IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_8722b5ba-2626-408a-8bee-fba4cfc006cd.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_8722b5ba-2626-408a-8bee-fba4cfc006cd.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\b68abcef-09b3-4be7-9a66-c579c60be5da (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\b68abcef-09b3-4be7-9a66-c579c60be5da.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2288 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2216 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ad6e55d6-3507-42fc-a6ff-2bbf3adcec51} 7956 "\\.\pipe\gecko-crash-server-pipe.7956" 22b52e6ef10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3496 -parentBuildID 20230927232528 -prefsHandle 4208 -prefMapHandle 4220 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b3d612c-979a-427a-99fc-91fa3c906465} 7956 "\\.\pipe\gecko-crash-server-pipe.7956" 22b52e7bc10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5140 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5180 -prefMapHandle 5176 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52b8d9af-cf91-4aa6-9054-6272d401c2b9} 7956 "\\.\pipe\gecko-crash-server-pipe.7956" 22b642a8110 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1539075https://bugzilla.mozilla.org/show_bug.cgi?id=161
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://contile.services.mozilla.comP5
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
fp2e7a.wpc.phicdn.net
192.229.221.95
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.184.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.142
reddit.map.fastly.net
151.101.193.140
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 22 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
151.101.1.91
services.addons.mozilla.org
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
142.250.184.206
youtube.com
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
18C0000
heap
page read and write
malicious
22B6AAC8000
trusted library allocation
page read and write
22B631AA000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B6C6E4000
trusted library allocation
page read and write
22B654F4000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C61000
heap
page read and write
22B59C15000
heap
page read and write
22B6ECB5000
trusted library allocation
page read and write
22B640E7000
trusted library allocation
page read and write
22B639C0000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B63163000
trusted library allocation
page read and write
22B6EAF4000
trusted library allocation
page read and write
18DF000
heap
page read and write
22B636E5000
trusted library allocation
page read and write
22B6F933000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B59C37000
heap
page read and write
22B5FE6E000
trusted library allocation
page read and write
22541A00000
trusted library allocation
page read and write
22B64113000
trusted library allocation
page read and write
22B63D82000
trusted library allocation
page read and write
22B655D9000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B62B56000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B65683000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B6ECB5000
trusted library allocation
page read and write
22B6EDC5000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B640E7000
trusted library allocation
page read and write
22B642B3000
trusted library allocation
page read and write
22B605B1000
heap
page read and write
22B650EF000
trusted library allocation
page read and write
22B6FAD4000
trusted library allocation
page read and write
22B641B7000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B59BD4000
heap
page read and write
D6A867E000
stack
page read and write
22B63532000
trusted library allocation
page read and write
22B640E7000
trusted library allocation
page read and write
22B6C6F4000
trusted library allocation
page read and write
22B65722000
trusted library allocation
page read and write
22B64F9B000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B64774000
trusted library allocation
page read and write
22B6418C000
trusted library allocation
page read and write
22B644A6000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B640D8000
trusted library allocation
page read and write
22B6F93D000
trusted library allocation
page read and write
22B6E790000
trusted library allocation
page read and write
22B5FE9F000
trusted library allocation
page read and write
22B64605000
trusted library allocation
page read and write
22B6B08B000
trusted library allocation
page read and write
F24000
heap
page read and write
22B6C23A000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6EC71000
trusted library allocation
page read and write
22B65174000
trusted library allocation
page read and write
22B655D0000
trusted library allocation
page read and write
22B59C61000
heap
page read and write
22B59C4D000
heap
page read and write
22B59C0A000
heap
page read and write
22B59C2F000
heap
page read and write
22B648C3000
trusted library allocation
page read and write
22B605A7000
heap
page read and write
22B635C3000
trusted library allocation
page read and write
1E48BA5C000
heap
page read and write
22B62C69000
trusted library allocation
page read and write
22B6C66D000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B59C03000
heap
page read and write
22B65070000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B6FA8F000
trusted library allocation
page read and write
266A2708000
heap
page read and write
22B6ABBC000
trusted library allocation
page read and write
22B642CD000
trusted library allocation
page read and write
22B631FA000
trusted library allocation
page read and write
22B640B0000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6D307000
trusted library allocation
page read and write
22B639DE000
trusted library allocation
page read and write
22B59C5A000
heap
page read and write
22B6410B000
trusted library allocation
page read and write
22B650DD000
trusted library allocation
page read and write
22B63CCE000
trusted library allocation
page read and write
22B605C0000
heap
page read and write
22B59C00000
heap
page read and write
22B62C75000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B631E9000
trusted library allocation
page read and write
22B666FB000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B6574D000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
266A2500000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B631D4000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6B0F7000
trusted library allocation
page read and write
22B655C9000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
22B63FC2000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
22B59C2E000
heap
page read and write
22B640DC000
trusted library allocation
page read and write
17BF000
stack
page read and write
22B641F0000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B63DB1000
trusted library allocation
page read and write
22B634C1000
trusted library allocation
page read and write
225414E3000
heap
page read and write
22B640FA000
trusted library allocation
page read and write
22B6C6C8000
trusted library allocation
page read and write
22B637BB000
trusted library allocation
page read and write
1E48BB77000
heap
page read and write
22B63D44000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B63C4F000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59C15000
heap
page read and write
22B6319F000
trusted library allocation
page read and write
22B631A3000
trusted library allocation
page read and write
22B6ECC9000
trusted library allocation
page read and write
22B59C09000
heap
page read and write
22B59C11000
heap
page read and write
22B634E6000
trusted library allocation
page read and write
22B631BA000
trusted library allocation
page read and write
18DF000
heap
page read and write
22B6EDA4000
trusted library allocation
page read and write
22B5E5B3000
trusted library allocation
page read and write
22B6ABA2000
trusted library allocation
page read and write
22B6C6A3000
trusted library allocation
page read and write
22B655FA000
trusted library allocation
page read and write
22B5FBDF000
trusted library allocation
page read and write
22B6AD9D000
trusted library allocation
page read and write
22B6423B000
trusted library allocation
page read and write
1E48B911000
trusted library allocation
page read and write
22B6F93C000
trusted library allocation
page read and write
22B64EC1000
trusted library allocation
page read and write
22B59C29000
heap
page read and write
1E48B400000
trusted library section
page readonly
22B59C0B000
heap
page read and write
22B641E2000
trusted library allocation
page read and write
22B64291000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B663FD000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B64153000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B64EF2000
trusted library allocation
page read and write
22B6B0BD000
trusted library allocation
page read and write
22B62C63000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6C265000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B65476000
trusted library allocation
page read and write
1E48BB69000
heap
page read and write
22B6408F000
trusted library allocation
page read and write
22B6D343000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
1E48B3C0000
unclassified section
page read and write
22B63159000
trusted library allocation
page read and write
22B6C6CE000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B647B2000
trusted library allocation
page read and write
22B640D1000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B65464000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B63AB6000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B63CAC000
trusted library allocation
page read and write
1E48BAE0000
heap
page read and write
22B59C37000
heap
page read and write
22B635F3000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6C6D8000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B6AEC1000
trusted library allocation
page read and write
22B6ACF0000
trusted library allocation
page read and write
22B63490000
trusted library allocation
page read and write
22B65774000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B59C11000
heap
page read and write
22B63C30000
trusted library allocation
page read and write
22B648B0000
trusted library allocation
page read and write
22B6ADF5000
trusted library allocation
page read and write
22B6C6C5000
trusted library allocation
page read and write
95899FE000
stack
page read and write
22B59BF0000
heap
page read and write
22B6AD8A000
trusted library allocation
page read and write
22B5FEBC000
trusted library allocation
page read and write
22B6C88C000
trusted library allocation
page read and write
22B63C3B000
trusted library allocation
page read and write
22B661E0000
trusted library allocation
page read and write
22B6FA7C000
trusted library allocation
page read and write
22B59C2D000
heap
page read and write
22B59C07000
heap
page read and write
22B59BEA000
heap
page read and write
22B6ABBA000
trusted library allocation
page read and write
22B6AB60000
trusted library allocation
page read and write
22B59C0F000
heap
page read and write
22B59C11000
heap
page read and write
22B65080000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B6C218000
trusted library allocation
page read and write
22B64446000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B650C5000
trusted library allocation
page read and write
22B6AEFC000
trusted library allocation
page read and write
1E48BAFD000
heap
page read and write
22B6F862000
trusted library allocation
page read and write
22B63144000
trusted library allocation
page read and write
22B6395E000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B62B9F000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B59C12000
heap
page read and write
22B653F1000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B656A7000
trusted library allocation
page read and write
22B644A2000
trusted library allocation
page read and write
22B6EDE9000
trusted library allocation
page read and write
22B6406B000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B648B5000
trusted library allocation
page read and write
22B641E9000
trusted library allocation
page read and write
22B605B6000
heap
page read and write
22B63CCE000
trusted library allocation
page read and write
22B642F6000
trusted library allocation
page read and write
22B605BA000
heap
page read and write
22B62CD3000
trusted library allocation
page read and write
22B65099000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B6F925000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B59C1C000
heap
page read and write
22B6567B000
trusted library allocation
page read and write
22B6482D000
trusted library allocation
page read and write
22B66156000
trusted library allocation
page read and write
D6A5B88000
stack
page read and write
22B654BC000
trusted library allocation
page read and write
22B62DB0000
trusted library allocation
page read and write
22B6C6CF000
trusted library allocation
page read and write
22B5EFD6000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B6ABC6000
trusted library allocation
page read and write
22B6ECB7000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B634FD000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6B0B1000
trusted library allocation
page read and write
22B661F8000
trusted library allocation
page read and write
22B64750000
trusted library allocation
page read and write
22B6EE47000
heap
page read and write
22B6C672000
trusted library allocation
page read and write
22B6AAA2000
trusted library allocation
page read and write
22B641F0000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B647E5000
trusted library allocation
page read and write
22B5EC1E000
trusted library allocation
page read and write
22B66633000
trusted library allocation
page read and write
22B605B4000
heap
page read and write
22B6ABBA000
trusted library allocation
page read and write
22B6EB88000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B6AB3B000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B631A3000
trusted library allocation
page read and write
22B65630000
trusted library allocation
page read and write
22B655CE000
trusted library allocation
page read and write
22B6ABA4000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B634E6000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
21F4BE20000
heap
page read and write
22B6B0DA000
trusted library allocation
page read and write
22B63DA1000
trusted library allocation
page read and write
F20000
heap
page read and write
22B59C62000
heap
page read and write
22B650ED000
trusted library allocation
page read and write
22B6ADEC000
trusted library allocation
page read and write
266A25E7000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B5EF3E000
trusted library allocation
page read and write
22B650CD000
trusted library allocation
page read and write
22B6AE52000
trusted library allocation
page read and write
22B59C0D000
heap
page read and write
22B6F8F7000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B64755000
trusted library allocation
page read and write
22B63C89000
trusted library allocation
page read and write
22B6AEE9000
trusted library allocation
page read and write
22B650A5000
trusted library allocation
page read and write
22B636F6000
trusted library allocation
page read and write
22B648FD000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
1E48BAEB000
heap
page read and write
22B637EF000
trusted library allocation
page read and write
22B6B0CD000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B640BF000
trusted library allocation
page read and write
22B5EFE8000
trusted library allocation
page read and write
22B657F0000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B63C94000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6AC99000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B657AB000
trusted library allocation
page read and write
22B6E765000
trusted library allocation
page read and write
22B640FA000
trusted library allocation
page read and write
42C75FC000
stack
page read and write
22B59BF0000
heap
page read and write
22B59C02000
heap
page read and write
22B650EA000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B59C11000
heap
page read and write
22B66695000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
22B654BC000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
1E48AC70000
heap
page read and write
22B59C32000
heap
page read and write
22B65082000
trusted library allocation
page read and write
22B64E54000
trusted library allocation
page read and write
22B6C68C000
trusted library allocation
page read and write
22B64315000
trusted library allocation
page read and write
1E48AE0C000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
1094000
unkown
page readonly
22B65211000
trusted library allocation
page read and write
22B6403A000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6365B000
trusted library allocation
page read and write
22B631D4000
trusted library allocation
page read and write
266A23A0000
heap
page read and write
22B59BF1000
heap
page read and write
22B59C00000
heap
page read and write
22B640B4000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B6AEF2000
trusted library allocation
page read and write
1E48BB3B000
heap
page read and write
1E48BA60000
heap
page read and write
22B64FF3000
trusted library allocation
page read and write
225413D0000
heap
page read and write
22B6C6A3000
trusted library allocation
page read and write
22B631BA000
trusted library allocation
page read and write
22B631AA000
trusted library allocation
page read and write
22B6B096000
trusted library allocation
page read and write
22B59BF5000
heap
page read and write
22B59C12000
heap
page read and write
22B634EF000
trusted library allocation
page read and write
22B610C4000
trusted library allocation
page read and write
22B59C2D000
heap
page read and write
22B59C2E000
heap
page read and write
22B65392000
trusted library allocation
page read and write
266A2220000
unclassified section
page read and write
22B59BF0000
heap
page read and write
22B644A6000
trusted library allocation
page read and write
1E48AE5C000
trusted library allocation
page read and write
22B59BD3000
heap
page read and write
22B6311E000
trusted library allocation
page read and write
22B59BD4000
heap
page read and write
22B6E762000
trusted library allocation
page read and write
22B59BE5000
heap
page read and write
22B66166000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B59C2E000
heap
page read and write
22B6ACF0000
trusted library allocation
page read and write
22B6484E000
trusted library allocation
page read and write
22B6F94A000
trusted library allocation
page read and write
22B62B7A000
trusted library allocation
page read and write
22B5EBF6000
trusted library allocation
page read and write
22B6EE9B000
heap
page read and write
22B654EF000
trusted library allocation
page read and write
22B65180000
trusted library allocation
page read and write
324437D000
stack
page read and write
22B6CB62000
trusted library allocation
page read and write
22B59C05000
heap
page read and write
22B59C07000
heap
page read and write
22B655EA000
trusted library allocation
page read and write
22B63CCD000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B6C6D3000
trusted library allocation
page read and write
17FE000
stack
page read and write
22B59C11000
heap
page read and write
22B59C37000
heap
page read and write
22B63C58000
trusted library allocation
page read and write
22B6524F000
trusted library allocation
page read and write
22B6C6DB000
trusted library allocation
page read and write
22B62B6B000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6059E000
heap
page read and write
22B62B9F000
trusted library allocation
page read and write
22B650ED000
trusted library allocation
page read and write
22B6B0B5000
trusted library allocation
page read and write
22B643BF000
trusted library allocation
page read and write
22B6B300000
trusted library allocation
page read and write
22B605B9000
heap
page read and write
22B640C8000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
95889D8000
stack
page read and write
22B64E7B000
trusted library allocation
page read and write
22B6B08B000
trusted library allocation
page read and write
22B63A24000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6415F000
trusted library allocation
page read and write
22B64253000
trusted library allocation
page read and write
22B637DF000
trusted library allocation
page read and write
22B6C6F2000
trusted library allocation
page read and write
266A2572000
trusted library allocation
page read and write
22B6AB60000
trusted library allocation
page read and write
22B6543B000
trusted library allocation
page read and write
22B664E5000
trusted library allocation
page read and write
22B64851000
trusted library allocation
page read and write
22B6ABBC000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B6AE20000
trusted library allocation
page read and write
22B6447C000
trusted library allocation
page read and write
22B59C3C000
heap
page read and write
22B59C25000
heap
page read and write
22B64119000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B6B0B7000
trusted library allocation
page read and write
22B664F6000
trusted library allocation
page read and write
22B650DD000
trusted library allocation
page read and write
22B655FE000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B59C0E000
heap
page read and write
22B59C5F000
heap
page read and write
958A1FE000
unkown
page readonly
22B63727000
trusted library allocation
page read and write
22B6CB4E000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C57000
heap
page read and write
22B6EBAA000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B6F872000
trusted library allocation
page read and write
22B641F9000
trusted library allocation
page read and write
22B639EA000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B641EC000
trusted library allocation
page read and write
22B63C53000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B62FAF000
trusted library allocation
page read and write
22B63D67000
trusted library allocation
page read and write
22B64462000
trusted library allocation
page read and write
22B64449000
trusted library allocation
page read and write
22B63155000
trusted library allocation
page read and write
22B605BA000
heap
page read and write
22B6B0F7000
trusted library allocation
page read and write
22B6415A000
trusted library allocation
page read and write
22B5FEA4000
trusted library allocation
page read and write
22B59C58000
heap
page read and write
22B640CF000
trusted library allocation
page read and write
22B59BD6000
heap
page read and write
22B640D1000
trusted library allocation
page read and write
22B6EA9D000
trusted library allocation
page read and write
22B6313E000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B6EDD7000
trusted library allocation
page read and write
22B67802000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B6FA92000
trusted library allocation
page read and write
22B641E2000
trusted library allocation
page read and write
22B6C6EA000
trusted library allocation
page read and write
22B6D406000
trusted library allocation
page read and write
22B59C01000
heap
page read and write
22B63649000
trusted library allocation
page read and write
22B644C9000
trusted library allocation
page read and write
1C279040000
heap
page read and write
22B6D2C8000
trusted library allocation
page read and write
22B5FD98000
trusted library allocation
page read and write
22B59C5A000
heap
page read and write
22B59BED000
heap
page read and write
1E48B4C0000
heap
page read and write
22B64323000
trusted library allocation
page read and write
22B634C9000
trusted library allocation
page read and write
22B63D05000
trusted library allocation
page read and write
22B6ACF9000
trusted library allocation
page read and write
22B59C63000
heap
page read and write
22B59C5C000
heap
page read and write
22B59C1B000
heap
page read and write
1094000
unkown
page readonly
324433E000
unkown
page readonly
22B605C0000
heap
page read and write
22B650CD000
trusted library allocation
page read and write
22B647EB000
trusted library allocation
page read and write
22B605BE000
heap
page read and write
22B59BEA000
heap
page read and write
22B6AB29000
trusted library allocation
page read and write
22B6EDD0000
trusted library allocation
page read and write
22B6ADDB000
trusted library allocation
page read and write
21F4BF60000
heap
page read and write
22B634E6000
trusted library allocation
page read and write
22B65280000
trusted library allocation
page read and write
22B666D3000
trusted library allocation
page read and write
22B6411E000
trusted library allocation
page read and write
266A21DA000
heap
page read and write
22B6AEC3000
trusted library allocation
page read and write
22B648B5000
trusted library allocation
page read and write
266A1FC0000
unclassified section
page readonly
22B59C57000
heap
page read and write
22B605A7000
heap
page read and write
22541749000
trusted library allocation
page read and write
22B644CE000
trusted library allocation
page read and write
209D000
stack
page read and write
22B59C15000
heap
page read and write
22B655D9000
trusted library allocation
page read and write
22B654BC000
trusted library allocation
page read and write
22B63AAE000
trusted library allocation
page read and write
22B6107A000
trusted library allocation
page read and write
22B6FAA3000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B652F2000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
6B8E3FF000
stack
page read and write
22B6AEE7000
trusted library allocation
page read and write
22B631C1000
trusted library allocation
page read and write
108C000
unkown
page write copy
22B655C1000
trusted library allocation
page read and write
22B6EABB000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C11000
heap
page read and write
22B6AE8E000
trusted library allocation
page read and write
22B6C69E000
trusted library allocation
page read and write
22B635EF000
trusted library allocation
page read and write
22B63AA0000
trusted library allocation
page read and write
22B661EC000
trusted library allocation
page read and write
22B6AAC8000
trusted library allocation
page read and write
22B6CBC3000
trusted library allocation
page read and write
22B640FA000
trusted library allocation
page read and write
22B653DD000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B6C6D1000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B59C1F000
heap
page read and write
22B640CD000
trusted library allocation
page read and write
22B664E9000
trusted library allocation
page read and write
22B651D2000
trusted library allocation
page read and write
22B6AB6C000
trusted library allocation
page read and write
22B663C9000
trusted library allocation
page read and write
22B605B9000
heap
page read and write
22B64099000
trusted library allocation
page read and write
1E48BA7D000
heap
page read and write
22B605B6000
heap
page read and write
22541703000
trusted library allocation
page read and write
22B65693000
trusted library allocation
page read and write
22B64051000
trusted library allocation
page read and write
22B64061000
trusted library allocation
page read and write
22B655EA000
trusted library allocation
page read and write
22B59C17000
heap
page read and write
22B5EB76000
trusted library allocation
page read and write
22B62B84000
trusted library allocation
page read and write
266A261A000
trusted library allocation
page read and write
22B6AD29000
trusted library allocation
page read and write
22B644AA000
trusted library allocation
page read and write
1E48BB2D000
heap
page read and write
22B655CC000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6C6C8000
trusted library allocation
page read and write
22B605B4000
heap
page read and write
22B6EDD0000
trusted library allocation
page read and write
22B6AECA000
trusted library allocation
page read and write
22B63D32000
trusted library allocation
page read and write
22B661D8000
trusted library allocation
page read and write
1CF378E24000
trusted library allocation
page read and write
266A2250000
unclassified section
page readonly
22B59C2E000
heap
page read and write
22B62C85000
trusted library allocation
page read and write
22B63CC9000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B5FB4E000
trusted library allocation
page read and write
22B6D3E4000
trusted library allocation
page read and write
22B6C6C8000
trusted library allocation
page read and write
22B640DE000
trusted library allocation
page read and write
22B6C827000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6528A000
trusted library allocation
page read and write
22B59C1F000
heap
page read and write
22B63199000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B59C5A000
heap
page read and write
22B605B0000
heap
page read and write
22B59C2E000
heap
page read and write
17EF000
stack
page read and write
22B59C5C000
heap
page read and write
22B59C31000
heap
page read and write
22B64488000
trusted library allocation
page read and write
22B656AF000
trusted library allocation
page read and write
22B64420000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B6ABBE000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B6AE7F000
trusted library allocation
page read and write
22B6AEE7000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B65476000
trusted library allocation
page read and write
22B63CC9000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B59C1B000
heap
page read and write
22B6B0AF000
trusted library allocation
page read and write
22B631AA000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B62D49000
trusted library allocation
page read and write
22B59C5A000
heap
page read and write
1E48BAE6000
heap
page read and write
1E48AE75000
trusted library allocation
page read and write
22B64191000
trusted library allocation
page read and write
22B605B7000
heap
page read and write
22B631D4000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6ACBF000
trusted library allocation
page read and write
22B63199000
trusted library allocation
page read and write
22B63142000
trusted library allocation
page read and write
18DF000
heap
page read and write
22B6EAEE000
trusted library allocation
page read and write
22B64759000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B59C09000
heap
page read and write
22B5FDE8000
trusted library allocation
page read and write
22B637E5000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B605B9000
heap
page read and write
22541770000
trusted library allocation
page read and write
22B59BD4000
heap
page read and write
22B59C31000
heap
page read and write
22B6B0C9000
trusted library allocation
page read and write
22B655B7000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59C1B000
heap
page read and write
22B631C6000
trusted library allocation
page read and write
22B63C65000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B59C5C000
heap
page read and write
22B63C9E000
trusted library allocation
page read and write
22B63C4B000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
266A2512000
trusted library allocation
page read and write
22B6C699000
trusted library allocation
page read and write
22B59C1E000
heap
page read and write
22B6C6F7000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B59C11000
heap
page read and write
266A261D000
trusted library allocation
page read and write
22B6AEF8000
trusted library allocation
page read and write
22B6B09F000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B62B83000
trusted library allocation
page read and write
266A21D0000
heap
page read and write
266A255D000
trusted library allocation
page read and write
22B645CD000
trusted library allocation
page read and write
22B64737000
trusted library allocation
page read and write
22B64422000
trusted library allocation
page read and write
22B6ACD2000
trusted library allocation
page read and write
22B6319F000
trusted library allocation
page read and write
22B6CB9D000
trusted library allocation
page read and write
22B60390000
trusted library allocation
page read and write
22B6AEF6000
trusted library allocation
page read and write
22B6B01F000
trusted library allocation
page read and write
22B6ADEC000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B59C12000
heap
page read and write
22B59C02000
heap
page read and write
22B59C57000
heap
page read and write
22B64795000
trusted library allocation
page read and write
22B6EDC9000
trusted library allocation
page read and write
D6A7E7E000
unkown
page readonly
22B59C07000
heap
page read and write
22B59C07000
heap
page read and write
22B6346C000
trusted library allocation
page read and write
22B63483000
trusted library allocation
page read and write
22B5FD91000
trusted library allocation
page read and write
22B6AACC000
trusted library allocation
page read and write
E7E000
stack
page read and write
22B635E4000
trusted library allocation
page read and write
22B653E2000
trusted library allocation
page read and write
21F4BE72000
heap
page read and write
22B63638000
trusted library allocation
page read and write
22B6D2E5000
trusted library allocation
page read and write
266A2594000
trusted library allocation
page read and write
22B6F925000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B59C4D000
heap
page read and write
22B64CEF000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59C62000
heap
page read and write
22B661F8000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B6619A000
trusted library allocation
page read and write
22B63199000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B59C31000
heap
page read and write
22B640FA000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B6AD3B000
trusted library allocation
page read and write
22B656A4000
trusted library allocation
page read and write
22B59C25000
heap
page read and write
22B6EBAC000
trusted library allocation
page read and write
22B66386000
trusted library allocation
page read and write
22B655FC000
trusted library allocation
page read and write
22B63193000
trusted library allocation
page read and write
22B6B053000
trusted library allocation
page read and write
22B605B1000
heap
page read and write
22B66179000
trusted library allocation
page read and write
22B6546C000
trusted library allocation
page read and write
22B654CB000
trusted library allocation
page read and write
22B640DE000
trusted library allocation
page read and write
22B59C2D000
heap
page read and write
22B65663000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6EDA1000
trusted library allocation
page read and write
22B59C61000
heap
page read and write
22B59C5A000
heap
page read and write
22B6AB35000
trusted library allocation
page read and write
22B65441000
trusted library allocation
page read and write
22B6B0F2000
trusted library allocation
page read and write
22B6E720000
trusted library allocation
page read and write
22B6B092000
trusted library allocation
page read and write
22B631E4000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B6EC99000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
1E48BB77000
heap
page read and write
22B6525B000
trusted library allocation
page read and write
22B605A7000
heap
page read and write
1E48AE0A000
trusted library allocation
page read and write
22B59BD9000
heap
page read and write
22B60DB0000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B59BFD000
heap
page read and write
22B6689E000
trusted library allocation
page read and write
22B640B0000
trusted library allocation
page read and write
22B640E7000
trusted library allocation
page read and write
22B6B0CB000
trusted library allocation
page read and write
22B6559C000
trusted library allocation
page read and write
22B6371B000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B631DC000
trusted library allocation
page read and write
22B642B5000
trusted library allocation
page read and write
22B63594000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6316F000
trusted library allocation
page read and write
22B5FF22000
trusted library allocation
page read and write
22B605B7000
heap
page read and write
22B64030000
trusted library allocation
page read and write
22B640D1000
trusted library allocation
page read and write
22B6C241000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B59C5A000
heap
page read and write
EC0000
heap
page read and write
22B64795000
trusted library allocation
page read and write
22B6FA75000
trusted library allocation
page read and write
22B59BF5000
heap
page read and write
22B59C0B000
heap
page read and write
1E48BB59000
heap
page read and write
22B63D5D000
trusted library allocation
page read and write
22B653F1000
trusted library allocation
page read and write
266A22D6000
heap
page read and write
22B6ECFE000
trusted library allocation
page read and write
22B655CE000
trusted library allocation
page read and write
1E48BB77000
heap
page read and write
22B64199000
trusted library allocation
page read and write
22B6573F000
trusted library allocation
page read and write
22B6AD9F000
trusted library allocation
page read and write
22B63498000
trusted library allocation
page read and write
22B6034B000
trusted library allocation
page read and write
22B66374000
trusted library allocation
page read and write
22B6C62A000
trusted library allocation
page read and write
22B6AB82000
trusted library allocation
page read and write
22B59BEF000
heap
page read and write
22B6546C000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B59C2E000
heap
page read and write
22B6485D000
trusted library allocation
page read and write
22B640EB000
trusted library allocation
page read and write
22B64147000
trusted library allocation
page read and write
22B6C8D5000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B59C11000
heap
page read and write
22B6639D000
trusted library allocation
page read and write
22B652EC000
trusted library allocation
page read and write
1E48BA60000
heap
page read and write
266A2210000
heap
page readonly
22B59BD4000
heap
page read and write
1E48AEBC000
trusted library allocation
page read and write
22B605B8000
heap
page read and write
22B6B0B7000
trusted library allocation
page read and write
22B5E5EF000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B640E7000
trusted library allocation
page read and write
22B631B2000
trusted library allocation
page read and write
22B66630000
trusted library allocation
page read and write
22B65296000
trusted library allocation
page read and write
1E48BA8A000
heap
page read and write
22B59C31000
heap
page read and write
22B65798000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B59C4D000
heap
page read and write
22B6AAD0000
trusted library allocation
page read and write
22B65193000
trusted library allocation
page read and write
22B634EF000
trusted library allocation
page read and write
22B6EDE9000
trusted library allocation
page read and write
22B6ED8D000
trusted library allocation
page read and write
22B605BA000
heap
page read and write
22B59C0A000
heap
page read and write
22B605C3000
heap
page read and write
22B64147000
trusted library allocation
page read and write
22B6EDE2000
trusted library allocation
page read and write
3D31000
heap
page read and write
22B59C02000
heap
page read and write
22B634C9000
trusted library allocation
page read and write
22B640FA000
trusted library allocation
page read and write
22B666E3000
trusted library allocation
page read and write
22B63FFE000
trusted library allocation
page read and write
22B605DE000
heap
page read and write
22B60327000
trusted library allocation
page read and write
22B62C7D000
trusted library allocation
page read and write
1E48BB79000
heap
page read and write
1E48BB77000
heap
page read and write
22B6B092000
trusted library allocation
page read and write
22B6ECA1000
trusted library allocation
page read and write
22B637E9000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B6ABC2000
trusted library allocation
page read and write
22B62C5F000
trusted library allocation
page read and write
22B6508D000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B640E5000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B59BF0000
heap
page read and write
22B6C400000
trusted library allocation
page read and write
22B6C6C8000
trusted library allocation
page read and write
22B62DC4000
trusted library allocation
page read and write
22B6AE96000
trusted library allocation
page read and write
22B6AEB0000
trusted library allocation
page read and write
22B6D3A7000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C62000
heap
page read and write
22B59C5C000
heap
page read and write
22B6AAAB000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
3E30000
heap
page read and write
22B6319F000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
1E48BAA8000
heap
page read and write
22B6F95D000
trusted library allocation
page read and write
22B64499000
trusted library allocation
page read and write
22B6ABBE000
trusted library allocation
page read and write
22B631FA000
trusted library allocation
page read and write
22B6AAB6000
trusted library allocation
page read and write
22B6ADDB000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B64127000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B59BFD000
heap
page read and write
22B637A8000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B59C1C000
heap
page read and write
22B656CD000
trusted library allocation
page read and write
22B63483000
trusted library allocation
page read and write
22B648B5000
trusted library allocation
page read and write
22B63643000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B6459D000
trusted library allocation
page read and write
22B640E5000
trusted library allocation
page read and write
22B6ACC1000
trusted library allocation
page read and write
22B652AA000
trusted library allocation
page read and write
22B6ADA3000
trusted library allocation
page read and write
22B634B9000
trusted library allocation
page read and write
22B6404A000
trusted library allocation
page read and write
22B651EE000
trusted library allocation
page read and write
1E48AEC2000
trusted library allocation
page read and write
22B60DE9000
trusted library allocation
page read and write
22B6F93B000
trusted library allocation
page read and write
22B6B0FD000
trusted library allocation
page read and write
22B59C29000
heap
page read and write
22B6EC71000
trusted library allocation
page read and write
22B648C3000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59BED000
heap
page read and write
22B59C37000
heap
page read and write
22B59C1B000
heap
page read and write
22B605BA000
heap
page read and write
22B6CB86000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B6B0C9000
trusted library allocation
page read and write
22B6EB96000
trusted library allocation
page read and write
22B6EAF0000
trusted library allocation
page read and write
22B63C4F000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B631CC000
trusted library allocation
page read and write
22B640B0000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B6E7F1000
trusted library allocation
page read and write
22B6F968000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
22B6AB1F000
trusted library allocation
page read and write
22B6EAF2000
trusted library allocation
page read and write
22B59BF4000
heap
page read and write
22B605B9000
heap
page read and write
22B64437000
trusted library allocation
page read and write
22B6C66C000
trusted library allocation
page read and write
22B650F1000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6EAFD000
trusted library allocation
page read and write
22B5EFD2000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B59C36000
heap
page read and write
22B63CFE000
trusted library allocation
page read and write
22B652C2000
trusted library allocation
page read and write
1E48BB69000
heap
page read and write
22B6AE21000
trusted library allocation
page read and write
22B6AAC4000
trusted library allocation
page read and write
22B64D97000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
D6A5B0E000
unkown
page readonly
22B59C36000
heap
page read and write
22B654B6000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B59C4D000
heap
page read and write
1E48BAE3000
heap
page read and write
22B65082000
trusted library allocation
page read and write
22B648FD000
trusted library allocation
page read and write
22B605AF000
heap
page read and write
22B6459A000
trusted library allocation
page read and write
22B6363F000
trusted library allocation
page read and write
22B6AE82000
trusted library allocation
page read and write
22B59C16000
heap
page read and write
22B62BA6000
trusted library allocation
page read and write
22B59C3C000
heap
page read and write
22B59C37000
heap
page read and write
22B640D1000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
1E48BB77000
heap
page read and write
22B6502E000
trusted library allocation
page read and write
18E5000
heap
page read and write
22B6ACE2000
trusted library allocation
page read and write
17DB000
stack
page read and write
22B63479000
trusted library allocation
page read and write
22B60306000
trusted library allocation
page read and write
22B64450000
trusted library allocation
page read and write
22B648E5000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6ABD4000
trusted library allocation
page read and write
22B6C7C7000
trusted library allocation
page read and write
22B647F6000
trusted library allocation
page read and write
22B6414B000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B59BFD000
heap
page read and write
22B640AE000
trusted library allocation
page read and write
22B646D5000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B59BEA000
heap
page read and write
22B59C0B000
heap
page read and write
22B59C57000
heap
page read and write
22B640DC000
trusted library allocation
page read and write
22B6C69C000
trusted library allocation
page read and write
22B605B7000
heap
page read and write
22B64E95000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B59C02000
heap
page read and write
22B6AB12000
trusted library allocation
page read and write
22B59BE5000
heap
page read and write
22B62B3E000
trusted library allocation
page read and write
22B64CC7000
trusted library allocation
page read and write
FC1000
unkown
page execute read
22B59BED000
heap
page read and write
22B6B089000
trusted library allocation
page read and write
22B59C05000
heap
page read and write
22B59C62000
heap
page read and write
1E48BAE0000
heap
page read and write
22B65785000
trusted library allocation
page read and write
22B6403D000
trusted library allocation
page read and write
22B59C61000
heap
page read and write
22B59C07000
heap
page read and write
22B59C57000
heap
page read and write
1E48BB44000
heap
page read and write
22B59C31000
heap
page read and write
22B6528A000
trusted library allocation
page read and write
22B6AECA000
trusted library allocation
page read and write
22B59C1F000
heap
page read and write
22B6ADEC000
trusted library allocation
page read and write
1E48BA09000
heap
page read and write
22B6EDC5000
trusted library allocation
page read and write
22B64099000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B6034B000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B5FBD6000
trusted library allocation
page read and write
22B6E7E8000
trusted library allocation
page read and write
22B6ABCB000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B6661D000
trusted library allocation
page read and write
22B6B092000
trusted library allocation
page read and write
22B6EAFD000
trusted library allocation
page read and write
22B6406B000
trusted library allocation
page read and write
22B6EAF6000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59C31000
heap
page read and write
22B59C14000
heap
page read and write
22B6EAF6000
trusted library allocation
page read and write
22B64077000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B646CA000
trusted library allocation
page read and write
22B59C25000
heap
page read and write
22B59C37000
heap
page read and write
22541390000
remote allocation
page read and write
22B59C1C000
heap
page read and write
22B6C6A8000
trusted library allocation
page read and write
22B644B8000
trusted library allocation
page read and write
1E48B450000
trusted library allocation
page read and write
22B60347000
trusted library allocation
page read and write
22B5FBFB000
trusted library allocation
page read and write
22B6ADEA000
trusted library allocation
page read and write
22B634FB000
trusted library allocation
page read and write
22B635A9000
trusted library allocation
page read and write
22B6346E000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B65785000
trusted library allocation
page read and write
22B644C9000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
1E48BA5F000
heap
page read and write
22B6ECD8000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B59C1E000
heap
page read and write
22B63D44000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B605BA000
heap
page read and write
22B6405E000
trusted library allocation
page read and write
22B6315C000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
1E48AE81000
trusted library allocation
page read and write
22B6346C000
trusted library allocation
page read and write
22B63428000
trusted library allocation
page read and write
22B631D4000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6E71E000
trusted library allocation
page read and write
21F4D9E6000
heap
page read and write
22B650E5000
trusted library allocation
page read and write
22B6487F000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6C6B8000
trusted library allocation
page read and write
22B63C3F000
trusted library allocation
page read and write
22B640DC000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59BFD000
heap
page read and write
22B59C37000
heap
page read and write
266A1FD0000
unclassified section
page readonly
22B5FBEA000
trusted library allocation
page read and write
22B63665000
trusted library allocation
page read and write
22B5FBDF000
trusted library allocation
page read and write
22B6ACBA000
trusted library allocation
page read and write
22B66188000
trusted library allocation
page read and write
22B6AE7F000
trusted library allocation
page read and write
22B6EDD0000
trusted library allocation
page read and write
22B5EC66000
trusted library allocation
page read and write
22B59C5A000
heap
page read and write
22B59C5A000
heap
page read and write
266A25B7000
trusted library allocation
page read and write
22B6D348000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B6C81A000
trusted library allocation
page read and write
22B6F907000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B60598000
heap
page read and write
22B66192000
trusted library allocation
page read and write
22B6AB3C000
trusted library allocation
page read and write
22B6ED69000
trusted library allocation
page read and write
1E48AC7A000
heap
page read and write
1E48B906000
trusted library allocation
page read and write
22B59BE9000
heap
page read and write
22B59C27000
heap
page read and write
22B59BFD000
heap
page read and write
1E48BB22000
heap
page read and write
21F4BE50000
heap
page read and write
22B59C00000
heap
page read and write
22B645F1000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B63476000
trusted library allocation
page read and write
22B6C78E000
trusted library allocation
page read and write
22B641F0000
trusted library allocation
page read and write
22B64063000
trusted library allocation
page read and write
22B59BF9000
heap
page read and write
958A2FE000
unkown
page readonly
22B59BF0000
heap
page read and write
22B59BF1000
heap
page read and write
D6A7DFE000
unkown
page readonly
22B64865000
trusted library allocation
page read and write
22B64063000
trusted library allocation
page read and write
22B59C29000
heap
page read and write
22B6ABB7000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6EDE2000
trusted library allocation
page read and write
22B664D5000
trusted library allocation
page read and write
22B65214000
trusted library allocation
page read and write
D6A5BCE000
stack
page read and write
22B65683000
trusted library allocation
page read and write
22B6C635000
trusted library allocation
page read and write
22B6C6DB000
trusted library allocation
page read and write
22B640FE000
trusted library allocation
page read and write
22B59C28000
heap
page read and write
22B641BE000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B6417F000
trusted library allocation
page read and write
22B6ACF7000
trusted library allocation
page read and write
22B62BCF000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B64054000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B6C8FA000
trusted library allocation
page read and write
22B6C6D1000
trusted library allocation
page read and write
22B6ADC0000
trusted library allocation
page read and write
22B6EA50000
trusted library allocation
page read and write
22B647CC000
trusted library allocation
page read and write
22B6E7F1000
trusted library allocation
page read and write
22B631FC000
trusted library allocation
page read and write
22B6AB32000
trusted library allocation
page read and write
3244BBE000
stack
page read and write
22B59C0B000
heap
page read and write
22B59C36000
heap
page read and write
22B64406000
trusted library allocation
page read and write
22B5EB2F000
trusted library allocation
page read and write
22B640DE000
trusted library allocation
page read and write
22B6319F000
trusted library allocation
page read and write
22B59BFB000
heap
page read and write
22B5EC18000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B59C61000
heap
page read and write
22B6EDC1000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B62B20000
trusted library allocation
page read and write
22B6FA9E000
trusted library allocation
page read and write
22B6ED5F000
trusted library allocation
page read and write
22B64087000
trusted library allocation
page read and write
22B635A1000
trusted library allocation
page read and write
22B654F1000
trusted library allocation
page read and write
1E48BA69000
heap
page read and write
1E48BA69000
heap
page read and write
22B65592000
trusted library allocation
page read and write
1E48BAE1000
heap
page read and write
22B59C57000
heap
page read and write
22B59BFD000
heap
page read and write
22B62C7B000
trusted library allocation
page read and write
22B6476E000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6B0B7000
trusted library allocation
page read and write
22B6AABA000
trusted library allocation
page read and write
22B6E786000
trusted library allocation
page read and write
21F4BE82000
heap
page read and write
22B640EC000
trusted library allocation
page read and write
22B65592000
trusted library allocation
page read and write
22B59C63000
heap
page read and write
22B59C12000
heap
page read and write
22B6EA93000
trusted library allocation
page read and write
22B6B011000
trusted library allocation
page read and write
225415C0000
unclassified section
page readonly
1E48BAEB000
heap
page read and write
22B59C63000
heap
page read and write
22B5E598000
trusted library allocation
page read and write
FC0000
unkown
page readonly
266A2180000
heap
page read and write
225417B5000
trusted library allocation
page read and write
22B6AEB7000
trusted library allocation
page read and write
22B62CFB000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22541769000
trusted library allocation
page read and write
22B6AECF000
trusted library allocation
page read and write
22B6351E000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B631AA000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B59BD4000
heap
page read and write
22B59BFB000
heap
page read and write
22B6AEB7000
trusted library allocation
page read and write
3D31000
heap
page read and write
22B59BFD000
heap
page read and write
22B640CD000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B6C6D3000
trusted library allocation
page read and write
1E48BA7F000
heap
page read and write
22B63C58000
trusted library allocation
page read and write
32453BE000
unkown
page readonly
22B655B1000
trusted library allocation
page read and write
22B6EDD0000
trusted library allocation
page read and write
22B654F8000
trusted library allocation
page read and write
22B64866000
trusted library allocation
page read and write
22B6475B000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B6AAE8000
trusted library allocation
page read and write
1E48AB70000
unclassified section
page readonly
22B6C6A6000
trusted library allocation
page read and write
22B6546D000
trusted library allocation
page read and write
22B6C210000
trusted library allocation
page read and write
22B656F1000
trusted library allocation
page read and write
22B643B7000
trusted library allocation
page read and write
22B640DC000
trusted library allocation
page read and write
18CA000
heap
page read and write
22B6F95D000
trusted library allocation
page read and write
22B63D02000
trusted library allocation
page read and write
22B59C06000
heap
page read and write
22B6B084000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B605CD000
heap
page read and write
22B64491000
trusted library allocation
page read and write
22541782000
trusted library allocation
page read and write
22B66119000
trusted library allocation
page read and write
22B643B7000
trusted library allocation
page read and write
22B6ABBA000
trusted library allocation
page read and write
266A257B000
trusted library allocation
page read and write
22B59BF3000
heap
page read and write
22B65726000
trusted library allocation
page read and write
22B643C1000
trusted library allocation
page read and write
22B6ED29000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B59C57000
heap
page read and write
22B6AC86000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
1E48BAE0000
heap
page read and write
22B59C31000
heap
page read and write
22B59C37000
heap
page read and write
22B63DC9000
trusted library allocation
page read and write
22B6F8C3000
trusted library allocation
page read and write
22B6618C000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B65583000
trusted library allocation
page read and write
22B635B2000
trusted library allocation
page read and write
22B6EC84000
trusted library allocation
page read and write
22B59C19000
heap
page read and write
22B59C0D000
heap
page read and write
22B6D42E000
trusted library allocation
page read and write
22B59C32000
heap
page read and write
22B641E2000
trusted library allocation
page read and write
22B654F1000
trusted library allocation
page read and write
22B6EE54000
heap
page read and write
22B59C02000
heap
page read and write
22B64226000
trusted library allocation
page read and write
22B62B83000
trusted library allocation
page read and write
22B63568000
trusted library allocation
page read and write
22B6617F000
trusted library allocation
page read and write
22B6AB66000
trusted library allocation
page read and write
22541A07000
trusted library allocation
page read and write
22B631E9000
trusted library allocation
page read and write
22B647BB000
trusted library allocation
page read and write
22B6B0F2000
trusted library allocation
page read and write
22B62BA6000
trusted library allocation
page read and write
22B5E590000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B6ABC6000
trusted library allocation
page read and write
22B6C27D000
trusted library allocation
page read and write
22B64F96000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B59BF8000
heap
page read and write
22B60DE2000
trusted library allocation
page read and write
22B605C3000
heap
page read and write
22B6AEF8000
trusted library allocation
page read and write
22B656A2000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
1E48B3F0000
heap
page read and write
22B59C2E000
heap
page read and write
22541716000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
D6AAF3E000
unkown
page readonly
22B6667E000
trusted library allocation
page read and write
22B6669B000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6C695000
trusted library allocation
page read and write
22B64DB5000
trusted library allocation
page read and write
22B6FAD7000
trusted library allocation
page read and write
22B650E1000
trusted library allocation
page read and write
22B59BDD000
heap
page read and write
22B637AA000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6F943000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
22B59C11000
heap
page read and write
22B6412C000
trusted library allocation
page read and write
1E48BB69000
heap
page read and write
22B59C5F000
heap
page read and write
22B62C63000
trusted library allocation
page read and write
22B661D3000
trusted library allocation
page read and write
22B648BD000
trusted library allocation
page read and write
22B59C25000
heap
page read and write
22B64EA1000
trusted library allocation
page read and write
1E48B463000
unkown
page execute read
22B643EB000
trusted library allocation
page read and write
22B6AABE000
trusted library allocation
page read and write
22B59C09000
heap
page read and write
22B59BED000
heap
page read and write
22B59C11000
heap
page read and write
22B6C8E1000
trusted library allocation
page read and write
22B6EBB4000
trusted library allocation
page read and write
1E48BA8A000
heap
page read and write
22B6ACDF000
trusted library allocation
page read and write
22B6AAB2000
trusted library allocation
page read and write
22B6ABBA000
trusted library allocation
page read and write
22B6AD51000
trusted library allocation
page read and write
22B661C3000
trusted library allocation
page read and write
22B6EABB000
trusted library allocation
page read and write
22B63715000
trusted library allocation
page read and write
1C279020000
heap
page read and write
22B644BE000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
1E48AE6F000
trusted library allocation
page read and write
22B59C79000
heap
page read and write
22B6AB32000
trusted library allocation
page read and write
22B631B2000
trusted library allocation
page read and write
22541777000
trusted library allocation
page read and write
22B640AC000
trusted library allocation
page read and write
22B6AC8B000
trusted library allocation
page read and write
22B5EC75000
trusted library allocation
page read and write
22B6EE8B000
heap
page read and write
22B647E5000
trusted library allocation
page read and write
266A2523000
trusted library allocation
page read and write
22B63476000
trusted library allocation
page read and write
22B63AA0000
trusted library allocation
page read and write
22B6AE63000
trusted library allocation
page read and write
22B6315D000
trusted library allocation
page read and write
22B6E75F000
trusted library allocation
page read and write
22B6C6EA000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B641EC000
trusted library allocation
page read and write
D6A9F3E000
unkown
page readonly
22B59C2F000
heap
page read and write
22B59C62000
heap
page read and write
22B64E45000
trusted library allocation
page read and write
22B6CB9D000
trusted library allocation
page read and write
22B6F968000
trusted library allocation
page read and write
22B605B1000
heap
page read and write
22B647B9000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B59C5A000
heap
page read and write
22B640F1000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
22B6EDD7000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B640DC000
trusted library allocation
page read and write
22B6AEFC000
trusted library allocation
page read and write
1E48AE65000
trusted library allocation
page read and write
1E48BA5C000
heap
page read and write
22B631BA000
trusted library allocation
page read and write
1E48BAB9000
heap
page read and write
1E48AE86000
trusted library allocation
page read and write
22B63199000
trusted library allocation
page read and write
1E48BA60000
heap
page read and write
22B59C0B000
heap
page read and write
22B64DAB000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B59C5C000
heap
page read and write
22B650E3000
trusted library allocation
page read and write
22B6B094000
trusted library allocation
page read and write
22B64199000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B63481000
trusted library allocation
page read and write
22B6D341000
trusted library allocation
page read and write
22B640DE000
trusted library allocation
page read and write
22B6AE8B000
trusted library allocation
page read and write
22B6B026000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B6AEBB000
trusted library allocation
page read and write
22B6E762000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B59BED000
heap
page read and write
22B648FD000
trusted library allocation
page read and write
22B6EEE3000
heap
page read and write
22B656A7000
trusted library allocation
page read and write
22B6405E000
trusted library allocation
page read and write
22B62D62000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59BED000
heap
page read and write
22B605B9000
heap
page read and write
22B59BF6000
heap
page read and write
22B631CC000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6ADF5000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B650E7000
trusted library allocation
page read and write
22B6615A000
trusted library allocation
page read and write
22B6EC6E000
trusted library allocation
page read and write
22B63C3F000
trusted library allocation
page read and write
22B6EBFE000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B5ECD1000
trusted library allocation
page read and write
22B6EAF0000
trusted library allocation
page read and write
22B65596000
trusted library allocation
page read and write
22B64077000
trusted library allocation
page read and write
F24000
heap
page read and write
1E48AE5F000
trusted library allocation
page read and write
22B648B5000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B648BB000
trusted library allocation
page read and write
266A2632000
trusted library allocation
page read and write
22B6C6D8000
trusted library allocation
page read and write
22B6CBBF000
trusted library allocation
page read and write
22B62C59000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59C11000
heap
page read and write
22B59BF0000
heap
page read and write
22B59C2E000
heap
page read and write
22B6AAD0000
trusted library allocation
page read and write
22B63C55000
trusted library allocation
page read and write
22B6ABA4000
trusted library allocation
page read and write
22B64CDF000
trusted library allocation
page read and write
22B62C85000
trusted library allocation
page read and write
22B655BC000
trusted library allocation
page read and write
22B59C25000
heap
page read and write
1E48BB2A000
heap
page read and write
1E48AF14000
heap
page read and write
22B653F4000
trusted library allocation
page read and write
266A2597000
trusted library allocation
page read and write
22B631AA000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B6ABBE000
trusted library allocation
page read and write
22B641C3000
trusted library allocation
page read and write
22B6ADEA000
trusted library allocation
page read and write
22B661BF000
trusted library allocation
page read and write
22B6570F000
trusted library allocation
page read and write
22B6B077000
trusted library allocation
page read and write
22B6B097000
trusted library allocation
page read and write
22B63C61000
trusted library allocation
page read and write
22B644FC000
trusted library allocation
page read and write
22B640D1000
trusted library allocation
page read and write
22B65697000
trusted library allocation
page read and write
266A2612000
trusted library allocation
page read and write
22B6417F000
trusted library allocation
page read and write
22B6CBAC000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
225414A0000
heap
page readonly
22B6ABA6000
trusted library allocation
page read and write
22B641C3000
trusted library allocation
page read and write
22B66120000
trusted library allocation
page read and write
266A2609000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B59BF0000
heap
page read and write
22B6AEAE000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B655D8000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B63C8D000
trusted library allocation
page read and write
22B656A2000
trusted library allocation
page read and write
22B6AAC4000
trusted library allocation
page read and write
22B59C61000
heap
page read and write
22B654B6000
trusted library allocation
page read and write
18CC000
heap
page read and write
22B59C4D000
heap
page read and write
22B6429D000
trusted library allocation
page read and write
22B655CE000
trusted library allocation
page read and write
22B62BCF000
trusted library allocation
page read and write
22B6559A000
trusted library allocation
page read and write
22B63476000
trusted library allocation
page read and write
22B640B2000
trusted library allocation
page read and write
22B59C27000
heap
page read and write
22B63574000
trusted library allocation
page read and write
22B6569C000
trusted library allocation
page read and write
22B6CB99000
trusted library allocation
page read and write
22B6CB72000
trusted library allocation
page read and write
1E48AE48000
trusted library allocation
page read and write
22B6419F000
trusted library allocation
page read and write
22B6AB58000
trusted library allocation
page read and write
22B6EAFA000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B6D457000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B6E790000
trusted library allocation
page read and write
22B664B7000
trusted library allocation
page read and write
22B64191000
trusted library allocation
page read and write
22B6C7DD000
trusted library allocation
page read and write
D6A973E000
stack
page read and write
22B59C2E000
heap
page read and write
22B6D2A3000
trusted library allocation
page read and write
21F4BE6D000
heap
page read and write
22B6CB2F000
trusted library allocation
page read and write
22B63557000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B654C4000
trusted library allocation
page read and write
22B6AB66000
trusted library allocation
page read and write
22B631FC000
trusted library allocation
page read and write
1E48BA01000
heap
page read and write
22B65268000
trusted library allocation
page read and write
22B6C7DC000
trusted library allocation
page read and write
22B640E7000
trusted library allocation
page read and write
CF9000
stack
page read and write
22B65082000
trusted library allocation
page read and write
22B64141000
trusted library allocation
page read and write
22B6B0B7000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B63C5A000
trusted library allocation
page read and write
22B64622000
trusted library allocation
page read and write
22B64BD0000
trusted library allocation
page read and write
22B656AF000
trusted library allocation
page read and write
22B664B5000
trusted library allocation
page read and write
22B6C6F7000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B657EE000
trusted library allocation
page read and write
22B603CC000
trusted library allocation
page read and write
22B6419F000
trusted library allocation
page read and write
1E48AE03000
trusted library allocation
page read and write
1E48BB58000
heap
page read and write
22B59C4D000
heap
page read and write
22B650EF000
trusted library allocation
page read and write
22B63C53000
trusted library allocation
page read and write
22B6EDC9000
trusted library allocation
page read and write
22B59C61000
heap
page read and write
22B6AEF8000
trusted library allocation
page read and write
22B6C69E000
trusted library allocation
page read and write
22B6CB1A000
trusted library allocation
page read and write
22B66611000
trusted library allocation
page read and write
22B59C63000
heap
page read and write
22B59C15000
heap
page read and write
22B59C79000
heap
page read and write
22B640EA000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B66621000
trusted library allocation
page read and write
22B6034B000
trusted library allocation
page read and write
22B65180000
trusted library allocation
page read and write
22B6FAD6000
trusted library allocation
page read and write
22B657F9000
trusted library allocation
page read and write
22B6EA9D000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B664CA000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B59C57000
heap
page read and write
22B5EE00000
trusted library allocation
page read and write
22B61062000
trusted library allocation
page read and write
22541724000
trusted library allocation
page read and write
22B6B044000
trusted library allocation
page read and write
22B6562B000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B61072000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B664D0000
trusted library allocation
page read and write
22B631CC000
trusted library allocation
page read and write
22B6ABBE000
trusted library allocation
page read and write
22B59BF9000
heap
page read and write
22B5FB42000
trusted library allocation
page read and write
22B641E9000
trusted library allocation
page read and write
22B63C5A000
trusted library allocation
page read and write
22B59C14000
heap
page read and write
22B59C1B000
heap
page read and write
22B657A2000
trusted library allocation
page read and write
22B628F2000
trusted library allocation
page read and write
22B631E7000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B651A9000
trusted library allocation
page read and write
22B6372B000
trusted library allocation
page read and write
22B652EF000
trusted library allocation
page read and write
22B59C29000
heap
page read and write
22B59C00000
heap
page read and write
22B62EBB000
trusted library allocation
page read and write
22B59BD4000
heap
page read and write
22B66630000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C11000
heap
page read and write
22B59C37000
heap
page read and write
22B6AB74000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B6C6C6000
trusted library allocation
page read and write
22B6AAB0000
trusted library allocation
page read and write
22B6EAF6000
trusted library allocation
page read and write
22B640BA000
trusted library allocation
page read and write
22B59C0F000
heap
page read and write
22B59C4D000
heap
page read and write
22B6B094000
trusted library allocation
page read and write
22B63706000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B652D3000
trusted library allocation
page read and write
22B640B2000
trusted library allocation
page read and write
22B61062000
trusted library allocation
page read and write
22B639E0000
trusted library allocation
page read and write
105C000
unkown
page readonly
22B6C840000
trusted library allocation
page read and write
D6A5B8B000
stack
page read and write
22B63494000
trusted library allocation
page read and write
22B64FE0000
trusted library allocation
page read and write
22B59BD5000
heap
page read and write
22B66633000
trusted library allocation
page read and write
22B6F968000
trusted library allocation
page read and write
22B605B1000
heap
page read and write
22B5FF35000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6D3AC000
trusted library allocation
page read and write
22B6616F000
trusted library allocation
page read and write
22B64236000
trusted library allocation
page read and write
22B6AEDA000
trusted library allocation
page read and write
1E48BAAA000
heap
page read and write
22B640F1000
trusted library allocation
page read and write
1E48ACC0000
heap
page read and write
22B59C37000
heap
page read and write
22B5FB65000
trusted library allocation
page read and write
22B664FA000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B64733000
trusted library allocation
page read and write
22B6AE88000
trusted library allocation
page read and write
22B642A2000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6F930000
trusted library allocation
page read and write
22B65275000
trusted library allocation
page read and write
22B663C0000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6F95D000
trusted library allocation
page read and write
22B641F0000
trusted library allocation
page read and write
22B6C8E4000
trusted library allocation
page read and write
22B6032E000
trusted library allocation
page read and write
22B654EF000
trusted library allocation
page read and write
22B631AA000
trusted library allocation
page read and write
22B6E7E8000
trusted library allocation
page read and write
22B6B096000
trusted library allocation
page read and write
22B631BA000
trusted library allocation
page read and write
22B62D5F000
trusted library allocation
page read and write
22B60340000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59C2F000
heap
page read and write
22B59BEA000
heap
page read and write
22B6ADEA000
trusted library allocation
page read and write
22B59C2D000
heap
page read and write
22B59C0A000
heap
page read and write
22B634FE000
trusted library allocation
page read and write
22B62C85000
trusted library allocation
page read and write
22B64846000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B59C11000
heap
page read and write
22B652AA000
trusted library allocation
page read and write
22B605BB000
heap
page read and write
22B6EDC9000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B63FAF000
trusted library allocation
page read and write
F24000
heap
page read and write
22B6EDD7000
trusted library allocation
page read and write
22B654CB000
trusted library allocation
page read and write
22B6521E000
trusted library allocation
page read and write
22B64333000
trusted library allocation
page read and write
22B64236000
trusted library allocation
page read and write
22B635A9000
trusted library allocation
page read and write
22B663E7000
trusted library allocation
page read and write
22B62BA6000
trusted library allocation
page read and write
266A2510000
trusted library allocation
page read and write
22B6AB68000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B631AA000
trusted library allocation
page read and write
22B64143000
trusted library allocation
page read and write
22B6B048000
trusted library allocation
page read and write
22B5FEBE000
trusted library allocation
page read and write
22B6CBC5000
trusted library allocation
page read and write
22B64854000
trusted library allocation
page read and write
22B6406B000
trusted library allocation
page read and write
22B59BD2000
heap
page read and write
22B6B0CD000
trusted library allocation
page read and write
22B64031000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
266A256E000
trusted library allocation
page read and write
22B650BF000
trusted library allocation
page read and write
22B6B089000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B63568000
trusted library allocation
page read and write
22B6CB2B000
trusted library allocation
page read and write
22B59C1E000
heap
page read and write
F24000
heap
page read and write
1E48BAE6000
heap
page read and write
22B6438A000
trusted library allocation
page read and write
22B63CCD000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B639D8000
trusted library allocation
page read and write
22B59C1F000
heap
page read and write
22B65754000
trusted library allocation
page read and write
1190000
heap
page read and write
1082000
unkown
page readonly
22B59BF4000
heap
page read and write
22B6AB8A000
trusted library allocation
page read and write
22B60363000
trusted library allocation
page read and write
22B6B0EC000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B646AD000
trusted library allocation
page read and write
1E48AE1A000
trusted library allocation
page read and write
22B6AEC3000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B66681000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B646B7000
trusted library allocation
page read and write
22B64C66000
trusted library allocation
page read and write
1C27930A000
trusted library allocation
page read and write
22B65476000
trusted library allocation
page read and write
22B59C5A000
heap
page read and write
22B6427A000
trusted library allocation
page read and write
22B59C29000
heap
page read and write
1E48B481000
unkown
page execute read
22B59C31000
heap
page read and write
22B59BF6000
heap
page read and write
22B62CDC000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B654B6000
trusted library allocation
page read and write
22B63D3E000
trusted library allocation
page read and write
22B64CF9000
trusted library allocation
page read and write
22B59C25000
heap
page read and write
22B59BF0000
heap
page read and write
22B63615000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B6405A000
trusted library allocation
page read and write
22B605CC000
heap
page read and write
22B66621000
trusted library allocation
page read and write
22B605BF000
heap
page read and write
22B65099000
trusted library allocation
page read and write
22B63996000
trusted library allocation
page read and write
22B6417E000
trusted library allocation
page read and write
22B6034E000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B643BD000
trusted library allocation
page read and write
22B6B0BD000
trusted library allocation
page read and write
1E48B3D0000
trusted library allocation
page read and write
22B63C4F000
trusted library allocation
page read and write
22B6AE82000
trusted library allocation
page read and write
22B62B9F000
trusted library allocation
page read and write
22B59C25000
heap
page read and write
22B6B096000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B59C2D000
heap
page read and write
1E48AF10000
heap
page read and write
22B640EC000
trusted library allocation
page read and write
22B64061000
trusted library allocation
page read and write
22B6AEAE000
trusted library allocation
page read and write
22B62D2C000
trusted library allocation
page read and write
22B63AB6000
trusted library allocation
page read and write
22B6405A000
trusted library allocation
page read and write
22B6AEBB000
trusted library allocation
page read and write
1E48AB00000
unclassified section
page readonly
22B64121000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
266A2160000
heap
page read and write
F24000
heap
page read and write
22B640D5000
trusted library allocation
page read and write
22B5E5DF000
trusted library allocation
page read and write
22B631E2000
trusted library allocation
page read and write
22B59BD4000
heap
page read and write
22B59C58000
heap
page read and write
266A263B000
trusted library allocation
page read and write
1E48BB44000
heap
page read and write
22B6C6F4000
trusted library allocation
page read and write
22B64EBA000
trusted library allocation
page read and write
22B6F8E8000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6CB32000
trusted library allocation
page read and write
22B666D3000
trusted library allocation
page read and write
22B6AED3000
trusted library allocation
page read and write
22B59C82000
heap
page read and write
22B5FD9B000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
1E48AE69000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22541B00000
trusted library allocation
page read and write
22B647CC000
trusted library allocation
page read and write
22B64774000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B64281000
trusted library allocation
page read and write
22B6ABCB000
trusted library allocation
page read and write
22B59C03000
heap
page read and write
22B6ACDC000
trusted library allocation
page read and write
22B651D4000
trusted library allocation
page read and write
22B668F1000
trusted library allocation
page read and write
22B663A3000
trusted library allocation
page read and write
958A23C000
stack
page read and write
22B63165000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B65256000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B656A9000
trusted library allocation
page read and write
22B610D0000
trusted library allocation
page read and write
22B65254000
trusted library allocation
page read and write
22B6AAAF000
trusted library allocation
page read and write
22B6EBB0000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
22B64087000
trusted library allocation
page read and write
22B6ABBE000
trusted library allocation
page read and write
22B59BE5000
heap
page read and write
22B6F954000
trusted library allocation
page read and write
22B650EA000
trusted library allocation
page read and write
22B5EBFB000
trusted library allocation
page read and write
22B6C6F4000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B62BCF000
trusted library allocation
page read and write
22B64C5F000
trusted library allocation
page read and write
22B59C61000
heap
page read and write
22B62BA6000
trusted library allocation
page read and write
22B59BF9000
heap
page read and write
22B6E7CE000
trusted library allocation
page read and write
22B6F85D000
trusted library allocation
page read and write
22B6E73A000
trusted library allocation
page read and write
22B59C03000
heap
page read and write
22B6347E000
trusted library allocation
page read and write
22B64894000
trusted library allocation
page read and write
22B6EEBA000
heap
page read and write
22B6ADF5000
trusted library allocation
page read and write
266A255B000
trusted library allocation
page read and write
22B65168000
trusted library allocation
page read and write
22B6418E000
trusted library allocation
page read and write
22B64E6F000
trusted library allocation
page read and write
1E48B900000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B6EDE2000
trusted library allocation
page read and write
22B63D6E000
trusted library allocation
page read and write
22B6ADDB000
trusted library allocation
page read and write
22B6ADC0000
trusted library allocation
page read and write
F24000
heap
page read and write
22B644F0000
trusted library allocation
page read and write
22B60313000
trusted library allocation
page read and write
22B6EDD7000
trusted library allocation
page read and write
22B657E8000
trusted library allocation
page read and write
22B65280000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59BF9000
heap
page read and write
22B59C0B000
heap
page read and write
266A23A3000
heap
page read and write
22B6319F000
trusted library allocation
page read and write
22B650F7000
trusted library allocation
page read and write
22B6B03F000
trusted library allocation
page read and write
22B634AA000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B640DE000
trusted library allocation
page read and write
22B63A1D000
trusted library allocation
page read and write
22B65457000
trusted library allocation
page read and write
1E48AE10000
trusted library allocation
page read and write
22B63D2F000
trusted library allocation
page read and write
22B59BD4000
heap
page read and write
22B654FB000
trusted library allocation
page read and write
22B61063000
trusted library allocation
page read and write
22B59BD4000
heap
page read and write
22B64832000
trusted library allocation
page read and write
22B59C27000
heap
page read and write
22B6CBA2000
trusted library allocation
page read and write
22B6B053000
trusted library allocation
page read and write
22B6CBC8000
trusted library allocation
page read and write
1E48BAE8000
heap
page read and write
22B60377000
trusted library allocation
page read and write
22B6EDC5000
trusted library allocation
page read and write
22B66884000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B5FEEB000
trusted library allocation
page read and write
22B6ABA4000
trusted library allocation
page read and write
22B657F5000
trusted library allocation
page read and write
22B661A0000
trusted library allocation
page read and write
22B646F2000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B6B0BD000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B640BE000
trusted library allocation
page read and write
22B66150000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B6432D000
trusted library allocation
page read and write
22B6EC7B000
trusted library allocation
page read and write
22B6520B000
trusted library allocation
page read and write
10B0000
heap
page read and write
22B59C1B000
heap
page read and write
22B59C0A000
heap
page read and write
22541730000
trusted library allocation
page read and write
22B655CE000
trusted library allocation
page read and write
22B631DE000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B6B0FB000
trusted library allocation
page read and write
18E4000
heap
page read and write
22541330000
unclassified section
page readonly
22B65731000
trusted library allocation
page read and write
1E48BAA1000
heap
page read and write
22B59C01000
heap
page read and write
22B5FEC7000
trusted library allocation
page read and write
22B6034B000
trusted library allocation
page read and write
22B6CBC8000
trusted library allocation
page read and write
22B5EC75000
trusted library allocation
page read and write
22B62B5D000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B59C0B000
heap
page read and write
22B656B8000
trusted library allocation
page read and write
22B650A5000
trusted library allocation
page read and write
22B6F8F9000
trusted library allocation
page read and write
22B639E4000
trusted library allocation
page read and write
22B63AA6000
trusted library allocation
page read and write
22B63184000
trusted library allocation
page read and write
22B646AA000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
18DF000
heap
page read and write
22B59BED000
heap
page read and write
22B6C6A3000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
266A2547000
trusted library allocation
page read and write
22B63199000
trusted library allocation
page read and write
22B64495000
trusted library allocation
page read and write
22B650E7000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59BF0000
heap
page read and write
22B6B092000
trusted library allocation
page read and write
266A2579000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B655FE000
trusted library allocation
page read and write
22B6C6D3000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6AB58000
trusted library allocation
page read and write
22B63534000
trusted library allocation
page read and write
22B6C6BB000
trusted library allocation
page read and write
22B63193000
trusted library allocation
page read and write
22B62E35000
trusted library allocation
page read and write
22B63A1F000
trusted library allocation
page read and write
22B59BFE000
heap
page read and write
2254175D000
trusted library allocation
page read and write
22B635F3000
trusted library allocation
page read and write
22B6CB9D000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B59C4D000
heap
page read and write
22B6355F000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
21F4BE80000
heap
page read and write
22B63481000
trusted library allocation
page read and write
22B62C5F000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B64EBA000
trusted library allocation
page read and write
22B65177000
trusted library allocation
page read and write
22B6ED32000
trusted library allocation
page read and write
22B6ADDB000
trusted library allocation
page read and write
22B5FEF3000
trusted library allocation
page read and write
22B59C3C000
heap
page read and write
22B59C07000
heap
page read and write
22B59BF0000
heap
page read and write
22B59C61000
heap
page read and write
22B59C15000
heap
page read and write
22B59C31000
heap
page read and write
22B59C00000
heap
page read and write
22B650E5000
trusted library allocation
page read and write
22B65158000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B59C0B000
heap
page read and write
22B653F4000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B650E1000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B644D9000
trusted library allocation
page read and write
22B650E3000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B631CC000
trusted library allocation
page read and write
1E48BAE8000
heap
page read and write
F24000
heap
page read and write
22B59C1B000
heap
page read and write
22B6AA96000
trusted library allocation
page read and write
22B640D1000
trusted library allocation
page read and write
22B6AB38000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B62B9F000
trusted library allocation
page read and write
22B6416F000
trusted library allocation
page read and write
22B5ECF7000
trusted library allocation
page read and write
22B640DC000
trusted library allocation
page read and write
22B6B0D3000
trusted library allocation
page read and write
22B65297000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B62F51000
trusted library allocation
page read and write
22B631A3000
trusted library allocation
page read and write
32442FE000
stack
page read and write
22B6C7E0000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B6B0E8000
trusted library allocation
page read and write
3D30000
heap
page read and write
22B6F952000
trusted library allocation
page read and write
22B663C7000
trusted library allocation
page read and write
22B6469D000
trusted library allocation
page read and write
22B634F3000
trusted library allocation
page read and write
1E48BB2A000
heap
page read and write
22B640E5000
trusted library allocation
page read and write
22B641DC000
trusted library allocation
page read and write
21F4D9ED000
heap
page read and write
22B59C5A000
heap
page read and write
22B59C1F000
heap
page read and write
22B6EB31000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B66489000
trusted library allocation
page read and write
22B6ABCB000
trusted library allocation
page read and write
22B59C29000
heap
page read and write
22B6484B000
trusted library allocation
page read and write
22B64E58000
trusted library allocation
page read and write
22B5FEDF000
trusted library allocation
page read and write
22B59C82000
heap
page read and write
22B59C11000
heap
page read and write
22B62B8E000
trusted library allocation
page read and write
18CD000
heap
page read and write
22B6379F000
trusted library allocation
page read and write
22B6C6DD000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B631C1000
trusted library allocation
page read and write
22B6D34D000
trusted library allocation
page read and write
22B64057000
trusted library allocation
page read and write
22B63720000
trusted library allocation
page read and write
22B6ED9B000
trusted library allocation
page read and write
22B643EB000
trusted library allocation
page read and write
22B641EB000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B59C57000
heap
page read and write
22B661CB000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
324427D000
stack
page read and write
22B6EDC9000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59C0F000
heap
page read and write
1E48B4B0000
heap
page read and write
22B6F93C000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6FA8C000
trusted library allocation
page read and write
32441FE000
unkown
page readonly
22B59C00000
heap
page read and write
22B59C0A000
heap
page read and write
22B6C680000
trusted library allocation
page read and write
22B6B09C000
trusted library allocation
page read and write
958B37E000
unkown
page readonly
1E48BAE8000
heap
page read and write
22B64115000
trusted library allocation
page read and write
22B6AC93000
trusted library allocation
page read and write
FC0000
unkown
page readonly
22B640EE000
trusted library allocation
page read and write
22B59C12000
heap
page read and write
22B63FFA000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B63C58000
trusted library allocation
page read and write
22B63199000
trusted library allocation
page read and write
22B6B0A0000
trusted library allocation
page read and write
22B635A5000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B62900000
trusted library allocation
page read and write
22B6ABC2000
trusted library allocation
page read and write
22B654F8000
trusted library allocation
page read and write
22B6B03F000
trusted library allocation
page read and write
22B63FB9000
trusted library allocation
page read and write
22B655FC000
trusted library allocation
page read and write
22B6ABCB000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B6C23A000
trusted library allocation
page read and write
F24000
heap
page read and write
22B59C07000
heap
page read and write
22B59C25000
heap
page read and write
22B66133000
trusted library allocation
page read and write
22B640FA000
trusted library allocation
page read and write
22B64057000
trusted library allocation
page read and write
22B6446B000
trusted library allocation
page read and write
22B6ADA7000
trusted library allocation
page read and write
22B6AB00000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B6D433000
trusted library allocation
page read and write
22B635E4000
trusted library allocation
page read and write
22B6C6F4000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
1E48B3CF000
unclassified section
page read and write
22B5FD76000
trusted library allocation
page read and write
22B6ACB1000
trusted library allocation
page read and write
22B640D4000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
2254178F000
trusted library allocation
page read and write
22B63619000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B640F1000
trusted library allocation
page read and write
22B6AB4F000
trusted library allocation
page read and write
35D9B011000
trusted library allocation
page execute read
22B59BFD000
heap
page read and write
22B59BFD000
heap
page read and write
22B6EDCB000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B59C00000
heap
page read and write
22B6AE99000
trusted library allocation
page read and write
22B64975000
trusted library allocation
page read and write
22B6571E000
trusted library allocation
page read and write
22B64890000
trusted library allocation
page read and write
22B6ADC9000
trusted library allocation
page read and write
22B640E5000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B59BD4000
heap
page read and write
22B59BD4000
heap
page read and write
22B62C7D000
trusted library allocation
page read and write
1090000
unkown
page write copy
22B652DE000
trusted library allocation
page read and write
21F4C225000
heap
page read and write
22B59C57000
heap
page read and write
22B640D1000
trusted library allocation
page read and write
22B6C6C0000
trusted library allocation
page read and write
22B59C7A000
heap
page read and write
22B63540000
trusted library allocation
page read and write
22B6EAFA000
trusted library allocation
page read and write
1E48BB77000
heap
page read and write
22B6AC9C000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B64015000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B62BA6000
trusted library allocation
page read and write
22B6EBB2000
trusted library allocation
page read and write
22B631B5000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B6E7CE000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B644F0000
trusted library allocation
page read and write
21F4C10A000
trusted library allocation
page read and write
22B59BF5000
heap
page read and write
22B6E779000
trusted library allocation
page read and write
266A2222000
unclassified section
page read and write
22B641E4000
trusted library allocation
page read and write
22B647F6000
trusted library allocation
page read and write
22B6C78A000
trusted library allocation
page read and write
266A2702000
heap
page read and write
22B59BED000
heap
page read and write
22B6B087000
trusted library allocation
page read and write
22541762000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B631C1000
trusted library allocation
page read and write
22B65464000
trusted library allocation
page read and write
22B6D401000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B59C11000
heap
page read and write
22B59C2F000
heap
page read and write
225417C4000
trusted library allocation
page read and write
22B66635000
trusted library allocation
page read and write
22B62C7C000
trusted library allocation
page read and write
22B6519F000
trusted library allocation
page read and write
22B6035F000
trusted library allocation
page read and write
22B62C87000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B6B0A0000
trusted library allocation
page read and write
22B5ECBA000
trusted library allocation
page read and write
22B62C7D000
trusted library allocation
page read and write
22B6572B000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B64194000
trusted library allocation
page read and write
22B6418E000
trusted library allocation
page read and write
266A222F000
unclassified section
page read and write
22B63183000
trusted library allocation
page read and write
225417B1000
trusted library allocation
page read and write
22B6F958000
trusted library allocation
page read and write
22B6F939000
trusted library allocation
page read and write
22B65259000
trusted library allocation
page read and write
22B641C6000
trusted library allocation
page read and write
22B655FA000
trusted library allocation
page read and write
22B6AC9E000
trusted library allocation
page read and write
1E48B90A000
trusted library allocation
page read and write
22B6B089000
trusted library allocation
page read and write
22B6ACC8000
trusted library allocation
page read and write
22B631DE000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B631D4000
trusted library allocation
page read and write
22B6ECA1000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B59C5C000
heap
page read and write
22B59C02000
heap
page read and write
22B6EA58000
trusted library allocation
page read and write
22541766000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B6EC8B000
trusted library allocation
page read and write
22B6519A000
trusted library allocation
page read and write
1E48BA64000
heap
page read and write
1E48BAF1000
heap
page read and write
22B6EB60000
trusted library allocation
page read and write
22B6C6C8000
trusted library allocation
page read and write
22B6F8CE000
trusted library allocation
page read and write
22B657A2000
trusted library allocation
page read and write
22B6567B000
trusted library allocation
page read and write
22B641E2000
trusted library allocation
page read and write
21F4BE89000
heap
page read and write
22B59C06000
heap
page read and write
22B59C00000
heap
page read and write
22B6EB4B000
trusted library allocation
page read and write
266A25C9000
trusted library allocation
page read and write
22B6398A000
trusted library allocation
page read and write
1E48BB21000
heap
page read and write
22B59C07000
heap
page read and write
22B6C630000
trusted library allocation
page read and write
22B62BCF000
trusted library allocation
page read and write
22B6317E000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
266A22D4000
heap
page read and write
22B631D4000
trusted library allocation
page read and write
22B64CB5000
trusted library allocation
page read and write
105C000
unkown
page readonly
22B653E2000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B59C36000
heap
page read and write
22B6CB9D000
trusted library allocation
page read and write
9587FCE000
unkown
page readonly
22B6AE90000
trusted library allocation
page read and write
266A2400000
trusted library allocation
page read and write
22B6EA83000
trusted library allocation
page read and write
22B64FA1000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B6EDD7000
trusted library allocation
page read and write
22B62C6E000
trusted library allocation
page read and write
22B6AB8A000
trusted library allocation
page read and write
22B651D4000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B631B2000
trusted library allocation
page read and write
22B63985000
trusted library allocation
page read and write
22B6B0BD000
trusted library allocation
page read and write
225417F4000
trusted library allocation
page read and write
22B6F954000
trusted library allocation
page read and write
22B63565000
trusted library allocation
page read and write
22B64733000
trusted library allocation
page read and write
22B6C673000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B6463D000
trusted library allocation
page read and write
22B6EAA3000
trusted library allocation
page read and write
22B59BF4000
heap
page read and write
22B59C2E000
heap
page read and write
22B605B9000
heap
page read and write
22B63D2D000
trusted library allocation
page read and write
22B6F91E000
trusted library allocation
page read and write
22B6AB6C000
trusted library allocation
page read and write
22B64054000
trusted library allocation
page read and write
22B6EC6F000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B59C62000
heap
page read and write
22B655EA000
trusted library allocation
page read and write
35D9AF41000
trusted library allocation
page execute read
22B59C5C000
heap
page read and write
22B6488A000
trusted library allocation
page read and write
22B6AAF8000
trusted library allocation
page read and write
22B59C26000
heap
page read and write
22B6ED10000
trusted library allocation
page read and write
266A252E000
trusted library allocation
page read and write
22B6CBA0000
trusted library allocation
page read and write
22B6EE4F000
heap
page read and write
22B63D8D000
trusted library allocation
page read and write
22B666D8000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B59BF3000
heap
page read and write
6B8EBFF000
stack
page read and write
22B605B9000
heap
page read and write
22B6B08B000
trusted library allocation
page read and write
22B657D2000
trusted library allocation
page read and write
22B6D305000
trusted library allocation
page read and write
22B646BD000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B6B087000
trusted library allocation
page read and write
22B631A3000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B644A2000
trusted library allocation
page read and write
22B62C7A000
trusted library allocation
page read and write
21F4BE89000
heap
page read and write
22B63139000
trusted library allocation
page read and write
22B635AB000
trusted library allocation
page read and write
22B655FC000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B59C5C000
heap
page read and write
22B6AB8B000
trusted library allocation
page read and write
22B62C3E000
trusted library allocation
page read and write
22B643BF000
trusted library allocation
page read and write
22B65594000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B6C692000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B63554000
trusted library allocation
page read and write
22B59BFE000
heap
page read and write
22B59C4D000
heap
page read and write
22B64EBC000
trusted library allocation
page read and write
22B6ACB7000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B640F1000
trusted library allocation
page read and write
22B6C8DD000
trusted library allocation
page read and write
22B610BB000
trusted library allocation
page read and write
22B6359A000
trusted library allocation
page read and write
22B62B6A000
trusted library allocation
page read and write
22B5EFAF000
trusted library allocation
page read and write
22541894000
heap
page read and write
22B65798000
trusted library allocation
page read and write
22B6E74E000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
22B59C61000
heap
page read and write
225418A0000
heap
page read and write
22B6FA64000
trusted library allocation
page read and write
22B6ACF9000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B65024000
trusted library allocation
page read and write
22B64298000
trusted library allocation
page read and write
22B64BF3000
trusted library allocation
page read and write
22B634F9000
trusted library allocation
page read and write
1E48AECE000
trusted library allocation
page read and write
22B5EC7D000
trusted library allocation
page read and write
22B635A0000
trusted library allocation
page read and write
22B6B078000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
1C279307000
trusted library allocation
page read and write
22B62BCF000
trusted library allocation
page read and write
22B66453000
trusted library allocation
page read and write
22B63AAE000
trusted library allocation
page read and write
22B605B1000
heap
page read and write
22B6AC80000
trusted library allocation
page read and write
22B645DE000
trusted library allocation
page read and write
22B63953000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B640D4000
trusted library allocation
page read and write
22B643C3000
trusted library allocation
page read and write
22B641EC000
trusted library allocation
page read and write
22B6347F000
trusted library allocation
page read and write
22B6DF00000
trusted library allocation
page read and write
22B6ED3D000
trusted library allocation
page read and write
22B6EE73000
heap
page read and write
22B62FE2000
trusted library allocation
page read and write
22B6ACD9000
trusted library allocation
page read and write
22B6F95F000
trusted library allocation
page read and write
22B644AE000
trusted library allocation
page read and write
22B59BF9000
heap
page read and write
22B6638A000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B63963000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B640CD000
trusted library allocation
page read and write
22B6CBC8000
trusted library allocation
page read and write
22B59C01000
heap
page read and write
22B6ABA8000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B5EC26000
trusted library allocation
page read and write
22B6AEFC000
trusted library allocation
page read and write
22B62BA6000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B64859000
trusted library allocation
page read and write
22B6C6D3000
trusted library allocation
page read and write
22B646E4000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B654B6000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B59C2E000
heap
page read and write
22B63DDB000
trusted library allocation
page read and write
22B6CB62000
trusted library allocation
page read and write
22B6ACD8000
trusted library allocation
page read and write
22B65291000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B64747000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B59BD4000
heap
page read and write
22B5FEC7000
trusted library allocation
page read and write
22B640D1000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B64FF7000
trusted library allocation
page read and write
9587F8B000
stack
page read and write
22B59C15000
heap
page read and write
22B59C07000
heap
page read and write
22B66127000
trusted library allocation
page read and write
22B6345F000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B64848000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B6EE03000
heap
page read and write
22B6AB4D000
trusted library allocation
page read and write
22B59C25000
heap
page read and write
22B59C2E000
heap
page read and write
22B59C57000
heap
page read and write
22B6B0F5000
trusted library allocation
page read and write
22B63C55000
trusted library allocation
page read and write
22B5FEDF000
trusted library allocation
page read and write
FC1000
unkown
page execute read
22B641B7000
trusted library allocation
page read and write
22B59BEC000
heap
page read and write
D6A8EBE000
unkown
page readonly
22B6C676000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6ADEA000
trusted library allocation
page read and write
22B6476E000
trusted library allocation
page read and write
22B605B6000
heap
page read and write
22B59BFD000
heap
page read and write
22B6AD97000
trusted library allocation
page read and write
22B6576A000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B63959000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B6402B000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B650F1000
trusted library allocation
page read and write
22B6EA86000
trusted library allocation
page read and write
22B6FA4F000
trusted library allocation
page read and write
22B63DF7000
trusted library allocation
page read and write
22B63C42000
trusted library allocation
page read and write
22B62F47000
trusted library allocation
page read and write
22B64286000
trusted library allocation
page read and write
22B6ABB7000
trusted library allocation
page read and write
22B643C5000
trusted library allocation
page read and write
22B6C688000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B655EA000
trusted library allocation
page read and write
22B63CF5000
trusted library allocation
page read and write
1E48BB69000
heap
page read and write
22B6ACA7000
trusted library allocation
page read and write
22B6E783000
trusted library allocation
page read and write
22B6C686000
trusted library allocation
page read and write
22B651D7000
trusted library allocation
page read and write
22B6EE6C000
heap
page read and write
22B59C2F000
heap
page read and write
22B59BF1000
heap
page read and write
22B6ECB7000
trusted library allocation
page read and write
22B654FB000
trusted library allocation
page read and write
21F4BE5A000
heap
page read and write
22B6396C000
trusted library allocation
page read and write
22B6AE52000
trusted library allocation
page read and write
22541711000
trusted library allocation
page read and write
22541600000
trusted library allocation
page read and write
22B6AEF6000
trusted library allocation
page read and write
225414B0000
unclassified section
page read and write
22B59C57000
heap
page read and write
22B66449000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6F88B000
trusted library allocation
page read and write
22B6AEC3000
trusted library allocation
page read and write
22B605C0000
heap
page read and write
22B59BF1000
heap
page read and write
22B6417C000
trusted library allocation
page read and write
1E48AE00000
trusted library allocation
page read and write
22B6CBCA000
trusted library allocation
page read and write
22B640CD000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B59C11000
heap
page read and write
22B646FC000
trusted library allocation
page read and write
225413A9000
remote allocation
page execute read
22B59C1B000
heap
page read and write
266A260C000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B59C5A000
heap
page read and write
22B5EB23000
trusted library allocation
page read and write
22B64717000
trusted library allocation
page read and write
22B6569C000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6B0CB000
trusted library allocation
page read and write
22B62F1D000
trusted library allocation
page read and write
22B62B8B000
trusted library allocation
page read and write
22B6C6EC000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B605B0000
heap
page read and write
22B59C1F000
heap
page read and write
22B6523D000
trusted library allocation
page read and write
22B6EAA9000
trusted library allocation
page read and write
22B62EC3000
trusted library allocation
page read and write
22B59BD2000
heap
page read and write
22B59C11000
heap
page read and write
22B6FA69000
trusted library allocation
page read and write
1E48AF16000
heap
page read and write
22B64197000
trusted library allocation
page read and write
22B63D75000
trusted library allocation
page read and write
22B6316F000
trusted library allocation
page read and write
22B6B0C9000
trusted library allocation
page read and write
22B65168000
trusted library allocation
page read and write
22B6406E000
trusted library allocation
page read and write
22B631FC000
trusted library allocation
page read and write
1E48BA69000
heap
page read and write
22B6AACC000
trusted library allocation
page read and write
22B64755000
trusted library allocation
page read and write
22B64727000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59C06000
heap
page read and write
22B59C5C000
heap
page read and write
22B59C11000
heap
page read and write
22B641E9000
trusted library allocation
page read and write
22B605DE000
heap
page read and write
22B66628000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59BFD000
heap
page read and write
21F4DBA0000
heap
page read and write
22B6B0F9000
trusted library allocation
page read and write
22B62B73000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B640E2000
trusted library allocation
page read and write
22B59C17000
heap
page read and write
22B64E50000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B6ABBA000
trusted library allocation
page read and write
22B61023000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B64426000
trusted library allocation
page read and write
22B6410B000
trusted library allocation
page read and write
22B6C6EC000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B648B0000
trusted library allocation
page read and write
22B6481F000
trusted library allocation
page read and write
22B6C261000
trusted library allocation
page read and write
1E48BB69000
heap
page read and write
22B59BFD000
heap
page read and write
22B65716000
trusted library allocation
page read and write
22B6D30C000
trusted library allocation
page read and write
1E48BB58000
heap
page read and write
22B59BD4000
heap
page read and write
22B6ACBC000
trusted library allocation
page read and write
22B656A9000
trusted library allocation
page read and write
22B6E380000
trusted library allocation
page read and write
22B6EAF2000
trusted library allocation
page read and write
22B65712000
trusted library allocation
page read and write
22B63C2E000
trusted library allocation
page read and write
22B640DE000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6346C000
trusted library allocation
page read and write
22B6311E000
trusted library allocation
page read and write
22B64194000
trusted library allocation
page read and write
22B631C6000
trusted library allocation
page read and write
22B63147000
trusted library allocation
page read and write
22B6EDF8000
trusted library allocation
page read and write
22B59BE9000
heap
page read and write
22B639EA000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B663F9000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B6B07C000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B64300000
trusted library allocation
page read and write
22B6AAB6000
trusted library allocation
page read and write
22B59BEE000
heap
page read and write
22B60DE5000
trusted library allocation
page read and write
22B5FD7D000
trusted library allocation
page read and write
22B631CC000
trusted library allocation
page read and write
22B641F9000
trusted library allocation
page read and write
22B62BA6000
trusted library allocation
page read and write
22B65260000
trusted library allocation
page read and write
22B5FBC0000
trusted library allocation
page read and write
22B64889000
trusted library allocation
page read and write
22B6F941000
trusted library allocation
page read and write
22B637FD000
trusted library allocation
page read and write
22B63750000
trusted library allocation
page read and write
22B63CDE000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B655EA000
trusted library allocation
page read and write
22B59C01000
heap
page read and write
22B6489A000
trusted library allocation
page read and write
22B666D3000
trusted library allocation
page read and write
22B635F7000
trusted library allocation
page read and write
22B641C6000
trusted library allocation
page read and write
1C2790B0000
heap
page read and write
22B6E100000
trusted library allocation
page read and write
22B651FC000
trusted library allocation
page read and write
22B6EAA9000
trusted library allocation
page read and write
22B5FEF6000
trusted library allocation
page read and write
22B6ACEA000
trusted library allocation
page read and write
22B636F2000
trusted library allocation
page read and write
22B59BD4000
heap
page read and write
22B635F7000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B63144000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B63CFA000
trusted library allocation
page read and write
22B6AAB2000
trusted library allocation
page read and write
22B655FE000
trusted library allocation
page read and write
22B63D2F000
trusted library allocation
page read and write
22B6EDE2000
trusted library allocation
page read and write
22B6643B000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B640EB000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22541700000
trusted library allocation
page read and write
22B6AB82000
trusted library allocation
page read and write
22B62FBA000
trusted library allocation
page read and write
22B6B0EE000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B5E5BF000
trusted library allocation
page read and write
22B6EDE2000
trusted library allocation
page read and write
22B6F968000
trusted library allocation
page read and write
22B6558D000
trusted library allocation
page read and write
22B6CB57000
trusted library allocation
page read and write
22B59C05000
heap
page read and write
22B59C37000
heap
page read and write
22B59C11000
heap
page read and write
22B6ED84000
trusted library allocation
page read and write
22B64161000
trusted library allocation
page read and write
22B6C221000
trusted library allocation
page read and write
22B59C29000
heap
page read and write
22B6EAF8000
trusted library allocation
page read and write
22B6575A000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6319F000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B6C7D1000
trusted library allocation
page read and write
22B66679000
trusted library allocation
page read and write
22B6ADB4000
trusted library allocation
page read and write
1E48BB58000
heap
page read and write
22B59C57000
heap
page read and write
22B6430E000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B59C4D000
heap
page read and write
22B6F94A000
trusted library allocation
page read and write
22B64EF2000
trusted library allocation
page read and write
22B64859000
trusted library allocation
page read and write
22B65243000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B59C2D000
heap
page read and write
22B59C00000
heap
page read and write
22B6EE38000
heap
page read and write
21F4BE89000
heap
page read and write
22B664C0000
trusted library allocation
page read and write
22B6EAF0000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B59BFD000
heap
page read and write
22B59BED000
heap
page read and write
22B631EE000
trusted library allocation
page read and write
22B6B094000
trusted library allocation
page read and write
22B63AA6000
trusted library allocation
page read and write
22B62B64000
trusted library allocation
page read and write
22B6F945000
trusted library allocation
page read and write
22B6EAF8000
trusted library allocation
page read and write
22B645DE000
trusted library allocation
page read and write
1E48AEE9000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B59C2E000
heap
page read and write
22B62B9F000
trusted library allocation
page read and write
22B65596000
trusted library allocation
page read and write
22B640DC000
trusted library allocation
page read and write
22B639DC000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B639E6000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B634E6000
trusted library allocation
page read and write
22B6EABB000
trusted library allocation
page read and write
22B6574D000
trusted library allocation
page read and write
22B59BFF000
heap
page read and write
1E48BA00000
heap
page read and write
22B6B094000
trusted library allocation
page read and write
22B6404A000
trusted library allocation
page read and write
F24000
heap
page read and write
22B6C6C5000
trusted library allocation
page read and write
22B651E5000
trusted library allocation
page read and write
21F4BE8D000
heap
page read and write
22B6ED7B000
trusted library allocation
page read and write
22B59C5A000
heap
page read and write
22B59C17000
heap
page read and write
22B59C29000
heap
page read and write
22B6E786000
trusted library allocation
page read and write
1E48BA7D000
heap
page read and write
22B59C11000
heap
page read and write
3D31000
heap
page read and write
22541773000
trusted library allocation
page read and write
1E48BAE8000
heap
page read and write
22B6ACAF000
trusted library allocation
page read and write
22B653F1000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B5EFD0000
trusted library allocation
page read and write
22B605B2000
heap
page read and write
22B6AD51000
trusted library allocation
page read and write
22B5FD78000
trusted library allocation
page read and write
22B6ADF5000
trusted library allocation
page read and write
22B640CD000
trusted library allocation
page read and write
22B6682F000
trusted library allocation
page read and write
22B605BA000
heap
page read and write
22B641BE000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
324423E000
unkown
page readonly
22B634F1000
trusted library allocation
page read and write
22B65731000
trusted library allocation
page read and write
22B6B08B000
trusted library allocation
page read and write
22B62B9F000
trusted library allocation
page read and write
22B6F95F000
trusted library allocation
page read and write
22B64147000
trusted library allocation
page read and write
22B64737000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B653E9000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B631C6000
trusted library allocation
page read and write
22B6EC99000
trusted library allocation
page read and write
22B5FDC1000
trusted library allocation
page read and write
22B63413000
trusted library allocation
page read and write
22B6441B000
trusted library allocation
page read and write
F24000
heap
page read and write
958AB7E000
stack
page read and write
22B62BCF000
trusted library allocation
page read and write
22B6D42C000
trusted library allocation
page read and write
22B6EDED000
trusted library allocation
page read and write
22B6408F000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C4D000
heap
page read and write
22B6ECC9000
trusted library allocation
page read and write
22B6B0F9000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B6FA52000
trusted library allocation
page read and write
22B5FD89000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B6ABBC000
trusted library allocation
page read and write
22B64EC1000
trusted library allocation
page read and write
22B6571E000
trusted library allocation
page read and write
22B6E759000
trusted library allocation
page read and write
22B63DE7000
trusted library allocation
page read and write
22B656DD000
trusted library allocation
page read and write
1E48AE61000
trusted library allocation
page read and write
2661E8903000
trusted library allocation
page read and write
22B635EC000
trusted library allocation
page read and write
22B59C5A000
heap
page read and write
22B59C57000
heap
page read and write
22B63D32000
trusted library allocation
page read and write
22B59C03000
heap
page read and write
22B63C4F000
trusted library allocation
page read and write
22B5FE89000
trusted library allocation
page read and write
1E48BA60000
heap
page read and write
22B6C67A000
trusted library allocation
page read and write
22B6C6F9000
trusted library allocation
page read and write
22B6C814000
trusted library allocation
page read and write
22B5EC82000
trusted library allocation
page read and write
22B6E741000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B59C4D000
heap
page read and write
22B6C6CE000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B59C29000
heap
page read and write
22B63FED000
trusted library allocation
page read and write
22B6B0D1000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59BEA000
heap
page read and write
22B60DDD000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B63FFE000
trusted library allocation
page read and write
22B5FB42000
trusted library allocation
page read and write
22B5FE7B000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B5FE96000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
18C7000
heap
page read and write
22B65626000
trusted library allocation
page read and write
22B640B9000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B6446F000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B59BD4000
heap
page read and write
22B59C63000
heap
page read and write
22B59C2E000
heap
page read and write
32463BE000
unkown
page readonly
42C85FE000
stack
page read and write
22B59BF1000
heap
page read and write
22B653E9000
trusted library allocation
page read and write
22B64243000
trusted library allocation
page read and write
22B66370000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B64491000
trusted library allocation
page read and write
22B63FC0000
trusted library allocation
page read and write
1C279300000
trusted library allocation
page read and write
22B6F954000
trusted library allocation
page read and write
22B65204000
trusted library allocation
page read and write
22B6B0F5000
trusted library allocation
page read and write
22541713000
trusted library allocation
page read and write
225414BF000
unclassified section
page read and write
22B65080000
trusted library allocation
page read and write
22B655CA000
trusted library allocation
page read and write
22B60340000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B59C14000
heap
page read and write
22B6B0BD000
trusted library allocation
page read and write
22B5FBAA000
trusted library allocation
page read and write
22B6EDC1000
trusted library allocation
page read and write
22B634FD000
trusted library allocation
page read and write
22B62C56000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B644AA000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B6AA81000
trusted library allocation
page read and write
22B657E2000
trusted library allocation
page read and write
22B640FE000
trusted library allocation
page read and write
22B65439000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B639FE000
trusted library allocation
page read and write
22B647EE000
trusted library allocation
page read and write
22B605B7000
heap
page read and write
22B644CE000
trusted library allocation
page read and write
22B62B73000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B641B7000
trusted library allocation
page read and write
22B6AAE8000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B59BF0000
heap
page read and write
22B605B9000
heap
page read and write
22B6C6BF000
trusted library allocation
page read and write
22B5EC26000
trusted library allocation
page read and write
1E48BAF1000
heap
page read and write
22B59C57000
heap
page read and write
22B62C74000
trusted library allocation
page read and write
22B6F882000
trusted library allocation
page read and write
266A204A000
remote allocation
page execute read
22B59C31000
heap
page read and write
22B64759000
trusted library allocation
page read and write
22B6C6DD000
trusted library allocation
page read and write
22B6EE5E000
heap
page read and write
958A2BE000
stack
page read and write
22B6EAFA000
trusted library allocation
page read and write
22B643C1000
trusted library allocation
page read and write
22B64C80000
trusted library allocation
page read and write
1E48BA6C000
heap
page read and write
22B59C2E000
heap
page read and write
22B59C31000
heap
page read and write
22B655FA000
trusted library allocation
page read and write
22B6B0A0000
trusted library allocation
page read and write
22B6C874000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B64147000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B64139000
trusted library allocation
page read and write
22B65170000
trusted library allocation
page read and write
22B5E5CC000
trusted library allocation
page read and write
22B640DC000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B642AD000
trusted library allocation
page read and write
22B634C3000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B6C6F7000
trusted library allocation
page read and write
22B655FA000
trusted library allocation
page read and write
22B6B08B000
trusted library allocation
page read and write
22B63D5D000
trusted library allocation
page read and write
2254170C000
trusted library allocation
page read and write
22B5E581000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
32429D8000
stack
page read and write
22B603F5000
trusted library allocation
page read and write
22B6105C000
trusted library allocation
page read and write
22B59C63000
heap
page read and write
22B605A7000
heap
page read and write
22B6EE03000
heap
page read and write
22B63C58000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B6B0CD000
trusted library allocation
page read and write
22B6B0D7000
trusted library allocation
page read and write
22B6EA7B000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B59BFD000
heap
page read and write
22B59C11000
heap
page read and write
22B59C11000
heap
page read and write
22B634F6000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6EAFD000
trusted library allocation
page read and write
22B6C83E000
trusted library allocation
page read and write
22B66679000
trusted library allocation
page read and write
22B6410B000
trusted library allocation
page read and write
22B59BF4000
heap
page read and write
22B6ED52000
trusted library allocation
page read and write
22B5FB48000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B605AD000
heap
page read and write
22B6AAF8000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C31000
heap
page read and write
22B643B9000
trusted library allocation
page read and write
22B6F941000
trusted library allocation
page read and write
22B6EDF8000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C11000
heap
page read and write
22B63D0A000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B62B9F000
trusted library allocation
page read and write
22B6403C000
trusted library allocation
page read and write
22541B0C000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B648B7000
trusted library allocation
page read and write
22B6EC84000
trusted library allocation
page read and write
22B640C8000
trusted library allocation
page read and write
22B6ABB7000
trusted library allocation
page read and write
22B6CB62000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
1E48BAE9000
heap
page read and write
1E48AF40000
heap
page readonly
22B666D3000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B654BF000
trusted library allocation
page read and write
22B6ABF5000
trusted library allocation
page read and write
22B641C6000
trusted library allocation
page read and write
22B6ABBC000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C37000
heap
page read and write
22B59C57000
heap
page read and write
22B640E5000
trusted library allocation
page read and write
22B666FD000
trusted library allocation
page read and write
22B6422F000
trusted library allocation
page read and write
22B6ABC2000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B59C11000
heap
page read and write
F24000
heap
page read and write
22B59C31000
heap
page read and write
22B62B9F000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B640B2000
trusted library allocation
page read and write
22B63C4A000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
266A25AD000
trusted library allocation
page read and write
22B651D2000
trusted library allocation
page read and write
22B62C5A000
trusted library allocation
page read and write
22B6485D000
trusted library allocation
page read and write
22B65457000
trusted library allocation
page read and write
22B6F93E000
trusted library allocation
page read and write
22B650DD000
trusted library allocation
page read and write
22B605AC000
heap
page read and write
22B62B9F000
trusted library allocation
page read and write
32442BE000
unkown
page readonly
22B605B8000
heap
page read and write
22B62C7A000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6AD1F000
trusted library allocation
page read and write
22B652E1000
trusted library allocation
page read and write
22B6B040000
trusted library allocation
page read and write
22541A03000
trusted library allocation
page read and write
22B6411E000
trusted library allocation
page read and write
22B59C32000
heap
page read and write
22B6AD45000
trusted library allocation
page read and write
21F4D9EA000
heap
page read and write
22B59BD4000
heap
page read and write
22B59C2F000
heap
page read and write
22B59BF1000
heap
page read and write
22B647B2000
trusted library allocation
page read and write
22B61033000
trusted library allocation
page read and write
22B6104E000
trusted library allocation
page read and write
22B6EE38000
heap
page read and write
22B59C5C000
heap
page read and write
22B643C3000
trusted library allocation
page read and write
22B640DC000
trusted library allocation
page read and write
22B5EBFE000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B650EA000
trusted library allocation
page read and write
22B64243000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B5EC7D000
trusted library allocation
page read and write
22B647B9000
trusted library allocation
page read and write
22B6484B000
trusted library allocation
page read and write
22B6407C000
trusted library allocation
page read and write
22B605BF000
heap
page read and write
22B6440C000
trusted library allocation
page read and write
22B6EBDA000
trusted library allocation
page read and write
22B637B3000
trusted library allocation
page read and write
22B6ADC0000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B59BF0000
heap
page read and write
22B634AF000
trusted library allocation
page read and write
22B64E8B000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
249E000
stack
page read and write
22B668CE000
trusted library allocation
page read and write
22B6C8D7000
trusted library allocation
page read and write
22B5FB4D000
trusted library allocation
page read and write
22B643BD000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B63194000
trusted library allocation
page read and write
22B6B0CB000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B5E59E000
trusted library allocation
page read and write
22B6525E000
trusted library allocation
page read and write
22B6C6FE000
trusted library allocation
page read and write
22B6EAF8000
trusted library allocation
page read and write
22B640B4000
trusted library allocation
page read and write
22B6AEE9000
trusted library allocation
page read and write
22B631EC000
trusted library allocation
page read and write
22B59C18000
heap
page read and write
22B631BA000
trusted library allocation
page read and write
22B62CE7000
trusted library allocation
page read and write
22B661E0000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59C61000
heap
page read and write
22B59C02000
heap
page read and write
22B644FC000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B631E4000
trusted library allocation
page read and write
22B6EBAE000
trusted library allocation
page read and write
1E48AB90000
heap
page read and write
22B6EAA9000
trusted library allocation
page read and write
22B603F5000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B6EEE3000
heap
page read and write
22B655BC000
trusted library allocation
page read and write
6B8BBFB000
stack
page read and write
22B65596000
trusted library allocation
page read and write
22B65160000
trusted library allocation
page read and write
22B640B4000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
22B6B0A0000
trusted library allocation
page read and write
22B63AAB000
trusted library allocation
page read and write
22B639A0000
trusted library allocation
page read and write
22B6EDAC000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59BFD000
heap
page read and write
22B59C37000
heap
page read and write
22B59C1F000
heap
page read and write
22B60DB8000
trusted library allocation
page read and write
F24000
heap
page read and write
22B6F95A000
trusted library allocation
page read and write
22B655CA000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B59C07000
heap
page read and write
22B664FD000
trusted library allocation
page read and write
225414E0000
heap
page read and write
22B63199000
trusted library allocation
page read and write
266A2230000
heap
page read and write
22B6EDAC000
trusted library allocation
page read and write
22B62C48000
trusted library allocation
page read and write
22B631E9000
trusted library allocation
page read and write
22B6AD51000
trusted library allocation
page read and write
22B605B8000
heap
page read and write
22B6CB62000
trusted library allocation
page read and write
22B6C689000
trusted library allocation
page read and write
958A27E000
unkown
page readonly
22B5FD0D000
trusted library allocation
page read and write
1E48BA60000
heap
page read and write
22B6EE28000
heap
page read and write
22B59C11000
heap
page read and write
22B6EE6D000
heap
page read and write
22B654ED000
trusted library allocation
page read and write
22B631BC000
trusted library allocation
page read and write
1E48BA8D000
heap
page read and write
22B59C2D000
heap
page read and write
22B59C36000
heap
page read and write
22B59BFD000
heap
page read and write
22B6C900000
trusted library allocation
page read and write
1E48AE12000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
266A2615000
trusted library allocation
page read and write
22B60355000
trusted library allocation
page read and write
22B63650000
trusted library allocation
page read and write
22B610D8000
trusted library allocation
page read and write
22B63FAB000
trusted library allocation
page read and write
22B6C274000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
F24000
heap
page read and write
22B65071000
trusted library allocation
page read and write
22B6C6F9000
trusted library allocation
page read and write
1E48BAF1000
heap
page read and write
22B6EDED000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B59C20000
heap
page read and write
22B6ED3F000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B59C2F000
heap
page read and write
22B646DD000
trusted library allocation
page read and write
22B62C58000
trusted library allocation
page read and write
22B644D9000
trusted library allocation
page read and write
22B63147000
trusted library allocation
page read and write
22B6B092000
trusted library allocation
page read and write
22B63D72000
trusted library allocation
page read and write
22B640CD000
trusted library allocation
page read and write
22B6EA93000
trusted library allocation
page read and write
266A2617000
trusted library allocation
page read and write
22B6319F000
trusted library allocation
page read and write
22B6EDD9000
trusted library allocation
page read and write
22B6574B000
trusted library allocation
page read and write
22B6D287000
trusted library allocation
page read and write
22B5FD7C000
trusted library allocation
page read and write
22B6ABE0000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B6B0DA000
trusted library allocation
page read and write
225417B8000
trusted library allocation
page read and write
21F4BE80000
heap
page read and write
22B64065000
trusted library allocation
page read and write
22B6F91F000
trusted library allocation
page read and write
22B657FE000
trusted library allocation
page read and write
22B605A7000
heap
page read and write
22B59C11000
heap
page read and write
22B59C11000
heap
page read and write
22B605B4000
heap
page read and write
22B6444B000
trusted library allocation
page read and write
22B5EDC3000
trusted library allocation
page read and write
22B6C7C4000
trusted library allocation
page read and write
22B6DDA8000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6EDA9000
trusted library allocation
page read and write
22B6415A000
trusted library allocation
page read and write
22B64063000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B6570F000
trusted library allocation
page read and write
22B63CCD000
trusted library allocation
page read and write
22B6661F000
trusted library allocation
page read and write
22B664C4000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B605B1000
heap
page read and write
22B5FBFB000
trusted library allocation
page read and write
22B65454000
trusted library allocation
page read and write
22B6471B000
trusted library allocation
page read and write
22B6EA5E000
trusted library allocation
page read and write
22B64159000
trusted library allocation
page read and write
22B62BA6000
trusted library allocation
page read and write
22B64194000
trusted library allocation
page read and write
22B652A7000
trusted library allocation
page read and write
22B652E1000
trusted library allocation
page read and write
22B63C62000
trusted library allocation
page read and write
22B6319B000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B6C686000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B6AEFC000
trusted library allocation
page read and write
22B6ADC0000
trusted library allocation
page read and write
22B63CA1000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B645A6000
trusted library allocation
page read and write
22B6C6CE000
trusted library allocation
page read and write
22B6EE9A000
heap
page read and write
22B59C02000
heap
page read and write
22B640DE000
trusted library allocation
page read and write
22B62BCF000
trusted library allocation
page read and write
22B5FE80000
trusted library allocation
page read and write
22B6F942000
trusted library allocation
page read and write
22B65080000
trusted library allocation
page read and write
22B605A7000
heap
page read and write
22B6B0B5000
trusted library allocation
page read and write
22B6C6F4000
trusted library allocation
page read and write
22B64E95000
trusted library allocation
page read and write
22B6365E000
trusted library allocation
page read and write
22B640BE000
trusted library allocation
page read and write
22B64049000
trusted library allocation
page read and write
22B6F872000
trusted library allocation
page read and write
22B639E2000
trusted library allocation
page read and write
22B63CFE000
trusted library allocation
page read and write
22B63485000
trusted library allocation
page read and write
22B605B1000
heap
page read and write
22B59BFE000
heap
page read and write
22B6F8F7000
trusted library allocation
page read and write
22B64028000
trusted library allocation
page read and write
22B59BD4000
heap
page read and write
22B6ABA8000
trusted library allocation
page read and write
22B6ADF5000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C36000
heap
page read and write
22B635E4000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B640C8000
trusted library allocation
page read and write
22B59C25000
heap
page read and write
22B6F882000
trusted library allocation
page read and write
22B6CBA2000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B59C02000
heap
page read and write
18DF000
heap
page read and write
18A0000
heap
page read and write
22B5FB57000
trusted library allocation
page read and write
22B6418C000
trusted library allocation
page read and write
22B6CBA2000
trusted library allocation
page read and write
22B6059B000
heap
page read and write
22B655C1000
trusted library allocation
page read and write
22B6B0CD000
trusted library allocation
page read and write
22B666B6000
trusted library allocation
page read and write
22B59C26000
heap
page read and write
22B634E6000
trusted library allocation
page read and write
266A25C7000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59BDB000
heap
page read and write
22B6409B000
trusted library allocation
page read and write
266A250D000
trusted library allocation
page read and write
21F4BE00000
heap
page read and write
22B6ABD4000
trusted library allocation
page read and write
22B634F8000
trusted library allocation
page read and write
22B6423F000
trusted library allocation
page read and write
22B63970000
trusted library allocation
page read and write
22B641BE000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B63CAC000
trusted library allocation
page read and write
22B63CF7000
trusted library allocation
page read and write
22B63A12000
trusted library allocation
page read and write
22B6ABB7000
trusted library allocation
page read and write
22B655BC000
trusted library allocation
page read and write
22B657C9000
trusted library allocation
page read and write
22B65678000
trusted library allocation
page read and write
22B6AEE2000
trusted library allocation
page read and write
22B641F0000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B59C07000
heap
page read and write
22B6CBC5000
trusted library allocation
page read and write
22B59C05000
heap
page read and write
22B64432000
trusted library allocation
page read and write
22B64DA5000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
6B8C3FE000
stack
page read and write
1E48BB77000
heap
page read and write
22B59C07000
heap
page read and write
22B59BF0000
heap
page read and write
22B59C4D000
heap
page read and write
22B6C6C3000
trusted library allocation
page read and write
22B64854000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B664D7000
trusted library allocation
page read and write
22B651E5000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
225413B0000
unclassified section
page readonly
22B63AB1000
trusted library allocation
page read and write
22B656FD000
trusted library allocation
page read and write
22B6B0C9000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6ACB1000
trusted library allocation
page read and write
22B62F96000
trusted library allocation
page read and write
22B634C3000
trusted library allocation
page read and write
EBE000
stack
page read and write
22B6B0B5000
trusted library allocation
page read and write
22B605C9000
heap
page read and write
22B6400F000
trusted library allocation
page read and write
D6A8F3E000
unkown
page readonly
3245BBE000
stack
page read and write
22B59BD4000
heap
page read and write
22B62B8C000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B643B9000
trusted library allocation
page read and write
22B66477000
trusted library allocation
page read and write
18DF000
heap
page read and write
22B657A7000
trusted library allocation
page read and write
1082000
unkown
page readonly
1E48B4E0000
heap
page read and write
22B59C2E000
heap
page read and write
22B6EA5A000
trusted library allocation
page read and write
22B636CF000
trusted library allocation
page read and write
22B655D8000
trusted library allocation
page read and write
22B6544B000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B62FF5000
trusted library allocation
page read and write
22B59C26000
heap
page read and write
22B653DA000
trusted library allocation
page read and write
22B64C63000
trusted library allocation
page read and write
266A2581000
trusted library allocation
page read and write
22B65236000
trusted library allocation
page read and write
22B65594000
trusted library allocation
page read and write
22B6EBB6000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6EBE5000
trusted library allocation
page read and write
22B59C2D000
heap
page read and write
22B59C00000
heap
page read and write
1E48BAF1000
heap
page read and write
22B63193000
trusted library allocation
page read and write
22B6417E000
trusted library allocation
page read and write
22B6315C000
trusted library allocation
page read and write
1E48AEAD000
trusted library allocation
page read and write
18C8000
heap
page read and write
22B654BC000
trusted library allocation
page read and write
22B6AC93000
trusted library allocation
page read and write
22B6559C000
trusted library allocation
page read and write
22B641B7000
trusted library allocation
page read and write
22B6AD42000
trusted library allocation
page read and write
22B63183000
trusted library allocation
page read and write
22B6FA92000
trusted library allocation
page read and write
22B647FE000
trusted library allocation
page read and write
22B6349A000
trusted library allocation
page read and write
22B64FA4000
trusted library allocation
page read and write
22B666D8000
trusted library allocation
page read and write
22B6B00D000
trusted library allocation
page read and write
22B645CD000
trusted library allocation
page read and write
22B645A4000
trusted library allocation
page read and write
1E48BA60000
heap
page read and write
22B6ACF2000
trusted library allocation
page read and write
22B59C29000
heap
page read and write
1E48B46D000
unkown
page execute read
22B59C26000
heap
page read and write
22B6AD3B000
trusted library allocation
page read and write
22B6F8E8000
trusted library allocation
page read and write
1CF378E1E000
trusted library allocation
page read and write
22B64125000
trusted library allocation
page read and write
22B59BE5000
heap
page read and write
22B62C82000
trusted library allocation
page read and write
266A2050000
unclassified section
page readonly
22B59BFD000
heap
page read and write
22B6D36D000
trusted library allocation
page read and write
22B5FBDB000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B59BD4000
heap
page read and write
22B65221000
trusted library allocation
page read and write
22B6AEDE000
trusted library allocation
page read and write
22B640C8000
trusted library allocation
page read and write
22B6C7F5000
trusted library allocation
page read and write
22B64859000
trusted library allocation
page read and write
1E48BA69000
heap
page read and write
22B637D8000
trusted library allocation
page read and write
22B631CC000
trusted library allocation
page read and write
22B6FAD9000
trusted library allocation
page read and write
22B639FA000
trusted library allocation
page read and write
22B644AE000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B5FB5A000
trusted library allocation
page read and write
22B59C14000
heap
page read and write
22B59C5C000
heap
page read and write
22B6ABA8000
trusted library allocation
page read and write
22B64175000
trusted library allocation
page read and write
22B59C01000
heap
page read and write
22B6344C000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B59C12000
heap
page read and write
21F4D9DC000
heap
page read and write
22B59C02000
heap
page read and write
22B59C0D000
heap
page read and write
22B6ECD8000
trusted library allocation
page read and write
22B654B8000
trusted library allocation
page read and write
22B640DE000
trusted library allocation
page read and write
22B6D386000
trusted library allocation
page read and write
22E0003F000
trusted library allocation
page read and write
1E48AAF0000
unclassified section
page readonly
22B637F3000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6F867000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B59BEA000
heap
page read and write
22B6347E000
trusted library allocation
page read and write
22B6C817000
trusted library allocation
page read and write
22B648B0000
trusted library allocation
page read and write
22B5EF24000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
22B66621000
trusted library allocation
page read and write
22B6447A000
trusted library allocation
page read and write
22B66679000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B641AC000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B63C39000
trusted library allocation
page read and write
22B631DA000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B59C02000
heap
page read and write
22B6ABA8000
trusted library allocation
page read and write
22B59C1E000
heap
page read and write
22B59C5A000
heap
page read and write
22B59C02000
heap
page read and write
22B6AB74000
trusted library allocation
page read and write
22B64DF5000
trusted library allocation
page read and write
22B5FB35000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B59C11000
heap
page read and write
22B59C25000
heap
page read and write
22B648B0000
trusted library allocation
page read and write
22B62BA6000
trusted library allocation
page read and write
1E48AE2F000
trusted library allocation
page read and write
22B6ABA2000
trusted library allocation
page read and write
18D2000
heap
page read and write
22B661CE000
trusted library allocation
page read and write
22B6C6F2000
trusted library allocation
page read and write
22B6C6DD000
trusted library allocation
page read and write
22B6662D000
trusted library allocation
page read and write
22B6EDF1000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
225414C0000
heap
page read and write
22B6C6C6000
trusted library allocation
page read and write
22B6612C000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B5E5C0000
trusted library allocation
page read and write
22B63C3B000
trusted library allocation
page read and write
22B631C6000
trusted library allocation
page read and write
22B6ABD4000
trusted library allocation
page read and write
1E48AE16000
trusted library allocation
page read and write
22B62DD0000
trusted library allocation
page read and write
22B640B0000
trusted library allocation
page read and write
22B63980000
trusted library allocation
page read and write
22B5EC13000
trusted library allocation
page read and write
22B6EE47000
heap
page read and write
225414B2000
unclassified section
page read and write
22B640D8000
trusted library allocation
page read and write
6B8D3FE000
stack
page read and write
22B640EB000
trusted library allocation
page read and write
22B6AABE000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B64EEC000
trusted library allocation
page read and write
22B65693000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B631C1000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B641F0000
trusted library allocation
page read and write
22B59C14000
heap
page read and write
22B640B8000
trusted library allocation
page read and write
D6A75FE000
stack
page read and write
22B59C62000
heap
page read and write
22B6B04D000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B6AB58000
trusted library allocation
page read and write
22B6399B000
trusted library allocation
page read and write
22B6ABA8000
trusted library allocation
page read and write
22B63592000
trusted library allocation
page read and write
22B631E2000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B6C698000
trusted library allocation
page read and write
22B661EC000
trusted library allocation
page read and write
22B63965000
trusted library allocation
page read and write
22B6AC8B000
trusted library allocation
page read and write
22B6CB55000
trusted library allocation
page read and write
22B6F952000
trusted library allocation
page read and write
22B64199000
trusted library allocation
page read and write
22B6E797000
trusted library allocation
page read and write
22B654C4000
trusted library allocation
page read and write
22B6ABA6000
trusted library allocation
page read and write
18D1000
heap
page read and write
22B6AAFA000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
6B8BBFF000
stack
page read and write
22B6F90B000
trusted library allocation
page read and write
22B6AE0B000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B59C11000
heap
page read and write
22B62ECE000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B59C00000
heap
page read and write
22B59C0B000
heap
page read and write
22B631BA000
trusted library allocation
page read and write
22B6C6F7000
trusted library allocation
page read and write
22B63CAC000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59C36000
heap
page read and write
22B6ABA2000
trusted library allocation
page read and write
22B6F95F000
trusted library allocation
page read and write
22541896000
heap
page read and write
22B653F1000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6E74A000
trusted library allocation
page read and write
22B635F3000
trusted library allocation
page read and write
266A25A0000
trusted library allocation
page read and write
22B6059E000
heap
page read and write
22B631FA000
trusted library allocation
page read and write
22B6C688000
trusted library allocation
page read and write
22B6038A000
trusted library allocation
page read and write
22B59C25000
heap
page read and write
22B59C07000
heap
page read and write
22541890000
heap
page read and write
22B59C22000
heap
page read and write
22B64099000
trusted library allocation
page read and write
22B6423F000
trusted library allocation
page read and write
22B59C61000
heap
page read and write
22B59C3C000
heap
page read and write
22B66480000
trusted library allocation
page read and write
22B6CBCA000
trusted library allocation
page read and write
22B6458F000
trusted library allocation
page read and write
22B639AB000
trusted library allocation
page read and write
22B6313E000
trusted library allocation
page read and write
22B6475B000
trusted library allocation
page read and write
22B59C32000
heap
page read and write
22B6543C000
trusted library allocation
page read and write
1E48BA5C000
heap
page read and write
22B59C1B000
heap
page read and write
22B6F951000
trusted library allocation
page read and write
22B641B7000
trusted library allocation
page read and write
22B6E7A6000
trusted library allocation
page read and write
266A22D0000
heap
page read and write
22B6C6F4000
trusted library allocation
page read and write
22B60598000
heap
page read and write
22B63CC9000
trusted library allocation
page read and write
22B6398C000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B64440000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B59C5C000
heap
page read and write
22B639FB000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B6D3C5000
trusted library allocation
page read and write
22B6B0CD000
trusted library allocation
page read and write
22B63FC5000
trusted library allocation
page read and write
18C3000
heap
page read and write
22B6ABA6000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B59C2E000
heap
page read and write
22B59C5A000
heap
page read and write
22B603D0000
trusted library allocation
page read and write
22B59C12000
heap
page read and write
22B6B0FD000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B59BF8000
heap
page read and write
266A2030000
remote allocation
page read and write
22B6F95F000
trusted library allocation
page read and write
22B644B8000
trusted library allocation
page read and write
22B6C7D1000
trusted library allocation
page read and write
22B642F2000
trusted library allocation
page read and write
22B64EA1000
trusted library allocation
page read and write
22B6319B000
trusted library allocation
page read and write
22B64E84000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B64165000
trusted library allocation
page read and write
22B6EB73000
trusted library allocation
page read and write
22B59C63000
heap
page read and write
22B653E9000
trusted library allocation
page read and write
1E48BB21000
heap
page read and write
22B60599000
heap
page read and write
22B6C7DC000
trusted library allocation
page read and write
958C37E000
unkown
page readonly
22B631C1000
trusted library allocation
page read and write
22B6419F000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B64846000
trusted library allocation
page read and write
22B6C222000
trusted library allocation
page read and write
22B605A8000
heap
page read and write
22B59BF1000
heap
page read and write
1E48BB2A000
heap
page read and write
22B6F980000
trusted library allocation
page read and write
22B647BB000
trusted library allocation
page read and write
22B6F93B000
trusted library allocation
page read and write
22B64851000
trusted library allocation
page read and write
22B59BFE000
heap
page read and write
42C7DFE000
stack
page read and write
22B65722000
trusted library allocation
page read and write
22B6AB54000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B642B2000
trusted library allocation
page read and write
22B652C4000
trusted library allocation
page read and write
22B654F4000
trusted library allocation
page read and write
22B59C5A000
heap
page read and write
22B59C11000
heap
page read and write
1E48B3C2000
unclassified section
page read and write
22B6B0AD000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B63908000
trusted library allocation
page read and write
22B605AC000
heap
page read and write
22B59BFD000
heap
page read and write
22B63156000
trusted library allocation
page read and write
22B64750000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B664BB000
trusted library allocation
page read and write
22B6AE7A000
trusted library allocation
page read and write
22B6C61B000
trusted library allocation
page read and write
22B63D3E000
trusted library allocation
page read and write
22B6AAD6000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
22B6ABB7000
trusted library allocation
page read and write
22B631E7000
trusted library allocation
page read and write
22B6ABA6000
trusted library allocation
page read and write
22B631B2000
trusted library allocation
page read and write
22B6F939000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B653DA000
trusted library allocation
page read and write
22B60337000
trusted library allocation
page read and write
22B63187000
trusted library allocation
page read and write
1C278F30000
heap
page read and write
22B63661000
trusted library allocation
page read and write
22B605BA000
heap
page read and write
22B62F3C000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B59C1F000
heap
page read and write
22B59C07000
heap
page read and write
22B59C57000
heap
page read and write
22B6EDC0000
trusted library allocation
page read and write
22B5FDAC000
trusted library allocation
page read and write
22B65716000
trusted library allocation
page read and write
22B5EFA6000
trusted library allocation
page read and write
22B63C4D000
trusted library allocation
page read and write
22B59BFE000
heap
page read and write
22B6C6AA000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B610F2000
trusted library allocation
page read and write
22B6ABA4000
trusted library allocation
page read and write
22B640DC000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B6E7A6000
trusted library allocation
page read and write
22B5FE6A000
trusted library allocation
page read and write
22B6642D000
trusted library allocation
page read and write
22B6FA47000
trusted library allocation
page read and write
22B62C72000
trusted library allocation
page read and write
22B6B0CB000
trusted library allocation
page read and write
22B6AB16000
trusted library allocation
page read and write
22B6AB27000
trusted library allocation
page read and write
22B64614000
trusted library allocation
page read and write
22B640FA000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B644E0000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
D6A5ACD000
stack
page read and write
22B5EF6A000
trusted library allocation
page read and write
22B62B9F000
trusted library allocation
page read and write
22B6EAF4000
trusted library allocation
page read and write
22B6410D000
trusted library allocation
page read and write
22B6FAA5000
trusted library allocation
page read and write
22B63C5A000
trusted library allocation
page read and write
22B6D3A3000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B5FD98000
trusted library allocation
page read and write
22B6C69C000
trusted library allocation
page read and write
22B655CE000
trusted library allocation
page read and write
22B62CD9000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B59C02000
heap
page read and write
958BB7E000
stack
page read and write
22B63DBE000
trusted library allocation
page read and write
22B650C5000
trusted library allocation
page read and write
22B63DAD000
trusted library allocation
page read and write
22B6372F000
trusted library allocation
page read and write
22B6EC8B000
trusted library allocation
page read and write
22B643C5000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B6C7D4000
trusted library allocation
page read and write
22B5FEA3000
trusted library allocation
page read and write
22B6B0EE000
trusted library allocation
page read and write
22B6559C000
trusted library allocation
page read and write
22B64967000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B59C5C000
heap
page read and write
22B640D4000
trusted library allocation
page read and write
22B640DC000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
2254140A000
heap
page read and write
22B6613F000
trusted library allocation
page read and write
22B640DC000
trusted library allocation
page read and write
6B8CBFF000
stack
page read and write
22B6504E000
trusted library allocation
page read and write
22B648E5000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B5FB1D000
trusted library allocation
page read and write
22B6EE8B000
heap
page read and write
22B62B7B000
trusted library allocation
page read and write
1E48BAEB000
heap
page read and write
22B59C4D000
heap
page read and write
22B6F969000
trusted library allocation
page read and write
22B64175000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B631A3000
trusted library allocation
page read and write
22B653F4000
trusted library allocation
page read and write
22B62B6A000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B6EDE9000
trusted library allocation
page read and write
22B6412C000
trusted library allocation
page read and write
22B6AED3000
trusted library allocation
page read and write
22B635AB000
trusted library allocation
page read and write
22B59BEF000
heap
page read and write
22B59C1B000
heap
page read and write
22B64753000
trusted library allocation
page read and write
22B6545E000
trusted library allocation
page read and write
22B59C10000
heap
page read and write
22B641F0000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B5FEF6000
trusted library allocation
page read and write
22B651FB000
trusted library allocation
page read and write
22B64753000
trusted library allocation
page read and write
22B6AEFA000
trusted library allocation
page read and write
22B6B096000
trusted library allocation
page read and write
22B59C31000
heap
page read and write
22B6C241000
trusted library allocation
page read and write
22B642DB000
trusted library allocation
page read and write
266A2600000
trusted library allocation
page read and write
22B610CE000
trusted library allocation
page read and write
1E48BA63000
heap
page read and write
22B635FD000
trusted library allocation
page read and write
22B637BB000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B59BEC000
heap
page read and write
21F4C000000
trusted library allocation
page read and write
22B6ABF5000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
17CF000
stack
page read and write
22B62FEA000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B655FE000
trusted library allocation
page read and write
22B6ABD4000
trusted library allocation
page read and write
22B6FA9E000
trusted library allocation
page read and write
22B65697000
trusted library allocation
page read and write
22B64495000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B59BF0000
heap
page read and write
22541460000
heap
page read and write
22B65712000
trusted library allocation
page read and write
22B6348B000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B635F9000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B65148000
trusted library allocation
page read and write
22B6610C000
trusted library allocation
page read and write
22B6B087000
trusted library allocation
page read and write
22B655C1000
trusted library allocation
page read and write
22B6447A000
trusted library allocation
page read and write
22B6EE03000
heap
page read and write
18CF000
heap
page read and write
22B641E2000
trusted library allocation
page read and write
22B62BCF000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C15000
heap
page read and write
22B6EDCD000
trusted library allocation
page read and write
22B6419F000
trusted library allocation
page read and write
1E48BAEB000
heap
page read and write
22B64430000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
D6AA73E000
stack
page read and write
22B59C2E000
heap
page read and write
22B6ABC2000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B59BED000
heap
page read and write
22B634C9000
trusted library allocation
page read and write
22B6AE1E000
trusted library allocation
page read and write
22B6C82B000
trusted library allocation
page read and write
22B62BA6000
trusted library allocation
page read and write
22B6B008000
trusted library allocation
page read and write
22B640F1000
trusted library allocation
page read and write
22B64893000
trusted library allocation
page read and write
22B64046000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
1E48BB44000
heap
page read and write
22B59BFD000
heap
page read and write
22B59C02000
heap
page read and write
266A2563000
trusted library allocation
page read and write
22B59BE5000
heap
page read and write
22B59BD4000
heap
page read and write
22B6FAFC000
trusted library allocation
page read and write
32443BE000
unkown
page readonly
22B59BED000
heap
page read and write
22B650BF000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B59C0B000
heap
page read and write
22B64191000
trusted library allocation
page read and write
22B652F8000
trusted library allocation
page read and write
22B641EC000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B6507E000
trusted library allocation
page read and write
22B65476000
trusted library allocation
page read and write
22B6AB74000
trusted library allocation
page read and write
22B59BED000
heap
page read and write
22B6C67D000
trusted library allocation
page read and write
22B64187000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B63485000
trusted library allocation
page read and write
22B6AECF000
trusted library allocation
page read and write
22B63CDA000
trusted library allocation
page read and write
22B631F3000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B64428000
trusted library allocation
page read and write
22B6C692000
trusted library allocation
page read and write
22B63154000
trusted library allocation
page read and write
22B6EB6C000
trusted library allocation
page read and write
22B631E7000
trusted library allocation
page read and write
1E48BAFD000
heap
page read and write
22B635C1000
trusted library allocation
page read and write
22B654BC000
trusted library allocation
page read and write
22B663C4000
trusted library allocation
page read and write
22B59BD0000
heap
page read and write
22B6F932000
trusted library allocation
page read and write
22B6C6D1000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B6C783000
trusted library allocation
page read and write
21F4C100000
trusted library allocation
page read and write
22B654BF000
trusted library allocation
page read and write
22B6B096000
trusted library allocation
page read and write
22B6AB5C000
trusted library allocation
page read and write
266A2592000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B5FE75000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59C37000
heap
page read and write
22B6B089000
trusted library allocation
page read and write
22B655C7000
trusted library allocation
page read and write
1E48AEC6000
trusted library allocation
page read and write
22B6F984000
trusted library allocation
page read and write
22B640EB000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B631C6000
trusted library allocation
page read and write
22B6FA9C000
trusted library allocation
page read and write
22B656A4000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
21F4D9D0000
heap
page read and write
22B6662C000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6ADEA000
trusted library allocation
page read and write
22B62C3C000
trusted library allocation
page read and write
22B663C4000
trusted library allocation
page read and write
22B6ABA2000
trusted library allocation
page read and write
22B605C3000
heap
page read and write
22B6EDA9000
trusted library allocation
page read and write
22B655DA000
trusted library allocation
page read and write
22B63C55000
trusted library allocation
page read and write
22B653E4000
trusted library allocation
page read and write
22B63667000
trusted library allocation
page read and write
22B66681000
trusted library allocation
page read and write
22B6ACF9000
trusted library allocation
page read and write
22B59BDB000
heap
page read and write
22B634F3000
trusted library allocation
page read and write
22B6EE9A000
heap
page read and write
22B653E9000
trusted library allocation
page read and write
22B63A1B000
trusted library allocation
page read and write
22B59C1E000
heap
page read and write
22B6B053000
trusted library allocation
page read and write
22B6AB5C000
trusted library allocation
page read and write
22B6FA4A000
trusted library allocation
page read and write
22B6C6B7000
trusted library allocation
page read and write
1E48BB58000
heap
page read and write
22B6ABD4000
trusted library allocation
page read and write
22B6B0A0000
trusted library allocation
page read and write
22B66442000
trusted library allocation
page read and write
266A2567000
trusted library allocation
page read and write
22B631C1000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B605D4000
heap
page read and write
22B59C2E000
heap
page read and write
266A2070000
heap
page read and write
22B644E0000
trusted library allocation
page read and write
1E48BB00000
heap
page read and write
22B650F7000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B59C58000
heap
page read and write
22B5EB71000
trusted library allocation
page read and write
22B640C8000
trusted library allocation
page read and write
22B634E6000
trusted library allocation
page read and write
22B5FF3A000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C2F000
heap
page read and write
22B6316F000
trusted library allocation
page read and write
22B6ABBC000
trusted library allocation
page read and write
22B59BF0000
heap
page read and write
22B639DA000
trusted library allocation
page read and write
22B59BE9000
heap
page read and write
22B59C02000
heap
page read and write
22B6AB6C000
trusted library allocation
page read and write
22B6489B000
trusted library allocation
page read and write
22B59C18000
heap
page read and write
22B656B8000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B6E771000
trusted library allocation
page read and write
22B6ABC6000
trusted library allocation
page read and write
22B62B71000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B64747000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B643FB000
trusted library allocation
page read and write
22B643FB000
trusted library allocation
page read and write
22B6B0B7000
trusted library allocation
page read and write
22B664A9000
trusted library allocation
page read and write
22B6EAF4000
trusted library allocation
page read and write
22B6ECE5000
trusted library allocation
page read and write
22B5FB5C000
trusted library allocation
page read and write
1E48BB44000
heap
page read and write
22B66619000
trusted library allocation
page read and write
22B647FE000
trusted library allocation
page read and write
1E48BB3B000
heap
page read and write
22B6B087000
trusted library allocation
page read and write
22B6EDD0000
trusted library allocation
page read and write
22B644BE000
trusted library allocation
page read and write
22B6319B000
trusted library allocation
page read and write
22B605B4000
heap
page read and write
21F4BE8D000
heap
page read and write
22B60DCF000
trusted library allocation
page read and write
1C279121000
heap
page read and write
22B6AEF8000
trusted library allocation
page read and write
22B6346C000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B59C5C000
heap
page read and write
22B6362E000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B63D67000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59C37000
heap
page read and write
22B59BF0000
heap
page read and write
22B62DC7000
trusted library allocation
page read and write
266A2205000
heap
page read and write
22B6AAD6000
trusted library allocation
page read and write
22B6C6A8000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B652DE000
trusted library allocation
page read and write
6B8DBFE000
stack
page read and write
22B648BD000
trusted library allocation
page read and write
22B631C6000
trusted library allocation
page read and write
22B6527E000
trusted library allocation
page read and write
225417A3000
trusted library allocation
page read and write
266A2700000
heap
page read and write
22B6AB74000
trusted library allocation
page read and write
3E34000
heap
page read and write
1E48BAE9000
heap
page read and write
22B6F8E8000
trusted library allocation
page read and write
22541400000
heap
page read and write
22B641EB000
trusted library allocation
page read and write
22B634C9000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B66694000
trusted library allocation
page read and write
22B6CBC5000
trusted library allocation
page read and write
22B639A0000
trusted library allocation
page read and write
22B65726000
trusted library allocation
page read and write
22B59C06000
heap
page read and write
108C000
unkown
page read and write
22B59C36000
heap
page read and write
22B6E74E000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B6B0B5000
trusted library allocation
page read and write
22B64D9A000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B639D6000
trusted library allocation
page read and write
22B59C61000
heap
page read and write
22B6C66A000
trusted library allocation
page read and write
22B63452000
trusted library allocation
page read and write
22B6ABCB000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B6C69E000
trusted library allocation
page read and write
22B65180000
trusted library allocation
page read and write
1C279110000
heap
page read and write
22B639E8000
trusted library allocation
page read and write
22B6ADF5000
trusted library allocation
page read and write
22B59C1B000
heap
page read and write
22B64E8E000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B654F1000
trusted library allocation
page read and write
22B6508D000
trusted library allocation
page read and write
1E48BAEB000
heap
page read and write
22B59BDB000
heap
page read and write
42C75FF000
stack
page read and write
22B59C11000
heap
page read and write
22B59C11000
heap
page read and write
22B59C0B000
heap
page read and write
22B59C61000
heap
page read and write
22B6035C000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B634BD000
trusted library allocation
page read and write
22B59BEA000
heap
page read and write
22B62B83000
trusted library allocation
page read and write
22B66367000
trusted library allocation
page read and write
22B640CD000
trusted library allocation
page read and write
1E48B470000
trusted library allocation
page read and write
22B6527B000
trusted library allocation
page read and write
3241FDE000
stack
page read and write
22B59C14000
heap
page read and write
22B6314A000
trusted library allocation
page read and write
22B6AEFC000
trusted library allocation
page read and write
22B59C63000
heap
page read and write
22B652F8000
trusted library allocation
page read and write
22B666FB000
trusted library allocation
page read and write
22B66114000
trusted library allocation
page read and write
1E48AE78000
trusted library allocation
page read and write
D6A8EFE000
stack
page read and write
22B62C4D000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B6349E000
trusted library allocation
page read and write
22B63D97000
trusted library allocation
page read and write
22B6EE73000
heap
page read and write
1E48BB58000
heap
page read and write
22B63D07000
trusted library allocation
page read and write
22B6034B000
trusted library allocation
page read and write
22B640DE000
trusted library allocation
page read and write
225417AC000
trusted library allocation
page read and write
22B6419F000
trusted library allocation
page read and write
22B59BD4000
heap
page read and write
22B59BFD000
heap
page read and write
22B647EE000
trusted library allocation
page read and write
22B6437B000
trusted library allocation
page read and write
1E48AEF3000
trusted library allocation
page read and write
1E48BAF1000
heap
page read and write
22B66650000
trusted library allocation
page read and write
22B6357C000
trusted library allocation
page read and write
22B640D4000
trusted library allocation
page read and write
22B5FBAA000
trusted library allocation
page read and write
22B6C6D1000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6AB9C000
trusted library allocation
page read and write
22B631BC000
trusted library allocation
page read and write
22B6447C000
trusted library allocation
page read and write
22B631BA000
trusted library allocation
page read and write
22B634C9000
trusted library allocation
page read and write
22B6AC97000
trusted library allocation
page read and write
22541440000
heap
page read and write
18A8000
heap
page read and write
22B640B4000
trusted library allocation
page read and write
22B66442000
trusted library allocation
page read and write
22B59BEE000
heap
page read and write
22B59C17000
heap
page read and write
21F4BE8D000
heap
page read and write
22B5ECF7000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B643BB000
trusted library allocation
page read and write
22B664AD000
trusted library allocation
page read and write
22B59C61000
heap
page read and write
22B59C57000
heap
page read and write
22B5E5EF000
trusted library allocation
page read and write
22B6FA5F000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B661E4000
trusted library allocation
page read and write
22B636CA000
trusted library allocation
page read and write
1E48BAF2000
heap
page read and write
22B640DE000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B6B09A000
trusted library allocation
page read and write
22B6EAEE000
trusted library allocation
page read and write
22B62B89000
trusted library allocation
page read and write
22B59C2D000
heap
page read and write
22B5E5A5000
trusted library allocation
page read and write
22B64620000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B6484B000
trusted library allocation
page read and write
1E48BAF1000
heap
page read and write
22B5FF25000
trusted library allocation
page read and write
22B63196000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C37000
heap
page read and write
22B59BF4000
heap
page read and write
22B5E5A7000
trusted library allocation
page read and write
22B6AEF2000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B6AE43000
trusted library allocation
page read and write
22B6AD0A000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B5FD8E000
trusted library allocation
page read and write
22B62BCF000
trusted library allocation
page read and write
1E48BAFD000
heap
page read and write
22B634EF000
trusted library allocation
page read and write
22B5ECC6000
trusted library allocation
page read and write
1C279200000
trusted library allocation
page read and write
22B6429F000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C0B000
heap
page read and write
22B655FC000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B5FEEB000
trusted library allocation
page read and write
22B605AC000
heap
page read and write
1E48BA6C000
heap
page read and write
22B5FBFB000
trusted library allocation
page read and write
22B6ACC5000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B63AAB000
trusted library allocation
page read and write
22B640BE000
trusted library allocation
page read and write
22B6EBA8000
trusted library allocation
page read and write
22B62B6E000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B640E5000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B6ADDB000
trusted library allocation
page read and write
22B6546C000
trusted library allocation
page read and write
1E48BB69000
heap
page read and write
22B59C11000
heap
page read and write
22B63FF2000
trusted library allocation
page read and write
22B6E730000
trusted library allocation
page read and write
22B652D6000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
1E48ACE0000
heap
page read and write
22B59C57000
heap
page read and write
22B643BB000
trusted library allocation
page read and write
22B6352F000
trusted library allocation
page read and write
22B65400000
trusted library allocation
page read and write
22B631B2000
trusted library allocation
page read and write
22B59C0B000
heap
page read and write
22B653E2000
trusted library allocation
page read and write
22B63C3B000
trusted library allocation
page read and write
22B6F86D000
trusted library allocation
page read and write
22B654BC000
trusted library allocation
page read and write
22B651FB000
trusted library allocation
page read and write
22B6AB48000
trusted library allocation
page read and write
22B634C9000
trusted library allocation
page read and write
22B59C62000
heap
page read and write
22B631CC000
trusted library allocation
page read and write
22B6B089000
trusted library allocation
page read and write
22B6427F000
trusted library allocation
page read and write
22B6447C000
trusted library allocation
page read and write
22B59C36000
heap
page read and write
22B59C1B000
heap
page read and write
22B59C11000
heap
page read and write
22B6AB6C000
trusted library allocation
page read and write
22B6FAA3000
trusted library allocation
page read and write
22B6EAF2000
trusted library allocation
page read and write
21F4D9E4000
heap
page read and write
22B6AEDA000
trusted library allocation
page read and write
22B63C5A000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B6ACC8000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B6C695000
trusted library allocation
page read and write
22B63C4D000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B63A0F000
trusted library allocation
page read and write
22B59C11000
heap
page read and write
22B59C1B000
heap
page read and write
1C279119000
heap
page read and write
22B666D3000
trusted library allocation
page read and write
22B6AEDE000
trusted library allocation
page read and write
1E48BAE3000
heap
page read and write
22B59C02000
heap
page read and write
22B59C00000
heap
page read and write
22B6408F000
trusted library allocation
page read and write
22B59C2E000
heap
page read and write
22B5FDDC000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6AB66000
trusted library allocation
page read and write
22B642B0000
trusted library allocation
page read and write
22B62EB9000
trusted library allocation
page read and write
22B64EC1000
trusted library allocation
page read and write
22B63D6E000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B64695000
trusted library allocation
page read and write
22B6485D000
trusted library allocation
page read and write
22B6AB6C000
trusted library allocation
page read and write
22B64125000
trusted library allocation
page read and write
22B6AD51000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B59C57000
heap
page read and write
22B631D4000
trusted library allocation
page read and write
22B59BF6000
heap
page read and write
22B6B100000
trusted library allocation
page read and write
2254175F000
trusted library allocation
page read and write
22B643EF000
trusted library allocation
page read and write
22B6350E000
trusted library allocation
page read and write
22B6C6F7000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B6397C000
trusted library allocation
page read and write
22B6C874000
trusted library allocation
page read and write
22B6ABC2000
trusted library allocation
page read and write
22B6F95A000
trusted library allocation
page read and write
1E48BA9C000
heap
page read and write
22B6EE0D000
heap
page read and write
22B6EAEE000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B6ACE1000
trusted library allocation
page read and write
22B65594000
trusted library allocation
page read and write
22B655B7000
trusted library allocation
page read and write
22B605BF000
heap
page read and write
22B6C62A000
trusted library allocation
page read and write
22B631B2000
trusted library allocation
page read and write
22B6C6F8000
trusted library allocation
page read and write
1E48BA4D000
heap
page read and write
22B59C4D000
heap
page read and write
22B641F9000
trusted library allocation
page read and write
22B631EE000
trusted library allocation
page read and write
22B640B2000
trusted library allocation
page read and write
22B5ED00000
trusted library allocation
page read and write
22B59C5C000
heap
page read and write
22B6686D000
trusted library allocation
page read and write
22B6ABC6000
trusted library allocation
page read and write
22B63C4D000
trusted library allocation
page read and write
22B636DB000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
1E48BB3B000
heap
page read and write
22B631C1000
trusted library allocation
page read and write
21F4D9DD000
heap
page read and write
22B605C3000
heap
page read and write
22B6ECA6000
trusted library allocation
page read and write
22B610DA000
trusted library allocation
page read and write
D6A65D8000
stack
page read and write
22B64E8E000
trusted library allocation
page read and write
22B59C37000
heap
page read and write
22B59C4D000
heap
page read and write
D60000
heap
page read and write
21F4C220000
heap
page read and write
22B634FD000
trusted library allocation
page read and write
22B6AABA000
trusted library allocation
page read and write
22B59C5A000
heap
page read and write
1E48BA6C000
heap
page read and write
22B59C11000
heap
page read and write
22B5ECC6000
trusted library allocation
page read and write
22B6ADEC000
trusted library allocation
page read and write
22B6417C000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B59BF6000
heap
page read and write
22B6B0C9000
trusted library allocation
page read and write
22B6AE7A000
trusted library allocation
page read and write
266A25BA000
trusted library allocation
page read and write
32439FE000
stack
page read and write
22B64499000
trusted library allocation
page read and write
22B63FFA000
trusted library allocation
page read and write
22B59C1C000
heap
page read and write
22B653F4000
trusted library allocation
page read and write
1E48AE23000
trusted library allocation
page read and write
22B647EB000
trusted library allocation
page read and write
22B640F1000
trusted library allocation
page read and write
22B62F27000
trusted library allocation
page read and write
22B6FA8F000
trusted library allocation
page read and write
22B59C4D000
heap
page read and write
22B5FEBE000
trusted library allocation
page read and write
22B59C07000
heap
page read and write
22B59C36000
heap
page read and write
22B59C0A000
heap
page read and write
22B63CA0000
trusted library allocation
page read and write
22B6EC7B000
trusted library allocation
page read and write
1E48BB58000
heap
page read and write
22B59C15000
heap
page read and write
22B650E7000
trusted library allocation
page read and write
22B59BFD000
heap
page read and write
22B64828000
trusted library allocation
page read and write
22B59C57000
heap
page read and write
22B6AB74000
trusted library allocation
page read and write
266A2503000
trusted library allocation
page read and write
22B59C58000
heap
page read and write
22B59C61000
heap
page read and write
22B59BF4000
heap
page read and write
22B6418C000
trusted library allocation
page read and write
22B6DD02000
trusted library allocation
page read and write
1E48AB6E000
remote allocation
page execute read
22B637B3000
trusted library allocation
page read and write
22B6C6BF000
trusted library allocation
page read and write
22B59C2D000
heap
page read and write
22B59C36000
heap
page read and write
22B65678000
trusted library allocation
page read and write
22B652CD000
trusted library allocation
page read and write
22B655FA000
trusted library allocation
page read and write
22B6319B000
trusted library allocation
page read and write
22B59BF1000
heap
page read and write
22B63C55000
trusted library allocation
page read and write
22B642E3000
trusted library allocation
page read and write
1E48BA60000
heap
page read and write
22B631B2000
trusted library allocation
page read and write
22B5EC44000
trusted library allocation
page read and write
22B6EA7A000
trusted library allocation
page read and write
22B59BF6000
heap
page read and write
22B652EC000
trusted library allocation
page read and write
22B640F1000
trusted library allocation
page read and write
22B59C0A000
heap
page read and write
22B64289000
trusted library allocation
page read and write
22B64458000
trusted library allocation
page read and write
22B641C3000
trusted library allocation
page read and write
22B64099000
trusted library allocation
page read and write
21F4C107000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B6669F000
trusted library allocation
page read and write
22B6C840000
trusted library allocation
page read and write
22B635E7000
trusted library allocation
page read and write
22B65663000
trusted library allocation
page read and write
22B6313C000
trusted library allocation
page read and write
1E48AD00000
trusted library allocation
page read and write
22B59C2F000
heap
page read and write
22B62BCF000
trusted library allocation
page read and write
22B6ADEC000
trusted library allocation
page read and write
22B5FB48000
trusted library allocation
page read and write
22B59C15000
heap
page read and write
22B641EB000
trusted library allocation
page read and write
22B59C02000
heap
page read and write
22B646F8000
trusted library allocation
page read and write
1E48BAEB000
heap
page read and write
22B6C6BD000
trusted library allocation
page read and write
22B634A1000
trusted library allocation
page read and write
22B641EC000
trusted library allocation
page read and write
22541320000
unclassified section
page readonly
22B59C5C000
heap
page read and write
22B642D3000
trusted library allocation
page read and write
22B59C00000
heap
page read and write
22B59C5C000
heap
page read and write
22B6CB1F000
trusted library allocation
page read and write
22B65180000
trusted library allocation
page read and write
There are 4171 hidden memdumps, click here to show them.