IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dffbd27d-ffd0-41c5-b906-1a25fbf1be66.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dffbd27d-ffd0-41c5-b906-1a25fbf1be66.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9GMPOC7MVGD0Z2FOIK2A.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PUI2JXKGHBW0QKK9KTWH.temp
data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e90d6c24-d50b-4b75-8f35-614cb58272e1} 7524 "\\.\pipe\gecko-crash-server-pipe.7524" 1b4df26df10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4008 -parentBuildID 20230927232528 -prefsHandle 4000 -prefMapHandle 3996 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {029f5e9b-d31f-417f-878f-f26b29793504} 7524 "\\.\pipe\gecko-crash-server-pipe.7524" 1b4f11e8b10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5008 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4824 -prefMapHandle 4916 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43d47f84-ba1a-4e37-9bbb-53b6fefaa308} 7524 "\\.\pipe\gecko-crash-server-pipe.7524" 1b4f01beb10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://youtube.com/account?=htQ
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=htA
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://spocs.getpocket.com/CN=The
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.181.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.181.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
12E7000
heap
page read and write
malicious
12E4000
heap
page read and write
malicious
1B4FB89A000
heap
page read and write
1B4F18F2000
trusted library allocation
page read and write
1B4EEA2A000
heap
page read and write
1B4F711B000
trusted library allocation
page read and write
23341790000
unclassified section
page readonly
25B74090000
unclassified section
page readonly
16907823000
heap
page read and write
1B4E6054000
heap
page read and write
1B4E601E000
heap
page read and write
1B4F7245000
trusted library allocation
page read and write
1B4EEF6A000
trusted library allocation
page read and write
1B4F70B6000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
2A0951D000
stack
page read and write
16907884000
heap
page read and write
1B4EFE73000
trusted library allocation
page read and write
1B4F0731000
trusted library allocation
page read and write
1B4EFB46000
trusted library allocation
page read and write
1B4F0137000
trusted library allocation
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4EF9ED000
trusted library allocation
page read and write
23341800000
remote allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4FB2E4000
trusted library allocation
page read and write
1B4F7158000
trusted library allocation
page read and write
1B4EFF7A000
trusted library allocation
page read and write
1B4F1917000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
F5C727D000
stack
page read and write
1B4EFB46000
trusted library allocation
page read and write
130D000
heap
page read and write
1B4EFFE0000
trusted library allocation
page read and write
6B0000
unkown
page readonly
16907820000
heap
page read and write
1B4F031A000
trusted library allocation
page read and write
16907884000
heap
page read and write
1B4F0B53000
trusted library allocation
page read and write
1B4F02CC000
trusted library allocation
page read and write
1B4FC39E000
trusted library allocation
page read and write
1B4FA72E000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4FB6CF000
trusted library allocation
page read and write
1B4F00F8000
trusted library allocation
page read and write
1B4EF96E000
trusted library allocation
page read and write
1690779C000
heap
page read and write
1B4FB8AB000
heap
page read and write
1B4EEFF0000
trusted library allocation
page read and write
1B4E6002000
heap
page read and write
1B4F2851000
trusted library allocation
page read and write
1B4F0714000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4F14D1000
trusted library allocation
page read and write
1B4F0105000
trusted library allocation
page read and write
1B4FB835000
heap
page read and write
1B4F2523000
trusted library allocation
page read and write
1B4F6FBA000
trusted library allocation
page read and write
1B4EEF71000
trusted library allocation
page read and write
1B4F70C8000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4E603E000
heap
page read and write
1B4FC405000
trusted library allocation
page read and write
1B4F0139000
trusted library allocation
page read and write
1B4FC493000
trusted library allocation
page read and write
1B4EF973000
trusted library allocation
page read and write
1B4F0310000
trusted library allocation
page read and write
1B4F76B7000
trusted library allocation
page read and write
1B4EE70A000
trusted library allocation
page read and write
1306000
heap
page read and write
1B4F248E000
trusted library allocation
page read and write
1B4E600D000
heap
page read and write
1B4F96A7000
trusted library allocation
page read and write
1B4EFEB6000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
1B4EC069000
trusted library allocation
page read and write
1B4F7029000
trusted library allocation
page read and write
1B4FB6A4000
trusted library allocation
page read and write
1B4EC2A2000
trusted library allocation
page read and write
1B4EEA2A000
heap
page read and write
1B4FB8A1000
heap
page read and write
25B74800000
trusted library allocation
page read and write
1B4F0477000
trusted library allocation
page read and write
1B4EBF6C000
trusted library allocation
page read and write
1B4F0BA4000
trusted library allocation
page read and write
1B4EC026000
trusted library allocation
page read and write
1B4EF96E000
trusted library allocation
page read and write
1B4EF48F000
trusted library allocation
page read and write
1B4EEA2A000
heap
page read and write
1B4F25A8000
trusted library allocation
page read and write
1B4F0A42000
trusted library allocation
page read and write
1B4F747F000
trusted library allocation
page read and write
1B4E60A1000
heap
page read and write
1B4E5FF0000
heap
page read and write
16907820000
heap
page read and write
1B4EE78D000
trusted library allocation
page read and write
1B4EAFF6000
trusted library allocation
page read and write
23341D03000
trusted library allocation
page read and write
16906B5C000
trusted library allocation
page read and write
1B4FB89A000
heap
page read and write
1B4E6060000
heap
page read and write
1B4F02E0000
trusted library allocation
page read and write
1B4F0110000
trusted library allocation
page read and write
1B4EC077000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4FB497000
trusted library allocation
page read and write
1B4F0081000
trusted library allocation
page read and write
1B4FB89B000
heap
page read and write
1B4EFF8B000
trusted library allocation
page read and write
1B4F077C000
trusted library allocation
page read and write
1B4F6FF7000
trusted library allocation
page read and write
1B4F0BEA000
trusted library allocation
page read and write
1B4F8B33000
trusted library allocation
page read and write
1690782E000
heap
page read and write
1B4EFE6B000
trusted library allocation
page read and write
1B4F259E000
trusted library allocation
page read and write
1B4EFB78000
trusted library allocation
page read and write
1B4F2432000
trusted library allocation
page read and write
23341B10000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4EEFF0000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
1B4E6050000
heap
page read and write
1B4EAF2F000
trusted library allocation
page read and write
FD1867E000
unkown
page readonly
1B4FB5E5000
trusted library allocation
page read and write
1B4F25A6000
trusted library allocation
page read and write
1B4E6061000
heap
page read and write
1B4F049D000
trusted library allocation
page read and write
1B4E605B000
heap
page read and write
1B4FB5E5000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4EFB50000
trusted library allocation
page read and write
1B4EFFD6000
trusted library allocation
page read and write
16907829000
heap
page read and write
1B4EF966000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4E6057000
heap
page read and write
1B4EC2E0000
trusted library allocation
page read and write
1B4E608E000
heap
page read and write
1B4F02D1000
trusted library allocation
page read and write
1B4F7436000
trusted library allocation
page read and write
1B4EEEA0000
trusted library allocation
page read and write
1B4F0348000
trusted library allocation
page read and write
1B4FB74A000
trusted library allocation
page read and write
1B4F02DC000
trusted library allocation
page read and write
1B4EEDA3000
trusted library allocation
page read and write
1B4FA766000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4E5FFC000
heap
page read and write
1B4F0335000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4F72CA000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4FAD8A000
trusted library allocation
page read and write
1B4EFF85000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
1B4E6060000
heap
page read and write
26D1B310000
heap
page read and write
1B4E603E000
heap
page read and write
1B4F0540000
trusted library allocation
page read and write
1B4FB5AC000
trusted library allocation
page read and write
1B4E605E000
heap
page read and write
F5C72BE000
unkown
page readonly
1B4EFE75000
trusted library allocation
page read and write
16906C00000
heap
page readonly
1B4F038D000
trusted library allocation
page read and write
1B4E5FFE000
heap
page read and write
1B4E0B20000
heap
page read and write
1B4EF9B5000
trusted library allocation
page read and write
1B4F03E9000
trusted library allocation
page read and write
1B4F00A2000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
FD1767E000
unkown
page readonly
1B4E6067000
heap
page read and write
1B4F18FE000
trusted library allocation
page read and write
1B4EA99E000
trusted library allocation
page read and write
1B4F1911000
trusted library allocation
page read and write
1B4F04A9000
trusted library allocation
page read and write
1B4F0672000
trusted library allocation
page read and write
1B4F7382000
trusted library allocation
page read and write
12ED000
heap
page read and write
1B4EEFDD000
trusted library allocation
page read and write
1B4EE6FA000
trusted library allocation
page read and write
1B4F0080000
trusted library allocation
page read and write
1B4F2558000
trusted library allocation
page read and write
1B4FB248000
trusted library allocation
page read and write
1B4EF96E000
trusted library allocation
page read and write
1B4EFE35000
trusted library allocation
page read and write
1B4F25A8000
trusted library allocation
page read and write
1B4FB6F1000
trusted library allocation
page read and write
1B4EAFFE000
trusted library allocation
page read and write
1B4E601B000
heap
page read and write
23341D00000
trusted library allocation
page read and write
1B4FB89A000
heap
page read and write
1B4F25F8000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4EC27C000
trusted library allocation
page read and write
1B4EEF71000
trusted library allocation
page read and write
1B4F04FB000
trusted library allocation
page read and write
1B4FA85D000
trusted library allocation
page read and write
1B4EF469000
trusted library allocation
page read and write
1B4F6FBC000
trusted library allocation
page read and write
1B4F021A000
trusted library allocation
page read and write
1B4F76C2000
trusted library allocation
page read and write
1B4EEDA4000
trusted library allocation
page read and write
1B4EFB3F000
trusted library allocation
page read and write
1B4FB40B000
trusted library allocation
page read and write
1B4F137F000
trusted library allocation
page read and write
1B4FB6DE000
trusted library allocation
page read and write
1B4F71F2000
trusted library allocation
page read and write
1B4F00F1000
trusted library allocation
page read and write
1B4F71FC000
trusted library allocation
page read and write
1B4FB0D8000
trusted library allocation
page read and write
1B4F00E0000
trusted library allocation
page read and write
1B4F25A6000
trusted library allocation
page read and write
1B4FA87B000
trusted library allocation
page read and write
1B4EFE6E000
trusted library allocation
page read and write
1B4F0463000
trusted library allocation
page read and write
2A095DE000
unkown
page readonly
890EFFF000
stack
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4F0160000
trusted library allocation
page read and write
1B4EC09B000
trusted library allocation
page read and write
1B4F23EA000
trusted library allocation
page read and write
1B4E600B000
heap
page read and write
1B4E605D000
heap
page read and write
1B4F25EE000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
1B4F24B5000
trusted library allocation
page read and write
1B4F2598000
trusted library allocation
page read and write
1B4F27E1000
trusted library allocation
page read and write
1B4F051E000
trusted library allocation
page read and write
1B4EFE35000
trusted library allocation
page read and write
1B4F27EB000
trusted library allocation
page read and write
1B4EF94E000
trusted library allocation
page read and write
1B4EFBF0000
trusted library allocation
page read and write
1B4F28FE000
trusted library allocation
page read and write
1B4F04F4000
trusted library allocation
page read and write
1B4F9D02000
trusted library allocation
page read and write
1B4EFB30000
trusted library allocation
page read and write
FD164F8000
stack
page read and write
1B4EC2F6000
trusted library allocation
page read and write
1B4F06CC000
trusted library allocation
page read and write
1B4EFE6C000
trusted library allocation
page read and write
169078B7000
heap
page read and write
1B4FB8AA000
heap
page read and write
1B4FB6AA000
trusted library allocation
page read and write
1B4EC281000
trusted library allocation
page read and write
1B4EED86000
trusted library allocation
page read and write
1B4F6E1B000
trusted library allocation
page read and write
1B4F71D5000
trusted library allocation
page read and write
1B4F72D3000
trusted library allocation
page read and write
1B4EFF8B000
trusted library allocation
page read and write
1B4F6E07000
trusted library allocation
page read and write
1B4F0BE7000
trusted library allocation
page read and write
1B4F0B5E000
trusted library allocation
page read and write
1B4F18E2000
trusted library allocation
page read and write
1144000
heap
page read and write
1B4FBF06000
trusted library allocation
page read and write
1B4F2365000
trusted library allocation
page read and write
1B4E6026000
heap
page read and write
1B4F04F9000
trusted library allocation
page read and write
16907884000
heap
page read and write
1B4F0337000
trusted library allocation
page read and write
1B4EEF6F000
trusted library allocation
page read and write
233417A0000
unclassified section
page readonly
1B4F010A000
trusted library allocation
page read and write
1B4FB296000
trusted library allocation
page read and write
1B4F03EB000
trusted library allocation
page read and write
1B4F70DE000
trusted library allocation
page read and write
16906BC4000
trusted library allocation
page read and write
1B4F6E07000
trusted library allocation
page read and write
1B4F0036000
trusted library allocation
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1B4EFEA0000
trusted library allocation
page read and write
16907831000
heap
page read and write
1B4EF9AB000
trusted library allocation
page read and write
1B4E6016000
heap
page read and write
1B4F029E000
trusted library allocation
page read and write
1B4EF9C1000
trusted library allocation
page read and write
1B4FB6A4000
trusted library allocation
page read and write
1B4F0143000
trusted library allocation
page read and write
169067D0000
unclassified section
page readonly
1B4F716F000
trusted library allocation
page read and write
169077A0000
heap
page read and write
1B4E6003000
heap
page read and write
25B74270000
unclassified section
page read and write
25B74703000
trusted library allocation
page read and write
1B4F00F8000
trusted library allocation
page read and write
1B4E604D000
heap
page read and write
1B4F1376000
trusted library allocation
page read and write
1B4F6F88000
trusted library allocation
page read and write
1B4E6003000
heap
page read and write
1B4FBDA2000
trusted library allocation
page read and write
2A0949B000
stack
page read and write
1B4F15EF000
trusted library allocation
page read and write
1B4EFE71000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4EC035000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4E600F000
heap
page read and write
1B4F05F0000
trusted library allocation
page read and write
1B4F6F2C000
trusted library allocation
page read and write
23341C40000
unclassified section
page readonly
23341B47000
trusted library allocation
page read and write
23341D3F000
trusted library allocation
page read and write
1B4E600A000
heap
page read and write
1B4FB6AA000
trusted library allocation
page read and write
1B4E608A000
heap
page read and write
1B4EFB4D000
trusted library allocation
page read and write
1B4F0BBB000
trusted library allocation
page read and write
1B4F7029000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
1B4EF966000
trusted library allocation
page read and write
1B4F7090000
trusted library allocation
page read and write
1B4E0B10000
heap
page read and write
1B4F031E000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
1B4F05EC000
trusted library allocation
page read and write
1B4F02E2000
trusted library allocation
page read and write
233419C6000
heap
page read and write
1B4F01CE000
trusted library allocation
page read and write
1B4E600C000
heap
page read and write
1B4FB0B8000
trusted library allocation
page read and write
1B4EF98C000
trusted library allocation
page read and write
1B4EC322000
trusted library allocation
page read and write
1B4EEA3B000
heap
page read and write
1B4EC0FC000
trusted library allocation
page read and write
16906BC1000
trusted library allocation
page read and write
1B4F2570000
trusted library allocation
page read and write
1B4EEFDD000
trusted library allocation
page read and write
1B4F6FED000
trusted library allocation
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4EC2E0000
trusted library allocation
page read and write
1B4F00F6000
trusted library allocation
page read and write
1B4E603F000
heap
page read and write
1B4EFFD3000
trusted library allocation
page read and write
1B4EE6D9000
trusted library allocation
page read and write
1B4FB6AA000
trusted library allocation
page read and write
1B4F0523000
trusted library allocation
page read and write
1B4F8A07000
trusted library allocation
page read and write
1690782E000
heap
page read and write
2A09FD8000
stack
page read and write
1B4F71DB000
trusted library allocation
page read and write
1B4F25A8000
trusted library allocation
page read and write
1B4F73B1000
trusted library allocation
page read and write
1B4FB41E000
trusted library allocation
page read and write
1B4EB026000
trusted library allocation
page read and write
1B4EC32C000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
23341D32000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4EEEA0000
trusted library allocation
page read and write
169077F9000
heap
page read and write
1B4EC2DC000
trusted library allocation
page read and write
1B4E6001000
heap
page read and write
1B4E5FF0000
heap
page read and write
1B4F18E2000
trusted library allocation
page read and write
1B4F0323000
trusted library allocation
page read and write
1B4F70D5000
trusted library allocation
page read and write
1B4E6003000
heap
page read and write
1B4F24C5000
trusted library allocation
page read and write
16906B77000
trusted library allocation
page read and write
1B4F032B000
trusted library allocation
page read and write
1B4F04F0000
trusted library allocation
page read and write
1B4F0126000
trusted library allocation
page read and write
1B4F0B94000
trusted library allocation
page read and write
1B4E600D000
heap
page read and write
1B4EFBBF000
trusted library allocation
page read and write
1B4F18C5000
trusted library allocation
page read and write
1B4F6E95000
trusted library allocation
page read and write
1B4F96A1000
trusted library allocation
page read and write
1290000
heap
page read and write
1B4FB6F3000
trusted library allocation
page read and write
16906B00000
trusted library allocation
page read and write
1B4F0635000
trusted library allocation
page read and write
1B4FB5AC000
trusted library allocation
page read and write
1B4E6002000
heap
page read and write
1B4E601E000
heap
page read and write
1B4E603E000
heap
page read and write
169078B7000
heap
page read and write
1B4E6057000
heap
page read and write
1B4EEED6000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4F0104000
trusted library allocation
page read and write
1B4EEDDD000
trusted library allocation
page read and write
1B4EFE6E000
trusted library allocation
page read and write
1B4F6F00000
trusted library allocation
page read and write
1B4F7169000
trusted library allocation
page read and write
1B4EEF7B000
trusted library allocation
page read and write
1B4F2A8D000
trusted library allocation
page read and write
1B4F04F6000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1220000
heap
page read and write
1B4FB2FE000
trusted library allocation
page read and write
1B4EFF82000
trusted library allocation
page read and write
1B4EFB55000
trusted library allocation
page read and write
1B4EF9A5000
trusted library allocation
page read and write
1B4F0328000
trusted library allocation
page read and write
1144000
heap
page read and write
1B4FB8AC000
heap
page read and write
1B4EF4F5000
trusted library allocation
page read and write
1B4FB5DB000
trusted library allocation
page read and write
1B4F0213000
trusted library allocation
page read and write
1B4F762B000
trusted library allocation
page read and write
1B4E604B000
heap
page read and write
1B4EF433000
trusted library allocation
page read and write
1B4FA8A1000
trusted library allocation
page read and write
23341D3D000
trusted library allocation
page read and write
1B4F188B000
trusted library allocation
page read and write
1B4F70DE000
trusted library allocation
page read and write
1B4EF9F0000
trusted library allocation
page read and write
1B4F04F0000
trusted library allocation
page read and write
1B4F0731000
trusted library allocation
page read and write
1B4E6064000
heap
page read and write
1B4F6EB7000
trusted library allocation
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1B4F075C000
trusted library allocation
page read and write
1B4F06CC000
trusted library allocation
page read and write
1B4F04F6000
trusted library allocation
page read and write
1B4EC0FC000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4F96A4000
trusted library allocation
page read and write
16907740000
heap
page read and write
1B4E605D000
heap
page read and write
1B4F958D000
trusted library allocation
page read and write
1B4F73BB000
trusted library allocation
page read and write
1B4FA8EF000
trusted library allocation
page read and write
1B4F045B000
trusted library allocation
page read and write
1B4E6043000
heap
page read and write
1B4EFB17000
trusted library allocation
page read and write
1B4EEFED000
trusted library allocation
page read and write
1B4E6056000
heap
page read and write
1B4F73F9000
trusted library allocation
page read and write
1B4F00B7000
trusted library allocation
page read and write
1B4F0779000
trusted library allocation
page read and write
1B4F71F2000
trusted library allocation
page read and write
1B4F6ED7000
trusted library allocation
page read and write
25B744DB000
trusted library allocation
page read and write
1B4EFFBF000
trusted library allocation
page read and write
1B4F04F6000
trusted library allocation
page read and write
1B4E6060000
heap
page read and write
1B4F24F0000
trusted library allocation
page read and write
1B4EFE3A000
trusted library allocation
page read and write
1B4EF46E000
trusted library allocation
page read and write
1B4E6061000
heap
page read and write
1B4F7097000
trusted library allocation
page read and write
1B4E6056000
heap
page read and write
1B4FB8A9000
heap
page read and write
1B4EEA6D000
heap
page read and write
1B4FB5DD000
trusted library allocation
page read and write
1B4F700F000
trusted library allocation
page read and write
169071F0000
trusted library section
page readonly
1B4EFBB4000
trusted library allocation
page read and write
1B4FC32F000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
1B4EA9BF000
trusted library allocation
page read and write
1B4EEF77000
trusted library allocation
page read and write
1B4EF923000
trusted library allocation
page read and write
1B4F25F8000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F25FE000
trusted library allocation
page read and write
1B4FA724000
trusted library allocation
page read and write
1314000
heap
page read and write
1690782E000
heap
page read and write
1B4E6066000
heap
page read and write
1B4F0228000
trusted library allocation
page read and write
1B4F6EF8000
trusted library allocation
page read and write
1B4F0BA9000
trusted library allocation
page read and write
1B4F2541000
trusted library allocation
page read and write
1690786A000
heap
page read and write
1B4E6054000
heap
page read and write
1B4F18E2000
trusted library allocation
page read and write
1B4FB6FE000
trusted library allocation
page read and write
1B4F04A4000
trusted library allocation
page read and write
1B4EFBBF000
trusted library allocation
page read and write
1B4E6014000
heap
page read and write
1B4F0243000
trusted library allocation
page read and write
1B4FB6AE000
trusted library allocation
page read and write
1B4EEFA5000
trusted library allocation
page read and write
1B4FB89F000
heap
page read and write
1B4EB0B0000
trusted library allocation
page read and write
1B4EF99E000
trusted library allocation
page read and write
1B4F728C000
trusted library allocation
page read and write
1B4F00FE000
trusted library allocation
page read and write
1B4F95CE000
trusted library allocation
page read and write
1B4F25EE000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4F280D000
trusted library allocation
page read and write
1B4EFE30000
trusted library allocation
page read and write
16906B23000
trusted library allocation
page read and write
1B4FB6E3000
trusted library allocation
page read and write
1B4E6050000
heap
page read and write
1B4EF9A3000
trusted library allocation
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1140000
heap
page read and write
1B4FA738000
trusted library allocation
page read and write
1B4F7140000
trusted library allocation
page read and write
1144000
heap
page read and write
1B4F1989000
trusted library allocation
page read and write
1B4FB803000
heap
page read and write
1B4FA8E5000
trusted library allocation
page read and write
1B4F6F19000
trusted library allocation
page read and write
1B4FBF2E000
trusted library allocation
page read and write
1B4F7029000
trusted library allocation
page read and write
1B4F0139000
trusted library allocation
page read and write
1B4EF9C1000
trusted library allocation
page read and write
1B4F1458000
trusted library allocation
page read and write
1B4F0B0F000
trusted library allocation
page read and write
1B4F2A80000
trusted library allocation
page read and write
1B4EE6FA000
trusted library allocation
page read and write
1B4E5FEF000
heap
page read and write
1B4E6002000
heap
page read and write
1B4F06CE000
trusted library allocation
page read and write
1B4EB06A000
trusted library allocation
page read and write
25B744B8000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4F27D9000
trusted library allocation
page read and write
1B4E608A000
heap
page read and write
1B4F016F000
trusted library allocation
page read and write
1B4F0542000
trusted library allocation
page read and write
1B4F033F000
trusted library allocation
page read and write
1B4EED1B000
trusted library allocation
page read and write
1B4F7115000
trusted library allocation
page read and write
1B4F0786000
trusted library allocation
page read and write
1B4F6FBE000
trusted library allocation
page read and write
1B4FB8A1000
heap
page read and write
1B4F2411000
trusted library allocation
page read and write
1B4F03E5000
trusted library allocation
page read and write
1B4EC040000
trusted library allocation
page read and write
1B4F0223000
trusted library allocation
page read and write
1B4F6EBF000
trusted library allocation
page read and write
1B4F0BB3000
trusted library allocation
page read and write
1B4F1855000
trusted library allocation
page read and write
25B74086000
remote allocation
page execute read
16907829000
heap
page read and write
1B4E600C000
heap
page read and write
1B4E603E000
heap
page read and write
2778FBC0000
heap
page read and write
1B4EE6ED000
trusted library allocation
page read and write
1B4E601B000
heap
page read and write
23341C10000
unclassified section
page read and write
1B4F8B06000
trusted library allocation
page read and write
1B4EFBBF000
trusted library allocation
page read and write
1B4F04FB000
trusted library allocation
page read and write
1B4F0B15000
trusted library allocation
page read and write
1B4FB8A9000
heap
page read and write
23341B5B000
trusted library allocation
page read and write
1B4F00C5000
trusted library allocation
page read and write
1B4F0727000
trusted library allocation
page read and write
1B4E6002000
heap
page read and write
1B4EF9AE000
trusted library allocation
page read and write
1B4F02FD000
trusted library allocation
page read and write
1B4EFE75000
trusted library allocation
page read and write
1B4EC2DC000
trusted library allocation
page read and write
1690723F000
unkown
page execute read
1B4F289E000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4FB74A000
trusted library allocation
page read and write
1B4EF4AB000
trusted library allocation
page read and write
1B4EED64000
trusted library allocation
page read and write
1B4FB6AE000
trusted library allocation
page read and write
1B4E604F000
heap
page read and write
1B4F76AF000
trusted library allocation
page read and write
1B4F96D2000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4F18DD000
trusted library allocation
page read and write
1B4FB8B1000
heap
page read and write
1B4FC36D000
trusted library allocation
page read and write
1B4EFEB6000
trusted library allocation
page read and write
1B4F13AD000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4F033D000
trusted library allocation
page read and write
1B4F95DF000
trusted library allocation
page read and write
1B4F95CF000
trusted library allocation
page read and write
1B4F74E8000
trusted library allocation
page read and write
1ABE000
stack
page read and write
1B4F24C9000
trusted library allocation
page read and write
1B4FA77A000
trusted library allocation
page read and write
1B4FB2B3000
trusted library allocation
page read and write
1B4F0188000
trusted library allocation
page read and write
1B4FA87B000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4E5FF6000
heap
page read and write
1B4E605D000
heap
page read and write
1B4FA88A000
trusted library allocation
page read and write
1B4F7024000
trusted library allocation
page read and write
1B4F253F000
trusted library allocation
page read and write
1B4E6060000
heap
page read and write
169078B7000
heap
page read and write
1B4E6057000
heap
page read and write
1B4EEDA0000
trusted library allocation
page read and write
1B4FBE48000
trusted library allocation
page read and write
1B4F0347000
trusted library allocation
page read and write
1B4EF980000
trusted library allocation
page read and write
1B4FB8B1000
heap
page read and write
1B4EFBE0000
trusted library allocation
page read and write
1B4F06D0000
trusted library allocation
page read and write
1B4F0C7F000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4EE6A1000
trusted library allocation
page read and write
1B4EFEAE000
trusted library allocation
page read and write
1B4EEE85000
trusted library allocation
page read and write
1B4EE71C000
trusted library allocation
page read and write
1B4EE7D1000
trusted library allocation
page read and write
23341B6E000
trusted library allocation
page read and write
1B4FC41C000
trusted library allocation
page read and write
1B4EF960000
trusted library allocation
page read and write
1B4F1323000
trusted library allocation
page read and write
1B4EC244000
trusted library allocation
page read and write
1B4EE711000
trusted library allocation
page read and write
1B4EE661000
trusted library allocation
page read and write
1B4EFB4D000
trusted library allocation
page read and write
1B4F0766000
trusted library allocation
page read and write
16906A00000
trusted library allocation
page read and write
1B4EB0D2000
trusted library allocation
page read and write
1B4EFB58000
trusted library allocation
page read and write
1B4EBF33000
trusted library allocation
page read and write
1B4EF966000
trusted library allocation
page read and write
1B4F25B1000
trusted library allocation
page read and write
1B4F0080000
trusted library allocation
page read and write
1B4FB26C000
trusted library allocation
page read and write
890FFFE000
stack
page read and write
1B4E601D000
heap
page read and write
1B4F11EE000
trusted library allocation
page read and write
1B4F0093000
trusted library allocation
page read and write
1B4EEDB7000
trusted library allocation
page read and write
1B4E6015000
heap
page read and write
1B4E601E000
heap
page read and write
1B4FA8B9000
trusted library allocation
page read and write
1B4EFEAE000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4F6EA7000
trusted library allocation
page read and write
1B4F70AE000
trusted library allocation
page read and write
1B4EF991000
trusted library allocation
page read and write
1B4FBDC8000
trusted library allocation
page read and write
1B4EED5E000
trusted library allocation
page read and write
1B4F278A000
trusted library allocation
page read and write
23341840000
heap
page read and write
1B4EEA28000
heap
page read and write
1B4F2AF3000
trusted library allocation
page read and write
26D1B342000
heap
page read and write
1B4FB0B3000
trusted library allocation
page read and write
23341D16000
trusted library allocation
page read and write
1B4FB5A1000
trusted library allocation
page read and write
1B4F04FB000
trusted library allocation
page read and write
1B4EEDB2000
trusted library allocation
page read and write
1B4FB6F3000
trusted library allocation
page read and write
1B4FB89E000
heap
page read and write
1B4EFEA5000
trusted library allocation
page read and write
1B4E5FEF000
heap
page read and write
1B4F044F000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4F06CC000
trusted library allocation
page read and write
1B4F0786000
trusted library allocation
page read and write
1B4F73B9000
trusted library allocation
page read and write
1B4F1449000
trusted library allocation
page read and write
1B4F723A000
trusted library allocation
page read and write
1B4F71C5000
trusted library allocation
page read and write
169077BF000
heap
page read and write
1B4FB47D000
trusted library allocation
page read and write
1B4FB2E6000
trusted library allocation
page read and write
1B4FB5A1000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4E6056000
heap
page read and write
1B4FB42E000
trusted library allocation
page read and write
1B4F7066000
trusted library allocation
page read and write
1EBE000
stack
page read and write
FFE000
stack
page read and write
1B4EFED2000
trusted library allocation
page read and write
1B4EFEB1000
trusted library allocation
page read and write
1B4EEEA0000
trusted library allocation
page read and write
1B4F7178000
trusted library allocation
page read and write
1B4F04FB000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
23341930000
heap
page read and write
1B4FB89F000
heap
page read and write
1B4EC024000
trusted library allocation
page read and write
1B4F1973000
trusted library allocation
page read and write
1B4F0463000
trusted library allocation
page read and write
1B4FBEC5000
trusted library allocation
page read and write
1B4FB776000
trusted library allocation
page read and write
1B4EE61D000
trusted library allocation
page read and write
1B4EAF71000
trusted library allocation
page read and write
1B4F7396000
trusted library allocation
page read and write
1B4F6E6E000
trusted library allocation
page read and write
1B4EEDA3000
trusted library allocation
page read and write
1B4FC4AC000
trusted library allocation
page read and write
1B4F13B7000
trusted library allocation
page read and write
130F000
heap
page read and write
1B4EEDE3000
trusted library allocation
page read and write
1B4E6056000
heap
page read and write
1B4F0337000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4EFB5B000
trusted library allocation
page read and write
1B4FA7BA000
trusted library allocation
page read and write
1B4EC069000
trusted library allocation
page read and write
1B4F0102000
trusted library allocation
page read and write
25B744AA000
trusted library allocation
page read and write
1B4F6F84000
trusted library allocation
page read and write
25B74000000
unclassified section
page readonly
1B4E6057000
heap
page read and write
1B4EEE7F000
trusted library allocation
page read and write
1B4F72D7000
trusted library allocation
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4F0B3A000
trusted library allocation
page read and write
1B4EEC00000
trusted library allocation
page read and write
1B4E605C000
heap
page read and write
1B4F0062000
trusted library allocation
page read and write
1B4F194F000
trusted library allocation
page read and write
1B4E5FF7000
heap
page read and write
1B4F04FB000
trusted library allocation
page read and write
169077A3000
heap
page read and write
1B4E6054000
heap
page read and write
26D1CEBE000
heap
page read and write
1B4EEDB7000
trusted library allocation
page read and write
1B4EEEA0000
trusted library allocation
page read and write
1B4E5FFC000
heap
page read and write
23341C1F000
unclassified section
page read and write
1B4FB6A4000
trusted library allocation
page read and write
1B4F137F000
trusted library allocation
page read and write
1B4FA775000
trusted library allocation
page read and write
1B4F6E76000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4E601D000
heap
page read and write
1B4FB89F000
heap
page read and write
25B7445F000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F00F8000
trusted library allocation
page read and write
1B4EFE5B000
trusted library allocation
page read and write
1B4F18E9000
trusted library allocation
page read and write
25B74474000
trusted library allocation
page read and write
1B4EFDE2000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
1B4EFBFA000
trusted library allocation
page read and write
1B4FB8B6000
heap
page read and write
1B4F739B000
trusted library allocation
page read and write
1B4FC48A000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
1B4EEA33000
heap
page read and write
1B4E6003000
heap
page read and write
1B4F00E0000
trusted library allocation
page read and write
1B4E600A000
heap
page read and write
1B4F0BAF000
trusted library allocation
page read and write
12EA000
heap
page read and write
1B4EFBAF000
trusted library allocation
page read and write
1B4FB92C000
heap
page read and write
1B4F0098000
trusted library allocation
page read and write
1B4F6E4D000
trusted library allocation
page read and write
1B4FB889000
heap
page read and write
1B4E6012000
heap
page read and write
1B4FB68F000
trusted library allocation
page read and write
1B4EAF23000
trusted library allocation
page read and write
1F6B2741E000
trusted library allocation
page read and write
1B4FB8A6000
heap
page read and write
1B4EEED6000
trusted library allocation
page read and write
1B4EEA34000
heap
page read and write
1B4F73C5000
trusted library allocation
page read and write
1B4E5FEF000
heap
page read and write
16906C80000
heap
page read and write
1B4EFE8D000
trusted library allocation
page read and write
1B4FA8AB000
trusted library allocation
page read and write
1B4E6062000
heap
page read and write
1B4F02E8000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
23341B72000
trusted library allocation
page read and write
1B4EFB58000
trusted library allocation
page read and write
1B4EEA2C000
heap
page read and write
1B4E604B000
heap
page read and write
1B4EED20000
trusted library allocation
page read and write
23341B23000
trusted library allocation
page read and write
16907898000
heap
page read and write
1B4F02D9000
trusted library allocation
page read and write
1B4F1909000
trusted library allocation
page read and write
26D1B607000
trusted library allocation
page read and write
1B4E600C000
heap
page read and write
1690783C000
heap
page read and write
1B4F6EDF000
trusted library allocation
page read and write
1B4EEDBC000
trusted library allocation
page read and write
1B4EFE67000
trusted library allocation
page read and write
1B4EEDAA000
trusted library allocation
page read and write
1B4EF4EE000
trusted library allocation
page read and write
1B4FA793000
trusted library allocation
page read and write
1B4F0162000
trusted library allocation
page read and write
1B4F0139000
trusted library allocation
page read and write
1B4F1804000
trusted library allocation
page read and write
1B4FB29D000
trusted library allocation
page read and write
1B4F7158000
trusted library allocation
page read and write
1B4F063D000
trusted library allocation
page read and write
1B4FB258000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4EEE60000
trusted library allocation
page read and write
1B4FB8A7000
heap
page read and write
1B4F7014000
trusted library allocation
page read and write
1B4EC271000
trusted library allocation
page read and write
233419D0000
heap
page read and write
1B4F76B1000
trusted library allocation
page read and write
1B4F728F000
trusted library allocation
page read and write
1B4F19C3000
trusted library allocation
page read and write
1B4E6062000
heap
page read and write
1B4F24BA000
trusted library allocation
page read and write
1B4EEE65000
trusted library allocation
page read and write
1B4EC0FC000
trusted library allocation
page read and write
1B4F0479000
trusted library allocation
page read and write
1B4F25F8000
trusted library allocation
page read and write
1B4F0584000
trusted library allocation
page read and write
1B4F02C8000
trusted library allocation
page read and write
1B4FB42E000
trusted library allocation
page read and write
1B4F253F000
trusted library allocation
page read and write
1B4EEA59000
heap
page read and write
1B4F008D000
trusted library allocation
page read and write
1B4F2795000
trusted library allocation
page read and write
26D1CEC1000
heap
page read and write
1B4F7124000
trusted library allocation
page read and write
1B4F28E2000
trusted library allocation
page read and write
1B4EEF7B000
trusted library allocation
page read and write
1B4E6060000
heap
page read and write
23341B00000
trusted library allocation
page read and write
1B4F76C2000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4F7090000
trusted library allocation
page read and write
23341950000
heap
page read and write
1B4F71E6000
trusted library allocation
page read and write
1B4F1962000
trusted library allocation
page read and write
1B4F033C000
trusted library allocation
page read and write
1B4EEEA7000
trusted library allocation
page read and write
1B4EE679000
trusted library allocation
page read and write
1B4EF96E000
trusted library allocation
page read and write
1B4EE6EC000
trusted library allocation
page read and write
1B4FBE6D000
trusted library allocation
page read and write
1B4F9586000
trusted library allocation
page read and write
1B4EF988000
trusted library allocation
page read and write
1B4F71F6000
trusted library allocation
page read and write
1B4EFB5B000
trusted library allocation
page read and write
1B4F148E000
trusted library allocation
page read and write
1B4FB41E000
trusted library allocation
page read and write
1B4EF99E000
trusted library allocation
page read and write
74C000
unkown
page readonly
1B4FB48E000
trusted library allocation
page read and write
1B4F00EF000
trusted library allocation
page read and write
1B4EFBE0000
trusted library allocation
page read and write
1B4F0118000
trusted library allocation
page read and write
1B4F0090000
trusted library allocation
page read and write
1B4EFEBC000
trusted library allocation
page read and write
1B4F0BC3000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
169077E8000
heap
page read and write
1B4F748A000
trusted library allocation
page read and write
1B4EE784000
trusted library allocation
page read and write
1B4F0647000
trusted library allocation
page read and write
1B4EFBF7000
trusted library allocation
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4EF988000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4F0354000
trusted library allocation
page read and write
1B4F259E000
trusted library allocation
page read and write
1B4EFE73000
trusted library allocation
page read and write
74C000
unkown
page readonly
1B4EEDE3000
trusted library allocation
page read and write
1B4FA8C7000
trusted library allocation
page read and write
1B4F8A48000
trusted library allocation
page read and write
1B4FC384000
trusted library allocation
page read and write
1B4F0B78000
trusted library allocation
page read and write
1B4F01EB000
trusted library allocation
page read and write
1B4F049B000
trusted library allocation
page read and write
1B4EC077000
trusted library allocation
page read and write
1B4F0655000
trusted library allocation
page read and write
1B4F71CC000
trusted library allocation
page read and write
1B4EEDCF000
trusted library allocation
page read and write
25B744F2000
trusted library allocation
page read and write
1B4F71E4000
trusted library allocation
page read and write
1B4E600F000
heap
page read and write
F5C733E000
unkown
page readonly
1B4FB0E1000
trusted library allocation
page read and write
1B4FA721000
trusted library allocation
page read and write
1B4EFB3C000
trusted library allocation
page read and write
1B4EF9B5000
trusted library allocation
page read and write
F5C69FE000
stack
page read and write
1B4E604F000
heap
page read and write
1B4EC294000
trusted library allocation
page read and write
1B4F0771000
trusted library allocation
page read and write
169078A7000
heap
page read and write
1B4F199D000
trusted library allocation
page read and write
1B4EC040000
trusted library allocation
page read and write
1B4F6E3F000
trusted library allocation
page read and write
1B4F0BEA000
trusted library allocation
page read and write
1B4EF99C000
trusted library allocation
page read and write
1B4F04FB000
trusted library allocation
page read and write
169077E1000
heap
page read and write
1B4FB5D9000
trusted library allocation
page read and write
1B4F6FF1000
trusted library allocation
page read and write
12EB000
heap
page read and write
1B4EFEA0000
trusted library allocation
page read and write
1B4F0086000
trusted library allocation
page read and write
1B4EFEC7000
trusted library allocation
page read and write
1B4EFB27000
trusted library allocation
page read and write
16907828000
heap
page read and write
1B4EFE3F000
trusted library allocation
page read and write
1B4E600D000
heap
page read and write
1B4EE763000
trusted library allocation
page read and write
1B4F00F6000
trusted library allocation
page read and write
1B4F6EB7000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4F0B85000
trusted library allocation
page read and write
1690786A000
heap
page read and write
1306000
heap
page read and write
1B4FB485000
trusted library allocation
page read and write
1B4F0213000
trusted library allocation
page read and write
1B4F2523000
trusted library allocation
page read and write
1B4F03E9000
trusted library allocation
page read and write
1B4F05F5000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
169077CD000
heap
page read and write
1B4F25EE000
trusted library allocation
page read and write
1B4EC069000
trusted library allocation
page read and write
1B4F73B0000
trusted library allocation
page read and write
1B4F95DF000
trusted library allocation
page read and write
1B4EFE2D000
trusted library allocation
page read and write
1B4E601C000
heap
page read and write
1B4F0147000
trusted library allocation
page read and write
1B4F045D000
trusted library allocation
page read and write
1B4FC3CE000
trusted library allocation
page read and write
25B74260000
heap
page readonly
1B4EFFD3000
trusted library allocation
page read and write
1B4F012A000
trusted library allocation
page read and write
1B4EF95E000
trusted library allocation
page read and write
1B4EFE7F000
trusted library allocation
page read and write
3F3CDE41000
trusted library allocation
page execute read
1B4EFE73000
trusted library allocation
page read and write
1B4F00DA000
trusted library allocation
page read and write
1B4FA7F3000
trusted library allocation
page read and write
1B4FBE86000
trusted library allocation
page read and write
1B4F7294000
trusted library allocation
page read and write
1B4F89C8000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4E6002000
heap
page read and write
1B4FB89F000
heap
page read and write
1B4F0B3F000
trusted library allocation
page read and write
1B4F0322000
trusted library allocation
page read and write
1B4F27B4000
trusted library allocation
page read and write
16906BBB000
trusted library allocation
page read and write
25B741CA000
heap
page read and write
1B4EE769000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4E6049000
heap
page read and write
1B4F02E4000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F007C000
trusted library allocation
page read and write
1B4EEED6000
trusted library allocation
page read and write
1B4FBEA7000
trusted library allocation
page read and write
1B4FA7B7000
trusted library allocation
page read and write
1B4F19CC000
trusted library allocation
page read and write
16907898000
heap
page read and write
1B4F0479000
trusted library allocation
page read and write
1B4EEFD1000
trusted library allocation
page read and write
12FE000
heap
page read and write
1B4F0BA4000
trusted library allocation
page read and write
1B4F048B000
trusted library allocation
page read and write
1B4F1896000
trusted library allocation
page read and write
1B4F00F1000
trusted library allocation
page read and write
1B4F284E000
trusted library allocation
page read and write
16907898000
heap
page read and write
1B4EEDD6000
trusted library allocation
page read and write
1B4FB4C9000
trusted library allocation
page read and write
1B4FB6AE000
trusted library allocation
page read and write
1B4F73D7000
trusted library allocation
page read and write
1B4FB5D7000
trusted library allocation
page read and write
1B4F71D1000
trusted library allocation
page read and write
1144000
heap
page read and write
1B4EB0A7000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
FD14BD8000
stack
page read and write
1B4F0147000
trusted library allocation
page read and write
25B74300000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4F185A000
trusted library allocation
page read and write
1B4FB230000
trusted library allocation
page read and write
1B4FB8B1000
heap
page read and write
16907826000
heap
page read and write
1B4EED17000
trusted library allocation
page read and write
1B4F03E9000
trusted library allocation
page read and write
1B4FB6AA000
trusted library allocation
page read and write
1B4F6EA7000
trusted library allocation
page read and write
1B4F0BBD000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4F6F16000
trusted library allocation
page read and write
1B4F04F4000
trusted library allocation
page read and write
1B4F0BE3000
trusted library allocation
page read and write
1B4F038B000
trusted library allocation
page read and write
1B4EEFFA000
trusted library allocation
page read and write
1B4F0BDE000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4EF960000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4FB485000
trusted library allocation
page read and write
25B74411000
trusted library allocation
page read and write
1B4EEDEE000
trusted library allocation
page read and write
1B4EFE9B000
trusted library allocation
page read and write
1B4E60A1000
heap
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4F0194000
trusted library allocation
page read and write
1B4EAF76000
trusted library allocation
page read and write
1B4EE717000
trusted library allocation
page read and write
1B4F7143000
trusted library allocation
page read and write
1B4F050F000
trusted library allocation
page read and write
1B4E6004000
heap
page read and write
1B4E600A000
heap
page read and write
1B4EB0A7000
trusted library allocation
page read and write
1B4F04F4000
trusted library allocation
page read and write
1B4F00FE000
trusted library allocation
page read and write
1B4F9599000
trusted library allocation
page read and write
1B4F2418000
trusted library allocation
page read and write
1690683F000
remote allocation
page execute read
1B4FA8CD000
trusted library allocation
page read and write
1B4F70C2000
trusted library allocation
page read and write
1B4FB853000
heap
page read and write
1B4F18AA000
trusted library allocation
page read and write
1B4F74C2000
trusted library allocation
page read and write
1B4FB6A4000
trusted library allocation
page read and write
27745A03000
trusted library allocation
page read and write
1B4FB8AC000
heap
page read and write
1B4FB8A9000
heap
page read and write
1B4F04FB000
trusted library allocation
page read and write
1B4F0218000
trusted library allocation
page read and write
1B4FAD37000
trusted library allocation
page read and write
1B4F021E000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4E6060000
heap
page read and write
1B4F077C000
trusted library allocation
page read and write
1B4F049E000
trusted library allocation
page read and write
1B4E6003000
heap
page read and write
1B4F718D000
trusted library allocation
page read and write
1690730E000
trusted library allocation
page read and write
1B4EF4AF000
trusted library allocation
page read and write
1B4F18C5000
trusted library allocation
page read and write
1B4F0BB3000
trusted library allocation
page read and write
1B4E6002000
heap
page read and write
25B74424000
trusted library allocation
page read and write
1B4E6013000
heap
page read and write
1B4FB2E2000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
2A0AFFE000
stack
page read and write
1B4EFE3A000
trusted library allocation
page read and write
1B4F194B000
trusted library allocation
page read and write
1B4F0B44000
trusted library allocation
page read and write
1B4EF4C4000
trusted library allocation
page read and write
1B4F71F6000
trusted library allocation
page read and write
1B4EEEA0000
trusted library allocation
page read and write
1B4EF96E000
trusted library allocation
page read and write
1B4FB6B5000
trusted library allocation
page read and write
1B4F15EB000
trusted library allocation
page read and write
25B74272000
unclassified section
page read and write
1B4E6054000
heap
page read and write
1B4E600D000
heap
page read and write
16907861000
heap
page read and write
1B4E603E000
heap
page read and write
1B4EC2F6000
trusted library allocation
page read and write
1B4EFE2A000
trusted library allocation
page read and write
1B4EFEC4000
trusted library allocation
page read and write
25B7440E000
trusted library allocation
page read and write
1B4FB5DF000
trusted library allocation
page read and write
1B4FB760000
trusted library allocation
page read and write
1B4F25AE000
trusted library allocation
page read and write
1B4EEF49000
trusted library allocation
page read and write
1B4F1376000
trusted library allocation
page read and write
1B4F71E4000
trusted library allocation
page read and write
1B4EFF4F000
trusted library allocation
page read and write
1144000
heap
page read and write
1B4FB89E000
heap
page read and write
1B4F14D7000
trusted library allocation
page read and write
1B4E5FF1000
heap
page read and write
1B4EFE71000
trusted library allocation
page read and write
1B4F0BFE000
trusted library allocation
page read and write
1B4F6E0F000
trusted library allocation
page read and write
1B4F182E000
trusted library allocation
page read and write
1B4F04E8000
trusted library allocation
page read and write
1B4F01AB000
trusted library allocation
page read and write
1B4F73A6000
trusted library allocation
page read and write
1B4EF983000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
1B4F2458000
trusted library allocation
page read and write
1B4EE70C000
trusted library allocation
page read and write
1B4E5FFB000
heap
page read and write
1B4E6049000
heap
page read and write
16906B2F000
trusted library allocation
page read and write
1B4EEDEE000
trusted library allocation
page read and write
1B4EF456000
trusted library allocation
page read and write
1B4FB6F1000
trusted library allocation
page read and write
1B4F1969000
trusted library allocation
page read and write
1B4F03AB000
trusted library allocation
page read and write
FD1657E000
unkown
page readonly
1B4F7054000
trusted library allocation
page read and write
1B4F0547000
trusted library allocation
page read and write
1B4F008D000
trusted library allocation
page read and write
1B4EEFD7000
trusted library allocation
page read and write
1312000
heap
page read and write
1B4EF99E000
trusted library allocation
page read and write
1B4E0B08000
heap
page read and write
1B4F0263000
trusted library allocation
page read and write
1B4F25F6000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
16906B10000
trusted library allocation
page read and write
1B4FB75D000
trusted library allocation
page read and write
2A094DE000
unkown
page readonly
1B4F0367000
trusted library allocation
page read and write
1B4F050F000
trusted library allocation
page read and write
1B4EC274000
trusted library allocation
page read and write
1B4EFE1F000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4F009D000
trusted library allocation
page read and write
1B4F70C2000
trusted library allocation
page read and write
1B4FB8BD000
heap
page read and write
1B4F00BF000
trusted library allocation
page read and write
1B4FB8B1000
heap
page read and write
1B4F2598000
trusted library allocation
page read and write
1B4F0C67000
trusted library allocation
page read and write
1B4F25F6000
trusted library allocation
page read and write
1B4F247B000
trusted library allocation
page read and write
1B4F25A8000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4FB4C9000
trusted library allocation
page read and write
F5C7B3E000
unkown
page read and write
1B4E604F000
heap
page read and write
1B4E5FF6000
heap
page read and write
1B4F05F6000
trusted library allocation
page read and write
1B4F0B78000
trusted library allocation
page read and write
1B4E600C000
heap
page read and write
1B4F19BB000
trusted library allocation
page read and write
12F8000
heap
page read and write
1B4EFE4B000
trusted library allocation
page read and write
1144000
heap
page read and write
1B4F7623000
trusted library allocation
page read and write
1B4EBF6C000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4F0351000
trusted library allocation
page read and write
1B4F0647000
trusted library allocation
page read and write
1B4E6062000
heap
page read and write
1B4EFE9B000
trusted library allocation
page read and write
1B4F035A000
trusted library allocation
page read and write
1B4F1818000
trusted library allocation
page read and write
1B4EED75000
trusted library allocation
page read and write
1B4E5FFB000
heap
page read and write
1B4E605D000
heap
page read and write
1B4F045B000
trusted library allocation
page read and write
1B4EAF2F000
trusted library allocation
page read and write
1B4EA9DF000
trusted library allocation
page read and write
1B4EFEA5000
trusted library allocation
page read and write
1B4EFFE0000
trusted library allocation
page read and write
16907254000
unkown
page execute read
1B4EE65F000
trusted library allocation
page read and write
1B4EEFC9000
trusted library allocation
page read and write
1B4EA9EF000
trusted library allocation
page read and write
1B4E604F000
heap
page read and write
1B4EEFD7000
trusted library allocation
page read and write
1B4F25F6000
trusted library allocation
page read and write
1B4F03E9000
trusted library allocation
page read and write
1B4EFE6E000
trusted library allocation
page read and write
1B4EEE7F000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
1B4FB473000
trusted library allocation
page read and write
1B4F2448000
trusted library allocation
page read and write
1B4EE7BE000
trusted library allocation
page read and write
1B4F0263000
trusted library allocation
page read and write
1B4F00D2000
trusted library allocation
page read and write
1B4FB8AC000
heap
page read and write
1B4EFB1E000
trusted library allocation
page read and write
1B4F1953000
trusted library allocation
page read and write
169067C0000
unclassified section
page readonly
1B4F8A05000
trusted library allocation
page read and write
1B4FB6AA000
trusted library allocation
page read and write
1B4EEE71000
trusted library allocation
page read and write
1B4F7158000
trusted library allocation
page read and write
1B4F6ED8000
trusted library allocation
page read and write
1B4EF48D000
trusted library allocation
page read and write
1B4EEFDD000
trusted library allocation
page read and write
1B4EA981000
trusted library allocation
page read and write
1B4F19AC000
trusted library allocation
page read and write
1B4FB439000
trusted library allocation
page read and write
1B4FBF57000
trusted library allocation
page read and write
1B4F6EA7000
trusted library allocation
page read and write
1B4EFB4D000
trusted library allocation
page read and write
1B4EFB1A000
trusted library allocation
page read and write
1B4F0786000
trusted library allocation
page read and write
16907749000
heap
page read and write
1B4E6018000
heap
page read and write
1B4F03E9000
trusted library allocation
page read and write
169077A4000
heap
page read and write
1B4FB0FD000
trusted library allocation
page read and write
1B4F8B01000
trusted library allocation
page read and write
1B4FB080000
trusted library allocation
page read and write
16906C2F000
unclassified section
page read and write
1B4F0C74000
trusted library allocation
page read and write
1B4E6051000
heap
page read and write
25B74280000
heap
page read and write
1B4E605D000
heap
page read and write
1B4EAF23000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
FD164FB000
stack
page read and write
1B4E605D000
heap
page read and write
16906C70000
trusted library allocation
page read and write
1B4F73E4000
trusted library allocation
page read and write
1B4F71C4000
trusted library allocation
page read and write
16906B5F000
trusted library allocation
page read and write
1B4EFFEE000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4F2582000
trusted library allocation
page read and write
1B4F256F000
trusted library allocation
page read and write
1B4F04AC000
trusted library allocation
page read and write
1B4FA8B0000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
26D1B5C0000
heap
page read and write
1B4EFEB6000
trusted library allocation
page read and write
1B4F7090000
trusted library allocation
page read and write
1B4FB89A000
heap
page read and write
1B4EF4C4000
trusted library allocation
page read and write
1B4EEDA0000
trusted library allocation
page read and write
1B4F15EF000
trusted library allocation
page read and write
1B4EEDAA000
trusted library allocation
page read and write
1B4F7024000
trusted library allocation
page read and write
1B4F19CC000
trusted library allocation
page read and write
1B4F7437000
trusted library allocation
page read and write
1B4F19EC000
trusted library allocation
page read and write
1B4EF9D7000
trusted library allocation
page read and write
1B4FB872000
heap
page read and write
1B4FB8AB000
heap
page read and write
1B4F15E1000
trusted library allocation
page read and write
1B4EFE7E000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4F0081000
trusted library allocation
page read and write
1B4F19FE000
trusted library allocation
page read and write
1B4E5FF1000
heap
page read and write
1B4F25B6000
trusted library allocation
page read and write
1B4F6EBC000
trusted library allocation
page read and write
1B4F7136000
trusted library allocation
page read and write
1B4F710D000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4F11E3000
trusted library allocation
page read and write
1B4F0093000
trusted library allocation
page read and write
1B4EEE40000
trusted library allocation
page read and write
1B4F045B000
trusted library allocation
page read and write
1B4F0086000
trusted library allocation
page read and write
1B4FAD05000
trusted library allocation
page read and write
1B4F1836000
trusted library allocation
page read and write
1B4F259E000
trusted library allocation
page read and write
1B4F72E9000
trusted library allocation
page read and write
1B4F077C000
trusted library allocation
page read and write
1B4F76BA000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4F008D000
trusted library allocation
page read and write
1B4F0547000
trusted library allocation
page read and write
1B4F0078000
trusted library allocation
page read and write
1B4EF9A2000
trusted library allocation
page read and write
1B4F7172000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
16907826000
heap
page read and write
1144000
heap
page read and write
1B4F6E81000
trusted library allocation
page read and write
1B4F23C0000
trusted library allocation
page read and write
25B742A0000
unclassified section
page readonly
1B4EFFEB000
trusted library allocation
page read and write
1B4FB479000
trusted library allocation
page read and write
1B4F2AB7000
trusted library allocation
page read and write
1B4EFB65000
trusted library allocation
page read and write
1B4F7621000
trusted library allocation
page read and write
1B4EEE6C000
trusted library allocation
page read and write
1B4EF96E000
trusted library allocation
page read and write
1B4EEA2A000
heap
page read and write
1B4EFB95000
trusted library allocation
page read and write
1B4F0652000
trusted library allocation
page read and write
1B4EED82000
trusted library allocation
page read and write
1B4F96B9000
trusted library allocation
page read and write
1B4FA7EB000
trusted library allocation
page read and write
1B4F0BA9000
trusted library allocation
page read and write
169077A0000
heap
page read and write
1B4E600B000
heap
page read and write
1B4F00E2000
trusted library allocation
page read and write
1B4F25FE000
trusted library allocation
page read and write
1B4F19B7000
trusted library allocation
page read and write
1B4FB4B5000
trusted library allocation
page read and write
1B4EE6CA000
trusted library allocation
page read and write
1B4F24A8000
trusted library allocation
page read and write
1B4F021A000
trusted library allocation
page read and write
1B4FB6FE000
trusted library allocation
page read and write
1B4F8AE4000
trusted library allocation
page read and write
1B4EFFEB000
trusted library allocation
page read and write
12E7000
heap
page read and write
1B4F0516000
trusted library allocation
page read and write
1B4FB2E2000
trusted library allocation
page read and write
1B4F723C000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4E6066000
heap
page read and write
16906B80000
trusted library allocation
page read and write
1B4EEEA7000
trusted library allocation
page read and write
1B4E5FFC000
heap
page read and write
169078B9000
heap
page read and write
1B4F2445000
trusted library allocation
page read and write
1B4EF4F2000
trusted library allocation
page read and write
1B4EFE18000
trusted library allocation
page read and write
1B4F24F7000
trusted library allocation
page read and write
1B4E6050000
heap
page read and write
1B4EFB0D000
trusted library allocation
page read and write
1B4FB89E000
heap
page read and write
1B4EB0D2000
trusted library allocation
page read and write
1B4E605E000
heap
page read and write
1B4E603E000
heap
page read and write
1B4EFE6E000
trusted library allocation
page read and write
1B4F0BDE000
trusted library allocation
page read and write
1B4EFF99000
trusted library allocation
page read and write
1B4F12D0000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4EF987000
trusted library allocation
page read and write
1B4EBFD9000
trusted library allocation
page read and write
1B4FB8E2000
heap
page read and write
1B4E606F000
heap
page read and write
1B4F73D7000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4EEDE0000
trusted library allocation
page read and write
23341D12000
trusted library allocation
page read and write
2778FBA0000
heap
page read and write
1B4F6E81000
trusted library allocation
page read and write
1B4F24FD000
trusted library allocation
page read and write
1B4F0B6E000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4EC0FC000
trusted library allocation
page read and write
1B4F1393000
trusted library allocation
page read and write
1B4EFB3F000
trusted library allocation
page read and write
1B4E6026000
heap
page read and write
1B4E5FEF000
heap
page read and write
1B4F739F000
trusted library allocation
page read and write
1312000
heap
page read and write
1B4F71CC000
trusted library allocation
page read and write
1B4EAF23000
trusted library allocation
page read and write
16907831000
heap
page read and write
1B4F7199000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4F73F9000
trusted library allocation
page read and write
1B4EEF71000
trusted library allocation
page read and write
1B4F8AC5000
trusted library allocation
page read and write
1B4FB7FE000
trusted library allocation
page read and write
23341B63000
trusted library allocation
page read and write
1B4FB6D9000
trusted library allocation
page read and write
1B4EC051000
trusted library allocation
page read and write
1B4F18DD000
trusted library allocation
page read and write
1B4F0339000
trusted library allocation
page read and write
1B4F00A2000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4E6066000
heap
page read and write
1B4F04A9000
trusted library allocation
page read and write
1B4EFF93000
trusted library allocation
page read and write
1B4EE633000
trusted library allocation
page read and write
1B4E5FFC000
heap
page read and write
1B4E605C000
heap
page read and write
1B4FB01A000
trusted library allocation
page read and write
1B4F71D5000
trusted library allocation
page read and write
1B4F076F000
trusted library allocation
page read and write
1B4F0567000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
1B4E604F000
heap
page read and write
1B4F0388000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4E6066000
heap
page read and write
1B4EEEA7000
trusted library allocation
page read and write
1B4F254D000
trusted library allocation
page read and write
3F3CDE31000
trusted library allocation
page execute read
1B4F7147000
trusted library allocation
page read and write
2778FBE0000
heap
page read and write
1B4E60AA000
heap
page read and write
1B4F02C8000
trusted library allocation
page read and write
1B4FB2C9000
trusted library allocation
page read and write
1B4F04F9000
trusted library allocation
page read and write
1B4F0B5E000
trusted library allocation
page read and write
1B4F033F000
trusted library allocation
page read and write
1B4EFE83000
trusted library allocation
page read and write
1B4F048B000
trusted library allocation
page read and write
1B4F0098000
trusted library allocation
page read and write
1B4F73D4000
trusted library allocation
page read and write
25B7427F000
unclassified section
page read and write
1B4F1914000
trusted library allocation
page read and write
1B4FB2FC000
trusted library allocation
page read and write
1B4F029E000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4EB0A3000
trusted library allocation
page read and write
1B4EF973000
trusted library allocation
page read and write
1B4FBEA3000
trusted library allocation
page read and write
1B4EF99C000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4E6012000
heap
page read and write
1B4F037B000
trusted library allocation
page read and write
1B4F0B12000
trusted library allocation
page read and write
1B4F73DA000
trusted library allocation
page read and write
1B4E5FF5000
heap
page read and write
1B4EFE71000
trusted library allocation
page read and write
1B4EEDCF000
trusted library allocation
page read and write
1B4FA888000
trusted library allocation
page read and write
1B4F0178000
trusted library allocation
page read and write
1B4E606F000
heap
page read and write
1690779C000
heap
page read and write
1B4EA998000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4EF491000
trusted library allocation
page read and write
1B4EF9AE000
trusted library allocation
page read and write
1B4FB6DE000
trusted library allocation
page read and write
1B4EA9C4000
trusted library allocation
page read and write
1B4EBFF8000
trusted library allocation
page read and write
1B4F0175000
trusted library allocation
page read and write
12E9000
heap
page read and write
1B4F2ADE000
trusted library allocation
page read and write
772000
unkown
page readonly
1B4EED82000
trusted library allocation
page read and write
1B4F03E5000
trusted library allocation
page read and write
1B4F7082000
trusted library allocation
page read and write
1B4F73B0000
trusted library allocation
page read and write
1B4EEE66000
trusted library allocation
page read and write
1B4EFBC3000
trusted library allocation
page read and write
1B4F0731000
trusted library allocation
page read and write
1B4F2ABF000
trusted library allocation
page read and write
1B4EFB52000
trusted library allocation
page read and write
1B4F71A2000
trusted library allocation
page read and write
1B4F00D2000
trusted library allocation
page read and write
1B4F27F1000
trusted library allocation
page read and write
1B4F28E6000
trusted library allocation
page read and write
1B4F0339000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4F0374000
trusted library allocation
page read and write
1B4E6015000
heap
page read and write
1B4F048B000
trusted library allocation
page read and write
169077DC000
heap
page read and write
1B4FB4BF000
trusted library allocation
page read and write
1B4F01E5000
trusted library allocation
page read and write
1B4EF97B000
trusted library allocation
page read and write
1B4FB2FA000
trusted library allocation
page read and write
1B4F04F9000
trusted library allocation
page read and write
1B4F0364000
trusted library allocation
page read and write
1B4F0380000
trusted library allocation
page read and write
1B4EFB5B000
trusted library allocation
page read and write
1B4F0652000
trusted library allocation
page read and write
1B4F0567000
trusted library allocation
page read and write
1B4F00C3000
trusted library allocation
page read and write
F5C71FE000
unkown
page readonly
1B4E6049000
heap
page read and write
12F3000
heap
page read and write
1B4FB6E3000
trusted library allocation
page read and write
169078A7000
heap
page read and write
1B4F72E9000
trusted library allocation
page read and write
1B4EEFCC000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4E6066000
heap
page read and write
1B4F0B3B000
trusted library allocation
page read and write
1B4F02D1000
trusted library allocation
page read and write
1B4E6060000
heap
page read and write
1B4F6EBC000
trusted library allocation
page read and write
1B4EEFFA000
trusted library allocation
page read and write
1B4F2AB0000
trusted library allocation
page read and write
1B4EB0A3000
trusted library allocation
page read and write
1B4F6E72000
trusted library allocation
page read and write
1B4F73A9000
trusted library allocation
page read and write
1B4EB0F3000
trusted library allocation
page read and write
1B4F2AFA000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4E6050000
heap
page read and write
1B4F253B000
trusted library allocation
page read and write
16906B66000
trusted library allocation
page read and write
1B4F76B1000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4FB6DE000
trusted library allocation
page read and write
1B4FAD1C000
trusted library allocation
page read and write
1B4F1872000
trusted library allocation
page read and write
1B4F0BBB000
trusted library allocation
page read and write
1B4FB8AC000
heap
page read and write
1B4FB4BF000
trusted library allocation
page read and write
1B4FB85D000
heap
page read and write
1B4EC227000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4FB26E000
trusted library allocation
page read and write
1B4E6062000
heap
page read and write
169077CA000
heap
page read and write
1B4EFBE0000
trusted library allocation
page read and write
1B4F1663000
trusted library allocation
page read and write
1B4E6013000
heap
page read and write
1B4F0107000
trusted library allocation
page read and write
1B4EC048000
trusted library allocation
page read and write
1B4F6F9A000
trusted library allocation
page read and write
1B4FB89F000
heap
page read and write
1B4F148A000
trusted library allocation
page read and write
1B4F89A3000
trusted library allocation
page read and write
1B4F18E2000
trusted library allocation
page read and write
23341BEA000
trusted library allocation
page read and write
1B4FA823000
trusted library allocation
page read and write
1B4EEDFC000
trusted library allocation
page read and write
6B1000
unkown
page execute read
1B4FB6D9000
trusted library allocation
page read and write
1B4FB5DB000
trusted library allocation
page read and write
1B4EFE96000
trusted library allocation
page read and write
1B4F071C000
trusted library allocation
page read and write
1B4F95DF000
trusted library allocation
page read and write
1B4F254D000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4E6054000
heap
page read and write
1B4E603E000
heap
page read and write
6B1000
unkown
page execute read
1B4F19FE000
trusted library allocation
page read and write
1B4F144E000
trusted library allocation
page read and write
1B4FB69E000
trusted library allocation
page read and write
1B4EC077000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
1B4F6F19000
trusted library allocation
page read and write
1B4F1481000
trusted library allocation
page read and write
1B4EFE37000
trusted library allocation
page read and write
1B4F0BDE000
trusted library allocation
page read and write
1B4EEE21000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F7024000
trusted library allocation
page read and write
1B4EFFE0000
trusted library allocation
page read and write
169077BD000
heap
page read and write
1B4F2512000
trusted library allocation
page read and write
1B4EC294000
trusted library allocation
page read and write
1B4F7396000
trusted library allocation
page read and write
1B4F709B000
trusted library allocation
page read and write
1B4FB8BD000
heap
page read and write
1B4F04A9000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4FB0D8000
trusted library allocation
page read and write
1B4EF9C3000
trusted library allocation
page read and write
1B4F00BA000
trusted library allocation
page read and write
1B4EEFD3000
trusted library allocation
page read and write
1B4E6015000
heap
page read and write
1B4E604B000
heap
page read and write
1B4E603E000
heap
page read and write
1B4E601D000
heap
page read and write
1B4E605D000
heap
page read and write
1B4E6049000
heap
page read and write
26D1CEB7000
heap
page read and write
1B4F1873000
trusted library allocation
page read and write
1B4EEF84000
trusted library allocation
page read and write
1B4FB89F000
heap
page read and write
1B4E6054000
heap
page read and write
1B4F00F6000
trusted library allocation
page read and write
1B4F076A000
trusted library allocation
page read and write
1B4F005E000
trusted library allocation
page read and write
1B4F70B6000
trusted library allocation
page read and write
1B4EFFDE000
trusted library allocation
page read and write
FEF000
stack
page read and write
1B4EFBBF000
trusted library allocation
page read and write
1B4F18DD000
trusted library allocation
page read and write
1B4EFE96000
trusted library allocation
page read and write
1B4EF4B6000
trusted library allocation
page read and write
9C0000
heap
page read and write
1B4E600A000
heap
page read and write
1B4F1854000
trusted library allocation
page read and write
1B4EF99A000
trusted library allocation
page read and write
1B4F0388000
trusted library allocation
page read and write
1B4FB6F3000
trusted library allocation
page read and write
1B4F71F0000
trusted library allocation
page read and write
1B4EEDBC000
trusted library allocation
page read and write
1B4F0241000
trusted library allocation
page read and write
1B4F0380000
trusted library allocation
page read and write
1B4F2539000
trusted library allocation
page read and write
1B4EFF38000
trusted library allocation
page read and write
1B4F6FF1000
trusted library allocation
page read and write
1B4F0AE2000
trusted library allocation
page read and write
1B4FB4D4000
trusted library allocation
page read and write
1B4EEFED000
trusted library allocation
page read and write
1B4E6016000
heap
page read and write
1B4EFE7A000
trusted library allocation
page read and write
1B4F23C4000
trusted library allocation
page read and write
1B4F18E2000
trusted library allocation
page read and write
1B4F7099000
trusted library allocation
page read and write
1B4FB6C3000
trusted library allocation
page read and write
1B4F010E000
trusted library allocation
page read and write
1144000
heap
page read and write
FD17E7E000
stack
page read and write
1B4F00F1000
trusted library allocation
page read and write
1B4EFF77000
trusted library allocation
page read and write
1B4F24EC000
trusted library allocation
page read and write
1B4F04F9000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4EFEDF000
trusted library allocation
page read and write
1B4EFEFA000
trusted library allocation
page read and write
1B4FB0B1000
trusted library allocation
page read and write
1B4EFB4D000
trusted library allocation
page read and write
1B4FA754000
trusted library allocation
page read and write
1B4FB8BD000
heap
page read and write
1B4FA743000
trusted library allocation
page read and write
1B4F2AC4000
trusted library allocation
page read and write
1B4FBE0C000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
F5C59D8000
stack
page read and write
1B4E6057000
heap
page read and write
23341C12000
unclassified section
page read and write
1B4EFE7B000
trusted library allocation
page read and write
1B4E606F000
heap
page read and write
1B4EEA6D000
heap
page read and write
1B4E60AA000
heap
page read and write
2A0B7FE000
unkown
page readonly
1B4EFE28000
trusted library allocation
page read and write
1B4F04FB000
trusted library allocation
page read and write
1B4E605E000
heap
page read and write
1B4F0086000
trusted library allocation
page read and write
1B4FB412000
trusted library allocation
page read and write
12F8000
heap
page read and write
1B4F003C000
trusted library allocation
page read and write
1B4F8B57000
trusted library allocation
page read and write
1B4F6F6C000
trusted library allocation
page read and write
1B4EFB2B000
trusted library allocation
page read and write
1B4F715C000
trusted library allocation
page read and write
1B4F0348000
trusted library allocation
page read and write
1B4EFEC4000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4EF9A3000
trusted library allocation
page read and write
1B4FBDE5000
trusted library allocation
page read and write
26D1B31A000
heap
page read and write
1B4FBEE4000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4EF9A2000
trusted library allocation
page read and write
1B4FB75E000
trusted library allocation
page read and write
1B4F029E000
trusted library allocation
page read and write
1B4EEFE1000
trusted library allocation
page read and write
1B4F6E7A000
trusted library allocation
page read and write
1B4F04F6000
trusted library allocation
page read and write
1B4EF9D9000
trusted library allocation
page read and write
1B4EFB12000
trusted library allocation
page read and write
1B4EED87000
trusted library allocation
page read and write
1B4F0356000
trusted library allocation
page read and write
1B4FB491000
trusted library allocation
page read and write
1B4FB6B5000
trusted library allocation
page read and write
1B4F8AA7000
trusted library allocation
page read and write
1B4F0175000
trusted library allocation
page read and write
1B4F01E1000
trusted library allocation
page read and write
1B4FB6D9000
trusted library allocation
page read and write
1B4FB92C000
heap
page read and write
23341E00000
heap
page read and write
1B4FB84D000
heap
page read and write
1B4F25B1000
trusted library allocation
page read and write
1B4F0B8E000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
25B74470000
trusted library allocation
page read and write
23341B60000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4FB258000
trusted library allocation
page read and write
1B4F13FA000
trusted library allocation
page read and write
1B4F71E8000
trusted library allocation
page read and write
1B4F0312000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F73AA000
trusted library allocation
page read and write
1B4EEEA7000
trusted library allocation
page read and write
1314000
heap
page read and write
1B4EFE8D000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4F73A3000
trusted library allocation
page read and write
1B4E6050000
heap
page read and write
1B4EC054000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
26D1B2B0000
heap
page read and write
1B4EF980000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
1B4F00C3000
trusted library allocation
page read and write
1B4EEED6000
trusted library allocation
page read and write
1B4EED38000
trusted library allocation
page read and write
1B4F2539000
trusted library allocation
page read and write
1B4F037C000
trusted library allocation
page read and write
1B4FB2C9000
trusted library allocation
page read and write
1B4F6EF8000
trusted library allocation
page read and write
1B4F0090000
trusted library allocation
page read and write
1B4F0345000
trusted library allocation
page read and write
1B4F25EE000
trusted library allocation
page read and write
1B4F031A000
trusted library allocation
page read and write
1B4F70CA000
trusted library allocation
page read and write
1B4F0489000
trusted library allocation
page read and write
1B4F70D5000
trusted library allocation
page read and write
1B4EF9A2000
trusted library allocation
page read and write
1B4EFF4D000
trusted library allocation
page read and write
1B4F0348000
trusted library allocation
page read and write
1B4F1926000
trusted library allocation
page read and write
1B4F04F9000
trusted library allocation
page read and write
1B4EF958000
trusted library allocation
page read and write
16906C30000
trusted library allocation
page read and write
1B4F0061000
trusted library allocation
page read and write
1690782E000
heap
page read and write
1B4F0374000
trusted library allocation
page read and write
1B4FB258000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4EEDDA000
trusted library allocation
page read and write
26D1B3A0000
heap
page read and write
25B740D0000
heap
page read and write
1B4F747F000
trusted library allocation
page read and write
1B4EFB0F000
trusted library allocation
page read and write
1B4F6F25000
trusted library allocation
page read and write
1B4F1355000
trusted library allocation
page read and write
25B741C0000
heap
page read and write
1B4F03AB000
trusted library allocation
page read and write
1B4F6F9B000
trusted library allocation
page read and write
2778FF00000
trusted library allocation
page read and write
1B4EF933000
trusted library allocation
page read and write
1B4F73C6000
trusted library allocation
page read and write
1B4EFFBF000
trusted library allocation
page read and write
1B4EFFEF000
trusted library allocation
page read and write
1B4F2598000
trusted library allocation
page read and write
1B4F27E1000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F0AC0000
trusted library allocation
page read and write
1B4F0518000
trusted library allocation
page read and write
1B4E604F000
heap
page read and write
1B4EC075000
trusted library allocation
page read and write
1B4EFFDE000
trusted library allocation
page read and write
1B4E6060000
heap
page read and write
1690778D000
heap
page read and write
1B4F70DE000
trusted library allocation
page read and write
1B4F0A7F000
trusted library allocation
page read and write
1690782E000
heap
page read and write
2778FC4A000
heap
page read and write
1B4E6049000
heap
page read and write
169077A0000
heap
page read and write
890EFFB000
stack
page read and write
1B4F02DC000
trusted library allocation
page read and write
1B4EFE32000
trusted library allocation
page read and write
16907831000
heap
page read and write
1B4E601D000
heap
page read and write
1B4EC29D000
trusted library allocation
page read and write
1B4EEDB7000
trusted library allocation
page read and write
1B4EEF6D000
trusted library allocation
page read and write
1B4FA8B9000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4EF973000
trusted library allocation
page read and write
1B4F0B8E000
trusted library allocation
page read and write
1306000
heap
page read and write
1B4FB7FC000
trusted library allocation
page read and write
1B4FB89F000
heap
page read and write
1B4E603E000
heap
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4F05FC000
trusted library allocation
page read and write
1B4E604B000
heap
page read and write
1B4EB075000
trusted library allocation
page read and write
1B4F28A1000
trusted library allocation
page read and write
1B4EEDDA000
trusted library allocation
page read and write
1B4F0540000
trusted library allocation
page read and write
1B4F033F000
trusted library allocation
page read and write
FD1763E000
stack
page read and write
1B4EEFDF000
trusted library allocation
page read and write
1B4EBF1C000
trusted library allocation
page read and write
1B4EC0FC000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4F00E0000
trusted library allocation
page read and write
1B4F00F6000
trusted library allocation
page read and write
1B4FB439000
trusted library allocation
page read and write
1B4F02E0000
trusted library allocation
page read and write
1B4EF4BE000
trusted library allocation
page read and write
1B4F71ED000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4E608E000
heap
page read and write
1B4EFFCC000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4F31A3000
trusted library allocation
page read and write
1B4F02E4000
trusted library allocation
page read and write
1B4F026E000
trusted library allocation
page read and write
26D1CEAC000
heap
page read and write
1B4E600E000
heap
page read and write
1B4EFE6C000
trusted library allocation
page read and write
1B4F007C000
trusted library allocation
page read and write
1B4F6E5D000
trusted library allocation
page read and write
1B4F8A86000
trusted library allocation
page read and write
16907899000
heap
page read and write
1B4F050D000
trusted library allocation
page read and write
1B4FB2E6000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
16906B03000
trusted library allocation
page read and write
1B4FB8A6000
heap
page read and write
1B4E606F000
heap
page read and write
1B4F25F8000
trusted library allocation
page read and write
1B4F0B78000
trusted library allocation
page read and write
1B4EFE81000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4EFFA1000
trusted library allocation
page read and write
1B4FA8EF000
trusted library allocation
page read and write
1B4EEDBC000
trusted library allocation
page read and write
1B4F242F000
trusted library allocation
page read and write
1B4F14D7000
trusted library allocation
page read and write
16906BC6000
trusted library allocation
page read and write
1B4F7623000
trusted library allocation
page read and write
1B4EFB5B000
trusted library allocation
page read and write
1B4F700F000
trusted library allocation
page read and write
1B4F0A3E000
trusted library allocation
page read and write
1B4F131D000
trusted library allocation
page read and write
1B4EEDE3000
trusted library allocation
page read and write
1B4F0BA9000
trusted library allocation
page read and write
1B4F6E5D000
trusted library allocation
page read and write
1B4F7185000
trusted library allocation
page read and write
1B4F19C7000
trusted library allocation
page read and write
16907832000
heap
page read and write
1B4EEF7D000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4F73DD000
trusted library allocation
page read and write
1B4EF4BD000
trusted library allocation
page read and write
F5C723E000
unkown
page readonly
1B4E600A000
heap
page read and write
1B4EFEAE000
trusted library allocation
page read and write
1B4F0315000
trusted library allocation
page read and write
1B4F7115000
trusted library allocation
page read and write
1B4EEDBC000
trusted library allocation
page read and write
1B4F1363000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4EEA2C000
heap
page read and write
1B4E601C000
heap
page read and write
1B4F24BE000
trusted library allocation
page read and write
FD163FE000
unkown
page readonly
1B4F1933000
trusted library allocation
page read and write
1B4F138A000
trusted library allocation
page read and write
1B4F6F2C000
trusted library allocation
page read and write
1B4EF988000
trusted library allocation
page read and write
1B4F19CA000
trusted library allocation
page read and write
1B4EEFD7000
trusted library allocation
page read and write
1B4F05EA000
trusted library allocation
page read and write
1B4EFFDE000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4F14EE000
trusted library allocation
page read and write
1B4F71D3000
trusted library allocation
page read and write
1B4EFD9D000
trusted library allocation
page read and write
1B4FB89A000
heap
page read and write
1B4F02EE000
trusted library allocation
page read and write
1B4F0BD1000
trusted library allocation
page read and write
1B4FA8EF000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F6F7D000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4F03AB000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4FB6D5000
trusted library allocation
page read and write
1B4EF9B5000
trusted library allocation
page read and write
1B4F128D000
trusted library allocation
page read and write
1B4FB6F3000
trusted library allocation
page read and write
1B4F183D000
trusted library allocation
page read and write
1B4F25B1000
trusted library allocation
page read and write
1B4F04F9000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4E605D000
heap
page read and write
1B4FB4BF000
trusted library allocation
page read and write
1B4F2426000
trusted library allocation
page read and write
1B4FB8A9000
heap
page read and write
1B4F18C5000
trusted library allocation
page read and write
25B74524000
heap
page read and write
23341D21000
trusted library allocation
page read and write
1B4E5FFC000
heap
page read and write
1B4FA87F000
trusted library allocation
page read and write
1B4EFD53000
trusted library allocation
page read and write
1B4F00B2000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
26D1B347000
heap
page read and write
1B4E6054000
heap
page read and write
1B4F0B37000
trusted library allocation
page read and write
1B4EC013000
trusted library allocation
page read and write
1B4EFE67000
trusted library allocation
page read and write
1B4EA9EF000
trusted library allocation
page read and write
1B4F0360000
trusted library allocation
page read and write
1B4EFB69000
trusted library allocation
page read and write
1B4EC069000
trusted library allocation
page read and write
1B4F145C000
trusted library allocation
page read and write
1B4EE661000
trusted library allocation
page read and write
F5C4FFE000
stack
page read and write
1B4E6054000
heap
page read and write
1B4FBF2C000
trusted library allocation
page read and write
1B4F6EBF000
trusted library allocation
page read and write
25B74526000
heap
page read and write
1B4F0BB9000
trusted library allocation
page read and write
1144000
heap
page read and write
1B4EF9F0000
trusted library allocation
page read and write
1B4E5FFC000
heap
page read and write
169077BD000
heap
page read and write
1B4FB2F8000
trusted library allocation
page read and write
1B4F04E8000
trusted library allocation
page read and write
26D1B1C0000
heap
page read and write
1B4F715C000
trusted library allocation
page read and write
1B4F6E7A000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4EEED6000
trusted library allocation
page read and write
1B4FB767000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4F033D000
trusted library allocation
page read and write
1B4F6E76000
trusted library allocation
page read and write
1B4F00D0000
trusted library allocation
page read and write
169077AC000
heap
page read and write
25B74400000
trusted library allocation
page read and write
1B4EFFD3000
trusted library allocation
page read and write
1B4FB0C0000
trusted library allocation
page read and write
1B4EF987000
trusted library allocation
page read and write
1B4F1443000
trusted library allocation
page read and write
1B4FA7CD000
trusted library allocation
page read and write
1B4EEFC4000
trusted library allocation
page read and write
1B4F7623000
trusted library allocation
page read and write
1B4F0ABE000
trusted library allocation
page read and write
1B4E6002000
heap
page read and write
1B4EED96000
trusted library allocation
page read and write
1B4EF9EC000
trusted library allocation
page read and write
1B4FB6F1000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4EFEE9000
trusted library allocation
page read and write
1B4EE6D5000
trusted library allocation
page read and write
1B4FB858000
heap
page read and write
25B744C4000
trusted library allocation
page read and write
1B4F283A000
trusted library allocation
page read and write
1B4EFE27000
trusted library allocation
page read and write
1B4FB6FC000
trusted library allocation
page read and write
1B4F0118000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4F019B000
trusted library allocation
page read and write
1B4F96E2000
trusted library allocation
page read and write
1B4FB8AA000
heap
page read and write
1B4F180A000
trusted library allocation
page read and write
1B4F70D5000
trusted library allocation
page read and write
12E7000
heap
page read and write
1B4E604F000
heap
page read and write
1B4F1363000
trusted library allocation
page read and write
1B4EFE69000
trusted library allocation
page read and write
1B4F006B000
trusted library allocation
page read and write
16906BE8000
trusted library allocation
page read and write
FD165BE000
stack
page read and write
1B4EF493000
trusted library allocation
page read and write
1B4F2A7B000
trusted library allocation
page read and write
1B4EC051000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4F03AD000
trusted library allocation
page read and write
1B4F034E000
trusted library allocation
page read and write
1314000
heap
page read and write
1B4F27D9000
trusted library allocation
page read and write
1B4F7090000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
1B4F2A85000
trusted library allocation
page read and write
1B4FA8E5000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
23341A00000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4EF9C3000
trusted library allocation
page read and write
169077A9000
heap
page read and write
1B4F76AD000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
2778FE00000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4EFF93000
trusted library allocation
page read and write
1B4EA9F9000
trusted library allocation
page read and write
169077EA000
heap
page read and write
1B4F04D5000
trusted library allocation
page read and write
1B4FB89F000
heap
page read and write
1B4EB100000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4F27E1000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4F96F8000
trusted library allocation
page read and write
16907828000
heap
page read and write
1B4FB74A000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4F0321000
trusted library allocation
page read and write
1B4F72FD000
trusted library allocation
page read and write
780000
unkown
page write copy
1B4F0B8E000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4FB6B5000
trusted library allocation
page read and write
277900B0000
heap
page read and write
1B4E6049000
heap
page read and write
1B4FB6F3000
trusted library allocation
page read and write
1B4F74BE000
trusted library allocation
page read and write
1B4F96BA000
trusted library allocation
page read and write
1B4FB4C9000
trusted library allocation
page read and write
1306000
heap
page read and write
1B4F0345000
trusted library allocation
page read and write
1B4FB258000
trusted library allocation
page read and write
1B4EA9CE000
trusted library allocation
page read and write
1B4EBF42000
trusted library allocation
page read and write
1B4EF9D5000
trusted library allocation
page read and write
12DF000
heap
page read and write
1B4F6E5C000
trusted library allocation
page read and write
1B4F6EF8000
trusted library allocation
page read and write
1B4EF9A3000
trusted library allocation
page read and write
1B4EB013000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4FB89E000
heap
page read and write
1B4FB09D000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
1B4E605D000
heap
page read and write
1B4F034A000
trusted library allocation
page read and write
1B4E6003000
heap
page read and write
1B4FA78C000
trusted library allocation
page read and write
1B4FBD86000
trusted library allocation
page read and write
1B4EC29D000
trusted library allocation
page read and write
1B4F95CE000
trusted library allocation
page read and write
1B4F06D4000
trusted library allocation
page read and write
1690787B000
heap
page read and write
1B4EE7D1000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
1B4F009D000
trusted library allocation
page read and write
1B4EEA2A000
heap
page read and write
1B4F0725000
trusted library allocation
page read and write
1B4F71CC000
trusted library allocation
page read and write
1B4F71C3000
trusted library allocation
page read and write
1B4F2ADA000
trusted library allocation
page read and write
1B4F2585000
trusted library allocation
page read and write
1B4FC437000
trusted library allocation
page read and write
1B4F0093000
trusted library allocation
page read and write
1B4EEF81000
trusted library allocation
page read and write
1B4F191E000
trusted library allocation
page read and write
169070F0000
heap
page read and write
1B4F25FE000
trusted library allocation
page read and write
1B4F72FB000
trusted library allocation
page read and write
1B4F1959000
trusted library allocation
page read and write
1B4EEDE8000
trusted library allocation
page read and write
1B4EFEAE000
trusted library allocation
page read and write
25B744B1000
trusted library allocation
page read and write
784000
unkown
page readonly
1B4EC227000
trusted library allocation
page read and write
1B4E6026000
heap
page read and write
1B4F7185000
trusted library allocation
page read and write
1B4F00BA000
trusted library allocation
page read and write
1B4FB6B9000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4F0BB9000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
169077A9000
heap
page read and write
1B4EEA6D000
heap
page read and write
1B4EF484000
trusted library allocation
page read and write
1B4F0BAC000
trusted library allocation
page read and write
1B4F188B000
trusted library allocation
page read and write
1B4EC075000
trusted library allocation
page read and write
25B74465000
trusted library allocation
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4F76B7000
trusted library allocation
page read and write
1B4F0315000
trusted library allocation
page read and write
1B4EEDDD000
trusted library allocation
page read and write
1B4F04F4000
trusted library allocation
page read and write
1B4F04F9000
trusted library allocation
page read and write
1B4F0093000
trusted library allocation
page read and write
1B4EFFCB000
trusted library allocation
page read and write
1B4FB83E000
heap
page read and write
1B4EF4FD000
trusted library allocation
page read and write
1B4EB07D000
trusted library allocation
page read and write
1B4F1355000
trusted library allocation
page read and write
1B4FB8B0000
heap
page read and write
1B4F0135000
trusted library allocation
page read and write
1B4F74AA000
trusted library allocation
page read and write
1B4EFB59000
trusted library allocation
page read and write
1B4EFF41000
trusted library allocation
page read and write
1B4EFEB1000
trusted library allocation
page read and write
1B4E604F000
heap
page read and write
1B4F762D000
trusted library allocation
page read and write
1B4F0239000
trusted library allocation
page read and write
16907304000
trusted library allocation
page read and write
16906B85000
trusted library allocation
page read and write
1B4EE6CA000
trusted library allocation
page read and write
1B4FB7E0000
trusted library allocation
page read and write
1B4F13A5000
trusted library allocation
page read and write
1B4F9DA8000
trusted library allocation
page read and write
1B4FB0B1000
trusted library allocation
page read and write
1B4EFB09000
trusted library allocation
page read and write
1B4EFE71000
trusted library allocation
page read and write
1B4F18DD000
trusted library allocation
page read and write
1B4F6EA7000
trusted library allocation
page read and write
1B4F053D000
trusted library allocation
page read and write
1B4F190C000
trusted library allocation
page read and write
169078A7000
heap
page read and write
1B4EF996000
trusted library allocation
page read and write
1B4F0134000
trusted library allocation
page read and write
1B4EFB4D000
trusted library allocation
page read and write
1B4F7096000
trusted library allocation
page read and write
26D1CEC0000
heap
page read and write
1B4EF411000
trusted library allocation
page read and write
1B4F0638000
trusted library allocation
page read and write
1B4EC2A2000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4EFE69000
trusted library allocation
page read and write
1B4F7199000
trusted library allocation
page read and write
1B4FB8BD000
heap
page read and write
1B4E6060000
heap
page read and write
1B4F0685000
trusted library allocation
page read and write
25B74482000
trusted library allocation
page read and write
1B4FA899000
trusted library allocation
page read and write
1B4E6061000
heap
page read and write
1B4F0BA4000
trusted library allocation
page read and write
1B4F0354000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4EF4F5000
trusted library allocation
page read and write
1B4FB6CF000
trusted library allocation
page read and write
1B4F0382000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
1B4EFE2E000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
1B4FB5E1000
trusted library allocation
page read and write
1B4EFB5B000
trusted library allocation
page read and write
1B4EEF3F000
trusted library allocation
page read and write
1B4E6026000
heap
page read and write
1B4EE6FA000
trusted library allocation
page read and write
1B4EFE67000
trusted library allocation
page read and write
1B4EEE8F000
trusted library allocation
page read and write
1B4F254D000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4FB248000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4FB788000
trusted library allocation
page read and write
1B4F73BD000
trusted library allocation
page read and write
1B4F02E4000
trusted library allocation
page read and write
1B4F01F1000
trusted library allocation
page read and write
1B4F96EB000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4E600C000
heap
page read and write
1B4EF913000
trusted library allocation
page read and write
1B4E6004000
heap
page read and write
1B4EE6D5000
trusted library allocation
page read and write
1B4FB2F8000
trusted library allocation
page read and write
1B4F0A9F000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
1B4E6066000
heap
page read and write
1B4EEDB2000
trusted library allocation
page read and write
1B4F760B000
trusted library allocation
page read and write
1B4F241C000
trusted library allocation
page read and write
1B4F0443000
trusted library allocation
page read and write
1B4F72FB000
trusted library allocation
page read and write
1B4F6EB8000
trusted library allocation
page read and write
1B4EB017000
trusted library allocation
page read and write
1B4EEDD4000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4EF95E000
trusted library allocation
page read and write
1B4F76D5000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4F045B000
trusted library allocation
page read and write
1B4F6E6E000
trusted library allocation
page read and write
1B4F72BF000
trusted library allocation
page read and write
25B74476000
trusted library allocation
page read and write
1B4EF4FC000
trusted library allocation
page read and write
1B4EF9C3000
trusted library allocation
page read and write
1B4FC450000
trusted library allocation
page read and write
1B4EEDE0000
trusted library allocation
page read and write
1B4E6062000
heap
page read and write
1B4FB6C3000
trusted library allocation
page read and write
1B4F25B1000
trusted library allocation
page read and write
1B4F0483000
trusted library allocation
page read and write
1B4EEA69000
heap
page read and write
1B4F0328000
trusted library allocation
page read and write
1B4FB6DE000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
1B4FB6BA000
trusted library allocation
page read and write
16907840000
heap
page read and write
1B4F0518000
trusted library allocation
page read and write
1B4EC075000
trusted library allocation
page read and write
1B4EB0F3000
trusted library allocation
page read and write
1B4F718D000
trusted library allocation
page read and write
1B4F033F000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4FB2B3000
trusted library allocation
page read and write
25B7440C000
trusted library allocation
page read and write
1B4F0743000
trusted library allocation
page read and write
1B4F700A000
trusted library allocation
page read and write
1B4F95DF000
trusted library allocation
page read and write
1B4EEFD7000
trusted library allocation
page read and write
1B4F7444000
trusted library allocation
page read and write
1B4F00F8000
trusted library allocation
page read and write
1B4EE783000
trusted library allocation
page read and write
1B4F0BBB000
trusted library allocation
page read and write
1B4F7106000
trusted library allocation
page read and write
1B4E6056000
heap
page read and write
1B4EF966000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4E6012000
heap
page read and write
1B4F1985000
trusted library allocation
page read and write
1690786D000
heap
page read and write
1B4F2512000
trusted library allocation
page read and write
1B4F6E4D000
trusted library allocation
page read and write
1B4EF96D000
trusted library allocation
page read and write
1B4EFE69000
trusted library allocation
page read and write
1B4EFE4D000
trusted library allocation
page read and write
1B4FB25E000
trusted library allocation
page read and write
1B4F71C2000
trusted library allocation
page read and write
16906B69000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
25B74413000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
1B4F70C2000
trusted library allocation
page read and write
8910FFE000
stack
page read and write
1B4F700A000
trusted library allocation
page read and write
1B4FB258000
trusted library allocation
page read and write
1B4E6060000
heap
page read and write
16907741000
heap
page read and write
1B4F25F6000
trusted library allocation
page read and write
1B4EF9AE000
trusted library allocation
page read and write
1B4F7024000
trusted library allocation
page read and write
1B4FB6B9000
trusted library allocation
page read and write
1B4EFF57000
trusted library allocation
page read and write
1B4F19BB000
trusted library allocation
page read and write
1B4EEFE4000
trusted library allocation
page read and write
F5C833E000
unkown
page readonly
1B4F02E9000
trusted library allocation
page read and write
1B4EEE6F000
trusted library allocation
page read and write
1B4F184D000
trusted library allocation
page read and write
25B74468000
trusted library allocation
page read and write
1B4F25B6000
trusted library allocation
page read and write
1B4F96AF000
trusted library allocation
page read and write
1B4FB6DE000
trusted library allocation
page read and write
1B4F033D000
trusted library allocation
page read and write
1B4EAF23000
trusted library allocation
page read and write
26D1CEA0000
heap
page read and write
1B4EF4CA000
trusted library allocation
page read and write
1B4EFE8B000
trusted library allocation
page read and write
1B4FB8A2000
heap
page read and write
1B4E6026000
heap
page read and write
1B4F18E2000
trusted library allocation
page read and write
1B4F0380000
trusted library allocation
page read and write
1B4EF9B0000
trusted library allocation
page read and write
1B4F76AD000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1690782E000
heap
page read and write
23341BCB000
trusted library allocation
page read and write
1B4EFFEF000
trusted library allocation
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1B4EF9B4000
trusted library allocation
page read and write
1B4E605E000
heap
page read and write
1B4EEDBC000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
12C0000
heap
page read and write
1B4E5FF6000
heap
page read and write
1B4E6054000
heap
page read and write
1B4F739D000
trusted library allocation
page read and write
1B4EF983000
trusted library allocation
page read and write
1B4EFED2000
trusted library allocation
page read and write
1B4EF958000
trusted library allocation
page read and write
1B4EEF77000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4FB2E4000
trusted library allocation
page read and write
1B4EB0B8000
trusted library allocation
page read and write
1B4E6051000
heap
page read and write
1B4FA300000
trusted library allocation
page read and write
1B4F04B1000
trusted library allocation
page read and write
1B4F73B0000
trusted library allocation
page read and write
1B4FB8BD000
heap
page read and write
1B4EEE84000
trusted library allocation
page read and write
1B4F02FC000
trusted library allocation
page read and write
1B4F051E000
trusted library allocation
page read and write
1B4F048B000
trusted library allocation
page read and write
25B74530000
heap
page read and write
1B4F71F3000
trusted library allocation
page read and write
12F6000
heap
page read and write
1B4FB76D000
trusted library allocation
page read and write
1B4F6E56000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4EFB0F000
trusted library allocation
page read and write
1B4F6F29000
trusted library allocation
page read and write
1B4F251F000
trusted library allocation
page read and write
1B4F037B000
trusted library allocation
page read and write
1B4E600D000
heap
page read and write
1B4E603E000
heap
page read and write
1B4E600C000
heap
page read and write
1B4FB0B1000
trusted library allocation
page read and write
1B4F18DD000
trusted library allocation
page read and write
1B4F8E00000
trusted library allocation
page read and write
1B4F0263000
trusted library allocation
page read and write
16906C60000
heap
page read and write
1B4FB8B1000
heap
page read and write
1B4EEDDA000
trusted library allocation
page read and write
1B4EFE6C000
trusted library allocation
page read and write
169077A0000
heap
page read and write
1B4F02D1000
trusted library allocation
page read and write
1B4F70D0000
trusted library allocation
page read and write
12F3000
heap
page read and write
1B4E6003000
heap
page read and write
26D1B32D000
heap
page read and write
1B4F009D000
trusted library allocation
page read and write
1B4EEDAA000
trusted library allocation
page read and write
1B4FBE05000
trusted library allocation
page read and write
1B4F0635000
trusted library allocation
page read and write
23341B69000
trusted library allocation
page read and write
1B4F6FA6000
trusted library allocation
page read and write
1B4EF9DB000
trusted library allocation
page read and write
1B4FB6C3000
trusted library allocation
page read and write
1B4FB004000
trusted library allocation
page read and write
1316000
heap
page read and write
1B4EC074000
trusted library allocation
page read and write
25B7448F000
trusted library allocation
page read and write
1B4EEF89000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4EED67000
trusted library allocation
page read and write
1B4FB8FD000
heap
page read and write
25B740D3000
heap
page read and write
1B4EFE3F000
trusted library allocation
page read and write
1B4F70C8000
trusted library allocation
page read and write
16906BB9000
trusted library allocation
page read and write
1B4FA728000
trusted library allocation
page read and write
1B4E6003000
heap
page read and write
1B4F8AAC000
trusted library allocation
page read and write
1B4F033F000
trusted library allocation
page read and write
1B4EEEA7000
trusted library allocation
page read and write
1B4EED96000
trusted library allocation
page read and write
1B4EFE7E000
trusted library allocation
page read and write
25B740B0000
heap
page read and write
1B4F0192000
trusted library allocation
page read and write
169078B7000
heap
page read and write
1B4F0351000
trusted library allocation
page read and write
26D1CEB9000
heap
page read and write
1B4EFF95000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4FA888000
trusted library allocation
page read and write
1B4F70D0000
trusted library allocation
page read and write
1B4EFE81000
trusted library allocation
page read and write
1B4F73C3000
trusted library allocation
page read and write
16906840000
heap
page read and write
1B4F00FE000
trusted library allocation
page read and write
1B4FB2BA000
trusted library allocation
page read and write
1B4F6E0F000
trusted library allocation
page read and write
1B4EFB95000
trusted library allocation
page read and write
1B4F9693000
trusted library allocation
page read and write
1B4F73D4000
trusted library allocation
page read and write
23341B83000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4F0540000
trusted library allocation
page read and write
1B4F045D000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4EEFF4000
trusted library allocation
page read and write
1B4FA83D000
trusted library allocation
page read and write
1B4EE6FA000
trusted library allocation
page read and write
1B4E606A000
heap
page read and write
1B4EF4D4000
trusted library allocation
page read and write
1B4E600A000
heap
page read and write
16907898000
heap
page read and write
1B4F0335000
trusted library allocation
page read and write
1B4FA8B0000
trusted library allocation
page read and write
1B4EEA34000
heap
page read and write
1B4F7247000
trusted library allocation
page read and write
118E000
stack
page read and write
1B4E6015000
heap
page read and write
1B4FB8AB000
heap
page read and write
1B4F1453000
trusted library allocation
page read and write
1B4F1663000
trusted library allocation
page read and write
1B4F00DC000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
25B7480C000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4EFB3F000
trusted library allocation
page read and write
1B4F0081000
trusted library allocation
page read and write
1B4E60AA000
heap
page read and write
16906990000
heap
page read and write
16907862000
heap
page read and write
26D1B347000
heap
page read and write
1B4EF4AB000
trusted library allocation
page read and write
1B4E6002000
heap
page read and write
1B4F037C000
trusted library allocation
page read and write
1B4FAD50000
trusted library allocation
page read and write
1B4F0647000
trusted library allocation
page read and write
1B4F6FDA000
trusted library allocation
page read and write
1B4F00FE000
trusted library allocation
page read and write
16907898000
heap
page read and write
2778FC40000
heap
page read and write
1B4F03E5000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F0086000
trusted library allocation
page read and write
1B4F063D000
trusted library allocation
page read and write
1B4F7700000
trusted library allocation
page read and write
1B4EC077000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
23341990000
heap
page read and write
23341B5D000
trusted library allocation
page read and write
1B4F0051000
trusted library allocation
page read and write
1B4F70DE000
trusted library allocation
page read and write
1B4F7084000
trusted library allocation
page read and write
1B4EFE69000
trusted library allocation
page read and write
1B4F13A5000
trusted library allocation
page read and write
25B74707000
trusted library allocation
page read and write
1B4FB27F000
trusted library allocation
page read and write
1B4E604D000
heap
page read and write
1B4EEFB2000
trusted library allocation
page read and write
1B4F74B3000
trusted library allocation
page read and write
1B4EFBB4000
trusted library allocation
page read and write
1B4E606A000
heap
page read and write
1B4F0700000
trusted library allocation
page read and write
16907317000
trusted library allocation
page read and write
1B4FBF33000
trusted library allocation
page read and write
1B4F0B94000
trusted library allocation
page read and write
1690723D000
unkown
page execute read
1B4F6F6C000
trusted library allocation
page read and write
1B4F04B8000
trusted library allocation
page read and write
1B4F0160000
trusted library allocation
page read and write
1B4EBFF6000
trusted library allocation
page read and write
1B4F71FE000
trusted library allocation
page read and write
1B4F25A6000
trusted library allocation
page read and write
1B4FB80D000
heap
page read and write
FD1643E000
stack
page read and write
1B4E6054000
heap
page read and write
1B4FB6D9000
trusted library allocation
page read and write
12E2000
heap
page read and write
1B4F73D1000
trusted library allocation
page read and write
1B4F0A3C000
trusted library allocation
page read and write
16907821000
heap
page read and write
1B4E601D000
heap
page read and write
FD175FE000
unkown
page readonly
16907820000
heap
page read and write
1B4FB89A000
heap
page read and write
1B4F27EB000
trusted library allocation
page read and write
1B4EFB1A000
trusted library allocation
page read and write
1B4E6068000
heap
page read and write
1B4FA899000
trusted library allocation
page read and write
1B4F0BA2000
trusted library allocation
page read and write
1B4F14EE000
trusted library allocation
page read and write
1B4EFB3B000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
169078B7000
heap
page read and write
1B4F762B000
trusted library allocation
page read and write
1B4F19C3000
trusted library allocation
page read and write
1B4EB0BA000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4F073C000
trusted library allocation
page read and write
1B4F28A9000
trusted library allocation
page read and write
1B4FB0B1000
trusted library allocation
page read and write
1B4F2A96000
trusted library allocation
page read and write
1B4F2869000
trusted library allocation
page read and write
1B4F7271000
trusted library allocation
page read and write
1B4EB01B000
trusted library allocation
page read and write
1B4F077F000
trusted library allocation
page read and write
1B4EFF64000
trusted library allocation
page read and write
1B4E605F000
heap
page read and write
1B4E604F000
heap
page read and write
169077AC000
heap
page read and write
1B4FB248000
trusted library allocation
page read and write
1B4E6062000
heap
page read and write
1B4F71C3000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4F0125000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
1B4EFB3F000
trusted library allocation
page read and write
1B4F077F000
trusted library allocation
page read and write
1690684A000
heap
page read and write
1B4F1847000
trusted library allocation
page read and write
1B4F0483000
trusted library allocation
page read and write
26D1B332000
heap
page read and write
1B4EEDB2000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
1B4FA890000
trusted library allocation
page read and write
1B4EF98F000
trusted library allocation
page read and write
1B4F95DD000
trusted library allocation
page read and write
1B4EE7FA000
trusted library allocation
page read and write
1B4F2517000
trusted library allocation
page read and write
1B4F6E56000
trusted library allocation
page read and write
16907823000
heap
page read and write
1B4EEDAA000
trusted library allocation
page read and write
1B4EC054000
trusted library allocation
page read and write
1B4FA85D000
trusted library allocation
page read and write
1B4F05EE000
trusted library allocation
page read and write
1B4E604F000
heap
page read and write
1B4FB8AB000
heap
page read and write
1B4E6018000
heap
page read and write
1B4F00B4000
trusted library allocation
page read and write
1B4F76B7000
trusted library allocation
page read and write
1B4E5FEF000
heap
page read and write
25B74449000
trusted library allocation
page read and write
12F2000
heap
page read and write
1B4F8A41000
trusted library allocation
page read and write
1B4F2854000
trusted library allocation
page read and write
1B4FB69E000
trusted library allocation
page read and write
1B4F96AB000
trusted library allocation
page read and write
25B74403000
trusted library allocation
page read and write
16906BAD000
trusted library allocation
page read and write
1B4FB6E3000
trusted library allocation
page read and write
1B4F28F5000
trusted library allocation
page read and write
1B4EC04B000
trusted library allocation
page read and write
1B4F2824000
trusted library allocation
page read and write
1B4EF9AE000
trusted library allocation
page read and write
1B4EF9B2000
trusted library allocation
page read and write
1B4E5FFC000
heap
page read and write
1B4F0367000
trusted library allocation
page read and write
1B4EFECC000
trusted library allocation
page read and write
1B4E0B16000
heap
page read and write
16907240000
trusted library allocation
page read and write
1B4F009D000
trusted library allocation
page read and write
1B4EEA2A000
heap
page read and write
1B4E601D000
heap
page read and write
1B4F1822000
trusted library allocation
page read and write
1B4F05F6000
trusted library allocation
page read and write
1B4FB2FC000
trusted library allocation
page read and write
FD16DFE000
stack
page read and write
1B4F2A8B000
trusted library allocation
page read and write
FDB000
stack
page read and write
1B4E6060000
heap
page read and write
1B4F0A86000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4E5FF5000
heap
page read and write
1B4EF9EB000
trusted library allocation
page read and write
1B4EB0E8000
trusted library allocation
page read and write
1B4EEFD7000
trusted library allocation
page read and write
1B4EC09B000
trusted library allocation
page read and write
1B4F762B000
trusted library allocation
page read and write
1B4F25FE000
trusted library allocation
page read and write
1B4F7241000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4EE69A000
trusted library allocation
page read and write
1B4FA890000
trusted library allocation
page read and write
1B4F6E33000
trusted library allocation
page read and write
1B4EFEA5000
trusted library allocation
page read and write
16907260000
heap
page read and write
1B4F284E000
trusted library allocation
page read and write
1B4FB4B2000
trusted library allocation
page read and write
1B4EEDD4000
trusted library allocation
page read and write
1B4EC043000
trusted library allocation
page read and write
1B4EF9B5000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4F6F25000
trusted library allocation
page read and write
1B4EEDE0000
trusted library allocation
page read and write
1B4F2408000
trusted library allocation
page read and write
1B4F71F6000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
1B4E601D000
heap
page read and write
1B4EEFDF000
trusted library allocation
page read and write
1B4FA8A1000
trusted library allocation
page read and write
1B4F27F1000
trusted library allocation
page read and write
26D1B600000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4F1600000
trusted library allocation
page read and write
1294000
heap
page read and write
1B4F0BD1000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F0BBD000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
95A000
stack
page read and write
1B4EC296000
trusted library allocation
page read and write
1B4EED9D000
trusted library allocation
page read and write
23341B12000
trusted library allocation
page read and write
1B4EFEEC000
trusted library allocation
page read and write
1B4FB89A000
heap
page read and write
1B4FB09D000
trusted library allocation
page read and write
1B4F19CA000
trusted library allocation
page read and write
1B4F02C8000
trusted library allocation
page read and write
1B4F8A43000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4EEDAA000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4EFEDB000
trusted library allocation
page read and write
1B4FB91D000
heap
page read and write
1B4F0B94000
trusted library allocation
page read and write
1B4EFB52000
trusted library allocation
page read and write
16907238000
unkown
page execute read
1B4F71A5000
trusted library allocation
page read and write
1306000
heap
page read and write
1B4F070C000
trusted library allocation
page read and write
1B4F0523000
trusted library allocation
page read and write
1B4EEDB1000
trusted library allocation
page read and write
1B4F7117000
trusted library allocation
page read and write
1B4F04D5000
trusted library allocation
page read and write
1B4F6EE8000
trusted library allocation
page read and write
1B4E6050000
heap
page read and write
1B4FC467000
trusted library allocation
page read and write
1B4EF991000
trusted library allocation
page read and write
1B4F0382000
trusted library allocation
page read and write
1B4F71D8000
trusted library allocation
page read and write
1B4E6050000
heap
page read and write
1B4FB6B9000
trusted library allocation
page read and write
1B4EE7CA000
trusted library allocation
page read and write
1B4F00EF000
trusted library allocation
page read and write
1315000
heap
page read and write
1B4FA830000
trusted library allocation
page read and write
1B4EF960000
trusted library allocation
page read and write
1B4F01F3000
trusted library allocation
page read and write
1B4FA88A000
trusted library allocation
page read and write
169077A9000
heap
page read and write
1B4FB2BA000
trusted library allocation
page read and write
1B4F031B000
trusted library allocation
page read and write
1B4F0259000
trusted library allocation
page read and write
1B4F6EB7000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4F008D000
trusted library allocation
page read and write
1B4F6F88000
trusted library allocation
page read and write
1B4F7169000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
16906C20000
unclassified section
page read and write
1B4FB788000
trusted library allocation
page read and write
25B74010000
unclassified section
page readonly
1B4EC299000
trusted library allocation
page read and write
1B4F04AC000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4F00DC000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4E6067000
heap
page read and write
1B4F719F000
trusted library allocation
page read and write
1B4EF960000
trusted library allocation
page read and write
1B4FB69E000
trusted library allocation
page read and write
1B4F1873000
trusted library allocation
page read and write
1B4F18AA000
trusted library allocation
page read and write
1B4F04F0000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4F0483000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1B4F1600000
trusted library allocation
page read and write
1B4F7121000
trusted library allocation
page read and write
12F0000
heap
page read and write
1B4E600D000
heap
page read and write
1B4E6054000
heap
page read and write
1B4FB4C9000
trusted library allocation
page read and write
1B4EEFC4000
trusted library allocation
page read and write
23341D0C000
trusted library allocation
page read and write
1B4F033D000
trusted library allocation
page read and write
25B74070000
remote allocation
page read and write
1B4F0388000
trusted library allocation
page read and write
3AE1000
heap
page read and write
1B4EE671000
trusted library allocation
page read and write
1B4F0769000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4EB026000
trusted library allocation
page read and write
1B4F2585000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4E604F000
heap
page read and write
1B4F1839000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4EB09E000
trusted library allocation
page read and write
1B4F73C6000
trusted library allocation
page read and write
1B4F04D5000
trusted library allocation
page read and write
1B4F6E33000
trusted library allocation
page read and write
1B4F0ADF000
trusted library allocation
page read and write
1B4EEFED000
trusted library allocation
page read and write
1B4F73F0000
trusted library allocation
page read and write
1B4EFE53000
trusted library allocation
page read and write
1B4FB481000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
1B4F76BA000
trusted library allocation
page read and write
1B4FB7E0000
trusted library allocation
page read and write
1B4F6FE9000
trusted library allocation
page read and write
1B4EED45000
trusted library allocation
page read and write
1B4EFE56000
trusted library allocation
page read and write
1B4F27D9000
trusted library allocation
page read and write
3AE1000
heap
page read and write
1B4F7172000
trusted library allocation
page read and write
1B4F70C0000
trusted library allocation
page read and write
1B4EF958000
trusted library allocation
page read and write
1B4F04ED000
trusted library allocation
page read and write
1B4FBE07000
trusted library allocation
page read and write
1B4EED7A000
trusted library allocation
page read and write
1B4F19EC000
trusted library allocation
page read and write
1B4F7467000
trusted library allocation
page read and write
1B4F034E000
trusted library allocation
page read and write
1B4EED57000
trusted library allocation
page read and write
1B4F25AE000
trusted library allocation
page read and write
1B4FB5D7000
trusted library allocation
page read and write
1B4EB0FC000
trusted library allocation
page read and write
1B4F7169000
trusted library allocation
page read and write
1B4F0461000
trusted library allocation
page read and write
1B4EE6D9000
trusted library allocation
page read and write
1B4F0A82000
trusted library allocation
page read and write
1B4FB089000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4EF4EE000
trusted library allocation
page read and write
1B4FA888000
trusted library allocation
page read and write
1B4F27CC000
trusted library allocation
page read and write
169078A7000
heap
page read and write
1B4F11DD000
trusted library allocation
page read and write
1B4FB431000
trusted library allocation
page read and write
16906BF1000
trusted library allocation
page read and write
1314000
heap
page read and write
1B4F278D000
trusted library allocation
page read and write
1B4F762D000
trusted library allocation
page read and write
1B4EFBB4000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4E6003000
heap
page read and write
1B4FA7F3000
trusted library allocation
page read and write
1B4F05F7000
trusted library allocation
page read and write
26D1B347000
heap
page read and write
1B4E603E000
heap
page read and write
1B4FB8BD000
heap
page read and write
1B4FB8AB000
heap
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4EAFFB000
trusted library allocation
page read and write
1B4F0453000
trusted library allocation
page read and write
1B4EEDCF000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4F7614000
trusted library allocation
page read and write
1B4FB5E3000
trusted library allocation
page read and write
1B4FB48D000
trusted library allocation
page read and write
12C8000
heap
page read and write
1B4F6E72000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4F051B000
trusted library allocation
page read and write
1B4F199B000
trusted library allocation
page read and write
1B4F73D1000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4E6057000
heap
page read and write
1B4F6F3C000
trusted library allocation
page read and write
1B4FB6B5000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
772000
unkown
page readonly
25B74520000
heap
page read and write
1B4EFE69000
trusted library allocation
page read and write
1B4FB845000
heap
page read and write
1B4F18DD000
trusted library allocation
page read and write
1B4FB6FE000
trusted library allocation
page read and write
1B4F15F8000
trusted library allocation
page read and write
1B4E6002000
heap
page read and write
1B4EED9D000
trusted library allocation
page read and write
1B4EF960000
trusted library allocation
page read and write
1B4EFE73000
trusted library allocation
page read and write
1B4FA76B000
trusted library allocation
page read and write
1B4F0443000
trusted library allocation
page read and write
1314000
heap
page read and write
1B4EEDB1000
trusted library allocation
page read and write
1B4F02D9000
trusted library allocation
page read and write
1B4EE789000
trusted library allocation
page read and write
1B4EC278000
trusted library allocation
page read and write
1B4EF472000
trusted library allocation
page read and write
1B4EE6FA000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4EEA2D000
heap
page read and write
3F3CDD91000
trusted library allocation
page execute read
1B4F010E000
trusted library allocation
page read and write
1B4F0B67000
trusted library allocation
page read and write
1B4F0162000
trusted library allocation
page read and write
1B4FB481000
trusted library allocation
page read and write
1B4F0279000
trusted library allocation
page read and write
1B4FB6CF000
trusted library allocation
page read and write
1690783C000
heap
page read and write
1B4F6E7A000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4F02CE000
trusted library allocation
page read and write
1B4FB6FE000
trusted library allocation
page read and write
1B4F191B000
trusted library allocation
page read and write
1B4F034A000
trusted library allocation
page read and write
F2C0DFC000
stack
page read and write
16906C22000
unclassified section
page read and write
1B4F1979000
trusted library allocation
page read and write
1B4F0335000
trusted library allocation
page read and write
1B4F6F83000
trusted library allocation
page read and write
1B4F0465000
trusted library allocation
page read and write
1B4F6E76000
trusted library allocation
page read and write
1B4EEFFA000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
169077AC000
heap
page read and write
1B4EFEBC000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4E60AB000
heap
page read and write
1B4F00B0000
trusted library allocation
page read and write
1B4EFB44000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4F3123000
trusted library allocation
page read and write
1B4F18AA000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4F0479000
trusted library allocation
page read and write
1B4F183D000
trusted library allocation
page read and write
1B4F7038000
trusted library allocation
page read and write
1B4EEDCF000
trusted library allocation
page read and write
1B4FBEAC000
trusted library allocation
page read and write
1B4F7143000
trusted library allocation
page read and write
1B4F719F000
trusted library allocation
page read and write
1B4EFB58000
trusted library allocation
page read and write
1B4FB248000
trusted library allocation
page read and write
1B4F005A000
trusted library allocation
page read and write
1B4F7061000
trusted library allocation
page read and write
1B4F133D000
trusted library allocation
page read and write
1B4E600C000
heap
page read and write
169078A7000
heap
page read and write
1B4E600C000
heap
page read and write
1B4E6009000
heap
page read and write
1B4EF4D5000
trusted library allocation
page read and write
1690779F000
heap
page read and write
1B4F0351000
trusted library allocation
page read and write
1B4EFDD5000
trusted library allocation
page read and write
1B4FA87B000
trusted library allocation
page read and write
1B4F8A0C000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4EEDA6000
trusted library allocation
page read and write
1B4EFB3D000
trusted library allocation
page read and write
1B4F0339000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4F0330000
trusted library allocation
page read and write
1B4F71A2000
trusted library allocation
page read and write
23341B66000
trusted library allocation
page read and write
1B4F6FDC000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
1B4E6012000
heap
page read and write
1B4F7269000
trusted library allocation
page read and write
1B4EA9B3000
trusted library allocation
page read and write
1B4F029E000
trusted library allocation
page read and write
23341B03000
trusted library allocation
page read and write
1B4EE71E000
trusted library allocation
page read and write
1B4FA87B000
trusted library allocation
page read and write
1B4F0081000
trusted library allocation
page read and write
1B4EFE9D000
trusted library allocation
page read and write
1B4F7014000
trusted library allocation
page read and write
1144000
heap
page read and write
1B4E6050000
heap
page read and write
1B4E601E000
heap
page read and write
1B4EEE8D000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
1B4EF9A6000
trusted library allocation
page read and write
1B4FB5E1000
trusted library allocation
page read and write
1B4FB0E1000
trusted library allocation
page read and write
1B4F25B6000
trusted library allocation
page read and write
1B4FA7EB000
trusted library allocation
page read and write
1B4E606A000
heap
page read and write
16906BEB000
trusted library allocation
page read and write
1B4F01A5000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4EBF1E000
trusted library allocation
page read and write
1B4F04A3000
trusted library allocation
page read and write
1B4F96AB000
trusted library allocation
page read and write
1B4EEED6000
trusted library allocation
page read and write
1B4F0312000
trusted library allocation
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1B4F0516000
trusted library allocation
page read and write
1B4F11D5000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4F710C000
trusted library allocation
page read and write
1B4F71F9000
trusted library allocation
page read and write
1B4F7192000
trusted library allocation
page read and write
1B4EFB46000
trusted library allocation
page read and write
1B4FB497000
trusted library allocation
page read and write
1B4F76AD000
trusted library allocation
page read and write
1B4EE708000
trusted library allocation
page read and write
1B4F715C000
trusted library allocation
page read and write
1B4FB2FA000
trusted library allocation
page read and write
1B4F0380000
trusted library allocation
page read and write
1B4EFBE0000
trusted library allocation
page read and write
25B74200000
heap
page read and write
1690783C000
heap
page read and write
1B4EB0A7000
trusted library allocation
page read and write
1B4F0723000
trusted library allocation
page read and write
1B4FB5DD000
trusted library allocation
page read and write
1B4EF9B5000
trusted library allocation
page read and write
1B4F6F8E000
trusted library allocation
page read and write
1B4F76F1000
trusted library allocation
page read and write
1B4F27EB000
trusted library allocation
page read and write
1B4EAF2F000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
2A0C7FE000
unkown
page readonly
1B4EFE5B000
trusted library allocation
page read and write
1B4FB5D9000
trusted library allocation
page read and write
1B4EE6D9000
trusted library allocation
page read and write
1B4F7243000
trusted library allocation
page read and write
1B4EF9B6000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4EFB6D000
trusted library allocation
page read and write
16907884000
heap
page read and write
1B4FB8AC000
heap
page read and write
1B4FB6AE000
trusted library allocation
page read and write
1B4F71E6000
trusted library allocation
page read and write
1B4F2752000
trusted library allocation
page read and write
16907831000
heap
page read and write
1690787B000
heap
page read and write
1B4F6FF1000
trusted library allocation
page read and write
1B4E6061000
heap
page read and write
1B4FB6CF000
trusted library allocation
page read and write
1B4FA100000
trusted library allocation
page read and write
1B4FB764000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4F8B2C000
trusted library allocation
page read and write
1B4F25A6000
trusted library allocation
page read and write
1B4FB0EB000
trusted library allocation
page read and write
1B4EEF7B000
trusted library allocation
page read and write
1B4F71D5000
trusted library allocation
page read and write
1B4F18E2000
trusted library allocation
page read and write
1B4FB26C000
trusted library allocation
page read and write
1B4FB2BE000
trusted library allocation
page read and write
1B4F8A4D000
trusted library allocation
page read and write
1B4E60A1000
heap
page read and write
1B4EE77F000
trusted library allocation
page read and write
1B4E6003000
heap
page read and write
1B4FB080000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
12E8000
heap
page read and write
1B4EBF7D000
trusted library allocation
page read and write
1B4EE71C000
trusted library allocation
page read and write
1B4F0BD1000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
16906C86000
heap
page read and write
1B4FB8BD000
heap
page read and write
1B4F2554000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
16907831000
heap
page read and write
1B4E5FEF000
heap
page read and write
1B4FB406000
trusted library allocation
page read and write
1B4F70C0000
trusted library allocation
page read and write
16906C84000
heap
page read and write
1B4EEEA7000
trusted library allocation
page read and write
1B4EEE69000
trusted library allocation
page read and write
16906B6F000
trusted library allocation
page read and write
1B4EE7FA000
trusted library allocation
page read and write
1B4EF4F9000
trusted library allocation
page read and write
1B4EEDF9000
trusted library allocation
page read and write
25B744F6000
trusted library allocation
page read and write
1B4FB25B000
trusted library allocation
page read and write
1B4F034A000
trusted library allocation
page read and write
1B4F27F1000
trusted library allocation
page read and write
1B4F2812000
trusted library allocation
page read and write
26D1B2D0000
heap
page read and write
1B4E601C000
heap
page read and write
1B4FB6B5000
trusted library allocation
page read and write
1B4EEDB2000
trusted library allocation
page read and write
2A0959E000
stack
page read and write
25B74430000
trusted library allocation
page read and write
23341820000
unclassified section
page readonly
25B74478000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4EFB1E000
trusted library allocation
page read and write
1B4F02FC000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4F1190000
trusted library allocation
page read and write
16907831000
heap
page read and write
1B4F19B7000
trusted library allocation
page read and write
1B4F0218000
trusted library allocation
page read and write
1B4EFE24000
trusted library allocation
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1B4F077F000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1144000
heap
page read and write
23341C00000
heap
page readonly
1B4F6E41000
trusted library allocation
page read and write
1B4E6051000
heap
page read and write
1B4EFFCB000
trusted library allocation
page read and write
1B4F0483000
trusted library allocation
page read and write
1F6B27424000
trusted library allocation
page read and write
1B4EFEC9000
trusted library allocation
page read and write
1B4F2AD1000
trusted library allocation
page read and write
1B4EFE2B000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
1B4F711E000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4EFB59000
trusted library allocation
page read and write
1B4E6026000
heap
page read and write
1B4FB6CF000
trusted library allocation
page read and write
1B4F7614000
trusted library allocation
page read and write
1B4F04D0000
trusted library allocation
page read and write
1B4F9589000
trusted library allocation
page read and write
1B4F70AE000
trusted library allocation
page read and write
1B4F02E8000
trusted library allocation
page read and write
1B4F0B85000
trusted library allocation
page read and write
1B4FB74F000
trusted library allocation
page read and write
1B4EF9A2000
trusted library allocation
page read and write
1B4F02CE000
trusted library allocation
page read and write
1B4FB6A4000
trusted library allocation
page read and write
1B4F2555000
trusted library allocation
page read and write
12FC000
heap
page read and write
1B4EB0D2000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4EB080000
trusted library allocation
page read and write
1B4EF96B000
trusted library allocation
page read and write
1B4F25B6000
trusted library allocation
page read and write
1B4F010C000
trusted library allocation
page read and write
1B4F00DC000
trusted library allocation
page read and write
12FB000
heap
page read and write
1B4F00ED000
trusted library allocation
page read and write
1B4F12E0000
trusted library allocation
page read and write
1B4F0078000
trusted library allocation
page read and write
1B4F6E6E000
trusted library allocation
page read and write
1B4FBE41000
trusted library allocation
page read and write
1B4EFE83000
trusted library allocation
page read and write
1B4F2598000
trusted library allocation
page read and write
1B4F038B000
trusted library allocation
page read and write
1B4EFB08000
trusted library allocation
page read and write
1B4EEE57000
trusted library allocation
page read and write
1B4F7117000
trusted library allocation
page read and write
1B4F0219000
trusted library allocation
page read and write
1B4F1336000
trusted library allocation
page read and write
1B4F147F000
trusted library allocation
page read and write
1B4F95D3000
trusted library allocation
page read and write
1B4F27F1000
trusted library allocation
page read and write
1B4EEDB7000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
16906B48000
trusted library allocation
page read and write
1B4F134C000
trusted library allocation
page read and write
1B4F00E0000
trusted library allocation
page read and write
1B4EFDE8000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4F8AA3000
trusted library allocation
page read and write
1B4EE6A1000
trusted library allocation
page read and write
1B4F034E000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4E6017000
heap
page read and write
1B4FA82E000
trusted library allocation
page read and write
1B4EFF43000
trusted library allocation
page read and write
1B4F2493000
trusted library allocation
page read and write
1B4EF48A000
trusted library allocation
page read and write
1B4EF985000
trusted library allocation
page read and write
1B4F18A7000
trusted library allocation
page read and write
1B4EFE4B000
trusted library allocation
page read and write
1B4F00C3000
trusted library allocation
page read and write
1B4EF4A5000
trusted library allocation
page read and write
1B4FB6D9000
trusted library allocation
page read and write
1B4EC06E000
trusted library allocation
page read and write
1B4F031E000
trusted library allocation
page read and write
1B4F76B7000
trusted library allocation
page read and write
1B4FA88A000
trusted library allocation
page read and write
169069B0000
heap
page read and write
1B4F253B000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
89117FF000
stack
page read and write
1B4E605D000
heap
page read and write
1B4FB02E000
trusted library allocation
page read and write
1B4EBF76000
trusted library allocation
page read and write
16907861000
heap
page read and write
1B4E603E000
heap
page read and write
1B4F034E000
trusted library allocation
page read and write
1B4EEEA0000
trusted library allocation
page read and write
1B4F00FE000
trusted library allocation
page read and write
1B4E5FEF000
heap
page read and write
1B4EEE89000
trusted library allocation
page read and write
1B4E6050000
heap
page read and write
1B4F0AAB000
trusted library allocation
page read and write
1B4F28D9000
trusted library allocation
page read and write
1B4F00E0000
trusted library allocation
page read and write
1B4F0328000
trusted library allocation
page read and write
1B4E5FFC000
heap
page read and write
1B4EFBE0000
trusted library allocation
page read and write
1B4FB6C3000
trusted library allocation
page read and write
1B4F18AA000
trusted library allocation
page read and write
1B4FB5DF000
trusted library allocation
page read and write
1B4F0351000
trusted library allocation
page read and write
1B4F71F0000
trusted library allocation
page read and write
1B4F0354000
trusted library allocation
page read and write
1B4EFB48000
trusted library allocation
page read and write
1B4EE79A000
trusted library allocation
page read and write
1B4F051B000
trusted library allocation
page read and write
1B4F049B000
trusted library allocation
page read and write
1B4FB018000
trusted library allocation
page read and write
1B4F2589000
trusted library allocation
page read and write
1B4EEF77000
trusted library allocation
page read and write
1B4F28B1000
trusted library allocation
page read and write
1B4E6006000
heap
page read and write
1B4E5FFC000
heap
page read and write
3AE1000
heap
page read and write
1B4F7115000
trusted library allocation
page read and write
1B4F0567000
trusted library allocation
page read and write
1690787B000
heap
page read and write
1B4FB248000
trusted library allocation
page read and write
1B4EEF3D000
trusted library allocation
page read and write
1B4E6050000
heap
page read and write
1B4EFB46000
trusted library allocation
page read and write
1B4F6ED2000
trusted library allocation
page read and write
1B4FB089000
trusted library allocation
page read and write
1B4F04F9000
trusted library allocation
page read and write
1B4EEDD5000
trusted library allocation
page read and write
1B4FB4B4000
trusted library allocation
page read and write
1B4EF969000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
1B4EF969000
trusted library allocation
page read and write
1B4EF987000
trusted library allocation
page read and write
1B4F02F3000
trusted library allocation
page read and write
9D0000
heap
page read and write
1B4E5FF3000
heap
page read and write
1B4E603E000
heap
page read and write
1B4F18D5000
trusted library allocation
page read and write
FD165FE000
unkown
page readonly
1B4FBF01000
trusted library allocation
page read and write
1B4EF4FC000
trusted library allocation
page read and write
1B4E601B000
heap
page read and write
1B4EC2DE000
trusted library allocation
page read and write
1B4E606A000
heap
page read and write
1B4F2477000
trusted library allocation
page read and write
1B4F6E27000
trusted library allocation
page read and write
1B4F70D0000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4EF9AE000
trusted library allocation
page read and write
1B4EC296000
trusted library allocation
page read and write
23341B7A000
trusted library allocation
page read and write
1B4EA990000
trusted library allocation
page read and write
1B4E6026000
heap
page read and write
1B4EEDFC000
trusted library allocation
page read and write
1B4F2A92000
trusted library allocation
page read and write
1B4F6FA1000
trusted library allocation
page read and write
1B4EFBB8000
trusted library allocation
page read and write
1B4F19C7000
trusted library allocation
page read and write
1B4EFE2D000
trusted library allocation
page read and write
1B4EFB29000
trusted library allocation
page read and write
1B4F0198000
trusted library allocation
page read and write
1B4F147F000
trusted library allocation
page read and write
1B4F0BBB000
trusted library allocation
page read and write
1B4EF96E000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
16907300000
trusted library allocation
page read and write
1B4F2499000
trusted library allocation
page read and write
26D1B5C5000
heap
page read and write
1B4EF95E000
trusted library allocation
page read and write
1B4EFE23000
trusted library allocation
page read and write
1B4F27E1000
trusted library allocation
page read and write
1B4EEA37000
heap
page read and write
1B4E5FF6000
heap
page read and write
1B4EED82000
trusted library allocation
page read and write
1B4EEE8F000
trusted library allocation
page read and write
1B4F6EF8000
trusted library allocation
page read and write
1B4F1198000
trusted library allocation
page read and write
1B4EFB46000
trusted library allocation
page read and write
1B4F04F9000
trusted library allocation
page read and write
1B4FA7B7000
trusted library allocation
page read and write
1B4EC054000
trusted library allocation
page read and write
1B4EFB40000
trusted library allocation
page read and write
1B4E5FEF000
heap
page read and write
1B4F02FD000
trusted library allocation
page read and write
1B4EC0FC000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
16906BEE000
trusted library allocation
page read and write
1B4EEDE5000
trusted library allocation
page read and write
1B4EA9C7000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
1B4EEF7F000
trusted library allocation
page read and write
1B4F6E72000
trusted library allocation
page read and write
1B4F71D8000
trusted library allocation
page read and write
1B4F01A9000
trusted library allocation
page read and write
1B4E5FFC000
heap
page read and write
16907828000
heap
page read and write
1B4F016F000
trusted library allocation
page read and write
1B4EB01E000
trusted library allocation
page read and write
1B4EC238000
trusted library allocation
page read and write
1B4EFB1A000
trusted library allocation
page read and write
1B4FB25E000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
1B4E6009000
heap
page read and write
1B4EFB58000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4E605E000
heap
page read and write
1B4EB082000
trusted library allocation
page read and write
1B4E6067000
heap
page read and write
1B4EEDDD000
trusted library allocation
page read and write
1B4F71D8000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4F24E7000
trusted library allocation
page read and write
F2C1DFE000
stack
page read and write
1B4EFFD6000
trusted library allocation
page read and write
1B4EC09B000
trusted library allocation
page read and write
1B4EFB5B000
trusted library allocation
page read and write
1B4EEDEE000
trusted library allocation
page read and write
1B4F02DC000
trusted library allocation
page read and write
77C000
unkown
page write copy
169077A0000
heap
page read and write
1B4F6F32000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4E601D000
heap
page read and write
1B4F012E000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4E6054000
heap
page read and write
1B4EFB1A000
trusted library allocation
page read and write
890F7FE000
stack
page read and write
1B4FB0FD000
trusted library allocation
page read and write
1B4F188B000
trusted library allocation
page read and write
169077A9000
heap
page read and write
1B4F050D000
trusted library allocation
page read and write
16906B9E000
trusted library allocation
page read and write
1B4F24B1000
trusted library allocation
page read and write
1B4FB89A000
heap
page read and write
1B4F6F9F000
trusted library allocation
page read and write
1B4FB2FE000
trusted library allocation
page read and write
784000
unkown
page readonly
1B4EFB20000
trusted library allocation
page read and write
1B4F0111000
trusted library allocation
page read and write
1B4EFFBF000
trusted library allocation
page read and write
16906B12000
trusted library allocation
page read and write
1B4F15E7000
trusted library allocation
page read and write
1B4F04B4000
trusted library allocation
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1B4EF944000
trusted library allocation
page read and write
1B4FB788000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4E605D000
heap
page read and write
1B4F0236000
trusted library allocation
page read and write
1B4EE6D4000
trusted library allocation
page read and write
25B74220000
heap
page read and write
1B4EC0FC000
trusted library allocation
page read and write
1B4EEFFA000
trusted library allocation
page read and write
169077A0000
heap
page read and write
1B4EEDAA000
trusted library allocation
page read and write
1B4EF923000
trusted library allocation
page read and write
1B4F0071000
trusted library allocation
page read and write
1B4F010E000
trusted library allocation
page read and write
F2C15FF000
stack
page read and write
23341BC8000
trusted library allocation
page read and write
2090000
heap
page read and write
1B4F0337000
trusted library allocation
page read and write
1B4E0B1E000
heap
page read and write
1144000
heap
page read and write
1B4E603E000
heap
page read and write
1B4E603E000
heap
page read and write
1B4FADAC000
trusted library allocation
page read and write
1B4F70BE000
trusted library allocation
page read and write
1B4F23CE000
trusted library allocation
page read and write
1B4F8B2E000
trusted library allocation
page read and write
169078B7000
heap
page read and write
1B4E6015000
heap
page read and write
1B4EFE81000
trusted library allocation
page read and write
1B4E600D000
heap
page read and write
1B4EFEB6000
trusted library allocation
page read and write
1B4FB0B5000
trusted library allocation
page read and write
1B4E605D000
heap
page read and write
1B4E603E000
heap
page read and write
1B4F73D3000
trusted library allocation
page read and write
1B4EEDFC000
trusted library allocation
page read and write
1B4F76AF000
trusted library allocation
page read and write
1B4F0335000
trusted library allocation
page read and write
1B4EFE71000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4E6002000
heap
page read and write
1B4F1816000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4E6066000
heap
page read and write
1B4F2582000
trusted library allocation
page read and write
1B4EFB58000
trusted library allocation
page read and write
1B4F04B1000
trusted library allocation
page read and write
16907828000
heap
page read and write
1B4F6ED2000
trusted library allocation
page read and write
1B4FB748000
trusted library allocation
page read and write
1B4E5FF6000
heap
page read and write
1B4F00F8000
trusted library allocation
page read and write
1B4F256F000
trusted library allocation
page read and write
1B4EEDA4000
trusted library allocation
page read and write
1B4F00C5000
trusted library allocation
page read and write
1B4E6018000
heap
page read and write
1B4F0BE3000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4E6012000
heap
page read and write
1B4E6049000
heap
page read and write
1B4E6066000
heap
page read and write
1B4E601E000
heap
page read and write
1B4E606A000
heap
page read and write
1B4F27EB000
trusted library allocation
page read and write
1B4F11D8000
trusted library allocation
page read and write
23341BB9000
trusted library allocation
page read and write
233419C0000
heap
page read and write
1B4F25AE000
trusted library allocation
page read and write
1B4EEA36000
heap
page read and write
169077A0000
heap
page read and write
1B4F2AF8000
trusted library allocation
page read and write
1B4F9F80000
trusted library allocation
page read and write
1B4F6E1B000
trusted library allocation
page read and write
FD1647E000
unkown
page readonly
1B4F7140000
trusted library allocation
page read and write
1B4F1855000
trusted library allocation
page read and write
1B4FB8AB000
heap
page read and write
1B4F706F000
trusted library allocation
page read and write
1B4F01A1000
trusted library allocation
page read and write
1B4E601E000
heap
page read and write
16906B7A000
trusted library allocation
page read and write
1B4E5FF1000
heap
page read and write
1B4FB8AC000
heap
page read and write
1B4F2585000
trusted library allocation
page read and write
1B4E5FEF000
heap
page read and write
1B4E6004000
heap
page read and write
1B4EFFEB000
trusted library allocation
page read and write
1B4FB6C3000
trusted library allocation
page read and write
2778FF0A000
trusted library allocation
page read and write
1B4F7477000
trusted library allocation
page read and write
1B4F04AC000
trusted library allocation
page read and write
1B4F70D5000
trusted library allocation
page read and write
1B4E601C000
heap
page read and write
1B4EEA2D000
heap
page read and write
1B4EFE50000
trusted library allocation
page read and write
1B4EEDE8000
trusted library allocation
page read and write
1B4F0345000
trusted library allocation
page read and write
1B4F24DE000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
1B4E6057000
heap
page read and write
1B4F243B000
trusted library allocation
page read and write
1B4F7029000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4F00F1000
trusted library allocation
page read and write
1B4EEED6000
trusted library allocation
page read and write
1B4F02EE000
trusted library allocation
page read and write
1B4F71ED000
trusted library allocation
page read and write
1B4F76BC000
trusted library allocation
page read and write
1B4F04B1000
trusted library allocation
page read and write
1B4F240C000
trusted library allocation
page read and write
1B4EEEA0000
trusted library allocation
page read and write
1B4EE6D7000
trusted library allocation
page read and write
1B4E6003000
heap
page read and write
1B4F03AD000
trusted library allocation
page read and write
1B4F0137000
trusted library allocation
page read and write
1B4F0334000
trusted library allocation
page read and write
1B4FBE43000
trusted library allocation
page read and write
1B4FAD93000
trusted library allocation
page read and write
1B4F71E8000
trusted library allocation
page read and write
1B4F14D1000
trusted library allocation
page read and write
1B4E6054000
heap
page read and write
1B4EFE6E000
trusted library allocation
page read and write
1B4F711E000
trusted library allocation
page read and write
1B4FBE4D000
trusted library allocation
page read and write
1B4EF969000
trusted library allocation
page read and write
1306000
heap
page read and write
16907898000
heap
page read and write
1B4FB06E000
trusted library allocation
page read and write
2A0955E000
unkown
page readonly
1B4E601E000
heap
page read and write
1B4EB0B0000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
2778FF07000
trusted library allocation
page read and write
1B4F0374000
trusted library allocation
page read and write
1B4F0BBD000
trusted library allocation
page read and write
1B4F71F6000
trusted library allocation
page read and write
1B4EFE1C000
trusted library allocation
page read and write
1B4F73F9000
trusted library allocation
page read and write
1B4FB6E3000
trusted library allocation
page read and write
1B4EEE68000
trusted library allocation
page read and write
1B4E5FFE000
heap
page read and write
1B4F04F0000
trusted library allocation
page read and write
1B4EEA28000
heap
page read and write
1B4F044D000
trusted library allocation
page read and write
1B4E605C000
heap
page read and write
1B4EED20000
trusted library allocation
page read and write
1B4F06CC000
trusted library allocation
page read and write
1B4FB801000
heap
page read and write
FD15BFE000
stack
page read and write
1690786A000
heap
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1B4EF9CF000
trusted library allocation
page read and write
1B4F28C9000
trusted library allocation
page read and write
1B4E6060000
heap
page read and write
1B4F0384000
trusted library allocation
page read and write
26D1B340000
heap
page read and write
1B4F162C000
trusted library allocation
page read and write
1B4F73FA000
trusted library allocation
page read and write
1B4EEDA4000
trusted library allocation
page read and write
1B4F0BE7000
trusted library allocation
page read and write
23341B96000
trusted library allocation
page read and write
FBE000
stack
page read and write
1B4F74D6000
trusted library allocation
page read and write
1B4EFEAE000
trusted library allocation
page read and write
1B4F76AF000
trusted library allocation
page read and write
1B4F7444000
trusted library allocation
page read and write
1B4F72B7000
trusted library allocation
page read and write
1B4EFF31000
trusted library allocation
page read and write
1B4F0373000
trusted library allocation
page read and write
23341933000
heap
page read and write
1B4EE7AB000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4F05F5000
trusted library allocation
page read and write
1B4F0465000
trusted library allocation
page read and write
26D1CEAB000
heap
page read and write
1B4FB248000
trusted library allocation
page read and write
1B4EFE50000
trusted library allocation
page read and write
1B4F1838000
trusted library allocation
page read and write
1B4EFEC9000
trusted library allocation
page read and write
23341C20000
heap
page read and write
1B4F73AA000
trusted library allocation
page read and write
1B4F04ED000
trusted library allocation
page read and write
1B4F0BE7000
trusted library allocation
page read and write
1B4E6049000
heap
page read and write
1B4EFE9D000
trusted library allocation
page read and write
1B4E6048000
heap
page read and write
1B4EAF2F000
trusted library allocation
page read and write
1B4F0772000
trusted library allocation
page read and write
1B4F6ED4000
trusted library allocation
page read and write
1B4F00FE000
trusted library allocation
page read and write
1B4E6057000
heap
page read and write
1B4E6009000
heap
page read and write
1B4F761D000
trusted library allocation
page read and write
1B4EFF74000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4EEA6D000
heap
page read and write
1B4EF944000
trusted library allocation
page read and write
1B4EED77000
trusted library allocation
page read and write
1B4E600B000
heap
page read and write
1B4EE6FA000
trusted library allocation
page read and write
1B4F0321000
trusted library allocation
page read and write
1B4F6EBC000
trusted library allocation
page read and write
1B4EF973000
trusted library allocation
page read and write
1B4EFBF0000
trusted library allocation
page read and write
1B4EC099000
trusted library allocation
page read and write
1B4EC067000
trusted library allocation
page read and write
1B4F04D7000
trusted library allocation
page read and write
1B4F134C000
trusted library allocation
page read and write
1B4F0547000
trusted library allocation
page read and write
1B4EFB95000
trusted library allocation
page read and write
1B4FB6FC000
trusted library allocation
page read and write
1B4F6E27000
trusted library allocation
page read and write
1B4FB06E000
trusted library allocation
page read and write
1B4FB23D000
trusted library allocation
page read and write
1B4FB4BF000
trusted library allocation
page read and write
1B4E5FF0000
heap
page read and write
1B4EC054000
trusted library allocation
page read and write
1B4F2786000
trusted library allocation
page read and write
1B4EFF6C000
trusted library allocation
page read and write
1B4E6005000
heap
page read and write
1B4EFB1A000
trusted library allocation
page read and write
1B4E5FFB000
heap
page read and write
1B4F18DD000
trusted library allocation
page read and write
1B4EC2A2000
trusted library allocation
page read and write
1B4F95C5000
trusted library allocation
page read and write
1B4F05F1000
trusted library allocation
page read and write
1B4F0041000
trusted library allocation
page read and write
1B4F2554000
trusted library allocation
page read and write
1B4F7127000
trusted library allocation
page read and write
1B4EC030000
trusted library allocation
page read and write
1B4F00C8000
trusted library allocation
page read and write
23341BAF000
trusted library allocation
page read and write
1B4F2AC4000
trusted library allocation
page read and write
1B4F2766000
trusted library allocation
page read and write
1B4EED86000
trusted library allocation
page read and write
1B4E605C000
heap
page read and write
1B4FB6F1000
trusted library allocation
page read and write
1B4F0370000
trusted library allocation
page read and write
26D1CEBB000
heap
page read and write
1B4E6015000
heap
page read and write
1B4F0345000
trusted library allocation
page read and write
1B4E6014000
heap
page read and write
1B4EFB0F000
trusted library allocation
page read and write
1B4EFB5B000
trusted library allocation
page read and write
1B4FA88D000
trusted library allocation
page read and write
169078A7000
heap
page read and write
1B4EE6D7000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4EF9CF000
trusted library allocation
page read and write
25B74700000
trusted library allocation
page read and write
1B4EFB18000
trusted library allocation
page read and write
1B4F76AD000
trusted library allocation
page read and write
3AE0000
heap
page read and write
77C000
unkown
page read and write
1B4F02C8000
trusted library allocation
page read and write
1B4F7117000
trusted library allocation
page read and write
1B4EEFD9000
trusted library allocation
page read and write
1B4E6062000
heap
page read and write
1B4F748A000
trusted library allocation
page read and write
1B4F075E000
trusted library allocation
page read and write
2A0BFFE000
stack
page read and write
1690779C000
heap
page read and write
1B4F72FD000
trusted library allocation
page read and write
1144000
heap
page read and write
1B4EF944000
trusted library allocation
page read and write
1B4E6003000
heap
page read and write
1B4E6015000
heap
page read and write
1B4FB89F000
heap
page read and write
1B4F00C0000
trusted library allocation
page read and write
1B4EC0FC000
trusted library allocation
page read and write
F2C0DFF000
stack
page read and write
1B4FB8A2000
heap
page read and write
1B4FA7CD000
trusted library allocation
page read and write
1B4EFF92000
trusted library allocation
page read and write
1B4FA8AB000
trusted library allocation
page read and write
1B4F0BB9000
trusted library allocation
page read and write
1B4E601D000
heap
page read and write
1B4F18C5000
trusted library allocation
page read and write
1B4F95E0000
trusted library allocation
page read and write
1B4EFB6D000
trusted library allocation
page read and write
1B4EEA6D000
heap
page read and write
1B4E608E000
heap
page read and write
1B4E5FFC000
heap
page read and write
1B4F05F1000
trusted library allocation
page read and write
1B4F00F8000
trusted library allocation
page read and write
1B4EEFC0000
trusted library allocation
page read and write
1B4F6FED000
trusted library allocation
page read and write
1B4E6009000
heap
page read and write
1B4E6018000
heap
page read and write
1B4F03E5000
trusted library allocation
page read and write
1B4FB4A7000
trusted library allocation
page read and write
1B4F28C4000
trusted library allocation
page read and write
1B4E601B000
heap
page read and write
1B4E6050000
heap
page read and write
1B4E605D000
heap
page read and write
1B4E5FF6000
heap
page read and write
1B4F04FB000
trusted library allocation
page read and write
1B4F7129000
trusted library allocation
page read and write
1B4EFB29000
trusted library allocation
page read and write
1B4E6012000
heap
page read and write
1B4F71A8000
trusted library allocation
page read and write
1B4EF96E000
trusted library allocation
page read and write
1B4FB69E000
trusted library allocation
page read and write
1B4F0453000
trusted library allocation
page read and write
1B4FB8B9000
heap
page read and write
1B4FB699000
trusted library allocation
page read and write
1B4EEDB7000
trusted library allocation
page read and write
1B4EFB27000
trusted library allocation
page read and write
1B4F05EF000
trusted library allocation
page read and write
23341D1D000
trusted library allocation
page read and write
1B4EB09E000
trusted library allocation
page read and write
6B0000
unkown
page readonly
1B4F0259000
trusted library allocation
page read and write
1B4EB0F3000
trusted library allocation
page read and write
1B4F276E000
trusted library allocation
page read and write
1B4F033C000
trusted library allocation
page read and write
1B4EF98D000
trusted library allocation
page read and write
25B7445D000
trusted library allocation
page read and write
1B4F6F74000
trusted library allocation
page read and write
1B4F259E000
trusted library allocation
page read and write
1B4EEF71000
trusted library allocation
page read and write
1B4F76B1000
trusted library allocation
page read and write
1B4FA877000
trusted library allocation
page read and write
1B4F70B7000
trusted library allocation
page read and write
1B4EEDB7000
trusted library allocation
page read and write
1B4EFE93000
trusted library allocation
page read and write
1B4F74F8000
trusted library allocation
page read and write
169077CA000
heap
page read and write
1B4EFE7F000
trusted library allocation
page read and write
1B4F01D9000
trusted library allocation
page read and write
1B4FB259000
trusted library allocation
page read and write
1B4EB0BA000
trusted library allocation
page read and write
1B4EBF79000
trusted library allocation
page read and write
16906B73000
trusted library allocation
page read and write
23341D19000
trusted library allocation
page read and write
1B4EFB05000
trusted library allocation
page read and write
1B4F6E81000
trusted library allocation
page read and write
1B4F032B000
trusted library allocation
page read and write
110D000
stack
page read and write
1B4E6018000
heap
page read and write
1B4EF9D5000
trusted library allocation
page read and write
1B4F045D000
trusted library allocation
page read and write
1B4E5FFC000
heap
page read and write
1B4E6054000
heap
page read and write
1B4F13AA000
trusted library allocation
page read and write
1B4E604F000
heap
page read and write
1B4F23F8000
trusted library allocation
page read and write
169078B7000
heap
page read and write
1B4E6057000
heap
page read and write
23341B2E000
trusted library allocation
page read and write
1B4EEFED000
trusted library allocation
page read and write
1B4F8A6D000
trusted library allocation
page read and write
89107FE000
stack
page read and write
1B4E608A000
heap
page read and write
2334195A000
heap
page read and write
1B4F762D000
trusted library allocation
page read and write
1B4F0388000
trusted library allocation
page read and write
1B4EED64000
trusted library allocation
page read and write
1B4F00C8000
trusted library allocation
page read and write
1B4F7464000
trusted library allocation
page read and write
1306000
heap
page read and write
1B4F716D000
trusted library allocation
page read and write
1B4FC3F1000
trusted library allocation
page read and write
1B4FB8B9000
heap
page read and write
1B4F76B1000
trusted library allocation
page read and write
1B4FB6B9000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4F00DC000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4FB0EB000
trusted library allocation
page read and write
1B4EEA6C000
heap
page read and write
1B4EF973000
trusted library allocation
page read and write
1B4F6FF7000
trusted library allocation
page read and write
1B4F0453000
trusted library allocation
page read and write
169068A0000
heap
page read and write
1B4E6012000
heap
page read and write
1B4FB4D6000
trusted library allocation
page read and write
1B4F70C2000
trusted library allocation
page read and write
12E9000
heap
page read and write
1B4F76AF000
trusted library allocation
page read and write
1B4FB8A6000
heap
page read and write
1B4F70C8000
trusted library allocation
page read and write
1B4F1907000
trusted library allocation
page read and write
1B4F24AC000
trusted library allocation
page read and write
1B4F71FE000
trusted library allocation
page read and write
1B4F014A000
trusted library allocation
page read and write
1B4F7120000
trusted library allocation
page read and write
26D1B400000
trusted library allocation
page read and write
1B4F06AD000
trusted library allocation
page read and write
1B4F71DB000
trusted library allocation
page read and write
1B4F24D8000
trusted library allocation
page read and write
1B4FB776000
trusted library allocation
page read and write
1B4F89E5000
trusted library allocation
page read and write
1B4F05F1000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4E6057000
heap
page read and write
16906880000
unclassified section
page readonly
1B4FA7CD000
trusted library allocation
page read and write
1B4F6E3F000
trusted library allocation
page read and write
25B74463000
trusted library allocation
page read and write
1B4EBFE1000
trusted library allocation
page read and write
1B4E600C000
heap
page read and write
23341818000
remote allocation
page execute read
1B4EFB1A000
trusted library allocation
page read and write
1B4E604F000
heap
page read and write
233419C4000
heap
page read and write
1B4F8987000
trusted library allocation
page read and write
1B4F6FB1000
trusted library allocation
page read and write
1B4F249B000
trusted library allocation
page read and write
1B4EFFD6000
trusted library allocation
page read and write
1B4EF98F000
trusted library allocation
page read and write
1B4EFE67000
trusted library allocation
page read and write
1B4F7074000
trusted library allocation
page read and write
1B4F18D5000
trusted library allocation
page read and write
1B4F73F4000
trusted library allocation
page read and write
1B4FB6AE000
trusted library allocation
page read and write
1B4F03AB000
trusted library allocation
page read and write
1B4F2582000
trusted library allocation
page read and write
1B4EEF9D000
trusted library allocation
page read and write
1B4EF973000
trusted library allocation
page read and write
1B4EF959000
trusted library allocation
page read and write
1B4F0A94000
trusted library allocation
page read and write
1B4EFE73000
trusted library allocation
page read and write
1B4F034A000
trusted library allocation
page read and write
1B4EEEA7000
trusted library allocation
page read and write
1B4EB066000
trusted library allocation
page read and write
1B4FA8DC000
trusted library allocation
page read and write
1B4F2AE6000
trusted library allocation
page read and write
16907230000
unkown
page execute read
F5C72FE000
stack
page read and write
1B4F04FD000
trusted library allocation
page read and write
FCE000
stack
page read and write
1B4FAD67000
trusted library allocation
page read and write
1B4F00F8000
trusted library allocation
page read and write
1B4EBF42000
trusted library allocation
page read and write
1B4E6066000
heap
page read and write
1B4F18CE000
trusted library allocation
page read and write
1B4F0800000
trusted library allocation
page read and write
1B4E603E000
heap
page read and write
1B4FA8DC000
trusted library allocation
page read and write
1B4F25AE000
trusted library allocation
page read and write
26D1B60A000
trusted library allocation
page read and write
1B4EEF6A000
trusted library allocation
page read and write
1B4F009A000
trusted library allocation
page read and write
1B4FB5E3000
trusted library allocation
page read and write
1B4F3C02000
trusted library allocation
page read and write
1B4F0354000
trusted library allocation
page read and write
1B4F7029000
trusted library allocation
page read and write
1B4F6FB5000
trusted library allocation
page read and write
1B4F133D000
trusted library allocation
page read and write
1B4F1683000
trusted library allocation
page read and write
1B4E6050000
heap
page read and write
1B4F0731000
trusted library allocation
page read and write
1B4EFB1F000
trusted library allocation
page read and write
There are 3587 hidden memdumps, click here to show them.