IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_9757b73c-6bdb-4de5-a745-d0006fa282f3.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_9757b73c-6bdb-4de5-a745-d0006fa282f3.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\bab36f8d-3b5d-4466-b97b-66b2c2c048af (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\bab36f8d-3b5d-4466-b97b-66b2c2c048af.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2216 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e5c25c4-3757-459e-b4ac-58f736293a5e} 7744 "\\.\pipe\gecko-crash-server-pipe.7744" 22a0da6d710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3988 -parentBuildID 20230927232528 -prefsHandle 2784 -prefMapHandle 2968 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a67afcd-37bf-4c91-a883-2013733a1af7} 7744 "\\.\pipe\gecko-crash-server-pipe.7744" 22a0da7aa10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5104 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5180 -prefMapHandle 1540 -prefsLen 31144 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {88aee006-b1dd-409e-9761-e4998fb38d01} 7744 "\\.\pipe\gecko-crash-server-pipe.7744" 22a1f275f10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
https://www.reddit.com/C:
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://spocs.getpocket.com/userp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=951422
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://www.google.com/complete/search
unknown
https://watch.sling.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.46
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.212.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.186.46
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
142.250.113.100
unknown
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
22A1E0F6000
trusted library allocation
page read and write
22A20D4A000
trusted library allocation
page read and write
22A1F6BA000
trusted library allocation
page read and write
22A1CE9D000
trusted library allocation
page read and write
22A276D7000
trusted library allocation
page read and write
22903CE0000
heap
page read and write
22A27667000
trusted library allocation
page read and write
22A190CA000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A1477C000
heap
page read and write
22A147A0000
heap
page read and write
22A27559000
trusted library allocation
page read and write
22A2822C000
trusted library allocation
page read and write
22A27063000
trusted library allocation
page read and write
22A20D51000
trusted library allocation
page read and write
22A26304000
trusted library allocation
page read and write
22A201BB000
trusted library allocation
page read and write
22A1F6DC000
trusted library allocation
page read and write
22902B90000
unclassified section
page readonly
22A275D9000
trusted library allocation
page read and write
2290305C000
trusted library allocation
page read and write
22A14721000
heap
page read and write
1B13D1B0000
unclassified section
page readonly
22A27480000
trusted library allocation
page read and write
22A1EA02000
trusted library allocation
page read and write
22A1D9FA000
trusted library allocation
page read and write
22A2601E000
trusted library allocation
page read and write
22A260A4000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A25FD1000
trusted library allocation
page read and write
22A2773B000
trusted library allocation
page read and write
22A27681000
trusted library allocation
page read and write
22A274A8000
trusted library allocation
page read and write
22A27098000
trusted library allocation
page read and write
22A28E44000
heap
page read and write
22A14724000
heap
page read and write
22A25F16000
trusted library allocation
page read and write
22A147A8000
heap
page read and write
22A1EBA3000
trusted library allocation
page read and write
22A2599C000
trusted library allocation
page read and write
22A27406000
trusted library allocation
page read and write
22A1D493000
trusted library allocation
page read and write
22A25ED6000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A1A995000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A260BD000
trusted library allocation
page read and write
22A1471C000
heap
page read and write
22A270AB000
trusted library allocation
page read and write
22A2686D000
trusted library allocation
page read and write
22A25EEA000
trusted library allocation
page read and write
22A20D1D000
trusted library allocation
page read and write
22A1E755000
trusted library allocation
page read and write
22A25E18000
trusted library allocation
page read and write
22A2682F000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A14739000
heap
page read and write
22A27488000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A1F293000
trusted library allocation
page read and write
22A2638C000
trusted library allocation
page read and write
22A1EB9D000
trusted library allocation
page read and write
22A281A3000
trusted library allocation
page read and write
22A20176000
trusted library allocation
page read and write
22A260CC000
trusted library allocation
page read and write
1B13D721000
trusted library allocation
page read and write
22A147A8000
heap
page read and write
22A260AD000
trusted library allocation
page read and write
22902C00000
unclassified section
page readonly
22A20EB0000
trusted library allocation
page read and write
22A190BF000
trusted library allocation
page read and write
22A1D07D000
heap
page read and write
22A1F2B2000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A259C1000
trusted library allocation
page read and write
22A2742B000
trusted library allocation
page read and write
22A274B3000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1F123000
trusted library allocation
page read and write
22A27519000
trusted library allocation
page read and write
22A26096000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A274B3000
trusted library allocation
page read and write
22A25E8E000
trusted library allocation
page read and write
22A147A0000
heap
page read and write
22A1E7B9000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A2765A000
trusted library allocation
page read and write
22A1DDFD000
trusted library allocation
page read and write
22A1FAE8000
trusted library allocation
page read and write
22A26BA8000
trusted library allocation
page read and write
22902C20000
heap
page read and write
580000
heap
page read and write
22A274E3000
trusted library allocation
page read and write
212CA4F4000
heap
page read and write
22A1FDBC000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A14729000
heap
page read and write
22A1475A000
heap
page read and write
22A1FA90000
trusted library allocation
page read and write
22A281C5000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A26096000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A211EB000
trusted library allocation
page read and write
22A260A8000
trusted library allocation
page read and write
22A20DEC000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A1D5A5000
trusted library allocation
page read and write
22A203C0000
trusted library allocation
page read and write
22A1479A000
heap
page read and write
22A14732000
heap
page read and write
22A1D59E000
trusted library allocation
page read and write
22A25ED8000
trusted library allocation
page read and write
22A1D584000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A25833000
trusted library allocation
page read and write
22A1EA0A000
trusted library allocation
page read and write
22A28EE1000
heap
page read and write
22A1F6CD000
trusted library allocation
page read and write
22A25F71000
trusted library allocation
page read and write
22A274E6000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1D0EE000
heap
page read and write
22A21F86000
trusted library allocation
page read and write
22A25CFE000
trusted library allocation
page read and write
22A1F0F7000
trusted library allocation
page read and write
22A1FC5D000
trusted library allocation
page read and write
22A1A660000
trusted library allocation
page read and write
22A1F6AF000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A14721000
heap
page read and write
22A20373000
trusted library allocation
page read and write
22A1E6E5000
trusted library allocation
page read and write
22A2752E000
trusted library allocation
page read and write
22A2707F000
trusted library allocation
page read and write
22A1472E000
heap
page read and write
22A1FDDC000
trusted library allocation
page read and write
22A1E7A1000
trusted library allocation
page read and write
22A1E735000
trusted library allocation
page read and write
22A20065000
trusted library allocation
page read and write
B7A8BFE000
stack
page read and write
22A1471A000
heap
page read and write
22A14728000
heap
page read and write
22903D77000
heap
page read and write
22A1A8EA000
trusted library allocation
page read and write
22A1DEE9000
trusted library allocation
page read and write
22A1EB9B000
trusted library allocation
page read and write
22A1DE5A000
trusted library allocation
page read and write
212CA55D000
trusted library allocation
page read and write
22A1F6C6000
trusted library allocation
page read and write
22A2707A000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A1475A000
heap
page read and write
22A25FA4000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A260B4000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A260B4000
trusted library allocation
page read and write
22A20D44000
trusted library allocation
page read and write
212CA513000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1CD60000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A14720000
heap
page read and write
22A14748000
heap
page read and write
22A28E01000
heap
page read and write
22A1F6AC000
trusted library allocation
page read and write
22A1EB88000
trusted library allocation
page read and write
22A25E7A000
trusted library allocation
page read and write
22A1E8C8000
trusted library allocation
page read and write
22A200AC000
trusted library allocation
page read and write
22A1E7C1000
trusted library allocation
page read and write
22A1DECD000
trusted library allocation
page read and write
1B13D390000
heap
page read and write
22A27525000
trusted library allocation
page read and write
22A26AD7000
trusted library allocation
page read and write
22A203B8000
trusted library allocation
page read and write
22A276AA000
trusted library allocation
page read and write
22A1D0D6000
heap
page read and write
22A27525000
trusted library allocation
page read and write
22A1E727000
trusted library allocation
page read and write
22A201C4000
trusted library allocation
page read and write
22A14753000
heap
page read and write
22A270DC000
trusted library allocation
page read and write
8171F4E000
unkown
page readonly
22903C63000
heap
page read and write
22A26042000
trusted library allocation
page read and write
22A260CF000
trusted library allocation
page read and write
1B13D530000
heap
page read and write
22A277F9000
trusted library allocation
page read and write
22A274E6000
trusted library allocation
page read and write
22A1A84E000
trusted library allocation
page read and write
22A211F3000
trusted library allocation
page read and write
22A27410000
trusted library allocation
page read and write
22A25E25000
trusted library allocation
page read and write
22A1D6BE000
trusted library allocation
page read and write
22A28201000
trusted library allocation
page read and write
22A20DE7000
trusted library allocation
page read and write
22A26A06000
trusted library allocation
page read and write
22A274C3000
trusted library allocation
page read and write
22A1D68D000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1D670000
trusted library allocation
page read and write
212CA563000
trusted library allocation
page read and write
22A1479C000
heap
page read and write
22A274BB000
trusted library allocation
page read and write
22A1EB72000
trusted library allocation
page read and write
22A25CE0000
trusted library allocation
page read and write
22A27739000
trusted library allocation
page read and write
229035B0000
heap
page read and write
22A1FA93000
trusted library allocation
page read and write
22A1DDFD000
trusted library allocation
page read and write
22A1F6D5000
trusted library allocation
page read and write
1B13D5C6000
heap
page read and write
22A1D0F8000
heap
page read and write
229034F4000
unkown
page execute read
22903CA8000
heap
page read and write
22A276BC000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
106E000
heap
page read and write
22A1DEBD000
trusted library allocation
page read and write
22A277F5000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A1471C000
heap
page read and write
22A14737000
heap
page read and write
22A14746000
heap
page read and write
22A1A961000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A27474000
trusted library allocation
page read and write
22A1FB11000
trusted library allocation
page read and write
22A1FDCE000
trusted library allocation
page read and write
22A1472A000
heap
page read and write
22A1DE8B000
trusted library allocation
page read and write
22A2749E000
trusted library allocation
page read and write
22A1473A000
heap
page read and write
22A14748000
heap
page read and write
22A25F46000
trusted library allocation
page read and write
22A26A27000
trusted library allocation
page read and write
22A1E836000
trusted library allocation
page read and write
22A26062000
trusted library allocation
page read and write
22A25F38000
trusted library allocation
page read and write
22A1CD2F000
trusted library allocation
page read and write
22A276D1000
trusted library allocation
page read and write
22A1FDD1000
trusted library allocation
page read and write
22A1F2A5000
trusted library allocation
page read and write
22A26070000
trusted library allocation
page read and write
22A27537000
trusted library allocation
page read and write
22A20DCA000
trusted library allocation
page read and write
22A1D9B5000
trusted library allocation
page read and write
22A1EBED000
trusted library allocation
page read and write
22A260D4000
trusted library allocation
page read and write
22A1D0DD000
heap
page read and write
22A258DC000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A274C7000
trusted library allocation
page read and write
22A1D68C000
trusted library allocation
page read and write
22903C00000
heap
page read and write
22A1D9D8000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A1CDDC000
trusted library allocation
page read and write
22A27EDF000
trusted library allocation
page read and write
22A1DE9B000
trusted library allocation
page read and write
22A270CA000
trusted library allocation
page read and write
22A1CE62000
trusted library allocation
page read and write
CC4000
heap
page read and write
106E000
heap
page read and write
22A14746000
heap
page read and write
8E0EE7E000
stack
page read and write
22A14778000
heap
page read and write
22A14704000
heap
page read and write
22A25891000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A27ECC000
trusted library allocation
page read and write
22A270DC000
trusted library allocation
page read and write
22A1D5A5000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A26062000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A27097000
trusted library allocation
page read and write
22A25E7F000
trusted library allocation
page read and write
22A197F0000
trusted library allocation
page read and write
22A20EAA000
trusted library allocation
page read and write
212CA4F0000
heap
page read and write
1B13D60D000
trusted library allocation
page read and write
22A25F81000
trusted library allocation
page read and write
22A277E3000
trusted library allocation
page read and write
1B13D70C000
trusted library allocation
page read and write
22A2574A000
trusted library allocation
page read and write
22A26018000
trusted library allocation
page read and write
22A26096000
trusted library allocation
page read and write
22A274D0000
trusted library allocation
page read and write
22A14739000
heap
page read and write
212CA56A000
trusted library allocation
page read and write
22A1DE4E000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1DEFD000
trusted library allocation
page read and write
22A14750000
heap
page read and write
22A1D6D5000
trusted library allocation
page read and write
1A717950000
heap
page read and write
22A25805000
trusted library allocation
page read and write
22A1F67B000
trusted library allocation
page read and write
22A1DE45000
trusted library allocation
page read and write
22A2604D000
trusted library allocation
page read and write
22A26362000
trusted library allocation
page read and write
22902DA2000
unclassified section
page read and write
22A1474F000
heap
page read and write
22A1EB8E000
trusted library allocation
page read and write
22A28084000
trusted library allocation
page read and write
22A259FD000
trusted library allocation
page read and write
22903CF1000
heap
page read and write
22A258C1000
trusted library allocation
page read and write
22A203FA000
trusted library allocation
page read and write
22A27483000
trusted library allocation
page read and write
22A211B6000
trusted library allocation
page read and write
22A25918000
trusted library allocation
page read and write
22A259FB000
trusted library allocation
page read and write
22A21163000
trusted library allocation
page read and write
22A26015000
trusted library allocation
page read and write
22A1D0D5000
heap
page read and write
22A14737000
heap
page read and write
22A211F3000
trusted library allocation
page read and write
1B13D6AC000
trusted library allocation
page read and write
22A1A9F0000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1479F000
heap
page read and write
22A1FA78000
trusted library allocation
page read and write
22A25EEA000
trusted library allocation
page read and write
22A1F2BB000
trusted library allocation
page read and write
22A1D6BE000
trusted library allocation
page read and write
22A274D4000
trusted library allocation
page read and write
22A1E819000
trusted library allocation
page read and write
22A21FAC000
trusted library allocation
page read and write
22A257EE000
trusted library allocation
page read and write
22A2593B000
trusted library allocation
page read and write
22A25F2E000
trusted library allocation
page read and write
22A274E6000
trusted library allocation
page read and write
22A1F966000
trusted library allocation
page read and write
22A25CC8000
trusted library allocation
page read and write
22A27411000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A281E4000
trusted library allocation
page read and write
22A211F1000
trusted library allocation
page read and write
22A25FD1000
trusted library allocation
page read and write
22A25F14000
trusted library allocation
page read and write
22903C7D000
heap
page read and write
22A14757000
heap
page read and write
22A1472E000
heap
page read and write
22A14746000
heap
page read and write
22A1DEB2000
trusted library allocation
page read and write
22A19671000
trusted library allocation
page read and write
22A1DED7000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A1AD25000
trusted library allocation
page read and write
22902BF3000
remote allocation
page execute read
22A14730000
heap
page read and write
22A1D0F2000
heap
page read and write
22A147A5000
heap
page read and write
22A147A0000
heap
page read and write
22A14745000
heap
page read and write
22A1F69D000
trusted library allocation
page read and write
22A14715000
heap
page read and write
22A25FB3000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A2705C000
trusted library allocation
page read and write
22A1FA9A000
trusted library allocation
page read and write
22A201F5000
trusted library allocation
page read and write
22A1DDCF000
trusted library allocation
page read and write
22A1F08E000
trusted library allocation
page read and write
22A1F0A6000
trusted library allocation
page read and write
22A27658000
trusted library allocation
page read and write
22A1472D000
heap
page read and write
22A14707000
heap
page read and write
22A1FDEF000
trusted library allocation
page read and write
22A1EBED000
trusted library allocation
page read and write
22A2743B000
trusted library allocation
page read and write
22A2589F000
trusted library allocation
page read and write
22A1F0A6000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A2707F000
trusted library allocation
page read and write
22A25FA4000
trusted library allocation
page read and write
22A20D2E000
trusted library allocation
page read and write
22A1473F000
heap
page read and write
22A1D6D8000
trusted library allocation
page read and write
22A1A961000
trusted library allocation
page read and write
22A1A6F5000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A147A5000
heap
page read and write
22A260BD000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A14739000
heap
page read and write
22902D10000
heap
page read and write
22A274E3000
trusted library allocation
page read and write
22A1F141000
trusted library allocation
page read and write
22A1971E000
trusted library allocation
page read and write
22A1D0DD000
heap
page read and write
22A25FB9000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A1D971000
trusted library allocation
page read and write
22A281A7000
trusted library allocation
page read and write
22A21F91000
trusted library allocation
page read and write
22A14732000
heap
page read and write
269592A0000
heap
page read and write
22A197CD000
trusted library allocation
page read and write
22A1DE5A000
trusted library allocation
page read and write
22A276D8000
trusted library allocation
page read and write
22A26021000
trusted library allocation
page read and write
22903C69000
heap
page read and write
22A1DE9F000
trusted library allocation
page read and write
81752FE000
unkown
page readonly
22A270FA000
trusted library allocation
page read and write
22A257F3000
trusted library allocation
page read and write
22A259F3000
trusted library allocation
page read and write
22A1A8EF000
trusted library allocation
page read and write
22A270E7000
trusted library allocation
page read and write
22A1D470000
trusted library allocation
page read and write
22A1FDE6000
trusted library allocation
page read and write
22A259DB000
trusted library allocation
page read and write
22A25FB9000
trusted library allocation
page read and write
22A274EF000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A20E56000
trusted library allocation
page read and write
22A1D951000
trusted library allocation
page read and write
22A211EB000
trusted library allocation
page read and write
22A203AB000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A14749000
heap
page read and write
22A2592D000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1DECD000
trusted library allocation
page read and write
22A25F3A000
trusted library allocation
page read and write
22A1473F000
heap
page read and write
22A274F7000
trusted library allocation
page read and write
22A1FC50000
trusted library allocation
page read and write
22A1D6D8000
trusted library allocation
page read and write
22A211DF000
trusted library allocation
page read and write
22A2014B000
trusted library allocation
page read and write
22902F00000
trusted library allocation
page read and write
22A1E0C7000
trusted library allocation
page read and write
22A1D0ED000
heap
page read and write
41007FE000
unkown
page readonly
22A26069000
trusted library allocation
page read and write
22A1A8F7000
trusted library allocation
page read and write
22A274B0000
trusted library allocation
page read and write
22A2751D000
trusted library allocation
page read and write
22A1DEDE000
trusted library allocation
page read and write
22A1D49F000
trusted library allocation
page read and write
22A25F24000
trusted library allocation
page read and write
22A25FC1000
trusted library allocation
page read and write
22A21FC8000
trusted library allocation
page read and write
22A25927000
trusted library allocation
page read and write
22A1474F000
heap
page read and write
22A26090000
trusted library allocation
page read and write
22A1E7B0000
trusted library allocation
page read and write
22A1472D000
heap
page read and write
22A1F23B000
trusted library allocation
page read and write
22A274FE000
trusted library allocation
page read and write
22A1A8EA000
trusted library allocation
page read and write
22A20EAA000
trusted library allocation
page read and write
22A260CC000
trusted library allocation
page read and write
22A1E6AF000
trusted library allocation
page read and write
1B13D6E7000
trusted library allocation
page read and write
22A25E8B000
trusted library allocation
page read and write
22A1DE5A000
trusted library allocation
page read and write
22A1DE9B000
trusted library allocation
page read and write
22A1A9FE000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A1DE9F000
trusted library allocation
page read and write
212CA900000
trusted library allocation
page read and write
CC4000
heap
page read and write
22A14730000
heap
page read and write
22A1D0E3000
heap
page read and write
22A27755000
trusted library allocation
page read and write
22A2573C000
trusted library allocation
page read and write
22A201D6000
trusted library allocation
page read and write
22A2602D000
trusted library allocation
page read and write
22A203D4000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A1D07D000
heap
page read and write
434FBFC000
stack
page read and write
22A2631E000
trusted library allocation
page read and write
22A277E3000
trusted library allocation
page read and write
22A26A81000
trusted library allocation
page read and write
417D9FE000
stack
page read and write
22A21FEC000
trusted library allocation
page read and write
22A20DF9000
trusted library allocation
page read and write
22A1D68D000
trusted library allocation
page read and write
22A14752000
heap
page read and write
417C9D8000
stack
page read and write
22A2036F000
trusted library allocation
page read and write
22A1E799000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A25ECC000
trusted library allocation
page read and write
22A274A4000
trusted library allocation
page read and write
22A27745000
trusted library allocation
page read and write
22A1F0B3000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A1A91C000
trusted library allocation
page read and write
22A270C3000
trusted library allocation
page read and write
22A1D067000
heap
page read and write
22A20DB0000
trusted library allocation
page read and write
22A260A1000
trusted library allocation
page read and write
22A2118D000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A277F5000
trusted library allocation
page read and write
22A274BB000
trusted library allocation
page read and write
22A25DE8000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A14778000
heap
page read and write
22A25E15000
trusted library allocation
page read and write
22A26005000
trusted library allocation
page read and write
22A1473B000
heap
page read and write
22A28148000
trusted library allocation
page read and write
22A2599D000
trusted library allocation
page read and write
22A25F46000
trusted library allocation
page read and write
22A26324000
trusted library allocation
page read and write
22A25F44000
trusted library allocation
page read and write
22A1E725000
trusted library allocation
page read and write
22A1D04F000
heap
page read and write
22903CE3000
heap
page read and write
22903075000
trusted library allocation
page read and write
22A28E4C000
heap
page read and write
22A1472D000
heap
page read and write
22A270CA000
trusted library allocation
page read and write
22A26359000
trusted library allocation
page read and write
22A274C7000
trusted library allocation
page read and write
22A1E735000
trusted library allocation
page read and write
22A2003E000
trusted library allocation
page read and write
22A25F06000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A14745000
heap
page read and write
22A14739000
heap
page read and write
22A2604A000
trusted library allocation
page read and write
22A27642000
trusted library allocation
page read and write
22A1F6E3000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A27640000
trusted library allocation
page read and write
22A257EA000
trusted library allocation
page read and write
22A2119E000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1EB9B000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A1473E000
heap
page read and write
26957733000
heap
page read and write
22A25F6D000
trusted library allocation
page read and write
22903D2A000
heap
page read and write
22A1F9F3000
trusted library allocation
page read and write
22A274A8000
trusted library allocation
page read and write
22A21F93000
trusted library allocation
page read and write
22A1DE57000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A1E7FA000
trusted library allocation
page read and write
22A2584A000
trusted library allocation
page read and write
22A270AB000
trusted library allocation
page read and write
22903C60000
heap
page read and write
22A21FE9000
trusted library allocation
page read and write
22A1D935000
trusted library allocation
page read and write
22A1D588000
trusted library allocation
page read and write
22A25F2E000
trusted library allocation
page read and write
22A270C8000
trusted library allocation
page read and write
22A14729000
heap
page read and write
22A20DCA000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A14746000
heap
page read and write
22A1E7C1000
trusted library allocation
page read and write
22A25FB3000
trusted library allocation
page read and write
22A19800000
trusted library allocation
page read and write
22A27676000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A259C1000
trusted library allocation
page read and write
22A1F6C7000
trusted library allocation
page read and write
22A1474D000
heap
page read and write
22A25E57000
trusted library allocation
page read and write
229030BC000
trusted library allocation
page read and write
22A1FABE000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A1E8E5000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A28257000
trusted library allocation
page read and write
22A2119E000
trusted library allocation
page read and write
22A28E71000
heap
page read and write
22A1DD72000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A201D3000
trusted library allocation
page read and write
22A14799000
heap
page read and write
22A14745000
heap
page read and write
22A274F7000
trusted library allocation
page read and write
22A260CC000
trusted library allocation
page read and write
22A21FC8000
trusted library allocation
page read and write
22A20D97000
trusted library allocation
page read and write
22A1DE29000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
1056000
heap
page read and write
22A258BB000
trusted library allocation
page read and write
22A2749E000
trusted library allocation
page read and write
22903CE8000
heap
page read and write
22A25C80000
trusted library allocation
page read and write
CC4000
heap
page read and write
22A1D586000
trusted library allocation
page read and write
22A1F6E3000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A14722000
heap
page read and write
22A201C6000
trusted library allocation
page read and write
22A25ECE000
trusted library allocation
page read and write
1B13D220000
remote allocation
page read and write
1B13D2A0000
heap
page read and write
22A1EB72000
trusted library allocation
page read and write
22A26062000
trusted library allocation
page read and write
22A25E7A000
trusted library allocation
page read and write
22A2744A000
trusted library allocation
page read and write
22A0F673000
heap
page read and write
22A1CE3F000
trusted library allocation
page read and write
22A260AD000
trusted library allocation
page read and write
22A1F2DB000
trusted library allocation
page read and write
22A270CF000
trusted library allocation
page read and write
22A2814D000
trusted library allocation
page read and write
22A260A4000
trusted library allocation
page read and write
212CA55F000
trusted library allocation
page read and write
22A1E711000
trusted library allocation
page read and write
22A2705F000
trusted library allocation
page read and write
22A259BD000
trusted library allocation
page read and write
22A2018A000
trusted library allocation
page read and write
22A1D56E000
trusted library allocation
page read and write
22A200B7000
trusted library allocation
page read and write
1B13D698000
trusted library allocation
page read and write
22A2744D000
trusted library allocation
page read and write
22A1CE63000
trusted library allocation
page read and write
22A27488000
trusted library allocation
page read and write
22903064000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A1D487000
trusted library allocation
page read and write
22A25EDA000
trusted library allocation
page read and write
22A25DCC000
trusted library allocation
page read and write
22A1F0FC000
trusted library allocation
page read and write
22A2689E000
trusted library allocation
page read and write
22A257EA000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A1A8F8000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A20EA3000
trusted library allocation
page read and write
22A1479C000
heap
page read and write
22A14730000
heap
page read and write
22A274F1000
trusted library allocation
page read and write
22A1E7B0000
trusted library allocation
page read and write
22A1D6CE000
trusted library allocation
page read and write
22A1F945000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A1CD60000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A274CA000
trusted library allocation
page read and write
22A274FE000
trusted library allocation
page read and write
22A1E721000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1A95F000
trusted library allocation
page read and write
1B13D716000
trusted library allocation
page read and write
22A25ED8000
trusted library allocation
page read and write
22A14720000
heap
page read and write
269575F0000
heap
page read and write
22A21F34000
trusted library allocation
page read and write
22A20381000
trusted library allocation
page read and write
22A281A3000
trusted library allocation
page read and write
22A2002F000
trusted library allocation
page read and write
22A25825000
trusted library allocation
page read and write
22A270BA000
trusted library allocation
page read and write
22A25E1C000
trusted library allocation
page read and write
22A25F11000
trusted library allocation
page read and write
22A14715000
heap
page read and write
22A259C1000
trusted library allocation
page read and write
22A1A96E000
trusted library allocation
page read and write
22A276D8000
trusted library allocation
page read and write
22A26060000
trusted library allocation
page read and write
22A14704000
heap
page read and write
22A274E3000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1D584000
trusted library allocation
page read and write
22A1D065000
heap
page read and write
22A14746000
heap
page read and write
22A2740E000
trusted library allocation
page read and write
22A1F67D000
trusted library allocation
page read and write
22A1F11A000
trusted library allocation
page read and write
22A2115F000
trusted library allocation
page read and write
8175AFE000
stack
page read and write
22A1474F000
heap
page read and write
22A14737000
heap
page read and write
22A274A8000
trusted library allocation
page read and write
22A1E0E9000
trusted library allocation
page read and write
22A211EB000
trusted library allocation
page read and write
22A1F68C000
trusted library allocation
page read and write
22A1E759000
trusted library allocation
page read and write
22A274DC000
trusted library allocation
page read and write
22A259BF000
trusted library allocation
page read and write
22A1F69D000
trusted library allocation
page read and write
22A25791000
trusted library allocation
page read and write
22A1DEB3000
trusted library allocation
page read and write
22903CF1000
heap
page read and write
22A2630A000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A1471C000
heap
page read and write
22A14756000
heap
page read and write
22A14722000
heap
page read and write
22A1D0DD000
heap
page read and write
22A274D8000
trusted library allocation
page read and write
212CA530000
trusted library allocation
page read and write
22A1D940000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A14732000
heap
page read and write
22A14740000
heap
page read and write
22A27472000
trusted library allocation
page read and write
22A2601A000
trusted library allocation
page read and write
22A270E7000
trusted library allocation
page read and write
22A28E71000
heap
page read and write
22A274D4000
trusted library allocation
page read and write
22A274E9000
trusted library allocation
page read and write
22A1DEEE000
trusted library allocation
page read and write
22A222A5000
trusted library allocation
page read and write
22A1A8F7000
trusted library allocation
page read and write
22A276D8000
trusted library allocation
page read and write
22A190EF000
trusted library allocation
page read and write
22A260AD000
trusted library allocation
page read and write
22A274AF000
trusted library allocation
page read and write
22A25E63000
trusted library allocation
page read and write
22A27463000
trusted library allocation
page read and write
22903CE9000
heap
page read and write
22A2744A000
trusted library allocation
page read and write
22A257B1000
trusted library allocation
page read and write
22A1472A000
heap
page read and write
22A25F54000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A25F6D000
trusted library allocation
page read and write
22A2743A000
trusted library allocation
page read and write
22903023000
trusted library allocation
page read and write
22A1DEBD000
trusted library allocation
page read and write
22A260D4000
trusted library allocation
page read and write
22A1CE5F000
trusted library allocation
page read and write
22A20DE7000
trusted library allocation
page read and write
2290306A000
trusted library allocation
page read and write
1A717A00000
trusted library allocation
page read and write
22A20172000
trusted library allocation
page read and write
22A1D9DA000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A25F2B000
trusted library allocation
page read and write
22A1F08E000
trusted library allocation
page read and write
22A1F997000
trusted library allocation
page read and write
22A1EB4B000
trusted library allocation
page read and write
22A270AD000
trusted library allocation
page read and write
22A277FE000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A274C4000
trusted library allocation
page read and write
22A276BC000
trusted library allocation
page read and write
22A1FC93000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A27459000
trusted library allocation
page read and write
22A258B1000
trusted library allocation
page read and write
22A1473B000
heap
page read and write
22A1D6D2000
trusted library allocation
page read and write
22A1F6A0000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A14745000
heap
page read and write
22A274F7000
trusted library allocation
page read and write
22A270D3000
trusted library allocation
page read and write
22A260B4000
trusted library allocation
page read and write
22A1A834000
trusted library allocation
page read and write
22A14720000
heap
page read and write
1B13D3C3000
heap
page read and write
22A1F0D0000
trusted library allocation
page read and write
22A1479D000
heap
page read and write
22A280E5000
trusted library allocation
page read and write
22A281A7000
trusted library allocation
page read and write
51A000
stack
page read and write
22A25FC1000
trusted library allocation
page read and write
22A2816D000
trusted library allocation
page read and write
22A14752000
heap
page read and write
22A274AF000
trusted library allocation
page read and write
22A260A0000
trusted library allocation
page read and write
22A1EB9B000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A270AD000
trusted library allocation
page read and write
22A1A8EA000
trusted library allocation
page read and write
22A1A9F6000
trusted library allocation
page read and write
22A20346000
trusted library allocation
page read and write
22A1F2A8000
trusted library allocation
page read and write
22A25F68000
trusted library allocation
page read and write
22A19782000
trusted library allocation
page read and write
22A25EDA000
trusted library allocation
page read and write
22A274FE000
trusted library allocation
page read and write
22A25E62000
trusted library allocation
page read and write
22A1F6C7000
trusted library allocation
page read and write
212CA4F6000
heap
page read and write
CC4000
heap
page read and write
22A14778000
heap
page read and write
22A20399000
trusted library allocation
page read and write
22A274C4000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A190DF000
trusted library allocation
page read and write
22A1A8E4000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A2604D000
trusted library allocation
page read and write
22A1DEAD000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A14732000
heap
page read and write
22A1A6E7000
trusted library allocation
page read and write
22A1EB73000
trusted library allocation
page read and write
22A20DD3000
trusted library allocation
page read and write
22A1474A000
heap
page read and write
22A2601F000
trusted library allocation
page read and write
22A1479A000
heap
page read and write
22A260D3000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A20DAD000
trusted library allocation
page read and write
212CA320000
remote allocation
page read and write
22A274F4000
trusted library allocation
page read and write
22A275D9000
trusted library allocation
page read and write
22A2580D000
trusted library allocation
page read and write
22A25E84000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1A6F6000
trusted library allocation
page read and write
22A1A6F6000
trusted library allocation
page read and write
22A260D3000
trusted library allocation
page read and write
22A274D0000
trusted library allocation
page read and write
1077000
heap
page read and write
22A26057000
trusted library allocation
page read and write
22A26062000
trusted library allocation
page read and write
22A1DE8B000
trusted library allocation
page read and write
22903C60000
heap
page read and write
22A1D69A000
trusted library allocation
page read and write
22A1F6C2000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A1D9FD000
trusted library allocation
page read and write
22A28E3E000
heap
page read and write
22A274EE000
trusted library allocation
page read and write
22A274DF000
trusted library allocation
page read and write
212CA620000
unclassified section
page read and write
22A1DDEC000
trusted library allocation
page read and write
22903D77000
heap
page read and write
22A1F6DC000
trusted library allocation
page read and write
22A1479B000
heap
page read and write
22A211E9000
trusted library allocation
page read and write
22A202E8000
trusted library allocation
page read and write
22A20057000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A26090000
trusted library allocation
page read and write
22A2604D000
trusted library allocation
page read and write
22A260CF000
trusted library allocation
page read and write
22A1EB96000
trusted library allocation
page read and write
22A260C8000
trusted library allocation
page read and write
22A1DE49000
trusted library allocation
page read and write
22903C69000
heap
page read and write
22A270AD000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A2583E000
trusted library allocation
page read and write
22A27749000
trusted library allocation
page read and write
22A1E8ED000
trusted library allocation
page read and write
22A1DEE9000
trusted library allocation
page read and write
22A1D07D000
heap
page read and write
22903CF1000
heap
page read and write
22A26334000
trusted library allocation
page read and write
22A1DDB6000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1A62D000
trusted library allocation
page read and write
22A25E28000
trusted library allocation
page read and write
22A259FD000
trusted library allocation
page read and write
22A147A8000
heap
page read and write
22A26096000
trusted library allocation
page read and write
22A274F3000
trusted library allocation
page read and write
22A28141000
trusted library allocation
page read and write
417BEFE000
unkown
page readonly
22A260A4000
trusted library allocation
page read and write
22A1A6A6000
trusted library allocation
page read and write
22903D6B000
heap
page read and write
22A1473E000
heap
page read and write
22A1475A000
heap
page read and write
22A200D8000
trusted library allocation
page read and write
22A200F7000
trusted library allocation
page read and write
22A1D9FE000
trusted library allocation
page read and write
22A1471C000
heap
page read and write
22A1F6E3000
trusted library allocation
page read and write
22A1F6D7000
trusted library allocation
page read and write
26957710000
heap
page read and write
22A1E753000
trusted library allocation
page read and write
22A222A9000
trusted library allocation
page read and write
22A1FABE000
trusted library allocation
page read and write
22A1DE85000
trusted library allocation
page read and write
1B13D6B7000
trusted library allocation
page read and write
22A274EE000
trusted library allocation
page read and write
22A1D93B000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A190CE000
trusted library allocation
page read and write
22A1D5CE000
trusted library allocation
page read and write
22A26310000
trusted library allocation
page read and write
22A1F6E1000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1473F000
heap
page read and write
22A196FB000
trusted library allocation
page read and write
22A276F7000
trusted library allocation
page read and write
22A2773B000
trusted library allocation
page read and write
22A2743E000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A1F1FC000
trusted library allocation
page read and write
22A21153000
trusted library allocation
page read and write
22A203C8000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A200E7000
trusted library allocation
page read and write
22903D58000
heap
page read and write
22A2776B000
trusted library allocation
page read and write
22A2119E000
trusted library allocation
page read and write
22A1472A000
heap
page read and write
22A28EB6000
heap
page read and write
22A14732000
heap
page read and write
22A14745000
heap
page read and write
22A14722000
heap
page read and write
22A26A2C000
trusted library allocation
page read and write
22A2609E000
trusted library allocation
page read and write
417BFFE000
unkown
page readonly
22A1DD9C000
trusted library allocation
page read and write
22A1A8EF000
trusted library allocation
page read and write
22A14742000
heap
page read and write
22A274D3000
trusted library allocation
page read and write
22A21F6E000
trusted library allocation
page read and write
22A274A2000
trusted library allocation
page read and write
22A1F4B2000
trusted library allocation
page read and write
22A1F2BB000
trusted library allocation
page read and write
22A276AF000
trusted library allocation
page read and write
22A1E724000
trusted library allocation
page read and write
22A274DC000
trusted library allocation
page read and write
22A1F172000
trusted library allocation
page read and write
22A26047000
trusted library allocation
page read and write
22A1FA68000
trusted library allocation
page read and write
22A26396000
trusted library allocation
page read and write
22A1DE6C000
trusted library allocation
page read and write
22903B08000
trusted library allocation
page read and write
22A25DED000
trusted library allocation
page read and write
22A14746000
heap
page read and write
CC4000
heap
page read and write
22A14739000
heap
page read and write
22A1A6EC000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1DEB2000
trusted library allocation
page read and write
22A1CE35000
trusted library allocation
page read and write
22A1DD95000
trusted library allocation
page read and write
22A21FDE000
trusted library allocation
page read and write
22A276F7000
trusted library allocation
page read and write
22A2577C000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A274FE000
trusted library allocation
page read and write
22A2773B000
trusted library allocation
page read and write
1B13D296000
heap
page read and write
22A274FE000
trusted library allocation
page read and write
22A1A92F000
trusted library allocation
page read and write
22A27480000
trusted library allocation
page read and write
22A1F092000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A274A8000
trusted library allocation
page read and write
22A2593B000
trusted library allocation
page read and write
22A1F2A3000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A257EE000
trusted library allocation
page read and write
22A2599D000
trusted library allocation
page read and write
22A1E7B9000
trusted library allocation
page read and write
1A717930000
heap
page read and write
22A1D59E000
trusted library allocation
page read and write
22A2019E000
trusted library allocation
page read and write
22A2582D000
trusted library allocation
page read and write
22A14750000
heap
page read and write
22A1D990000
trusted library allocation
page read and write
22A1A995000
trusted library allocation
page read and write
22A1D065000
heap
page read and write
22A1472A000
heap
page read and write
22A1F6F2000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A25DC9000
trusted library allocation
page read and write
22A25F2B000
trusted library allocation
page read and write
22A274CA000
trusted library allocation
page read and write
22A25923000
trusted library allocation
page read and write
22A20DDC000
trusted library allocation
page read and write
22A25ED0000
trusted library allocation
page read and write
22A1473A000
heap
page read and write
22A277ED000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A260CF000
trusted library allocation
page read and write
22A20062000
trusted library allocation
page read and write
F30000
unkown
page write copy
22A276A7000
trusted library allocation
page read and write
22A2749A000
trusted library allocation
page read and write
22A260AD000
trusted library allocation
page read and write
22A1D6A9000
trusted library allocation
page read and write
22A28206000
trusted library allocation
page read and write
22903100000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A14751000
heap
page read and write
22A1D66B000
trusted library allocation
page read and write
22A263A8000
trusted library allocation
page read and write
22A260B1000
trusted library allocation
page read and write
22A14720000
heap
page read and write
212CA660000
unclassified section
page readonly
22A2822C000
trusted library allocation
page read and write
22A26058000
trusted library allocation
page read and write
22A260C8000
trusted library allocation
page read and write
22A1F0B3000
trusted library allocation
page read and write
22A2779D000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1D49D000
trusted library allocation
page read and write
22A1962F000
trusted library allocation
page read and write
22A26070000
trusted library allocation
page read and write
22A1CD61000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A270FE000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A1E8DF000
trusted library allocation
page read and write
22A1F11D000
trusted library allocation
page read and write
22A14729000
heap
page read and write
22A14720000
heap
page read and write
22A1473A000
heap
page read and write
22A274CA000
trusted library allocation
page read and write
22A14738000
heap
page read and write
22A14732000
heap
page read and write
22A274F7000
trusted library allocation
page read and write
22A1F6EF000
trusted library allocation
page read and write
22A0F668000
heap
page read and write
22A25F3A000
trusted library allocation
page read and write
22903CE0000
heap
page read and write
22A1EB72000
trusted library allocation
page read and write
22A2776B000
trusted library allocation
page read and write
2290305F000
trusted library allocation
page read and write
22A28143000
trusted library allocation
page read and write
22A1EFEB000
trusted library allocation
page read and write
22A1472B000
heap
page read and write
22903D58000
heap
page read and write
22A27046000
trusted library allocation
page read and write
22A270FE000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A26033000
trusted library allocation
page read and write
22A1EB88000
trusted library allocation
page read and write
22A14753000
heap
page read and write
22A201A2000
trusted library allocation
page read and write
22A1D59E000
trusted library allocation
page read and write
22A21FC8000
trusted library allocation
page read and write
22A26368000
trusted library allocation
page read and write
22A190EF000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A1E0E3000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A25E34000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A1F6C4000
trusted library allocation
page read and write
182E000
stack
page read and write
22A27EE3000
trusted library allocation
page read and write
22A1F16F000
trusted library allocation
page read and write
22A1472D000
heap
page read and write
1061000
heap
page read and write
22A1FAF8000
trusted library allocation
page read and write
22A2593B000
trusted library allocation
page read and write
22A25E62000
trusted library allocation
page read and write
22A1D9D8000
trusted library allocation
page read and write
22A21158000
trusted library allocation
page read and write
22A2705F000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A1A63A000
trusted library allocation
page read and write
22A1E8DA000
trusted library allocation
page read and write
22A1E7FA000
trusted library allocation
page read and write
5D0000
heap
page read and write
22903C01000
heap
page read and write
22A26047000
trusted library allocation
page read and write
22A1A8E8000
trusted library allocation
page read and write
22A260A8000
trusted library allocation
page read and write
22A260C9000
trusted library allocation
page read and write
22A1EB47000
trusted library allocation
page read and write
22A25ECC000
trusted library allocation
page read and write
212CA5BC000
trusted library allocation
page read and write
22A147A9000
heap
page read and write
2695771D000
heap
page read and write
22A274A4000
trusted library allocation
page read and write
22A1DE4E000
trusted library allocation
page read and write
22A1472E000
heap
page read and write
22A25ECC000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1D0F8000
heap
page read and write
22A1F0D3000
trusted library allocation
page read and write
22A1F6E0000
trusted library allocation
page read and write
22A274CA000
trusted library allocation
page read and write
22A201A8000
trusted library allocation
page read and write
22A2705C000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A1471D000
heap
page read and write
22A202F9000
trusted library allocation
page read and write
22A25ED0000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A1CE8F000
trusted library allocation
page read and write
22A211F3000
trusted library allocation
page read and write
22A1D676000
trusted library allocation
page read and write
22A1DE4B000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A274BB000
trusted library allocation
page read and write
22A2743A000
trusted library allocation
page read and write
22A1473A000
heap
page read and write
22A200FA000
trusted library allocation
page read and write
22A21158000
trusted library allocation
page read and write
22A2584B000
trusted library allocation
page read and write
22A270F5000
trusted library allocation
page read and write
22A259AC000
trusted library allocation
page read and write
22A2766B000
trusted library allocation
page read and write
22A26051000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A1D6BA000
trusted library allocation
page read and write
22A25ED2000
trusted library allocation
page read and write
22A14737000
heap
page read and write
2AB87A01000
trusted library allocation
page execute read
417F2FE000
unkown
page readonly
22A1E8D4000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A270B8000
trusted library allocation
page read and write
1B13D5C0000
heap
page read and write
22A25DEE000
trusted library allocation
page read and write
22A1D0DD000
heap
page read and write
2695773B000
heap
page read and write
212CA923000
trusted library allocation
page read and write
22A1F6A2000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A25DAA000
trusted library allocation
page read and write
22A25749000
trusted library allocation
page read and write
22A203DA000
trusted library allocation
page read and write
22A270E7000
trusted library allocation
page read and write
22A0F668000
heap
page read and write
22A14746000
heap
page read and write
22A14732000
heap
page read and write
22A20133000
trusted library allocation
page read and write
22A27081000
trusted library allocation
page read and write
22A260A8000
trusted library allocation
page read and write
22A25948000
trusted library allocation
page read and write
22A1F6C4000
trusted library allocation
page read and write
22A1DE5A000
trusted library allocation
page read and write
22A14756000
heap
page read and write
22A1D984000
trusted library allocation
page read and write
22A26070000
trusted library allocation
page read and write
22A1472A000
heap
page read and write
22A26096000
trusted library allocation
page read and write
22A1A8EA000
trusted library allocation
page read and write
22A27483000
trusted library allocation
page read and write
22A1E8DA000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A1DE99000
trusted library allocation
page read and write
212CA340000
unclassified section
page readonly
22A276BC000
trusted library allocation
page read and write
22903D44000
heap
page read and write
22A28C00000
trusted library allocation
page read and write
22A2577C000
trusted library allocation
page read and write
22A1D68A000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A1472A000
heap
page read and write
22A2705A000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A257F3000
trusted library allocation
page read and write
22A26B02000
trusted library allocation
page read and write
22A25732000
trusted library allocation
page read and write
22A1D6BE000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A14735000
heap
page read and write
22A1FA59000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1D07D000
heap
page read and write
22A274DC000
trusted library allocation
page read and write
22A274FE000
trusted library allocation
page read and write
22A281C5000
trusted library allocation
page read and write
22A274CA000
trusted library allocation
page read and write
22A2810C000
trusted library allocation
page read and write
22A274B1000
trusted library allocation
page read and write
22A1F695000
trusted library allocation
page read and write
1B13D647000
trusted library allocation
page read and write
22A257EE000
trusted library allocation
page read and write
22A14731000
heap
page read and write
22A147A1000
heap
page read and write
22A14732000
heap
page read and write
22A26018000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A1DECB000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
8E0FEBE000
unkown
page readonly
22A1DE9B000
trusted library allocation
page read and write
22A1F49F000
trusted library allocation
page read and write
22A260A4000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A276AA000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A274EF000
trusted library allocation
page read and write
22A1D66D000
trusted library allocation
page read and write
2695772F000
heap
page read and write
22A1D066000
heap
page read and write
22A1CD34000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A2002D000
trusted library allocation
page read and write
1B13D696000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A14739000
heap
page read and write
22A2002B000
trusted library allocation
page read and write
22902D30000
heap
page read and write
22A2019E000
trusted library allocation
page read and write
22A274DC000
trusted library allocation
page read and write
22A1F19C000
trusted library allocation
page read and write
22A1F0AE000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A2746E000
trusted library allocation
page read and write
22A20DE4000
trusted library allocation
page read and write
22A274D4000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A274E6000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A260AD000
trusted library allocation
page read and write
22A21130000
trusted library allocation
page read and write
22A1D0DD000
heap
page read and write
22A26096000
trusted library allocation
page read and write
22A26090000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22903CE1000
heap
page read and write
22A147A0000
heap
page read and write
22A1DE4E000
trusted library allocation
page read and write
22A1E839000
trusted library allocation
page read and write
22A14740000
heap
page read and write
22A1EB9D000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A260B1000
trusted library allocation
page read and write
22A270AB000
trusted library allocation
page read and write
22A2591B000
trusted library allocation
page read and write
22A20DEC000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A1DE4E000
trusted library allocation
page read and write
22A1472E000
heap
page read and write
22A1D6A7000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A260A8000
trusted library allocation
page read and write
22A1DECD000
trusted library allocation
page read and write
22A1F6AF000
trusted library allocation
page read and write
8174AFE000
stack
page read and write
22A14739000
heap
page read and write
22A274AF000
trusted library allocation
page read and write
22A27483000
trusted library allocation
page read and write
22A1DDCF000
trusted library allocation
page read and write
22A274BB000
trusted library allocation
page read and write
22A2743C000
trusted library allocation
page read and write
22A1E7B4000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A0F65D000
heap
page read and write
22A202D4000
trusted library allocation
page read and write
22A2776B000
trusted library allocation
page read and write
22A1D668000
trusted library allocation
page read and write
22A1D5A5000
trusted library allocation
page read and write
22A1E76D000
trusted library allocation
page read and write
22A21F39000
trusted library allocation
page read and write
22A1D082000
heap
page read and write
22A260AD000
trusted library allocation
page read and write
22A1DD51000
trusted library allocation
page read and write
22903CFD000
heap
page read and write
417BF78000
stack
page read and write
22A1DEE0000
trusted library allocation
page read and write
22A2766D000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A274B3000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A26347000
trusted library allocation
page read and write
22A1DE2D000
trusted library allocation
page read and write
22903D58000
heap
page read and write
22A26042000
trusted library allocation
page read and write
22A26027000
trusted library allocation
page read and write
22A1DD76000
trusted library allocation
page read and write
22A2774C000
trusted library allocation
page read and write
22A276F7000
trusted library allocation
page read and write
22A1DD9C000
trusted library allocation
page read and write
22A270CA000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A258CB000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A14721000
heap
page read and write
22A1D59E000
trusted library allocation
page read and write
22A2015E000
trusted library allocation
page read and write
22A26042000
trusted library allocation
page read and write
22A19098000
trusted library allocation
page read and write
22A21F93000
trusted library allocation
page read and write
22A27080000
trusted library allocation
page read and write
22A270FE000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1474E000
heap
page read and write
22A14721000
heap
page read and write
22A1F9B6000
trusted library allocation
page read and write
22A20D21000
trusted library allocation
page read and write
22903C6C000
heap
page read and write
22A14756000
heap
page read and write
22A1D0D5000
heap
page read and write
22A28257000
trusted library allocation
page read and write
22A1CD60000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A1F0D1000
trusted library allocation
page read and write
22A1EBED000
trusted library allocation
page read and write
22A25FAA000
trusted library allocation
page read and write
22A1473D000
heap
page read and write
22A1D0F8000
heap
page read and write
22A2705A000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A20DAD000
trusted library allocation
page read and write
22A147A3000
heap
page read and write
26957700000
heap
page read and write
22A14704000
heap
page read and write
22A270BA000
trusted library allocation
page read and write
22A27745000
trusted library allocation
page read and write
22A274A5000
trusted library allocation
page read and write
22A260A8000
trusted library allocation
page read and write
22A21F36000
trusted library allocation
page read and write
22A14729000
heap
page read and write
22A274A2000
trusted library allocation
page read and write
22903D59000
heap
page read and write
22A2606C000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A270DC000
trusted library allocation
page read and write
3821000
heap
page read and write
22A20EAC000
trusted library allocation
page read and write
22A26042000
trusted library allocation
page read and write
22A14761000
heap
page read and write
22A14749000
heap
page read and write
22A274E6000
trusted library allocation
page read and write
22A1F08E000
trusted library allocation
page read and write
22A2015E000
trusted library allocation
page read and write
22A25CA9000
trusted library allocation
page read and write
22A1E0B9000
trusted library allocation
page read and write
22903CF1000
heap
page read and write
22A27E9B000
trusted library allocation
page read and write
22A1A869000
trusted library allocation
page read and write
22A28141000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A14721000
heap
page read and write
22A14720000
heap
page read and write
22A259AC000
trusted library allocation
page read and write
22A25C90000
trusted library allocation
page read and write
22A27080000
trusted library allocation
page read and write
22A25E84000
trusted library allocation
page read and write
22A1DEBF000
trusted library allocation
page read and write
22A1D5A5000
trusted library allocation
page read and write
212CA700000
trusted library allocation
page read and write
22A259F0000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A270FA000
trusted library allocation
page read and write
22A21153000
trusted library allocation
page read and write
212CA51A000
trusted library allocation
page read and write
22903140000
unkown
page execute read
22A25926000
trusted library allocation
page read and write
22A274E3000
trusted library allocation
page read and write
22A1D951000
trusted library allocation
page read and write
22A1479A000
heap
page read and write
22A1D988000
trusted library allocation
page read and write
22A20DB0000
trusted library allocation
page read and write
22A260B4000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
CC4000
heap
page read and write
212CAA0C000
trusted library allocation
page read and write
417BEBD000
stack
page read and write
22A2604D000
trusted library allocation
page read and write
22A25E25000
trusted library allocation
page read and write
22A1AA32000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A25FE4000
trusted library allocation
page read and write
22A1F0D1000
trusted library allocation
page read and write
22A201D3000
trusted library allocation
page read and write
22A274BD000
trusted library allocation
page read and write
22A25E7C000
trusted library allocation
page read and write
22903C8A000
heap
page read and write
22A2005B000
trusted library allocation
page read and write
22A1D59E000
trusted library allocation
page read and write
BDB000
stack
page read and write
22A260D0000
trusted library allocation
page read and write
22A27515000
trusted library allocation
page read and write
22A25E34000
trusted library allocation
page read and write
22A1DE99000
trusted library allocation
page read and write
229030F3000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A1EFF9000
trusted library allocation
page read and write
22A20176000
trusted library allocation
page read and write
22A25F1C000
trusted library allocation
page read and write
22A1CD39000
trusted library allocation
page read and write
22A274F7000
trusted library allocation
page read and write
817427E000
unkown
page readonly
1B13D3C0000
heap
page read and write
22A25E28000
trusted library allocation
page read and write
22A1DE65000
trusted library allocation
page read and write
22A2588B000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A1474E000
heap
page read and write
22A1E823000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A1F6CD000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A1A8E8000
trusted library allocation
page read and write
212CA50C000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A26090000
trusted library allocation
page read and write
22A1F6BA000
trusted library allocation
page read and write
CC0000
heap
page read and write
1B13D550000
unclassified section
page readonly
22A14732000
heap
page read and write
22A1D47E000
trusted library allocation
page read and write
22903D21000
heap
page read and write
22A1F6E0000
trusted library allocation
page read and write
22A201F5000
trusted library allocation
page read and write
22A268CE000
trusted library allocation
page read and write
22A26070000
trusted library allocation
page read and write
22A1D698000
trusted library allocation
page read and write
22A260CC000
trusted library allocation
page read and write
22A259E6000
trusted library allocation
page read and write
3821000
heap
page read and write
22A274D6000
trusted library allocation
page read and write
22A1D979000
trusted library allocation
page read and write
22A26057000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A26070000
trusted library allocation
page read and write
22A270F6000
trusted library allocation
page read and write
22A1DE89000
trusted library allocation
page read and write
22A1F2BF000
trusted library allocation
page read and write
22A1CD39000
trusted library allocation
page read and write
22A21196000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A2603F000
trusted library allocation
page read and write
22A1474B000
heap
page read and write
22A1EB70000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1D6C4000
trusted library allocation
page read and write
22A274B3000
trusted library allocation
page read and write
22A1F198000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A25EEA000
trusted library allocation
page read and write
22A1EBA6000
trusted library allocation
page read and write
22A274C7000
trusted library allocation
page read and write
22A1FBE8000
trusted library allocation
page read and write
22A25940000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A25ED0000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A260A0000
trusted library allocation
page read and write
CC4000
heap
page read and write
22A14732000
heap
page read and write
22A1D0DF000
heap
page read and write
22903C9C000
heap
page read and write
22A1E844000
trusted library allocation
page read and write
22A274D4000
trusted library allocation
page read and write
22A274F4000
trusted library allocation
page read and write
22A1D675000
trusted library allocation
page read and write
3821000
heap
page read and write
22A2604B000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A14740000
heap
page read and write
1B13D240000
unclassified section
page readonly
22A1DDCF000
trusted library allocation
page read and write
22A14735000
heap
page read and write
22A1A833000
trusted library allocation
page read and write
22A1FDCE000
trusted library allocation
page read and write
22A2684E000
trusted library allocation
page read and write
F34000
unkown
page readonly
22A1A835000
trusted library allocation
page read and write
22A2579D000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A1A8E4000
trusted library allocation
page read and write
22A26069000
trusted library allocation
page read and write
22A1474F000
heap
page read and write
22A1472E000
heap
page read and write
22A1F6DC000
trusted library allocation
page read and write
22A276D8000
trusted library allocation
page read and write
22A260A0000
trusted library allocation
page read and write
22A27745000
trusted library allocation
page read and write
22A1D0E3000
heap
page read and write
22A147A5000
heap
page read and write
22A26036000
trusted library allocation
page read and write
1DD0000
heap
page read and write
22A1F9D8000
trusted library allocation
page read and write
22A1DEE0000
trusted library allocation
page read and write
22A1D6C4000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A1DD66000
trusted library allocation
page read and write
22A27459000
trusted library allocation
page read and write
22A2766B000
trusted library allocation
page read and write
22A190C1000
trusted library allocation
page read and write
22A259A2000
trusted library allocation
page read and write
22A270D1000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A1DEC4000
trusted library allocation
page read and write
22A1DE99000
trusted library allocation
page read and write
22A1E7FA000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A1DEAE000
trusted library allocation
page read and write
22A260D4000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A257A2000
trusted library allocation
page read and write
22A19726000
trusted library allocation
page read and write
22A14755000
heap
page read and write
212CA630000
heap
page read and write
22A1D0D5000
heap
page read and write
22A1F186000
trusted library allocation
page read and write
22A25930000
trusted library allocation
page read and write
22A19717000
trusted library allocation
page read and write
22A14738000
heap
page read and write
22A1EB9D000
trusted library allocation
page read and write
22A1D474000
trusted library allocation
page read and write
22A274F7000
trusted library allocation
page read and write
22A1A9EB000
trusted library allocation
page read and write
22A274FE000
trusted library allocation
page read and write
22A1D577000
trusted library allocation
page read and write
22903500000
trusted library allocation
page read and write
22A2609E000
trusted library allocation
page read and write
22A25791000
trusted library allocation
page read and write
22A1DECD000
trusted library allocation
page read and write
22903D2D000
heap
page read and write
B7A83FF000
stack
page read and write
22903D6B000
heap
page read and write
22A27EFE000
trusted library allocation
page read and write
22A2578D000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A25E18000
trusted library allocation
page read and write
22A26051000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A21196000
trusted library allocation
page read and write
22A1F6CD000
trusted library allocation
page read and write
22A274A2000
trusted library allocation
page read and write
22A1474C000
heap
page read and write
22A211E9000
trusted library allocation
page read and write
22A203C2000
trusted library allocation
page read and write
22A1EBC8000
trusted library allocation
page read and write
22A25E15000
trusted library allocation
page read and write
22A260B5000
trusted library allocation
page read and write
22A260AD000
trusted library allocation
page read and write
22A1CE5F000
trusted library allocation
page read and write
22A1A633000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1FDAF000
trusted library allocation
page read and write
22A211FB000
trusted library allocation
page read and write
22A1D5A5000
trusted library allocation
page read and write
22A1EBA3000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A270FA000
trusted library allocation
page read and write
22A2766D000
trusted library allocation
page read and write
22A14799000
heap
page read and write
22A14720000
heap
page read and write
22A1FE80000
trusted library allocation
page read and write
22A27067000
trusted library allocation
page read and write
22A258CB000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A274E8000
trusted library allocation
page read and write
22A25CF8000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1DEAA000
trusted library allocation
page read and write
22A257F3000
trusted library allocation
page read and write
22A1D0E3000
heap
page read and write
22903048000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A1474E000
heap
page read and write
22A1E6A5000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A2589F000
trusted library allocation
page read and write
22A222C2000
trusted library allocation
page read and write
22A0F671000
heap
page read and write
22A274F1000
trusted library allocation
page read and write
22A1DE75000
trusted library allocation
page read and write
22A20D5D000
trusted library allocation
page read and write
22A1F6D1000
trusted library allocation
page read and write
22A1F6C7000
trusted library allocation
page read and write
22A25DE8000
trusted library allocation
page read and write
B7A9BFE000
stack
page read and write
22A1F6F2000
trusted library allocation
page read and write
8E0EEBE000
unkown
page readonly
22A25F27000
trusted library allocation
page read and write
22A1D45E000
trusted library allocation
page read and write
22A274C7000
trusted library allocation
page read and write
22A1472E000
heap
page read and write
22A260D4000
trusted library allocation
page read and write
22A211F1000
trusted library allocation
page read and write
22A1EBC8000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A14730000
heap
page read and write
22A1DDFE000
trusted library allocation
page read and write
22A2601E000
trusted library allocation
page read and write
81729D8000
stack
page read and write
22A26096000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1DE53000
trusted library allocation
page read and write
22A147A5000
heap
page read and write
22A1474E000
heap
page read and write
2290306F000
trusted library allocation
page read and write
26957907000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A26062000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A1E7ED000
trusted library allocation
page read and write
22A274BB000
trusted library allocation
page read and write
F22000
unkown
page readonly
22A201FB000
trusted library allocation
page read and write
22A1FBB4000
trusted library allocation
page read and write
22A1A93D000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A14732000
heap
page read and write
22A25940000
trusted library allocation
page read and write
22A274CA000
trusted library allocation
page read and write
22A25F16000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1D0D5000
heap
page read and write
22A2707A000
trusted library allocation
page read and write
22A25FEC000
trusted library allocation
page read and write
22A20D7B000
trusted library allocation
page read and write
22A1F0FC000
trusted library allocation
page read and write
E60000
unkown
page readonly
22A260B1000
trusted library allocation
page read and write
22A1EBA3000
trusted library allocation
page read and write
22903D77000
heap
page read and write
22A1E7B2000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1471A000
heap
page read and write
22A1473E000
heap
page read and write
22A1F4E2000
trusted library allocation
page read and write
22A276AA000
trusted library allocation
page read and write
22A25913000
trusted library allocation
page read and write
22A1FBE0000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A27091000
trusted library allocation
page read and write
22A25E28000
trusted library allocation
page read and write
22903D44000
heap
page read and write
22A14720000
heap
page read and write
22A1474F000
heap
page read and write
22A1A944000
trusted library allocation
page read and write
22A1FC98000
trusted library allocation
page read and write
22A25716000
trusted library allocation
page read and write
22A1F270000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
1B13D520000
unclassified section
page read and write
22A2032D000
trusted library allocation
page read and write
22A276AF000
trusted library allocation
page read and write
22A1FA6C000
trusted library allocation
page read and write
22A1473B000
heap
page read and write
22A26070000
trusted library allocation
page read and write
22A1DE53000
trusted library allocation
page read and write
22A22300000
trusted library allocation
page read and write
22A20D7E000
trusted library allocation
page read and write
22A26E00000
trusted library allocation
page read and write
22A26036000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A2584F000
trusted library allocation
page read and write
22903CE0000
heap
page read and write
22A1473E000
heap
page read and write
22A1D957000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A1FDAC000
trusted library allocation
page read and write
22A1E762000
trusted library allocation
page read and write
1A717840000
heap
page read and write
22A21F84000
trusted library allocation
page read and write
22A26027000
trusted library allocation
page read and write
22A274C4000
trusted library allocation
page read and write
22A1CE09000
trusted library allocation
page read and write
22A1D0E3000
heap
page read and write
22A1DE4B000
trusted library allocation
page read and write
22A1E7FA000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22902DAF000
unclassified section
page read and write
22A25ED8000
trusted library allocation
page read and write
22A27599000
trusted library allocation
page read and write
22A1FC64000
trusted library allocation
page read and write
22A1F2BB000
trusted library allocation
page read and write
22A270EA000
trusted library allocation
page read and write
22A263C4000
trusted library allocation
page read and write
22A274DC000
trusted library allocation
page read and write
22A21F82000
trusted library allocation
page read and write
22A20DDC000
trusted library allocation
page read and write
22A1D5CE000
trusted library allocation
page read and write
22A190B3000
trusted library allocation
page read and write
22A21FC4000
trusted library allocation
page read and write
22A1EB9B000
trusted library allocation
page read and write
22A281AC000
trusted library allocation
page read and write
22A14757000
heap
page read and write
22A20D97000
trusted library allocation
page read and write
22A274F4000
trusted library allocation
page read and write
22A274C4000
trusted library allocation
page read and write
22A25F90000
trusted library allocation
page read and write
22A260CC000
trusted library allocation
page read and write
22A1F241000
trusted library allocation
page read and write
22A25CAB000
trusted library allocation
page read and write
22A211FD000
trusted library allocation
page read and write
22A14752000
heap
page read and write
22A2760A000
trusted library allocation
page read and write
22A270DC000
trusted library allocation
page read and write
22A1F95C000
trusted library allocation
page read and write
22A274C8000
trusted library allocation
page read and write
22A201A2000
trusted library allocation
page read and write
22A1473F000
heap
page read and write
22A202ED000
trusted library allocation
page read and write
22A2603F000
trusted library allocation
page read and write
22A25F1C000
trusted library allocation
page read and write
22A211F1000
trusted library allocation
page read and write
22A20314000
trusted library allocation
page read and write
22A1A84B000
trusted library allocation
page read and write
22A1D555000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A2594C000
trusted library allocation
page read and write
22A1FDD1000
trusted library allocation
page read and write
22A274E1000
trusted library allocation
page read and write
22A25E22000
trusted library allocation
page read and write
22A1F1FA000
trusted library allocation
page read and write
22A20EB0000
trusted library allocation
page read and write
22A26062000
trusted library allocation
page read and write
22A26090000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A274E6000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1EB70000
trusted library allocation
page read and write
22A1D6B3000
trusted library allocation
page read and write
22A14751000
heap
page read and write
22A1DE85000
trusted library allocation
page read and write
22A277F0000
trusted library allocation
page read and write
22A25DE8000
trusted library allocation
page read and write
81762FE000
unkown
page readonly
22A1D93D000
trusted library allocation
page read and write
212CA331000
remote allocation
page execute read
22A14732000
heap
page read and write
22A1D465000
trusted library allocation
page read and write
22A25855000
trusted library allocation
page read and write
22A27640000
trusted library allocation
page read and write
22A1D447000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22903C8A000
heap
page read and write
22A21F14000
trusted library allocation
page read and write
22A25DE0000
trusted library allocation
page read and write
22A14724000
heap
page read and write
22A14728000
heap
page read and write
22A1FCC8000
trusted library allocation
page read and write
22A27683000
trusted library allocation
page read and write
22A274FE000
trusted library allocation
page read and write
22A1DDF2000
trusted library allocation
page read and write
22A274DC000
trusted library allocation
page read and write
22A201AE000
trusted library allocation
page read and write
22A259EC000
trusted library allocation
page read and write
22A260B1000
trusted library allocation
page read and write
22A1472D000
heap
page read and write
22A14739000
heap
page read and write
105E000
heap
page read and write
22A14745000
heap
page read and write
22A1473E000
heap
page read and write
22A25793000
trusted library allocation
page read and write
22A27674000
trusted library allocation
page read and write
22A1D6AF000
trusted library allocation
page read and write
22A1CD60000
trusted library allocation
page read and write
22A19719000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A2113D000
trusted library allocation
page read and write
22A1DEEE000
trusted library allocation
page read and write
22A14740000
heap
page read and write
22A274FE000
trusted library allocation
page read and write
22A274F1000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A27663000
trusted library allocation
page read and write
22A25DA4000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22903130000
trusted library allocation
page read and write
22A1EB9D000
trusted library allocation
page read and write
22A25F29000
trusted library allocation
page read and write
22A260AD000
trusted library allocation
page read and write
22A25860000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A1CECF000
trusted library allocation
page read and write
212CA586000
trusted library allocation
page read and write
22A274F3000
trusted library allocation
page read and write
22A270F6000
trusted library allocation
page read and write
22A1EB46000
trusted library allocation
page read and write
417FAFE000
stack
page read and write
22A14739000
heap
page read and write
22A274B3000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A26024000
trusted library allocation
page read and write
22A211FB000
trusted library allocation
page read and write
22A25EDA000
trusted library allocation
page read and write
22A2606C000
trusted library allocation
page read and write
22A25F6D000
trusted library allocation
page read and write
22A270BF000
trusted library allocation
page read and write
22A270FE000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A1D0D4000
heap
page read and write
22A203EB000
trusted library allocation
page read and write
22A1473D000
heap
page read and write
22A25829000
trusted library allocation
page read and write
22903C5C000
heap
page read and write
22A1CD2B000
trusted library allocation
page read and write
22903C4D000
heap
page read and write
22A14722000
heap
page read and write
22A1DE4B000
trusted library allocation
page read and write
22A1E81B000
trusted library allocation
page read and write
22A28148000
trusted library allocation
page read and write
22A1472A000
heap
page read and write
2290302F000
trusted library allocation
page read and write
22A25E9B000
trusted library allocation
page read and write
22A270E7000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A274DC000
trusted library allocation
page read and write
22903C64000
heap
page read and write
22A14720000
heap
page read and write
22A14728000
heap
page read and write
22A259BF000
trusted library allocation
page read and write
22A14731000
heap
page read and write
22A26004000
trusted library allocation
page read and write
22A202EF000
trusted library allocation
page read and write
22A1D086000
heap
page read and write
22A25E8B000
trusted library allocation
page read and write
22A274C7000
trusted library allocation
page read and write
22A1DEDA000
trusted library allocation
page read and write
22A25ED2000
trusted library allocation
page read and write
22A14753000
heap
page read and write
22A27088000
trusted library allocation
page read and write
22A1FDE6000
trusted library allocation
page read and write
22A25867000
trusted library allocation
page read and write
22A2603F000
trusted library allocation
page read and write
22A274F1000
trusted library allocation
page read and write
22A1A8F8000
trusted library allocation
page read and write
22A1EBA3000
trusted library allocation
page read and write
22A1F10E000
trusted library allocation
page read and write
22A1DEBF000
trusted library allocation
page read and write
22A196FE000
trusted library allocation
page read and write
22A2746C000
trusted library allocation
page read and write
22A1E8CF000
trusted library allocation
page read and write
22A1EB96000
trusted library allocation
page read and write
22A274D8000
trusted library allocation
page read and write
22A1EB73000
trusted library allocation
page read and write
22A2594C000
trusted library allocation
page read and write
22A14731000
heap
page read and write
22A222A3000
trusted library allocation
page read and write
22A1D6CE000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A25F81000
trusted library allocation
page read and write
22A1DE53000
trusted library allocation
page read and write
22A14738000
heap
page read and write
22A27480000
trusted library allocation
page read and write
22A25F2B000
trusted library allocation
page read and write
22A1F6DE000
trusted library allocation
page read and write
22A25F71000
trusted library allocation
page read and write
22A268CE000
trusted library allocation
page read and write
22A2807B000
trusted library allocation
page read and write
22903D77000
heap
page read and write
212CA2C0000
unclassified section
page readonly
22A2113D000
trusted library allocation
page read and write
22A25921000
trusted library allocation
page read and write
22A25F38000
trusted library allocation
page read and write
22A200F2000
trusted library allocation
page read and write
22A25ED0000
trusted library allocation
page read and write
22A260AD000
trusted library allocation
page read and write
22A1474B000
heap
page read and write
22A270FE000
trusted library allocation
page read and write
22A25927000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1D9FA000
trusted library allocation
page read and write
22A21153000
trusted library allocation
page read and write
22A1CD4D000
trusted library allocation
page read and write
22A2744E000
trusted library allocation
page read and write
22A1D491000
trusted library allocation
page read and write
22A2112D000
trusted library allocation
page read and write
22A1A693000
trusted library allocation
page read and write
22A25ED4000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1E7D3000
trusted library allocation
page read and write
22A28E7C000
heap
page read and write
22A26036000
trusted library allocation
page read and write
22A14729000
heap
page read and write
22A25940000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A14745000
heap
page read and write
22A1E8FC000
trusted library allocation
page read and write
22A26090000
trusted library allocation
page read and write
22A1FDCB000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A1D698000
trusted library allocation
page read and write
22A25E0B000
trusted library allocation
page read and write
22A26055000
trusted library allocation
page read and write
22A270FE000
trusted library allocation
page read and write
22A2113A000
trusted library allocation
page read and write
22A2706A000
trusted library allocation
page read and write
22A1E8FC000
trusted library allocation
page read and write
22A1F6E3000
trusted library allocation
page read and write
22A1DEA5000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A260B1000
trusted library allocation
page read and write
22A260CC000
trusted library allocation
page read and write
22A274BB000
trusted library allocation
page read and write
22A1A8EF000
trusted library allocation
page read and write
22A25ECC000
trusted library allocation
page read and write
22A1479D000
heap
page read and write
22A27EFE000
trusted library allocation
page read and write
22A20368000
trusted library allocation
page read and write
22A1F6E0000
trusted library allocation
page read and write
129F94C24000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A14748000
heap
page read and write
22A14721000
heap
page read and write
22A259EC000
trusted library allocation
page read and write
22903CE3000
heap
page read and write
106E000
heap
page read and write
22A1DE69000
trusted library allocation
page read and write
22A22402000
trusted library allocation
page read and write
22A201C6000
trusted library allocation
page read and write
1B13D239000
remote allocation
page execute read
22A25FD1000
trusted library allocation
page read and write
22A1EB96000
trusted library allocation
page read and write
22A1D0DD000
heap
page read and write
22A1E7E2000
trusted library allocation
page read and write
22A1DECE000
trusted library allocation
page read and write
22A1D5A5000
trusted library allocation
page read and write
229030F0000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A1E8D4000
trusted library allocation
page read and write
22A25F5D000
trusted library allocation
page read and write
22A21F14000
trusted library allocation
page read and write
22903C5C000
heap
page read and write
22A1FB1A000
trusted library allocation
page read and write
22A26350000
trusted library allocation
page read and write
22A1DDFD000
trusted library allocation
page read and write
22A1EA07000
trusted library allocation
page read and write
22A274A2000
trusted library allocation
page read and write
F22000
unkown
page readonly
22A27067000
trusted library allocation
page read and write
22A25E49000
trusted library allocation
page read and write
22A26033000
trusted library allocation
page read and write
22A1E755000
trusted library allocation
page read and write
22A1EB43000
trusted library allocation
page read and write
22A1D5CE000
trusted library allocation
page read and write
22A1CDD5000
trusted library allocation
page read and write
1A717B0A000
trusted library allocation
page read and write
22A1909E000
trusted library allocation
page read and write
22A276AF000
trusted library allocation
page read and write
22A1D04F000
heap
page read and write
22A2741F000
trusted library allocation
page read and write
22A1DDFA000
trusted library allocation
page read and write
22A260A4000
trusted library allocation
page read and write
1B13D522000
unclassified section
page read and write
417F23E000
stack
page read and write
22A1D6BA000
trusted library allocation
page read and write
22A27640000
trusted library allocation
page read and write
22A1FCF4000
trusted library allocation
page read and write
2695770A000
heap
page read and write
22902DA0000
unclassified section
page read and write
22A1FDDC000
trusted library allocation
page read and write
22A1DE6C000
trusted library allocation
page read and write
22A1D497000
trusted library allocation
page read and write
22A274F7000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A14741000
heap
page read and write
22A274FE000
trusted library allocation
page read and write
22A1F6C7000
trusted library allocation
page read and write
22A1E7A1000
trusted library allocation
page read and write
22903149000
unkown
page execute read
22A274E6000
trusted library allocation
page read and write
22A1F1AE000
trusted library allocation
page read and write
22A26324000
trusted library allocation
page read and write
8E0E5FE000
stack
page read and write
E61000
unkown
page execute read
22A14720000
heap
page read and write
22A14745000
heap
page read and write
22A26AAE000
trusted library allocation
page read and write
22A2746E000
trusted library allocation
page read and write
22A260A0000
trusted library allocation
page read and write
22A257C6000
trusted library allocation
page read and write
22903CE6000
heap
page read and write
22A25E07000
trusted library allocation
page read and write
22903144000
unkown
page execute read
22A2814D000
trusted library allocation
page read and write
22A1D6D8000
trusted library allocation
page read and write
22A274D4000
trusted library allocation
page read and write
22A1F6A8000
trusted library allocation
page read and write
22A1FC57000
trusted library allocation
page read and write
22A28143000
trusted library allocation
page read and write
22A1D463000
trusted library allocation
page read and write
22A2609D000
trusted library allocation
page read and write
22A25E7A000
trusted library allocation
page read and write
22A20DDC000
trusted library allocation
page read and write
269592AC000
heap
page read and write
22A27504000
trusted library allocation
page read and write
22A1DE9B000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
417F1FE000
unkown
page readonly
1B13D510000
heap
page readonly
22A14798000
heap
page read and write
22A211FB000
trusted library allocation
page read and write
22A276D1000
trusted library allocation
page read and write
22A1F190000
trusted library allocation
page read and write
22A2766D000
trusted library allocation
page read and write
26957800000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22903014000
trusted library allocation
page read and write
22903CFD000
heap
page read and write
22A14798000
heap
page read and write
22A274BB000
trusted library allocation
page read and write
22A25F17000
trusted library allocation
page read and write
22A1DD05000
trusted library allocation
page read and write
22A20DD3000
trusted library allocation
page read and write
22A1D685000
trusted library allocation
page read and write
22A1CDAB000
trusted library allocation
page read and write
22A147A4000
heap
page read and write
22A14745000
heap
page read and write
22A1EB70000
trusted library allocation
page read and write
22A25FA4000
trusted library allocation
page read and write
22A26359000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A14748000
heap
page read and write
22A147B1000
heap
page read and write
22A25ED2000
trusted library allocation
page read and write
22903C5C000
heap
page read and write
22A1D47B000
trusted library allocation
page read and write
22903D77000
heap
page read and write
22A270D1000
trusted library allocation
page read and write
22A25F81000
trusted library allocation
page read and write
22A201E8000
trusted library allocation
page read and write
22A25F2E000
trusted library allocation
page read and write
22A25ED0000
trusted library allocation
page read and write
22A1FAF2000
trusted library allocation
page read and write
22A1AA23000
trusted library allocation
page read and write
22A1D5CE000
trusted library allocation
page read and write
22A190DE000
trusted library allocation
page read and write
22A1D6C9000
trusted library allocation
page read and write
22A1D64C000
trusted library allocation
page read and write
22A274BB000
trusted library allocation
page read and write
22A1DEDA000
trusted library allocation
page read and write
22A2604D000
trusted library allocation
page read and write
22A200BD000
trusted library allocation
page read and write
22A1F6CD000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A25FDE000
trusted library allocation
page read and write
22A1FAC0000
trusted library allocation
page read and write
22A1FBE0000
trusted library allocation
page read and write
22A147A9000
heap
page read and write
22A1DEA5000
trusted library allocation
page read and write
22903CE8000
heap
page read and write
22A26057000
trusted library allocation
page read and write
22A22283000
trusted library allocation
page read and write
22A1DECD000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A27485000
trusted library allocation
page read and write
22A1FE00000
trusted library allocation
page read and write
22A25E41000
trusted library allocation
page read and write
22903720000
heap
page read and write
22A1FB69000
trusted library allocation
page read and write
22A26060000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22903150000
heap
page read and write
22A1477C000
heap
page read and write
22A20D87000
trusted library allocation
page read and write
22A14739000
heap
page read and write
26957900000
trusted library allocation
page read and write
22A28105000
trusted library allocation
page read and write
434FBFF000
stack
page read and write
22A14745000
heap
page read and write
22A1473E000
heap
page read and write
22A1D63D000
trusted library allocation
page read and write
22A26900000
trusted library allocation
page read and write
22A1D0DD000
heap
page read and write
22A14732000
heap
page read and write
22A1D4AF000
trusted library allocation
page read and write
22A1CDAB000
trusted library allocation
page read and write
22A2746A000
trusted library allocation
page read and write
22A1D67E000
trusted library allocation
page read and write
22A2578D000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A21F97000
trusted library allocation
page read and write
22A26007000
trusted library allocation
page read and write
22A270B8000
trusted library allocation
page read and write
22A1EB88000
trusted library allocation
page read and write
22A201F3000
trusted library allocation
page read and write
22A25ED8000
trusted library allocation
page read and write
1A717B07000
trusted library allocation
page read and write
22A274A2000
trusted library allocation
page read and write
22A14739000
heap
page read and write
1B13D71E000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A147A5000
heap
page read and write
22A258FE000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1F6A7000
trusted library allocation
page read and write
22A27EEF000
trusted library allocation
page read and write
22A21163000
trusted library allocation
page read and write
22A2743E000
trusted library allocation
page read and write
22A274F1000
trusted library allocation
page read and write
22A14729000
heap
page read and write
22A25ECC000
trusted library allocation
page read and write
22A27466000
trusted library allocation
page read and write
22A1473F000
heap
page read and write
22A25F24000
trusted library allocation
page read and write
22A1D5A5000
trusted library allocation
page read and write
22A260A8000
trusted library allocation
page read and write
1B13D672000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A2807F000
trusted library allocation
page read and write
22A20389000
trusted library allocation
page read and write
22A259F0000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A1DE99000
trusted library allocation
page read and write
212CA47A000
heap
page read and write
22A1D51F000
trusted library allocation
page read and write
22A1DEE9000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A1D0D5000
heap
page read and write
22A14749000
heap
page read and write
22A1474E000
heap
page read and write
22A1FDB5000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A1DEEE000
trusted library allocation
page read and write
22A27426000
trusted library allocation
page read and write
22A275F2000
trusted library allocation
page read and write
22A211DF000
trusted library allocation
page read and write
1059000
heap
page read and write
22A27426000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A147A0000
heap
page read and write
22A1DE65000
trusted library allocation
page read and write
22A25E9B000
trusted library allocation
page read and write
22A25E8B000
trusted library allocation
page read and write
22A26070000
trusted library allocation
page read and write
22903CEE000
heap
page read and write
22A2750E000
trusted library allocation
page read and write
22A1E77C000
trusted library allocation
page read and write
22903C09000
heap
page read and write
22A25DDF000
trusted library allocation
page read and write
22A14746000
heap
page read and write
2290309E000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1EBBB000
trusted library allocation
page read and write
22A25CF8000
trusted library allocation
page read and write
22A2039B000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A2744A000
trusted library allocation
page read and write
22A14752000
heap
page read and write
22A1DE8D000
trusted library allocation
page read and write
22A260B5000
trusted library allocation
page read and write
22A274D8000
trusted library allocation
page read and write
22A1D9C8000
trusted library allocation
page read and write
22A25ECE000
trusted library allocation
page read and write
22A1EB90000
trusted library allocation
page read and write
22A1DE76000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A260A4000
trusted library allocation
page read and write
22A1D6D0000
trusted library allocation
page read and write
22A1A949000
trusted library allocation
page read and write
22A274CA000
trusted library allocation
page read and write
CC4000
heap
page read and write
8E0D5D8000
stack
page read and write
22A1479A000
heap
page read and write
22A2749E000
trusted library allocation
page read and write
22A26060000
trusted library allocation
page read and write
22A1DEF4000
trusted library allocation
page read and write
22A1E7FA000
trusted library allocation
page read and write
22A260D3000
trusted library allocation
page read and write
22A274F3000
trusted library allocation
page read and write
22A25793000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A260D3000
trusted library allocation
page read and write
22A260A0000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A211E9000
trusted library allocation
page read and write
22A1FBDC000
trusted library allocation
page read and write
1B13D65B000
trusted library allocation
page read and write
CC4000
heap
page read and write
22A1F6BA000
trusted library allocation
page read and write
8E10EBE000
unkown
page readonly
22903000000
trusted library allocation
page read and write
212CA579000
trusted library allocation
page read and write
22A14731000
heap
page read and write
26957722000
heap
page read and write
22A274D6000
trusted library allocation
page read and write
22A1E762000
trusted library allocation
page read and write
22A26033000
trusted library allocation
page read and write
22A1479F000
heap
page read and write
22A1D9C5000
trusted library allocation
page read and write
22A1EBA3000
trusted library allocation
page read and write
22A1F1B6000
trusted library allocation
page read and write
22A1D68F000
trusted library allocation
page read and write
22A2115F000
trusted library allocation
page read and write
22A274A8000
trusted library allocation
page read and write
22A1971B000
trusted library allocation
page read and write
106E000
heap
page read and write
1B13D610000
trusted library allocation
page read and write
22A274C4000
trusted library allocation
page read and write
22A259BD000
trusted library allocation
page read and write
22A1F0AA000
trusted library allocation
page read and write
22A2637A000
trusted library allocation
page read and write
22A1F6CD000
trusted library allocation
page read and write
22A277F9000
trusted library allocation
page read and write
22A259D0000
trusted library allocation
page read and write
1C2F000
stack
page read and write
1B13D683000
trusted library allocation
page read and write
22A270B6000
trusted library allocation
page read and write
22A1479F000
heap
page read and write
22A25ED6000
trusted library allocation
page read and write
22A2119E000
trusted library allocation
page read and write
22A260AD000
trusted library allocation
page read and write
22A270D1000
trusted library allocation
page read and write
22A2113A000
trusted library allocation
page read and write
22A1FACD000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A2599C000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A25FAA000
trusted library allocation
page read and write
22A260C8000
trusted library allocation
page read and write
22A27442000
trusted library allocation
page read and write
22A268F1000
trusted library allocation
page read and write
22903C60000
heap
page read and write
22A260B4000
trusted library allocation
page read and write
22A25E55000
trusted library allocation
page read and write
22A26018000
trusted library allocation
page read and write
22A1D9CE000
trusted library allocation
page read and write
22A260A0000
trusted library allocation
page read and write
22A27642000
trusted library allocation
page read and write
22A276D0000
trusted library allocation
page read and write
22A27640000
trusted library allocation
page read and write
22A2585D000
trusted library allocation
page read and write
22A26062000
trusted library allocation
page read and write
22A1472A000
heap
page read and write
22A274D8000
trusted library allocation
page read and write
22A14719000
heap
page read and write
22903C7F000
heap
page read and write
22A2603F000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A2774C000
trusted library allocation
page read and write
22A26096000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A27488000
trusted library allocation
page read and write
22A21FCD000
trusted library allocation
page read and write
22A2768E000
trusted library allocation
page read and write
22A270FE000
trusted library allocation
page read and write
22A14715000
heap
page read and write
22A1CD0B000
trusted library allocation
page read and write
22A14720000
heap
page read and write
212CA640000
heap
page read and write
22A260C8000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A259BF000
trusted library allocation
page read and write
22A1479A000
heap
page read and write
22A2019A000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A210FD000
trusted library allocation
page read and write
22A27087000
trusted library allocation
page read and write
22A27026000
trusted library allocation
page read and write
22A1F148000
trusted library allocation
page read and write
22A1977D000
trusted library allocation
page read and write
22A1D07D000
heap
page read and write
22A21F75000
trusted library allocation
page read and write
22A270C8000
trusted library allocation
page read and write
22A1F6BA000
trusted library allocation
page read and write
22A259D0000
trusted library allocation
page read and write
22A211E9000
trusted library allocation
page read and write
26957AF0000
heap
page read and write
22A26100000
trusted library allocation
page read and write
22A21FCD000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1477C000
heap
page read and write
22A277EB000
trusted library allocation
page read and write
22A1962F000
trusted library allocation
page read and write
22A1E7FA000
trusted library allocation
page read and write
22A274E3000
trusted library allocation
page read and write
22A1F6C6000
trusted library allocation
page read and write
22A211FD000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A1DE9F000
trusted library allocation
page read and write
22A1474C000
heap
page read and write
212CA5AD000
trusted library allocation
page read and write
22903D00000
heap
page read and write
22A1D445000
trusted library allocation
page read and write
22A25F95000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A1DEF4000
trusted library allocation
page read and write
CB0000
heap
page read and write
22A27411000
trusted library allocation
page read and write
22A26090000
trusted library allocation
page read and write
22A1E7A2000
trusted library allocation
page read and write
22A1DE2D000
trusted library allocation
page read and write
22A1E764000
trusted library allocation
page read and write
8171F8D000
stack
page read and write
22A25F46000
trusted library allocation
page read and write
22A27485000
trusted library allocation
page read and write
22A1F6F2000
trusted library allocation
page read and write
22A1E81B000
trusted library allocation
page read and write
22A1F695000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A2603F000
trusted library allocation
page read and write
22A274C7000
trusted library allocation
page read and write
22A25F95000
trusted library allocation
page read and write
22A1A8E8000
trusted library allocation
page read and write
22A1D4F6000
trusted library allocation
page read and write
22A21FD8000
trusted library allocation
page read and write
22A1E7FE000
trusted library allocation
page read and write
22903D79000
heap
page read and write
22A27480000
trusted library allocation
page read and write
22A20DF9000
trusted library allocation
page read and write
22A274D4000
trusted library allocation
page read and write
22A20130000
trusted library allocation
page read and write
22A25DF1000
trusted library allocation
page read and write
22A1D6DF000
trusted library allocation
page read and write
8E0F6BE000
stack
page read and write
22A1D6BC000
trusted library allocation
page read and write
22A274B3000
trusted library allocation
page read and write
22A26368000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A2018A000
trusted library allocation
page read and write
22A1D68A000
trusted library allocation
page read and write
22A21F5A000
trusted library allocation
page read and write
22A2761B000
trusted library allocation
page read and write
417E1FE000
unkown
page readonly
22A2746E000
trusted library allocation
page read and write
CC4000
heap
page read and write
22A14726000
heap
page read and write
22A1DEF4000
trusted library allocation
page read and write
22A25F90000
trusted library allocation
page read and write
22A2580D000
trusted library allocation
page read and write
22A1CE5D000
trusted library allocation
page read and write
22A27028000
trusted library allocation
page read and write
22A25873000
trusted library allocation
page read and write
22A26090000
trusted library allocation
page read and write
22A1A835000
trusted library allocation
page read and write
22A26055000
trusted library allocation
page read and write
22A1DEAE000
trusted library allocation
page read and write
22A2742B000
trusted library allocation
page read and write
22A270E7000
trusted library allocation
page read and write
22A25F92000
trusted library allocation
page read and write
22A1F689000
trusted library allocation
page read and write
22A1E767000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A26AAC000
trusted library allocation
page read and write
1B13D260000
heap
page read and write
22A1475A000
heap
page read and write
22A21FE6000
trusted library allocation
page read and write
22A2606C000
trusted library allocation
page read and write
22A1FA55000
trusted library allocation
page read and write
22A14751000
heap
page read and write
1038000
heap
page read and write
22A2005B000
trusted library allocation
page read and write
105D000
heap
page read and write
1B13D65D000
trusted library allocation
page read and write
22A25FE1000
trusted library allocation
page read and write
22A2810C000
trusted library allocation
page read and write
22A14708000
heap
page read and write
22A1A931000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A14737000
heap
page read and write
105B000
heap
page read and write
22A1CDFE000
trusted library allocation
page read and write
22A25F58000
trusted library allocation
page read and write
22A28EE1000
heap
page read and write
22A260A8000
trusted library allocation
page read and write
22A25EEA000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1F6DC000
trusted library allocation
page read and write
1B13D800000
heap
page read and write
22A1474E000
heap
page read and write
22A27088000
trusted library allocation
page read and write
22A276F7000
trusted library allocation
page read and write
22A211EB000
trusted library allocation
page read and write
22A1D58E000
trusted library allocation
page read and write
22A27449000
trusted library allocation
page read and write
22A222AA000
trusted library allocation
page read and write
22A2689E000
trusted library allocation
page read and write
BCE000
stack
page read and write
22A201EA000
trusted library allocation
page read and write
22A1DE6C000
trusted library allocation
page read and write
417E9FE000
stack
page read and write
22A274CA000
trusted library allocation
page read and write
22A25ED6000
trusted library allocation
page read and write
22A1F6D7000
trusted library allocation
page read and write
22A1DDB6000
trusted library allocation
page read and write
22A20EA3000
trusted library allocation
page read and write
22A21F95000
trusted library allocation
page read and write
22903D44000
heap
page read and write
22A274DC000
trusted library allocation
page read and write
22A277E3000
trusted library allocation
page read and write
22A260B5000
trusted library allocation
page read and write
22A2604A000
trusted library allocation
page read and write
EFC000
unkown
page readonly
22A1471A000
heap
page read and write
22A274E6000
trusted library allocation
page read and write
22A1D07D000
heap
page read and write
22A25ED4000
trusted library allocation
page read and write
22A276D3000
trusted library allocation
page read and write
22A1F1F6000
trusted library allocation
page read and write
22A274C4000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A2768E000
trusted library allocation
page read and write
22A1D59E000
trusted library allocation
page read and write
22A25DCC000
trusted library allocation
page read and write
22A1DEF7000
trusted library allocation
page read and write
22A27483000
trusted library allocation
page read and write
22A25E50000
trusted library allocation
page read and write
22A1E727000
trusted library allocation
page read and write
22A1FA89000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A211FD000
trusted library allocation
page read and write
22902DFA000
heap
page read and write
22A1DE49000
trusted library allocation
page read and write
22A2822E000
trusted library allocation
page read and write
22A257EA000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A1471C000
heap
page read and write
22A1EB4B000
trusted library allocation
page read and write
8E0CB4E000
stack
page read and write
22A2743A000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A20DB3000
trusted library allocation
page read and write
22A1E7F8000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1DDFD000
trusted library allocation
page read and write
22A2766F000
trusted library allocation
page read and write
22A1F118000
trusted library allocation
page read and write
22A14740000
heap
page read and write
22A1F132000
trusted library allocation
page read and write
22A1D955000
trusted library allocation
page read and write
22A27665000
trusted library allocation
page read and write
22A21FC0000
trusted library allocation
page read and write
22A26011000
trusted library allocation
page read and write
22A1FDC5000
trusted library allocation
page read and write
22A1A839000
trusted library allocation
page read and write
22A25FFB000
trusted library allocation
page read and write
22A25EEA000
trusted library allocation
page read and write
22A259F3000
trusted library allocation
page read and write
22A1E0C5000
trusted library allocation
page read and write
22A1F06C000
trusted library allocation
page read and write
8E0CBCD000
stack
page read and write
22A270F5000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1F66D000
trusted library allocation
page read and write
22A19671000
trusted library allocation
page read and write
22A25E8E000
trusted library allocation
page read and write
1B13D668000
trusted library allocation
page read and write
22A20EAC000
trusted library allocation
page read and write
22A1D9D8000
trusted library allocation
page read and write
22A0F65B000
heap
page read and write
22A1D474000
trusted library allocation
page read and write
22A1DE99000
trusted library allocation
page read and write
22A27672000
trusted library allocation
page read and write
22A1E618000
trusted library allocation
page read and write
22A1EB88000
trusted library allocation
page read and write
22A25F48000
trusted library allocation
page read and write
22A25FDA000
trusted library allocation
page read and write
22A1D452000
trusted library allocation
page read and write
212CA524000
trusted library allocation
page read and write
22903CFD000
heap
page read and write
22A21153000
trusted library allocation
page read and write
22A1DE69000
trusted library allocation
page read and write
22A26050000
trusted library allocation
page read and write
22A2600B000
trusted library allocation
page read and write
22A1DE29000
trusted library allocation
page read and write
22A258A7000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A1F6B2000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22903CB9000
heap
page read and write
CC4000
heap
page read and write
22A1EB88000
trusted library allocation
page read and write
22A25927000
trusted library allocation
page read and write
22A274BB000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A2636B000
trusted library allocation
page read and write
22A260C8000
trusted library allocation
page read and write
22A25E36000
trusted library allocation
page read and write
22A274E6000
trusted library allocation
page read and write
22A25ED2000
trusted library allocation
page read and write
22A147A8000
heap
page read and write
22A1FB69000
trusted library allocation
page read and write
22A27088000
trusted library allocation
page read and write
22A259E6000
trusted library allocation
page read and write
22A1DEEE000
trusted library allocation
page read and write
22A1E7B0000
trusted library allocation
page read and write
22A1A98E000
trusted library allocation
page read and write
22A14729000
heap
page read and write
22A27486000
trusted library allocation
page read and write
22A258E2000
trusted library allocation
page read and write
22A1D955000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A1479F000
heap
page read and write
229030C7000
trusted library allocation
page read and write
212CA2B0000
unclassified section
page readonly
22A1D69F000
trusted library allocation
page read and write
22A1A899000
trusted library allocation
page read and write
22A1CECB000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A25E36000
trusted library allocation
page read and write
22A25ECE000
trusted library allocation
page read and write
22A1F2AA000
trusted library allocation
page read and write
22A25722000
trusted library allocation
page read and write
22A275F2000
trusted library allocation
page read and write
22A274FE000
trusted library allocation
page read and write
22A1E766000
trusted library allocation
page read and write
22A222C2000
trusted library allocation
page read and write
22A260A8000
trusted library allocation
page read and write
22A1F6B6000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A1A8E4000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A22294000
trusted library allocation
page read and write
22A1E766000
trusted library allocation
page read and write
212CA622000
unclassified section
page read and write
22A26035000
trusted library allocation
page read and write
22A1F2E9000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A27480000
trusted library allocation
page read and write
22A25836000
trusted library allocation
page read and write
22A1F0D3000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A200BA000
trusted library allocation
page read and write
22A1FDEF000
trusted library allocation
page read and write
22A1D493000
trusted library allocation
page read and write
1A7179B0000
heap
page read and write
22A14719000
heap
page read and write
22A260C4000
trusted library allocation
page read and write
22A1DD76000
trusted library allocation
page read and write
22A25E84000
trusted library allocation
page read and write
22A1FDD3000
trusted library allocation
page read and write
22A25ED4000
trusted library allocation
page read and write
22A20DB0000
trusted library allocation
page read and write
22A25F92000
trusted library allocation
page read and write
269592AF000
heap
page read and write
22A1E7B2000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A1DDCF000
trusted library allocation
page read and write
22A27EF5000
trusted library allocation
page read and write
22A20DD3000
trusted library allocation
page read and write
22A1D47B000
trusted library allocation
page read and write
22A21FF1000
trusted library allocation
page read and write
22A276A5000
trusted library allocation
page read and write
22A14719000
heap
page read and write
22A1472E000
heap
page read and write
22A26069000
trusted library allocation
page read and write
22A1EBAC000
trusted library allocation
page read and write
22A274C4000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A14721000
heap
page read and write
22A2749E000
trusted library allocation
page read and write
22A1F6CD000
trusted library allocation
page read and write
22A260D3000
trusted library allocation
page read and write
22903CEE000
heap
page read and write
22A1D0F8000
heap
page read and write
CC4000
heap
page read and write
22A20EBC000
trusted library allocation
page read and write
22A2767D000
trusted library allocation
page read and write
22A1E743000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A14748000
heap
page read and write
22A14720000
heap
page read and write
22A1EB96000
trusted library allocation
page read and write
1B13D400000
trusted library allocation
page read and write
22A1F000000
trusted library allocation
page read and write
22A1E769000
trusted library allocation
page read and write
22A1D55A000
trusted library allocation
page read and write
22A14799000
heap
page read and write
22A1A857000
trusted library allocation
page read and write
1B13D732000
trusted library allocation
page read and write
22A25EDA000
trusted library allocation
page read and write
22A20DF9000
trusted library allocation
page read and write
22A257EA000
trusted library allocation
page read and write
22A1473F000
heap
page read and write
22A1A6B1000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A2581D000
trusted library allocation
page read and write
22A274E6000
trusted library allocation
page read and write
22A25839000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1FB1A000
trusted library allocation
page read and write
22A25E9B000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A1E8F8000
trusted library allocation
page read and write
22A26047000
trusted library allocation
page read and write
22A2586D000
trusted library allocation
page read and write
22A1F9FE000
trusted library allocation
page read and write
22A2604A000
trusted library allocation
page read and write
22A260AD000
trusted library allocation
page read and write
22A1F6A2000
trusted library allocation
page read and write
22A2114D000
trusted library allocation
page read and write
22A25E49000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A260C1000
trusted library allocation
page read and write
22A1EBAC000
trusted library allocation
page read and write
1052000
heap
page read and write
22A21F5A000
trusted library allocation
page read and write
22A1F146000
trusted library allocation
page read and write
22A14744000
heap
page read and write
22A20123000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A1D5CE000
trusted library allocation
page read and write
22A14757000
heap
page read and write
22A14737000
heap
page read and write
22A26359000
trusted library allocation
page read and write
212CA581000
trusted library allocation
page read and write
22A25ED0000
trusted library allocation
page read and write
22A2599D000
trusted library allocation
page read and write
22A1F0AA000
trusted library allocation
page read and write
22A20358000
trusted library allocation
page read and write
22A1DEDA000
trusted library allocation
page read and write
22A274FE000
trusted library allocation
page read and write
22A1D59E000
trusted library allocation
page read and write
22A270BC000
trusted library allocation
page read and write
22903CEE000
heap
page read and write
22A270B8000
trusted library allocation
page read and write
22A274EE000
trusted library allocation
page read and write
212CA610000
heap
page readonly
22A1473E000
heap
page read and write
22A14732000
heap
page read and write
22A14746000
heap
page read and write
22A28233000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1E75A000
trusted library allocation
page read and write
22A25DEC000
trusted library allocation
page read and write
22A274EE000
trusted library allocation
page read and write
22A27407000
trusted library allocation
page read and write
22A2595C000
trusted library allocation
page read and write
22A27485000
trusted library allocation
page read and write
22A26359000
trusted library allocation
page read and write
22A1F177000
trusted library allocation
page read and write
22A2745A000
trusted library allocation
page read and write
22A1DDEC000
trusted library allocation
page read and write
22A1F6E1000
trusted library allocation
page read and write
1B13D26A000
heap
page read and write
22A14755000
heap
page read and write
22A211F1000
trusted library allocation
page read and write
22A1D912000
trusted library allocation
page read and write
22A1D9DB000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A1A6D2000
trusted library allocation
page read and write
22A222AF000
trusted library allocation
page read and write
22A259AC000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A274DC000
trusted library allocation
page read and write
22A1D0DD000
heap
page read and write
22A2609E000
trusted library allocation
page read and write
22A1CD0B000
trusted library allocation
page read and write
22A1E846000
trusted library allocation
page read and write
22A270DC000
trusted library allocation
page read and write
22A277F9000
trusted library allocation
page read and write
22A274FE000
trusted library allocation
page read and write
22A25724000
trusted library allocation
page read and write
22A1DD07000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A2609D000
trusted library allocation
page read and write
22A1E7B2000
trusted library allocation
page read and write
22903156000
heap
page read and write
22A211F1000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A2115C000
trusted library allocation
page read and write
22A270FA000
trusted library allocation
page read and write
22A1E75C000
trusted library allocation
page read and write
22A1472A000
heap
page read and write
22A1D0F8000
heap
page read and write
22A1A964000
trusted library allocation
page read and write
22A274DC000
trusted library allocation
page read and write
104F000
heap
page read and write
22A1DEAA000
trusted library allocation
page read and write
22A2766B000
trusted library allocation
page read and write
212CA5A7000
trusted library allocation
page read and write
22A14738000
heap
page read and write
22A1DD96000
trusted library allocation
page read and write
22A276B0000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A25F67000
trusted library allocation
page read and write
22A270BA000
trusted library allocation
page read and write
22A1A9F6000
trusted library allocation
page read and write
22A260C8000
trusted library allocation
page read and write
22A1962F000
trusted library allocation
page read and write
22A274EE000
trusted library allocation
page read and write
22A2603A000
trusted library allocation
page read and write
22A1A9DD000
trusted library allocation
page read and write
212CA570000
trusted library allocation
page read and write
22A260AD000
trusted library allocation
page read and write
22A1EBED000
trusted library allocation
page read and write
22A20D8F000
trusted library allocation
page read and write
22A200EC000
trusted library allocation
page read and write
22A2115F000
trusted library allocation
page read and write
22A1D0D5000
heap
page read and write
22A2017C000
trusted library allocation
page read and write
22A270D1000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A2707A000
trusted library allocation
page read and write
22A274D4000
trusted library allocation
page read and write
22A274EA000
trusted library allocation
page read and write
22A14738000
heap
page read and write
22A200E2000
trusted library allocation
page read and write
212CA5A9000
trusted library allocation
page read and write
22A1E792000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A1DDB6000
trusted library allocation
page read and write
22A26062000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22903C60000
heap
page read and write
22A274C4000
trusted library allocation
page read and write
22A26024000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A25E49000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A274AB000
trusted library allocation
page read and write
22A2602D000
trusted library allocation
page read and write
22A25CF8000
trusted library allocation
page read and write
22A25F92000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1475A000
heap
page read and write
22A25812000
trusted library allocation
page read and write
22A25FD1000
trusted library allocation
page read and write
22A20093000
trusted library allocation
page read and write
22A1F6E0000
trusted library allocation
page read and write
22A147A3000
heap
page read and write
22A14798000
heap
page read and write
22A1D69D000
trusted library allocation
page read and write
229030E9000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A1EBAC000
trusted library allocation
page read and write
22A1479A000
heap
page read and write
22903CEE000
heap
page read and write
22A14722000
heap
page read and write
22A1D6DD000
trusted library allocation
page read and write
22A274C1000
trusted library allocation
page read and write
22A276D1000
trusted library allocation
page read and write
1B13D5C4000
heap
page read and write
22A25D9C000
trusted library allocation
page read and write
22A1D647000
trusted library allocation
page read and write
2695773A000
heap
page read and write
22A270D3000
trusted library allocation
page read and write
22A274D4000
trusted library allocation
page read and write
22A277E3000
trusted library allocation
page read and write
22A26350000
trusted library allocation
page read and write
22A1E7B4000
trusted library allocation
page read and write
22A1F28F000
trusted library allocation
page read and write
22A25ECE000
trusted library allocation
page read and write
22A260B5000
trusted library allocation
page read and write
22A274D8000
trusted library allocation
page read and write
22A260D4000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A28105000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22903D58000
heap
page read and write
22A274F7000
trusted library allocation
page read and write
22A1E8DD000
trusted library allocation
page read and write
22A1D49A000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A211FD000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A21122000
trusted library allocation
page read and write
22903079000
trusted library allocation
page read and write
22A2776B000
trusted library allocation
page read and write
22A1A938000
trusted library allocation
page read and write
22A27483000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A19081000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A14732000
heap
page read and write
22A20062000
trusted library allocation
page read and write
22A260D0000
trusted library allocation
page read and write
22A259EC000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A26096000
trusted library allocation
page read and write
22903003000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A1F060000
trusted library allocation
page read and write
22A259BD000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A14728000
heap
page read and write
22A1FBDC000
trusted library allocation
page read and write
22A25E87000
trusted library allocation
page read and write
22A20057000
trusted library allocation
page read and write
22A27669000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1D65C000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1477C000
heap
page read and write
22A1D58C000
trusted library allocation
page read and write
22A1D0E3000
heap
page read and write
22A14748000
heap
page read and write
22A1F281000
trusted library allocation
page read and write
269576E0000
heap
page read and write
22A25FC1000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A1A6FE000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A14730000
heap
page read and write
22A1474E000
heap
page read and write
22A2637A000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A2034A000
trusted library allocation
page read and write
22A274A5000
trusted library allocation
page read and write
22A270DC000
trusted library allocation
page read and write
22A274F7000
trusted library allocation
page read and write
22A25F54000
trusted library allocation
page read and write
22A1F983000
trusted library allocation
page read and write
8E0EDFE000
unkown
page readonly
22A25F44000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A21146000
trusted library allocation
page read and write
22A281E4000
trusted library allocation
page read and write
22A2595C000
trusted library allocation
page read and write
22A1A931000
trusted library allocation
page read and write
22A1A94D000
trusted library allocation
page read and write
22A14732000
heap
page read and write
4100FFE000
stack
page read and write
22A25ED8000
trusted library allocation
page read and write
22A260B1000
trusted library allocation
page read and write
22A25ED2000
trusted library allocation
page read and write
2AB87A61000
trusted library allocation
page execute read
22A21F91000
trusted library allocation
page read and write
22A1EB8E000
trusted library allocation
page read and write
22A1FC7A000
trusted library allocation
page read and write
22A1F092000
trusted library allocation
page read and write
22A1D58E000
trusted library allocation
page read and write
22A260C8000
trusted library allocation
page read and write
22A270FE000
trusted library allocation
page read and write
22902B80000
unclassified section
page readonly
22A20EF9000
trusted library allocation
page read and write
212CA800000
heap
page read and write
22A201FB000
trusted library allocation
page read and write
22A1472A000
heap
page read and write
22A14749000
heap
page read and write
22A1DDFE000
trusted library allocation
page read and write
22A19623000
trusted library allocation
page read and write
22A28107000
trusted library allocation
page read and write
212CA633000
heap
page read and write
22A14729000
heap
page read and write
212CA450000
heap
page read and write
22A1F666000
trusted library allocation
page read and write
22A1F0B3000
trusted library allocation
page read and write
22A21F91000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A14730000
heap
page read and write
22A274E3000
trusted library allocation
page read and write
8E0CB8E000
unkown
page readonly
22A257F3000
trusted library allocation
page read and write
1B13D603000
trusted library allocation
page read and write
22A1F679000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A14745000
heap
page read and write
22A14748000
heap
page read and write
22A27519000
trusted library allocation
page read and write
229030C0000
trusted library allocation
page read and write
22A1E723000
trusted library allocation
page read and write
22A14723000
heap
page read and write
22A258DC000
trusted library allocation
page read and write
1B13D705000
trusted library allocation
page read and write
22A1FDB9000
trusted library allocation
page read and write
22A274DC000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A1D0F8000
heap
page read and write
22A1E797000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
BBF000
stack
page read and write
1B13D600000
trusted library allocation
page read and write
106E000
heap
page read and write
22A1A878000
trusted library allocation
page read and write
22903010000
trusted library allocation
page read and write
22A2113A000
trusted library allocation
page read and write
1058000
heap
page read and write
22A1FA5D000
trusted library allocation
page read and write
22A25DF1000
trusted library allocation
page read and write
22A20360000
trusted library allocation
page read and write
1B13D52F000
unclassified section
page read and write
22A1473E000
heap
page read and write
22A1D0F8000
heap
page read and write
22A26090000
trusted library allocation
page read and write
22A2742B000
trusted library allocation
page read and write
22A25DD0000
trusted library allocation
page read and write
22A14742000
heap
page read and write
22A1FCBE000
trusted library allocation
page read and write
22A1A9DD000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A14732000
heap
page read and write
22A2740E000
trusted library allocation
page read and write
22A25ED4000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A1CD12000
trusted library allocation
page read and write
22A27067000
trusted library allocation
page read and write
106E000
heap
page read and write
212CAA00000
trusted library allocation
page read and write
22A1F6CD000
trusted library allocation
page read and write
22A1F0F7000
trusted library allocation
page read and write
22A14729000
heap
page read and write
22A1F0AB000
trusted library allocation
page read and write
212CA5C7000
trusted library allocation
page read and write
22903C6C000
heap
page read and write
22A274FE000
trusted library allocation
page read and write
22A274D8000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A1473E000
heap
page read and write
22A14749000
heap
page read and write
22A26347000
trusted library allocation
page read and write
22A14757000
heap
page read and write
22A26096000
trusted library allocation
page read and write
22A2602D000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A26069000
trusted library allocation
page read and write
22A27459000
trusted library allocation
page read and write
22A1D0BD000
heap
page read and write
22A20097000
trusted library allocation
page read and write
22A1CEFE000
trusted library allocation
page read and write
22A26012000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A14734000
heap
page read and write
22A27065000
trusted library allocation
page read and write
22A1CE49000
trusted library allocation
page read and write
22A20DCA000
trusted library allocation
page read and write
22903CF1000
heap
page read and write
22A274C7000
trusted library allocation
page read and write
22A259C1000
trusted library allocation
page read and write
22A27449000
trusted library allocation
page read and write
22A20EBC000
trusted library allocation
page read and write
22A1CD33000
trusted library allocation
page read and write
22A1CDAB000
trusted library allocation
page read and write
22A26042000
trusted library allocation
page read and write
81739FE000
stack
page read and write
22A25E22000
trusted library allocation
page read and write
22A260D4000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A1F0BA000
trusted library allocation
page read and write
22A1474F000
heap
page read and write
22A260B1000
trusted library allocation
page read and write
22A2004D000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A274D0000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A274AF000
trusted library allocation
page read and write
22A2609E000
trusted library allocation
page read and write
22A263B1000
trusted library allocation
page read and write
22A27493000
trusted library allocation
page read and write
22A258E0000
trusted library allocation
page read and write
22A2602D000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A21F93000
trusted library allocation
page read and write
22A25DBB000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A14739000
heap
page read and write
22A1F195000
trusted library allocation
page read and write
22A14737000
heap
page read and write
C3E000
stack
page read and write
22A1DEAE000
trusted library allocation
page read and write
22A1D07D000
heap
page read and write
22A1FCB2000
trusted library allocation
page read and write
22A274EE000
trusted library allocation
page read and write
22A1EB9D000
trusted library allocation
page read and write
22A1F6D9000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A268F1000
trusted library allocation
page read and write
F2C000
unkown
page read and write
817423E000
stack
page read and write
22A1473F000
heap
page read and write
22A26AB3000
trusted library allocation
page read and write
22903D6B000
heap
page read and write
22A1DEC6000
trusted library allocation
page read and write
22A25DDC000
trusted library allocation
page read and write
22A1CE8D000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A1F06C000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A1473E000
heap
page read and write
22A1DE4B000
trusted library allocation
page read and write
22A1D931000
trusted library allocation
page read and write
22A270CF000
trusted library allocation
page read and write
22A274F1000
trusted library allocation
page read and write
22A270FE000
trusted library allocation
page read and write
22A260B1000
trusted library allocation
page read and write
B7A93FE000
stack
page read and write
22A14799000
heap
page read and write
22A1DD82000
trusted library allocation
page read and write
22A27026000
trusted library allocation
page read and write
22A14740000
heap
page read and write
22A2636B000
trusted library allocation
page read and write
22A25E9B000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A25C91000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A25753000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A25F1F000
trusted library allocation
page read and write
22A20DEC000
trusted library allocation
page read and write
22A1E8DD000
trusted library allocation
page read and write
22A1DED5000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A260D4000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A26096000
trusted library allocation
page read and write
22A1F4A3000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22A14745000
heap
page read and write
22A2601E000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1F121000
trusted library allocation
page read and write
269592BB000
heap
page read and write
22A1F274000
trusted library allocation
page read and write
22A259D0000
trusted library allocation
page read and write
22A26347000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A26070000
trusted library allocation
page read and write
22A2595C000
trusted library allocation
page read and write
22A1D6BC000
trusted library allocation
page read and write
22A2586A000
trusted library allocation
page read and write
22A25DEB000
trusted library allocation
page read and write
22A25940000
trusted library allocation
page read and write
22A1D6CB000
trusted library allocation
page read and write
22A1FA53000
trusted library allocation
page read and write
22A222B2000
trusted library allocation
page read and write
22A147A8000
heap
page read and write
22A25FB3000
trusted library allocation
page read and write
22A1F6A2000
trusted library allocation
page read and write
22A20D98000
trusted library allocation
page read and write
22A1DE40000
trusted library allocation
page read and write
22A26047000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A1D69D000
trusted library allocation
page read and write
22A2637A000
trusted library allocation
page read and write
22A20D3F000
trusted library allocation
page read and write
22A260B5000
trusted library allocation
page read and write
22A274DC000
trusted library allocation
page read and write
22A1A8E4000
trusted library allocation
page read and write
22A14720000
heap
page read and write
1B13D664000
trusted library allocation
page read and write
22A274D6000
trusted library allocation
page read and write
22A1EB8E000
trusted library allocation
page read and write
22A259FB000
trusted library allocation
page read and write
22A1E60B000
trusted library allocation
page read and write
22A270DF000
trusted library allocation
page read and write
22903C60000
heap
page read and write
22A274A5000
trusted library allocation
page read and write
22A25E55000
trusted library allocation
page read and write
22A211FD000
trusted library allocation
page read and write
22A274CA000
trusted library allocation
page read and write
22A1E06B000
trusted library allocation
page read and write
22A274A8000
trusted library allocation
page read and write
22A2593B000
trusted library allocation
page read and write
22A14738000
heap
page read and write
22903D3B000
heap
page read and write
22A2604A000
trusted library allocation
page read and write
22A1F0AA000
trusted library allocation
page read and write
22A26057000
trusted library allocation
page read and write
22A1FBB4000
trusted library allocation
page read and write
22A25E8B000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A1F2A8000
trusted library allocation
page read and write
22A14779000
heap
page read and write
22A25F58000
trusted library allocation
page read and write
8E106BE000
stack
page read and write
22A20020000
trusted library allocation
page read and write
22A260A1000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A1E6D8000
trusted library allocation
page read and write
22A211E9000
trusted library allocation
page read and write
22A1EB90000
trusted library allocation
page read and write
22A281AC000
trusted library allocation
page read and write
22A1D689000
trusted library allocation
page read and write
22A25E1C000
trusted library allocation
page read and write
22A25ED6000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A274E6000
trusted library allocation
page read and write
22A1F4B8000
trusted library allocation
page read and write
22A26382000
trusted library allocation
page read and write
22A26A23000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A14737000
heap
page read and write
22A26042000
trusted library allocation
page read and write
22A1D5CE000
trusted library allocation
page read and write
22903CF1000
heap
page read and write
22A27642000
trusted library allocation
page read and write
22A27466000
trusted library allocation
page read and write
22A1F6C4000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A274F7000
trusted library allocation
page read and write
22A1D4B6000
trusted library allocation
page read and write
22A1EB96000
trusted library allocation
page read and write
22A1473F000
heap
page read and write
22A25EDA000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A1DE57000
trusted library allocation
page read and write
22A1E766000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A274D6000
trusted library allocation
page read and write
22A259E9000
trusted library allocation
page read and write
22A274C7000
trusted library allocation
page read and write
8171FCE000
unkown
page readonly
22A1DE85000
trusted library allocation
page read and write
22A1E623000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1DE65000
trusted library allocation
page read and write
22A20D7A000
trusted library allocation
page read and write
22A274F4000
trusted library allocation
page read and write
22A14731000
heap
page read and write
22A1DEA5000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A25ED6000
trusted library allocation
page read and write
22903CE8000
heap
page read and write
22A1F6E0000
trusted library allocation
page read and write
22A1DE85000
trusted library allocation
page read and write
22A1E7B4000
trusted library allocation
page read and write
22A1D6AB000
trusted library allocation
page read and write
22A25F66000
trusted library allocation
page read and write
22A1F092000
trusted library allocation
page read and write
22903CF2000
heap
page read and write
22A147A9000
heap
page read and write
22A25815000
trusted library allocation
page read and write
22A1E8CF000
trusted library allocation
page read and write
22A14756000
heap
page read and write
22A1DECD000
trusted library allocation
page read and write
22A26350000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22903D6B000
heap
page read and write
22A260B5000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1D65F000
trusted library allocation
page read and write
22A1D5CE000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A1E8E5000
trusted library allocation
page read and write
22A1F6EC000
trusted library allocation
page read and write
22A14740000
heap
page read and write
22A2636B000
trusted library allocation
page read and write
22A25F08000
trusted library allocation
page read and write
22A1FD96000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A2118D000
trusted library allocation
page read and write
22A25FB3000
trusted library allocation
page read and write
22A1CEFE000
trusted library allocation
page read and write
22A1DDFD000
trusted library allocation
page read and write
22A276F7000
trusted library allocation
page read and write
22A2746E000
trusted library allocation
page read and write
22A1473F000
heap
page read and write
22A1474E000
heap
page read and write
22A14740000
heap
page read and write
22A1EBED000
trusted library allocation
page read and write
22A25890000
trusted library allocation
page read and write
26957732000
heap
page read and write
22A1CD72000
trusted library allocation
page read and write
22A2581E000
trusted library allocation
page read and write
22A26334000
trusted library allocation
page read and write
22A26096000
trusted library allocation
page read and write
22A1F13F000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A26071000
trusted library allocation
page read and write
22A1FB6E000
trusted library allocation
page read and write
22A20DF9000
trusted library allocation
page read and write
22A1E7D3000
trusted library allocation
page read and write
22A274F7000
trusted library allocation
page read and write
22A276AA000
trusted library allocation
page read and write
22A26343000
trusted library allocation
page read and write
22A27672000
trusted library allocation
page read and write
22A25DDD000
trusted library allocation
page read and write
22A14756000
heap
page read and write
22A1DE49000
trusted library allocation
page read and write
22A14757000
heap
page read and write
22A260BD000
trusted library allocation
page read and write
22A1D95A000
trusted library allocation
page read and write
22A14720000
heap
page read and write
F2C000
unkown
page write copy
22A1D0E3000
heap
page read and write
22A200C7000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1E8F8000
trusted library allocation
page read and write
22A274E3000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A1EB45000
trusted library allocation
page read and write
22A276D3000
trusted library allocation
page read and write
22A26700000
trusted library allocation
page read and write
22A2114E000
trusted library allocation
page read and write
1B13D612000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A1DE8B000
trusted library allocation
page read and write
22A1F0BA000
trusted library allocation
page read and write
2AB87A51000
trusted library allocation
page execute read
22A25888000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1DEA5000
trusted library allocation
page read and write
22A21153000
trusted library allocation
page read and write
22A1CDDB000
trusted library allocation
page read and write
B7AABFE000
stack
page read and write
22A1CDF2000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1471A000
heap
page read and write
22A27E9D000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A203D2000
trusted library allocation
page read and write
22A28233000
trusted library allocation
page read and write
22A2581E000
trusted library allocation
page read and write
22A2579D000
trusted library allocation
page read and write
22A274D8000
trusted library allocation
page read and write
22A25797000
trusted library allocation
page read and write
22A25ECE000
trusted library allocation
page read and write
22A2592D000
trusted library allocation
page read and write
212CA50E000
trusted library allocation
page read and write
22A2113D000
trusted library allocation
page read and write
22A26310000
trusted library allocation
page read and write
22A26042000
trusted library allocation
page read and write
22A259AC000
trusted library allocation
page read and write
22A21FC4000
trusted library allocation
page read and write
22A274F7000
trusted library allocation
page read and write
22A1EB70000
trusted library allocation
page read and write
22A25E8B000
trusted library allocation
page read and write
2290300A000
trusted library allocation
page read and write
22A1DE57000
trusted library allocation
page read and write
22A147A3000
heap
page read and write
22A14739000
heap
page read and write
22A1EBC8000
trusted library allocation
page read and write
22A27640000
trusted library allocation
page read and write
1A7179A0000
heap
page read and write
22A27413000
trusted library allocation
page read and write
212CA500000
trusted library allocation
page read and write
22A26033000
trusted library allocation
page read and write
2695790A000
trusted library allocation
page read and write
22A1D6AF000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A26838000
trusted library allocation
page read and write
22A1473B000
heap
page read and write
22A1DE49000
trusted library allocation
page read and write
22903CE9000
heap
page read and write
22A1D0F8000
heap
page read and write
22A1DEC8000
trusted library allocation
page read and write
22A2588B000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A260A0000
trusted library allocation
page read and write
22A276B5000
trusted library allocation
page read and write
22A1A977000
trusted library allocation
page read and write
22A27EA2000
trusted library allocation
page read and write
22A27642000
trusted library allocation
page read and write
22A1DE76000
trusted library allocation
page read and write
22A21F75000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A21FC0000
trusted library allocation
page read and write
22A2776D000
trusted library allocation
page read and write
22A274EE000
trusted library allocation
page read and write
22A211FB000
trusted library allocation
page read and write
22A1FDBC000
trusted library allocation
page read and write
22A1E7B2000
trusted library allocation
page read and write
22A27EA8000
trusted library allocation
page read and write
43503FF000
stack
page read and write
8171F0B000
stack
page read and write
22A2592D000
trusted library allocation
page read and write
22A1A63A000
trusted library allocation
page read and write
22A1E75A000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A26884000
trusted library allocation
page read and write
22A20D87000
trusted library allocation
page read and write
22A260CC000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A1D64A000
trusted library allocation
page read and write
22A1D66B000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A1A9EB000
trusted library allocation
page read and write
22A27765000
trusted library allocation
page read and write
22A274C7000
trusted library allocation
page read and write
22A2609E000
trusted library allocation
page read and write
22A1474D000
heap
page read and write
22A25E7C000
trusted library allocation
page read and write
22A1A8F8000
trusted library allocation
page read and write
22A27642000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22903CE6000
heap
page read and write
22A1E7B6000
trusted library allocation
page read and write
22A259C5000
trusted library allocation
page read and write
22A276AF000
trusted library allocation
page read and write
22A276F7000
trusted library allocation
page read and write
22A25831000
trusted library allocation
page read and write
22A259E9000
trusted library allocation
page read and write
22A1CD7A000
trusted library allocation
page read and write
22A25ED4000
trusted library allocation
page read and write
22A147A0000
heap
page read and write
22A25817000
trusted library allocation
page read and write
22A274C4000
trusted library allocation
page read and write
22A1FCD1000
trusted library allocation
page read and write
22A1EB72000
trusted library allocation
page read and write
22A260A0000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A25959000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1473E000
heap
page read and write
22A1477C000
heap
page read and write
22A1A9F4000
trusted library allocation
page read and write
26957740000
heap
page read and write
22A14739000
heap
page read and write
22A211FB000
trusted library allocation
page read and write
22A1472A000
heap
page read and write
22A1A875000
trusted library allocation
page read and write
22A26071000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A274F9000
trusted library allocation
page read and write
212CA470000
heap
page read and write
22A1F0B7000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A1D0ED000
heap
page read and write
22A274E3000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A1D976000
trusted library allocation
page read and write
22A1472B000
heap
page read and write
22A277E3000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A1473E000
heap
page read and write
22A274D8000
trusted library allocation
page read and write
22A201AE000
trusted library allocation
page read and write
22A274B3000
trusted library allocation
page read and write
22A1EB9B000
trusted library allocation
page read and write
22A14738000
heap
page read and write
22A1473E000
heap
page read and write
22903D58000
heap
page read and write
269592BA000
heap
page read and write
22A1D0F8000
heap
page read and write
22A1F6DC000
trusted library allocation
page read and write
229035A0000
heap
page read and write
22A20D30000
trusted library allocation
page read and write
22A21158000
trusted library allocation
page read and write
22A25F5D000
trusted library allocation
page read and write
22A1D07D000
heap
page read and write
22A19766000
trusted library allocation
page read and write
22903081000
trusted library allocation
page read and write
22A1D087000
heap
page read and write
22A1D64F000
trusted library allocation
page read and write
22A1D0D5000
heap
page read and write
22A274C5000
trusted library allocation
page read and write
1B13D6A5000
trusted library allocation
page read and write
22A1D6C4000
trusted library allocation
page read and write
2695772F000
heap
page read and write
22A1DDC3000
trusted library allocation
page read and write
22903C60000
heap
page read and write
22903D44000
heap
page read and write
22903512000
unkown
page execute read
22A2749E000
trusted library allocation
page read and write
22A1472C000
heap
page read and write
22A14745000
heap
page read and write
212CA62F000
unclassified section
page read and write
22902DB0000
trusted library section
page readonly
22A274C7000
trusted library allocation
page read and write
22A26884000
trusted library allocation
page read and write
B7AB3FF000
stack
page read and write
BFE000
stack
page read and write
22A1D6A4000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A258E0000
trusted library allocation
page read and write
22A2032B000
trusted library allocation
page read and write
1B13D6C9000
trusted library allocation
page read and write
22A200CF000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A260CC000
trusted library allocation
page read and write
22A25F1C000
trusted library allocation
page read and write
22A27496000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A260A0000
trusted library allocation
page read and write
22A1F6A2000
trusted library allocation
page read and write
22A190C4000
trusted library allocation
page read and write
22A1FDE7000
trusted library allocation
page read and write
22A25EEA000
trusted library allocation
page read and write
22A270BA000
trusted library allocation
page read and write
22A1F0A7000
trusted library allocation
page read and write
22A1F0B3000
trusted library allocation
page read and write
22A2768E000
trusted library allocation
page read and write
22A28186000
trusted library allocation
page read and write
26957AB0000
heap
page read and write
22A196F6000
trusted library allocation
page read and write
22A277F9000
trusted library allocation
page read and write
22A203B1000
trusted library allocation
page read and write
22A275F8000
trusted library allocation
page read and write
22A1E0CB000
trusted library allocation
page read and write
22A1DEB2000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A1F1DB000
trusted library allocation
page read and write
1030000
heap
page read and write
22A14720000
heap
page read and write
22A1CE4B000
trusted library allocation
page read and write
22A1F67A000
trusted library allocation
page read and write
22A260CF000
trusted library allocation
page read and write
22A1F1C0000
trusted library allocation
page read and write
22A1F6D3000
trusted library allocation
page read and write
22A28087000
trusted library allocation
page read and write
22A1EB9B000
trusted library allocation
page read and write
22A14719000
heap
page read and write
22A2016D000
trusted library allocation
page read and write
22A1E799000
trusted library allocation
page read and write
22A1D68F000
trusted library allocation
page read and write
22A27063000
trusted library allocation
page read and write
22A1D0E3000
heap
page read and write
22A2744D000
trusted library allocation
page read and write
22A257EE000
trusted library allocation
page read and write
22A19713000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1D6BE000
trusted library allocation
page read and write
22A2822E000
trusted library allocation
page read and write
22A2594C000
trusted library allocation
page read and write
22A1D6D5000
trusted library allocation
page read and write
22A1DE47000
trusted library allocation
page read and write
22A25948000
trusted library allocation
page read and write
22A19623000
trusted library allocation
page read and write
22A1A8F7000
trusted library allocation
page read and write
22A21F82000
trusted library allocation
page read and write
1B13D623000
trusted library allocation
page read and write
22A270FE000
trusted library allocation
page read and write
22A25829000
trusted library allocation
page read and write
3820000
heap
page read and write
22A14732000
heap
page read and write
22A1DEAA000
trusted library allocation
page read and write
22A25E9B000
trusted library allocation
page read and write
22A20143000
trusted library allocation
page read and write
22A1D068000
heap
page read and write
22A1D6C4000
trusted library allocation
page read and write
22A1EBC9000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A1DEC3000
trusted library allocation
page read and write
22903D3B000
heap
page read and write
22A270DC000
trusted library allocation
page read and write
22A20390000
trusted library allocation
page read and write
22A259E9000
trusted library allocation
page read and write
22903D58000
heap
page read and write
22A1A940000
trusted library allocation
page read and write
22A1A630000
trusted library allocation
page read and write
22A1F6F2000
trusted library allocation
page read and write
22A261D3000
trusted library allocation
page read and write
22A2609E000
trusted library allocation
page read and write
22A26008000
trusted library allocation
page read and write
22A1D48D000
trusted library allocation
page read and write
22A2589D000
trusted library allocation
page read and write
22A1D6C4000
trusted library allocation
page read and write
22A1D940000
trusted library allocation
page read and write
22A14740000
heap
page read and write
22A14737000
heap
page read and write
22A1479B000
heap
page read and write
22903C60000
heap
page read and write
22A1E755000
trusted library allocation
page read and write
22A1F4C8000
trusted library allocation
page read and write
22903CEE000
heap
page read and write
22A25FB9000
trusted library allocation
page read and write
22A1E7B0000
trusted library allocation
page read and write
22A1D0D5000
heap
page read and write
1A717959000
heap
page read and write
22A1E8DF000
trusted library allocation
page read and write
22A201A8000
trusted library allocation
page read and write
22A1F2CB000
trusted library allocation
page read and write
22A259DE000
trusted library allocation
page read and write
22A274D8000
trusted library allocation
page read and write
22903CA1000
heap
page read and write
22A1FB6E000
trusted library allocation
page read and write
22A14715000
heap
page read and write
22A2750E000
trusted library allocation
page read and write
22A21196000
trusted library allocation
page read and write
22A274C4000
trusted library allocation
page read and write
22A19671000
trusted library allocation
page read and write
22A1474B000
heap
page read and write
22A222A3000
trusted library allocation
page read and write
22A274CA000
trusted library allocation
page read and write
1B13D739000
trusted library allocation
page read and write
22A25F44000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
CC4000
heap
page read and write
22A14730000
heap
page read and write
22A1F2A0000
trusted library allocation
page read and write
22A20172000
trusted library allocation
page read and write
22A27067000
trusted library allocation
page read and write
22A1E8ED000
trusted library allocation
page read and write
22A2601E000
trusted library allocation
page read and write
22903D2A000
heap
page read and write
22A1CEA9000
trusted library allocation
page read and write
22A25948000
trusted library allocation
page read and write
22A260C8000
trusted library allocation
page read and write
22A260B1000
trusted library allocation
page read and write
22A25DD5000
trusted library allocation
page read and write
22A260B1000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A14745000
heap
page read and write
22A26350000
trusted library allocation
page read and write
22A1D93B000
trusted library allocation
page read and write
22903CE8000
heap
page read and write
22A1DED8000
trusted library allocation
page read and write
22A21F91000
trusted library allocation
page read and write
22A2749A000
trusted library allocation
page read and write
22A14730000
heap
page read and write
22A14722000
heap
page read and write
22A1D481000
trusted library allocation
page read and write
22A1D087000
heap
page read and write
22A1CE40000
trusted library allocation
page read and write
22A25FAA000
trusted library allocation
page read and write
22A211EB000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A1F6B2000
trusted library allocation
page read and write
22A203FC000
trusted library allocation
page read and write
22A14757000
heap
page read and write
22A1DE8B000
trusted library allocation
page read and write
22A27459000
trusted library allocation
page read and write
22A280C8000
trusted library allocation
page read and write
22A2013C000
trusted library allocation
page read and write
22A27745000
trusted library allocation
page read and write
22A1D5CE000
trusted library allocation
page read and write
22A1D578000
trusted library allocation
page read and write
22A1473D000
heap
page read and write
22A1D0CC000
heap
page read and write
22A1FDE7000
trusted library allocation
page read and write
22A1EB96000
trusted library allocation
page read and write
22A28186000
trusted library allocation
page read and write
1B13D62E000
trusted library allocation
page read and write
22A19775000
trusted library allocation
page read and write
22A1F6AA000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A26033000
trusted library allocation
page read and write
22A20DEF000
trusted library allocation
page read and write
22A1F958000
trusted library allocation
page read and write
22903C7D000
heap
page read and write
22A1EB4B000
trusted library allocation
page read and write
22A2009E000
trusted library allocation
page read and write
22A1D68A000
trusted library allocation
page read and write
22A21158000
trusted library allocation
page read and write
22A2609D000
trusted library allocation
page read and write
22903D6B000
heap
page read and write
22A1CE5D000
trusted library allocation
page read and write
22A274DD000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A25C97000
trusted library allocation
page read and write
22A27411000
trusted library allocation
page read and write
22A276A5000
trusted library allocation
page read and write
22A1D924000
trusted library allocation
page read and write
22A14748000
heap
page read and write
22A14715000
heap
page read and write
212CA511000
trusted library allocation
page read and write
E60000
unkown
page readonly
22A20322000
trusted library allocation
page read and write
22A26090000
trusted library allocation
page read and write
22A20DE4000
trusted library allocation
page read and write
22A274B1000
trusted library allocation
page read and write
22A25E9B000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A260A8000
trusted library allocation
page read and write
22A14739000
heap
page read and write
1B13D700000
trusted library allocation
page read and write
22A2118D000
trusted library allocation
page read and write
22A259CA000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A1D6AF000
trusted library allocation
page read and write
22A14729000
heap
page read and write
22A14720000
heap
page read and write
22A14744000
heap
page read and write
22A27EF8000
trusted library allocation
page read and write
22A2603F000
trusted library allocation
page read and write
22A260AA000
trusted library allocation
page read and write
E61000
unkown
page execute read
22903D22000
heap
page read and write
22A1D066000
heap
page read and write
CB4000
heap
page read and write
22A259F7000
trusted library allocation
page read and write
22A1CEF4000
trusted library allocation
page read and write
22A1D08B000
heap
page read and write
22A1F6D1000
trusted library allocation
page read and write
22A1A964000
trusted library allocation
page read and write
22903D6B000
heap
page read and write
22A1DDFA000
trusted library allocation
page read and write
22A1F6C6000
trusted library allocation
page read and write
22A1FDDA000
trusted library allocation
page read and write
22A280C8000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A274F1000
trusted library allocation
page read and write
22A1DDF0000
trusted library allocation
page read and write
1B13D6E4000
trusted library allocation
page read and write
22A260D4000
trusted library allocation
page read and write
22A25E56000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A25ECE000
trusted library allocation
page read and write
22A274BD000
trusted library allocation
page read and write
22A25952000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A1D0F8000
heap
page read and write
22A274F1000
trusted library allocation
page read and write
81741FE000
unkown
page readonly
22A1F0A6000
trusted library allocation
page read and write
22A1E71E000
trusted library allocation
page read and write
22A0F67B000
heap
page read and write
22A1471A000
heap
page read and write
22A147A3000
heap
page read and write
22903CEE000
heap
page read and write
22A1D59E000
trusted library allocation
page read and write
22A14729000
heap
page read and write
22A25E8B000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A14745000
heap
page read and write
22A25FC1000
trusted library allocation
page read and write
22A2777D000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A25F3C000
trusted library allocation
page read and write
22A20E5A000
trusted library allocation
page read and write
22A27613000
trusted library allocation
page read and write
22A14748000
heap
page read and write
212CA549000
trusted library allocation
page read and write
22A25844000
trusted library allocation
page read and write
212CA503000
trusted library allocation
page read and write
22A1DD9C000
trusted library allocation
page read and write
22A270BA000
trusted library allocation
page read and write
22A1F5D6000
trusted library allocation
page read and write
212CA566000
trusted library allocation
page read and write
22A14739000
heap
page read and write
1A717B00000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A20DB3000
trusted library allocation
page read and write
22A2016D000
trusted library allocation
page read and write
22A14745000
heap
page read and write
22A1D300000
trusted library allocation
page read and write
22A21FE1000
trusted library allocation
page read and write
22A25C78000
trusted library allocation
page read and write
22A1E7B9000
trusted library allocation
page read and write
22A2751D000
trusted library allocation
page read and write
22A147B1000
heap
page read and write
22A2777D000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A1D63B000
trusted library allocation
page read and write
22A1E7C1000
trusted library allocation
page read and write
22A25ED2000
trusted library allocation
page read and write
8E0EE3E000
unkown
page readonly
22A1D5A5000
trusted library allocation
page read and write
22A1DE5A000
trusted library allocation
page read and write
22A1E75F000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
22A1D0F8000
heap
page read and write
22A259E9000
trusted library allocation
page read and write
22A14749000
heap
page read and write
22A1EBAC000
trusted library allocation
page read and write
22A1F504000
trusted library allocation
page read and write
22A1CE69000
trusted library allocation
page read and write
22A274D0000
trusted library allocation
page read and write
22A25753000
trusted library allocation
page read and write
22A21FC4000
trusted library allocation
page read and write
22903B00000
trusted library allocation
page read and write
22A274E6000
trusted library allocation
page read and write
22A1DEE9000
trusted library allocation
page read and write
22A20D35000
trusted library allocation
page read and write
22A274A8000
trusted library allocation
page read and write
22A260A1000
trusted library allocation
page read and write
22A1EB4B000
trusted library allocation
page read and write
229035DA000
heap
page read and write
22A258E2000
trusted library allocation
page read and write
22A1E7FA000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A1475A000
heap
page read and write
22A14748000
heap
page read and write
22A1F6A8000
trusted library allocation
page read and write
22A1CE05000
trusted library allocation
page read and write
22A1F17C000
trusted library allocation
page read and write
22A1DDEC000
trusted library allocation
page read and write
22A27745000
trusted library allocation
page read and write
22A25E7D000
trusted library allocation
page read and write
22A2749C000
trusted library allocation
page read and write
22A20350000
trusted library allocation
page read and write
22A1CDDC000
trusted library allocation
page read and write
22A270BA000
trusted library allocation
page read and write
22A1D5CE000
trusted library allocation
page read and write
22A1F6A0000
trusted library allocation
page read and write
22A1F2AA000
trusted library allocation
page read and write
22A1DE2B000
trusted library allocation
page read and write
22A1E797000
trusted library allocation
page read and write
22A1FCA3000
trusted library allocation
page read and write
22A277FE000
trusted library allocation
page read and write
22A1DE53000
trusted library allocation
page read and write
22A21196000
trusted library allocation
page read and write
129F94C1E000
trusted library allocation
page read and write
22A1E7C1000
trusted library allocation
page read and write
22A25F38000
trusted library allocation
page read and write
22A274C4000
trusted library allocation
page read and write
22A259AC000
trusted library allocation
page read and write
22A1D9F0000
trusted library allocation
page read and write
22A25DC9000
trusted library allocation
page read and write
22A27072000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A280A3000
trusted library allocation
page read and write
22A190F9000
trusted library allocation
page read and write
22A21F48000
trusted library allocation
page read and write
22A21FCD000
trusted library allocation
page read and write
22A1D0DD000
heap
page read and write
22903086000
trusted library allocation
page read and write
22A259FB000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A1DE69000
trusted library allocation
page read and write
22A1EB88000
trusted library allocation
page read and write
22A1CD1D000
trusted library allocation
page read and write
22A26A64000
trusted library allocation
page read and write
22A2586A000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A2765C000
trusted library allocation
page read and write
22A14799000
heap
page read and write
22A2037A000
trusted library allocation
page read and write
22A1CEF4000
trusted library allocation
page read and write
22A147A8000
heap
page read and write
22A1479F000
heap
page read and write
22A274AF000
trusted library allocation
page read and write
22A20DE4000
trusted library allocation
page read and write
22A1D46D000
trusted library allocation
page read and write
22A1472E000
heap
page read and write
22A1D6BE000
trusted library allocation
page read and write
22A1CEF4000
trusted library allocation
page read and write
22903D2A000
heap
page read and write
22A14739000
heap
page read and write
22A260DF000
trusted library allocation
page read and write
22A25E7F000
trusted library allocation
page read and write
22A27745000
trusted library allocation
page read and write
22A1FDDA000
trusted library allocation
page read and write
22A26090000
trusted library allocation
page read and write
22A263D2000
trusted library allocation
page read and write
22A26009000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22903C6C000
heap
page read and write
22A1D067000
heap
page read and write
22A1D990000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A14730000
heap
page read and write
22A25700000
trusted library allocation
page read and write
22A1D562000
trusted library allocation
page read and write
22A1CDB0000
trusted library allocation
page read and write
22A1E7FA000
trusted library allocation
page read and write
22A14745000
heap
page read and write
1B13D711000
trusted library allocation
page read and write
22A1473E000
heap
page read and write
22A276BC000
trusted library allocation
page read and write
22A2686D000
trusted library allocation
page read and write
22A25FB9000
trusted library allocation
page read and write
22A1DEEE000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
22A28E01000
heap
page read and write
22A1D6BC000
trusted library allocation
page read and write
22A274D0000
trusted library allocation
page read and write
22A1A862000
trusted library allocation
page read and write
22A1EBC8000
trusted library allocation
page read and write
22903C69000
heap
page read and write
22A14745000
heap
page read and write
22A202E9000
trusted library allocation
page read and write
BEF000
stack
page read and write
22A14732000
heap
page read and write
22A1EFF5000
trusted library allocation
page read and write
22A20DAD000
trusted library allocation
page read and write
22A1E8C8000
trusted library allocation
page read and write
22A1FDF8000
trusted library allocation
page read and write
22A2609D000
trusted library allocation
page read and write
22A1E7A1000
trusted library allocation
page read and write
22A1D431000
trusted library allocation
page read and write
22A1F6C2000
trusted library allocation
page read and write
22A259D4000
trusted library allocation
page read and write
22A27EE5000
trusted library allocation
page read and write
41017FE000
unkown
page readonly
22A1FC6F000
trusted library allocation
page read and write
22A1F259000
trusted library allocation
page read and write
22A259A9000
trusted library allocation
page read and write
22A27495000
trusted library allocation
page read and write
22A1F16A000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22A147A3000
heap
page read and write
22A280E5000
trusted library allocation
page read and write
22A27433000
trusted library allocation
page read and write
22903D77000
heap
page read and write
22A25E1C000
trusted library allocation
page read and write
F34000
unkown
page readonly
22A276D3000
trusted library allocation
page read and write
22A1F0DF000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A1D9FD000
trusted library allocation
page read and write
22A1FAC0000
trusted library allocation
page read and write
22A260BD000
trusted library allocation
page read and write
22A2816D000
trusted library allocation
page read and write
22A26A86000
trusted library allocation
page read and write
22A274CA000
trusted library allocation
page read and write
22A1EB9D000
trusted library allocation
page read and write
22A26069000
trusted library allocation
page read and write
22A2594C000
trusted library allocation
page read and write
22A25E18000
trusted library allocation
page read and write
22A1F0F7000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A276AA000
trusted library allocation
page read and write
22A274E3000
trusted library allocation
page read and write
22A25ECC000
trusted library allocation
page read and write
22A274D4000
trusted library allocation
page read and write
22A14751000
heap
page read and write
22A25F2B000
trusted library allocation
page read and write
22A14711000
heap
page read and write
22A2017C000
trusted library allocation
page read and write
22A1EA05000
trusted library allocation
page read and write
22A25DD0000
trusted library allocation
page read and write
22A26368000
trusted library allocation
page read and write
22A26173000
trusted library allocation
page read and write
22A276D7000
trusted library allocation
page read and write
22A1F0DF000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A274E6000
trusted library allocation
page read and write
22A1F14B000
trusted library allocation
page read and write
22A28206000
trusted library allocation
page read and write
22A1F6A8000
trusted library allocation
page read and write
22A1F6F2000
trusted library allocation
page read and write
22A1DEDB000
trusted library allocation
page read and write
22A28E46000
heap
page read and write
22A274BB000
trusted library allocation
page read and write
22A19726000
trusted library allocation
page read and write
22A2003C000
trusted library allocation
page read and write
22A259C1000
trusted library allocation
page read and write
22A270FA000
trusted library allocation
page read and write
22A25EDA000
trusted library allocation
page read and write
22A201BB000
trusted library allocation
page read and write
22A28201000
trusted library allocation
page read and write
22A14732000
heap
page read and write
22A25FDA000
trusted library allocation
page read and write
22A14799000
heap
page read and write
22A1DE25000
trusted library allocation
page read and write
22A14746000
heap
page read and write
417F2BE000
stack
page read and write
22A25E28000
trusted library allocation
page read and write
22A147A0000
heap
page read and write
22903B35000
trusted library allocation
page read and write
22A1D42B000
trusted library allocation
page read and write
22A274D8000
trusted library allocation
page read and write
22903012000
trusted library allocation
page read and write
22A1FB11000
trusted library allocation
page read and write
212CA4B0000
heap
page read and write
22A25F90000
trusted library allocation
page read and write
22A1475A000
heap
page read and write
22A202C5000
trusted library allocation
page read and write
22A1DD64000
trusted library allocation
page read and write
22A274EE000
trusted library allocation
page read and write
22A211F3000
trusted library allocation
page read and write
22A1F06C000
trusted library allocation
page read and write
22A14746000
heap
page read and write
22A2601A000
trusted library allocation
page read and write
22A1E80F000
trusted library allocation
page read and write
22A1472D000
heap
page read and write
22A1D0D5000
heap
page read and write
22A1473F000
heap
page read and write
22A1D6AF000
trusted library allocation
page read and write
22A1D463000
trusted library allocation
page read and write
22902DF0000
heap
page read and write
22A25FC9000
trusted library allocation
page read and write
1B13D71A000
trusted library allocation
page read and write
22A25858000
trusted library allocation
page read and write
22A1DE6C000
trusted library allocation
page read and write
22A25815000
trusted library allocation
page read and write
22A270D1000
trusted library allocation
page read and write
22A27028000
trusted library allocation
page read and write
22A1DEC8000
trusted library allocation
page read and write
22A2592D000
trusted library allocation
page read and write
EFC000
unkown
page readonly
22A1DDEC000
trusted library allocation
page read and write
22A1A98E000
trusted library allocation
page read and write
22A14749000
heap
page read and write
22A14745000
heap
page read and write
22903D77000
heap
page read and write
22A14749000
heap
page read and write
22A1F6AF000
trusted library allocation
page read and write
22A20166000
trusted library allocation
page read and write
22A26089000
trusted library allocation
page read and write
22903D3B000
heap
page read and write
B7AA3FE000
stack
page read and write
22A14752000
heap
page read and write
22A25861000
trusted library allocation
page read and write
22A14778000
heap
page read and write
22903C69000
heap
page read and write
22A274D4000
trusted library allocation
page read and write
22A25F54000
trusted library allocation
page read and write
22A1DED5000
trusted library allocation
page read and write
1B13D67A000
trusted library allocation
page read and write
22A274A8000
trusted library allocation
page read and write
22A1CDB0000
trusted library allocation
page read and write
22A1E6FE000
trusted library allocation
page read and write
22A1D698000
trusted library allocation
page read and write
22A28E35000
heap
page read and write
4350BFE000
stack
page read and write
22903CAA000
heap
page read and write
22A274E3000
trusted library allocation
page read and write
22A27672000
trusted library allocation
page read and write
22903D21000
heap
page read and write
22A2570E000
trusted library allocation
page read and write
22A1EBAC000
trusted library allocation
page read and write
22A1FDCB000
trusted library allocation
page read and write
22A26090000
trusted library allocation
page read and write
22A1DECD000
trusted library allocation
page read and write
22A14756000
heap
page read and write
22A2609E000
trusted library allocation
page read and write
22A274D8000
trusted library allocation
page read and write
22903C8D000
heap
page read and write
22A14740000
heap
page read and write
22A1DE47000
trusted library allocation
page read and write
22A201F3000
trusted library allocation
page read and write
22A260C8000
trusted library allocation
page read and write
22A2774B000
trusted library allocation
page read and write
2F187CA03000
trusted library allocation
page read and write
22A25F54000
trusted library allocation
page read and write
1B13D3D0000
heap
page read and write
1060000
heap
page read and write
22A147AF000
heap
page read and write
22A25F2B000
trusted library allocation
page read and write
22A147A0000
heap
page read and write
22A21F93000
trusted library allocation
page read and write
22A277FE000
trusted library allocation
page read and write
22A20D32000
trusted library allocation
page read and write
22A25ED6000
trusted library allocation
page read and write
22A1474E000
heap
page read and write
22A2594C000
trusted library allocation
page read and write
22A1D07D000
heap
page read and write
22A1D6DF000
trusted library allocation
page read and write
22A27515000
trusted library allocation
page read and write
22A1D9F0000
trusted library allocation
page read and write
22A2012B000
trusted library allocation
page read and write
22A1D53C000
trusted library allocation
page read and write
22903B0D000
trusted library allocation
page read and write
22A1D0F8000
heap
page read and write
22A2019A000
trusted library allocation
page read and write
22A1DEE9000
trusted library allocation
page read and write
22903C60000
heap
page read and write
22A1474E000
heap
page read and write
212CA5FB000
trusted library allocation
page read and write
22A270FA000
trusted library allocation
page read and write
22A25C7A000
trusted library allocation
page read and write
22A26384000
trusted library allocation
page read and write
22A1DE69000
trusted library allocation
page read and write
22A260C9000
trusted library allocation
page read and write
22A25E1C000
trusted library allocation
page read and write
22A26A45000
trusted library allocation
page read and write
22A19090000
trusted library allocation
page read and write
22A27579000
trusted library allocation
page read and write
22A2015E000
trusted library allocation
page read and write
1B13D1C0000
unclassified section
page readonly
22A222A5000
trusted library allocation
page read and write
22A274B3000
trusted library allocation
page read and write
22A1EBA3000
trusted library allocation
page read and write
22A27657000
trusted library allocation
page read and write
22A200EA000
trusted library allocation
page read and write
22A19623000
trusted library allocation
page read and write
22A277DD000
trusted library allocation
page read and write
22A26067000
trusted library allocation
page read and write
22A1E79B000
trusted library allocation
page read and write
22A1E6C3000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A1E7B9000
trusted library allocation
page read and write
22A2604D000
trusted library allocation
page read and write
22A25ED4000
trusted library allocation
page read and write
1B13D66E000
trusted library allocation
page read and write
22A1CE85000
trusted library allocation
page read and write
22A25E45000
trusted library allocation
page read and write
C80000
heap
page read and write
22A1D59E000
trusted library allocation
page read and write
22A260B1000
trusted library allocation
page read and write
22A20DE7000
trusted library allocation
page read and write
22A203DE000
trusted library allocation
page read and write
22A27674000
trusted library allocation
page read and write
22A19676000
trusted library allocation
page read and write
22A270DC000
trusted library allocation
page read and write
22A25F24000
trusted library allocation
page read and write
22A1D678000
trusted library allocation
page read and write
22A25ED8000
trusted library allocation
page read and write
22A14721000
heap
page read and write
22A1F182000
trusted library allocation
page read and write
22A27063000
trusted library allocation
page read and write
22A1D43D000
trusted library allocation
page read and write
22A1DE57000
trusted library allocation
page read and write
22A1EB3F000
trusted library allocation
page read and write
22A274CA000
trusted library allocation
page read and write
22A1D6A8000
trusted library allocation
page read and write
22A274DC000
trusted library allocation
page read and write
22A1D087000
heap
page read and write
22A26096000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A25DDC000
trusted library allocation
page read and write
22A2743E000
trusted library allocation
page read and write
22A20DB3000
trusted library allocation
page read and write
22A2709C000
trusted library allocation
page read and write
22A1471A000
heap
page read and write
22A14737000
heap
page read and write
22A270AD000
trusted library allocation
page read and write
22A25E55000
trusted library allocation
page read and write
22A25F95000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A270E7000
trusted library allocation
page read and write
26957AF5000
heap
page read and write
22902D80000
heap
page readonly
22A1A854000
trusted library allocation
page read and write
22A27485000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A274A4000
trusted library allocation
page read and write
22A0F670000
heap
page read and write
22A26090000
trusted library allocation
page read and write
22A1EB8E000
trusted library allocation
page read and write
22A28E5B000
heap
page read and write
22A14780000
heap
page read and write
22A14737000
heap
page read and write
22A2777D000
trusted library allocation
page read and write
22A1D566000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A25E55000
trusted library allocation
page read and write
22A14720000
heap
page read and write
22A14739000
heap
page read and write
22A21FCD000
trusted library allocation
page read and write
417BF7B000
stack
page read and write
22A20127000
trusted library allocation
page read and write
22A14723000
heap
page read and write
22A1F68C000
trusted library allocation
page read and write
22A26033000
trusted library allocation
page read and write
22A25F6D000
trusted library allocation
page read and write
22A280A2000
trusted library allocation
page read and write
B7A83FB000
stack
page read and write
22A14728000
heap
page read and write
417F27E000
unkown
page readonly
22A147A7000
heap
page read and write
22A2744A000
trusted library allocation
page read and write
22A25868000
trusted library allocation
page read and write
22A260A4000
trusted library allocation
page read and write
22A26057000
trusted library allocation
page read and write
22A1CE69000
trusted library allocation
page read and write
22A25CED000
trusted library allocation
page read and write
22A1DDB8000
trusted library allocation
page read and write
22A26062000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A1CEF4000
trusted library allocation
page read and write
22A1477C000
heap
page read and write
1B13D666000
trusted library allocation
page read and write
22A21F6E000
trusted library allocation
page read and write
22A2595C000
trusted library allocation
page read and write
22A1E0D8000
trusted library allocation
page read and write
22A1F69D000
trusted library allocation
page read and write
22A1D698000
trusted library allocation
page read and write
22A14798000
heap
page read and write
22903154000
heap
page read and write
22A25DE8000
trusted library allocation
page read and write
22A1D5A5000
trusted library allocation
page read and write
5CE000
stack
page read and write
22A14737000
heap
page read and write
22A26070000
trusted library allocation
page read and write
22A1479A000
heap
page read and write
22A274F7000
trusted library allocation
page read and write
22A1DEA5000
trusted library allocation
page read and write
22A270BC000
trusted library allocation
page read and write
22A14730000
heap
page read and write
212CA360000
heap
page read and write
22A274EE000
trusted library allocation
page read and write
22A1DE9B000
trusted library allocation
page read and write
22A27426000
trusted library allocation
page read and write
22A14728000
heap
page read and write
22A14720000
heap
page read and write
22A25F16000
trusted library allocation
page read and write
22A27489000
trusted library allocation
page read and write
22A1D67D000
trusted library allocation
page read and write
22A147A3000
heap
page read and write
22A1A6DB000
trusted library allocation
page read and write
22A28107000
trusted library allocation
page read and write
22A14739000
heap
page read and write
22A25FC9000
trusted library allocation
page read and write
22A1F09C000
trusted library allocation
page read and write
22A14722000
heap
page read and write
22A1D07D000
heap
page read and write
22A260AD000
trusted library allocation
page read and write
22A25F6D000
trusted library allocation
page read and write
22A14737000
heap
page read and write
22A2777D000
trusted library allocation
page read and write
22A1479B000
heap
page read and write
22A2005B000
trusted library allocation
page read and write
22A25E84000
trusted library allocation
page read and write
22A25948000
trusted library allocation
page read and write
22A0F657000
heap
page read and write
22A14778000
heap
page read and write
22A21158000
trusted library allocation
page read and write
22A1D07D000
heap
page read and write
22A190B7000
trusted library allocation
page read and write
22A25831000
trusted library allocation
page read and write
There are 4030 hidden memdumps, click here to show them.