IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_5c9c6db3-4be8-4519-85ae-68ba3e2788e6.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_5c9c6db3-4be8-4519-85ae-68ba3e2788e6.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 4, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2292 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2212 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3d3592d-2a7f-4998-ad9d-25d2e559128e} 5776 "\\.\pipe\gecko-crash-server-pipe.5776" 1804376f510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3300 -parentBuildID 20230927232528 -prefsHandle 3408 -prefMapHandle 3640 -prefsLen 26099 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8716ed0-fba8-43a6-bdf8-f0c97c379a93} 5776 "\\.\pipe\gecko-crash-server-pipe.5776" 180536d6b10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4840 -prefMapHandle 4748 -prefsLen 33076 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35a3a37c-b193-447c-aca0-ac37bcd14058} 5776 "\\.\pipe\gecko-crash-server-pipe.5776" 1805622f710 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://youtube.com/account?=https://ac
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://addons.mozilla.org(
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
http://ocsp.digice65fyo
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://www.msn.
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://support.mozilla.org/products/firefox
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.195.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.181.142
reddit.map.fastly.net
151.101.129.140
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
142.250.181.78
youtube.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1FAC7810000
trusted library allocation
page read and write
1804A51B000
heap
page read and write
1805376A000
trusted library allocation
page read and write
180572DC000
trusted library allocation
page read and write
1804A524000
heap
page read and write
1805341E000
trusted library allocation
page read and write
18055046000
trusted library allocation
page read and write
1805FD41000
heap
page read and write
18056199000
trusted library allocation
page read and write
1804A574000
heap
page read and write
180563A8000
trusted library allocation
page read and write
1FAC7803000
trusted library allocation
page read and write
1804A592000
heap
page read and write
1804A55E000
heap
page read and write
1805C7C1000
trusted library allocation
page read and write
1805DA6E000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180539F0000
trusted library allocation
page read and write
1804A52D000
heap
page read and write
18056F49000
trusted library allocation
page read and write
180561C2000
trusted library allocation
page read and write
18053DBB000
trusted library allocation
page read and write
DA4000
heap
page read and write
18053DB0000
trusted library allocation
page read and write
18060974000
trusted library allocation
page read and write
1805128E000
heap
page read and write
1805759E000
trusted library allocation
page read and write
180544BD000
trusted library allocation
page read and write
18056175000
trusted library allocation
page read and write
180560AC000
trusted library allocation
page read and write
1805DA80000
trusted library allocation
page read and write
18053939000
trusted library allocation
page read and write
18055374000
trusted library allocation
page read and write
1804A543000
heap
page read and write
180575A3000
trusted library allocation
page read and write
18056363000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A54D000
heap
page read and write
1805397D000
trusted library allocation
page read and write
1805543E000
trusted library allocation
page read and write
18055832000
trusted library allocation
page read and write
180534A2000
trusted library allocation
page read and write
1804A54A000
heap
page read and write
1804A52F000
heap
page read and write
180609E8000
trusted library allocation
page read and write
18055890000
trusted library allocation
page read and write
1805C7D9000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805126A000
heap
page read and write
18056668000
trusted library allocation
page read and write
18055EA5000
trusted library allocation
page read and write
1805C897000
trusted library allocation
page read and write
24249DBA000
trusted library allocation
page read and write
18050C18000
trusted library allocation
page read and write
18053965000
trusted library allocation
page read and write
1805E42C000
trusted library allocation
page read and write
837ED7E000
unkown
page readonly
180554DB000
trusted library allocation
page read and write
24249E00000
trusted library allocation
page read and write
18054539000
trusted library allocation
page read and write
18050CFA000
trusted library allocation
page read and write
150DBD9A000
heap
page read and write
1805BE7E000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
1804A538000
heap
page read and write
1804A55E000
heap
page read and write
1804A587000
heap
page read and write
180577ED000
trusted library allocation
page read and write
DDA000
heap
page read and write
1804A54D000
heap
page read and write
1804A57E000
heap
page read and write
1805F758000
trusted library allocation
page read and write
180537C1000
trusted library allocation
page read and write
DB0000
heap
page read and write
18056F88000
trusted library allocation
page read and write
18055841000
trusted library allocation
page read and write
1804A545000
heap
page read and write
18054E85000
trusted library allocation
page read and write
1805397D000
trusted library allocation
page read and write
18055CA1000
trusted library allocation
page read and write
1804A579000
heap
page read and write
180576FB000
trusted library allocation
page read and write
1805DA65000
trusted library allocation
page read and write
1FAC8529000
heap
page read and write
180558B6000
trusted library allocation
page read and write
1805F78A000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
1804A55E000
heap
page read and write
18051286000
heap
page read and write
18056F66000
trusted library allocation
page read and write
1FAC8003000
trusted library allocation
page read and write
1805E30C000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1805BF73000
trusted library allocation
page read and write
18050C4B000
trusted library allocation
page read and write
1805F1D3000
trusted library allocation
page read and write
18050CF0000
trusted library allocation
page read and write
1FAC85B8000
heap
page read and write
1804A553000
heap
page read and write
1805645B000
trusted library allocation
page read and write
1805FAE8000
trusted library allocation
page read and write
1805649A000
trusted library allocation
page read and write
18053DB8000
trusted library allocation
page read and write
180553BB000
trusted library allocation
page read and write
1805DA5A000
trusted library allocation
page read and write
18054B05000
trusted library allocation
page read and write
180534DD000
trusted library allocation
page read and write
1FAC8000000
trusted library allocation
page read and write
18055848000
trusted library allocation
page read and write
18060A12000
trusted library allocation
page read and write
1805E3A3000
trusted library allocation
page read and write
1804A515000
heap
page read and write
150DBF20000
heap
page read and write
1804A55E000
heap
page read and write
1804A54A000
heap
page read and write
1805583E000
trusted library allocation
page read and write
18050D36000
trusted library allocation
page read and write
1805C799000
trusted library allocation
page read and write
18055396000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
1805759A000
trusted library allocation
page read and write
1804A553000
heap
page read and write
18056344000
trusted library allocation
page read and write
18053DFA000
trusted library allocation
page read and write
180561FC000
trusted library allocation
page read and write
18050CBE000
trusted library allocation
page read and write
1804A528000
heap
page read and write
18055CD1000
trusted library allocation
page read and write
1804FA00000
trusted library allocation
page read and write
18055DB9000
trusted library allocation
page read and write
1804A51D000
heap
page read and write
24249D19000
trusted library allocation
page read and write
1804A538000
heap
page read and write
24249A30000
heap
page read and write
18050CDD000
trusted library allocation
page read and write
150DC130000
trusted library allocation
page read and write
18050CDE000
trusted library allocation
page read and write
18056630000
trusted library allocation
page read and write
1FAC85B8000
heap
page read and write
18054B70000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
180561D7000
trusted library allocation
page read and write
1FAC8599000
heap
page read and write
180544FE000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1805605B000
trusted library allocation
page read and write
18053D50000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1804A53E000
heap
page read and write
18050CC7000
trusted library allocation
page read and write
1FAC852C000
heap
page read and write
1805DA2B000
trusted library allocation
page read and write
1FAC849C000
heap
page read and write
1804A543000
heap
page read and write
18057895000
trusted library allocation
page read and write
1804A553000
heap
page read and write
18057382000
trusted library allocation
page read and write
18060B17000
trusted library allocation
page read and write
1804FD5D000
trusted library allocation
page read and write
1804F9C5000
trusted library allocation
page read and write
1805F777000
trusted library allocation
page read and write
1805375E000
trusted library allocation
page read and write
180561E9000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1805646B000
trusted library allocation
page read and write
18053267000
trusted library allocation
page read and write
180554C7000
trusted library allocation
page read and write
1805FD01000
heap
page read and write
1805582A000
trusted library allocation
page read and write
180550FD000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1805634A000
trusted library allocation
page read and write
18056383000
trusted library allocation
page read and write
F050FFE000
stack
page read and write
1805773F000
trusted library allocation
page read and write
180564AF000
trusted library allocation
page read and write
180575B3000
trusted library allocation
page read and write
18060A1D000
trusted library allocation
page read and write
1804A544000
heap
page read and write
1805FC5B000
trusted library allocation
page read and write
18051286000
heap
page read and write
1804A538000
heap
page read and write
180577E7000
trusted library allocation
page read and write
180562EE000
trusted library allocation
page read and write
1804A51D000
heap
page read and write
1804A574000
heap
page read and write
180510F9000
trusted library allocation
page read and write
18057078000
trusted library allocation
page read and write
18056372000
trusted library allocation
page read and write
180563DF000
trusted library allocation
page read and write
18060B17000
trusted library allocation
page read and write
18055835000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
180558C2000
trusted library allocation
page read and write
1805FC84000
trusted library allocation
page read and write
1805099D000
trusted library allocation
page read and write
1804A553000
heap
page read and write
36A1000
heap
page read and write
1804A511000
heap
page read and write
1805FD58000
heap
page read and write
1805FD61000
heap
page read and write
1804A574000
heap
page read and write
24249D12000
trusted library allocation
page read and write
1805FDD5000
heap
page read and write
180576F0000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805BEC5000
trusted library allocation
page read and write
1805BE8A000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18055398000
trusted library allocation
page read and write
18050CC7000
trusted library allocation
page read and write
18053D6B000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
180577E1000
trusted library allocation
page read and write
18054493000
trusted library allocation
page read and write
18057286000
trusted library allocation
page read and write
1805E406000
trusted library allocation
page read and write
180575CA000
trusted library allocation
page read and write
1804A525000
heap
page read and write
1804A54B000
heap
page read and write
18054A41000
trusted library allocation
page read and write
1805617A000
trusted library allocation
page read and write
1804A530000
heap
page read and write
1805397D000
trusted library allocation
page read and write
1805FD01000
heap
page read and write
18056F83000
trusted library allocation
page read and write
18055890000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
150DBF52000
unclassified section
page read and write
180539A9000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A55E000
heap
page read and write
1804A546000
heap
page read and write
1805BEA9000
trusted library allocation
page read and write
18054FDE000
trusted library allocation
page read and write
18054BFC000
trusted library allocation
page read and write
18055F57000
trusted library allocation
page read and write
1804A579000
heap
page read and write
18056383000
trusted library allocation
page read and write
1805F777000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A525000
heap
page read and write
18053D14000
trusted library allocation
page read and write
18055872000
trusted library allocation
page read and write
18055DA6000
trusted library allocation
page read and write
1804A528000
heap
page read and write
1FAC857C000
heap
page read and write
18054AD3000
trusted library allocation
page read and write
1805FC49000
trusted library allocation
page read and write
18060B80000
trusted library allocation
page read and write
180561DD000
trusted library allocation
page read and write
150DC124000
trusted library allocation
page read and write
18057640000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
180575D6000
trusted library allocation
page read and write
1805584A000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
24249AA0000
unclassified section
page readonly
18055889000
trusted library allocation
page read and write
150DBD90000
heap
page read and write
18056F1D000
trusted library allocation
page read and write
1805C73D000
trusted library allocation
page read and write
180550CD000
trusted library allocation
page read and write
1FAC84A0000
heap
page read and write
18060A0C000
trusted library allocation
page read and write
1805588C000
trusted library allocation
page read and write
18057628000
trusted library allocation
page read and write
18056436000
trusted library allocation
page read and write
18056268000
trusted library allocation
page read and write
1805C7ED000
trusted library allocation
page read and write
18050CAA000
trusted library allocation
page read and write
180564D6000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180550BF000
trusted library allocation
page read and write
1805BEA1000
trusted library allocation
page read and write
24249D5B000
trusted library allocation
page read and write
18054B52000
trusted library allocation
page read and write
180578FA000
trusted library allocation
page read and write
1804A524000
heap
page read and write
1805F78A000
trusted library allocation
page read and write
1FAC7881000
trusted library allocation
page read and write
1FAC84AC000
heap
page read and write
1805C100000
trusted library allocation
page read and write
180539F4000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
180575EB000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
18054C25000
trusted library allocation
page read and write
180564A0000
trusted library allocation
page read and write
150DC113000
trusted library allocation
page read and write
180553B7000
trusted library allocation
page read and write
1805660C000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A574000
heap
page read and write
1804A55E000
heap
page read and write
1805C763000
trusted library allocation
page read and write
18056642000
trusted library allocation
page read and write
1804A546000
heap
page read and write
1804A53E000
heap
page read and write
150DC500000
trusted library allocation
page read and write
180554CB000
trusted library allocation
page read and write
18054BDC000
trusted library allocation
page read and write
180544F2000
trusted library allocation
page read and write
1FAC84AC000
heap
page read and write
1804A536000
heap
page read and write
1805639A000
trusted library allocation
page read and write
1805583B000
trusted library allocation
page read and write
1805663F000
trusted library allocation
page read and write
180564B7000
trusted library allocation
page read and write
1FAC8520000
heap
page read and write
1804A51E000
heap
page read and write
2CFE27F0000
heap
page read and write
1804A565000
heap
page read and write
18056386000
trusted library allocation
page read and write
1805637C000
trusted library allocation
page read and write
18055055000
trusted library allocation
page read and write
1804F919000
trusted library allocation
page read and write
180550FD000
trusted library allocation
page read and write
18054BC0000
trusted library allocation
page read and write
18054B3A000
trusted library allocation
page read and write
1969FB000
stack
page read and write
180578C2000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
18056422000
trusted library allocation
page read and write
180564E3000
trusted library allocation
page read and write
1805584A000
trusted library allocation
page read and write
1805FCF8000
trusted library allocation
page read and write
1804A515000
heap
page read and write
1804A554000
heap
page read and write
24249D10000
trusted library allocation
page read and write
1804A581000
heap
page read and write
1805642F000
trusted library allocation
page read and write
1805BED5000
trusted library allocation
page read and write
18056161000
trusted library allocation
page read and write
1805660E000
trusted library allocation
page read and write
180563F1000
trusted library allocation
page read and write
1805128E000
heap
page read and write
1804A577000
heap
page read and write
1805379E000
trusted library allocation
page read and write
18053776000
trusted library allocation
page read and write
150DBD50000
remote allocation
page read and write
1805397D000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
1805BF7B000
trusted library allocation
page read and write
18053600000
trusted library allocation
page read and write
DE7000
heap
page read and write
18054CF0000
trusted library allocation
page read and write
180563A8000
trusted library allocation
page read and write
1805398C000
trusted library allocation
page read and write
1804A579000
heap
page read and write
1804A543000
heap
page read and write
180558B0000
trusted library allocation
page read and write
1805DA2E000
trusted library allocation
page read and write
18057794000
trusted library allocation
page read and write
180553AA000
trusted library allocation
page read and write
18056319000
trusted library allocation
page read and write
1804F871000
trusted library allocation
page read and write
1804A58C000
heap
page read and write
1805634A000
trusted library allocation
page read and write
18053DFE000
trusted library allocation
page read and write
180561E6000
trusted library allocation
page read and write
18055F33000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1804A553000
heap
page read and write
18054BDC000
trusted library allocation
page read and write
18054BCF000
trusted library allocation
page read and write
180578A9000
trusted library allocation
page read and write
180572B9000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18054AAD000
trusted library allocation
page read and write
1805F756000
trusted library allocation
page read and write
18055CE0000
trusted library allocation
page read and write
18050CF3000
trusted library allocation
page read and write
180561F8000
trusted library allocation
page read and write
1805BEF5000
trusted library allocation
page read and write
1805F758000
trusted library allocation
page read and write
1804A549000
heap
page read and write
18056624000
trusted library allocation
page read and write
18056FB5000
trusted library allocation
page read and write
1805FE45000
heap
page read and write
1804A553000
heap
page read and write
1804EEEF000
trusted library allocation
page read and write
18055426000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180536F0000
trusted library allocation
page read and write
1805C7D9000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
180577EA000
trusted library allocation
page read and write
180509A8000
trusted library allocation
page read and write
24249A26000
heap
page read and write
1804A52A000
heap
page read and write
1804A52E000
heap
page read and write
1FAC8024000
trusted library allocation
page read and write
DA4000
heap
page read and write
180566B8000
trusted library allocation
page read and write
1804A544000
heap
page read and write
180537BC000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1AE47AA2000
heap
page read and write
1805641D000
trusted library allocation
page read and write
1805C767000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1804A515000
heap
page read and write
1805759E000
trusted library allocation
page read and write
18053875000
trusted library allocation
page read and write
1805637C000
trusted library allocation
page read and write
18057582000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1805758A000
trusted library allocation
page read and write
18055336000
trusted library allocation
page read and write
71862BE000
stack
page read and write
1FAC741C000
remote allocation
page execute read
DA4000
heap
page read and write
1804A55E000
heap
page read and write
18056357000
trusted library allocation
page read and write
1805C7DE000
trusted library allocation
page read and write
1805429D000
trusted library allocation
page read and write
1FAC7760000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1805459D000
trusted library allocation
page read and write
1804A528000
heap
page read and write
18056FED000
trusted library allocation
page read and write
180563E9000
trusted library allocation
page read and write
DB8000
heap
page read and write
18055C8B000
trusted library allocation
page read and write
1AC0000
heap
page read and write
1805C5A8000
trusted library allocation
page read and write
180554B9000
trusted library allocation
page read and write
18054B4D000
trusted library allocation
page read and write
1805373A000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1FAC84A3000
heap
page read and write
1805C300000
trusted library allocation
page read and write
18056FF8000
trusted library allocation
page read and write
180576F5000
trusted library allocation
page read and write
1804A51B000
heap
page read and write
180609D5000
trusted library allocation
page read and write
18054559000
trusted library allocation
page read and write
1805644F000
trusted library allocation
page read and write
180558B6000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
18051283000
heap
page read and write
180550E9000
trusted library allocation
page read and write
180560C0000
trusted library allocation
page read and write
18055433000
trusted library allocation
page read and write
1804A51B000
heap
page read and write
1805DAEE000
trusted library allocation
page read and write
18053E26000
trusted library allocation
page read and write
1804F926000
trusted library allocation
page read and write
1805580B000
trusted library allocation
page read and write
1805C743000
trusted library allocation
page read and write
1FAC8599000
heap
page read and write
180578DF000
trusted library allocation
page read and write
18054E7F000
trusted library allocation
page read and write
180560AD000
trusted library allocation
page read and write
18054BC0000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180558DB000
trusted library allocation
page read and write
1805644A000
trusted library allocation
page read and write
180563CD000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
4DC000
unkown
page readonly
1FAC770F000
unclassified section
page read and write
1805C76B000
trusted library allocation
page read and write
2424A240000
heap
page read and write
1804A546000
heap
page read and write
1805FCBC000
trusted library allocation
page read and write
24249D66000
trusted library allocation
page read and write
1805DA5A000
trusted library allocation
page read and write
180576DB000
trusted library allocation
page read and write
1805886D000
trusted library allocation
page read and write
1805E0C2000
trusted library allocation
page read and write
18054BDE000
trusted library allocation
page read and write
1805375E000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1805641F000
trusted library allocation
page read and write
1805582B000
trusted library allocation
page read and write
1805390A000
trusted library allocation
page read and write
180553E7000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1805F4FA000
trusted library allocation
page read and write
180570FA000
trusted library allocation
page read and write
1805C847000
trusted library allocation
page read and write
1FAC856B000
heap
page read and write
1FAC84F9000
heap
page read and write
1805F7BA000
trusted library allocation
page read and write
1804F9B5000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180560FD000
trusted library allocation
page read and write
180553AF000
trusted library allocation
page read and write
180563EF000
trusted library allocation
page read and write
1FAC7800000
trusted library allocation
page read and write
1805657B000
trusted library allocation
page read and write
18055821000
trusted library allocation
page read and write
1AE47ABF000
heap
page read and write
18054FDA000
trusted library allocation
page read and write
1805BE99000
trusted library allocation
page read and write
18053DE5000
trusted library allocation
page read and write
1805586F000
trusted library allocation
page read and write
1FAC7600000
trusted library allocation
page read and write
1805393C000
trusted library allocation
page read and write
180575A3000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
18057549000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18060A0A000
trusted library allocation
page read and write
1805FD64000
heap
page read and write
18056357000
trusted library allocation
page read and write
18054AFD000
trusted library allocation
page read and write
1804A50E000
heap
page read and write
18055058000
trusted library allocation
page read and write
180563DF000
trusted library allocation
page read and write
1805FD3E000
heap
page read and write
1804A553000
heap
page read and write
18053D54000
trusted library allocation
page read and write
18054566000
trusted library allocation
page read and write
1805C7BF000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
18056389000
trusted library allocation
page read and write
1805FE45000
heap
page read and write
18055838000
trusted library allocation
page read and write
50C000
unkown
page read and write
1805F4CC000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A50D000
heap
page read and write
1804A52E000
heap
page read and write
180561FC000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1804A538000
heap
page read and write
150DC407000
trusted library allocation
page read and write
18055437000
trusted library allocation
page read and write
180563E3000
trusted library allocation
page read and write
1805128E000
heap
page read and write
18056294000
trusted library allocation
page read and write
18050CBE000
trusted library allocation
page read and write
1805663F000
trusted library allocation
page read and write
18054B3C000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805FD4E000
heap
page read and write
18053D2E000
trusted library allocation
page read and write
18057795000
trusted library allocation
page read and write
18051272000
heap
page read and write
1804A565000
heap
page read and write
12F97424000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
18056333000
trusted library allocation
page read and write
24249D00000
trusted library allocation
page read and write
18054BCF000
trusted library allocation
page read and write
18056355000
trusted library allocation
page read and write
180560B1000
trusted library allocation
page read and write
180577FC000
trusted library allocation
page read and write
1805FD64000
heap
page read and write
18054289000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18060995000
trusted library allocation
page read and write
1805E3A7000
trusted library allocation
page read and write
1804A543000
heap
page read and write
180564DC000
trusted library allocation
page read and write
DA4000
heap
page read and write
18053DBD000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
18056383000
trusted library allocation
page read and write
180562D7000
trusted library allocation
page read and write
1805F1F7000
trusted library allocation
page read and write
180538F9000
trusted library allocation
page read and write
180577DE000
trusted library allocation
page read and write
18053669000
trusted library allocation
page read and write
180534A2000
trusted library allocation
page read and write
1805F476000
trusted library allocation
page read and write
1805C7C5000
trusted library allocation
page read and write
1805396C000
trusted library allocation
page read and write
18056351000
trusted library allocation
page read and write
18056344000
trusted library allocation
page read and write
1804F982000
trusted library allocation
page read and write
1805756C000
trusted library allocation
page read and write
180609BD000
trusted library allocation
page read and write
1FAC8540000
heap
page read and write
18054537000
trusted library allocation
page read and write
180609E8000
trusted library allocation
page read and write
1805365A000
trusted library allocation
page read and write
1804A574000
heap
page read and write
180575C8000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18055333000
trusted library allocation
page read and write
18060A13000
trusted library allocation
page read and write
1804A553000
heap
page read and write
180534C5000
trusted library allocation
page read and write
1805394F000
trusted library allocation
page read and write
1805C7BE000
trusted library allocation
page read and write
180577ED000
trusted library allocation
page read and write
1804A544000
heap
page read and write
1804A565000
heap
page read and write
18054A5A000
trusted library allocation
page read and write
7185A3E000
unkown
page readonly
1804A524000
heap
page read and write
18051283000
heap
page read and write
180509C9000
trusted library allocation
page read and write
1804A54A000
heap
page read and write
180563A6000
trusted library allocation
page read and write
180578C9000
trusted library allocation
page read and write
1804A52D000
heap
page read and write
1805FD61000
heap
page read and write
1805533E000
trusted library allocation
page read and write
1804A587000
heap
page read and write
1804A55E000
heap
page read and write
1805F7D0000
trusted library allocation
page read and write
18050AF1000
trusted library allocation
page read and write
837EC7E000
unkown
page readonly
1804A553000
heap
page read and write
1805DABE000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18056343000
trusted library allocation
page read and write
1805DAF7000
trusted library allocation
page read and write
1805631F000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180563F4000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1AE47AAD000
heap
page read and write
180578C2000
trusted library allocation
page read and write
18056351000
trusted library allocation
page read and write
1805641D000
trusted library allocation
page read and write
18057553000
trusted library allocation
page read and write
18056254000
trusted library allocation
page read and write
180562A3000
trusted library allocation
page read and write
837ECBE000
stack
page read and write
1804A581000
heap
page read and write
1804A574000
heap
page read and write
1AE47C20000
heap
page read and write
1804EE81000
trusted library allocation
page read and write
18055DD1000
trusted library allocation
page read and write
18060B12000
trusted library allocation
page read and write
1805F7AC000
trusted library allocation
page read and write
18056268000
trusted library allocation
page read and write
1805E3E4000
trusted library allocation
page read and write
180545DA000
trusted library allocation
page read and write
1805456F000
trusted library allocation
page read and write
1804A51D000
heap
page read and write
1804A531000
heap
page read and write
DA4000
heap
page read and write
1805FD61000
heap
page read and write
1805FD4E000
heap
page read and write
5BA000
stack
page read and write
1805C7E1000
trusted library allocation
page read and write
1805DA54000
trusted library allocation
page read and write
180563EF000
trusted library allocation
page read and write
150DC15D000
trusted library allocation
page read and write
1805126A000
heap
page read and write
2B5A9BF1000
trusted library allocation
page execute read
1805FD39000
heap
page read and write
180578C6000
trusted library allocation
page read and write
1805FC26000
trusted library allocation
page read and write
18050CBC000
trusted library allocation
page read and write
150DBEC0000
heap
page read and write
1805394F000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18056124000
trusted library allocation
page read and write
18055888000
trusted library allocation
page read and write
18053D97000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A53E000
heap
page read and write
510000
unkown
page write copy
1805532C000
trusted library allocation
page read and write
180575B7000
trusted library allocation
page read and write
1FAC84A9000
heap
page read and write
1FAC84CA000
heap
page read and write
18058C02000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A526000
heap
page read and write
1805FBC3000
trusted library allocation
page read and write
1804F876000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180539ED000
trusted library allocation
page read and write
18055890000
trusted library allocation
page read and write
1FAC84CD000
heap
page read and write
180510C3000
trusted library allocation
page read and write
1805C7B0000
trusted library allocation
page read and write
180563CD000
trusted library allocation
page read and write
180563CD000
trusted library allocation
page read and write
18055876000
trusted library allocation
page read and write
18053433000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805BF32000
trusted library allocation
page read and write
18055396000
trusted library allocation
page read and write
1805BE8A000
trusted library allocation
page read and write
18054F86000
trusted library allocation
page read and write
1805FD01000
heap
page read and write
1805FD53000
heap
page read and write
1805583E000
trusted library allocation
page read and write
18053937000
trusted library allocation
page read and write
180534FD000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1804A54D000
heap
page read and write
1805509F000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
180576BA000
trusted library allocation
page read and write
1805E3C5000
trusted library allocation
page read and write
1804A526000
heap
page read and write
1804A574000
heap
page read and write
18053991000
trusted library allocation
page read and write
18053824000
trusted library allocation
page read and write
18055031000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
24249E3D000
trusted library allocation
page read and write
1804A515000
heap
page read and write
1805E2E5000
trusted library allocation
page read and write
1805F76A000
trusted library allocation
page read and write
1804A578000
heap
page read and write
18053230000
trusted library allocation
page read and write
180563CD000
trusted library allocation
page read and write
1FAC78C7000
trusted library allocation
page read and write
18053CA4000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1804A525000
heap
page read and write
1804A543000
heap
page read and write
1805FDA2000
heap
page read and write
1804A54D000
heap
page read and write
180572B5000
trusted library allocation
page read and write
1805BE0F000
trusted library allocation
page read and write
1805E343000
trusted library allocation
page read and write
1804F9E0000
trusted library allocation
page read and write
18055CED000
trusted library allocation
page read and write
2CFE2A0A000
trusted library allocation
page read and write
18054AA9000
trusted library allocation
page read and write
1805636B000
trusted library allocation
page read and write
36A0000
heap
page read and write
1804A544000
heap
page read and write
18054BFC000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
18054540000
trusted library allocation
page read and write
18051272000
heap
page read and write
1804A545000
heap
page read and write
18053DBD000
trusted library allocation
page read and write
1805607C000
trusted library allocation
page read and write
180561C5000
trusted library allocation
page read and write
1805542B000
trusted library allocation
page read and write
1FAC78F5000
trusted library allocation
page read and write
18053DC0000
trusted library allocation
page read and write
18054218000
trusted library allocation
page read and write
1805123F000
heap
page read and write
18056FAD000
trusted library allocation
page read and write
1804A524000
heap
page read and write
1805586B000
trusted library allocation
page read and write
18056F50000
trusted library allocation
page read and write
1805324C000
trusted library allocation
page read and write
18056389000
trusted library allocation
page read and write
1FAC8521000
heap
page read and write
1806085E000
trusted library allocation
page read and write
180534A2000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
1805619F000
trusted library allocation
page read and write
1804A546000
heap
page read and write
180534AE000
trusted library allocation
page read and write
1805C763000
trusted library allocation
page read and write
18056617000
trusted library allocation
page read and write
1805586F000
trusted library allocation
page read and write
18053DF1000
trusted library allocation
page read and write
1804A529000
heap
page read and write
1805F720000
trusted library allocation
page read and write
150DBF60000
heap
page read and write
1805DA3F000
trusted library allocation
page read and write
1805DA28000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A544000
heap
page read and write
1805756C000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18057553000
trusted library allocation
page read and write
180544F0000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805759E000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
180558DB000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805FD64000
heap
page read and write
150DC000000
trusted library allocation
page read and write
1804F9DB000
trusted library allocation
page read and write
18053920000
trusted library allocation
page read and write
180575E6000
trusted library allocation
page read and write
18055177000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
18053934000
trusted library allocation
page read and write
1805C76E000
trusted library allocation
page read and write
1A34000
heap
page read and write
150DC100000
trusted library allocation
page read and write
180609DF000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18057587000
trusted library allocation
page read and write
1805128C000
heap
page read and write
1FAC73A0000
unclassified section
page readonly
1804A543000
heap
page read and write
24249DE7000
trusted library allocation
page read and write
18053414000
trusted library allocation
page read and write
180575BB000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A553000
heap
page read and write
18056199000
trusted library allocation
page read and write
18054E5C000
trusted library allocation
page read and write
18056605000
trusted library allocation
page read and write
1805C713000
trusted library allocation
page read and write
1804F975000
trusted library allocation
page read and write
18056040000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
1804A546000
heap
page read and write
1805F7F1000
trusted library allocation
page read and write
1805DA1A000
trusted library allocation
page read and write
1804A527000
heap
page read and write
18055EAD000
trusted library allocation
page read and write
180577DE000
trusted library allocation
page read and write
1804A554000
heap
page read and write
18055F30000
trusted library allocation
page read and write
1805582F000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18054A7C000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
18055393000
trusted library allocation
page read and write
180563E3000
trusted library allocation
page read and write
1FAC852C000
heap
page read and write
180562FA000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1805FCAD000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
180576D6000
trusted library allocation
page read and write
180509A5000
trusted library allocation
page read and write
1805586F000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
18053D1A000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A54C000
heap
page read and write
1FAC85B8000
heap
page read and write
1804A52E000
heap
page read and write
1804A53E000
heap
page read and write
18055874000
trusted library allocation
page read and write
18054A6C000
trusted library allocation
page read and write
1805C7A8000
trusted library allocation
page read and write
4AAB96E000
unkown
page readonly
1804A524000
heap
page read and write
1805628F000
trusted library allocation
page read and write
1804A52D000
heap
page read and write
1805FA79000
trusted library allocation
page read and write
1804A515000
heap
page read and write
1804A538000
heap
page read and write
180577E8000
trusted library allocation
page read and write
180564D4000
trusted library allocation
page read and write
180609D2000
trusted library allocation
page read and write
1805FA75000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
180563DD000
trusted library allocation
page read and write
180558AB000
trusted library allocation
page read and write
1804A51B000
heap
page read and write
18060B23000
trusted library allocation
page read and write
18054FD6000
trusted library allocation
page read and write
1805727A000
trusted library allocation
page read and write
1805349D000
trusted library allocation
page read and write
1805C799000
trusted library allocation
page read and write
150DC16A000
trusted library allocation
page read and write
1805454B000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
1805FC86000
trusted library allocation
page read and write
180576F5000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1804A52C000
heap
page read and write
1804A515000
heap
page read and write
1805FC84000
trusted library allocation
page read and write
1805C7A8000
trusted library allocation
page read and write
18056193000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1FAC7E10000
heap
page read and write
1804F8F6000
trusted library allocation
page read and write
DDA000
heap
page read and write
180578DF000
trusted library allocation
page read and write
1805FA23000
trusted library allocation
page read and write
1805755B000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1804F97D000
trusted library allocation
page read and write
1805584A000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
1804A574000
heap
page read and write
E05000
heap
page read and write
1805DA9E000
trusted library allocation
page read and write
1805F1D5000
trusted library allocation
page read and write
18054E6E000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
1804A53E000
heap
page read and write
1805128D000
heap
page read and write
180563DD000
trusted library allocation
page read and write
1805103A000
trusted library allocation
page read and write
DFC000
heap
page read and write
18057384000
trusted library allocation
page read and write
180578C6000
trusted library allocation
page read and write
1804A543000
heap
page read and write
150DC304000
heap
page read and write
24249A72000
unclassified section
page read and write
1805543C000
trusted library allocation
page read and write
1AE47AB9000
heap
page read and write
1FAC857C000
heap
page read and write
24249DC8000
trusted library allocation
page read and write
18056343000
trusted library allocation
page read and write
180563DF000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805DA95000
trusted library allocation
page read and write
1805617C000
trusted library allocation
page read and write
18050C3F000
trusted library allocation
page read and write
1804A527000
heap
page read and write
180575A3000
trusted library allocation
page read and write
1805386D000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
1804A57E000
heap
page read and write
1804A553000
heap
page read and write
1804EE90000
trusted library allocation
page read and write
1805652B000
trusted library allocation
page read and write
1805530C000
trusted library allocation
page read and write
180609D5000
trusted library allocation
page read and write
1805DAAA000
trusted library allocation
page read and write
DA4000
heap
page read and write
18054CE0000
trusted library allocation
page read and write
1805FD64000
heap
page read and write
180562C2000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A524000
heap
page read and write
1804EEB3000
trusted library allocation
page read and write
18053977000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A538000
heap
page read and write
1804A529000
heap
page read and write
18056FF5000
trusted library allocation
page read and write
1805454D000
trusted library allocation
page read and write
18054FD4000
trusted library allocation
page read and write
1804F9E0000
trusted library allocation
page read and write
180575FD000
trusted library allocation
page read and write
180575E6000
trusted library allocation
page read and write
180553BF000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805628D000
trusted library allocation
page read and write
18060991000
trusted library allocation
page read and write
1804A531000
heap
page read and write
18055387000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18055261000
trusted library allocation
page read and write
1806085C000
trusted library allocation
page read and write
180564DE000
trusted library allocation
page read and write
18057587000
trusted library allocation
page read and write
18060B37000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A543000
heap
page read and write
1804A52A000
heap
page read and write
1805624C000
trusted library allocation
page read and write
180575A3000
trusted library allocation
page read and write
1804A565000
heap
page read and write
1FAC8520000
heap
page read and write
1FAC8599000
heap
page read and write
1805DAF2000
trusted library allocation
page read and write
18050921000
trusted library allocation
page read and write
18054FD4000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A55E000
heap
page read and write
1804A525000
heap
page read and write
1804A531000
heap
page read and write
1805637C000
trusted library allocation
page read and write
1805C772000
trusted library allocation
page read and write
E03000
heap
page read and write
18060A23000
trusted library allocation
page read and write
180553AF000
trusted library allocation
page read and write
1805392F000
trusted library allocation
page read and write
1805FD4E000
heap
page read and write
E05000
heap
page read and write
1804A543000
heap
page read and write
1805FA73000
trusted library allocation
page read and write
18054AF2000
trusted library allocation
page read and write
1805FD64000
heap
page read and write
1805395F000
trusted library allocation
page read and write
18055463000
trusted library allocation
page read and write
18060991000
trusted library allocation
page read and write
1805F4C5000
trusted library allocation
page read and write
18055872000
trusted library allocation
page read and write
1805BE7E000
trusted library allocation
page read and write
1804A52D000
heap
page read and write
1805FDEB000
heap
page read and write
1805588C000
trusted library allocation
page read and write
18054532000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A543000
heap
page read and write
18050C98000
trusted library allocation
page read and write
180544EB000
trusted library allocation
page read and write
18053DC1000
trusted library allocation
page read and write
1804A515000
heap
page read and write
1804A55E000
heap
page read and write
1804A50F000
heap
page read and write
1804A544000
heap
page read and write
1804A57E000
heap
page read and write
18057553000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1804A54C000
heap
page read and write
1805E401000
trusted library allocation
page read and write
18056271000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180563E3000
trusted library allocation
page read and write
1805FD34000
heap
page read and write
1804A54B000
heap
page read and write
180566B8000
trusted library allocation
page read and write
180576B8000
trusted library allocation
page read and write
18056145000
trusted library allocation
page read and write
180578BE000
trusted library allocation
page read and write
180553AA000
trusted library allocation
page read and write
1804A574000
heap
page read and write
180563C7000
trusted library allocation
page read and write
18050C6D000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1805FD4E000
heap
page read and write
18056080000
trusted library allocation
page read and write
1804EEDF000
trusted library allocation
page read and write
180572E5000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18057679000
trusted library allocation
page read and write
18056FF5000
trusted library allocation
page read and write
18057698000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1804A574000
heap
page read and write
18051283000
heap
page read and write
1FAC7550000
heap
page read and write
1804A50D000
heap
page read and write
18054FDD000
trusted library allocation
page read and write
1805C89A000
trusted library allocation
page read and write
1805621C000
trusted library allocation
page read and write
1804A547000
heap
page read and write
1804A53E000
heap
page read and write
1805647C000
trusted library allocation
page read and write
18054CD3000
trusted library allocation
page read and write
1805F1F9000
trusted library allocation
page read and write
1804F9EB000
trusted library allocation
page read and write
24249A7F000
unclassified section
page read and write
18054530000
trusted library allocation
page read and write
1804A524000
heap
page read and write
1805F7EB000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
18054D07000
trusted library allocation
page read and write
180563A6000
trusted library allocation
page read and write
18054BDF000
trusted library allocation
page read and write
1805373C000
trusted library allocation
page read and write
1805DA5A000
trusted library allocation
page read and write
1804A581000
heap
page read and write
1805BEA5000
trusted library allocation
page read and write
1805634A000
trusted library allocation
page read and write
1805E2C8000
trusted library allocation
page read and write
1805DA05000
trusted library allocation
page read and write
1805EF80000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18054E5E000
trusted library allocation
page read and write
1805C76B000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18060B46000
trusted library allocation
page read and write
18050D29000
trusted library allocation
page read and write
18054A6D000
trusted library allocation
page read and write
180562A7000
trusted library allocation
page read and write
1804A554000
heap
page read and write
18053D32000
trusted library allocation
page read and write
1804A578000
heap
page read and write
18055393000
trusted library allocation
page read and write
24249C00000
trusted library allocation
page read and write
150DC315000
heap
page read and write
24249882000
remote allocation
page execute read
1804FB63000
trusted library allocation
page read and write
1805FBC1000
trusted library allocation
page read and write
1805625F000
trusted library allocation
page read and write
18056165000
trusted library allocation
page read and write
18050973000
trusted library allocation
page read and write
18056363000
trusted library allocation
page read and write
18055878000
trusted library allocation
page read and write
18053934000
trusted library allocation
page read and write
150DBF80000
unclassified section
page readonly
180553A5000
trusted library allocation
page read and write
180563F4000
trusted library allocation
page read and write
18056465000
trusted library allocation
page read and write
18054C8B000
trusted library allocation
page read and write
180545A5000
trusted library allocation
page read and write
1805DA19000
trusted library allocation
page read and write
18056438000
trusted library allocation
page read and write
18056244000
trusted library allocation
page read and write
180553BF000
trusted library allocation
page read and write
18054BDE000
trusted library allocation
page read and write
18056084000
trusted library allocation
page read and write
24249A70000
unclassified section
page read and write
18053DBB000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1805657B000
trusted library allocation
page read and write
150DC1F6000
trusted library allocation
page read and write
837B9C8000
stack
page read and write
1804A553000
heap
page read and write
1804A515000
heap
page read and write
1805C7B8000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
24249E32000
trusted library allocation
page read and write
1804FB00000
trusted library allocation
page read and write
1805582F000
trusted library allocation
page read and write
1804A583000
heap
page read and write
1806087C000
trusted library allocation
page read and write
18056F98000
trusted library allocation
page read and write
18055895000
trusted library allocation
page read and write
1805BF76000
trusted library allocation
page read and write
18060B37000
trusted library allocation
page read and write
1805377A000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
180609DC000
trusted library allocation
page read and write
1805C73A000
trusted library allocation
page read and write
18055893000
trusted library allocation
page read and write
1804A574000
heap
page read and write
150DBEE0000
heap
page read and write
1804A50F000
heap
page read and write
1804A50F000
heap
page read and write
1805584A000
trusted library allocation
page read and write
1805631D000
trusted library allocation
page read and write
24249B30000
heap
page read and write
1FAC853C000
heap
page read and write
1805DABA000
trusted library allocation
page read and write
150DC1DB000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1805581D000
trusted library allocation
page read and write
1804A543000
heap
page read and write
24249D97000
trusted library allocation
page read and write
1804A554000
heap
page read and write
24249D7B000
trusted library allocation
page read and write
18056475000
trusted library allocation
page read and write
18054285000
trusted library allocation
page read and write
4AAE47E000
stack
page read and write
4AAB9AD000
stack
page read and write
1FAC85AC000
heap
page read and write
DA4000
heap
page read and write
180563F1000
trusted library allocation
page read and write
1805DA1A000
trusted library allocation
page read and write
180563CD000
trusted library allocation
page read and write
180542FD000
trusted library allocation
page read and write
1805C7BE000
trusted library allocation
page read and write
1805624C000
trusted library allocation
page read and write
180565C3000
trusted library allocation
page read and write
1805C7A8000
trusted library allocation
page read and write
180558B6000
trusted library allocation
page read and write
18053DBD000
trusted library allocation
page read and write
18054E72000
trusted library allocation
page read and write
180551C2000
trusted library allocation
page read and write
18055D8D000
trusted library allocation
page read and write
18055273000
trusted library allocation
page read and write
18050C23000
trusted library allocation
page read and write
DEA000
heap
page read and write
18055461000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1805BEA5000
trusted library allocation
page read and write
18053970000
trusted library allocation
page read and write
18056F3E000
trusted library allocation
page read and write
180558B0000
trusted library allocation
page read and write
18054AF5000
trusted library allocation
page read and write
180545BF000
trusted library allocation
page read and write
180554D0000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1805FCDC000
trusted library allocation
page read and write
DFC000
heap
page read and write
1804A528000
heap
page read and write
18055915000
trusted library allocation
page read and write
18056122000
trusted library allocation
page read and write
1804A525000
heap
page read and write
180572DA000
trusted library allocation
page read and write
180544BD000
trusted library allocation
page read and write
180550A4000
trusted library allocation
page read and write
18050CC7000
trusted library allocation
page read and write
180538F9000
trusted library allocation
page read and write
18054FE4000
trusted library allocation
page read and write
1805DA6A000
trusted library allocation
page read and write
180575A6000
trusted library allocation
page read and write
1805DA65000
trusted library allocation
page read and write
18054583000
trusted library allocation
page read and write
1804F9EB000
trusted library allocation
page read and write
1805538D000
trusted library allocation
page read and write
24249800000
unclassified section
page readonly
180575E0000
trusted library allocation
page read and write
1805E2A3000
trusted library allocation
page read and write
1804A54A000
heap
page read and write
18055874000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
1804A538000
heap
page read and write
1FAC7E31000
heap
page read and write
180561A9000
trusted library allocation
page read and write
18054AAE000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
18055478000
trusted library allocation
page read and write
180561F8000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
18054B0B000
trusted library allocation
page read and write
18054C67000
trusted library allocation
page read and write
18057563000
trusted library allocation
page read and write
150DC1A2000
trusted library allocation
page read and write
18054CF7000
trusted library allocation
page read and write
18056235000
trusted library allocation
page read and write
1FAC7420000
unclassified section
page readonly
1804A54D000
heap
page read and write
18055899000
trusted library allocation
page read and write
1805639A000
trusted library allocation
page read and write
18053991000
trusted library allocation
page read and write
1805626A000
trusted library allocation
page read and write
18056F62000
trusted library allocation
page read and write
1804A546000
heap
page read and write
180572DA000
trusted library allocation
page read and write
18050C37000
trusted library allocation
page read and write
18055378000
trusted library allocation
page read and write
180609E8000
trusted library allocation
page read and write
1804A544000
heap
page read and write
1805C834000
trusted library allocation
page read and write
180553E7000
trusted library allocation
page read and write
1805389A000
trusted library allocation
page read and write
180572E5000
trusted library allocation
page read and write
180558E7000
trusted library allocation
page read and write
18050A54000
trusted library allocation
page read and write
1FAC859A000
heap
page read and write
180558DB000
trusted library allocation
page read and write
18053D0E000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
BCF000
stack
page read and write
1805FD41000
heap
page read and write
180575E6000
trusted library allocation
page read and write
18056297000
trusted library allocation
page read and write
18050CF0000
trusted library allocation
page read and write
180578E3000
trusted library allocation
page read and write
1806096D000
trusted library allocation
page read and write
1991FF000
stack
page read and write
1805370C000
trusted library allocation
page read and write
18053DE4000
trusted library allocation
page read and write
1804A554000
heap
page read and write
180561C7000
trusted library allocation
page read and write
DD8000
heap
page read and write
1804A54C000
heap
page read and write
1804EE89000
trusted library allocation
page read and write
DFC000
heap
page read and write
18055322000
trusted library allocation
page read and write
1804EECD000
trusted library allocation
page read and write
18056461000
trusted library allocation
page read and write
18055895000
trusted library allocation
page read and write
1804A553000
heap
page read and write
180534A2000
trusted library allocation
page read and write
18054224000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18057598000
trusted library allocation
page read and write
1805C7D4000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1804A574000
heap
page read and write
18060995000
trusted library allocation
page read and write
18056637000
trusted library allocation
page read and write
1805C7D0000
trusted library allocation
page read and write
18055473000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1805E348000
trusted library allocation
page read and write
18060A2A000
trusted library allocation
page read and write
1805C770000
trusted library allocation
page read and write
1804F966000
trusted library allocation
page read and write
18053636000
trusted library allocation
page read and write
1805889E000
trusted library allocation
page read and write
150DC400000
trusted library allocation
page read and write
1FAC852C000
heap
page read and write
1804A53E000
heap
page read and write
1804A51B000
heap
page read and write
18055D4A000
trusted library allocation
page read and write
18054BFC000
trusted library allocation
page read and write
1805F17F000
trusted library allocation
page read and write
180512D8000
heap
page read and write
1804A546000
heap
page read and write
1805DA54000
trusted library allocation
page read and write
18054E57000
trusted library allocation
page read and write
1804A515000
heap
page read and write
1804A546000
heap
page read and write
1805759A000
trusted library allocation
page read and write
1804A587000
heap
page read and write
180538F9000
trusted library allocation
page read and write
1805FD34000
heap
page read and write
1804A554000
heap
page read and write
24249D79000
trusted library allocation
page read and write
180554C2000
trusted library allocation
page read and write
1805F4EE000
trusted library allocation
page read and write
18055807000
trusted library allocation
page read and write
1AE47ABC000
heap
page read and write
180572BB000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180510DC000
trusted library allocation
page read and write
1804A554000
heap
page read and write
180564D4000
trusted library allocation
page read and write
1804A527000
heap
page read and write
18054E77000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18060A2E000
trusted library allocation
page read and write
18054F9F000
trusted library allocation
page read and write
1805BF00000
trusted library allocation
page read and write
18055082000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1805C852000
trusted library allocation
page read and write
1804A544000
heap
page read and write
180553E7000
trusted library allocation
page read and write
1804A546000
heap
page read and write
1805099D000
trusted library allocation
page read and write
18054BC2000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
18056692000
trusted library allocation
page read and write
18055CD1000
trusted library allocation
page read and write
18050CE3000
trusted library allocation
page read and write
1804F9DB000
trusted library allocation
page read and write
18055077000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
1804A554000
heap
page read and write
1805F1B5000
trusted library allocation
page read and write
1FAC8531000
heap
page read and write
180553A5000
trusted library allocation
page read and write
180563A6000
trusted library allocation
page read and write
1805C7AB000
trusted library allocation
page read and write
1805778E000
trusted library allocation
page read and write
1805F7DD000
trusted library allocation
page read and write
1805FD3E000
heap
page read and write
1805E3AC000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805F472000
trusted library allocation
page read and write
18056386000
trusted library allocation
page read and write
4AAB9EE000
unkown
page readonly
18054296000
trusted library allocation
page read and write
180562E9000
trusted library allocation
page read and write
18053DC3000
trusted library allocation
page read and write
1804A543000
heap
page read and write
180543F2000
trusted library allocation
page read and write
180563D2000
trusted library allocation
page read and write
514000
unkown
page readonly
18050CDE000
trusted library allocation
page read and write
18060A0E000
trusted library allocation
page read and write
18054412000
trusted library allocation
page read and write
18053831000
trusted library allocation
page read and write
1805F1D5000
trusted library allocation
page read and write
1804A525000
heap
page read and write
1804A55E000
heap
page read and write
18053772000
trusted library allocation
page read and write
180575F4000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1804A55E000
heap
page read and write
18055041000
trusted library allocation
page read and write
18053DC3000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
18053DC0000
trusted library allocation
page read and write
1805649E000
trusted library allocation
page read and write
180558AB000
trusted library allocation
page read and write
150DBCE0000
unclassified section
page readonly
1FAC8528000
heap
page read and write
180575B3000
trusted library allocation
page read and write
18054393000
trusted library allocation
page read and write
180576E7000
trusted library allocation
page read and write
1804A524000
heap
page read and write
1804A538000
heap
page read and write
1804A54D000
heap
page read and write
18056438000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805634D000
trusted library allocation
page read and write
1804A525000
heap
page read and write
1804A574000
heap
page read and write
1805FCA0000
trusted library allocation
page read and write
18054BCF000
trusted library allocation
page read and write
18053758000
trusted library allocation
page read and write
1805755B000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18050988000
trusted library allocation
page read and write
1805C77D000
trusted library allocation
page read and write
18051067000
trusted library allocation
page read and write
1805660B000
trusted library allocation
page read and write
1805372E000
trusted library allocation
page read and write
1804A574000
heap
page read and write
180609A7000
trusted library allocation
page read and write
DA4000
heap
page read and write
18054C89000
trusted library allocation
page read and write
18054A5D000
trusted library allocation
page read and write
1805C799000
trusted library allocation
page read and write
18054BC0000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1804A574000
heap
page read and write
1805FD4F000
heap
page read and write
1805766E000
trusted library allocation
page read and write
1805393C000
trusted library allocation
page read and write
18053CD8000
trusted library allocation
page read and write
1804A52D000
heap
page read and write
24249A24000
heap
page read and write
180554A8000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805C7ED000
trusted library allocation
page read and write
1804A530000
heap
page read and write
18054281000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180561BF000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805FD59000
heap
page read and write
1805509F000
trusted library allocation
page read and write
180553C3000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
180563F6000
trusted library allocation
page read and write
1805BE29000
trusted library allocation
page read and write
1805507E000
trusted library allocation
page read and write
150DC10C000
trusted library allocation
page read and write
180552B5000
trusted library allocation
page read and write
18060968000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A54A000
heap
page read and write
1805FD39000
heap
page read and write
1804A587000
heap
page read and write
180609A8000
trusted library allocation
page read and write
150DC300000
heap
page read and write
1805E433000
trusted library allocation
page read and write
1805538A000
trusted library allocation
page read and write
180609DF000
trusted library allocation
page read and write
1805441D000
trusted library allocation
page read and write
1804A524000
heap
page read and write
180560CC000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1804A546000
heap
page read and write
1805C7FE000
trusted library allocation
page read and write
18060B1D000
trusted library allocation
page read and write
18050C40000
trusted library allocation
page read and write
1805ED00000
trusted library allocation
page read and write
1804A51D000
heap
page read and write
1804A53E000
heap
page read and write
1805773F000
trusted library allocation
page read and write
150DBF50000
unclassified section
page read and write
180545D1000
trusted library allocation
page read and write
18050CF6000
trusted library allocation
page read and write
180563DD000
trusted library allocation
page read and write
1AE45E90000
heap
page read and write
1805776B000
trusted library allocation
page read and write
18054BFC000
trusted library allocation
page read and write
180560F0000
trusted library allocation
page read and write
18054B38000
trusted library allocation
page read and write
18055CAE000
trusted library allocation
page read and write
1805126A000
heap
page read and write
1804A54B000
heap
page read and write
18054A99000
trusted library allocation
page read and write
180532FA000
trusted library allocation
page read and write
1804A542000
heap
page read and write
1804A53F000
heap
page read and write
18060A10000
trusted library allocation
page read and write
18056226000
trusted library allocation
page read and write
18060A30000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A55E000
heap
page read and write
1805F4D7000
trusted library allocation
page read and write
18054294000
trusted library allocation
page read and write
180562EE000
trusted library allocation
page read and write
1805DA6E000
trusted library allocation
page read and write
1804A577000
heap
page read and write
1804A554000
heap
page read and write
1805537A000
trusted library allocation
page read and write
1805DA8C000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180532BA000
trusted library allocation
page read and write
18055F47000
trusted library allocation
page read and write
180539F7000
trusted library allocation
page read and write
18054ABE000
trusted library allocation
page read and write
1805F455000
trusted library allocation
page read and write
18055EC9000
trusted library allocation
page read and write
18054543000
trusted library allocation
page read and write
1AE47AB8000
heap
page read and write
1805FA7B000
trusted library allocation
page read and write
1805DABE000
trusted library allocation
page read and write
1805758A000
trusted library allocation
page read and write
180563F6000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18057794000
trusted library allocation
page read and write
1804A524000
heap
page read and write
1805425B000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
18055D51000
trusted library allocation
page read and write
18055844000
trusted library allocation
page read and write
1FAC77AA000
unkown
page execute read
1805C74F000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180558A7000
trusted library allocation
page read and write
180564EB000
trusted library allocation
page read and write
18060A2A000
trusted library allocation
page read and write
18055868000
trusted library allocation
page read and write
1805397D000
trusted library allocation
page read and write
18053299000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A54D000
heap
page read and write
1804A53E000
heap
page read and write
1804A592000
heap
page read and write
1804A538000
heap
page read and write
1804A54D000
heap
page read and write
1805E36D000
trusted library allocation
page read and write
1805452E000
trusted library allocation
page read and write
1804A51F000
heap
page read and write
1805FD64000
heap
page read and write
18060B3F000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
180561E4000
trusted library allocation
page read and write
180575A3000
trusted library allocation
page read and write
18055E9E000
trusted library allocation
page read and write
1805395E000
trusted library allocation
page read and write
18057549000
trusted library allocation
page read and write
18056275000
trusted library allocation
page read and write
18055868000
trusted library allocation
page read and write
18056226000
trusted library allocation
page read and write
1805666E000
trusted library allocation
page read and write
18054CF4000
trusted library allocation
page read and write
1805651B000
trusted library allocation
page read and write
18055387000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1804A538000
heap
page read and write
18054E90000
trusted library allocation
page read and write
1805625F000
trusted library allocation
page read and write
18055026000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
18055DDE000
trusted library allocation
page read and write
18053DF3000
trusted library allocation
page read and write
18053985000
trusted library allocation
page read and write
18050A52000
trusted library allocation
page read and write
180538F9000
trusted library allocation
page read and write
18055868000
trusted library allocation
page read and write
18053980000
trusted library allocation
page read and write
1805FD64000
heap
page read and write
1FAC8599000
heap
page read and write
1804A524000
heap
page read and write
18057894000
trusted library allocation
page read and write
18056386000
trusted library allocation
page read and write
1805F764000
trusted library allocation
page read and write
18055372000
trusted library allocation
page read and write
1805645F000
trusted library allocation
page read and write
18050CDD000
trusted library allocation
page read and write
837F57E000
stack
page read and write
1805BE9D000
trusted library allocation
page read and write
18054BBA000
trusted library allocation
page read and write
1804A581000
heap
page read and write
180560E8000
trusted library allocation
page read and write
18053D1D000
trusted library allocation
page read and write
1804A547000
heap
page read and write
F04FFFC000
stack
page read and write
1804A52E000
heap
page read and write
1805C8C7000
trusted library allocation
page read and write
18053875000
trusted library allocation
page read and write
18055CF4000
trusted library allocation
page read and write
1804A544000
heap
page read and write
1804A565000
heap
page read and write
180573D2000
trusted library allocation
page read and write
1805779E000
trusted library allocation
page read and write
1805FC44000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
1804A54B000
heap
page read and write
18054C8D000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
18056254000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
1804A553000
heap
page read and write
1805FD4F000
heap
page read and write
18054C7C000
trusted library allocation
page read and write
18057672000
trusted library allocation
page read and write
180566A0000
trusted library allocation
page read and write
1805FD3E000
heap
page read and write
18057582000
trusted library allocation
page read and write
18054AF8000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
180566B8000
trusted library allocation
page read and write
180561F8000
trusted library allocation
page read and write
18054AD3000
trusted library allocation
page read and write
18050CA6000
trusted library allocation
page read and write
180564E7000
trusted library allocation
page read and write
18054583000
trusted library allocation
page read and write
180608B1000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
180577FC000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1805C77D000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1FAC8562000
heap
page read and write
18050C7A000
trusted library allocation
page read and write
18055884000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805DAE8000
trusted library allocation
page read and write
1804A547000
heap
page read and write
180572EE000
trusted library allocation
page read and write
18055426000
trusted library allocation
page read and write
1FAC7590000
heap
page read and write
1804A55E000
heap
page read and write
18054EB4000
trusted library allocation
page read and write
DE6000
heap
page read and write
1805C7A8000
trusted library allocation
page read and write
DE1000
heap
page read and write
18056668000
trusted library allocation
page read and write
1804A553000
heap
page read and write
18056454000
trusted library allocation
page read and write
18055F94000
trusted library allocation
page read and write
1805C7ED000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18054560000
trusted library allocation
page read and write
180577FC000
trusted library allocation
page read and write
1805FD01000
heap
page read and write
1804A528000
heap
page read and write
18056086000
trusted library allocation
page read and write
1804A524000
heap
page read and write
180561CE000
trusted library allocation
page read and write
1804A533000
heap
page read and write
1804A54D000
heap
page read and write
1804A51B000
heap
page read and write
18051272000
heap
page read and write
18055832000
trusted library allocation
page read and write
1805128E000
heap
page read and write
1805BEAD000
trusted library allocation
page read and write
18054BDE000
trusted library allocation
page read and write
18054573000
trusted library allocation
page read and write
1805FADE000
trusted library allocation
page read and write
18057534000
trusted library allocation
page read and write
180564A6000
trusted library allocation
page read and write
1805F4E1000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A574000
heap
page read and write
1804A554000
heap
page read and write
180563F6000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
1804A538000
heap
page read and write
150DC173000
trusted library allocation
page read and write
1805628B000
trusted library allocation
page read and write
18054FA6000
trusted library allocation
page read and write
1804A587000
heap
page read and write
180553C3000
trusted library allocation
page read and write
1805FBC7000
trusted library allocation
page read and write
1805585E000
trusted library allocation
page read and write
18053D18000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
1805DA95000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1805584A000
trusted library allocation
page read and write
1804EE9E000
trusted library allocation
page read and write
18056372000
trusted library allocation
page read and write
180554B0000
trusted library allocation
page read and write
1805DA3F000
trusted library allocation
page read and write
180561AA000
trusted library allocation
page read and write
1804A546000
heap
page read and write
18053985000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A55E000
heap
page read and write
180563CD000
trusted library allocation
page read and write
180553BB000
trusted library allocation
page read and write
1805637C000
trusted library allocation
page read and write
18050973000
trusted library allocation
page read and write
1805F12C000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18056373000
trusted library allocation
page read and write
18054BCF000
trusted library allocation
page read and write
1FAC8599000
heap
page read and write
1804A54D000
heap
page read and write
1805128E000
heap
page read and write
1805DA5A000
trusted library allocation
page read and write
1805DA3D000
trusted library allocation
page read and write
18057563000
trusted library allocation
page read and write
18050CA1000
trusted library allocation
page read and write
1FAC8558000
heap
page read and write
18056497000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A547000
heap
page read and write
18054514000
trusted library allocation
page read and write
18050CA6000
trusted library allocation
page read and write
1805BF00000
trusted library allocation
page read and write
18056F85000
trusted library allocation
page read and write
150DC18F000
trusted library allocation
page read and write
180563C7000
trusted library allocation
page read and write
18060880000
trusted library allocation
page read and write
180576A2000
trusted library allocation
page read and write
18055E67000
trusted library allocation
page read and write
180534AC000
trusted library allocation
page read and write
18055071000
trusted library allocation
page read and write
180576EC000
trusted library allocation
page read and write
18055189000
trusted library allocation
page read and write
18054FD4000
trusted library allocation
page read and write
1804A546000
heap
page read and write
1805F7D0000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1FAC8562000
heap
page read and write
1805C740000
trusted library allocation
page read and write
18055844000
trusted library allocation
page read and write
1FAC8531000
heap
page read and write
180577F8000
trusted library allocation
page read and write
1804EEF7000
trusted library allocation
page read and write
1805FCFA000
trusted library allocation
page read and write
1805FADA000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1805503C000
trusted library allocation
page read and write
1804A527000
heap
page read and write
18054E62000
trusted library allocation
page read and write
180561F8000
trusted library allocation
page read and write
18054CDE000
trusted library allocation
page read and write
180564CE000
trusted library allocation
page read and write
1FAC84AC000
heap
page read and write
18056378000
trusted library allocation
page read and write
1FAC77A4000
unkown
page execute read
18056372000
trusted library allocation
page read and write
1804A546000
heap
page read and write
1AE46207000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
C20000
heap
page read and write
180561A0000
trusted library allocation
page read and write
180563DD000
trusted library allocation
page read and write
1805FD01000
heap
page read and write
18056386000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18056F9D000
trusted library allocation
page read and write
1804A515000
heap
page read and write
18057558000
trusted library allocation
page read and write
180553AA000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
24249D64000
trusted library allocation
page read and write
83007FE000
stack
page read and write
1804A545000
heap
page read and write
18055029000
trusted library allocation
page read and write
180563CD000
trusted library allocation
page read and write
1805DA3D000
trusted library allocation
page read and write
1FAC85B8000
heap
page read and write
1804A50D000
heap
page read and write
1804A543000
heap
page read and write
180542B7000
trusted library allocation
page read and write
18051265000
heap
page read and write
180563C7000
trusted library allocation
page read and write
1FAC84A4000
heap
page read and write
1805C8F7000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A544000
heap
page read and write
DEE000
heap
page read and write
180543AC000
trusted library allocation
page read and write
2CFE2890000
heap
page read and write
180534FD000
trusted library allocation
page read and write
180564E3000
trusted library allocation
page read and write
180561CB000
trusted library allocation
page read and write
18056679000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805124F000
heap
page read and write
1804A53E000
heap
page read and write
18055890000
trusted library allocation
page read and write
1805DA28000
trusted library allocation
page read and write
18051043000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18055922000
trusted library allocation
page read and write
1FAC8528000
heap
page read and write
1805F4CC000
trusted library allocation
page read and write
1FAC8558000
heap
page read and write
180562FA000
trusted library allocation
page read and write
1805F74F000
trusted library allocation
page read and write
180573C4000
trusted library allocation
page read and write
180609C5000
trusted library allocation
page read and write
180550AB000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1FAC84EA000
heap
page read and write
18053DC0000
trusted library allocation
page read and write
18054C0B000
trusted library allocation
page read and write
1805585C000
trusted library allocation
page read and write
1805F7F4000
trusted library allocation
page read and write
1804A546000
heap
page read and write
18054B66000
trusted library allocation
page read and write
18055874000
trusted library allocation
page read and write
1805323F000
trusted library allocation
page read and write
18055F59000
trusted library allocation
page read and write
1804F91E000
trusted library allocation
page read and write
1805F7F8000
trusted library allocation
page read and write
1805441A000
trusted library allocation
page read and write
1804A554000
heap
page read and write
18056690000
trusted library allocation
page read and write
18053465000
trusted library allocation
page read and write
18053D89000
trusted library allocation
page read and write
1805C7EF000
trusted library allocation
page read and write
1805DA95000
trusted library allocation
page read and write
18055848000
trusted library allocation
page read and write
18050C6D000
trusted library allocation
page read and write
1805DA3F000
trusted library allocation
page read and write
180534DE000
trusted library allocation
page read and write
1804A554000
heap
page read and write
18056283000
trusted library allocation
page read and write
1804F91E000
trusted library allocation
page read and write
180577ED000
trusted library allocation
page read and write
18056452000
trusted library allocation
page read and write
2CFE2830000
heap
page read and write
1804A538000
heap
page read and write
1FAC8531000
heap
page read and write
1FAC77A0000
unkown
page execute read
18055259000
trusted library allocation
page read and write
1805FCE8000
trusted library allocation
page read and write
18060987000
trusted library allocation
page read and write
18055CF4000
trusted library allocation
page read and write
1805C7A8000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
18056671000
trusted library allocation
page read and write
18056F22000
trusted library allocation
page read and write
1805396E000
trusted library allocation
page read and write
1805427F000
trusted library allocation
page read and write
18053699000
trusted library allocation
page read and write
1FAC8532000
heap
page read and write
4AAB92E000
stack
page read and write
18056F30000
trusted library allocation
page read and write
18056376000
trusted library allocation
page read and write
1805756C000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
1804A51E000
heap
page read and write
1AE47AA8000
heap
page read and write
1FAC7864000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180563CD000
trusted library allocation
page read and write
1805C769000
trusted library allocation
page read and write
180566A8000
trusted library allocation
page read and write
36A1000
heap
page read and write
1804A574000
heap
page read and write
1804A52D000
heap
page read and write
1804A54C000
heap
page read and write
1804A55E000
heap
page read and write
18060B1E000
trusted library allocation
page read and write
1805C87E000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A57E000
heap
page read and write
18056163000
trusted library allocation
page read and write
18057582000
trusted library allocation
page read and write
18054E70000
trusted library allocation
page read and write
18057558000
trusted library allocation
page read and write
4AAF47E000
stack
page read and write
18056035000
trusted library allocation
page read and write
180550A4000
trusted library allocation
page read and write
18055467000
trusted library allocation
page read and write
180553ED000
trusted library allocation
page read and write
18050C6D000
trusted library allocation
page read and write
180609A7000
trusted library allocation
page read and write
1804A526000
heap
page read and write
1805C84D000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
1804A543000
heap
page read and write
1FAC84A0000
heap
page read and write
1805FD3F000
heap
page read and write
1804A55E000
heap
page read and write
1804A53E000
heap
page read and write
1804A52E000
heap
page read and write
18056F88000
trusted library allocation
page read and write
1805453C000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1FAC85B9000
heap
page read and write
1804A538000
heap
page read and write
180545F2000
trusted library allocation
page read and write
1FAC85B8000
heap
page read and write
1805457A000
trusted library allocation
page read and write
18060B37000
trusted library allocation
page read and write
2CFE2700000
heap
page read and write
1FAC8441000
heap
page read and write
18060A13000
trusted library allocation
page read and write
18054F86000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
1804A53E000
heap
page read and write
1805454E000
trusted library allocation
page read and write
1804A515000
heap
page read and write
1805E0CE000
trusted library allocation
page read and write
1804A525000
heap
page read and write
1805667D000
trusted library allocation
page read and write
1804A525000
heap
page read and write
180575EB000
trusted library allocation
page read and write
18054324000
trusted library allocation
page read and write
180566BF000
trusted library allocation
page read and write
180554AE000
trusted library allocation
page read and write
1805538D000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
441000
unkown
page execute read
1805DABE000
trusted library allocation
page read and write
1805E287000
trusted library allocation
page read and write
18055E86000
trusted library allocation
page read and write
1804A528000
heap
page read and write
1805DA05000
trusted library allocation
page read and write
2B5A9BE1000
trusted library allocation
page execute read
180542F8000
trusted library allocation
page read and write
180576EF000
trusted library allocation
page read and write
1805759D000
trusted library allocation
page read and write
1804A553000
heap
page read and write
180552BC000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1805452C000
trusted library allocation
page read and write
18053751000
trusted library allocation
page read and write
1804A51D000
heap
page read and write
1805389A000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1804A55E000
heap
page read and write
18057775000
trusted library allocation
page read and write
18050CC1000
trusted library allocation
page read and write
18054EFE000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1805660B000
trusted library allocation
page read and write
1805F7B0000
trusted library allocation
page read and write
18054595000
trusted library allocation
page read and write
1805FCE8000
trusted library allocation
page read and write
1806088C000
trusted library allocation
page read and write
1805C781000
trusted library allocation
page read and write
24249E1E000
trusted library allocation
page read and write
837DC7E000
unkown
page readonly
18055819000
trusted library allocation
page read and write
180563A8000
trusted library allocation
page read and write
18051048000
trusted library allocation
page read and write
1805641A000
trusted library allocation
page read and write
1804A544000
heap
page read and write
18050CC1000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180545F9000
trusted library allocation
page read and write
1804A51B000
heap
page read and write
18056FA8000
trusted library allocation
page read and write
1805FC96000
trusted library allocation
page read and write
180561E9000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
180561C5000
trusted library allocation
page read and write
180563F6000
trusted library allocation
page read and write
18050CBE000
trusted library allocation
page read and write
1805FC7C000
trusted library allocation
page read and write
1805F754000
trusted library allocation
page read and write
180563F1000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A553000
heap
page read and write
180577FC000
trusted library allocation
page read and write
180561FC000
trusted library allocation
page read and write
180564C6000
trusted library allocation
page read and write
180577F9000
trusted library allocation
page read and write
837C3D8000
stack
page read and write
1804A524000
heap
page read and write
1804A530000
heap
page read and write
180563F4000
trusted library allocation
page read and write
1804A546000
heap
page read and write
18053DF4000
trusted library allocation
page read and write
18054E66000
trusted library allocation
page read and write
1FAC84A0000
heap
page read and write
1805FC7D000
trusted library allocation
page read and write
150DC403000
trusted library allocation
page read and write
837E47E000
stack
page read and write
1804A54B000
heap
page read and write
1804A54D000
heap
page read and write
1805607E000
trusted library allocation
page read and write
180563A8000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1805DA3F000
trusted library allocation
page read and write
1805DAB1000
trusted library allocation
page read and write
18057900000
trusted library allocation
page read and write
18054236000
trusted library allocation
page read and write
1805C854000
trusted library allocation
page read and write
1805BE9D000
trusted library allocation
page read and write
18054407000
trusted library allocation
page read and write
18051063000
trusted library allocation
page read and write
1805C7D8000
trusted library allocation
page read and write
18054C60000
trusted library allocation
page read and write
18054BDF000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
150DBDD0000
heap
page read and write
1804A515000
heap
page read and write
1804A510000
heap
page read and write
1804A543000
heap
page read and write
18054299000
trusted library allocation
page read and write
24249D72000
trusted library allocation
page read and write
18060913000
trusted library allocation
page read and write
180544B0000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A582000
heap
page read and write
18053934000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805FD06000
heap
page read and write
1805E305000
trusted library allocation
page read and write
1805E307000
trusted library allocation
page read and write
1805617A000
trusted library allocation
page read and write
180542A8000
trusted library allocation
page read and write
1805882F000
trusted library allocation
page read and write
180550E9000
trusted library allocation
page read and write
18054A3A000
trusted library allocation
page read and write
1804A526000
heap
page read and write
18054A86000
trusted library allocation
page read and write
1805F7F1000
trusted library allocation
page read and write
1805FA6D000
trusted library allocation
page read and write
1804A524000
heap
page read and write
180534FD000
trusted library allocation
page read and write
1804A553000
heap
page read and write
180572DC000
trusted library allocation
page read and write
1805C7ED000
trusted library allocation
page read and write
18050CA8000
trusted library allocation
page read and write
18050D23000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
18056149000
trusted library allocation
page read and write
1804A526000
heap
page read and write
18050CF6000
trusted library allocation
page read and write
18053DB0000
trusted library allocation
page read and write
1979FE000
stack
page read and write
1804A529000
heap
page read and write
1805BED9000
trusted library allocation
page read and write
18056615000
trusted library allocation
page read and write
18060B17000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A574000
heap
page read and write
1805776B000
trusted library allocation
page read and write
1805F7B0000
trusted library allocation
page read and write
1805F452000
trusted library allocation
page read and write
1806091C000
trusted library allocation
page read and write
1FAC8440000
heap
page read and write
18054A0C000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18056436000
trusted library allocation
page read and write
18055FD4000
trusted library allocation
page read and write
DFC000
heap
page read and write
1805FA6F000
trusted library allocation
page read and write
1805C7BA000
trusted library allocation
page read and write
1FAC84A9000
heap
page read and write
180562E9000
trusted library allocation
page read and write
1804A546000
heap
page read and write
1804A55E000
heap
page read and write
71836CB000
stack
page read and write
180558A2000
trusted library allocation
page read and write
1805C783000
trusted library allocation
page read and write
1804A546000
heap
page read and write
1804A55E000
heap
page read and write
18055017000
trusted library allocation
page read and write
180558B0000
trusted library allocation
page read and write
180575F8000
trusted library allocation
page read and write
18060985000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1805F1BB000
trusted library allocation
page read and write
180570A5000
trusted library allocation
page read and write
180575D6000
trusted library allocation
page read and write
1FAC759A000
heap
page read and write
18051272000
heap
page read and write
1804A538000
heap
page read and write
1804A574000
heap
page read and write
1FAC85AC000
heap
page read and write
18056192000
trusted library allocation
page read and write
1805DAAA000
trusted library allocation
page read and write
18053764000
trusted library allocation
page read and write
1AE45E8A000
heap
page read and write
1804A52A000
heap
page read and write
18054AC3000
trusted library allocation
page read and write
1AE45EA2000
heap
page read and write
1804EE98000
trusted library allocation
page read and write
718370E000
unkown
page readonly
1804F8FE000
trusted library allocation
page read and write
18055389000
trusted library allocation
page read and write
180553C3000
trusted library allocation
page read and write
1806096A000
trusted library allocation
page read and write
1804A553000
heap
page read and write
180563E9000
trusted library allocation
page read and write
F0507FE000
stack
page read and write
1805376A000
trusted library allocation
page read and write
1805FA77000
trusted library allocation
page read and write
1805DAEE000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1804A553000
heap
page read and write
180575BB000
trusted library allocation
page read and write
180554E6000
trusted library allocation
page read and write
180564DA000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
18053DAE000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1805126A000
heap
page read and write
242498D0000
heap
page read and write
18050CBC000
trusted library allocation
page read and write
180575FD000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18054BCF000
trusted library allocation
page read and write
1805C7B0000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18056624000
trusted library allocation
page read and write
1804EECB000
trusted library allocation
page read and write
1804F9D7000
trusted library allocation
page read and write
1804A565000
heap
page read and write
18053DF4000
trusted library allocation
page read and write
18054592000
trusted library allocation
page read and write
1804FA00000
trusted library allocation
page read and write
1805E42E000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1804A543000
heap
page read and write
1804A54C000
heap
page read and write
1FAC8585000
heap
page read and write
1804A51E000
heap
page read and write
18060987000
trusted library allocation
page read and write
1FAC7F40000
heap
page read and write
18056467000
trusted library allocation
page read and write
1804A529000
heap
page read and write
180558A9000
trusted library allocation
page read and write
1FAC8599000
heap
page read and write
1805755B000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
18054BDC000
trusted library allocation
page read and write
18056668000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
18054E60000
trusted library allocation
page read and write
1805FAE4000
trusted library allocation
page read and write
18054290000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A54C000
heap
page read and write
1805F777000
trusted library allocation
page read and write
180545EE000
trusted library allocation
page read and write
18050C4B000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1805F12C000
trusted library allocation
page read and write
18050C69000
trusted library allocation
page read and write
837DBFE000
unkown
page readonly
1805FAE6000
trusted library allocation
page read and write
18055463000
trusted library allocation
page read and write
1805395B000
trusted library allocation
page read and write
1805FCA0000
trusted library allocation
page read and write
1805FD64000
heap
page read and write
18055872000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
1804A574000
heap
page read and write
180509A8000
trusted library allocation
page read and write
1805585E000
trusted library allocation
page read and write
1805531D000
trusted library allocation
page read and write
DEA000
heap
page read and write
1804A54D000
heap
page read and write
18054BDE000
trusted library allocation
page read and write
1805500F000
trusted library allocation
page read and write
1804A586000
heap
page read and write
1804A574000
heap
page read and write
1805FAB9000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
18053DAD000
trusted library allocation
page read and write
180563D2000
trusted library allocation
page read and write
180575E6000
trusted library allocation
page read and write
18055449000
trusted library allocation
page read and write
1FAC78BD000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
1805FD01000
heap
page read and write
1804A53E000
heap
page read and write
18054E83000
trusted library allocation
page read and write
1805FC67000
trusted library allocation
page read and write
180512B4000
heap
page read and write
18050AEF000
trusted library allocation
page read and write
1804A527000
heap
page read and write
18050C9A000
trusted library allocation
page read and write
18054FD1000
trusted library allocation
page read and write
1805DAF2000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
18054FE1000
trusted library allocation
page read and write
837D3FE000
stack
page read and write
1805FAE2000
trusted library allocation
page read and write
180562CB000
trusted library allocation
page read and write
180560D8000
trusted library allocation
page read and write
180563DD000
trusted library allocation
page read and write
180510C4000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A515000
heap
page read and write
180563E9000
trusted library allocation
page read and write
1805F764000
trusted library allocation
page read and write
1AE46200000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
718378E000
unkown
page readonly
837B90C000
stack
page read and write
24249E0C000
trusted library allocation
page read and write
180563F4000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1FAC85AC000
heap
page read and write
18058884000
trusted library allocation
page read and write
18050CBC000
trusted library allocation
page read and write
1805377C000
trusted library allocation
page read and write
18057757000
trusted library allocation
page read and write
1805FD3E000
heap
page read and write
18053958000
trusted library allocation
page read and write
1805644A000
trusted library allocation
page read and write
18054EC7000
trusted library allocation
page read and write
1804A545000
heap
page read and write
DDF000
heap
page read and write
DA4000
heap
page read and write
18060B13000
trusted library allocation
page read and write
1805F4A3000
trusted library allocation
page read and write
180575E6000
trusted library allocation
page read and write
18056F4C000
trusted library allocation
page read and write
18053DA8000
trusted library allocation
page read and write
1FAC7888000
trusted library allocation
page read and write
18056F36000
trusted library allocation
page read and write
1805FBBF000
trusted library allocation
page read and write
1804A546000
heap
page read and write
18056FA5000
trusted library allocation
page read and write
180536E3000
trusted library allocation
page read and write
1805390C000
trusted library allocation
page read and write
18054A31000
trusted library allocation
page read and write
18051010000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
18057582000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1FAC84CA000
heap
page read and write
18054AC9000
trusted library allocation
page read and write
180563E9000
trusted library allocation
page read and write
18056088000
trusted library allocation
page read and write
180566B8000
trusted library allocation
page read and write
18051282000
heap
page read and write
1804A525000
heap
page read and write
1805F7A4000
trusted library allocation
page read and write
1FAC853C000
heap
page read and write
1FAC85B8000
heap
page read and write
1805374A000
trusted library allocation
page read and write
1804A513000
heap
page read and write
1804A52D000
heap
page read and write
180578B0000
trusted library allocation
page read and write
24249DB7000
trusted library allocation
page read and write
1805DAEE000
trusted library allocation
page read and write
180577DE000
trusted library allocation
page read and write
18060B70000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18057527000
trusted library allocation
page read and write
DEF000
heap
page read and write
18054A66000
trusted library allocation
page read and write
18055340000
trusted library allocation
page read and write
180550EA000
trusted library allocation
page read and write
150DBF23000
heap
page read and write
18056357000
trusted library allocation
page read and write
1804A544000
heap
page read and write
18055872000
trusted library allocation
page read and write
1804A547000
heap
page read and write
1805FDB0000
heap
page read and write
18055819000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805582F000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A55E000
heap
page read and write
1FAC78EB000
trusted library allocation
page read and write
1804A52D000
heap
page read and write
24249A80000
heap
page read and write
18053934000
trusted library allocation
page read and write
18057558000
trusted library allocation
page read and write
150DC310000
heap
page read and write
1805FD61000
heap
page read and write
180551F9000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805FC96000
trusted library allocation
page read and write
180558DB000
trusted library allocation
page read and write
1805F7DD000
trusted library allocation
page read and write
180561EF000
trusted library allocation
page read and write
1805389A000
trusted library allocation
page read and write
1805FAFE000
trusted library allocation
page read and write
18056351000
trusted library allocation
page read and write
18056297000
trusted library allocation
page read and write
18051266000
heap
page read and write
18055841000
trusted library allocation
page read and write
18056471000
trusted library allocation
page read and write
1805F4FC000
trusted library allocation
page read and write
1805DA65000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
18057578000
trusted library allocation
page read and write
1805429B000
trusted library allocation
page read and write
1804A513000
heap
page read and write
1805F4A3000
trusted library allocation
page read and write
1805F1F9000
trusted library allocation
page read and write
1805C7DE000
trusted library allocation
page read and write
1806094F000
trusted library allocation
page read and write
18050CA8000
trusted library allocation
page read and write
18054D05000
trusted library allocation
page read and write
4AAC3D8000
stack
page read and write
1805123F000
heap
page read and write
180563D4000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
36A1000
heap
page read and write
1805634D000
trusted library allocation
page read and write
DA0000
heap
page read and write
18054BD4000
trusted library allocation
page read and write
1804A533000
heap
page read and write
1805347C000
trusted library allocation
page read and write
18050CF6000
trusted library allocation
page read and write
18053742000
trusted library allocation
page read and write
18060B46000
trusted library allocation
page read and write
1805DA2E000
trusted library allocation
page read and write
1FAC8523000
heap
page read and write
18054A3A000
trusted library allocation
page read and write
18056363000
trusted library allocation
page read and write
1804A54C000
heap
page read and write
18060B80000
trusted library allocation
page read and write
1804A528000
heap
page read and write
1805FC21000
trusted library allocation
page read and write
1805C735000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805FD61000
heap
page read and write
1805756C000
trusted library allocation
page read and write
180510C3000
trusted library allocation
page read and write
DD2000
heap
page read and write
180553BB000
trusted library allocation
page read and write
1805C728000
trusted library allocation
page read and write
180550A1000
trusted library allocation
page read and write
18056372000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1804A527000
heap
page read and write
1805FCFA000
trusted library allocation
page read and write
180563FE000
trusted library allocation
page read and write
514000
unkown
page readonly
1804A554000
heap
page read and write
1804A543000
heap
page read and write
18055378000
trusted library allocation
page read and write
150DC306000
heap
page read and write
1805DA54000
trusted library allocation
page read and write
D3E000
stack
page read and write
19AE000
stack
page read and write
1804A515000
heap
page read and write
1805DA5A000
trusted library allocation
page read and write
1805527C000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
1804A565000
heap
page read and write
1804A574000
heap
page read and write
24249D2E000
trusted library allocation
page read and write
1805C751000
trusted library allocation
page read and write
440000
unkown
page readonly
1804A554000
heap
page read and write
1805DA2E000
trusted library allocation
page read and write
1971FE000
stack
page read and write
1805615D000
trusted library allocation
page read and write
180563DF000
trusted library allocation
page read and write
18054A50000
trusted library allocation
page read and write
1805FAAA000
trusted library allocation
page read and write
18053DA6000
trusted library allocation
page read and write
180545AC000
trusted library allocation
page read and write
18056355000
trusted library allocation
page read and write
1804A52D000
heap
page read and write
18054E8A000
trusted library allocation
page read and write
1804A549000
heap
page read and write
1804A51B000
heap
page read and write
1804F913000
trusted library allocation
page read and write
180561FC000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
18050C14000
trusted library allocation
page read and write
1804A547000
heap
page read and write
180576C3000
trusted library allocation
page read and write
180537A5000
trusted library allocation
page read and write
1804A544000
heap
page read and write
DFF000
heap
page read and write
1804A524000
heap
page read and write
18054BC1000
trusted library allocation
page read and write
18056357000
trusted library allocation
page read and write
180537FC000
trusted library allocation
page read and write
1805DAF2000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1804A54D000
heap
page read and write
1804A543000
heap
page read and write
180544A6000
trusted library allocation
page read and write
18055768000
trusted library allocation
page read and write
18055046000
trusted library allocation
page read and write
18056499000
trusted library allocation
page read and write
1804A526000
heap
page read and write
18060968000
trusted library allocation
page read and write
180542E0000
trusted library allocation
page read and write
1805758A000
trusted library allocation
page read and write
18056363000
trusted library allocation
page read and write
180554DF000
trusted library allocation
page read and write
18055897000
trusted library allocation
page read and write
1805BF80000
trusted library allocation
page read and write
1AE45EB4000
heap
page read and write
18056271000
trusted library allocation
page read and write
1AE45E00000
heap
page read and write
1804A53E000
heap
page read and write
180563F1000
trusted library allocation
page read and write
1804A553000
heap
page read and write
18053DC3000
trusted library allocation
page read and write
1804F82F000
trusted library allocation
page read and write
1805779E000
trusted library allocation
page read and write
180563DD000
trusted library allocation
page read and write
1805585E000
trusted library allocation
page read and write
18056FAD000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18054389000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A55E000
heap
page read and write
180553BF000
trusted library allocation
page read and write
1805C893000
trusted library allocation
page read and write
18054FD6000
trusted library allocation
page read and write
1AE45DC0000
heap
page read and write
1804A55E000
heap
page read and write
180551EA000
trusted library allocation
page read and write
18050C98000
trusted library allocation
page read and write
180562FC000
trusted library allocation
page read and write
18053DB9000
trusted library allocation
page read and write
1FAC77C0000
trusted library allocation
page read and write
18055868000
trusted library allocation
page read and write
1804A524000
heap
page read and write
18053D8C000
trusted library allocation
page read and write
18054FD1000
trusted library allocation
page read and write
150DBF5F000
unclassified section
page read and write
18054BDC000
trusted library allocation
page read and write
18056FB0000
trusted library allocation
page read and write
1805639A000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A538000
heap
page read and write
1804A53E000
heap
page read and write
1804A524000
heap
page read and write
1805FC31000
trusted library allocation
page read and write
18055841000
trusted library allocation
page read and write
BBF000
stack
page read and write
4AADC7E000
unkown
page readonly
1804A577000
heap
page read and write
1FAC852C000
heap
page read and write
1804A53E000
heap
page read and write
18057260000
trusted library allocation
page read and write
1FAC856B000
heap
page read and write
150DC2F0000
heap
page read and write
18056193000
trusted library allocation
page read and write
1FAC786F000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805104F000
trusted library allocation
page read and write
1804A582000
heap
page read and write
1804A54B000
heap
page read and write
1804A525000
heap
page read and write
1AE45DE0000
heap
page read and write
1805C7DE000
trusted library allocation
page read and write
180509DB000
trusted library allocation
page read and write
18050CDE000
trusted library allocation
page read and write
180553AF000
trusted library allocation
page read and write
18054A50000
trusted library allocation
page read and write
1805500B000
trusted library allocation
page read and write
18057556000
trusted library allocation
page read and write
1805FCD4000
trusted library allocation
page read and write
180544ED000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A57E000
heap
page read and write
1805FD4F000
heap
page read and write
1FAC8585000
heap
page read and write
1805448F000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1805621B000
trusted library allocation
page read and write
1805FDD5000
heap
page read and write
18056F85000
trusted library allocation
page read and write
18057267000
trusted library allocation
page read and write
180575E6000
trusted library allocation
page read and write
18060BD8000
trusted library allocation
page read and write
1FAC8523000
heap
page read and write
1805F4BA000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
18054C6D000
trusted library allocation
page read and write
1805F754000
trusted library allocation
page read and write
180566A8000
trusted library allocation
page read and write
18054AD3000
trusted library allocation
page read and write
1AE47AAF000
heap
page read and write
1804A538000
heap
page read and write
1804A554000
heap
page read and write
18054FE1000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A51B000
heap
page read and write
1804A554000
heap
page read and write
18055052000
trusted library allocation
page read and write
18055ECE000
trusted library allocation
page read and write
1805C8E2000
trusted library allocation
page read and write
1805606D000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180566B8000
trusted library allocation
page read and write
18050CF6000
trusted library allocation
page read and write
1805653B000
trusted library allocation
page read and write
1805103A000
trusted library allocation
page read and write
1AE47AA1000
heap
page read and write
2424990A000
heap
page read and write
18056470000
trusted library allocation
page read and write
18060880000
trusted library allocation
page read and write
180573FE000
trusted library allocation
page read and write
18055832000
trusted library allocation
page read and write
1805F758000
trusted library allocation
page read and write
1805375C000
trusted library allocation
page read and write
24249D6E000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
18055EDD000
trusted library allocation
page read and write
1805BEF2000
trusted library allocation
page read and write
18054B4A000
trusted library allocation
page read and write
1805FD3E000
heap
page read and write
1805C770000
trusted library allocation
page read and write
1FAC856E000
heap
page read and write
1805DAF9000
trusted library allocation
page read and write
1804A513000
heap
page read and write
180545E6000
trusted library allocation
page read and write
BDB000
stack
page read and write
1805C76B000
trusted library allocation
page read and write
18050C35000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
18055D37000
trusted library allocation
page read and write
180576B8000
trusted library allocation
page read and write
1805C81D000
trusted library allocation
page read and write
180558C3000
trusted library allocation
page read and write
1805C7ED000
trusted library allocation
page read and write
1805C86D000
trusted library allocation
page read and write
18053875000
trusted library allocation
page read and write
1804A553000
heap
page read and write
18054A66000
trusted library allocation
page read and write
1805C763000
trusted library allocation
page read and write
DFC000
heap
page read and write
DA4000
heap
page read and write
180558A7000
trusted library allocation
page read and write
180563E9000
trusted library allocation
page read and write
1805385D000
trusted library allocation
page read and write
180575E2000
trusted library allocation
page read and write
E05000
heap
page read and write
1804A54D000
heap
page read and write
1804A51F000
heap
page read and write
18053758000
trusted library allocation
page read and write
441000
unkown
page execute read
180544BF000
trusted library allocation
page read and write
18053474000
trusted library allocation
page read and write
1805DA3D000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A515000
heap
page read and write
1804A54D000
heap
page read and write
18053734000
trusted library allocation
page read and write
18056FED000
trusted library allocation
page read and write
18053944000
trusted library allocation
page read and write
1805616F000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A530000
heap
page read and write
1804A51F000
heap
page read and write
1804A579000
heap
page read and write
1805C7BC000
trusted library allocation
page read and write
1805C7ED000
trusted library allocation
page read and write
24249D5D000
trusted library allocation
page read and write
1804A546000
heap
page read and write
1805C7C8000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18060A13000
trusted library allocation
page read and write
2CFE2A00000
trusted library allocation
page read and write
180563C7000
trusted library allocation
page read and write
18055F73000
trusted library allocation
page read and write
1805615B000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A55E000
heap
page read and write
180553F2000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A578000
heap
page read and write
18054AE9000
trusted library allocation
page read and write
1804A565000
heap
page read and write
18053417000
trusted library allocation
page read and write
18053DBD000
trusted library allocation
page read and write
18054424000
trusted library allocation
page read and write
18053E63000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180561E9000
trusted library allocation
page read and write
180563DF000
trusted library allocation
page read and write
1805C8E0000
trusted library allocation
page read and write
18057894000
trusted library allocation
page read and write
1805C74A000
trusted library allocation
page read and write
18054FFB000
trusted library allocation
page read and write
1804F926000
trusted library allocation
page read and write
180536CC000
trusted library allocation
page read and write
1805C891000
trusted library allocation
page read and write
1804F8FB000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1804A518000
heap
page read and write
1805FDA8000
heap
page read and write
1804A553000
heap
page read and write
1804A53E000
heap
page read and write
18055348000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1804A55E000
heap
page read and write
18054418000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1969FF000
stack
page read and write
1805DA9E000
trusted library allocation
page read and write
180608A0000
trusted library allocation
page read and write
1805F731000
trusted library allocation
page read and write
1805C727000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18053DF4000
trusted library allocation
page read and write
1AE47AB0000
heap
page read and write
1805C7CB000
trusted library allocation
page read and write
180575E0000
trusted library allocation
page read and write
180576B8000
trusted library allocation
page read and write
18050C48000
trusted library allocation
page read and write
F04FFFF000
stack
page read and write
1804A50E000
heap
page read and write
1FAC7440000
heap
page read and write
150DBD70000
unclassified section
page readonly
18056404000
trusted library allocation
page read and write
1805126A000
heap
page read and write
180561F8000
trusted library allocation
page read and write
1805759E000
trusted library allocation
page read and write
1AE47AB7000
heap
page read and write
18051266000
heap
page read and write
18055890000
trusted library allocation
page read and write
18054257000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
1804A574000
heap
page read and write
1804A55E000
heap
page read and write
1804A538000
heap
page read and write
1805395F000
trusted library allocation
page read and write
18054FE1000
trusted library allocation
page read and write
18051286000
heap
page read and write
1FAC8531000
heap
page read and write
1805586B000
trusted library allocation
page read and write
1FAC7700000
unclassified section
page read and write
1805C8F7000
trusted library allocation
page read and write
180510CF000
trusted library allocation
page read and write
1805587E000
trusted library allocation
page read and write
1805BEAD000
trusted library allocation
page read and write
1FAC8528000
heap
page read and write
18054A61000
trusted library allocation
page read and write
1805541C000
trusted library allocation
page read and write
18056F28000
trusted library allocation
page read and write
1804A54C000
heap
page read and write
180550A1000
trusted library allocation
page read and write
DDD000
heap
page read and write
71859FE000
unkown
page readonly
180575EB000
trusted library allocation
page read and write
18055915000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
180560E4000
trusted library allocation
page read and write
1805660C000
trusted library allocation
page read and write
18057587000
trusted library allocation
page read and write
180577E8000
trusted library allocation
page read and write
1805DA28000
trusted library allocation
page read and write
1804A52D000
heap
page read and write
1FAC8449000
heap
page read and write
1804A574000
heap
page read and write
180539E9000
trusted library allocation
page read and write
1805BEF0000
trusted library allocation
page read and write
1804A536000
heap
page read and write
18050C17000
trusted library allocation
page read and write
1FAC7754000
heap
page read and write
180544F5000
trusted library allocation
page read and write
18051283000
heap
page read and write
18054BFC000
trusted library allocation
page read and write
1805C7BF000
trusted library allocation
page read and write
18056333000
trusted library allocation
page read and write
1805E0D1000
trusted library allocation
page read and write
4AAEC7E000
unkown
page readonly
180544E2000
trusted library allocation
page read and write
180562A5000
trusted library allocation
page read and write
150DC182000
trusted library allocation
page read and write
1804A528000
heap
page read and write
150DC1AD000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180553B7000
trusted library allocation
page read and write
18056679000
trusted library allocation
page read and write
8300FFE000
unkown
page readonly
180550AB000
trusted library allocation
page read and write
1805616B000
trusted library allocation
page read and write
4AAD3FE000
stack
page read and write
18055868000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1FAC8526000
heap
page read and write
1805DA3D000
trusted library allocation
page read and write
180542D9000
trusted library allocation
page read and write
18055E7A000
trusted library allocation
page read and write
180551CF000
trusted library allocation
page read and write
1805543C000
trusted library allocation
page read and write
837B9CB000
stack
page read and write
24249E18000
trusted library allocation
page read and write
180575D6000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A554000
heap
page read and write
1804A55E000
heap
page read and write
180575C8000
trusted library allocation
page read and write
180608A0000
trusted library allocation
page read and write
18055868000
trusted library allocation
page read and write
1805F7AC000
trusted library allocation
page read and write
18060A21000
trusted library allocation
page read and write
180575B7000
trusted library allocation
page read and write
18056F4C000
trusted library allocation
page read and write
1804A529000
heap
page read and write
1805FD34000
heap
page read and write
180563A8000
trusted library allocation
page read and write
18054292000
trusted library allocation
page read and write
18050C07000
trusted library allocation
page read and write
180576E0000
trusted library allocation
page read and write
1805386D000
trusted library allocation
page read and write
18057563000
trusted library allocation
page read and write
18055361000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18056668000
trusted library allocation
page read and write
18051283000
heap
page read and write
1805586F000
trusted library allocation
page read and write
1806095D000
trusted library allocation
page read and write
1FAC77B0000
unkown
page execute read
1804A554000
heap
page read and write
180561FC000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805DA65000
trusted library allocation
page read and write
18054AE9000
trusted library allocation
page read and write
18060A0A000
trusted library allocation
page read and write
1805756C000
trusted library allocation
page read and write
1805642B000
trusted library allocation
page read and write
18054CC9000
trusted library allocation
page read and write
1FAC7812000
trusted library allocation
page read and write
1804EE9A000
trusted library allocation
page read and write
1804A544000
heap
page read and write
18054C6B000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1804A54B000
heap
page read and write
180558B8000
trusted library allocation
page read and write
18055F27000
trusted library allocation
page read and write
18060B45000
trusted library allocation
page read and write
1FAC7873000
trusted library allocation
page read and write
18056F3E000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
180577E8000
trusted library allocation
page read and write
18056154000
trusted library allocation
page read and write
180558C1000
trusted library allocation
page read and write
1FAC84BD000
heap
page read and write
1804A543000
heap
page read and write
1805FCD4000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1805C8B9000
trusted library allocation
page read and write
180609C5000
trusted library allocation
page read and write
1805F4FA000
trusted library allocation
page read and write
180561F8000
trusted library allocation
page read and write
180563D2000
trusted library allocation
page read and write
18055F62000
trusted library allocation
page read and write
180550BA000
trusted library allocation
page read and write
1805389A000
trusted library allocation
page read and write
837ED3E000
stack
page read and write
1804A51E000
heap
page read and write
1804A50E000
heap
page read and write
1804A54B000
heap
page read and write
1805BE52000
trusted library allocation
page read and write
150DC176000
trusted library allocation
page read and write
18056363000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A55E000
heap
page read and write
18054AD9000
trusted library allocation
page read and write
18056129000
trusted library allocation
page read and write
1804A528000
heap
page read and write
DD9000
heap
page read and write
1804A554000
heap
page read and write
18056607000
trusted library allocation
page read and write
180561CF000
trusted library allocation
page read and write
18054A08000
trusted library allocation
page read and write
180575B7000
trusted library allocation
page read and write
18054BC3000
trusted library allocation
page read and write
18060B3F000
trusted library allocation
page read and write
18053234000
trusted library allocation
page read and write
18056FFD000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
18054F05000
trusted library allocation
page read and write
180539F7000
trusted library allocation
page read and write
180557AB000
trusted library allocation
page read and write
1805758A000
trusted library allocation
page read and write
1804A51B000
heap
page read and write
18055F59000
trusted library allocation
page read and write
DFD000
heap
page read and write
18057794000
trusted library allocation
page read and write
18060B33000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A50F000
heap
page read and write
180563EF000
trusted library allocation
page read and write
1805FD41000
heap
page read and write
1805F74F000
trusted library allocation
page read and write
18053DE4000
trusted library allocation
page read and write
1805F1B4000
trusted library allocation
page read and write
1805C7B0000
trusted library allocation
page read and write
180576A2000
trusted library allocation
page read and write
18055082000
trusted library allocation
page read and write
18054E7B000
trusted library allocation
page read and write
18056355000
trusted library allocation
page read and write
1FAC852C000
heap
page read and write
18054CDC000
trusted library allocation
page read and write
1FAC84A0000
heap
page read and write
18054AAD000
trusted library allocation
page read and write
1FAC85AC000
heap
page read and write
18054FCD000
trusted library allocation
page read and write
18054AF2000
trusted library allocation
page read and write
1804A58C000
heap
page read and write
1804A546000
heap
page read and write
18055897000
trusted library allocation
page read and write
180558C3000
trusted library allocation
page read and write
1805543E000
trusted library allocation
page read and write
1FAC849C000
heap
page read and write
18056224000
trusted library allocation
page read and write
18060B12000
trusted library allocation
page read and write
BFE000
stack
page read and write
180544EB000
trusted library allocation
page read and write
180561BA000
trusted library allocation
page read and write
18055CAE000
trusted library allocation
page read and write
18053DA3000
trusted library allocation
page read and write
1805126A000
heap
page read and write
24249810000
unclassified section
page readonly
180563D2000
trusted library allocation
page read and write
180563DF000
trusted library allocation
page read and write
1805F1F7000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
1805586B000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180563EF000
trusted library allocation
page read and write
180558B8000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
18056421000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1AE45E9D000
heap
page read and write
18056383000
trusted library allocation
page read and write
1FAC7530000
heap
page read and write
180575BB000
trusted library allocation
page read and write
1805FBBD000
trusted library allocation
page read and write
180563C7000
trusted library allocation
page read and write
1805C7BF000
trusted library allocation
page read and write
DCF000
heap
page read and write
718374D000
stack
page read and write
1804A553000
heap
page read and write
1805F4CD000
trusted library allocation
page read and write
1805DA28000
trusted library allocation
page read and write
1805C763000
trusted library allocation
page read and write
1805380F000
trusted library allocation
page read and write
1830003F000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A55E000
heap
page read and write
18050C33000
trusted library allocation
page read and write
1805F7BA000
trusted library allocation
page read and write
1805398B000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
180552C7000
trusted library allocation
page read and write
180578C9000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1805F78A000
trusted library allocation
page read and write
1805FBF1000
trusted library allocation
page read and write
1805C88B000
trusted library allocation
page read and write
1806088C000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
180578C6000
trusted library allocation
page read and write
1FAC7815000
trusted library allocation
page read and write
150DC1B2000
trusted library allocation
page read and write
18060964000
trusted library allocation
page read and write
71851FE000
stack
page read and write
18055F3E000
trusted library allocation
page read and write
1805F17D000
trusted library allocation
page read and write
18055819000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
180563A6000
trusted library allocation
page read and write
18053C9A000
trusted library allocation
page read and write
18056637000
trusted library allocation
page read and write
837ECFE000
unkown
page readonly
150DC146000
trusted library allocation
page read and write
1805FD64000
heap
page read and write
180609D5000
trusted library allocation
page read and write
D7E000
stack
page read and write
1FAC77A7000
unkown
page execute read
18054AD9000
trusted library allocation
page read and write
18050CC1000
trusted library allocation
page read and write
1804A525000
heap
page read and write
1805BF16000
trusted library allocation
page read and write
1805FD41000
heap
page read and write
18050C9D000
trusted library allocation
page read and write
24249B33000
heap
page read and write
18050C9D000
trusted library allocation
page read and write
1FAC84A0000
heap
page read and write
18054EB2000
trusted library allocation
page read and write
18050C70000
trusted library allocation
page read and write
1805645D000
trusted library allocation
page read and write
1804A544000
heap
page read and write
1FAC78C0000
trusted library allocation
page read and write
18055FAA000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18050961000
trusted library allocation
page read and write
1804A536000
heap
page read and write
18056467000
trusted library allocation
page read and write
1804A544000
heap
page read and write
150DBD61000
remote allocation
page execute read
1805F7A4000
trusted library allocation
page read and write
18055467000
trusted library allocation
page read and write
18050AF5000
trusted library allocation
page read and write
180553F2000
trusted library allocation
page read and write
1AE47ABF000
heap
page read and write
1804A574000
heap
page read and write
1805582D000
trusted library allocation
page read and write
180576BA000
trusted library allocation
page read and write
1999FF000
stack
page read and write
1804A515000
heap
page read and write
18056665000
trusted library allocation
page read and write
1805628F000
trusted library allocation
page read and write
18051628000
trusted library allocation
page read and write
180577DE000
trusted library allocation
page read and write
180561E2000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1805FD01000
heap
page read and write
1805F74F000
trusted library allocation
page read and write
1805C7EC000
trusted library allocation
page read and write
1FAC853C000
heap
page read and write
1805607A000
trusted library allocation
page read and write
18053742000
trusted library allocation
page read and write
180575B3000
trusted library allocation
page read and write
1FAC8585000
heap
page read and write
DA4000
heap
page read and write
180554EC000
trusted library allocation
page read and write
1805F7A4000
trusted library allocation
page read and write
1805C76E000
trusted library allocation
page read and write
1804A527000
heap
page read and write
1804A54A000
heap
page read and write
18054525000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180564DA000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A55E000
heap
page read and write
1805343A000
trusted library allocation
page read and write
18060A1B000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
1804A538000
heap
page read and write
180609BD000
trusted library allocation
page read and write
18056465000
trusted library allocation
page read and write
18054A6D000
trusted library allocation
page read and write
18050C63000
trusted library allocation
page read and write
18057587000
trusted library allocation
page read and write
18056615000
trusted library allocation
page read and write
1FAC786A000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1804A543000
heap
page read and write
1805C7DE000
trusted library allocation
page read and write
1FAC84DC000
heap
page read and write
1804A50F000
heap
page read and write
18050C69000
trusted library allocation
page read and write
1805586C000
trusted library allocation
page read and write
180562EC000
trusted library allocation
page read and write
1804A524000
heap
page read and write
1805FD61000
heap
page read and write
1804A538000
heap
page read and write
180575E9000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A55E000
heap
page read and write
18054BDE000
trusted library allocation
page read and write
1805391C000
trusted library allocation
page read and write
1FAC785F000
trusted library allocation
page read and write
18050AD6000
trusted library allocation
page read and write
1805453E000
trusted library allocation
page read and write
1804FBC3000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1805BE3F000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805C7E8000
trusted library allocation
page read and write
180608FE000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
18054A9F000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805C770000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18056671000
trusted library allocation
page read and write
1FAC7823000
trusted library allocation
page read and write
18055874000
trusted library allocation
page read and write
1805F7F4000
trusted library allocation
page read and write
1A00000
heap
page read and write
1805376F000
trusted library allocation
page read and write
1805C799000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1804A524000
heap
page read and write
1806097F000
trusted library allocation
page read and write
1804A58C000
heap
page read and write
1805F7F4000
trusted library allocation
page read and write
1805DAC7000
trusted library allocation
page read and write
18050CC1000
trusted library allocation
page read and write
1805FADC000
trusted library allocation
page read and write
18055F25000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1805370E000
trusted library allocation
page read and write
18057885000
trusted library allocation
page read and write
1805BE07000
trusted library allocation
page read and write
24249A60000
heap
page readonly
1805FD3E000
heap
page read and write
1805FD4E000
heap
page read and write
180561E9000
trusted library allocation
page read and write
4AAFC7E000
unkown
page readonly
150DC178000
trusted library allocation
page read and write
1805BED9000
trusted library allocation
page read and write
1805C502000
trusted library allocation
page read and write
1805C77A000
trusted library allocation
page read and write
180577ED000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1805FD01000
heap
page read and write
180588CE000
trusted library allocation
page read and write
1805636B000
trusted library allocation
page read and write
180575D6000
trusted library allocation
page read and write
180576F0000
trusted library allocation
page read and write
1804A54A000
heap
page read and write
1805585F000
trusted library allocation
page read and write
18055458000
trusted library allocation
page read and write
1AE4620A000
trusted library allocation
page read and write
18055CE0000
trusted library allocation
page read and write
18055393000
trusted library allocation
page read and write
18060B17000
trusted library allocation
page read and write
180576BA000
trusted library allocation
page read and write
18055FF6000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
18055805000
trusted library allocation
page read and write
1FAC85AC000
heap
page read and write
1804A538000
heap
page read and write
18057894000
trusted library allocation
page read and write
18054EA2000
trusted library allocation
page read and write
18054C19000
trusted library allocation
page read and write
1804A574000
heap
page read and write
180578DF000
trusted library allocation
page read and write
4AADC3E000
stack
page read and write
1805F1D3000
trusted library allocation
page read and write
1805FD39000
heap
page read and write
1804A55E000
heap
page read and write
1805F463000
trusted library allocation
page read and write
180564E3000
trusted library allocation
page read and write
1805756C000
trusted library allocation
page read and write
1805758A000
trusted library allocation
page read and write
18054AB2000
trusted library allocation
page read and write
18054A9F000
trusted library allocation
page read and write
1804A528000
heap
page read and write
4DC000
unkown
page readonly
1805618B000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A574000
heap
page read and write
1805F1B4000
trusted library allocation
page read and write
1805BE1B000
trusted library allocation
page read and write
1805DAF2000
trusted library allocation
page read and write
18060A0A000
trusted library allocation
page read and write
180544E2000
trusted library allocation
page read and write
18054AD9000
trusted library allocation
page read and write
1805398E000
trusted library allocation
page read and write
180575A6000
trusted library allocation
page read and write
1805FBC9000
trusted library allocation
page read and write
1804A578000
heap
page read and write
180564AC000
trusted library allocation
page read and write
180561EA000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A51E000
heap
page read and write
1804A554000
heap
page read and write
1805FBFB000
trusted library allocation
page read and write
1805BED5000
trusted library allocation
page read and write
18055832000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18057563000
trusted library allocation
page read and write
1805109E000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1805F756000
trusted library allocation
page read and write
18054ABE000
trusted library allocation
page read and write
18053852000
trusted library allocation
page read and write
24249D83000
trusted library allocation
page read and write
18054FDA000
trusted library allocation
page read and write
24249E03000
trusted library allocation
page read and write
18057598000
trusted library allocation
page read and write
1804A530000
heap
page read and write
1805126A000
heap
page read and write
180576E0000
trusted library allocation
page read and write
18055CED000
trusted library allocation
page read and write
18054AB9000
trusted library allocation
page read and write
1805DA6A000
trusted library allocation
page read and write
1FAC849F000
heap
page read and write
180575B3000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
180544E2000
trusted library allocation
page read and write
18060A0A000
trusted library allocation
page read and write
1804A543000
heap
page read and write
150DC318000
heap
page read and write
18055819000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18056FB0000
trusted library allocation
page read and write
180563C7000
trusted library allocation
page read and write
1805FBFD000
trusted library allocation
page read and write
440000
unkown
page readonly
180577DE000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18056432000
trusted library allocation
page read and write
180535D5000
trusted library allocation
page read and write
180553ED000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18060A05000
trusted library allocation
page read and write
1804A518000
heap
page read and write
18054BFC000
trusted library allocation
page read and write
1805BEB1000
trusted library allocation
page read and write
1FAC8531000
heap
page read and write
1805666B000
trusted library allocation
page read and write
18054A86000
trusted library allocation
page read and write
1805DA6A000
trusted library allocation
page read and write
180558C1000
trusted library allocation
page read and write
180562A7000
trusted library allocation
page read and write
1805C77D000
trusted library allocation
page read and write
180560B9000
trusted library allocation
page read and write
180509B3000
trusted library allocation
page read and write
1804A523000
heap
page read and write
1804A54D000
heap
page read and write
1804A574000
heap
page read and write
1804A52D000
heap
page read and write
1805C757000
trusted library allocation
page read and write
180578DF000
trusted library allocation
page read and write
1FAC7E00000
heap
page read and write
18060963000
trusted library allocation
page read and write
1804A510000
heap
page read and write
242498B0000
heap
page read and write
1805396B000
trusted library allocation
page read and write
150DC1C4000
trusted library allocation
page read and write
1805BF3C000
trusted library allocation
page read and write
180545DD000
trusted library allocation
page read and write
1805FD61000
heap
page read and write
1804A538000
heap
page read and write
18051089000
trusted library allocation
page read and write
1805FBC5000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A53E000
heap
page read and write
1804A528000
heap
page read and write
180544F2000
trusted library allocation
page read and write
18054A4D000
trusted library allocation
page read and write
18060A23000
trusted library allocation
page read and write
18060880000
trusted library allocation
page read and write
1805C739000
trusted library allocation
page read and write
1805DADF000
trusted library allocation
page read and write
1804A554000
heap
page read and write
180564C2000
trusted library allocation
page read and write
18054AF9000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18057587000
trusted library allocation
page read and write
180537A2000
trusted library allocation
page read and write
1805C772000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
1805618B000
trusted library allocation
page read and write
18055F8D000
trusted library allocation
page read and write
150DC2F6000
heap
page read and write
180558B8000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
1804A513000
heap
page read and write
1805E341000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18054AF5000
trusted library allocation
page read and write
180575BB000
trusted library allocation
page read and write
18055866000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1804A54D000
heap
page read and write
1804A542000
heap
page read and write
18056675000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
18055844000
trusted library allocation
page read and write
1804A544000
heap
page read and write
1804A526000
heap
page read and write
1804A554000
heap
page read and write
18060987000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180563C7000
trusted library allocation
page read and write
18054A4D000
trusted library allocation
page read and write
18050C7A000
trusted library allocation
page read and write
1805C772000
trusted library allocation
page read and write
18057715000
trusted library allocation
page read and write
18056351000
trusted library allocation
page read and write
18050CF3000
trusted library allocation
page read and write
2CFE2810000
heap
page read and write
18060B2F000
trusted library allocation
page read and write
180562BA000
trusted library allocation
page read and write
1805372E000
trusted library allocation
page read and write
180557D7000
trusted library allocation
page read and write
18056355000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1805646B000
trusted library allocation
page read and write
180510EA000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A587000
heap
page read and write
18060991000
trusted library allocation
page read and write
180536F9000
trusted library allocation
page read and write
18055014000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805647F000
trusted library allocation
page read and write
1804A546000
heap
page read and write
837FD7E000
unkown
page readonly
1804A522000
heap
page read and write
D80000
heap
page read and write
1805537F000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
1804A530000
heap
page read and write
1805449E000
trusted library allocation
page read and write
18055D88000
trusted library allocation
page read and write
18055EBC000
trusted library allocation
page read and write
1FAC853C000
heap
page read and write
1804A54D000
heap
page read and write
1805FD64000
heap
page read and write
1FAC8563000
heap
page read and write
180550FA000
trusted library allocation
page read and write
2156C2E03000
trusted library allocation
page read and write
1805C793000
trusted library allocation
page read and write
1805BE99000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18056475000
trusted library allocation
page read and write
18054BDC000
trusted library allocation
page read and write
1805F4C7000
trusted library allocation
page read and write
180566D7000
trusted library allocation
page read and write
18054AF2000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1805D800000
trusted library allocation
page read and write
180564D2000
trusted library allocation
page read and write
1805FDEB000
heap
page read and write
1805FD41000
heap
page read and write
1805398E000
trusted library allocation
page read and write
1805583B000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A515000
heap
page read and write
150DC167000
trusted library allocation
page read and write
1FAC7877000
trusted library allocation
page read and write
18054FB6000
trusted library allocation
page read and write
1804A51B000
heap
page read and write
1805123F000
heap
page read and write
1805C7B0000
trusted library allocation
page read and write
18054C1C000
trusted library allocation
page read and write
1804A528000
heap
page read and write
180543A7000
trusted library allocation
page read and write
1805F764000
trusted library allocation
page read and write
180576E8000
trusted library allocation
page read and write
180534FD000
trusted library allocation
page read and write
1805F76A000
trusted library allocation
page read and write
18051290000
heap
page read and write
2CFE2900000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A57E000
heap
page read and write
18054A61000
trusted library allocation
page read and write
180566BD000
trusted library allocation
page read and write
1804A524000
heap
page read and write
18053D63000
trusted library allocation
page read and write
18055889000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1FAC85B8000
heap
page read and write
1805C7DE000
trusted library allocation
page read and write
18055848000
trusted library allocation
page read and write
18054A61000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18051265000
heap
page read and write
1805C7A9000
trusted library allocation
page read and write
1805C77D000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18054468000
trusted library allocation
page read and write
180564D7000
trusted library allocation
page read and write
18054E64000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
1804A54C000
heap
page read and write
1805FD64000
heap
page read and write
1FAC78CE000
trusted library allocation
page read and write
1805501F000
trusted library allocation
page read and write
18054259000
trusted library allocation
page read and write
1804A578000
heap
page read and write
180539ED000
trusted library allocation
page read and write
18056426000
trusted library allocation
page read and write
18054A91000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1804A546000
heap
page read and write
18055FCC000
trusted library allocation
page read and write
180577F8000
trusted library allocation
page read and write
1805DA3F000
trusted library allocation
page read and write
18050979000
trusted library allocation
page read and write
1805BEA9000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
18053433000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1805C7D0000
trusted library allocation
page read and write
1805F722000
trusted library allocation
page read and write
18056271000
trusted library allocation
page read and write
1805F1D3000
trusted library allocation
page read and write
180578BB000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
18054FEA000
trusted library allocation
page read and write
18055300000
trusted library allocation
page read and write
180545EA000
trusted library allocation
page read and write
1806099D000
trusted library allocation
page read and write
1804A51D000
heap
page read and write
1804A51A000
heap
page read and write
1FAC84A9000
heap
page read and write
18055396000
trusted library allocation
page read and write
1804A515000
heap
page read and write
1804A554000
heap
page read and write
1805DA20000
trusted library allocation
page read and write
150DBCF0000
unclassified section
page readonly
1805582A000
trusted library allocation
page read and write
18056399000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1805DA54000
trusted library allocation
page read and write
4AADBFE000
unkown
page readonly
18056690000
trusted library allocation
page read and write
1FAC84A0000
heap
page read and write
1FAC84E1000
heap
page read and write
1804A553000
heap
page read and write
1804A50F000
heap
page read and write
18056355000
trusted library allocation
page read and write
18056452000
trusted library allocation
page read and write
180560BD000
trusted library allocation
page read and write
1FAC8529000
heap
page read and write
180550B7000
trusted library allocation
page read and write
DA4000
heap
page read and write
1805FD64000
heap
page read and write
180543DA000
trusted library allocation
page read and write
18054FD7000
trusted library allocation
page read and write
18057563000
trusted library allocation
page read and write
1805E457000
trusted library allocation
page read and write
1FAC8009000
trusted library allocation
page read and write
1805589C000
trusted library allocation
page read and write
1FAC7756000
heap
page read and write
180609D8000
trusted library allocation
page read and write
18055FF5000
trusted library allocation
page read and write
18053D4A000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18056305000
trusted library allocation
page read and write
180562BE000
trusted library allocation
page read and write
18051265000
heap
page read and write
1805BEB1000
trusted library allocation
page read and write
1FAC7848000
trusted library allocation
page read and write
DA4000
heap
page read and write
180564CB000
trusted library allocation
page read and write
18056386000
trusted library allocation
page read and write
18060A23000
trusted library allocation
page read and write
1FAC7710000
trusted library section
page readonly
DFE000
heap
page read and write
1804A543000
heap
page read and write
180542DC000
trusted library allocation
page read and write
1805586F000
trusted library allocation
page read and write
1805C86B000
trusted library allocation
page read and write
1804A528000
heap
page read and write
18055848000
trusted library allocation
page read and write
1805DA65000
trusted library allocation
page read and write
180564C6000
trusted library allocation
page read and write
18053751000
trusted library allocation
page read and write
1805546A000
trusted library allocation
page read and write
18054BDC000
trusted library allocation
page read and write
1805C82C000
trusted library allocation
page read and write
1804F9B5000
trusted library allocation
page read and write
1805FA9F000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
18054BCF000
trusted library allocation
page read and write
1804A517000
heap
page read and write
1804A543000
heap
page read and write
18056193000
trusted library allocation
page read and write
18054580000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
18055827000
trusted library allocation
page read and write
18051048000
trusted library allocation
page read and write
18053DBF000
trusted library allocation
page read and write
18054BDC000
trusted library allocation
page read and write
1805546E000
trusted library allocation
page read and write
18054A87000
trusted library allocation
page read and write
1804A546000
heap
page read and write
1804A543000
heap
page read and write
1804A521000
heap
page read and write
18050C7A000
trusted library allocation
page read and write
1804F9E0000
trusted library allocation
page read and write
18055C7A000
trusted library allocation
page read and write
180563D2000
trusted library allocation
page read and write
180609C5000
trusted library allocation
page read and write
18054FB4000
trusted library allocation
page read and write
180553F2000
trusted library allocation
page read and write
18053991000
trusted library allocation
page read and write
18051242000
heap
page read and write
1804A51E000
heap
page read and write
180578E2000
trusted library allocation
page read and write
18056422000
trusted library allocation
page read and write
24249D03000
trusted library allocation
page read and write
18054AA9000
trusted library allocation
page read and write
DDA000
heap
page read and write
1804A54D000
heap
page read and write
180532DE000
trusted library allocation
page read and write
DDE000
heap
page read and write
1805FCAD000
trusted library allocation
page read and write
18054C5D000
trusted library allocation
page read and write
18056389000
trusted library allocation
page read and write
18056624000
trusted library allocation
page read and write
18055478000
trusted library allocation
page read and write
18051282000
heap
page read and write
502000
unkown
page readonly
1804A531000
heap
page read and write
1805768D000
trusted library allocation
page read and write
1804A553000
heap
page read and write
18057549000
trusted library allocation
page read and write
18054CC5000
trusted library allocation
page read and write
180551A1000
trusted library allocation
page read and write
18056400000
trusted library allocation
page read and write
180558FB000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
18057715000
trusted library allocation
page read and write
18055C94000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A531000
heap
page read and write
18055885000
trusted library allocation
page read and write
1805507E000
trusted library allocation
page read and write
18054E68000
trusted library allocation
page read and write
1FAC84E8000
heap
page read and write
180510CF000
trusted library allocation
page read and write
1805128E000
heap
page read and write
1804A543000
heap
page read and write
1805660E000
trusted library allocation
page read and write
18056344000
trusted library allocation
page read and write
150DC103000
trusted library allocation
page read and write
180544DE000
trusted library allocation
page read and write
150DC149000
trusted library allocation
page read and write
180588F1000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1804A53E000
heap
page read and write
1FAC8528000
heap
page read and write
1804A51E000
heap
page read and write
18051265000
heap
page read and write
1804A53E000
heap
page read and write
18050CE3000
trusted library allocation
page read and write
18056FF8000
trusted library allocation
page read and write
18056FA5000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1804A54A000
heap
page read and write
1804A553000
heap
page read and write
1805C718000
trusted library allocation
page read and write
150DC15F000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
18055827000
trusted library allocation
page read and write
18056497000
trusted library allocation
page read and write
180561DA000
trusted library allocation
page read and write
180563DF000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1805506E000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
18057578000
trusted library allocation
page read and write
18054FEA000
trusted library allocation
page read and write
180561DA000
trusted library allocation
page read and write
1AE46000000
trusted library allocation
page read and write
180608F2000
trusted library allocation
page read and write
1804A50F000
heap
page read and write
1805C862000
trusted library allocation
page read and write
18053DF1000
trusted library allocation
page read and write
18054C93000
trusted library allocation
page read and write
18050C69000
trusted library allocation
page read and write
1805F7F8000
trusted library allocation
page read and write
180544F0000
trusted library allocation
page read and write
18054557000
trusted library allocation
page read and write
180509C9000
trusted library allocation
page read and write
18055052000
trusted library allocation
page read and write
2CFE289A000
heap
page read and write
1805581E000
trusted library allocation
page read and write
180575E9000
trusted library allocation
page read and write
18051287000
heap
page read and write
180545E3000
trusted library allocation
page read and write
18050C48000
trusted library allocation
page read and write
1FAC7702000
unclassified section
page read and write
18054B77000
trusted library allocation
page read and write
18054C2C000
trusted library allocation
page read and write
180560DA000
trusted library allocation
page read and write
180545D1000
trusted library allocation
page read and write
18060A2A000
trusted library allocation
page read and write
24249E12000
trusted library allocation
page read and write
18053EF3000
trusted library allocation
page read and write
1A30000
heap
page read and write
180566D1000
trusted library allocation
page read and write
180553B7000
trusted library allocation
page read and write
18056190000
trusted library allocation
page read and write
18054BDE000
trusted library allocation
page read and write
1804A546000
heap
page read and write
180554D4000
trusted library allocation
page read and write
1805504D000
trusted library allocation
page read and write
18057563000
trusted library allocation
page read and write
180563F1000
trusted library allocation
page read and write
18053DAD000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1804A531000
heap
page read and write
180534FD000
trusted library allocation
page read and write
1804EEAA000
trusted library allocation
page read and write
1805FD36000
heap
page read and write
180563A6000
trusted library allocation
page read and write
1805DAE2000
trusted library allocation
page read and write
18056FB5000
trusted library allocation
page read and write
18055E70000
trusted library allocation
page read and write
1804A51D000
heap
page read and write
18051283000
heap
page read and write
1804A55E000
heap
page read and write
180609CD000
trusted library allocation
page read and write
1804A514000
heap
page read and write
1805582F000
trusted library allocation
page read and write
1805C884000
trusted library allocation
page read and write
18055874000
trusted library allocation
page read and write
18054C91000
trusted library allocation
page read and write
1805C7D6000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
18054A66000
trusted library allocation
page read and write
1FAC849C000
heap
page read and write
18057582000
trusted library allocation
page read and write
180562C2000
trusted library allocation
page read and write
18056F49000
trusted library allocation
page read and write
18054AE9000
trusted library allocation
page read and write
1FAC8520000
heap
page read and write
71837CE000
stack
page read and write
18060B70000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1805F76A000
trusted library allocation
page read and write
18054FE4000
trusted library allocation
page read and write
1805FCDD000
trusted library allocation
page read and write
12F9741E000
trusted library allocation
page read and write
180566A8000
trusted library allocation
page read and write
18056497000
trusted library allocation
page read and write
180575C8000
trusted library allocation
page read and write
1FAC85AC000
heap
page read and write
18056F3A000
trusted library allocation
page read and write
18054529000
trusted library allocation
page read and write
1FAC73B0000
unclassified section
page readonly
1805F44A000
trusted library allocation
page read and write
18054A5D000
trusted library allocation
page read and write
18056607000
trusted library allocation
page read and write
1805541C000
trusted library allocation
page read and write
7186ABE000
unkown
page readonly
180563D2000
trusted library allocation
page read and write
1804A542000
heap
page read and write
E01000
heap
page read and write
18055488000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A52B000
heap
page read and write
1804A582000
heap
page read and write
1804A538000
heap
page read and write
1805DAE2000
trusted library allocation
page read and write
18053968000
trusted library allocation
page read and write
180562FE000
trusted library allocation
page read and write
1805F1F7000
trusted library allocation
page read and write
1805585C000
trusted library allocation
page read and write
1804A574000
heap
page read and write
180562C7000
trusted library allocation
page read and write
1805C72F000
trusted library allocation
page read and write
1804A515000
heap
page read and write
18053968000
trusted library allocation
page read and write
18050C96000
trusted library allocation
page read and write
1805586C000
trusted library allocation
page read and write
24249890000
unclassified section
page readonly
E05000
heap
page read and write
180510F9000
trusted library allocation
page read and write
18056FFD000
trusted library allocation
page read and write
18054D02000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1805C7D9000
trusted library allocation
page read and write
18057686000
trusted library allocation
page read and write
18054FEC000
trusted library allocation
page read and write
837B94E000
unkown
page readonly
180563DD000
trusted library allocation
page read and write
18055042000
trusted library allocation
page read and write
18056082000
trusted library allocation
page read and write
180575D8000
trusted library allocation
page read and write
1804A538000
heap
page read and write
18055389000
trusted library allocation
page read and write
18054AA5000
trusted library allocation
page read and write
18056389000
trusted library allocation
page read and write
1805C763000
trusted library allocation
page read and write
1804A578000
heap
page read and write
1805449E000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
1804A544000
heap
page read and write
180578F7000
trusted library allocation
page read and write
18057558000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1805766F000
trusted library allocation
page read and write
1805BE33000
trusted library allocation
page read and write
1804FBA3000
trusted library allocation
page read and write
18056244000
trusted library allocation
page read and write
1804F9DB000
trusted library allocation
page read and write
180573E3000
trusted library allocation
page read and write
18054571000
trusted library allocation
page read and write
1805DA3D000
trusted library allocation
page read and write
1804A54C000
heap
page read and write
18057582000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
18054A5A000
trusted library allocation
page read and write
1804A546000
heap
page read and write
1FAC785C000
trusted library allocation
page read and write
180558A4000
trusted library allocation
page read and write
18057587000
trusted library allocation
page read and write
1FAC857C000
heap
page read and write
1805C7E1000
trusted library allocation
page read and write
15AE000
stack
page read and write
1805FD4F000
heap
page read and write
1805FD61000
heap
page read and write
18056F83000
trusted library allocation
page read and write
18055338000
trusted library allocation
page read and write
1804A547000
heap
page read and write
180573FE000
trusted library allocation
page read and write
18050CC7000
trusted library allocation
page read and write
1805634D000
trusted library allocation
page read and write
1805104F000
trusted library allocation
page read and write
18055F2E000
trusted library allocation
page read and write
1805BEA1000
trusted library allocation
page read and write
1804A538000
heap
page read and write
180575FD000
trusted library allocation
page read and write
1805C76E000
trusted library allocation
page read and write
24249870000
remote allocation
page read and write
1804EEEF000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
1805FCBC000
trusted library allocation
page read and write
1FAC84A9000
heap
page read and write
1805373C000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1FAC7750000
heap
page read and write
18055398000
trusted library allocation
page read and write
18055EDB000
trusted library allocation
page read and write
18053875000
trusted library allocation
page read and write
1804A515000
heap
page read and write
18057681000
trusted library allocation
page read and write
1805DADF000
trusted library allocation
page read and write
1805C7BF000
trusted library allocation
page read and write
180544AC000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18056389000
trusted library allocation
page read and write
180562EE000
trusted library allocation
page read and write
180575D6000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A53E000
heap
page read and write
18055055000
trusted library allocation
page read and write
18056648000
trusted library allocation
page read and write
180558C1000
trusted library allocation
page read and write
1805BEC5000
trusted library allocation
page read and write
18056294000
trusted library allocation
page read and write
1804A515000
heap
page read and write
1804A54B000
heap
page read and write
1805C799000
trusted library allocation
page read and write
18050CF3000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1804A55E000
heap
page read and write
1805538D000
trusted library allocation
page read and write
1FAC8585000
heap
page read and write
50C000
unkown
page write copy
18050C70000
trusted library allocation
page read and write
1805E34D000
trusted library allocation
page read and write
1804A515000
heap
page read and write
180509DB000
trusted library allocation
page read and write
DE3000
heap
page read and write
1804A52D000
heap
page read and write
18056155000
trusted library allocation
page read and write
18056624000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18054FFD000
trusted library allocation
page read and write
DD2000
heap
page read and write
1804A574000
heap
page read and write
1804A515000
heap
page read and write
18051052000
trusted library allocation
page read and write
1806096D000
trusted library allocation
page read and write
180553FD000
trusted library allocation
page read and write
1805E0BF000
trusted library allocation
page read and write
18056FA8000
trusted library allocation
page read and write
18060B13000
trusted library allocation
page read and write
180510A4000
trusted library allocation
page read and write
1804A524000
heap
page read and write
1805546E000
trusted library allocation
page read and write
18055922000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
180575A0000
trusted library allocation
page read and write
180562F2000
trusted library allocation
page read and write
180563D2000
trusted library allocation
page read and write
180534D2000
trusted library allocation
page read and write
18060991000
trusted library allocation
page read and write
7187ABE000
unkown
page readonly
1804A53E000
heap
page read and write
1AE47AA0000
heap
page read and write
1FAC75E0000
heap
page readonly
180563F6000
trusted library allocation
page read and write
18060BE0000
trusted library allocation
page read and write
18056F36000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
18056151000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18055813000
trusted library allocation
page read and write
18060957000
trusted library allocation
page read and write
1804F917000
trusted library allocation
page read and write
18054E6A000
trusted library allocation
page read and write
1FAC856B000
heap
page read and write
18054EB6000
trusted library allocation
page read and write
180563D2000
trusted library allocation
page read and write
18054551000
trusted library allocation
page read and write
18060B3B000
trusted library allocation
page read and write
1804A515000
heap
page read and write
180558DB000
trusted library allocation
page read and write
2B5A9B51000
trusted library allocation
page execute read
180575B7000
trusted library allocation
page read and write
1805F7F8000
trusted library allocation
page read and write
180558A9000
trusted library allocation
page read and write
180510D2000
trusted library allocation
page read and write
1AE45E80000
heap
page read and write
1805FD39000
heap
page read and write
180563DD000
trusted library allocation
page read and write
BEF000
stack
page read and write
1804A544000
heap
page read and write
18055398000
trusted library allocation
page read and write
1804A528000
heap
page read and write
180534DD000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
180564B9000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1804A51B000
heap
page read and write
502000
unkown
page readonly
1805C8EE000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
1804A528000
heap
page read and write
1805E386000
trusted library allocation
page read and write
18054AF2000
trusted library allocation
page read and write
1805548C000
trusted library allocation
page read and write
1805F78C000
trusted library allocation
page read and write
18056649000
trusted library allocation
page read and write
1804A574000
heap
page read and write
1805F1BB000
trusted library allocation
page read and write
180563EF000
trusted library allocation
page read and write
18054EAC000
trusted library allocation
page read and write
180534F2000
trusted library allocation
page read and write
1805FA3E000
trusted library allocation
page read and write
180558B8000
trusted library allocation
page read and write
18056605000
trusted library allocation
page read and write
1FAC84BF000
heap
page read and write
18060A23000
trusted library allocation
page read and write
1804A531000
heap
page read and write
1805C83E000
trusted library allocation
page read and write
1805F7F1000
trusted library allocation
page read and write
18056125000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
180564C0000
trusted library allocation
page read and write
1804A554000
heap
page read and write
1805F1BB000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18055C7E000
trusted library allocation
page read and write
1805395F000
trusted library allocation
page read and write
1805F1F9000
trusted library allocation
page read and write
18055312000
trusted library allocation
page read and write
24249DA7000
trusted library allocation
page read and write
180563C7000
trusted library allocation
page read and write
18054CFA000
trusted library allocation
page read and write
18056383000
trusted library allocation
page read and write
18053916000
trusted library allocation
page read and write
180576F5000
trusted library allocation
page read and write
18056357000
trusted library allocation
page read and write
18056644000
trusted library allocation
page read and write
180562F3000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
1805FD61000
heap
page read and write
1805F78C000
trusted library allocation
page read and write
1FAC848D000
heap
page read and write
1805C74B000
trusted library allocation
page read and write
1805612B000
trusted library allocation
page read and write
1805F78C000
trusted library allocation
page read and write
18054B2B000
trusted library allocation
page read and write
1805DA6E000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180560E6000
trusted library allocation
page read and write
1804A510000
heap
page read and write
1805FBBB000
trusted library allocation
page read and write
18056333000
trusted library allocation
page read and write
1805776B000
trusted library allocation
page read and write
1804A528000
heap
page read and write
18055473000
trusted library allocation
page read and write
18054AA5000
trusted library allocation
page read and write
150DC111000
trusted library allocation
page read and write
1805631D000
trusted library allocation
page read and write
180575BB000
trusted library allocation
page read and write
180554BE000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18051286000
heap
page read and write
1805580B000
trusted library allocation
page read and write
18053E51000
trusted library allocation
page read and write
180561E9000
trusted library allocation
page read and write
1805FD34000
heap
page read and write
1804A524000
heap
page read and write
1804A554000
heap
page read and write
1805DA2E000
trusted library allocation
page read and write
1804A543000
heap
page read and write
150DC10E000
trusted library allocation
page read and write
180512D5000
heap
page read and write
1804F823000
trusted library allocation
page read and write
180558C1000
trusted library allocation
page read and write
1AE461A0000
heap
page read and write
1805641D000
trusted library allocation
page read and write
1805582F000
trusted library allocation
page read and write
1805F7DD000
trusted library allocation
page read and write
1805386D000
trusted library allocation
page read and write
180564C9000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
1805439A000
trusted library allocation
page read and write
24249D47000
trusted library allocation
page read and write
180575C8000
trusted library allocation
page read and write
24249900000
heap
page read and write
18050CA5000
trusted library allocation
page read and write
18050C70000
trusted library allocation
page read and write
18054F98000
trusted library allocation
page read and write
1981FE000
stack
page read and write
1805FD61000
heap
page read and write
1805FD61000
heap
page read and write
180565A3000
trusted library allocation
page read and write
150DC2F4000
heap
page read and write
1804A53E000
heap
page read and write
180577F8000
trusted library allocation
page read and write
18055848000
trusted library allocation
page read and write
1805FA2E000
trusted library allocation
page read and write
180608B1000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
180563F4000
trusted library allocation
page read and write
18053922000
trusted library allocation
page read and write
1805653B000
trusted library allocation
page read and write
1804A52D000
heap
page read and write
1805634D000
trusted library allocation
page read and write
1805374A000
trusted library allocation
page read and write
180609BD000
trusted library allocation
page read and write
1804A54A000
heap
page read and write
24249D7D000
trusted library allocation
page read and write
1805F4A3000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A546000
heap
page read and write
18056F98000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1804A51B000
heap
page read and write
1FAC84BD000
heap
page read and write
1805FDEB000
heap
page read and write
18053DB5000
trusted library allocation
page read and write
18053DBD000
trusted library allocation
page read and write
1804A51B000
heap
page read and write
180608BB000
trusted library allocation
page read and write
180543D8000
trusted library allocation
page read and write
1805C74F000
trusted library allocation
page read and write
1805FAE0000
trusted library allocation
page read and write
18053954000
trusted library allocation
page read and write
1804A587000
heap
page read and write
1804A574000
heap
page read and write
180510D2000
trusted library allocation
page read and write
1805C7BA000
trusted library allocation
page read and write
180534C5000
trusted library allocation
page read and write
1805C772000
trusted library allocation
page read and write
DE3000
heap
page read and write
1804A55E000
heap
page read and write
18053DBB000
trusted library allocation
page read and write
1805C76E000
trusted library allocation
page read and write
1805C76B000
trusted library allocation
page read and write
1AE461A5000
heap
page read and write
1805F17F000
trusted library allocation
page read and write
18054E7D000
trusted library allocation
page read and write
1805386D000
trusted library allocation
page read and write
1805DAB1000
trusted library allocation
page read and write
1804A54B000
heap
page read and write
1804A55E000
heap
page read and write
1804F9D7000
trusted library allocation
page read and write
18056333000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
1805C77D000
trusted library allocation
page read and write
1804A546000
heap
page read and write
180562F3000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
18056F9D000
trusted library allocation
page read and write
180563F6000
trusted library allocation
page read and write
1804A553000
heap
page read and write
1FAC7790000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18055387000
trusted library allocation
page read and write
2CFE2A07000
trusted library allocation
page read and write
1804A50D000
heap
page read and write
1805F4AA000
trusted library allocation
page read and write
1804A524000
heap
page read and write
1FAC8531000
heap
page read and write
1804A544000
heap
page read and write
18053DBD000
trusted library allocation
page read and write
18054D0A000
trusted library allocation
page read and write
18053764000
trusted library allocation
page read and write
150DC50C000
trusted library allocation
page read and write
1804A578000
heap
page read and write
180575E9000
trusted library allocation
page read and write
18054BFC000
trusted library allocation
page read and write
18054228000
trusted library allocation
page read and write
18053657000
trusted library allocation
page read and write
1805F742000
trusted library allocation
page read and write
180560C7000
trusted library allocation
page read and write
18054B5E000
trusted library allocation
page read and write
1FAC84A0000
heap
page read and write
180561E0000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
1804A554000
heap
page read and write
1804A50D000
heap
page read and write
1FAC8526000
heap
page read and write
71841D8000
stack
page read and write
DED000
heap
page read and write
18054FD9000
trusted library allocation
page read and write
1804A51E000
heap
page read and write
18050C9D000
trusted library allocation
page read and write
180512D3000
heap
page read and write
1805FD39000
heap
page read and write
1805FC63000
trusted library allocation
page read and write
180564B7000
trusted library allocation
page read and write
1804A587000
heap
page read and write
1805C89C000
trusted library allocation
page read and write
1AE45EB2000
heap
page read and write
24249D23000
trusted library allocation
page read and write
180609D2000
trusted library allocation
page read and write
18055437000
trusted library allocation
page read and write
24249E1C000
trusted library allocation
page read and write
180542E7000
trusted library allocation
page read and write
18054AF8000
trusted library allocation
page read and write
18054CD5000
trusted library allocation
page read and write
150DBF40000
heap
page readonly
180545BF000
trusted library allocation
page read and write
180558DB000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
DFC000
heap
page read and write
1805642B000
trusted library allocation
page read and write
180576C4000
trusted library allocation
page read and write
1804A57E000
heap
page read and write
1804A50F000
heap
page read and write
1804A52E000
heap
page read and write
18056426000
trusted library allocation
page read and write
18057528000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1805C7F0000
trusted library allocation
page read and write
180575B7000
trusted library allocation
page read and write
180553ED000
trusted library allocation
page read and write
1805C88F000
trusted library allocation
page read and write
180561DD000
trusted library allocation
page read and write
18055374000
trusted library allocation
page read and write
1805F726000
trusted library allocation
page read and write
1805586F000
trusted library allocation
page read and write
18060BE0000
trusted library allocation
page read and write
1804A53E000
heap
page read and write
18060A1F000
trusted library allocation
page read and write
18057262000
trusted library allocation
page read and write
180544A6000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1805428D000
trusted library allocation
page read and write
1804A54D000
heap
page read and write
1804A574000
heap
page read and write
1805BEED000
trusted library allocation
page read and write
18056157000
trusted library allocation
page read and write
1806096D000
trusted library allocation
page read and write
1804A543000
heap
page read and write
18055813000
trusted library allocation
page read and write
1805FA71000
trusted library allocation
page read and write
71872BE000
stack
page read and write
1804A554000
heap
page read and write
18054ED1000
trusted library allocation
page read and write
180578D8000
trusted library allocation
page read and write
1805F754000
trusted library allocation
page read and write
1805586C000
trusted library allocation
page read and write
18050CBE000
trusted library allocation
page read and write
1805C770000
trusted library allocation
page read and write
18054E74000
trusted library allocation
page read and write
1805FD4F000
heap
page read and write
150DC170000
trusted library allocation
page read and write
18060B2F000
trusted library allocation
page read and write
1805126A000
heap
page read and write
1804A546000
heap
page read and write
1804A55E000
heap
page read and write
180553FD000
trusted library allocation
page read and write
180550F5000
trusted library allocation
page read and write
180562FA000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
18056F2C000
trusted library allocation
page read and write
180551BE000
trusted library allocation
page read and write
1804A538000
heap
page read and write
1804A574000
heap
page read and write
1806088C000
trusted library allocation
page read and write
1804A528000
heap
page read and write
180544BB000
trusted library allocation
page read and write
180553A5000
trusted library allocation
page read and write
1805C799000
trusted library allocation
page read and write
18055443000
trusted library allocation
page read and write
180578E2000
trusted library allocation
page read and write
24249A20000
heap
page read and write
1804A577000
heap
page read and write
18056649000
trusted library allocation
page read and write
180563F4000
trusted library allocation
page read and write
1805535D000
trusted library allocation
page read and write
18056663000
trusted library allocation
page read and write
1805F17F000
trusted library allocation
page read and write
1805647F000
trusted library allocation
page read and write
1989FF000
stack
page read and write
180551B1000
trusted library allocation
page read and write
1804A52E000
heap
page read and write
1805F4FC000
trusted library allocation
page read and write
1804A55E000
heap
page read and write
180560BB000
trusted library allocation
page read and write
18054BFC000
trusted library allocation
page read and write
1805F440000
trusted library allocation
page read and write
1805C799000
trusted library allocation
page read and write
1FAC782F000
trusted library allocation
page read and write
180552ED000
trusted library allocation
page read and write
18056F3A000
trusted library allocation
page read and write
1804A574000
heap
page read and write
18056481000
trusted library allocation
page read and write
18054FE7000
trusted library allocation
page read and write
18056680000
trusted library allocation
page read and write
2CFE289F000
heap
page read and write
18055889000
trusted library allocation
page read and write
180554F2000
trusted library allocation
page read and write
1FAC852C000
heap
page read and write
1805755B000
trusted library allocation
page read and write
1804A543000
heap
page read and write
1804A519000
heap
page read and write
18057598000
trusted library allocation
page read and write
1FAC853C000
heap
page read and write
180609FD000
trusted library allocation
page read and write
18051298000
heap
page read and write
1805DA54000
trusted library allocation
page read and write
180575B3000
trusted library allocation
page read and write
There are 3930 hidden memdumps, click here to show them.