C1000
trusted library allocation
page read and write
1956C4CD000
trusted library allocation
page read and write
1956140D000
heap
page read and write
19561459000
heap
page read and write
1956C45E000
trusted library allocation
page read and write
1956B58F000
trusted library allocation
page read and write
19561467000
heap
page read and write
19574222000
trusted library allocation
page read and write
19573972000
trusted library allocation
page read and write
1956BFAF000
trusted library allocation
page read and write
19568CE7000
trusted library allocation
page read and write
195758AD000
trusted library allocation
page read and write
1956E199000
trusted library allocation
page read and write
195758C9000
trusted library allocation
page read and write
19576536000
heap
page read and write
1956C064000
trusted library allocation
page read and write
19573879000
trusted library allocation
page read and write
1956B8F4000
trusted library allocation
page read and write
19575DDE000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956C086000
trusted library allocation
page read and write
1956B48E000
trusted library allocation
page read and write
1956BFCF000
trusted library allocation
page read and write
19572795000
trusted library allocation
page read and write
195740F6000
trusted library allocation
page read and write
1957346C000
trusted library allocation
page read and write
19572AB4000
trusted library allocation
page read and write
1956DDDB000
trusted library allocation
page read and write
1956144E000
heap
page read and write
34D0000
heap
page read and write
61000
unkown
page execute read
1956C2A6000
trusted library allocation
page read and write
1957588F000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956A7C5000
trusted library allocation
page read and write
195613FE000
heap
page read and write
1956143F000
heap
page read and write
195613E6000
heap
page read and write
1956C2E6000
trusted library allocation
page read and write
19574AE1000
trusted library allocation
page read and write
195728AA000
trusted library allocation
page read and write
19573872000
trusted library allocation
page read and write
1956B552000
trusted library allocation
page read and write
1956BB07000
trusted library allocation
page read and write
1956C9C0000
trusted library allocation
page read and write
19572897000
trusted library allocation
page read and write
1956C43B000
trusted library allocation
page read and write
195734E9000
trusted library allocation
page read and write
195677F6000
trusted library allocation
page read and write
19567DA9000
heap
page read and write
1956B75A000
trusted library allocation
page read and write
1956C4F4000
trusted library allocation
page read and write
19568C9A000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
19561467000
heap
page read and write
19561440000
heap
page read and write
19573839000
trusted library allocation
page read and write
19572A4F000
trusted library allocation
page read and write
1956B5C3000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956C2B3000
trusted library allocation
page read and write
1956E3A3000
trusted library allocation
page read and write
C5F000
heap
page read and write
19561429000
heap
page read and write
195742B5000
trusted library allocation
page read and write
195613ED000
heap
page read and write
19572779000
trusted library allocation
page read and write
195675BF000
trusted library allocation
page read and write
1956B4A5000
trusted library allocation
page read and write
1956DD3A000
trusted library allocation
page read and write
195613DF000
heap
page read and write
195763AD000
trusted library allocation
page read and write
1956BE90000
trusted library allocation
page read and write
1956C326000
trusted library allocation
page read and write
1956BBFC000
trusted library allocation
page read and write
6F09C7E000
stack
page read and write
19575FAF000
trusted library allocation
page read and write
19567749000
trusted library allocation
page read and write
1956C8AD000
trusted library allocation
page read and write
1956C071000
trusted library allocation
page read and write
1956A4BE000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956DDEB000
trusted library allocation
page read and write
19567DB5000
heap
page read and write
1956C0F1000
trusted library allocation
page read and write
1957396A000
trusted library allocation
page read and write
1956C2AE000
trusted library allocation
page read and write
1956144B000
heap
page read and write
195727B4000
trusted library allocation
page read and write
134000
unkown
page readonly
1956C232000
trusted library allocation
page read and write
1956E2C9000
trusted library allocation
page read and write
1956A49A000
trusted library allocation
page read and write
1956CA7C000
trusted library allocation
page read and write
1956A750000
trusted library allocation
page read and write
195677AA000
trusted library allocation
page read and write
195677C7000
trusted library allocation
page read and write
1956BE7D000
trusted library allocation
page read and write
1956CEC4000
trusted library allocation
page read and write
1956ACBE000
trusted library allocation
page read and write
1956B6F1000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
19568CF7000
trusted library allocation
page read and write
19561453000
heap
page read and write
1956C260000
trusted library allocation
page read and write
1956C084000
trusted library allocation
page read and write
130000
unkown
page write copy
253BD350000
unclassified section
page read and write
19573843000
trusted library allocation
page read and write
1957387E000
trusted library allocation
page read and write
1956A43A000
trusted library allocation
page read and write
19566371000
trusted library allocation
page read and write
1956E1F3000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956B6B5000
trusted library allocation
page read and write
1956E18F000
trusted library allocation
page read and write
19573DB1000
trusted library allocation
page read and write
19574214000
trusted library allocation
page read and write
195677DD000
trusted library allocation
page read and write
1956C3CE000
trusted library allocation
page read and write
1956C0A5000
trusted library allocation
page read and write
1956C214000
trusted library allocation
page read and write
1956C09B000
trusted library allocation
page read and write
1956C0BC000
trusted library allocation
page read and write
1956A4BE000
trusted library allocation
page read and write
1956E182000
trusted library allocation
page read and write
253BE009000
trusted library allocation
page read and write
1EECD35F000
trusted library allocation
page read and write
1956BDC9000
trusted library allocation
page read and write
19567743000
trusted library allocation
page read and write
195734C4000
trusted library allocation
page read and write
195613F5000
heap
page read and write
1956B4A5000
trusted library allocation
page read and write
1956A4D9000
trusted library allocation
page read and write
1956DC72000
trusted library allocation
page read and write
19561441000
heap
page read and write
1956C35B000
trusted library allocation
page read and write
1956C44E000
trusted library allocation
page read and write
122000
unkown
page readonly
195739D7000
trusted library allocation
page read and write
1956C476000
trusted library allocation
page read and write
1956DF17000
trusted library allocation
page read and write
195728A3000
trusted library allocation
page read and write
1956145F000
heap
page read and write
1956BD46000
trusted library allocation
page read and write
195613ED000
heap
page read and write
1956C09C000
trusted library allocation
page read and write
1956A495000
trusted library allocation
page read and write
19567B51000
trusted library allocation
page read and write
1956A4B1000
trusted library allocation
page read and write
19561402000
heap
page read and write
195728D0000
trusted library allocation
page read and write
19572800000
trusted library allocation
page read and write
1956BB95000
trusted library allocation
page read and write
27EDE830000
heap
page read and write
1956BEAB000
trusted library allocation
page read and write
1956C07A000
trusted library allocation
page read and write
1956E0DB000
trusted library allocation
page read and write
1956D999000
trusted library allocation
page read and write
1956C4FC000
trusted library allocation
page read and write
19572ABA000
trusted library allocation
page read and write
195613F5000
heap
page read and write
1956C0D7000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956E3BF000
trusted library allocation
page read and write
1956C0E3000
trusted library allocation
page read and write
1956B8EC000
trusted library allocation
page read and write
19566371000
trusted library allocation
page read and write
195613E0000
heap
page read and write
19573974000
trusted library allocation
page read and write
23ECEA99000
heap
page read and write
1956C0EC000
trusted library allocation
page read and write
1956CAE1000
trusted library allocation
page read and write
253BD4E9000
trusted library allocation
page read and write
1956E1F3000
trusted library allocation
page read and write
1956BE9C000
trusted library allocation
page read and write
253BD1D0000
heap
page read and write
1956B57D000
trusted library allocation
page read and write
1956A38B000
trusted library allocation
page read and write
19573839000
trusted library allocation
page read and write
1956C2FC000
trusted library allocation
page read and write
195613F9000
heap
page read and write
19566417000
trusted library allocation
page read and write
1956D99F000
trusted library allocation
page read and write
253BDB4C000
heap
page read and write
195738B1000
trusted library allocation
page read and write
1956A1F3000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
19561402000
heap
page read and write
19573E00000
trusted library allocation
page read and write
19573DCB000
trusted library allocation
page read and write
1956D9FA000
trusted library allocation
page read and write
195728C2000
trusted library allocation
page read and write
19561453000
heap
page read and write
19561428000
heap
page read and write
19568CF7000
trusted library allocation
page read and write
1956A4A6000
trusted library allocation
page read and write
19572898000
trusted library allocation
page read and write
19567743000
trusted library allocation
page read and write
1956B42B000
trusted library allocation
page read and write
19561429000
heap
page read and write
195728EE000
trusted library allocation
page read and write
1956A1F3000
trusted library allocation
page read and write
1957383E000
trusted library allocation
page read and write
253BD054000
remote allocation
page execute read
1956C0F1000
trusted library allocation
page read and write
1956A4F9000
trusted library allocation
page read and write
19572849000
trusted library allocation
page read and write
1956A470000
trusted library allocation
page read and write
1956DD9D000
trusted library allocation
page read and write
195734C4000
trusted library allocation
page read and write
19565D90000
trusted library allocation
page read and write
1EECCFF0000
heap
page read and write
19573872000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956A486000
trusted library allocation
page read and write
1956BBCD000
trusted library allocation
page read and write
1956C856000
trusted library allocation
page read and write
19561417000
heap
page read and write
195613E0000
heap
page read and write
1956CAA6000
trusted library allocation
page read and write
19573DB9000
trusted library allocation
page read and write
195758D4000
trusted library allocation
page read and write
1956B54C000
trusted library allocation
page read and write
1956A1DB000
trusted library allocation
page read and write
253BD360000
trusted library section
page readonly
253BE158000
heap
page read and write
19561461000
heap
page read and write
1956F502000
trusted library allocation
page read and write
1956A4F9000
trusted library allocation
page read and write
19561438000
heap
page read and write
9BE000
stack
page read and write
1956AC80000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956A821000
trusted library allocation
page read and write
1956BFD3000
trusted library allocation
page read and write
19567DE8000
heap
page read and write
195613E0000
heap
page read and write
19568CF7000
trusted library allocation
page read and write
1956142C000
heap
page read and write
1956142C000
heap
page read and write
253BDB10000
heap
page read and write
1956BA9A000
trusted library allocation
page read and write
195613DF000
heap
page read and write
19568CE5000
trusted library allocation
page read and write
1956C4F5000
trusted library allocation
page read and write
1956C0B4000
trusted library allocation
page read and write
1956A4B5000
trusted library allocation
page read and write
1956A4A2000
trusted library allocation
page read and write
1956B7A0000
trusted library allocation
page read and write
195739F7000
trusted library allocation
page read and write
1956C07F000
trusted library allocation
page read and write
1956E3F3000
trusted library allocation
page read and write
19573DD6000
trusted library allocation
page read and write
122000
unkown
page readonly
1956BA58000
trusted library allocation
page read and write
19572843000
trusted library allocation
page read and write
195728EE000
trusted library allocation
page read and write
1957286F000
trusted library allocation
page read and write
195613E6000
heap
page read and write
1956E23E000
trusted library allocation
page read and write
1956A4F9000
trusted library allocation
page read and write
1956A48E000
trusted library allocation
page read and write
1956BF69000
trusted library allocation
page read and write
1956BE90000
trusted library allocation
page read and write
1956A384000
trusted library allocation
page read and write
19576501000
heap
page read and write
F7219FE000
unkown
page readonly
1956E2E3000
trusted library allocation
page read and write
19575F58000
trusted library allocation
page read and write
195739FC000
trusted library allocation
page read and write
1956C1BB000
trusted library allocation
page read and write
1956C433000
trusted library allocation
page read and write
195613FF000
heap
page read and write
195675A8000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956B6B0000
trusted library allocation
page read and write
253BDB51000
heap
page read and write
1956B4A0000
trusted library allocation
page read and write
1956B763000
trusted library allocation
page read and write
1956E2AF000
trusted library allocation
page read and write
1956BD4E000
trusted library allocation
page read and write
1956B751000
trusted library allocation
page read and write
1956C4AC000
trusted library allocation
page read and write
1956B5AF000
trusted library allocation
page read and write
1956C05E000
trusted library allocation
page read and write
19561467000
heap
page read and write
19561428000
heap
page read and write
1956A831000
trusted library allocation
page read and write
195734FE000
trusted library allocation
page read and write
1956A1FD000
trusted library allocation
page read and write
253BDAFD000
heap
page read and write
1956BF37000
trusted library allocation
page read and write
253BDB19000
heap
page read and write
1956B430000
trusted library allocation
page read and write
253BE179000
heap
page read and write
1956A3CD000
trusted library allocation
page read and write
1956C0C3000
trusted library allocation
page read and write
292934B6000
trusted library allocation
page read and write
253BD477000
trusted library allocation
page read and write
3EA000
stack
page read and write
19566500000
trusted library allocation
page read and write
1956C0A9000
trusted library allocation
page read and write
1956B5C2000
trusted library allocation
page read and write
1956BEEE000
trusted library allocation
page read and write
19573EA4000
trusted library allocation
page read and write
1956A18E000
trusted library allocation
page read and write
1956142C000
heap
page read and write
1956C067000
trusted library allocation
page read and write
195728C9000
trusted library allocation
page read and write
19572AE8000
trusted library allocation
page read and write
19575875000
trusted library allocation
page read and write
1956C4D6000
trusted library allocation
page read and write
195675D3000
trusted library allocation
page read and write
1956142C000
heap
page read and write
19575D6E000
trusted library allocation
page read and write
19572A86000
trusted library allocation
page read and write
1956C0A5000
trusted library allocation
page read and write
1956BB9A000
trusted library allocation
page read and write
1956A49A000
trusted library allocation
page read and write
19565DB3000
trusted library allocation
page read and write
19561445000
heap
page read and write
195728DC000
trusted library allocation
page read and write
1956D9FA000
trusted library allocation
page read and write
98772FD000
stack
page read and write
195738DC000
trusted library allocation
page read and write
1956B5E8000
trusted library allocation
page read and write
1956BF71000
trusted library allocation
page read and write
19561438000
heap
page read and write
19561433000
heap
page read and write
1956D9F2000
trusted library allocation
page read and write
1956A4D6000
trusted library allocation
page read and write
29293423000
trusted library allocation
page read and write
1956E135000
trusted library allocation
page read and write
1956C0A3000
trusted library allocation
page read and write
1956BD36000
trusted library allocation
page read and write
23ECEA84000
heap
page read and write
19561438000
heap
page read and write
1EECD38F000
trusted library allocation
page read and write
19573DBA000
trusted library allocation
page read and write
1956BD61000
trusted library allocation
page read and write
1956ACDB000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956A8D2000
trusted library allocation
page read and write
19567DE8000
heap
page read and write
195734F8000
trusted library allocation
page read and write
19573469000
trusted library allocation
page read and write
1956CEEE000
trusted library allocation
page read and write
1956B56B000
trusted library allocation
page read and write
1956BD38000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956C2AD000
trusted library allocation
page read and write
253BD400000
trusted library allocation
page read and write
1956C8F6000
trusted library allocation
page read and write
1956E2C2000
trusted library allocation
page read and write
19572AAC000
trusted library allocation
page read and write
253BE011000
trusted library allocation
page read and write
19573810000
trusted library allocation
page read and write
195742D0000
trusted library allocation
page read and write
19572A84000
trusted library allocation
page read and write
1956C0E3000
trusted library allocation
page read and write
1956DFD0000
trusted library allocation
page read and write
195613E6000
heap
page read and write
19573839000
trusted library allocation
page read and write
1956E182000
trusted library allocation
page read and write
1956E09C000
trusted library allocation
page read and write
1956C9BD000
trusted library allocation
page read and write
19573972000
trusted library allocation
page read and write
195728FB000
trusted library allocation
page read and write
1956E1CB000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956C07F000
trusted library allocation
page read and write
1956E115000
trusted library allocation
page read and write
19573DDA000
trusted library allocation
page read and write
1EECD37A000
trusted library allocation
page read and write
19572A4F000
trusted library allocation
page read and write
1956B43A000
trusted library allocation
page read and write
195728C8000
trusted library allocation
page read and write
253BD3F0000
trusted library allocation
page read and write
1956BDC9000
trusted library allocation
page read and write
1956C2B3000
trusted library allocation
page read and write
1956C0E3000
trusted library allocation
page read and write
1956B77B000
trusted library allocation
page read and write
1956BA3F000
trusted library allocation
page read and write
29293494000
trusted library allocation
page read and write
19568CDC000
trusted library allocation
page read and write
1EECD330000
trusted library allocation
page read and write
1956C0B9000
trusted library allocation
page read and write
1956A48C000
trusted library allocation
page read and write
29293500000
unclassified section
page readonly
195728B3000
trusted library allocation
page read and write
195613F6000
heap
page read and write
1956A4FE000
trusted library allocation
page read and write
1956BB0A000
trusted library allocation
page read and write
1956BA1B000
trusted library allocation
page read and write
195728DC000
trusted library allocation
page read and write
1957382D000
trusted library allocation
page read and write
1956B76F000
trusted library allocation
page read and write
1956A488000
trusted library allocation
page read and write
1956C0D7000
trusted library allocation
page read and write
1956BED7000
trusted library allocation
page read and write
1956E0A2000
trusted library allocation
page read and write
195677BE000
trusted library allocation
page read and write
19574276000
trusted library allocation
page read and write
1956BF47000
trusted library allocation
page read and write
19561428000
heap
page read and write
19561454000
heap
page read and write
195677A6000
trusted library allocation
page read and write
195613FE000
heap
page read and write
1956C0F8000
trusted library allocation
page read and write
1956CE9C000
trusted library allocation
page read and write
1956B4D4000
trusted library allocation
page read and write
9EF000
stack
page read and write
1956142C000
heap
page read and write
195738B1000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1957586E000
trusted library allocation
page read and write
1956144E000
heap
page read and write
1956B744000
trusted library allocation
page read and write
19561417000
heap
page read and write
B14000
heap
page read and write
19561445000
heap
page read and write
1956B452000
trusted library allocation
page read and write
19566426000
trusted library allocation
page read and write
195727C4000
trusted library allocation
page read and write
195675F5000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956CE58000
trusted library allocation
page read and write
195742DA000
trusted library allocation
page read and write
1956C3D6000
trusted library allocation
page read and write
1957654D000
heap
page read and write
29293040000
unclassified section
page readonly
19567B63000
trusted library allocation
page read and write
19567DEB000
heap
page read and write
1956C0A9000
trusted library allocation
page read and write
19572799000
trusted library allocation
page read and write
253BD479000
trusted library allocation
page read and write
253BE000000
trusted library allocation
page read and write
1956CABA000
trusted library allocation
page read and write
1956C06B000
trusted library allocation
page read and write
195613FF000
heap
page read and write
19576362000
trusted library allocation
page read and write
1956A3CD000
trusted library allocation
page read and write
1956C082000
trusted library allocation
page read and write
1956A4B8000
trusted library allocation
page read and write
1956B559000
trusted library allocation
page read and write
1956DD62000
trusted library allocation
page read and write
C49000
heap
page read and write
1956144D000
heap
page read and write
1956E3D9000
trusted library allocation
page read and write
19572A4D000
trusted library allocation
page read and write
195613F9000
heap
page read and write
1956DD66000
trusted library allocation
page read and write
1956BFFD000
trusted library allocation
page read and write
195675A2000
trusted library allocation
page read and write
19567DDF000
heap
page read and write
19573863000
trusted library allocation
page read and write
195742A8000
trusted library allocation
page read and write
19561449000
heap
page read and write
1956E219000
trusted library allocation
page read and write
253BD423000
trusted library allocation
page read and write
1EECD400000
heap
page read and write
195728AA000
trusted library allocation
page read and write
1956D8DD000
trusted library allocation
page read and write
1956C0D7000
trusted library allocation
page read and write
19573843000
trusted library allocation
page read and write
1956C064000
trusted library allocation
page read and write
195613FA000
heap
page read and write
1956C086000
trusted library allocation
page read and write
1956BD56000
trusted library allocation
page read and write
1956BFF3000
trusted library allocation
page read and write
1956BBF0000
trusted library allocation
page read and write
19561417000
heap
page read and write
2929327A000
heap
page read and write
1956BBA9000
trusted library allocation
page read and write
195613F6000
heap
page read and write
19572AC4000
trusted library allocation
page read and write
1956A1F6000
trusted library allocation
page read and write
1956CEBE000
trusted library allocation
page read and write
195728F5000
trusted library allocation
page read and write
253BDB96000
heap
page read and write
1957387E000
trusted library allocation
page read and write
1957283C000
trusted library allocation
page read and write
1956B5E8000
trusted library allocation
page read and write
253BD3E2000
unkown
page execute read
19561440000
heap
page read and write
19573FAD000
trusted library allocation
page read and write
1956B44F000
trusted library allocation
page read and write
195738E2000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
1956C0A9000
trusted library allocation
page read and write
1956A384000
trusted library allocation
page read and write
1956CAFC000
trusted library allocation
page read and write
1956D97D000
trusted library allocation
page read and write
1956E3F5000
trusted library allocation
page read and write
1956C036000
trusted library allocation
page read and write
19572A72000
trusted library allocation
page read and write
1956E18D000
trusted library allocation
page read and write
195728C0000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1EECD378000
trusted library allocation
page read and write
1956C476000
trusted library allocation
page read and write
1956B58F000
trusted library allocation
page read and write
1956A3A4000
trusted library allocation
page read and write
1956C2B8000
trusted library allocation
page read and write
1956B824000
trusted library allocation
page read and write
19575FB6000
trusted library allocation
page read and write
1956C086000
trusted library allocation
page read and write
19561444000
heap
page read and write
61000
unkown
page execute read
1956E04F000
trusted library allocation
page read and write
19561467000
heap
page read and write
19576501000
heap
page read and write
19561428000
heap
page read and write
1956B585000
trusted library allocation
page read and write
1956A3A4000
trusted library allocation
page read and write
1956A66C000
trusted library allocation
page read and write
F72337E000
stack
page read and write
195728AA000
trusted library allocation
page read and write
1956AD30000
trusted library allocation
page read and write
1956BBDA000
trusted library allocation
page read and write
1956E1C5000
trusted library allocation
page read and write
6F07BFE000
stack
page read and write
19573894000
trusted library allocation
page read and write
195739A5000
trusted library allocation
page read and write
1956142B000
heap
page read and write
1956B49E000
trusted library allocation
page read and write
1956BD34000
trusted library allocation
page read and write
1957626A000
trusted library allocation
page read and write
19575845000
trusted library allocation
page read and write
1956CA42000
trusted library allocation
page read and write
1956C0FD000
trusted library allocation
page read and write
1957656A000
heap
page read and write
1956C2F1000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
1956BBEA000
trusted library allocation
page read and write
19573974000
trusted library allocation
page read and write
195613FE000
heap
page read and write
253BE16A000
heap
page read and write
19573DC0000
trusted library allocation
page read and write
1956BEEE000
trusted library allocation
page read and write
1956BFBA000
trusted library allocation
page read and write
253BD3D0000
trusted library allocation
page read and write
1EECD1C0000
heap
page read and write
19572AB0000
trusted library allocation
page read and write
1956BEE6000
trusted library allocation
page read and write
19573877000
trusted library allocation
page read and write
195738A5000
trusted library allocation
page read and write
19561408000
heap
page read and write
1956C043000
trusted library allocation
page read and write
253BD49F000
trusted library allocation
page read and write
1956142C000
heap
page read and write
19574276000
trusted library allocation
page read and write
19573E0C000
trusted library allocation
page read and write
1956A17F000
trusted library allocation
page read and write
B14000
heap
page read and write
19567781000
trusted library allocation
page read and write
195677C4000
trusted library allocation
page read and write
1EECD1E0000
heap
page read and write
19568CF4000
trusted library allocation
page read and write
19574052000
trusted library allocation
page read and write
1956142C000
heap
page read and write
1956BA0A000
trusted library allocation
page read and write
19575980000
trusted library allocation
page read and write
1956B444000
trusted library allocation
page read and write
195728DD000
trusted library allocation
page read and write
253BD462000
trusted library allocation
page read and write
1956D8A9000
trusted library allocation
page read and write
195677BC000
trusted library allocation
page read and write
19573ECF000
trusted library allocation
page read and write
33A88DF1E000
trusted library allocation
page read and write
1956ACAC000
trusted library allocation
page read and write
1956B8E8000
trusted library allocation
page read and write
1956A15B000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956BD48000
trusted library allocation
page read and write
1956140D000
heap
page read and write
195728B3000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956D9F2000
trusted library allocation
page read and write
195738A3000
trusted library allocation
page read and write
1956BEFE000
trusted library allocation
page read and write
195728FB000
trusted library allocation
page read and write
1956140D000
heap
page read and write
19574B59000
trusted library allocation
page read and write
1956C256000
trusted library allocation
page read and write
1956E3D6000
trusted library allocation
page read and write
19561431000
heap
page read and write
19567597000
trusted library allocation
page read and write
1956DD9D000
trusted library allocation
page read and write
19561449000
heap
page read and write
1956CE26000
trusted library allocation
page read and write
1956E1F7000
trusted library allocation
page read and write
1956145C000
heap
page read and write
19573471000
trusted library allocation
page read and write
19566376000
trusted library allocation
page read and write
19567DE8000
heap
page read and write
19561445000
heap
page read and write
19561459000
heap
page read and write
195613E6000
heap
page read and write
1956BFCF000
trusted library allocation
page read and write
1956C0FD000
trusted library allocation
page read and write
1956E3F5000
trusted library allocation
page read and write
1956A4A2000
trusted library allocation
page read and write
1956CE9C000
trusted library allocation
page read and write
1956C4BD000
trusted library allocation
page read and write
1956B56E000
trusted library allocation
page read and write
195727A3000
trusted library allocation
page read and write
1956C480000
trusted library allocation
page read and write
19561446000
heap
page read and write
1956DDD0000
trusted library allocation
page read and write
1956142C000
heap
page read and write
1956B5C2000
trusted library allocation
page read and write
1956BBCD000
trusted library allocation
page read and write
1956D9C1000
trusted library allocation
page read and write
195738BC000
trusted library allocation
page read and write
19573892000
trusted library allocation
page read and write
1956E3F3000
trusted library allocation
page read and write
19574A96000
trusted library allocation
page read and write
1956E182000
trusted library allocation
page read and write
1956BA3D000
trusted library allocation
page read and write
19561449000
heap
page read and write
1957386B000
trusted library allocation
page read and write
19573E2C000
trusted library allocation
page read and write
1956BA3A000
trusted library allocation
page read and write
1956B77B000
trusted library allocation
page read and write
195613FE000
heap
page read and write
1956B8C5000
trusted library allocation
page read and write
19572A52000
trusted library allocation
page read and write
1956C0F6000
trusted library allocation
page read and write
1956A3A4000
trusted library allocation
page read and write
1956BBAB000
trusted library allocation
page read and write
98769FE000
stack
page read and write
1956A3A4000
trusted library allocation
page read and write
19561433000
heap
page read and write
1957277F000
trusted library allocation
page read and write
1956B5E4000
trusted library allocation
page read and write
19567DAB000
heap
page read and write
1956A3CD000
trusted library allocation
page read and write
195728C8000
trusted library allocation
page read and write
1956DDC2000
trusted library allocation
page read and write
19568C61000
trusted library allocation
page read and write
1956BD61000
trusted library allocation
page read and write
1956A484000
trusted library allocation
page read and write
1956BF14000
trusted library allocation
page read and write
1956A4D6000
trusted library allocation
page read and write
19561410000
heap
page read and write
1956143F000
heap
page read and write
1956E2DF000
trusted library allocation
page read and write
19561449000
heap
page read and write
1956C2FC000
trusted library allocation
page read and write
19566413000
trusted library allocation
page read and write
1EECD200000
trusted library allocation
page read and write
1956BBDC000
trusted library allocation
page read and write
1956BA6B000
trusted library allocation
page read and write
19561449000
heap
page read and write
1956C2BC000
trusted library allocation
page read and write
195613E6000
heap
page read and write
1956C26F000
trusted library allocation
page read and write
253BDB98000
heap
page read and write
19561443000
heap
page read and write
1956A100000
trusted library allocation
page read and write
1956E1F7000
trusted library allocation
page read and write
19567D93000
heap
page read and write
1956B8AF000
trusted library allocation
page read and write
195613DF000
heap
page read and write
1956A4D6000
trusted library allocation
page read and write
253BDAB9000
heap
page read and write
195613DF000
heap
page read and write
B14000
heap
page read and write
253BDB91000
heap
page read and write
1956C0D4000
trusted library allocation
page read and write
1956BBBC000
trusted library allocation
page read and write
1956143B000
heap
page read and write
253BD4BC000
trusted library allocation
page read and write
1956D8BE000
trusted library allocation
page read and write
19561428000
heap
page read and write
19567DAA000
heap
page read and write
195739F7000
trusted library allocation
page read and write
1956C9B6000
trusted library allocation
page read and write
1956E1CD000
trusted library allocation
page read and write
1956C441000
trusted library allocation
page read and write
19561431000
heap
page read and write
C4C000
heap
page read and write
1956DD66000
trusted library allocation
page read and write
195728C9000
trusted library allocation
page read and write
253BE158000
heap
page read and write
1956C0A5000
trusted library allocation
page read and write
1956C0AE000
trusted library allocation
page read and write
1956DDBF000
trusted library allocation
page read and write
1956C333000
trusted library allocation
page read and write
195758B4000
trusted library allocation
page read and write
1956BD99000
trusted library allocation
page read and write
195728DD000
trusted library allocation
page read and write
195727D4000
trusted library allocation
page read and write
195728B1000
trusted library allocation
page read and write
1956144E000
heap
page read and write
253BDB98000
heap
page read and write
1956A1C2000
trusted library allocation
page read and write
19567822000
trusted library allocation
page read and write
1956ADF7000
trusted library allocation
page read and write
1EECD30C000
trusted library allocation
page read and write
195613E0000
heap
page read and write
1956E346000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956143B000
heap
page read and write
1956C05B000
trusted library allocation
page read and write
19561417000
heap
page read and write
19576545000
heap
page read and write
1956E179000
trusted library allocation
page read and write
1956B5FA000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
1956D9C1000
trusted library allocation
page read and write
19574227000
trusted library allocation
page read and write
1956143D000
heap
page read and write
19561461000
heap
page read and write
1956C0A5000
trusted library allocation
page read and write
1956DD5A000
trusted library allocation
page read and write
1956A4B8000
trusted library allocation
page read and write
1956E191000
trusted library allocation
page read and write
1956C3AF000
trusted library allocation
page read and write
19573972000
trusted library allocation
page read and write
1956E118000
trusted library allocation
page read and write
1956C2B8000
trusted library allocation
page read and write
1956B4AB000
trusted library allocation
page read and write
19574B59000
trusted library allocation
page read and write
1956D9B9000
trusted library allocation
page read and write
195728B1000
trusted library allocation
page read and write
195728F7000
trusted library allocation
page read and write
19574231000
trusted library allocation
page read and write
1956142C000
heap
page read and write
19573987000
trusted library allocation
page read and write
1956A367000
trusted library allocation
page read and write
253BE16A000
heap
page read and write
19561433000
heap
page read and write
253BDBAD000
heap
page read and write
19575867000
trusted library allocation
page read and write
195613DF000
heap
page read and write
195613F0000
heap
page read and write
1956A45D000
trusted library allocation
page read and write
1956BBA0000
trusted library allocation
page read and write
27EDEB07000
trusted library allocation
page read and write
195728EE000
trusted library allocation
page read and write
195613FE000
heap
page read and write
1956C7F2000
trusted library allocation
page read and write
1956DDE2000
trusted library allocation
page read and write
1956CA88000
trusted library allocation
page read and write
195734CF000
trusted library allocation
page read and write
19561453000
heap
page read and write
181F000
stack
page read and write
19575F4B000
trusted library allocation
page read and write
1956B8FA000
trusted library allocation
page read and write
1956BB02000
trusted library allocation
page read and write
19575842000
trusted library allocation
page read and write
1956A712000
trusted library allocation
page read and write
1956E2D7000
trusted library allocation
page read and write
1956A1C8000
trusted library allocation
page read and write
1956B56B000
trusted library allocation
page read and write
195728C8000
trusted library allocation
page read and write
1956E37F000
trusted library allocation
page read and write
1956C4A6000
trusted library allocation
page read and write
1956BA29000
trusted library allocation
page read and write
1956C2F1000
trusted library allocation
page read and write
1957409F000
trusted library allocation
page read and write
19573808000
trusted library allocation
page read and write
23ECD107000
trusted library allocation
page read and write
253BE177000
heap
page read and write
1956E2D6000
trusted library allocation
page read and write
19572A7A000
trusted library allocation
page read and write
12C000
unkown
page read and write
19561417000
heap
page read and write
253BD45F000
trusted library allocation
page read and write
19574C24000
trusted library allocation
page read and write
1956C0FC000
trusted library allocation
page read and write
19561448000
heap
page read and write
1956DF95000
trusted library allocation
page read and write
C58000
heap
page read and write
1956E3F3000
trusted library allocation
page read and write
1956BA92000
trusted library allocation
page read and write
1956A1C2000
trusted library allocation
page read and write
19561428000
heap
page read and write
195613FF000
heap
page read and write
1956C093000
trusted library allocation
page read and write
19574219000
trusted library allocation
page read and write
253BE16A000
heap
page read and write
19561461000
heap
page read and write
19567DE8000
heap
page read and write
C58000
heap
page read and write
1956C07B000
trusted library allocation
page read and write
1956C0EC000
trusted library allocation
page read and write
1956B4DE000
trusted library allocation
page read and write
1956E1E1000
trusted library allocation
page read and write
1956143B000
heap
page read and write
19576261000
trusted library allocation
page read and write
1956B71A000
trusted library allocation
page read and write
19561408000
heap
page read and write
19567D84000
heap
page read and write
195738B1000
trusted library allocation
page read and write
195613FF000
heap
page read and write
19572A63000
trusted library allocation
page read and write
1956E187000
trusted library allocation
page read and write
195728AD000
trusted library allocation
page read and write
9CE000
stack
page read and write
19572795000
trusted library allocation
page read and write
1956C0FB000
trusted library allocation
page read and write
195613F5000
heap
page read and write
19573EF1000
trusted library allocation
page read and write
1956B74F000
trusted library allocation
page read and write
1956A4CC000
trusted library allocation
page read and write
23ECEA88000
heap
page read and write
1956CEC6000
trusted library allocation
page read and write
1956B410000
trusted library allocation
page read and write
195728C3000
trusted library allocation
page read and write
1956BD2E000
trusted library allocation
page read and write
19576501000
heap
page read and write
19561443000
heap
page read and write
1956C3F9000
trusted library allocation
page read and write
19573879000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956A446000
trusted library allocation
page read and write
1956BFDB000
trusted library allocation
page read and write
195613EE000
heap
page read and write
195613E6000
heap
page read and write
195613FA000
heap
page read and write
1956C494000
trusted library allocation
page read and write
19573EC7000
trusted library allocation
page read and write
1956DF99000
trusted library allocation
page read and write
195613E6000
heap
page read and write
19573818000
trusted library allocation
page read and write
19575F85000
trusted library allocation
page read and write
195738D9000
trusted library allocation
page read and write
195728EC000
trusted library allocation
page read and write
1956BA29000
trusted library allocation
page read and write
19572AE7000
trusted library allocation
page read and write
195728C4000
trusted library allocation
page read and write
195613F5000
heap
page read and write
195613EF000
heap
page read and write
1956CA84000
trusted library allocation
page read and write
1956C252000
trusted library allocation
page read and write
1956BFD7000
trusted library allocation
page read and write
1956BABE000
trusted library allocation
page read and write
1956C0C9000
trusted library allocation
page read and write
19574BFC000
trusted library allocation
page read and write
19572814000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956C31F000
trusted library allocation
page read and write
1956BE7D000
trusted library allocation
page read and write
1956AD4D000
trusted library allocation
page read and write
253BDB96000
heap
page read and write
1956BDA3000
trusted library allocation
page read and write
1956B76A000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
1956CAE3000
trusted library allocation
page read and write
1956B7D5000
trusted library allocation
page read and write
1EECD500000
unclassified section
page readonly
19565DC2000
trusted library allocation
page read and write
1956DC67000
trusted library allocation
page read and write
98759D8000
stack
page read and write
1956143B000
heap
page read and write
195728C0000
trusted library allocation
page read and write
1956773D000
trusted library allocation
page read and write
195664BA000
trusted library allocation
page read and write
19574AFC000
trusted library allocation
page read and write
1EECD3C4000
trusted library allocation
page read and write
1956AD25000
trusted library allocation
page read and write
1956D965000
trusted library allocation
page read and write
19572A8A000
trusted library allocation
page read and write
1956E11F000
trusted library allocation
page read and write
195675D4000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956CEE1000
trusted library allocation
page read and write
1956C06D000
trusted library allocation
page read and write
1956DDBF000
trusted library allocation
page read and write
1956BA47000
trusted library allocation
page read and write
19561446000
heap
page read and write
1956A1D8000
trusted library allocation
page read and write
1956B4A2000
trusted library allocation
page read and write
1956C898000
trusted library allocation
page read and write
1956C0B4000
trusted library allocation
page read and write
1956C089000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
19572A5A000
trusted library allocation
page read and write
1956BF45000
trusted library allocation
page read and write
1956C3DB000
trusted library allocation
page read and write
1956C010000
trusted library allocation
page read and write
1956C0A3000
trusted library allocation
page read and write
195677C7000
trusted library allocation
page read and write
1956C20B000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956B764000
trusted library allocation
page read and write
1956143F000
heap
page read and write
1956C0B4000
trusted library allocation
page read and write
1956DD8F000
trusted library allocation
page read and write
253BD1B0000
heap
page read and write
19568CF7000
trusted library allocation
page read and write
19575D4E000
trusted library allocation
page read and write
1956BA9B000
trusted library allocation
page read and write
19575F77000
trusted library allocation
page read and write
195613F9000
heap
page read and write
1956C0F8000
trusted library allocation
page read and write
1956C252000
trusted library allocation
page read and write
1956143B000
heap
page read and write
195675DE000
trusted library allocation
page read and write
1956C222000
trusted library allocation
page read and write
1956C0EF000
trusted library allocation
page read and write
19573931000
trusted library allocation
page read and write
19561466000
heap
page read and write
1956E1D3000
trusted library allocation
page read and write
19573872000
trusted library allocation
page read and write
1956DDDB000
trusted library allocation
page read and write
1956BB9A000
trusted library allocation
page read and write
1956D9C9000
trusted library allocation
page read and write
19576204000
trusted library allocation
page read and write
1956C9C2000
trusted library allocation
page read and write
1956C3BD000
trusted library allocation
page read and write
292935A4000
heap
page read and write
19567B60000
trusted library allocation
page read and write
19567DA3000
heap
page read and write
195742B7000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956C0D4000
trusted library allocation
page read and write
1956DCAE000
trusted library allocation
page read and write
195728F6000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
1EECCFD0000
unclassified section
page readonly
1956E1F7000
trusted library allocation
page read and write
1956C9C2000
trusted library allocation
page read and write
1956C290000
trusted library allocation
page read and write
195728E0000
trusted library allocation
page read and write
195742CE000
trusted library allocation
page read and write
1956BEC4000
trusted library allocation
page read and write
19573981000
trusted library allocation
page read and write
195613E6000
heap
page read and write
1956BD0B000
trusted library allocation
page read and write
19572AF6000
trusted library allocation
page read and write
1956C0A5000
trusted library allocation
page read and write
195728A3000
trusted library allocation
page read and write
1956C0EF000
trusted library allocation
page read and write
195613E7000
heap
page read and write
195613FF000
heap
page read and write
19567BC8000
trusted library allocation
page read and write
19572A99000
trusted library allocation
page read and write
1956C0A3000
trusted library allocation
page read and write
C53000
heap
page read and write
1EECD349000
trusted library allocation
page read and write
19574B66000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956143B000
heap
page read and write
19561428000
heap
page read and write
19561428000
heap
page read and write
253BDB10000
heap
page read and write
1956C0EF000
trusted library allocation
page read and write
19561458000
heap
page read and write
19561417000
heap
page read and write
195728CF000
trusted library allocation
page read and write
1956B8CF000
trusted library allocation
page read and write
253BD980000
heap
page read and write
1956E122000
trusted library allocation
page read and write
1956A49D000
trusted library allocation
page read and write
1956B4C5000
trusted library allocation
page read and write
1956C427000
trusted library allocation
page read and write
19573F8C000
trusted library allocation
page read and write
1957284E000
trusted library allocation
page read and write
1956A1C2000
trusted library allocation
page read and write
19561417000
heap
page read and write
19574286000
trusted library allocation
page read and write
19572A63000
trusted library allocation
page read and write
1956A3CD000
trusted library allocation
page read and write
1956E299000
trusted library allocation
page read and write
195613FE000
heap
page read and write
29293270000
heap
page read and write
1956A177000
trusted library allocation
page read and write
1956E3FE000
trusted library allocation
page read and write
1956B5AF000
trusted library allocation
page read and write
FC000
unkown
page readonly
1956C064000
trusted library allocation
page read and write
1956E0D1000
trusted library allocation
page read and write
19573972000
trusted library allocation
page read and write
1956A39D000
trusted library allocation
page read and write
1956C298000
trusted library allocation
page read and write
1956BE9C000
trusted library allocation
page read and write
1956DDEB000
trusted library allocation
page read and write
195675DE000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956CA4D000
trusted library allocation
page read and write
19573E13000
trusted library allocation
page read and write
1956C461000
trusted library allocation
page read and write
1956C4ED000
trusted library allocation
page read and write
19561449000
heap
page read and write
29293600000
trusted library allocation
page read and write
195613F8000
heap
page read and write
19561428000
heap
page read and write
1956CA48000
trusted library allocation
page read and write
19561457000
heap
page read and write
19573DCB000
trusted library allocation
page read and write
19561458000
heap
page read and write
1956C484000
trusted library allocation
page read and write
1956CA7C000
trusted library allocation
page read and write
1956D9B2000
trusted library allocation
page read and write
1956B56E000
trusted library allocation
page read and write
9877B3E000
stack
page read and write
1956A4B1000
trusted library allocation
page read and write
1956C3CC000
trusted library allocation
page read and write
1EECD01A000
heap
page read and write
195613EF000
heap
page read and write
253BE121000
heap
page read and write
19572AFE000
trusted library allocation
page read and write
1956E179000
trusted library allocation
page read and write
1956DABE000
trusted library allocation
page read and write
19561410000
heap
page read and write
1956C6BF000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956BEFE000
trusted library allocation
page read and write
1956DDEF000
trusted library allocation
page read and write
195674EE000
trusted library allocation
page read and write
1956ADF0000
trusted library allocation
page read and write
1956A88E000
trusted library allocation
page read and write
1956BA47000
trusted library allocation
page read and write
19573836000
trusted library allocation
page read and write
1956BAAE000
trusted library allocation
page read and write
1956C69C000
trusted library allocation
page read and write
1956C4C7000
trusted library allocation
page read and write
1956C83E000
trusted library allocation
page read and write
1956D91E000
trusted library allocation
page read and write
195738BC000
trusted library allocation
page read and write
19561431000
heap
page read and write
1956BD32000
trusted library allocation
page read and write
19567DA3000
heap
page read and write
1956142C000
heap
page read and write
195738B8000
trusted library allocation
page read and write
1956C06B000
trusted library allocation
page read and write
195613F9000
heap
page read and write
1956C2FE000
trusted library allocation
page read and write
1956A18D000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956142C000
heap
page read and write
19561441000
heap
page read and write
1956A452000
trusted library allocation
page read and write
19567BCE000
trusted library allocation
page read and write
1956BF7B000
trusted library allocation
page read and write
1956DD5C000
trusted library allocation
page read and write
1956BB05000
trusted library allocation
page read and write
1956C0FB000
trusted library allocation
page read and write
1956A191000
trusted library allocation
page read and write
C43000
heap
page read and write
195739FC000
trusted library allocation
page read and write
1956BF64000
trusted library allocation
page read and write
195738B8000
trusted library allocation
page read and write
1956C089000
trusted library allocation
page read and write
1957396A000
trusted library allocation
page read and write
1956A879000
trusted library allocation
page read and write
19573987000
trusted library allocation
page read and write
19572AA6000
trusted library allocation
page read and write
19575F88000
trusted library allocation
page read and write
1956E19A000
trusted library allocation
page read and write
1956B583000
trusted library allocation
page read and write
19573843000
trusted library allocation
page read and write
1956C4D2000
trusted library allocation
page read and write
1956A4A2000
trusted library allocation
page read and write
1956CA84000
trusted library allocation
page read and write
1956A4FE000
trusted library allocation
page read and write
1956E2EA000
trusted library allocation
page read and write
1957382F000
trusted library allocation
page read and write
1956145B000
heap
page read and write
253BD0AA000
heap
page read and write
60000
unkown
page readonly
1956C4CC000
trusted library allocation
page read and write
1956DD62000
trusted library allocation
page read and write
1956E1D5000
trusted library allocation
page read and write
195728FB000
trusted library allocation
page read and write
195734FE000
trusted library allocation
page read and write
60000
unkown
page readonly
1956A39D000
trusted library allocation
page read and write
1956CECB000
trusted library allocation
page read and write
1956E293000
trusted library allocation
page read and write
1956BF82000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956BF25000
trusted library allocation
page read and write
1956646A000
trusted library allocation
page read and write
1956778F000
trusted library allocation
page read and write
19573EF9000
trusted library allocation
page read and write
19561439000
heap
page read and write
195613F9000
heap
page read and write
195738B8000
trusted library allocation
page read and write
19573EBD000
trusted library allocation
page read and write
1956C0C3000
trusted library allocation
page read and write
195613F0000
heap
page read and write
19567DA9000
heap
page read and write
195675F8000
trusted library allocation
page read and write
1956142C000
heap
page read and write
195613EF000
heap
page read and write
1956BB94000
trusted library allocation
page read and write
23ECEA8C000
heap
page read and write
1956C089000
trusted library allocation
page read and write
19561438000
heap
page read and write
195613F5000
heap
page read and write
19561417000
heap
page read and write
1956C0D7000
trusted library allocation
page read and write
1956C082000
trusted library allocation
page read and write
1956C3D6000
trusted library allocation
page read and write
19561428000
heap
page read and write
F722ABE000
stack
page read and write
19561467000
heap
page read and write
195728D4000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1957279D000
trusted library allocation
page read and write
1956BA39000
trusted library allocation
page read and write
1956C280000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956BACC000
trusted library allocation
page read and write
19574C04000
trusted library allocation
page read and write
1956BD47000
trusted library allocation
page read and write
253BDB19000
heap
page read and write
1956C3C6000
trusted library allocation
page read and write
1956C252000
trusted library allocation
page read and write
19573463000
trusted library allocation
page read and write
1956A896000
trusted library allocation
page read and write
1956A86B000
trusted library allocation
page read and write
1956B8E5000
trusted library allocation
page read and write
19576536000
heap
page read and write
1956AD4D000
trusted library allocation
page read and write
19576547000
heap
page read and write
1956DF29000
trusted library allocation
page read and write
29293481000
trusted library allocation
page read and write
1EECD093000
heap
page read and write
1956A364000
trusted library allocation
page read and write
19568CE0000
trusted library allocation
page read and write
1956E1D3000
trusted library allocation
page read and write
8CC6BE1000
trusted library allocation
page execute read
195613E0000
heap
page read and write
253BE177000
heap
page read and write
1956C2BB000
trusted library allocation
page read and write
1956ADAB000
trusted library allocation
page read and write
1956C089000
trusted library allocation
page read and write
1956E3E4000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956BA44000
trusted library allocation
page read and write
1956A4D3000
trusted library allocation
page read and write
1956143B000
heap
page read and write
19561428000
heap
page read and write
1956143D000
heap
page read and write
1956C316000
trusted library allocation
page read and write
1EECD376000
trusted library allocation
page read and write
1956AD6C000
trusted library allocation
page read and write
1956BA1B000
trusted library allocation
page read and write
1956A34A000
trusted library allocation
page read and write
C53000
heap
page read and write
19561417000
heap
page read and write
19573DA7000
trusted library allocation
page read and write
19575854000
trusted library allocation
page read and write
1956A1D2000
trusted library allocation
page read and write
19567741000
trusted library allocation
page read and write
1EECD070000
heap
page read and write
1956CEFB000
trusted library allocation
page read and write
1957426B000
trusted library allocation
page read and write
19572A9F000
trusted library allocation
page read and write
1956BE85000
trusted library allocation
page read and write
195613F8000
heap
page read and write
1956C8A7000
trusted library allocation
page read and write
1957382D000
trusted library allocation
page read and write
1956A862000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956CAF0000
trusted library allocation
page read and write
1956BAF9000
trusted library allocation
page read and write
29293213000
heap
page read and write
1956A369000
trusted library allocation
page read and write
1956C0D7000
trusted library allocation
page read and write
1956BA47000
trusted library allocation
page read and write
1956E2F2000
trusted library allocation
page read and write
1956E1D8000
trusted library allocation
page read and write
1956BF55000
trusted library allocation
page read and write
1956BAF0000
trusted library allocation
page read and write
61000
unkown
page execute read
1956A4A9000
trusted library allocation
page read and write
1956BD25000
trusted library allocation
page read and write
1956A1EE000
trusted library allocation
page read and write
19573856000
trusted library allocation
page read and write
19572A78000
trusted library allocation
page read and write
1956CADA000
trusted library allocation
page read and write
1956BECB000
trusted library allocation
page read and write
19573856000
trusted library allocation
page read and write
195677DC000
trusted library allocation
page read and write
19561428000
heap
page read and write
195739F5000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956632F000
trusted library allocation
page read and write
1956B478000
trusted library allocation
page read and write
195739A1000
trusted library allocation
page read and write
1956C06B000
trusted library allocation
page read and write
27EDE910000
heap
page read and write
19561402000
heap
page read and write
253BE121000
heap
page read and write
19573DCE000
trusted library allocation
page read and write
253BE13B000
heap
page read and write
19575F85000
trusted library allocation
page read and write
1957655C000
heap
page read and write
1956C2F1000
trusted library allocation
page read and write
C55000
heap
page read and write
19573877000
trusted library allocation
page read and write
1956779A000
trusted library allocation
page read and write
1956C4CC000
trusted library allocation
page read and write
1956B573000
trusted library allocation
page read and write
1956C2BC000
trusted library allocation
page read and write
1956C064000
trusted library allocation
page read and write
1956DA71000
trusted library allocation
page read and write
1956B56E000
trusted library allocation
page read and write
1956E18D000
trusted library allocation
page read and write
1956D9FA000
trusted library allocation
page read and write
1956A4CB000
trusted library allocation
page read and write
292930E0000
heap
page read and write
195677F8000
trusted library allocation
page read and write
1956C99C000
trusted library allocation
page read and write
1956BBF1000
trusted library allocation
page read and write
1956B731000
trusted library allocation
page read and write
1956C0F8000
trusted library allocation
page read and write
195613FA000
heap
page read and write
1956BF0B000
trusted library allocation
page read and write
1956A4A9000
trusted library allocation
page read and write
1956E3D9000
trusted library allocation
page read and write
1956A39D000
trusted library allocation
page read and write
1956BF47000
trusted library allocation
page read and write
1956C086000
trusted library allocation
page read and write
1956E359000
trusted library allocation
page read and write
1956D92E000
trusted library allocation
page read and write
1957278D000
trusted library allocation
page read and write
1956C6AD000
trusted library allocation
page read and write
1956E3D9000
trusted library allocation
page read and write
1956C2B8000
trusted library allocation
page read and write
1956C0FC000
trusted library allocation
page read and write
292935A0000
heap
page read and write
19561428000
heap
page read and write
1957383E000
trusted library allocation
page read and write
253BDB10000
heap
page read and write
1956A4D6000
trusted library allocation
page read and write
1956A4FE000
trusted library allocation
page read and write
1956BD25000
trusted library allocation
page read and write
19561458000
heap
page read and write
1956A389000
trusted library allocation
page read and write
19561428000
heap
page read and write
FC000
unkown
page readonly
1956C0F1000
trusted library allocation
page read and write
253BD4C7000
trusted library allocation
page read and write
1956DDB3000
trusted library allocation
page read and write
19561453000
heap
page read and write
195739FD000
trusted library allocation
page read and write
1956BBE2000
trusted library allocation
page read and write
1956C0C9000
trusted library allocation
page read and write
195613F6000
heap
page read and write
1957396A000
trusted library allocation
page read and write
1956C4F4000
trusted library allocation
page read and write
19567D84000
heap
page read and write
27EDE919000
heap
page read and write
1956B8D1000
trusted library allocation
page read and write
253BE158000
heap
page read and write
1956B4ED000
trusted library allocation
page read and write
19575F4B000
trusted library allocation
page read and write
1956B787000
trusted library allocation
page read and write
1956B577000
trusted library allocation
page read and write
1EECD010000
heap
page read and write
19561402000
heap
page read and write
1956CA91000
trusted library allocation
page read and write
195675DE000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
1956A39D000
trusted library allocation
page read and write
1956C0F8000
trusted library allocation
page read and write
1956C099000
trusted library allocation
page read and write
1956BD8E000
trusted library allocation
page read and write
8CC6BF1000
trusted library allocation
page execute read
1956C3F4000
trusted library allocation
page read and write
1956A882000
trusted library allocation
page read and write
1956E141000
trusted library allocation
page read and write
1956A38D000
trusted library allocation
page read and write
19574C01000
trusted library allocation
page read and write
195738E9000
trusted library allocation
page read and write
19574B5C000
trusted library allocation
page read and write
1956A4CE000
trusted library allocation
page read and write
1956BA0F000
trusted library allocation
page read and write
1956ADB7000
trusted library allocation
page read and write
E899BFD000
stack
page read and write
1956ADC4000
trusted library allocation
page read and write
19561417000
heap
page read and write
19561428000
heap
page read and write
19574B27000
trusted library allocation
page read and write
27EDECE0000
heap
page read and write
ADD000
stack
page read and write
1956D9E2000
trusted library allocation
page read and write
19561454000
heap
page read and write
1956C232000
trusted library allocation
page read and write
1956C9CE000
trusted library allocation
page read and write
1956142C000
heap
page read and write
19561453000
heap
page read and write
19575F9A000
trusted library allocation
page read and write
195677A1000
trusted library allocation
page read and write
19561467000
heap
page read and write
1956A4B8000
trusted library allocation
page read and write
1956A3A4000
trusted library allocation
page read and write
195613EF000
heap
page read and write
19574202000
trusted library allocation
page read and write
19574BB4000
trusted library allocation
page read and write
1956B573000
trusted library allocation
page read and write
1956142C000
heap
page read and write
AE0000
heap
page read and write
1956143B000
heap
page read and write
1956C06B000
trusted library allocation
page read and write
1956BFCF000
trusted library allocation
page read and write
195613E6000
heap
page read and write
19561449000
heap
page read and write
1956BDB6000
trusted library allocation
page read and write
19573827000
trusted library allocation
page read and write
1956C274000
trusted library allocation
page read and write
19573928000
trusted library allocation
page read and write
19573D70000
trusted library allocation
page read and write
19575853000
trusted library allocation
page read and write
1956C031000
trusted library allocation
page read and write
195613ED000
heap
page read and write
19575F81000
trusted library allocation
page read and write
1956C45E000
trusted library allocation
page read and write
19572A9B000
trusted library allocation
page read and write
19567743000
trusted library allocation
page read and write
1956C0F6000
trusted library allocation
page read and write
19565D81000
trusted library allocation
page read and write
1957382A000
trusted library allocation
page read and write
1956C1E3000
trusted library allocation
page read and write
1956C2FC000
trusted library allocation
page read and write
1956E0A7000
trusted library allocation
page read and write
195738DC000
trusted library allocation
page read and write
1956E2D7000
trusted library allocation
page read and write
19573972000
trusted library allocation
page read and write
1956BFD7000
trusted library allocation
page read and write
1956C4C0000
trusted library allocation
page read and write
195738B1000
trusted library allocation
page read and write
19567DA3000
heap
page read and write
1956D967000
trusted library allocation
page read and write
1956A360000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1956BE81000
trusted library allocation
page read and write
1956DDEF000
trusted library allocation
page read and write
1956C437000
trusted library allocation
page read and write
1956B569000
trusted library allocation
page read and write
19561417000
heap
page read and write
1956DFD1000
trusted library allocation
page read and write
1956C9E2000
trusted library allocation
page read and write
19561408000
heap
page read and write
1956A385000
trusted library allocation
page read and write
1956BB94000
trusted library allocation
page read and write
1956144E000
heap
page read and write
195740D5000
trusted library allocation
page read and write
1956BEC4000
trusted library allocation
page read and write
1956B43B000
trusted library allocation
page read and write
23ECCFDD000
heap
page read and write
1956C089000
trusted library allocation
page read and write
1956C439000
trusted library allocation
page read and write
19573856000
trusted library allocation
page read and write
9878B3E000
stack
page read and write
1957400C000
trusted library allocation
page read and write
19561445000
heap
page read and write
195613E6000
heap
page read and write
1956BEAE000
trusted library allocation
page read and write
19574B89000
trusted library allocation
page read and write
1956A3A4000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956BEEB000
trusted library allocation
page read and write
34D1000
heap
page read and write
19561433000
heap
page read and write
23ECCFF2000
heap
page read and write
1956A4AD000
trusted library allocation
page read and write
1956C4D6000
trusted library allocation
page read and write
1956C071000
trusted library allocation
page read and write
195728E0000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956E09C000
trusted library allocation
page read and write
1956BD75000
trusted library allocation
page read and write
23ECCE70000
heap
page read and write
34D1000
heap
page read and write
19573DE4000
trusted library allocation
page read and write
9874FCE000
stack
page read and write
1956C8B6000
trusted library allocation
page read and write
195728EC000
trusted library allocation
page read and write
19574AFC000
trusted library allocation
page read and write
19572A9D000
trusted library allocation
page read and write
19561453000
heap
page read and write
1956C0D7000
trusted library allocation
page read and write
1956E179000
trusted library allocation
page read and write
1956BED7000
trusted library allocation
page read and write
1956C082000
trusted library allocation
page read and write
1956BD4E000
trusted library allocation
page read and write
1956A4CC000
trusted library allocation
page read and write
1957382F000
trusted library allocation
page read and write
19573832000
trusted library allocation
page read and write
1956DAD5000
trusted library allocation
page read and write
195613F6000
heap
page read and write
1956B7A3000
trusted library allocation
page read and write
1956CEF7000
trusted library allocation
page read and write
1956C9B6000
trusted library allocation
page read and write
1956BBF2000
trusted library allocation
page read and write
1956A4BE000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956143F000
heap
page read and write
1956A4FE000
trusted library allocation
page read and write
1956C0A5000
trusted library allocation
page read and write
1956C2A6000
trusted library allocation
page read and write
19561433000
heap
page read and write
1EECD603000
trusted library allocation
page read and write
19561431000
heap
page read and write
29293400000
trusted library allocation
page read and write
29293461000
trusted library allocation
page read and write
1956DD66000
trusted library allocation
page read and write
1956C0E3000
trusted library allocation
page read and write
19568C33000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
1956DD91000
trusted library allocation
page read and write
19572A5E000
trusted library allocation
page read and write
1956E293000
trusted library allocation
page read and write
19561438000
heap
page read and write
19561428000
heap
page read and write
195613F7000
heap
page read and write
27EDEA00000
trusted library allocation
page read and write
1956C20B000
trusted library allocation
page read and write
1956A7B1000
trusted library allocation
page read and write
195613E6000
heap
page read and write
6F0616E000
unkown
page readonly
1956C278000
trusted library allocation
page read and write
1956BF6F000
trusted library allocation
page read and write
195758A8000
trusted library allocation
page read and write
195664E4000
trusted library allocation
page read and write
19561428000
heap
page read and write
19572A5F000
trusted library allocation
page read and write
1956A3CD000
trusted library allocation
page read and write
253BE177000
heap
page read and write
1956C0EF000
trusted library allocation
page read and write
195613EF000
heap
page read and write
19574211000
trusted library allocation
page read and write
1956B5C0000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
19561428000
heap
page read and write
1956A35B000
trusted library allocation
page read and write
1956C06B000
trusted library allocation
page read and write
195677A6000
trusted library allocation
page read and write
1956BDBD000
trusted library allocation
page read and write
1956DFCA000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956A469000
trusted library allocation
page read and write
1957277F000
trusted library allocation
page read and write
1956A4C5000
trusted library allocation
page read and write
1956B5F0000
trusted library allocation
page read and write
1956C0A6000
trusted library allocation
page read and write
A50000
heap
page read and write
19561428000
heap
page read and write
195613ED000
heap
page read and write
1956B5B5000
trusted library allocation
page read and write
1956A882000
trusted library allocation
page read and write
1956BFD3000
trusted library allocation
page read and write
19567D9F000
heap
page read and write
19561402000
heap
page read and write
1956A48C000
trusted library allocation
page read and write
195728AA000
trusted library allocation
page read and write
1956D9CD000
trusted library allocation
page read and write
19575FD8000
trusted library allocation
page read and write
1956BFE7000
trusted library allocation
page read and write
19561417000
heap
page read and write
134000
unkown
page readonly
1956A88E000
trusted library allocation
page read and write
1956143B000
heap
page read and write
19567BF3000
trusted library allocation
page read and write
1957289B000
trusted library allocation
page read and write
1956C082000
trusted library allocation
page read and write
1956B573000
trusted library allocation
page read and write
1957383E000
trusted library allocation
page read and write
1956C9FE000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956DDF7000
trusted library allocation
page read and write
1957284C000
trusted library allocation
page read and write
1956B811000
trusted library allocation
page read and write
19574BB1000
trusted library allocation
page read and write
C58000
heap
page read and write
1956BD25000
trusted library allocation
page read and write
19568C7C000
trusted library allocation
page read and write
1956B4B1000
trusted library allocation
page read and write
19567DB1000
heap
page read and write
1956C3DC000
trusted library allocation
page read and write
1956C099000
trusted library allocation
page read and write
1956A389000
trusted library allocation
page read and write
1956CEB0000
trusted library allocation
page read and write
19561402000
heap
page read and write
19572816000
trusted library allocation
page read and write
19567D93000
heap
page read and write
195613E0000
heap
page read and write
1956C089000
trusted library allocation
page read and write
1957386D000
trusted library allocation
page read and write
23ECEA70000
heap
page read and write
1957397E000
trusted library allocation
page read and write
19567D9F000
heap
page read and write
1956BBAD000
trusted library allocation
page read and write
1956B7D5000
trusted library allocation
page read and write
1956B787000
trusted library allocation
page read and write
253BDB3A000
heap
page read and write
1956C692000
trusted library allocation
page read and write
19561417000
heap
page read and write
C53000
heap
page read and write
1956BE4B000
trusted library allocation
page read and write
1956C471000
trusted library allocation
page read and write
1956BD30000
trusted library allocation
page read and write
195728C8000
trusted library allocation
page read and write
1956C0C0000
trusted library allocation
page read and write
19572A36000
trusted library allocation
page read and write
1956A4F9000
trusted library allocation
page read and write
253BE16A000
heap
page read and write
1956E0EE000
trusted library allocation
page read and write
1956C9E2000
trusted library allocation
page read and write
1956A373000
trusted library allocation
page read and write
1956DCA9000
trusted library allocation
page read and write
1956A3A4000
trusted library allocation
page read and write
1956BE47000
trusted library allocation
page read and write
19567835000
trusted library allocation
page read and write
29293250000
heap
page readonly
19561433000
heap
page read and write
1956CAF4000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956A13D000
trusted library allocation
page read and write
1956B4A5000
trusted library allocation
page read and write
195677BC000
trusted library allocation
page read and write
1956D95B000
trusted library allocation
page read and write
F7201D8000
stack
page read and write
1956DD71000
trusted library allocation
page read and write
1956BFD9000
trusted library allocation
page read and write
1956143D000
heap
page read and write
195728FB000
trusted library allocation
page read and write
19574286000
trusted library allocation
page read and write
195613F6000
heap
page read and write
19561458000
heap
page read and write
1956C0F6000
trusted library allocation
page read and write
195613E4000
heap
page read and write
1956641B000
trusted library allocation
page read and write
F722B7E000
unkown
page readonly
1956C433000
trusted library allocation
page read and write
19573EEF000
trusted library allocation
page read and write
1956B44F000
trusted library allocation
page read and write
1956DD97000
trusted library allocation
page read and write
19575870000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956B4ED000
trusted library allocation
page read and write
195739E7000
trusted library allocation
page read and write
F723B7E000
unkown
page readonly
19561438000
heap
page read and write
19566426000
trusted library allocation
page read and write
1956647E000
trusted library allocation
page read and write
1956E2D5000
trusted library allocation
page read and write
19576501000
heap
page read and write
1956C0FD000
trusted library allocation
page read and write
1956AD25000
trusted library allocation
page read and write
1956CB00000
trusted library allocation
page read and write
19573894000
trusted library allocation
page read and write
1956B46C000
trusted library allocation
page read and write
195613FA000
heap
page read and write
1956BF27000
trusted library allocation
page read and write
1956A4AD000
trusted library allocation
page read and write
195739C3000
trusted library allocation
page read and write
19573974000
trusted library allocation
page read and write
19576571000
heap
page read and write
19561453000
heap
page read and write
195613F6000
heap
page read and write
1956BA44000
trusted library allocation
page read and write
EFFE7FF000
stack
page read and write
19572884000
trusted library allocation
page read and write
1956DDC1000
trusted library allocation
page read and write
1956BEEB000
trusted library allocation
page read and write
1956C075000
trusted library allocation
page read and write
19567789000
trusted library allocation
page read and write
1956DFE1000
trusted library allocation
page read and write
1957277B000
trusted library allocation
page read and write
19565DEF000
trusted library allocation
page read and write
1957389F000
trusted library allocation
page read and write
19561438000
heap
page read and write
1956A1C8000
trusted library allocation
page read and write
29293632000
trusted library allocation
page read and write
19573485000
trusted library allocation
page read and write
1956143B000
heap
page read and write
195613F9000
heap
page read and write
253BDBAD000
heap
page read and write
19561428000
heap
page read and write
1956C476000
trusted library allocation
page read and write
1956C856000
trusted library allocation
page read and write
29293620000
trusted library allocation
page read and write
1956142B000
heap
page read and write
19567733000
trusted library allocation
page read and write
1956C0EF000
trusted library allocation
page read and write
1956B75D000
trusted library allocation
page read and write
1956E1C5000
trusted library allocation
page read and write
19576501000
heap
page read and write
1957285A000
trusted library allocation
page read and write
195738C8000
trusted library allocation
page read and write
1956C280000
trusted library allocation
page read and write
253BE12A000
heap
page read and write
1956D967000
trusted library allocation
page read and write
1956C476000
trusted library allocation
page read and write
1956C49E000
trusted library allocation
page read and write
19561433000
heap
page read and write
253BD448000
trusted library allocation
page read and write
1957397E000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956142C000
heap
page read and write
1956C298000
trusted library allocation
page read and write
1956B436000
trusted library allocation
page read and write
1956B5C0000
trusted library allocation
page read and write
1956DCED000
trusted library allocation
page read and write
1956C09D000
trusted library allocation
page read and write
1956BF1A000
trusted library allocation
page read and write
1956D967000
trusted library allocation
page read and write
19561417000
heap
page read and write
19572832000
trusted library allocation
page read and write
19572A28000
trusted library allocation
page read and write
253BDBAD000
heap
page read and write
1956B73B000
trusted library allocation
page read and write
19573827000
trusted library allocation
page read and write
1956C099000
trusted library allocation
page read and write
19567DE1000
heap
page read and write
19576501000
heap
page read and write
19568CA1000
trusted library allocation
page read and write
19568CE0000
trusted library allocation
page read and write
1956C0E7000
trusted library allocation
page read and write
1956B4C5000
trusted library allocation
page read and write
1956A39D000
trusted library allocation
page read and write
1956BA49000
trusted library allocation
page read and write
1956C433000
trusted library allocation
page read and write
1956DD91000
trusted library allocation
page read and write
1956C2BB000
trusted library allocation
page read and write
19573FBE000
trusted library allocation
page read and write
195613F0000
heap
page read and write
1956BAAE000
trusted library allocation
page read and write
1956B8BB000
trusted library allocation
page read and write
19568CCA000
trusted library allocation
page read and write
195728C4000
trusted library allocation
page read and write
253BDAA0000
heap
page read and write
195739A1000
trusted library allocation
page read and write
1956C2B3000
trusted library allocation
page read and write
19561402000
heap
page read and write
19572AB4000
trusted library allocation
page read and write
1956C2AD000
trusted library allocation
page read and write
19574A58000
trusted library allocation
page read and write
1956C439000
trusted library allocation
page read and write
1956B4D4000
trusted library allocation
page read and write
195675F5000
trusted library allocation
page read and write
19573894000
trusted library allocation
page read and write
1956BBEA000
trusted library allocation
page read and write
29293262000
unclassified section
page read and write
1956C2E6000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956B8BB000
trusted library allocation
page read and write
19561438000
heap
page read and write
253BD4F0000
trusted library allocation
page read and write
19567BF3000
trusted library allocation
page read and write
1956BD8F000
trusted library allocation
page read and write
195613DF000
heap
page read and write
C53000
heap
page read and write
19561459000
heap
page read and write
1956DAC3000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956B5D0000
trusted library allocation
page read and write
1956C9C0000
trusted library allocation
page read and write
1956C0D4000
trusted library allocation
page read and write
19576283000
trusted library allocation
page read and write
19574BCA000
trusted library allocation
page read and write
195739A1000
trusted library allocation
page read and write
1956CEA9000
trusted library allocation
page read and write
1956D9EE000
trusted library allocation
page read and write
1956A4B8000
trusted library allocation
page read and write
1956BFF6000
trusted library allocation
page read and write
195739F5000
trusted library allocation
page read and write
1956BA63000
trusted library allocation
page read and write
19573839000
trusted library allocation
page read and write
19568CE6000
trusted library allocation
page read and write
1956AD4F000
trusted library allocation
page read and write
1956E1AA000
trusted library allocation
page read and write
1956A4CE000
trusted library allocation
page read and write
1956E114000
trusted library allocation
page read and write
1956C0A3000
trusted library allocation
page read and write
1956B757000
trusted library allocation
page read and write
1956A82E000
trusted library allocation
page read and write
29293030000
unclassified section
page readonly
33A88DF24000
trusted library allocation
page read and write
1956C0FD000
trusted library allocation
page read and write
195677F6000
trusted library allocation
page read and write
1956E2D5000
trusted library allocation
page read and write
195613E6000
heap
page read and write
19561402000
heap
page read and write
1956BA5A000
trusted library allocation
page read and write
19572861000
trusted library allocation
page read and write
1956D954000
trusted library allocation
page read and write
1956A482000
trusted library allocation
page read and write
19567794000
trusted library allocation
page read and write
1956C0DA000
trusted library allocation
page read and write
1956A3CD000
trusted library allocation
page read and write
1957658F000
heap
page read and write
19575FDA000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1956A6D0000
trusted library allocation
page read and write
1956B423000
trusted library allocation
page read and write
19573805000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1956A4FE000
trusted library allocation
page read and write
1956DAD5000
trusted library allocation
page read and write
195613E0000
heap
page read and write
1956D9B0000
trusted library allocation
page read and write
1956A1F3000
trusted library allocation
page read and write
253BD46A000
trusted library allocation
page read and write
19567D91000
heap
page read and write
1956BD44000
trusted library allocation
page read and write
1EECCFB0000
remote allocation
page read and write
1956E3B1000
trusted library allocation
page read and write
1956E28D000
trusted library allocation
page read and write
195613FF000
heap
page read and write
195728E0000
trusted library allocation
page read and write
1956B5C4000
trusted library allocation
page read and write
195738C6000
trusted library allocation
page read and write
19573996000
trusted library allocation
page read and write
1956BD56000
trusted library allocation
page read and write
19573879000
trusted library allocation
page read and write
19568CF7000
trusted library allocation
page read and write
1956A387000
trusted library allocation
page read and write
1956C252000
trusted library allocation
page read and write
1956C0C9000
trusted library allocation
page read and write
19561453000
heap
page read and write
1957381D000
trusted library allocation
page read and write
1956C089000
trusted library allocation
page read and write
1956A6D5000
trusted library allocation
page read and write
195728EC000
trusted library allocation
page read and write
1956C99C000
trusted library allocation
page read and write
1956BF55000
trusted library allocation
page read and write
19561443000
heap
page read and write
19574B83000
trusted library allocation
page read and write
253BDB0F000
heap
page read and write
19573862000
trusted library allocation
page read and write
195675F5000
trusted library allocation
page read and write
1956144D000
heap
page read and write
292932B0000
heap
page read and write
253BE13B000
heap
page read and write
1956C099000
trusted library allocation
page read and write
1956BA49000
trusted library allocation
page read and write
19575F3F000
trusted library allocation
page read and write
1956BE80000
trusted library allocation
page read and write
1956A1DD000
trusted library allocation
page read and write
1956AD4F000
trusted library allocation
page read and write
1956DDB3000
trusted library allocation
page read and write
1956E390000
trusted library allocation
page read and write
195613ED000
heap
page read and write
1956C0AE000
trusted library allocation
page read and write
1956BE4F000
trusted library allocation
page read and write
1956C34D000
trusted library allocation
page read and write
253BD0A0000
heap
page read and write
19574000000
trusted library allocation
page read and write
1956E2FC000
trusted library allocation
page read and write
195675B7000
trusted library allocation
page read and write
1956A4D3000
trusted library allocation
page read and write
19561433000
heap
page read and write
19565D98000
trusted library allocation
page read and write
1956A1A5000
trusted library allocation
page read and write
1956AD12000
trusted library allocation
page read and write
19575879000
trusted library allocation
page read and write
1956C4D2000
trusted library allocation
page read and write
19572AD5000
trusted library allocation
page read and write
19572A52000
trusted library allocation
page read and write
1956C83E000
trusted library allocation
page read and write
292934C9000
trusted library allocation
page read and write
19575FC9000
trusted library allocation
page read and write
1956A1D8000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956DD20000
trusted library allocation
page read and write
19561467000
heap
page read and write
19561449000
heap
page read and write
195613F8000
heap
page read and write
1956D9E2000
trusted library allocation
page read and write
E89BBFE000
stack
page read and write
19574BB1000
trusted library allocation
page read and write
19561446000
heap
page read and write
195675D6000
trusted library allocation
page read and write
1956BED7000
trusted library allocation
page read and write
1956BA92000
trusted library allocation
page read and write
1956B543000
trusted library allocation
page read and write
1956DDDB000
trusted library allocation
page read and write
1956C0A9000
trusted library allocation
page read and write
1956C476000
trusted library allocation
page read and write
1956E1D5000
trusted library allocation
page read and write
1956DD95000
trusted library allocation
page read and write
1956A1A5000
trusted library allocation
page read and write
19561446000
heap
page read and write
1956142C000
heap
page read and write
1956BA49000
trusted library allocation
page read and write
195677DC000
trusted library allocation
page read and write
1956BF14000
trusted library allocation
page read and write
1956BD4A000
trusted library allocation
page read and write
1956D9EE000
trusted library allocation
page read and write
19576501000
heap
page read and write
195742B7000
trusted library allocation
page read and write
253BE177000
heap
page read and write
1956E1D3000
trusted library allocation
page read and write
1956C06D000
trusted library allocation
page read and write
1EECD324000
trusted library allocation
page read and write
1956A3A4000
trusted library allocation
page read and write
1957653F000
heap
page read and write
19561433000
heap
page read and write
19572A80000
trusted library allocation
page read and write
1956B5E8000
trusted library allocation
page read and write
1956E3D6000
trusted library allocation
page read and write
1956C0EC000
trusted library allocation
page read and write
195675AE000
trusted library allocation
page read and write
195728A3000
trusted library allocation
page read and write
1956B73D000
trusted library allocation
page read and write
253BDB98000
heap
page read and write
1956C9A5000
trusted library allocation
page read and write
19561408000
heap
page read and write
19574B66000
trusted library allocation
page read and write
1956A4D9000
trusted library allocation
page read and write
29293498000
trusted library allocation
page read and write
19561444000
heap
page read and write
1956BECD000
trusted library allocation
page read and write
19574BCA000
trusted library allocation
page read and write
1956C0B9000
trusted library allocation
page read and write
1EECD090000
heap
page read and write
1956E1D8000
trusted library allocation
page read and write
1956C0B4000
trusted library allocation
page read and write
1956E18F000
trusted library allocation
page read and write
19573DB4000
trusted library allocation
page read and write
19572A76000
trusted library allocation
page read and write
195613E6000
heap
page read and write
19573E50000
trusted library allocation
page read and write
1956142C000
heap
page read and write
253BDB2F000
heap
page read and write
1957389F000
trusted library allocation
page read and write
19573DCB000
trusted library allocation
page read and write
195613F6000
heap
page read and write
1956DD1D000
trusted library allocation
page read and write
1EECD364000
trusted library allocation
page read and write
19572AB8000
trusted library allocation
page read and write
1956C4D2000
trusted library allocation
page read and write
253BDBF0000
heap
page read and write
195663F6000
trusted library allocation
page read and write
195613E0000
heap
page read and write
1956DD97000
trusted library allocation
page read and write
195758FB000
trusted library allocation
page read and write
1956DFA1000
trusted library allocation
page read and write
1956A871000
trusted library allocation
page read and write
253BE005000
trusted library allocation
page read and write
1956143B000
heap
page read and write
19561408000
heap
page read and write
1956C0D1000
trusted library allocation
page read and write
1956143D000
heap
page read and write
1956A45D000
trusted library allocation
page read and write
1956C1F3000
trusted library allocation
page read and write
1956BD81000
trusted library allocation
page read and write
1956C0D8000
trusted library allocation
page read and write
1956C290000
trusted library allocation
page read and write
1956D852000
trusted library allocation
page read and write
1956DD10000
trusted library allocation
page read and write
195613EF000
heap
page read and write
1956C319000
trusted library allocation
page read and write
253BE13B000
heap
page read and write
19573933000
trusted library allocation
page read and write
1956143F000
heap
page read and write
1EECD374000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956C0EC000
trusted library allocation
page read and write
1956C0F8000
trusted library allocation
page read and write
1956C0FB000
trusted library allocation
page read and write
1956C0B4000
trusted library allocation
page read and write
1956BD47000
trusted library allocation
page read and write
1956E2A6000
trusted library allocation
page read and write
1956C9FE000
trusted library allocation
page read and write
1956C0FD000
trusted library allocation
page read and write
F72437E000
stack
page read and write
1956A4D0000
trusted library allocation
page read and write
195739F3000
trusted library allocation
page read and write
1956A457000
trusted library allocation
page read and write
195613FF000
heap
page read and write
23ECD100000
trusted library allocation
page read and write
19561428000
heap
page read and write
1957426E000
trusted library allocation
page read and write
1956E0F4000
trusted library allocation
page read and write
195728DD000
trusted library allocation
page read and write
1956C272000
trusted library allocation
page read and write
195613F0000
heap
page read and write
6F083FE000
unkown
page readonly
1956E143000
trusted library allocation
page read and write
1956C9B8000
trusted library allocation
page read and write
1957409D000
trusted library allocation
page read and write
1956DDB3000
trusted library allocation
page read and write
19573987000
trusted library allocation
page read and write
195728F6000
trusted library allocation
page read and write
19561441000
heap
page read and write
195674E0000
trusted library allocation
page read and write
1956DDDB000
trusted library allocation
page read and write
1956C272000
trusted library allocation
page read and write
19573974000
trusted library allocation
page read and write
1956BE53000
trusted library allocation
page read and write
1956E09E000
trusted library allocation
page read and write
1956C0F1000
trusted library allocation
page read and write
195734FE000
trusted library allocation
page read and write
98772BE000
unkown
page readonly
1956DA05000
trusted library allocation
page read and write
19573862000
trusted library allocation
page read and write
253BD060000
unclassified section
page readonly
1956DFA7000
trusted library allocation
page read and write
1956143D000
heap
page read and write
19573895000
trusted library allocation
page read and write
19573981000
trusted library allocation
page read and write
19572A7A000
trusted library allocation
page read and write
1956B5B5000
trusted library allocation
page read and write
23ECD240000
heap
page read and write
1956C04A000
trusted library allocation
page read and write
19567DE5000
heap
page read and write
1956C086000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
1956144E000
heap
page read and write
19561402000
heap
page read and write
1956C4AD000
trusted library allocation
page read and write
19561449000
heap
page read and write
1956A39D000
trusted library allocation
page read and write
19575FAF000
trusted library allocation
page read and write
195728DC000
trusted library allocation
page read and write
1956BECD000
trusted library allocation
page read and write
1957400F000
trusted library allocation
page read and write
1956CAC1000
trusted library allocation
page read and write
1956C071000
trusted library allocation
page read and write
1956DF59000
trusted library allocation
page read and write
19574B3B000
trusted library allocation
page read and write
195734C2000
trusted library allocation
page read and write
1956C0A3000
trusted library allocation
page read and write
1956BBB1000
trusted library allocation
page read and write
2929347B000
trusted library allocation
page read and write
1956D8AF000
trusted library allocation
page read and write
19561449000
heap
page read and write
19561433000
heap
page read and write
1956C9A5000
trusted library allocation
page read and write
19561402000
heap
page read and write
253BD45C000
trusted library allocation
page read and write
195613ED000
heap
page read and write
19572A74000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956BDAC000
trusted library allocation
page read and write
1956C29E000
trusted library allocation
page read and write
1956E3D9000
trusted library allocation
page read and write
253BDB19000
heap
page read and write
195613EF000
heap
page read and write
1956A896000
trusted library allocation
page read and write
195728F6000
trusted library allocation
page read and write
19572791000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956B5C2000
trusted library allocation
page read and write
19573916000
trusted library allocation
page read and write
195613F5000
heap
page read and write
1956C856000
trusted library allocation
page read and write
253BDB0C000
heap
page read and write
195728FB000
trusted library allocation
page read and write
1956DA6F000
trusted library allocation
page read and write
195674AE000
trusted library allocation
page read and write
19567DEB000
heap
page read and write
1956BBF7000
trusted library allocation
page read and write
19561428000
heap
page read and write
19576378000
trusted library allocation
page read and write
19575F5F000
trusted library allocation
page read and write
1956B4C5000
trusted library allocation
page read and write
1956C05E000
trusted library allocation
page read and write
1956DD76000
trusted library allocation
page read and write
19561402000
heap
page read and write
1956144A000
heap
page read and write
19561408000
heap
page read and write
1956BA3F000
trusted library allocation
page read and write
1956A4F9000
trusted library allocation
page read and write
1956DD95000
trusted library allocation
page read and write
195727A3000
trusted library allocation
page read and write
1957284E000
trusted library allocation
page read and write
1956BD39000
trusted library allocation
page read and write
1956DDB1000
trusted library allocation
page read and write
19568CE0000
trusted library allocation
page read and write
1956C484000
trusted library allocation
page read and write
195734C2000
trusted library allocation
page read and write
253BE144000
heap
page read and write
1956C9D7000
trusted library allocation
page read and write
B14000
heap
page read and write
1956BA5A000
trusted library allocation
page read and write
1956A470000
trusted library allocation
page read and write
195739DF000
trusted library allocation
page read and write
1956C494000
trusted library allocation
page read and write
19573828000
trusted library allocation
page read and write
1956C0FB000
trusted library allocation
page read and write
1956B5E8000
trusted library allocation
page read and write
1956B583000
trusted library allocation
page read and write
29293447000
trusted library allocation
page read and write
1956143B000
heap
page read and write
19576571000
heap
page read and write
987933E000
unkown
page readonly
19574AC1000
trusted library allocation
page read and write
1956BF25000
trusted library allocation
page read and write
19567DDF000
heap
page read and write
1956CEFB000
trusted library allocation
page read and write
1956E1CD000
trusted library allocation
page read and write
253BDBA1000
heap
page read and write
1956A38D000
trusted library allocation
page read and write
292930A0000
remote allocation
page read and write
195758B6000
trusted library allocation
page read and write
1956143D000
heap
page read and write
1956B77E000
trusted library allocation
page read and write
1956BE6C000
trusted library allocation
page read and write
19561402000
heap
page read and write
195738E2000
trusted library allocation
page read and write
2929345B000
trusted library allocation
page read and write
F722B3E000
stack
page read and write
19567798000
trusted library allocation
page read and write
195742C0000
trusted library allocation
page read and write
19574B5C000
trusted library allocation
page read and write
1956C2F0000
trusted library allocation
page read and write
1956DD04000
trusted library allocation
page read and write
195727F6000
trusted library allocation
page read and write
1956A48C000
trusted library allocation
page read and write
1956B4F2000
trusted library allocation
page read and write
1956C0EF000
trusted library allocation
page read and write
1956BBF7000
trusted library allocation
page read and write
1956C0D7000
trusted library allocation
page read and write
1956CE37000
trusted library allocation
page read and write
8CC6B81000
trusted library allocation
page execute read
B14000
heap
page read and write
19561402000
heap
page read and write
19561417000
heap
page read and write
19572A74000
trusted library allocation
page read and write
19561428000
heap
page read and write
1956A4A2000
trusted library allocation
page read and write
1956A451000
trusted library allocation
page read and write
1EECD1BF000
unclassified section
page read and write
1956D927000
trusted library allocation
page read and write
1956E18D000
trusted library allocation
page read and write
1957283F000
trusted library allocation
page read and write
19561402000
heap
page read and write
195613F7000
heap
page read and write
1EECD700000
trusted library allocation
page read and write
19561428000
heap
page read and write
29293622000
trusted library allocation
page read and write
19561444000
heap
page read and write
195613F7000
heap
page read and write
19567D93000
heap
page read and write
19572853000
trusted library allocation
page read and write
253BDBAD000
heap
page read and write
19566500000
trusted library allocation
page read and write
19575FD2000
trusted library allocation
page read and write
1956AD13000
trusted library allocation
page read and write
19572AB8000
trusted library allocation
page read and write
19565D9E000
trusted library allocation
page read and write
19575D00000
trusted library allocation
page read and write
1956DD87000
trusted library allocation
page read and write
195613F8000
heap
page read and write
1957285A000
trusted library allocation
page read and write
1EECD607000
trusted library allocation
page read and write
1956E2CB000
trusted library allocation
page read and write
195734D1000
trusted library allocation
page read and write
195758A1000
trusted library allocation
page read and write
1956C47A000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956C437000
trusted library allocation
page read and write
195728C3000
trusted library allocation
page read and write
253BDB3D000
heap
page read and write
195728EC000
trusted library allocation
page read and write
1957396A000
trusted library allocation
page read and write
1956BDFE000
trusted library allocation
page read and write
1956A171000
trusted library allocation
page read and write
19572A7C000
trusted library allocation
page read and write
1956A486000
trusted library allocation
page read and write
1EECD370000
trusted library allocation
page read and write
19561467000
heap
page read and write
19561443000
heap
page read and write
1956C4BF000
trusted library allocation
page read and write
19567DA3000
heap
page read and write
253BE122000
heap
page read and write
1956BA58000
trusted library allocation
page read and write
195728C8000
trusted library allocation
page read and write
1956DDBC000
trusted library allocation
page read and write
253BD410000
trusted library allocation
page read and write
195738B1000
trusted library allocation
page read and write
1956A1F8000
trusted library allocation
page read and write
253BD960000
heap
page read and write
253BDBA1000
heap
page read and write
1956E1E9000
trusted library allocation
page read and write
1957387B000
trusted library allocation
page read and write
19561433000
heap
page read and write
1957387E000
trusted library allocation
page read and write
195727C4000
trusted library allocation
page read and write
C20000
heap
page read and write
A9D000
stack
page read and write
1956BA56000
trusted library allocation
page read and write
19575F55000
trusted library allocation
page read and write
195728F8000
trusted library allocation
page read and write
1956BA3D000
trusted library allocation
page read and write
19575D6E000
trusted library allocation
page read and write
19561433000
heap
page read and write
1956C4F9000
trusted library allocation
page read and write
1956BA47000
trusted library allocation
page read and write
195738A5000
trusted library allocation
page read and write
195613F2000
heap
page read and write
1956142C000
heap
page read and write
1956A4D2000
trusted library allocation
page read and write
19574B61000
trusted library allocation
page read and write
19561453000
heap
page read and write
1956BDB8000
trusted library allocation
page read and write
253BD352000
unclassified section
page read and write
1956E28D000
trusted library allocation
page read and write
1956BFD7000
trusted library allocation
page read and write
19561408000
heap
page read and write
19561467000
heap
page read and write
19575865000
trusted library allocation
page read and write
195613EE000
heap
page read and write
1956BA62000
trusted library allocation
page read and write
1956B4AF000
trusted library allocation
page read and write
195728DF000
trusted library allocation
page read and write
19561428000
heap
page read and write
195739D0000
trusted library allocation
page read and write
195613DF000
heap
page read and write
19576526000
heap
page read and write
1956C2B8000
trusted library allocation
page read and write
195613E6000
heap
page read and write
1956C0F6000
trusted library allocation
page read and write
1956B8F6000
trusted library allocation
page read and write
1956144B000
heap
page read and write
1956B7C2000
trusted library allocation
page read and write
253BDB10000
heap
page read and write
6F0612C000
stack
page read and write
1956C06D000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
1956C298000
trusted library allocation
page read and write
19568C19000
trusted library allocation
page read and write
19567DEF000
heap
page read and write
253BD412000
trusted library allocation
page read and write
1956C3BF000
trusted library allocation
page read and write
1956C0A3000
trusted library allocation
page read and write
1956E0DB000
trusted library allocation
page read and write
1956DA08000
trusted library allocation
page read and write
19572AB0000
trusted library allocation
page read and write
1956143B000
heap
page read and write
19568CF7000
trusted library allocation
page read and write
19573862000
trusted library allocation
page read and write
1956A4D9000
trusted library allocation
page read and write
1956A164000
trusted library allocation
page read and write
195613EE000
heap
page read and write
1956C9B8000
trusted library allocation
page read and write
1956C43E000
trusted library allocation
page read and write
EFFD7FF000
stack
page read and write
1956BF1F000
trusted library allocation
page read and write
1956C3CC000
trusted library allocation
page read and write
1956C075000
trusted library allocation
page read and write
23ECCFF0000
heap
page read and write
29293210000
heap
page read and write
1956C0F1000
trusted library allocation
page read and write
19574238000
trusted library allocation
page read and write
19561438000
heap
page read and write
19568C61000
trusted library allocation
page read and write
9DB000
stack
page read and write
19567DE5000
heap
page read and write
1956E3D6000
trusted library allocation
page read and write
195739E7000
trusted library allocation
page read and write
1956E1AA000
trusted library allocation
page read and write
1956DD5F000
trusted library allocation
page read and write
1EECD313000
trusted library allocation
page read and write
1956143F000
heap
page read and write
19561457000
heap
page read and write
1956E1FE000
trusted library allocation
page read and write
1956BE7D000
trusted library allocation
page read and write
195613F9000
heap
page read and write
253BDBA1000
heap
page read and write
19568C61000
trusted library allocation
page read and write
19561402000
heap
page read and write
19574BF9000
trusted library allocation
page read and write
253BE158000
heap
page read and write
195677C7000
trusted library allocation
page read and write
1956CEEA000
trusted library allocation
page read and write
195613E4000
heap
page read and write
195727D6000
trusted library allocation
page read and write
B14000
heap
page read and write
195613F8000
heap
page read and write
1956A890000
trusted library allocation
page read and write
1956CA78000
trusted library allocation
page read and write
19574019000
trusted library allocation
page read and write
195675D6000
trusted library allocation
page read and write
19567B83000
trusted library allocation
page read and write
1956C4C7000
trusted library allocation
page read and write
1956A4B5000
trusted library allocation
page read and write
1956A31E000
trusted library allocation
page read and write
19567D93000
heap
page read and write
1956C222000
trusted library allocation
page read and write
19572791000
trusted library allocation
page read and write
1956C0B2000
trusted library allocation
page read and write
1956144A000
heap
page read and write
1956B5F0000
trusted library allocation
page read and write
195613FF000
heap
page read and write
1956C3BA000
trusted library allocation
page read and write
1956143B000
heap
page read and write
19573839000
trusted library allocation
page read and write
19572AAC000
trusted library allocation
page read and write
1956B4E3000
trusted library allocation
page read and write
1956E122000
trusted library allocation
page read and write
1956A4A9000
trusted library allocation
page read and write
19561402000
heap
page read and write
195613E0000
heap
page read and write
1956E2DF000
trusted library allocation
page read and write
19561438000
heap
page read and write
19561402000
heap
page read and write
195675D6000
trusted library allocation
page read and write
1956DDA5000
trusted library allocation
page read and write
195613E0000
heap
page read and write
2929342E000
trusted library allocation
page read and write
1957397E000
trusted library allocation
page read and write
1956BBF9000
trusted library allocation
page read and write
1956C47D000
trusted library allocation
page read and write
23ECEA98000
heap
page read and write
19573974000
trusted library allocation
page read and write
1956E236000
trusted library allocation
page read and write
1956142C000
heap
page read and write
1956C494000
trusted library allocation
page read and write
1956C222000
trusted library allocation
page read and write
1956143B000
heap
page read and write
1956E2C2000
trusted library allocation
page read and write
There are 3996 hidden memdumps, click here to show them.