Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_13868cec-1278-4b1a-879e-6a9b97737aed.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_13868cec-1278-4b1a-879e-6a9b97737aed.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\61d93283-859d-4dbf-a966-e2b01a81e37e
(copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\61d93283-859d-4dbf-a966-e2b01a81e37e.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 27 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2276 -parentBuildID 20230927232528 -prefsHandle 2212
-prefMapHandle 2196 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {ebce3b20-7255-42e7-81d5-9d5ad72c4935} 6428 "\\.\pipe\gecko-crash-server-pipe.6428" 1d5e3f6f510 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -parentBuildID 20230927232528 -prefsHandle 2904
-prefMapHandle 3840 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {807ce9ee-a414-40a2-9002-cf302937fc8c}
6428 "\\.\pipe\gecko-crash-server-pipe.6428" 1d5f6144b10 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5072 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 4832 -prefMapHandle 4816 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {2540bd53-f2b7-4fe8-9c11-d991b082dd32} 6428 "\\.\pipe\gecko-crash-server-pipe.6428" 1d5ff819510 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema.
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warning
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2020-12/schema/=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://ok.ru/
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://www.openh264.org/
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://gpuweb.github.io/gpuweb/
|
unknown
|
||
https://relay.firefox.com/api/v1/
|
unknown
|
||
http://json-schema.org/draft-07/schema#-
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
|
unknown
|
||
https://topsites.services.mozilla.com/cid/
|
unknown
|
||
https://spocs.getpocket.com/users
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
https://vk.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.0.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.1
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.129.91
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.185.238
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
142.250.185.78
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.193.140
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
151.101.129.91
|
services.addons.mozilla.org
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 1 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D5EADAF000
|
heap
|
page read and write
|
||
1D5EFEAF000
|
trusted library allocation
|
page read and write
|
||
1D5EADE4000
|
heap
|
page read and write
|
||
1D5FF89A000
|
trusted library allocation
|
page read and write
|
||
1D5F4091000
|
trusted library allocation
|
page read and write
|
||
3B179FE000
|
stack
|
page read and write
|
||
1D5FC248000
|
trusted library allocation
|
page read and write
|
||
F3BB03E000
|
stack
|
page read and write
|
||
1D5F7619000
|
trusted library allocation
|
page read and write
|
||
1D5F4C65000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5F35CB000
|
trusted library allocation
|
page read and write
|
||
1D5F4CB4000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1563000
|
heap
|
page read and write
|
||
F3B96BB000
|
stack
|
page read and write
|
||
1D5F474C000
|
trusted library allocation
|
page read and write
|
||
1D600199000
|
trusted library allocation
|
page read and write
|
||
1D5F4CA3000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0B000
|
heap
|
page read and write
|
||
1D5EADAD000
|
heap
|
page read and write
|
||
1C949810000
|
heap
|
page read and write
|
||
1D5F76E6000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
21F2BB12000
|
trusted library allocation
|
page read and write
|
||
1D5F66C6000
|
trusted library allocation
|
page read and write
|
||
1D5FC293000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1C947D20000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5FF46B000
|
trusted library allocation
|
page read and write
|
||
1D5F40AD000
|
trusted library allocation
|
page read and write
|
||
1D5FE3CD000
|
trusted library allocation
|
page read and write
|
||
1D5F384B000
|
heap
|
page read and write
|
||
1D5FC25A000
|
trusted library allocation
|
page read and write
|
||
1D5F3823000
|
heap
|
page read and write
|
||
1D5F4CD5000
|
trusted library allocation
|
page read and write
|
||
1D5F4A53000
|
trusted library allocation
|
page read and write
|
||
3B181FE000
|
unkown
|
page readonly
|
||
1D5F3832000
|
heap
|
page read and write
|
||
1D5FF5A6000
|
trusted library allocation
|
page read and write
|
||
1D5F56DD000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F5CA6000
|
trusted library allocation
|
page read and write
|
||
1D5FF860000
|
trusted library allocation
|
page read and write
|
||
21F2BB15000
|
trusted library allocation
|
page read and write
|
||
1D5F56DD000
|
trusted library allocation
|
page read and write
|
||
2885E4C4000
|
heap
|
page read and write
|
||
1D5F4C5E000
|
trusted library allocation
|
page read and write
|
||
1D5F47A1000
|
trusted library allocation
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
2885E300000
|
trusted library allocation
|
page read and write
|
||
1D5FBCC7000
|
trusted library allocation
|
page read and write
|
||
1D5F72D9000
|
trusted library allocation
|
page read and write
|
||
1D5F563E000
|
trusted library allocation
|
page read and write
|
||
1D5FE704000
|
trusted library allocation
|
page read and write
|
||
21F2B860000
|
unclassified section
|
page readonly
|
||
1D5F73B3000
|
trusted library allocation
|
page read and write
|
||
1D5FBCBF000
|
trusted library allocation
|
page read and write
|
||
1D5F431F000
|
trusted library allocation
|
page read and write
|
||
21F2B780000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
15B3F800000
|
heap
|
page read and write
|
||
1D5FF8ED000
|
trusted library allocation
|
page read and write
|
||
1D5EADDB000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FBF32000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F55AB000
|
trusted library allocation
|
page read and write
|
||
1D5EFF00000
|
trusted library allocation
|
page read and write
|
||
1D5FF9C4000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5F5C5C000
|
trusted library allocation
|
page read and write
|
||
1D5FC1E8000
|
trusted library allocation
|
page read and write
|
||
1D5F518F000
|
trusted library allocation
|
page read and write
|
||
1C947D60000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F3C3B000
|
trusted library allocation
|
page read and write
|
||
1D5FD922000
|
trusted library allocation
|
page read and write
|
||
1D5F7834000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8D000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
1D5EADB7000
|
heap
|
page read and write
|
||
1D5F51D7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5FC4E1000
|
trusted library allocation
|
page read and write
|
||
1D5FBD70000
|
trusted library allocation
|
page read and write
|
||
1D5EAD81000
|
heap
|
page read and write
|
||
1D5FF898000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F76AC000
|
trusted library allocation
|
page read and write
|
||
1D5EADB7000
|
heap
|
page read and write
|
||
1D5FC2B9000
|
trusted library allocation
|
page read and write
|
||
1D5FBEC2000
|
trusted library allocation
|
page read and write
|
||
1D5F6765000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAE13000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F56EB000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5FC07B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F5EDD000
|
trusted library allocation
|
page read and write
|
||
2885E369000
|
trusted library allocation
|
page read and write
|
||
1D5F5C68000
|
trusted library allocation
|
page read and write
|
||
1D5EADB3000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F454C000
|
trusted library allocation
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5F67B8000
|
trusted library allocation
|
page read and write
|
||
1D5EFEB5000
|
trusted library allocation
|
page read and write
|
||
1D5F35CF000
|
trusted library allocation
|
page read and write
|
||
1D5F55E1000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5FC2E9000
|
trusted library allocation
|
page read and write
|
||
1D5F0FEC000
|
trusted library allocation
|
page read and write
|
||
1D60012C000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F679B000
|
trusted library allocation
|
page read and write
|
||
1D5FE3D9000
|
trusted library allocation
|
page read and write
|
||
1D5F6671000
|
trusted library allocation
|
page read and write
|
||
1D5F45F4000
|
trusted library allocation
|
page read and write
|
||
1D5F4CEB000
|
trusted library allocation
|
page read and write
|
||
1D5FF47C000
|
trusted library allocation
|
page read and write
|
||
1D5F0D85000
|
trusted library allocation
|
page read and write
|
||
1D5EAD89000
|
heap
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D600B7F000
|
heap
|
page read and write
|
||
1D5F679B000
|
trusted library allocation
|
page read and write
|
||
1D5F40AA000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F477C000
|
trusted library allocation
|
page read and write
|
||
15B3F860000
|
heap
|
page read and write
|
||
1D5F75CB000
|
trusted library allocation
|
page read and write
|
||
1D5FC1B1000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F10A6000
|
trusted library allocation
|
page read and write
|
||
21F2BAB9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5FBC8D000
|
trusted library allocation
|
page read and write
|
||
1D5FF474000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F5CF0000
|
trusted library allocation
|
page read and write
|
||
1D5FC082000
|
trusted library allocation
|
page read and write
|
||
1D5F5332000
|
trusted library allocation
|
page read and write
|
||
1D5F3CF7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F45B8000
|
trusted library allocation
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F4CBD000
|
trusted library allocation
|
page read and write
|
||
1D5F47AA000
|
trusted library allocation
|
page read and write
|
||
1D5F475C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F5EA3000
|
trusted library allocation
|
page read and write
|
||
1D5F5673000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F4C65000
|
trusted library allocation
|
page read and write
|
||
1D5F40F8000
|
trusted library allocation
|
page read and write
|
||
1D5FBD74000
|
trusted library allocation
|
page read and write
|
||
1D5FBEAA000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5EADB7000
|
heap
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
1D5FC2C3000
|
trusted library allocation
|
page read and write
|
||
1D5FC1C2000
|
trusted library allocation
|
page read and write
|
||
1D5FE659000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5EAE13000
|
heap
|
page read and write
|
||
1D5F1663000
|
trusted library allocation
|
page read and write
|
||
1D5F0DAD000
|
trusted library allocation
|
page read and write
|
||
1D5F45B7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EADFE000
|
heap
|
page read and write
|
||
1D5F5CFA000
|
trusted library allocation
|
page read and write
|
||
1D5F354E000
|
trusted library allocation
|
page read and write
|
||
1D5F4CD5000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8D000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FD860000
|
trusted library allocation
|
page read and write
|
||
1D5FE659000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F1662000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D600171000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F51E1000
|
trusted library allocation
|
page read and write
|
||
1D5F67AE000
|
trusted library allocation
|
page read and write
|
||
1D80003F000
|
trusted library allocation
|
page read and write
|
||
1D6001F2000
|
trusted library allocation
|
page read and write
|
||
1D5F3B7D000
|
trusted library allocation
|
page read and write
|
||
1D5F459E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5EADA9000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5FF88E000
|
trusted library allocation
|
page read and write
|
||
1D5FC082000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FD887000
|
trusted library allocation
|
page read and write
|
||
21F2BA00000
|
trusted library allocation
|
page read and write
|
||
15B3F1D0000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5FC0EF000
|
trusted library allocation
|
page read and write
|
||
1D5F68C8000
|
trusted library allocation
|
page read and write
|
||
1D5FBE5B000
|
trusted library allocation
|
page read and write
|
||
1D5FF96D000
|
trusted library allocation
|
page read and write
|
||
15B3F860000
|
heap
|
page read and write
|
||
1D5F6369000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
15B3EB00000
|
trusted library allocation
|
page read and write
|
||
1D5FBFDE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
15B3F864000
|
heap
|
page read and write
|
||
1D5FF9A9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5FF954000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F7627000
|
trusted library allocation
|
page read and write
|
||
1D5F568F000
|
trusted library allocation
|
page read and write
|
||
1D5F432F000
|
trusted library allocation
|
page read and write
|
||
1D5F387A000
|
heap
|
page read and write
|
||
1D5F4C6F000
|
trusted library allocation
|
page read and write
|
||
1D5F4CCB000
|
trusted library allocation
|
page read and write
|
||
1D5F5318000
|
trusted library allocation
|
page read and write
|
||
1D5F5744000
|
trusted library allocation
|
page read and write
|
||
1D5F5FD6000
|
trusted library allocation
|
page read and write
|
||
1D5F5FE6000
|
trusted library allocation
|
page read and write
|
||
3B1713E000
|
stack
|
page read and write
|
||
1D5EFEFE000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F557C000
|
trusted library allocation
|
page read and write
|
||
1D5FF852000
|
trusted library allocation
|
page read and write
|
||
1D5F4CDB000
|
trusted library allocation
|
page read and write
|
||
1D5F3823000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5FC2BF000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F73AB000
|
trusted library allocation
|
page read and write
|
||
1D5F0D5E000
|
trusted library allocation
|
page read and write
|
||
15B3E9BE000
|
heap
|
page read and write
|
||
1D5FF930000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
15B3F869000
|
heap
|
page read and write
|
||
1D5FC1F5000
|
trusted library allocation
|
page read and write
|
||
1D5F56C5000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5EADE9000
|
heap
|
page read and write
|
||
1D5F5EC4000
|
trusted library allocation
|
page read and write
|
||
1D5F3847000
|
heap
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5F5FFA000
|
trusted library allocation
|
page read and write
|
||
1D5FC1E8000
|
trusted library allocation
|
page read and write
|
||
1D6001ED000
|
trusted library allocation
|
page read and write
|
||
1D5F5727000
|
trusted library allocation
|
page read and write
|
||
1D5F56E7000
|
trusted library allocation
|
page read and write
|
||
1D5F56DF000
|
trusted library allocation
|
page read and write
|
||
1D5F4CA6000
|
trusted library allocation
|
page read and write
|
||
1D5F0DB7000
|
trusted library allocation
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
1D5FBEAA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F5CB1000
|
trusted library allocation
|
page read and write
|
||
1D5FC289000
|
trusted library allocation
|
page read and write
|
||
1D5FE724000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8D000
|
heap
|
page read and write
|
||
1D5FF5F2000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
1D5F76EC000
|
trusted library allocation
|
page read and write
|
||
1D5FF81E000
|
trusted library allocation
|
page read and write
|
||
1D5F4C6B000
|
trusted library allocation
|
page read and write
|
||
1D5F73D7000
|
trusted library allocation
|
page read and write
|
||
1D5FC0C1000
|
trusted library allocation
|
page read and write
|
||
1D5F61E6000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
1D5FE5D6000
|
trusted library allocation
|
page read and write
|
||
1D6001FB000
|
trusted library allocation
|
page read and write
|
||
21F2BA64000
|
trusted library allocation
|
page read and write
|
||
1D5F56EE000
|
trusted library allocation
|
page read and write
|
||
1D5EFE93000
|
trusted library allocation
|
page read and write
|
||
1D5EF7A9000
|
trusted library allocation
|
page read and write
|
||
1D600183000
|
trusted library allocation
|
page read and write
|
||
1D5F40FE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F606C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
15B3EB5C000
|
trusted library allocation
|
page read and write
|
||
1D5F5327000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F4CB3000
|
trusted library allocation
|
page read and write
|
||
1D5FF5C9000
|
trusted library allocation
|
page read and write
|
||
1D5FE5FC000
|
trusted library allocation
|
page read and write
|
||
1D5F5F51000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F5320000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
3B157D8000
|
stack
|
page read and write
|
||
1D600177000
|
trusted library allocation
|
page read and write
|
||
1D5F5502000
|
trusted library allocation
|
page read and write
|
||
1D5FC0C1000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5FC1D5000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1C949829000
|
heap
|
page read and write
|
||
1D5F3C8A000
|
trusted library allocation
|
page read and write
|
||
1D5F7340000
|
trusted library allocation
|
page read and write
|
||
1D5F5C87000
|
trusted library allocation
|
page read and write
|
||
F699D3E000
|
unkown
|
page readonly
|
||
1D5F351B000
|
trusted library allocation
|
page read and write
|
||
15B3E790000
|
unclassified section
|
page readonly
|
||
1D5F3CD7000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F10EB000
|
trusted library allocation
|
page read and write
|
||
2885E318000
|
trusted library allocation
|
page read and write
|
||
1D5F56DD000
|
trusted library allocation
|
page read and write
|
||
1D5EADE1000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FFC99000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9C000
|
heap
|
page read and write
|
||
1D5FBD30000
|
trusted library allocation
|
page read and write
|
||
1D5F56D1000
|
trusted library allocation
|
page read and write
|
||
1D5F4750000
|
trusted library allocation
|
page read and write
|
||
1D5F51AC000
|
trusted library allocation
|
page read and write
|
||
1D5F3840000
|
heap
|
page read and write
|
||
1D5FD853000
|
trusted library allocation
|
page read and write
|
||
1D5F0DC8000
|
trusted library allocation
|
page read and write
|
||
1D5F6113000
|
trusted library allocation
|
page read and write
|
||
1D5F5F5B000
|
trusted library allocation
|
page read and write
|
||
1D5FF42C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5FF963000
|
trusted library allocation
|
page read and write
|
||
1D5FC268000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F3823000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F73B3000
|
trusted library allocation
|
page read and write
|
||
1D5FF5FB000
|
trusted library allocation
|
page read and write
|
||
15B3F977000
|
heap
|
page read and write
|
||
1D5F0D53000
|
trusted library allocation
|
page read and write
|
||
1D5F6789000
|
trusted library allocation
|
page read and write
|
||
1D5F67B3000
|
trusted library allocation
|
page read and write
|
||
1D5F384B000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FF85A000
|
trusted library allocation
|
page read and write
|
||
1D5F0FD8000
|
trusted library allocation
|
page read and write
|
||
2885E349000
|
trusted library allocation
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5FBCC7000
|
trusted library allocation
|
page read and write
|
||
1D5FF8D6000
|
trusted library allocation
|
page read and write
|
||
1D5F4ADA000
|
trusted library allocation
|
page read and write
|
||
1D5FF963000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5F5315000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F56E1000
|
trusted library allocation
|
page read and write
|
||
1D5F1033000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5F4C65000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F57DE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9C000
|
heap
|
page read and write
|
||
1D5FC2BF000
|
trusted library allocation
|
page read and write
|
||
1D5F736C000
|
trusted library allocation
|
page read and write
|
||
1D5F5E23000
|
trusted library allocation
|
page read and write
|
||
1D5EF784000
|
trusted library allocation
|
page read and write
|
||
1D5F5AE9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F5EC2000
|
trusted library allocation
|
page read and write
|
||
1D5F5CF6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F351E000
|
trusted library allocation
|
page read and write
|
||
1D5F63C8000
|
trusted library allocation
|
page read and write
|
||
1D5EF7EF000
|
trusted library allocation
|
page read and write
|
||
1D5F5744000
|
trusted library allocation
|
page read and write
|
||
1D5F51E7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F63E0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5FBFF7000
|
trusted library allocation
|
page read and write
|
||
1D5F35F4000
|
trusted library allocation
|
page read and write
|
||
1D5FBEE6000
|
trusted library allocation
|
page read and write
|
||
1D5F4C7B000
|
trusted library allocation
|
page read and write
|
||
1D5F45F4000
|
trusted library allocation
|
page read and write
|
||
15B3EC00000
|
trusted library section
|
page readonly
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5FBDC4000
|
trusted library allocation
|
page read and write
|
||
1D5F47F3000
|
trusted library allocation
|
page read and write
|
||
1D5FD8CD000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5FC0A7000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5FC496000
|
trusted library allocation
|
page read and write
|
||
1D5F5EA3000
|
trusted library allocation
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
F697D3E000
|
unkown
|
page readonly
|
||
1D5FF5C9000
|
trusted library allocation
|
page read and write
|
||
1D5FF8E6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F0D53000
|
trusted library allocation
|
page read and write
|
||
1D5EADF4000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1C949800000
|
heap
|
page read and write
|
||
3D01000
|
heap
|
page read and write
|
||
1D5FF839000
|
trusted library allocation
|
page read and write
|
||
1D5EAD64000
|
heap
|
page read and write
|
||
1D5F56C8000
|
trusted library allocation
|
page read and write
|
||
1D5FBFB2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F5794000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F40DA000
|
trusted library allocation
|
page read and write
|
||
1D5F5380000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5F47F3000
|
trusted library allocation
|
page read and write
|
||
1D5FBFA6000
|
trusted library allocation
|
page read and write
|
||
1D5F76B9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F4C74000
|
trusted library allocation
|
page read and write
|
||
1D5F4C36000
|
trusted library allocation
|
page read and write
|
||
1D5F72D5000
|
trusted library allocation
|
page read and write
|
||
15B3F959000
|
heap
|
page read and write
|
||
1D5F4CFE000
|
trusted library allocation
|
page read and write
|
||
1D5FC0BF000
|
trusted library allocation
|
page read and write
|
||
1D5FE618000
|
trusted library allocation
|
page read and write
|
||
1D5F384B000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5FF9BB000
|
trusted library allocation
|
page read and write
|
||
1D5F565C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F5A38000
|
trusted library allocation
|
page read and write
|
||
F697BFE000
|
unkown
|
page readonly
|
||
1D5FE701000
|
trusted library allocation
|
page read and write
|
||
1D5F6614000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F5FD6000
|
trusted library allocation
|
page read and write
|
||
1D5F49A5000
|
trusted library allocation
|
page read and write
|
||
1D5F67D6000
|
trusted library allocation
|
page read and write
|
||
1D600B9C000
|
heap
|
page read and write
|
||
1D5EADDF000
|
heap
|
page read and write
|
||
1D5F76E2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F56D0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F397B000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
3B1717E000
|
unkown
|
page readonly
|
||
1D5EF798000
|
trusted library allocation
|
page read and write
|
||
1D5F3B7D000
|
trusted library allocation
|
page read and write
|
||
1D5FC2EB000
|
trusted library allocation
|
page read and write
|
||
15B3EB0A000
|
trusted library allocation
|
page read and write
|
||
1D5F47E5000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F5CD0000
|
trusted library allocation
|
page read and write
|
||
1D5F56C3000
|
trusted library allocation
|
page read and write
|
||
1D5EADF0000
|
heap
|
page read and write
|
||
1D5F5AEF000
|
trusted library allocation
|
page read and write
|
||
1D5FC0B8000
|
trusted library allocation
|
page read and write
|
||
1D5FF8CD000
|
trusted library allocation
|
page read and write
|
||
1D5FBD36000
|
trusted library allocation
|
page read and write
|
||
1D5FBF9C000
|
trusted library allocation
|
page read and write
|
||
2885DF30000
|
heap
|
page read and write
|
||
2885E30C000
|
trusted library allocation
|
page read and write
|
||
1D5F4CD3000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F60BA000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5FFCA0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1C949816000
|
heap
|
page read and write
|
||
1D5F4C22000
|
trusted library allocation
|
page read and write
|
||
1D5F539F000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F78FE000
|
trusted library allocation
|
page read and write
|
||
1D5F73B0000
|
trusted library allocation
|
page read and write
|
||
1D5FF898000
|
trusted library allocation
|
page read and write
|
||
1D6001EF000
|
trusted library allocation
|
page read and write
|
||
1D5F67EA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F55F6000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F3969000
|
trusted library allocation
|
page read and write
|
||
1D5F5EDD000
|
trusted library allocation
|
page read and write
|
||
1D5F537F000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0D000
|
heap
|
page read and write
|
||
1D5FC2A5000
|
trusted library allocation
|
page read and write
|
||
21F2B5C3000
|
heap
|
page read and write
|
||
1D5F6176000
|
trusted library allocation
|
page read and write
|
||
1D6001E9000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F76E2000
|
trusted library allocation
|
page read and write
|
||
1D5F560C000
|
trusted library allocation
|
page read and write
|
||
15B3F85C000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F40D2000
|
trusted library allocation
|
page read and write
|
||
1D5F399D000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8B000
|
heap
|
page read and write
|
||
1D5EADAE000
|
heap
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5F10BE000
|
trusted library allocation
|
page read and write
|
||
1D5EADAC000
|
heap
|
page read and write
|
||
1D5F5AE1000
|
trusted library allocation
|
page read and write
|
||
1D5F6365000
|
trusted library allocation
|
page read and write
|
||
1D5F47A1000
|
trusted library allocation
|
page read and write
|
||
1D5F4C5E000
|
trusted library allocation
|
page read and write
|
||
1D5F4C17000
|
trusted library allocation
|
page read and write
|
||
21F2B640000
|
unclassified section
|
page readonly
|
||
1D5F63AC000
|
trusted library allocation
|
page read and write
|
||
1D5FF855000
|
trusted library allocation
|
page read and write
|
||
1D5FF9D2000
|
trusted library allocation
|
page read and write
|
||
1D5F16FE000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F4C74000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
1D5F667C000
|
trusted library allocation
|
page read and write
|
||
1D5FBF76000
|
trusted library allocation
|
page read and write
|
||
1D5F3823000
|
heap
|
page read and write
|
||
1D5FBEB3000
|
trusted library allocation
|
page read and write
|
||
1D5F109A000
|
trusted library allocation
|
page read and write
|
||
1D5EAE13000
|
heap
|
page read and write
|
||
1D5F534A000
|
trusted library allocation
|
page read and write
|
||
1D5F67B8000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F68FA000
|
trusted library allocation
|
page read and write
|
||
1D5F63AE000
|
trusted library allocation
|
page read and write
|
||
1D5F76BB000
|
trusted library allocation
|
page read and write
|
||
1D5F0D53000
|
trusted library allocation
|
page read and write
|
||
1D5F4917000
|
trusted library allocation
|
page read and write
|
||
1D5F4CEB000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0A000
|
heap
|
page read and write
|
||
2885E370000
|
trusted library allocation
|
page read and write
|
||
1D5F76EC000
|
trusted library allocation
|
page read and write
|
||
1D5EADE6000
|
heap
|
page read and write
|
||
1D5F5A7A000
|
trusted library allocation
|
page read and write
|
||
1D5FC113000
|
trusted library allocation
|
page read and write
|
||
1D5FC0C1000
|
trusted library allocation
|
page read and write
|
||
1D5F73B9000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5F5643000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F5FFA000
|
trusted library allocation
|
page read and write
|
||
1D5F5CD8000
|
trusted library allocation
|
page read and write
|
||
1D5FF846000
|
trusted library allocation
|
page read and write
|
||
1D5F5FD6000
|
trusted library allocation
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
1D6001ED000
|
trusted library allocation
|
page read and write
|
||
1D5FD86E000
|
trusted library allocation
|
page read and write
|
||
1D5FC0B8000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F5587000
|
trusted library allocation
|
page read and write
|
||
1D5FD9F6000
|
trusted library allocation
|
page read and write
|
||
2885E313000
|
trusted library allocation
|
page read and write
|
||
1D5F56B1000
|
trusted library allocation
|
page read and write
|
||
2E8C9FF000
|
stack
|
page read and write
|
||
1D5FC2FA000
|
trusted library allocation
|
page read and write
|
||
1D5F431B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F10F6000
|
trusted library allocation
|
page read and write
|
||
1D5F67C2000
|
trusted library allocation
|
page read and write
|
||
21F2BA10000
|
trusted library allocation
|
page read and write
|
||
1D5F4CA6000
|
trusted library allocation
|
page read and write
|
||
1D5F47BB000
|
trusted library allocation
|
page read and write
|
||
21F2B633000
|
remote allocation
|
page execute read
|
||
1D5F8A02000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
F3B973E000
|
unkown
|
page readonly
|
||
1D5F3CBA000
|
trusted library allocation
|
page read and write
|
||
1D5F4C24000
|
trusted library allocation
|
page read and write
|
||
15B3E930000
|
heap
|
page read and write
|
||
1D5EAE0A000
|
heap
|
page read and write
|
||
1D5FBCE3000
|
trusted library allocation
|
page read and write
|
||
1D5F6400000
|
trusted library allocation
|
page read and write
|
||
1D6001BA000
|
trusted library allocation
|
page read and write
|
||
1D5FF963000
|
trusted library allocation
|
page read and write
|
||
1D5F750B000
|
trusted library allocation
|
page read and write
|
||
1D5F5CF2000
|
trusted library allocation
|
page read and write
|
||
1D60054A000
|
trusted library allocation
|
page read and write
|
||
1D5F40AA000
|
trusted library allocation
|
page read and write
|
||
1D5FC082000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5FD8B8000
|
trusted library allocation
|
page read and write
|
||
1D5FD883000
|
trusted library allocation
|
page read and write
|
||
1D5F161E000
|
trusted library allocation
|
page read and write
|
||
1D5F39D1000
|
trusted library allocation
|
page read and write
|
||
1D5F0DE1000
|
trusted library allocation
|
page read and write
|
||
1D5FC1F5000
|
trusted library allocation
|
page read and write
|
||
1D5F4CD5000
|
trusted library allocation
|
page read and write
|
||
1D5F78FE000
|
trusted library allocation
|
page read and write
|
||
1D5F6789000
|
trusted library allocation
|
page read and write
|
||
21F2B5C0000
|
heap
|
page read and write
|
||
15B3F977000
|
heap
|
page read and write
|
||
1D5F3B77000
|
trusted library allocation
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
1D5F4583000
|
trusted library allocation
|
page read and write
|
||
1D5FD8C2000
|
trusted library allocation
|
page read and write
|
||
1D5F3840000
|
heap
|
page read and write
|
||
1D5F75B9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD65000
|
heap
|
page read and write
|
||
1D5F56DD000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
1D5F3CAE000
|
trusted library allocation
|
page read and write
|
||
1D5FC1D1000
|
trusted library allocation
|
page read and write
|
||
1D5F63AC000
|
trusted library allocation
|
page read and write
|
||
1D5FC1E8000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1D5EADAB000
|
heap
|
page read and write
|
||
1D5FF89A000
|
trusted library allocation
|
page read and write
|
||
1D5FC08B000
|
trusted library allocation
|
page read and write
|
||
1D5EFD2F000
|
trusted library allocation
|
page read and write
|
||
1D5F0DFA000
|
trusted library allocation
|
page read and write
|
||
1D5F3B55000
|
trusted library allocation
|
page read and write
|
||
1D5F3545000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5F5F4B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FD9EF000
|
trusted library allocation
|
page read and write
|
||
1D5FBECC000
|
trusted library allocation
|
page read and write
|
||
1D5FD8E9000
|
trusted library allocation
|
page read and write
|
||
1D5F10A8000
|
trusted library allocation
|
page read and write
|
||
1D5FBC9D000
|
trusted library allocation
|
page read and write
|
||
1D5F438F000
|
trusted library allocation
|
page read and write
|
||
1D5FD88B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D600171000
|
trusted library allocation
|
page read and write
|
||
1D5F571B000
|
trusted library allocation
|
page read and write
|
||
2885E600000
|
trusted library allocation
|
page read and write
|
||
1D5F40CA000
|
trusted library allocation
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5F678B000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F5A57000
|
trusted library allocation
|
page read and write
|
||
1D5F63BC000
|
trusted library allocation
|
page read and write
|
||
1D5FF5E8000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F5724000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5EAD76000
|
heap
|
page read and write
|
||
1D5F3828000
|
heap
|
page read and write
|
||
1D5FBF5D000
|
trusted library allocation
|
page read and write
|
||
1D5FC248000
|
trusted library allocation
|
page read and write
|
||
1D5F56DF000
|
trusted library allocation
|
page read and write
|
||
1D5F7854000
|
trusted library allocation
|
page read and write
|
||
1D5FBCD1000
|
trusted library allocation
|
page read and write
|
||
21F2BA47000
|
trusted library allocation
|
page read and write
|
||
1D5F574A000
|
trusted library allocation
|
page read and write
|
||
1D5FBEC2000
|
trusted library allocation
|
page read and write
|
||
1D5F384B000
|
heap
|
page read and write
|
||
1D5F5AE8000
|
trusted library allocation
|
page read and write
|
||
1D5FBFF7000
|
trusted library allocation
|
page read and write
|
||
1D5F1098000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5FF89A000
|
trusted library allocation
|
page read and write
|
||
15B3F8E0000
|
heap
|
page read and write
|
||
1D5FD8E0000
|
trusted library allocation
|
page read and write
|
||
1D5F765C000
|
trusted library allocation
|
page read and write
|
||
1D5FC1E1000
|
trusted library allocation
|
page read and write
|
||
2885E346000
|
trusted library allocation
|
page read and write
|
||
1D5F5CEE000
|
trusted library allocation
|
page read and write
|
||
1D5F67FE000
|
trusted library allocation
|
page read and write
|
||
1D5EADB0000
|
heap
|
page read and write
|
||
1D5F162F000
|
trusted library allocation
|
page read and write
|
||
1D5F4391000
|
trusted library allocation
|
page read and write
|
||
1D5F4CCF000
|
trusted library allocation
|
page read and write
|
||
1D5F6363000
|
trusted library allocation
|
page read and write
|
||
1D5F5AEF000
|
trusted library allocation
|
page read and write
|
||
1D5F4790000
|
trusted library allocation
|
page read and write
|
||
15B3F88A000
|
heap
|
page read and write
|
||
1D5FF5FB000
|
trusted library allocation
|
page read and write
|
||
1D5FC0BF000
|
trusted library allocation
|
page read and write
|
||
1D5EF7DF000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F1139000
|
trusted library allocation
|
page read and write
|
||
1D5FE6B4000
|
trusted library allocation
|
page read and write
|
||
1D5F3CE8000
|
trusted library allocation
|
page read and write
|
||
2885E0D0000
|
unclassified section
|
page readonly
|
||
1D5F5AED000
|
trusted library allocation
|
page read and write
|
||
1D5F62D3000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
21F2B7FF000
|
unclassified section
|
page read and write
|
||
1D5F764F000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1C947D30000
|
heap
|
page read and write
|
||
1D5F61D5000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F63EE000
|
trusted library allocation
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
1D600546000
|
trusted library allocation
|
page read and write
|
||
1D5F3CEE000
|
trusted library allocation
|
page read and write
|
||
1D5FF5C0000
|
trusted library allocation
|
page read and write
|
||
1D5FFC9C000
|
trusted library allocation
|
page read and write
|
||
1D5FC296000
|
trusted library allocation
|
page read and write
|
||
1D5F4544000
|
trusted library allocation
|
page read and write
|
||
1D5FE3D1000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5FC089000
|
trusted library allocation
|
page read and write
|
||
1D5F40CA000
|
trusted library allocation
|
page read and write
|
||
1D5EF79E000
|
trusted library allocation
|
page read and write
|
||
1D5FC09E000
|
trusted library allocation
|
page read and write
|
||
1D5EFDF6000
|
trusted library allocation
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
1D5F73B3000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
24326371E000
|
trusted library allocation
|
page read and write
|
||
1D5F394E000
|
trusted library allocation
|
page read and write
|
||
15B3F96B000
|
heap
|
page read and write
|
||
1D60026A000
|
trusted library allocation
|
page read and write
|
||
1D5F3841000
|
heap
|
page read and write
|
||
1D5F57EA000
|
trusted library allocation
|
page read and write
|
||
1D5F3828000
|
heap
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5FC0AB000
|
trusted library allocation
|
page read and write
|
||
1D5F49ED000
|
trusted library allocation
|
page read and write
|
||
21F2BACB000
|
trusted library allocation
|
page read and write
|
||
1D5F382A000
|
heap
|
page read and write
|
||
1D5F383F000
|
heap
|
page read and write
|
||
15B3EC92000
|
unkown
|
page execute read
|
||
1D5EADDB000
|
heap
|
page read and write
|
||
1D5EADE6000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
2885E3DB000
|
trusted library allocation
|
page read and write
|
||
1D5FF9BB000
|
trusted library allocation
|
page read and write
|
||
1D5F1063000
|
trusted library allocation
|
page read and write
|
||
1D5F76CA000
|
trusted library allocation
|
page read and write
|
||
1D5F736A000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
15B3F8A1000
|
heap
|
page read and write
|
||
1D5F3CEE000
|
trusted library allocation
|
page read and write
|
||
1D5F386A000
|
heap
|
page read and write
|
||
1D5F5EAF000
|
trusted library allocation
|
page read and write
|
||
1D5F5354000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F57E8000
|
trusted library allocation
|
page read and write
|
||
1D5F5720000
|
trusted library allocation
|
page read and write
|
||
1D5FC079000
|
trusted library allocation
|
page read and write
|
||
1D5FC1FC000
|
trusted library allocation
|
page read and write
|
||
1D5F4C36000
|
trusted library allocation
|
page read and write
|
||
1D5FBEB2000
|
trusted library allocation
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
2885E0A0000
|
unclassified section
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
15B3E9C0000
|
heap
|
page readonly
|
||
1D5FBF5D000
|
trusted library allocation
|
page read and write
|
||
1D5F474F000
|
trusted library allocation
|
page read and write
|
||
1D5F0DCE000
|
trusted library allocation
|
page read and write
|
||
F3BC83E000
|
unkown
|
page readonly
|
||
1D5FF99F000
|
trusted library allocation
|
page read and write
|
||
1D5FF4E9000
|
trusted library allocation
|
page read and write
|
||
1D5EADE0000
|
heap
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D600B66000
|
heap
|
page read and write
|
||
94357FF000
|
stack
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F4CED000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
21F2BA96000
|
trusted library allocation
|
page read and write
|
||
1D5F3936000
|
trusted library allocation
|
page read and write
|
||
1D5F57ED000
|
trusted library allocation
|
page read and write
|
||
1D5F5CD0000
|
trusted library allocation
|
page read and write
|
||
1D5FBDAA000
|
trusted library allocation
|
page read and write
|
||
1D5F571E000
|
trusted library allocation
|
page read and write
|
||
2885DE50000
|
unclassified section
|
page readonly
|
||
21F2BB32000
|
trusted library allocation
|
page read and write
|
||
1D5F56D6000
|
trusted library allocation
|
page read and write
|
||
1D6001C3000
|
trusted library allocation
|
page read and write
|
||
1D5FFC55000
|
trusted library allocation
|
page read and write
|
||
1D5F4391000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F5744000
|
trusted library allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
1D5F10BC000
|
trusted library allocation
|
page read and write
|
||
1D5F56D0000
|
trusted library allocation
|
page read and write
|
||
1D5F3CF7000
|
trusted library allocation
|
page read and write
|
||
1D5FF5F2000
|
trusted library allocation
|
page read and write
|
||
1D5FF486000
|
trusted library allocation
|
page read and write
|
||
1D5FC031000
|
trusted library allocation
|
page read and write
|
||
1D5F3856000
|
heap
|
page read and write
|
||
1D5FC0C1000
|
trusted library allocation
|
page read and write
|
||
1D5F56D0000
|
trusted library allocation
|
page read and write
|
||
21F2BA72000
|
trusted library allocation
|
page read and write
|
||
1D600B8D000
|
heap
|
page read and write
|
||
1D5F5CFC000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EFEFE000
|
trusted library allocation
|
page read and write
|
||
1D60058C000
|
trusted library allocation
|
page read and write
|
||
1D5F3CBF000
|
trusted library allocation
|
page read and write
|
||
1D5F3C3B000
|
trusted library allocation
|
page read and write
|
||
1D5F4CBD000
|
trusted library allocation
|
page read and write
|
||
1D5F4AEC000
|
trusted library allocation
|
page read and write
|
||
1D5F5F5B000
|
trusted library allocation
|
page read and write
|
||
1D5F5CC2000
|
trusted library allocation
|
page read and write
|
||
1D5F574D000
|
trusted library allocation
|
page read and write
|
||
1D5FBFDE000
|
trusted library allocation
|
page read and write
|
||
1D5F4C7D000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EADB7000
|
heap
|
page read and write
|
||
1D5F5A6F000
|
trusted library allocation
|
page read and write
|
||
1D5F5FC0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F4579000
|
trusted library allocation
|
page read and write
|
||
1D5F75CB000
|
trusted library allocation
|
page read and write
|
||
1D5F56BE000
|
trusted library allocation
|
page read and write
|
||
1D600227000
|
trusted library allocation
|
page read and write
|
||
1D5F51F9000
|
trusted library allocation
|
page read and write
|
||
1D5FE6FC000
|
trusted library allocation
|
page read and write
|
||
1D5FBD72000
|
trusted library allocation
|
page read and write
|
||
1D5F67E4000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5F6393000
|
trusted library allocation
|
page read and write
|
||
1D5FFCA0000
|
trusted library allocation
|
page read and write
|
||
1D5F56F9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FBCCD000
|
trusted library allocation
|
page read and write
|
||
1D5FC0D6000
|
trusted library allocation
|
page read and write
|
||
1D5F7399000
|
trusted library allocation
|
page read and write
|
||
1D5F5327000
|
trusted library allocation
|
page read and write
|
||
1D5F56EA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EAD96000
|
heap
|
page read and write
|
||
1D5F4A13000
|
trusted library allocation
|
page read and write
|
||
1D5FF99F000
|
trusted library allocation
|
page read and write
|
||
1D5FF5F2000
|
trusted library allocation
|
page read and write
|
||
1D5F7657000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5F6400000
|
trusted library allocation
|
page read and write
|
||
1D5FF5B7000
|
trusted library allocation
|
page read and write
|
||
1D5F5752000
|
trusted library allocation
|
page read and write
|
||
1D5FBCC7000
|
trusted library allocation
|
page read and write
|
||
1D5F7348000
|
trusted library allocation
|
page read and write
|
||
1D5F4C2F000
|
trusted library allocation
|
page read and write
|
||
1D5EADF4000
|
heap
|
page read and write
|
||
15B3EB79000
|
trusted library allocation
|
page read and write
|
||
15B3F8F0000
|
heap
|
page read and write
|
||
1D5F45F8000
|
trusted library allocation
|
page read and write
|
||
1D5FC092000
|
trusted library allocation
|
page read and write
|
||
2885DED0000
|
unclassified section
|
page readonly
|
||
1494000
|
heap
|
page read and write
|
||
1D5F45AC000
|
trusted library allocation
|
page read and write
|
||
1D5F5692000
|
trusted library allocation
|
page read and write
|
||
222C6AC0000
|
heap
|
page read and write
|
||
1D5FF465000
|
trusted library allocation
|
page read and write
|
||
1D5FC2D0000
|
trusted library allocation
|
page read and write
|
||
1D5F4A6B000
|
trusted library allocation
|
page read and write
|
||
1D5F4CCF000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F7657000
|
trusted library allocation
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5F5CF2000
|
trusted library allocation
|
page read and write
|
||
1D5F3CF7000
|
trusted library allocation
|
page read and write
|
||
1D5F4C8E000
|
trusted library allocation
|
page read and write
|
||
1D600128000
|
trusted library allocation
|
page read and write
|
||
1D5F3CE8000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F5720000
|
trusted library allocation
|
page read and write
|
||
1D5F40AD000
|
trusted library allocation
|
page read and write
|
||
1D5F67E2000
|
trusted library allocation
|
page read and write
|
||
1D5FF4B8000
|
trusted library allocation
|
page read and write
|
||
1D5FF491000
|
trusted library allocation
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5F4099000
|
trusted library allocation
|
page read and write
|
||
1D5F4A91000
|
trusted library allocation
|
page read and write
|
||
1D5F1079000
|
trusted library allocation
|
page read and write
|
||
15B3F869000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F5CFA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
1D5F45F8000
|
trusted library allocation
|
page read and write
|
||
1D5FC1FB000
|
trusted library allocation
|
page read and write
|
||
1D5F571E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5FC29F000
|
trusted library allocation
|
page read and write
|
||
1D5FBEE6000
|
trusted library allocation
|
page read and write
|
||
1D5F78FE000
|
trusted library allocation
|
page read and write
|
||
1D5F3C47000
|
trusted library allocation
|
page read and write
|
||
1D5FC096000
|
trusted library allocation
|
page read and write
|
||
1D5FBED9000
|
trusted library allocation
|
page read and write
|
||
1D5F55BC000
|
trusted library allocation
|
page read and write
|
||
1D5F0FC3000
|
trusted library allocation
|
page read and write
|
||
F3B73DE000
|
stack
|
page read and write
|
||
1D5F674B000
|
trusted library allocation
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5F454B000
|
trusted library allocation
|
page read and write
|
||
1D5FD600000
|
trusted library allocation
|
page read and write
|
||
1D5FBFE3000
|
trusted library allocation
|
page read and write
|
||
1D5F6789000
|
trusted library allocation
|
page read and write
|
||
1D5F572E000
|
trusted library allocation
|
page read and write
|
||
1D5FBE45000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5F4322000
|
trusted library allocation
|
page read and write
|
||
1D5FC1F0000
|
trusted library allocation
|
page read and write
|
||
1557000
|
heap
|
page read and write
|
||
1D5FC0AB000
|
trusted library allocation
|
page read and write
|
||
1D5FBF2B000
|
trusted library allocation
|
page read and write
|
||
2885E3B1000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5FBCDB000
|
trusted library allocation
|
page read and write
|
||
1D5FC0AB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F16FE000
|
trusted library allocation
|
page read and write
|
||
1D5F3832000
|
heap
|
page read and write
|
||
1D5EAD64000
|
heap
|
page read and write
|
||
1D5F56D0000
|
trusted library allocation
|
page read and write
|
||
1D5F1672000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F384B000
|
heap
|
page read and write
|
||
1D5FC0D6000
|
trusted library allocation
|
page read and write
|
||
1D5FF953000
|
trusted library allocation
|
page read and write
|
||
1D5EAD91000
|
heap
|
page read and write
|
||
1D5FC25A000
|
trusted library allocation
|
page read and write
|
||
1D5FC072000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F5ADA000
|
trusted library allocation
|
page read and write
|
||
1D5F5EC2000
|
trusted library allocation
|
page read and write
|
||
1D5F4C45000
|
trusted library allocation
|
page read and write
|
||
1D5F471A000
|
trusted library allocation
|
page read and write
|
||
1D5F47E5000
|
trusted library allocation
|
page read and write
|
||
1D5FBEB2000
|
trusted library allocation
|
page read and write
|
||
15B3F8E1000
|
heap
|
page read and write
|
||
1D5EADE2000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F5CA7000
|
trusted library allocation
|
page read and write
|
||
1D5F10BE000
|
trusted library allocation
|
page read and write
|
||
1D5F571E000
|
trusted library allocation
|
page read and write
|
||
15B3EB81000
|
trusted library allocation
|
page read and write
|
||
1D5EAD6A000
|
heap
|
page read and write
|
||
1D5FE6B1000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0D000
|
heap
|
page read and write
|
||
1D5F5AED000
|
trusted library allocation
|
page read and write
|
||
1D5F40AD000
|
trusted library allocation
|
page read and write
|
||
1D5EADE0000
|
heap
|
page read and write
|
||
1D5FF81E000
|
trusted library allocation
|
page read and write
|
||
1D5FF963000
|
trusted library allocation
|
page read and write
|
||
1D5F7634000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5F60B8000
|
trusted library allocation
|
page read and write
|
||
1D5F5681000
|
trusted library allocation
|
page read and write
|
||
1D5F3CBE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F3C9A000
|
trusted library allocation
|
page read and write
|
||
1D5F7339000
|
trusted library allocation
|
page read and write
|
||
1D5FF86B000
|
trusted library allocation
|
page read and write
|
||
1D5FC267000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F437C000
|
trusted library allocation
|
page read and write
|
||
1D5F45C3000
|
trusted library allocation
|
page read and write
|
||
1D5FF8ED000
|
trusted library allocation
|
page read and write
|
||
1D5FC0D6000
|
trusted library allocation
|
page read and write
|
||
1D5F5C83000
|
trusted library allocation
|
page read and write
|
||
1D5F4313000
|
trusted library allocation
|
page read and write
|
||
1D5F5722000
|
trusted library allocation
|
page read and write
|
||
1D5FFC44000
|
trusted library allocation
|
page read and write
|
||
1D5EAD6E000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F5DF7000
|
trusted library allocation
|
page read and write
|
||
1D5EFEE4000
|
trusted library allocation
|
page read and write
|
||
1D5F67B8000
|
trusted library allocation
|
page read and write
|
||
1D5EADE8000
|
heap
|
page read and write
|
||
1D5F538F000
|
trusted library allocation
|
page read and write
|
||
1D5F40F6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
1D5F5DF7000
|
trusted library allocation
|
page read and write
|
||
1D5F0DC5000
|
trusted library allocation
|
page read and write
|
||
1D5EADE0000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D600C23000
|
heap
|
page read and write
|
||
1D5FC0AF000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F6085000
|
trusted library allocation
|
page read and write
|
||
1D5FBDAA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FD8D4000
|
trusted library allocation
|
page read and write
|
||
1D5F3B64000
|
trusted library allocation
|
page read and write
|
||
1D5F40E0000
|
trusted library allocation
|
page read and write
|
||
1D5FFC5B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EAD8D000
|
heap
|
page read and write
|
||
1D5F475C000
|
trusted library allocation
|
page read and write
|
||
1D5F453E000
|
trusted library allocation
|
page read and write
|
||
1D5F5669000
|
trusted library allocation
|
page read and write
|
||
1D5F4C3E000
|
trusted library allocation
|
page read and write
|
||
1D5FC0E7000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F56D0000
|
trusted library allocation
|
page read and write
|
||
1D5EADB7000
|
heap
|
page read and write
|
||
1D5F56EA000
|
trusted library allocation
|
page read and write
|
||
15B3F863000
|
heap
|
page read and write
|
||
1D5F0D5B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EAD91000
|
heap
|
page read and write
|
||
1D5F76E6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
2885E70C000
|
trusted library allocation
|
page read and write
|
||
1D5F6363000
|
trusted library allocation
|
page read and write
|
||
1D5EFD71000
|
trusted library allocation
|
page read and write
|
||
15B3F719000
|
trusted library allocation
|
page read and write
|
||
1D5F782D000
|
trusted library allocation
|
page read and write
|
||
1D5F432E000
|
trusted library allocation
|
page read and write
|
||
1D5F68D9000
|
trusted library allocation
|
page read and write
|
||
1D60054E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5FC06A000
|
trusted library allocation
|
page read and write
|
||
2885DEF0000
|
heap
|
page read and write
|
||
1D5F764F000
|
trusted library allocation
|
page read and write
|
||
2885E324000
|
trusted library allocation
|
page read and write
|
||
1D5F6791000
|
trusted library allocation
|
page read and write
|
||
1D5F4CCB000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F552B000
|
trusted library allocation
|
page read and write
|
||
1D5FD928000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F761E000
|
trusted library allocation
|
page read and write
|
||
15B3ECB0000
|
heap
|
page read and write
|
||
1D5F76E6000
|
trusted library allocation
|
page read and write
|
||
1D5FBEF0000
|
trusted library allocation
|
page read and write
|
||
1D5F6269000
|
trusted library allocation
|
page read and write
|
||
21F2BB17000
|
trusted library allocation
|
page read and write
|
||
222C6D07000
|
trusted library allocation
|
page read and write
|
||
1D5F76DD000
|
trusted library allocation
|
page read and write
|
||
1D60017A000
|
trusted library allocation
|
page read and write
|
||
1D5FBEE6000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F73B0000
|
trusted library allocation
|
page read and write
|
||
1D5F76AC000
|
trusted library allocation
|
page read and write
|
||
1D5F53F7000
|
trusted library allocation
|
page read and write
|
||
1D5F4CB0000
|
trusted library allocation
|
page read and write
|
||
1D5F56C1000
|
trusted library allocation
|
page read and write
|
||
1D5F56EE000
|
trusted library allocation
|
page read and write
|
||
1D5FBCDF000
|
trusted library allocation
|
page read and write
|
||
15B3F958000
|
heap
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
1D5FBC8F000
|
trusted library allocation
|
page read and write
|
||
1D5F569F000
|
trusted library allocation
|
page read and write
|
||
1D5FBD46000
|
trusted library allocation
|
page read and write
|
||
1D5F4585000
|
trusted library allocation
|
page read and write
|
||
1D5F5395000
|
trusted library allocation
|
page read and write
|
||
1D5F0DA9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5EAD8D000
|
heap
|
page read and write
|
||
1D6001B6000
|
trusted library allocation
|
page read and write
|
||
1D5FF9D2000
|
trusted library allocation
|
page read and write
|
||
1D5F3969000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
2885E3C4000
|
trusted library allocation
|
page read and write
|
||
1C947D53000
|
heap
|
page read and write
|
||
1D5F4CED000
|
trusted library allocation
|
page read and write
|
||
1D5F76B7000
|
trusted library allocation
|
page read and write
|
||
1D5F47AD000
|
trusted library allocation
|
page read and write
|
||
1D5FC25F000
|
trusted library allocation
|
page read and write
|
||
1D5FC0D6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5F4A70000
|
trusted library allocation
|
page read and write
|
||
1D5F0FE8000
|
trusted library allocation
|
page read and write
|
||
1D5F476B000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5FBCAA000
|
trusted library allocation
|
page read and write
|
||
1D5F3CDE000
|
trusted library allocation
|
page read and write
|
||
1D5FBEC9000
|
trusted library allocation
|
page read and write
|
||
2885E3AA000
|
trusted library allocation
|
page read and write
|
||
1D5FD8E0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F666E000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5EADE5000
|
heap
|
page read and write
|
||
1D6005A7000
|
trusted library allocation
|
page read and write
|
||
1D5F4C36000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F5DF7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
15B3F93B000
|
heap
|
page read and write
|
||
1D6001AB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
F3B95FE000
|
unkown
|
page readonly
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5EADAC000
|
heap
|
page read and write
|
||
1D5F73B6000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5F5578000
|
trusted library allocation
|
page read and write
|
||
2885E140000
|
heap
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5FC2A4000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5FBECC000
|
trusted library allocation
|
page read and write
|
||
1D5F4CA3000
|
trusted library allocation
|
page read and write
|
||
1D5FD8AE000
|
trusted library allocation
|
page read and write
|
||
1D5F5ADA000
|
trusted library allocation
|
page read and write
|
||
1D5FC2FA000
|
trusted library allocation
|
page read and write
|
||
21F2B5B0000
|
unclassified section
|
page readonly
|
||
1D5F4CA7000
|
trusted library allocation
|
page read and write
|
||
1D5FE689000
|
trusted library allocation
|
page read and write
|
||
1D6001B6000
|
trusted library allocation
|
page read and write
|
||
1D5F57DE000
|
trusted library allocation
|
page read and write
|
||
1D5F0FC3000
|
trusted library allocation
|
page read and write
|
||
1D5F47E1000
|
trusted library allocation
|
page read and write
|
||
1D5F533D000
|
trusted library allocation
|
page read and write
|
||
1D5F5A1F000
|
trusted library allocation
|
page read and write
|
||
1D5EAD94000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FC289000
|
trusted library allocation
|
page read and write
|
||
1D5F3CE8000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADB3000
|
heap
|
page read and write
|
||
1D600BCD000
|
heap
|
page read and write
|
||
1D5F10C7000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
unkown
|
page readonly
|
||
1D5FC2CD000
|
trusted library allocation
|
page read and write
|
||
1D5F387A000
|
heap
|
page read and write
|
||
3B189FE000
|
stack
|
page read and write
|
||
2885E4C0000
|
heap
|
page read and write
|
||
1D5F382A000
|
heap
|
page read and write
|
||
1D5FBE60000
|
trusted library allocation
|
page read and write
|
||
1D5F763A000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F7335000
|
trusted library allocation
|
page read and write
|
||
1D5F5C91000
|
trusted library allocation
|
page read and write
|
||
1D5F3C5B000
|
trusted library allocation
|
page read and write
|
||
15B3F96B000
|
heap
|
page read and write
|
||
1D5EAD76000
|
heap
|
page read and write
|
||
1C947F00000
|
trusted library allocation
|
page read and write
|
||
F3B977E000
|
stack
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F4CCF000
|
trusted library allocation
|
page read and write
|
||
1D5F43BE000
|
trusted library allocation
|
page read and write
|
||
1D5F56B1000
|
trusted library allocation
|
page read and write
|
||
1D5F552F000
|
trusted library allocation
|
page read and write
|
||
1D5FF5FB000
|
trusted library allocation
|
page read and write
|
||
15B3E9E0000
|
unclassified section
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
2885DECA000
|
remote allocation
|
page execute read
|
||
1D5F5724000
|
trusted library allocation
|
page read and write
|
||
1D5F56EE000
|
trusted library allocation
|
page read and write
|
||
1D2E000
|
stack
|
page read and write
|
||
1D5F68FA000
|
trusted library allocation
|
page read and write
|
||
1D5F4750000
|
trusted library allocation
|
page read and write
|
||
1D5F4C74000
|
trusted library allocation
|
page read and write
|
||
1D5FBFDC000
|
trusted library allocation
|
page read and write
|
||
1D5F4C18000
|
trusted library allocation
|
page read and write
|
||
1D5F611B000
|
trusted library allocation
|
page read and write
|
||
15B3E7FD000
|
remote allocation
|
page execute read
|
||
1D5FF5B7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F61D5000
|
trusted library allocation
|
page read and write
|
||
1D5F16FE000
|
trusted library allocation
|
page read and write
|
||
1D5F3C92000
|
trusted library allocation
|
page read and write
|
||
15B3F8E8000
|
heap
|
page read and write
|
||
1D5F4CD5000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0B000
|
heap
|
page read and write
|
||
2885E200000
|
trusted library allocation
|
page read and write
|
||
1D5F5476000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5FE661000
|
trusted library allocation
|
page read and write
|
||
1D5F76FB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F5341000
|
trusted library allocation
|
page read and write
|
||
1D5FF5D1000
|
trusted library allocation
|
page read and write
|
||
1D5F35C8000
|
trusted library allocation
|
page read and write
|
||
1D5F72DF000
|
trusted library allocation
|
page read and write
|
||
1D5F4C9A000
|
trusted library allocation
|
page read and write
|
||
1D5F387A000
|
heap
|
page read and write
|
||
1D5F383F000
|
heap
|
page read and write
|
||
1D5F76D6000
|
trusted library allocation
|
page read and write
|
||
1D5FC289000
|
trusted library allocation
|
page read and write
|
||
1D5FE685000
|
trusted library allocation
|
page read and write
|
||
1D5F5F54000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F5A6A000
|
trusted library allocation
|
page read and write
|
||
1D5F3CF4000
|
trusted library allocation
|
page read and write
|
||
1D5F60FB000
|
trusted library allocation
|
page read and write
|
||
1D5EFEB4000
|
trusted library allocation
|
page read and write
|
||
1D5FBF4C000
|
trusted library allocation
|
page read and write
|
||
1D5F67C2000
|
trusted library allocation
|
page read and write
|
||
1D5FC12C000
|
trusted library allocation
|
page read and write
|
||
1D5F5F1E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F62CD000
|
trusted library allocation
|
page read and write
|
||
1D5F4C65000
|
trusted library allocation
|
page read and write
|
||
1D5FBEC9000
|
trusted library allocation
|
page read and write
|
||
1D5FF96D000
|
trusted library allocation
|
page read and write
|
||
1D5F39FE000
|
trusted library allocation
|
page read and write
|
||
1D5F3975000
|
trusted library allocation
|
page read and write
|
||
15B3F958000
|
heap
|
page read and write
|
||
1D5F5675000
|
trusted library allocation
|
page read and write
|
||
15B3F8FD000
|
heap
|
page read and write
|
||
1D5F5FE6000
|
trusted library allocation
|
page read and write
|
||
1D5FBEC2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5FF5E5000
|
trusted library allocation
|
page read and write
|
||
1D5F67AA000
|
trusted library allocation
|
page read and write
|
||
1D5F3CCD000
|
trusted library allocation
|
page read and write
|
||
1D5FBECC000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5FF9A9000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
15B3F809000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F68C7000
|
trusted library allocation
|
page read and write
|
||
1D5FC047000
|
trusted library allocation
|
page read and write
|
||
1D5F5F48000
|
trusted library allocation
|
page read and write
|
||
1D5F3963000
|
trusted library allocation
|
page read and write
|
||
1D5F3CAE000
|
trusted library allocation
|
page read and write
|
||
1D5FBEEB000
|
trusted library allocation
|
page read and write
|
||
1D6005A9000
|
trusted library allocation
|
page read and write
|
||
1D5FC1F8000
|
trusted library allocation
|
page read and write
|
||
1D6001EB000
|
trusted library allocation
|
page read and write
|
||
3B1707E000
|
unkown
|
page readonly
|
||
1D5F5A70000
|
trusted library allocation
|
page read and write
|
||
2885E303000
|
trusted library allocation
|
page read and write
|
||
1D5F47BB000
|
trusted library allocation
|
page read and write
|
||
1D5F7653000
|
trusted library allocation
|
page read and write
|
||
1D5FC2A8000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F51F0000
|
trusted library allocation
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F3828000
|
heap
|
page read and write
|
||
F3B9FBE000
|
stack
|
page read and write
|
||
1D5FBCBA000
|
trusted library allocation
|
page read and write
|
||
1D5F0D3A000
|
trusted library allocation
|
page read and write
|
||
1D5F76E6000
|
trusted library allocation
|
page read and write
|
||
1D5FBCD5000
|
trusted library allocation
|
page read and write
|
||
15B3F958000
|
heap
|
page read and write
|
||
222C6D0A000
|
trusted library allocation
|
page read and write
|
||
1D5F4CCE000
|
trusted library allocation
|
page read and write
|
||
1D5F56D6000
|
trusted library allocation
|
page read and write
|
||
1D5F7632000
|
trusted library allocation
|
page read and write
|
||
1D5EADB7000
|
heap
|
page read and write
|
||
1D5F3B87000
|
trusted library allocation
|
page read and write
|
||
1D5F535D000
|
trusted library allocation
|
page read and write
|
||
1D5F4CED000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F625F000
|
trusted library allocation
|
page read and write
|
||
1D5FC1F9000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
1D5F56F1000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
F3B963E000
|
unkown
|
page readonly
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5F4C3F000
|
trusted library allocation
|
page read and write
|
||
1D5EADDB000
|
heap
|
page read and write
|
||
1D5F3B75000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FF5DB000
|
trusted library allocation
|
page read and write
|
||
1D5F5C97000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F3975000
|
trusted library allocation
|
page read and write
|
||
1D5FF5D1000
|
trusted library allocation
|
page read and write
|
||
1D5F4C2F000
|
trusted library allocation
|
page read and write
|
||
1D5FF45D000
|
trusted library allocation
|
page read and write
|
||
1D5F5341000
|
trusted library allocation
|
page read and write
|
||
1D5F6361000
|
trusted library allocation
|
page read and write
|
||
1D5FBD11000
|
trusted library allocation
|
page read and write
|
||
1D5F5C57000
|
trusted library allocation
|
page read and write
|
||
1D5F47ED000
|
trusted library allocation
|
page read and write
|
||
1D5F5A6D000
|
trusted library allocation
|
page read and write
|
||
1D5FD8CD000
|
trusted library allocation
|
page read and write
|
||
2885E378000
|
trusted library allocation
|
page read and write
|
||
1D5F5CFA000
|
trusted library allocation
|
page read and write
|
||
1D5F6693000
|
trusted library allocation
|
page read and write
|
||
1D5F4C2F000
|
trusted library allocation
|
page read and write
|
||
1D5F16F8000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F4313000
|
trusted library allocation
|
page read and write
|
||
15B3F85C000
|
heap
|
page read and write
|
||
1D5F4C6F000
|
trusted library allocation
|
page read and write
|
||
1D5F3C8A000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
15B3E780000
|
unclassified section
|
page readonly
|
||
21F2B7D6000
|
heap
|
page read and write
|
||
1D5FE393000
|
trusted library allocation
|
page read and write
|
||
1D5F478D000
|
trusted library allocation
|
page read and write
|
||
15B3F8E0000
|
heap
|
page read and write
|
||
1D5EFD71000
|
trusted library allocation
|
page read and write
|
||
1D5F76DD000
|
trusted library allocation
|
page read and write
|
||
222C6A40000
|
heap
|
page read and write
|
||
1D5F3CEE000
|
trusted library allocation
|
page read and write
|
||
1D5F5F79000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5F675A000
|
trusted library allocation
|
page read and write
|
||
1D5FD9D9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F4C24000
|
trusted library allocation
|
page read and write
|
||
1D5FD8F8000
|
trusted library allocation
|
page read and write
|
||
1D5F6760000
|
trusted library allocation
|
page read and write
|
||
1D5F4C3E000
|
trusted library allocation
|
page read and write
|
||
1C947D54000
|
heap
|
page read and write
|
||
1D5F5C7F000
|
trusted library allocation
|
page read and write
|
||
1D5F3B72000
|
trusted library allocation
|
page read and write
|
||
1D5F40CA000
|
trusted library allocation
|
page read and write
|
||
1D5F73DA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5FC0E7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FC1F0000
|
trusted library allocation
|
page read and write
|
||
1D5F4A84000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F0DCB000
|
trusted library allocation
|
page read and write
|
||
1D5F4C86000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F73B9000
|
trusted library allocation
|
page read and write
|
||
1D6001C3000
|
trusted library allocation
|
page read and write
|
||
1D5F5CA7000
|
trusted library allocation
|
page read and write
|
||
1D5F4536000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F5666000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F0D81000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F476B000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
1D5FC1BC000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F162C000
|
trusted library allocation
|
page read and write
|
||
1D5F6138000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5EAE0A000
|
heap
|
page read and write
|
||
1D5F4754000
|
trusted library allocation
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
1D5F4C7D000
|
trusted library allocation
|
page read and write
|
||
1D5F6747000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
BBA000
|
stack
|
page read and write
|
||
2885E35F000
|
trusted library allocation
|
page read and write
|
||
1D5F56E1000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5FF8E6000
|
trusted library allocation
|
page read and write
|
||
1D5FE38E000
|
trusted library allocation
|
page read and write
|
||
1D5F5A77000
|
trusted library allocation
|
page read and write
|
||
1D5FBCDB000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F3CB5000
|
trusted library allocation
|
page read and write
|
||
1D5F3CAE000
|
trusted library allocation
|
page read and write
|
||
1D5F67BD000
|
trusted library allocation
|
page read and write
|
||
2885E374000
|
trusted library allocation
|
page read and write
|
||
1D5FDA02000
|
trusted library allocation
|
page read and write
|
||
1D5F382A000
|
heap
|
page read and write
|
||
1D5F3824000
|
heap
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
15B3F87D000
|
heap
|
page read and write
|
||
1D5F5CF0000
|
trusted library allocation
|
page read and write
|
||
F3BB83E000
|
unkown
|
page readonly
|
||
1D600169000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F3CE9000
|
trusted library allocation
|
page read and write
|
||
1D5FBD30000
|
trusted library allocation
|
page read and write
|
||
1D6001B6000
|
trusted library allocation
|
page read and write
|
||
1D5F4CA3000
|
trusted library allocation
|
page read and write
|
||
1D5FBFE4000
|
trusted library allocation
|
page read and write
|
||
1D5FC2D0000
|
trusted library allocation
|
page read and write
|
||
1D5F56E7000
|
trusted library allocation
|
page read and write
|
||
1D5FC1F0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD89000
|
heap
|
page read and write
|
||
1D5EAD76000
|
heap
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5EADDB000
|
heap
|
page read and write
|
||
1D5F3991000
|
trusted library allocation
|
page read and write
|
||
1D5F56EE000
|
trusted library allocation
|
page read and write
|
||
B5C000
|
unkown
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5FC0CB000
|
trusted library allocation
|
page read and write
|
||
1D5F3B6C000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F4C85000
|
trusted library allocation
|
page read and write
|
||
1D5F40D4000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5FE685000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5FF4B1000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5F4541000
|
trusted library allocation
|
page read and write
|
||
1D5EF7CC000
|
trusted library allocation
|
page read and write
|
||
21F2BA5D000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F57F1000
|
trusted library allocation
|
page read and write
|
||
1D5EAD83000
|
heap
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
1D5F56E1000
|
trusted library allocation
|
page read and write
|
||
1D5F51AF000
|
trusted library allocation
|
page read and write
|
||
1D5F4CD7000
|
trusted library allocation
|
page read and write
|
||
1D5FC0B3000
|
trusted library allocation
|
page read and write
|
||
3B16FFE000
|
unkown
|
page readonly
|
||
1D5F67EE000
|
trusted library allocation
|
page read and write
|
||
1D5F5CB1000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D6001E6000
|
trusted library allocation
|
page read and write
|
||
1D5F4C85000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F3828000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F571B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
15B3F860000
|
heap
|
page read and write
|
||
1D5F5354000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5F76EC000
|
trusted library allocation
|
page read and write
|
||
1D5FF96D000
|
trusted library allocation
|
page read and write
|
||
1D5F67EA000
|
trusted library allocation
|
page read and write
|
||
2885E376000
|
trusted library allocation
|
page read and write
|
||
1D5F635F000
|
trusted library allocation
|
page read and write
|
||
1D5EADA9000
|
heap
|
page read and write
|
||
1D5F3CE6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F6367000
|
trusted library allocation
|
page read and write
|
||
1D5FFC6F000
|
trusted library allocation
|
page read and write
|
||
1D5F6253000
|
trusted library allocation
|
page read and write
|
||
1D5FBD55000
|
trusted library allocation
|
page read and write
|
||
1D5EADE4000
|
heap
|
page read and write
|
||
1D5F4391000
|
trusted library allocation
|
page read and write
|
||
1D5FBD53000
|
trusted library allocation
|
page read and write
|
||
1D5F5AB7000
|
trusted library allocation
|
page read and write
|
||
1D5F3995000
|
trusted library allocation
|
page read and write
|
||
1D5F408E000
|
trusted library allocation
|
page read and write
|
||
1D5F10BC000
|
trusted library allocation
|
page read and write
|
||
1D5F106C000
|
trusted library allocation
|
page read and write
|
||
1D5F557A000
|
trusted library allocation
|
page read and write
|
||
1D5F4790000
|
trusted library allocation
|
page read and write
|
||
1D5FBD98000
|
trusted library allocation
|
page read and write
|
||
1D60057B000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
1D5F73CF000
|
trusted library allocation
|
page read and write
|
||
1D5F457D000
|
trusted library allocation
|
page read and write
|
||
1D5F57EB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8D000
|
heap
|
page read and write
|
||
1D5F0D87000
|
trusted library allocation
|
page read and write
|
||
1D6001ED000
|
trusted library allocation
|
page read and write
|
||
1D5F1623000
|
trusted library allocation
|
page read and write
|
||
1D5F63FC000
|
trusted library allocation
|
page read and write
|
||
1D5F4AA0000
|
trusted library allocation
|
page read and write
|
||
1D5F4721000
|
trusted library allocation
|
page read and write
|
||
1D60052D000
|
trusted library allocation
|
page read and write
|
||
F3B96B8000
|
stack
|
page read and write
|
||
1D5F5CF8000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
15B3F708000
|
trusted library allocation
|
page read and write
|
||
1D5F63FA000
|
trusted library allocation
|
page read and write
|
||
1D5FF818000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
B52000
|
unkown
|
page readonly
|
||
1D5FF5E8000
|
trusted library allocation
|
page read and write
|
||
1D5F56E7000
|
trusted library allocation
|
page read and write
|
||
1D5F57FE000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F4CCB000
|
trusted library allocation
|
page read and write
|
||
1D5FC28A000
|
trusted library allocation
|
page read and write
|
||
1D5F472A000
|
trusted library allocation
|
page read and write
|
||
1D5F5CA7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F56EA000
|
trusted library allocation
|
page read and write
|
||
1D6001AB000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F3B82000
|
trusted library allocation
|
page read and write
|
||
1D5F67EA000
|
trusted library allocation
|
page read and write
|
||
1D5FF968000
|
trusted library allocation
|
page read and write
|
||
1D5F55EB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F477D000
|
trusted library allocation
|
page read and write
|
||
1D5FBCCD000
|
trusted library allocation
|
page read and write
|
||
15B3E9EF000
|
unclassified section
|
page read and write
|
||
1D5F76D6000
|
trusted library allocation
|
page read and write
|
||
1D5EADE6000
|
heap
|
page read and write
|
||
1D5F4CCB000
|
trusted library allocation
|
page read and write
|
||
1D5F3CCD000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F497B000
|
trusted library allocation
|
page read and write
|
||
1D5F6356000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
222C6A60000
|
heap
|
page read and write
|
||
1D5F56E7000
|
trusted library allocation
|
page read and write
|
||
1D5FF5C0000
|
trusted library allocation
|
page read and write
|
||
1D5F3847000
|
heap
|
page read and write
|
||
1D5EADB6000
|
heap
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F56E1000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F782F000
|
trusted library allocation
|
page read and write
|
||
1D5F492F000
|
trusted library allocation
|
page read and write
|
||
1D5FF4AA000
|
trusted library allocation
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
1D5FC0AF000
|
trusted library allocation
|
page read and write
|
||
1D5F4CE3000
|
trusted library allocation
|
page read and write
|
||
1D5F40F6000
|
trusted library allocation
|
page read and write
|
||
1D5F76CA000
|
trusted library allocation
|
page read and write
|
||
1D5F7606000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FF924000
|
trusted library allocation
|
page read and write
|
||
1D600199000
|
trusted library allocation
|
page read and write
|
||
1D5FBCD5000
|
trusted library allocation
|
page read and write
|
||
1D5EAD67000
|
heap
|
page read and write
|
||
1D5F631B000
|
trusted library allocation
|
page read and write
|
||
1D5F4C67000
|
trusted library allocation
|
page read and write
|
||
1D5F4C3E000
|
trusted library allocation
|
page read and write
|
||
1D5F7693000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FBD9E000
|
trusted library allocation
|
page read and write
|
||
1D5EADAE000
|
heap
|
page read and write
|
||
1D5EFE82000
|
trusted library allocation
|
page read and write
|
||
1D5FF92A000
|
trusted library allocation
|
page read and write
|
||
1D5FC2DD000
|
trusted library allocation
|
page read and write
|
||
1D5F40D4000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F4796000
|
trusted library allocation
|
page read and write
|
||
1D5F72EA000
|
trusted library allocation
|
page read and write
|
||
1D5FF88E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD80000
|
heap
|
page read and write
|
||
15B3F944000
|
heap
|
page read and write
|
||
1D5FBF9B000
|
trusted library allocation
|
page read and write
|
||
1D5F4CD5000
|
trusted library allocation
|
page read and write
|
||
1D5F73CF000
|
trusted library allocation
|
page read and write
|
||
1D5FBCC3000
|
trusted library allocation
|
page read and write
|
||
1D5FC262000
|
trusted library allocation
|
page read and write
|
||
1D5F67B3000
|
trusted library allocation
|
page read and write
|
||
1D5FC01F000
|
trusted library allocation
|
page read and write
|
||
1D5FC2CD000
|
trusted library allocation
|
page read and write
|
||
1D5F35F4000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F5484000
|
trusted library allocation
|
page read and write
|
||
1D5F5327000
|
trusted library allocation
|
page read and write
|
||
15B3F93B000
|
heap
|
page read and write
|
||
1D5F7666000
|
trusted library allocation
|
page read and write
|
||
1D600183000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5FF9A9000
|
trusted library allocation
|
page read and write
|
||
1D5FBDE5000
|
trusted library allocation
|
page read and write
|
||
1D5F7F00000
|
trusted library allocation
|
page read and write
|
||
1D5F3529000
|
trusted library allocation
|
page read and write
|
||
15B3F700000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F4327000
|
trusted library allocation
|
page read and write
|
||
1D5F47E6000
|
trusted library allocation
|
page read and write
|
||
1D5FF953000
|
trusted library allocation
|
page read and write
|
||
1D5F478D000
|
trusted library allocation
|
page read and write
|
||
1D5F47AD000
|
trusted library allocation
|
page read and write
|
||
15B3F8E3000
|
heap
|
page read and write
|
||
1D5F47C3000
|
trusted library allocation
|
page read and write
|
||
1D5F459E000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5EADE6000
|
heap
|
page read and write
|
||
1D5F0D6A000
|
trusted library allocation
|
page read and write
|
||
1D5F67C2000
|
trusted library allocation
|
page read and write
|
||
1D5F5C6B000
|
trusted library allocation
|
page read and write
|
||
1D5F4377000
|
trusted library allocation
|
page read and write
|
||
1D5F3857000
|
heap
|
page read and write
|
||
21F2BAC8000
|
trusted library allocation
|
page read and write
|
||
1D5F664C000
|
trusted library allocation
|
page read and write
|
||
1D5EADE1000
|
heap
|
page read and write
|
||
1D5F608C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5FC2EB000
|
trusted library allocation
|
page read and write
|
||
1D5FF870000
|
trusted library allocation
|
page read and write
|
||
1D5FBDFB000
|
trusted library allocation
|
page read and write
|
||
1D5F531E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8D000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F4C3F000
|
trusted library allocation
|
page read and write
|
||
F3B8DFE000
|
stack
|
page read and write
|
||
1D5F4C70000
|
trusted library allocation
|
page read and write
|
||
15B3F977000
|
heap
|
page read and write
|
||
1D5FD8C9000
|
trusted library allocation
|
page read and write
|
||
1D5EAE13000
|
heap
|
page read and write
|
||
15B3F96B000
|
heap
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
1D6001CA000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5F5EAF000
|
trusted library allocation
|
page read and write
|
||
1D5FE3E0000
|
trusted library allocation
|
page read and write
|
||
1D5F72EF000
|
trusted library allocation
|
page read and write
|
||
15B3F860000
|
heap
|
page read and write
|
||
1D600592000
|
trusted library allocation
|
page read and write
|
||
1D5F45C3000
|
trusted library allocation
|
page read and write
|
||
1D5F76F4000
|
trusted library allocation
|
page read and write
|
||
1D5F3545000
|
trusted library allocation
|
page read and write
|
||
1D5F5CB5000
|
trusted library allocation
|
page read and write
|
||
1D5FF5B0000
|
trusted library allocation
|
page read and write
|
||
1D5F0D37000
|
trusted library allocation
|
page read and write
|
||
1D5F4A56000
|
trusted library allocation
|
page read and write
|
||
1D5FC2DD000
|
trusted library allocation
|
page read and write
|
||
1D5F43AE000
|
trusted library allocation
|
page read and write
|
||
1D5EFEFE000
|
trusted library allocation
|
page read and write
|
||
21F2BA81000
|
trusted library allocation
|
page read and write
|
||
1D5FC1B1000
|
trusted library allocation
|
page read and write
|
||
1D5FF4F0000
|
trusted library allocation
|
page read and write
|
||
1D5F7894000
|
trusted library allocation
|
page read and write
|
||
1D5FBCDF000
|
trusted library allocation
|
page read and write
|
||
1D5F5537000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8E000
|
heap
|
page read and write
|
||
1D5F62B7000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5EF7C3000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
1D5F67E4000
|
trusted library allocation
|
page read and write
|
||
1D5FF5FE000
|
trusted library allocation
|
page read and write
|
||
1D5FC0D0000
|
trusted library allocation
|
page read and write
|
||
1D5F4C3C000
|
trusted library allocation
|
page read and write
|
||
1D5F3CE4000
|
trusted library allocation
|
page read and write
|
||
1D5F382A000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADDE000
|
heap
|
page read and write
|
||
1D5F3569000
|
trusted library allocation
|
page read and write
|
||
1D5F63F6000
|
trusted library allocation
|
page read and write
|
||
1D5F7389000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5FBD96000
|
trusted library allocation
|
page read and write
|
||
1D5F45B1000
|
trusted library allocation
|
page read and write
|
||
1D5FBD40000
|
trusted library allocation
|
page read and write
|
||
1D60023B000
|
trusted library allocation
|
page read and write
|
||
1D5F4AAE000
|
trusted library allocation
|
page read and write
|
||
15B3F8F0000
|
heap
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
1D5F6077000
|
trusted library allocation
|
page read and write
|
||
1D5FC2DD000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5EF7BF000
|
trusted library allocation
|
page read and write
|
||
1D5F6158000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F4CFE000
|
trusted library allocation
|
page read and write
|
||
1D5EADB0000
|
heap
|
page read and write
|
||
1D5F4980000
|
trusted library allocation
|
page read and write
|
||
1D5F56EE000
|
trusted library allocation
|
page read and write
|
||
15B3ECB6000
|
heap
|
page read and write
|
||
1D5FBF59000
|
trusted library allocation
|
page read and write
|
||
1D5F45DC000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
9435FFE000
|
stack
|
page read and write
|
||
1D6001C3000
|
trusted library allocation
|
page read and write
|
||
1C947C10000
|
heap
|
page read and write
|
||
1D5F5CB1000
|
trusted library allocation
|
page read and write
|
||
1D5F408E000
|
trusted library allocation
|
page read and write
|
||
1D5F5752000
|
trusted library allocation
|
page read and write
|
||
1D5FC2E9000
|
trusted library allocation
|
page read and write
|
||
21F2B900000
|
trusted library allocation
|
page read and write
|
||
1D5F4374000
|
trusted library allocation
|
page read and write
|
||
1D5F4A25000
|
trusted library allocation
|
page read and write
|
||
1D5F4AC0000
|
trusted library allocation
|
page read and write
|
||
1D5EADA7000
|
heap
|
page read and write
|
||
1D5F6391000
|
trusted library allocation
|
page read and write
|
||
1D5F6297000
|
trusted library allocation
|
page read and write
|
||
1D5F4099000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FC1E8000
|
trusted library allocation
|
page read and write
|
||
1D5F51F0000
|
trusted library allocation
|
page read and write
|
||
1D5F384B000
|
heap
|
page read and write
|
||
15B3F85F000
|
heap
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5F636B000
|
trusted library allocation
|
page read and write
|
||
1D5F73B9000
|
trusted library allocation
|
page read and write
|
||
1D5F4AA2000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F574A000
|
trusted library allocation
|
page read and write
|
||
1D5FBC93000
|
trusted library allocation
|
page read and write
|
||
1D5FBD72000
|
trusted library allocation
|
page read and write
|
||
1C949825000
|
heap
|
page read and write
|
||
1D5F382A000
|
heap
|
page read and write
|
||
1D5F4789000
|
trusted library allocation
|
page read and write
|
||
1D5FF963000
|
trusted library allocation
|
page read and write
|
||
1D5F6848000
|
trusted library allocation
|
page read and write
|
||
1D5FD8C9000
|
trusted library allocation
|
page read and write
|
||
1D5F3CDB000
|
trusted library allocation
|
page read and write
|
||
1D5FF99F000
|
trusted library allocation
|
page read and write
|
||
1D5F4C6F000
|
trusted library allocation
|
page read and write
|
||
1D5F3B73000
|
trusted library allocation
|
page read and write
|
||
1D5F5C64000
|
trusted library allocation
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1D5F10BC000
|
trusted library allocation
|
page read and write
|
||
1D5F5E43000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5F477D000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5FF4CF000
|
trusted library allocation
|
page read and write
|
||
1D5F75DA000
|
trusted library allocation
|
page read and write
|
||
1D5F73FA000
|
trusted library allocation
|
page read and write
|
||
1D5F57F3000
|
trusted library allocation
|
page read and write
|
||
1D5F73DA000
|
trusted library allocation
|
page read and write
|
||
1D5FBFD5000
|
trusted library allocation
|
page read and write
|
||
1D5F7849000
|
trusted library allocation
|
page read and write
|
||
1D5F3828000
|
heap
|
page read and write
|
||
1D5F431E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
15B3F869000
|
heap
|
page read and write
|
||
1D5F4CFE000
|
trusted library allocation
|
page read and write
|
||
1D5FBD74000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
F3B97BE000
|
unkown
|
page readonly
|
||
1D5F3CC5000
|
trusted library allocation
|
page read and write
|
||
1D5F76C2000
|
trusted library allocation
|
page read and write
|
||
1D5F4716000
|
trusted library allocation
|
page read and write
|
||
1D5FC082000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F76C0000
|
trusted library allocation
|
page read and write
|
||
15B3E980000
|
heap
|
page read and write
|
||
1D5F3B7B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5F47F9000
|
trusted library allocation
|
page read and write
|
||
1D5EFD23000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADBB000
|
heap
|
page read and write
|
||
1D5F5AB9000
|
trusted library allocation
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5F5FB0000
|
trusted library allocation
|
page read and write
|
||
1D5F5576000
|
trusted library allocation
|
page read and write
|
||
1D5F4A40000
|
trusted library allocation
|
page read and write
|
||
1D5F73DA000
|
trusted library allocation
|
page read and write
|
||
1D5FBD76000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F66B0000
|
trusted library allocation
|
page read and write
|
||
1D5F5FAD000
|
trusted library allocation
|
page read and write
|
||
1D5F5338000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F0D8F000
|
trusted library allocation
|
page read and write
|
||
1D5F3B82000
|
trusted library allocation
|
page read and write
|
||
1D5EFDFB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F3C8C000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5FE397000
|
trusted library allocation
|
page read and write
|
||
1D5F7653000
|
trusted library allocation
|
page read and write
|
||
1D5F16FE000
|
trusted library allocation
|
page read and write
|
||
1D5FBCDF000
|
trusted library allocation
|
page read and write
|
||
1D5F4CA3000
|
trusted library allocation
|
page read and write
|
||
1D5F4C49000
|
trusted library allocation
|
page read and write
|
||
1D5EADC1000
|
heap
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
B5C000
|
unkown
|
page write copy
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5FF4B1000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F67AE000
|
trusted library allocation
|
page read and write
|
||
1D5FC1FB000
|
trusted library allocation
|
page read and write
|
||
1D5F3856000
|
heap
|
page read and write
|
||
1D5FC0EF000
|
trusted library allocation
|
page read and write
|
||
1D5EADA7000
|
heap
|
page read and write
|
||
1D5FBED6000
|
trusted library allocation
|
page read and write
|
||
15B3F8E8000
|
heap
|
page read and write
|
||
1D5F4C65000
|
trusted library allocation
|
page read and write
|
||
1D5F5352000
|
trusted library allocation
|
page read and write
|
||
15B3F944000
|
heap
|
page read and write
|
||
1D5FE666000
|
trusted library allocation
|
page read and write
|
||
1D5FBD5F000
|
trusted library allocation
|
page read and write
|
||
1D5F387A000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5FC261000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F3B8B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FF92A000
|
trusted library allocation
|
page read and write
|
||
1D5F789D000
|
trusted library allocation
|
page read and write
|
||
1D5F0D5E000
|
trusted library allocation
|
page read and write
|
||
1D5FBCC3000
|
trusted library allocation
|
page read and write
|
||
1D5FF5D1000
|
trusted library allocation
|
page read and write
|
||
1D5F75F4000
|
trusted library allocation
|
page read and write
|
||
2885E3F6000
|
trusted library allocation
|
page read and write
|
||
1D5EADDD000
|
heap
|
page read and write
|
||
1D5F5D00000
|
trusted library allocation
|
page read and write
|
||
1D5F789B000
|
trusted library allocation
|
page read and write
|
||
1D5F56DF000
|
trusted library allocation
|
page read and write
|
||
1D5F3828000
|
heap
|
page read and write
|
||
1D5F56DD000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D6001C3000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5FF9C4000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5EAD9F000
|
heap
|
page read and write
|
||
15B3EB0C000
|
trusted library allocation
|
page read and write
|
||
1D5F4CCF000
|
trusted library allocation
|
page read and write
|
||
1D5EADF0000
|
heap
|
page read and write
|
||
1D5F1075000
|
trusted library allocation
|
page read and write
|
||
1D5FE38C000
|
trusted library allocation
|
page read and write
|
||
1D5F40A5000
|
trusted library allocation
|
page read and write
|
||
1D5F5FBA000
|
trusted library allocation
|
page read and write
|
||
1D5F7399000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F56E7000
|
trusted library allocation
|
page read and write
|
||
1D5F66EF000
|
trusted library allocation
|
page read and write
|
||
15B3EB03000
|
trusted library allocation
|
page read and write
|
||
15B3F869000
|
heap
|
page read and write
|
||
1D5F10DD000
|
trusted library allocation
|
page read and write
|
||
1D5FD9F3000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F669E000
|
trusted library allocation
|
page read and write
|
||
3B170BD000
|
stack
|
page read and write
|
||
1D5F452F000
|
trusted library allocation
|
page read and write
|
||
2885E366000
|
trusted library allocation
|
page read and write
|
||
1D5EFEFE000
|
trusted library allocation
|
page read and write
|
||
1D5F3856000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
15B3F1C0000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EADA8000
|
heap
|
page read and write
|
||
1D5FF96D000
|
trusted library allocation
|
page read and write
|
||
1D5F1075000
|
trusted library allocation
|
page read and write
|
||
1D5FF5A8000
|
trusted library allocation
|
page read and write
|
||
1D5F5336000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
21F2BA03000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5FD8C6000
|
trusted library allocation
|
page read and write
|
||
1D5FBE4E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F0D37000
|
trusted library allocation
|
page read and write
|
||
15B3EB6F000
|
trusted library allocation
|
page read and write
|
||
1D5FBFD5000
|
trusted library allocation
|
page read and write
|
||
1D5F3B7B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5FD8A7000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5FF8FD000
|
trusted library allocation
|
page read and write
|
||
1D5F106E000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F3B7D000
|
trusted library allocation
|
page read and write
|
||
1D5F54D3000
|
trusted library allocation
|
page read and write
|
||
1D5F3CCD000
|
trusted library allocation
|
page read and write
|
||
1D5FBE16000
|
trusted library allocation
|
page read and write
|
||
1D5F53C1000
|
trusted library allocation
|
page read and write
|
||
1D5F1122000
|
trusted library allocation
|
page read and write
|
||
1D5FBE36000
|
trusted library allocation
|
page read and write
|
||
1D5FF5D1000
|
trusted library allocation
|
page read and write
|
||
1D6001AB000
|
trusted library allocation
|
page read and write
|
||
21F2B7F0000
|
unclassified section
|
page read and write
|
||
1D5FF992000
|
trusted library allocation
|
page read and write
|
||
15B3EC81000
|
unkown
|
page execute read
|
||
1D5F73DF000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F7394000
|
trusted library allocation
|
page read and write
|
||
15B3F86C000
|
heap
|
page read and write
|
||
1D6001E2000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F4511000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F4C8E000
|
trusted library allocation
|
page read and write
|
||
222C6A20000
|
heap
|
page read and write
|
||
1D5F6330000
|
trusted library allocation
|
page read and write
|
||
1D5F56B1000
|
trusted library allocation
|
page read and write
|
||
1D5F5F4B000
|
trusted library allocation
|
page read and write
|
||
15B3F977000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D600171000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADAC000
|
heap
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5EF781000
|
trusted library allocation
|
page read and write
|
||
1D5F49A5000
|
trusted library allocation
|
page read and write
|
||
1D5FC0DA000
|
trusted library allocation
|
page read and write
|
||
1D5F477A000
|
trusted library allocation
|
page read and write
|
||
1D5F73CA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F54E0000
|
trusted library allocation
|
page read and write
|
||
1D600BF8000
|
heap
|
page read and write
|
||
15B3F944000
|
heap
|
page read and write
|
||
1D5FF5C0000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F433B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F56EB000
|
trusted library allocation
|
page read and write
|
||
1D5F4C8E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FF8BB000
|
trusted library allocation
|
page read and write
|
||
1D5F6356000
|
trusted library allocation
|
page read and write
|
||
1D5FF4C9000
|
trusted library allocation
|
page read and write
|
||
1D5F5A4A000
|
trusted library allocation
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
1D5FF8D6000
|
trusted library allocation
|
page read and write
|
||
1D5F47A1000
|
trusted library allocation
|
page read and write
|
||
1D5F4CED000
|
trusted library allocation
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
1D6001E2000
|
trusted library allocation
|
page read and write
|
||
1D5F40F2000
|
trusted library allocation
|
page read and write
|
||
1D5FBEF1000
|
trusted library allocation
|
page read and write
|
||
1D5F57DE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F4C3C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD89000
|
heap
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5FBE38000
|
trusted library allocation
|
page read and write
|
||
1D5F5327000
|
trusted library allocation
|
page read and write
|
||
1D5EFEAC000
|
trusted library allocation
|
page read and write
|
||
15B3F8FD000
|
heap
|
page read and write
|
||
1D5F76BD000
|
trusted library allocation
|
page read and write
|
||
1D5F0D3A000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F5224000
|
trusted library allocation
|
page read and write
|
||
1D5FBCDB000
|
trusted library allocation
|
page read and write
|
||
1D5F103C000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
B64000
|
unkown
|
page readonly
|
||
1D5F472A000
|
trusted library allocation
|
page read and write
|
||
1D5FF968000
|
trusted library allocation
|
page read and write
|
||
1D5F6771000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5F73B0000
|
trusted library allocation
|
page read and write
|
||
1D5FF99F000
|
trusted library allocation
|
page read and write
|
||
1D5F4C46000
|
trusted library allocation
|
page read and write
|
||
1D6001AC000
|
trusted library allocation
|
page read and write
|
||
1D5F7391000
|
trusted library allocation
|
page read and write
|
||
1D5F63F8000
|
trusted library allocation
|
page read and write
|
||
1D5F552D000
|
trusted library allocation
|
page read and write
|
||
1D5F3840000
|
heap
|
page read and write
|
||
1D5F606F000
|
trusted library allocation
|
page read and write
|
||
1D5F55C1000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F55D6000
|
trusted library allocation
|
page read and write
|
||
1D5F475C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5FFC98000
|
trusted library allocation
|
page read and write
|
||
15B3F89C000
|
heap
|
page read and write
|
||
1D5F763A000
|
trusted library allocation
|
page read and write
|
||
1D5F47F3000
|
trusted library allocation
|
page read and write
|
||
1D5F4748000
|
trusted library allocation
|
page read and write
|
||
1D5F40FB000
|
trusted library allocation
|
page read and write
|
||
1D5EADE2000
|
heap
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5FC0D6000
|
trusted library allocation
|
page read and write
|
||
1D5F54BA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
15B3F900000
|
heap
|
page read and write
|
||
1D5F4CED000
|
trusted library allocation
|
page read and write
|
||
1D5EAD64000
|
heap
|
page read and write
|
||
1D5F3C9A000
|
trusted library allocation
|
page read and write
|
||
1D5F4ACA000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F4CA3000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F4C86000
|
trusted library allocation
|
page read and write
|
||
15B3F8AA000
|
heap
|
page read and write
|
||
1D5F56C1000
|
trusted library allocation
|
page read and write
|
||
1D5F51BE000
|
trusted library allocation
|
page read and write
|
||
1D5F4313000
|
trusted library allocation
|
page read and write
|
||
1D5F54CE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADFE000
|
heap
|
page read and write
|
||
1D5FE65C000
|
trusted library allocation
|
page read and write
|
||
1D5F10A5000
|
trusted library allocation
|
page read and write
|
||
1D5F5FBA000
|
trusted library allocation
|
page read and write
|
||
1D5FF5AD000
|
trusted library allocation
|
page read and write
|
||
1D5FC0BF000
|
trusted library allocation
|
page read and write
|
||
1D5F47E5000
|
trusted library allocation
|
page read and write
|
||
1D5F76C2000
|
trusted library allocation
|
page read and write
|
||
15B3EB15000
|
trusted library allocation
|
page read and write
|
||
1D5F40E2000
|
trusted library allocation
|
page read and write
|
||
1D5F57DE000
|
trusted library allocation
|
page read and write
|
||
1D5F4CE2000
|
trusted library allocation
|
page read and write
|
||
1D5F1075000
|
trusted library allocation
|
page read and write
|
||
1D5FC2A4000
|
trusted library allocation
|
page read and write
|
||
1D5F4CDB000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5FBDAF000
|
trusted library allocation
|
page read and write
|
||
15B3F92A000
|
heap
|
page read and write
|
||
1D5FC0C1000
|
trusted library allocation
|
page read and write
|
||
1D5F4A10000
|
trusted library allocation
|
page read and write
|
||
1D5F5CB8000
|
trusted library allocation
|
page read and write
|
||
1D5F5386000
|
trusted library allocation
|
page read and write
|
||
1D5FF9A9000
|
trusted library allocation
|
page read and write
|
||
1D5F76EC000
|
trusted library allocation
|
page read and write
|
||
1D5F5C7C000
|
trusted library allocation
|
page read and write
|
||
1D5FBDCA000
|
trusted library allocation
|
page read and write
|
||
1D5F5CF2000
|
trusted library allocation
|
page read and write
|
||
1D5FD8DE000
|
trusted library allocation
|
page read and write
|
||
1D5F7395000
|
trusted library allocation
|
page read and write
|
||
1D5FF810000
|
trusted library allocation
|
page read and write
|
||
1D5F67B3000
|
trusted library allocation
|
page read and write
|
||
F3BC03E000
|
stack
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5FBD2A000
|
trusted library allocation
|
page read and write
|
||
1D5F0FC7000
|
trusted library allocation
|
page read and write
|
||
1D5F0D53000
|
trusted library allocation
|
page read and write
|
||
1D5F5773000
|
trusted library allocation
|
page read and write
|
||
1D5EAD76000
|
heap
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
15B3F944000
|
heap
|
page read and write
|
||
1D5F535C000
|
trusted library allocation
|
page read and write
|
||
1D5F5FFA000
|
trusted library allocation
|
page read and write
|
||
1D5FBDA0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5EADA9000
|
heap
|
page read and write
|
||
1D5F477D000
|
trusted library allocation
|
page read and write
|
||
1D5FBCF7000
|
trusted library allocation
|
page read and write
|
||
1D5FE65C000
|
trusted library allocation
|
page read and write
|
||
1D5F67CC000
|
trusted library allocation
|
page read and write
|
||
1D5FBE34000
|
trusted library allocation
|
page read and write
|
||
1D5F678B000
|
trusted library allocation
|
page read and write
|
||
1D5F5A7A000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
1D5F67CC000
|
trusted library allocation
|
page read and write
|
||
1D60058C000
|
trusted library allocation
|
page read and write
|
||
1D5F62AC000
|
trusted library allocation
|
page read and write
|
||
1D5F67D6000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5F5F1C000
|
trusted library allocation
|
page read and write
|
||
1D5F3CCD000
|
trusted library allocation
|
page read and write
|
||
1D5F4CFE000
|
trusted library allocation
|
page read and write
|
||
1D5FE6CA000
|
trusted library allocation
|
page read and write
|
||
1D5F76B9000
|
trusted library allocation
|
page read and write
|
||
1D5FF5D1000
|
trusted library allocation
|
page read and write
|
||
1D5FC0C1000
|
trusted library allocation
|
page read and write
|
||
1D5F476B000
|
trusted library allocation
|
page read and write
|
||
1D5FDC00000
|
trusted library allocation
|
page read and write
|
||
1D5EAD99000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F5DF3000
|
trusted library allocation
|
page read and write
|
||
1D5F73DF000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EAD8B000
|
heap
|
page read and write
|
||
1D5F5624000
|
trusted library allocation
|
page read and write
|
||
1D5F10DB000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D6001D3000
|
trusted library allocation
|
page read and write
|
||
21F2BA79000
|
trusted library allocation
|
page read and write
|
||
1D5F6851000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0A000
|
heap
|
page read and write
|
||
1D5F76D6000
|
trusted library allocation
|
page read and write
|
||
1D5FF84D000
|
trusted library allocation
|
page read and write
|
||
1D5FBEF0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
15B3F977000
|
heap
|
page read and write
|
||
21F2B620000
|
remote allocation
|
page read and write
|
||
1D600BD9000
|
heap
|
page read and write
|
||
1D5F6071000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5EADE6000
|
heap
|
page read and write
|
||
1D5F3532000
|
trusted library allocation
|
page read and write
|
||
1D5F43BE000
|
trusted library allocation
|
page read and write
|
||
1D5F47E5000
|
trusted library allocation
|
page read and write
|
||
1D5EADF4000
|
heap
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F5796000
|
trusted library allocation
|
page read and write
|
||
1D5F1042000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page write copy
|
||
1D5FC07E000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5EAD65000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F3857000
|
heap
|
page read and write
|
||
1D5EAE0D000
|
heap
|
page read and write
|
||
1D5F570C000
|
trusted library allocation
|
page read and write
|
||
1D5F6351000
|
trusted library allocation
|
page read and write
|
||
1D5F550A000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
15B3F87D000
|
heap
|
page read and write
|
||
1D5F4CDB000
|
trusted library allocation
|
page read and write
|
||
1D5F56D6000
|
trusted library allocation
|
page read and write
|
||
1D5FFC7A000
|
trusted library allocation
|
page read and write
|
||
1D5EAD83000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5FD8E9000
|
trusted library allocation
|
page read and write
|
||
1D5F45DC000
|
trusted library allocation
|
page read and write
|
||
1D5F47A6000
|
trusted library allocation
|
page read and write
|
||
1C947D2A000
|
heap
|
page read and write
|
||
1D6001BA000
|
trusted library allocation
|
page read and write
|
||
1D5F39D8000
|
trusted library allocation
|
page read and write
|
||
2885E330000
|
trusted library allocation
|
page read and write
|
||
1D5FF45B000
|
trusted library allocation
|
page read and write
|
||
1D6005A9000
|
trusted library allocation
|
page read and write
|
||
1D5F43B2000
|
trusted library allocation
|
page read and write
|
||
1D5F75B3000
|
trusted library allocation
|
page read and write
|
||
1D5F43A3000
|
trusted library allocation
|
page read and write
|
||
1D5EAE13000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F4992000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F4CBD000
|
trusted library allocation
|
page read and write
|
||
1D5F3CB5000
|
trusted library allocation
|
page read and write
|
||
1D600283000
|
trusted library allocation
|
page read and write
|
||
1D5F4C9E000
|
trusted library allocation
|
page read and write
|
||
1D5F571E000
|
trusted library allocation
|
page read and write
|
||
1D5FF839000
|
trusted library allocation
|
page read and write
|
||
1D5F4C6B000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5FE3DD000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
15B3EC87000
|
unkown
|
page execute read
|
||
1D5FE704000
|
trusted library allocation
|
page read and write
|
||
1D5F10F6000
|
trusted library allocation
|
page read and write
|
||
1D5F533A000
|
trusted library allocation
|
page read and write
|
||
243263724000
|
trusted library allocation
|
page read and write
|
||
1D5EFD71000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
1D5F6882000
|
trusted library allocation
|
page read and write
|
||
1D5F1062000
|
trusted library allocation
|
page read and write
|
||
1D5EFD71000
|
trusted library allocation
|
page read and write
|
||
1D5F4C8E000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F47F9000
|
trusted library allocation
|
page read and write
|
||
1D5FE618000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5EAE0A000
|
heap
|
page read and write
|
||
1D5FE724000
|
trusted library allocation
|
page read and write
|
||
1D5FC0EF000
|
trusted library allocation
|
page read and write
|
||
1D5FF9D2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F49ED000
|
trusted library allocation
|
page read and write
|
||
1D5F4541000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
21F2B7D4000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F10AA000
|
trusted library allocation
|
page read and write
|
||
2E8D1FF000
|
stack
|
page read and write
|
||
1D5F7373000
|
trusted library allocation
|
page read and write
|
||
1D5EAD91000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD65000
|
heap
|
page read and write
|
||
1D5FC0BF000
|
trusted library allocation
|
page read and write
|
||
2885E35D000
|
trusted library allocation
|
page read and write
|
||
1D5F53E6000
|
trusted library allocation
|
page read and write
|
||
1D5F51D3000
|
trusted library allocation
|
page read and write
|
||
1D5FF5C9000
|
trusted library allocation
|
page read and write
|
||
1D5F5AFA000
|
trusted library allocation
|
page read and write
|
||
1D5F3B7B000
|
trusted library allocation
|
page read and write
|
||
1D5FBFD5000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
15B3F801000
|
heap
|
page read and write
|
||
222C6C00000
|
trusted library allocation
|
page read and write
|
||
15B3EB5F000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5FBCB1000
|
trusted library allocation
|
page read and write
|
||
1D5FF88E000
|
trusted library allocation
|
page read and write
|
||
1D5F4C6B000
|
trusted library allocation
|
page read and write
|
||
1D5F3847000
|
heap
|
page read and write
|
||
1D5F479F000
|
trusted library allocation
|
page read and write
|
||
1D5FBE39000
|
trusted library allocation
|
page read and write
|
||
1D5F3CCD000
|
trusted library allocation
|
page read and write
|
||
1D5EADAE000
|
heap
|
page read and write
|
||
1D5EADE1000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
15B3F8F0000
|
heap
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5FBEE6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1C947D42000
|
heap
|
page read and write
|
||
1D5EADE1000
|
heap
|
page read and write
|
||
1D5F5724000
|
trusted library allocation
|
page read and write
|
||
1D5F396F000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FF898000
|
trusted library allocation
|
page read and write
|
||
1C947D70000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F76CA000
|
trusted library allocation
|
page read and write
|
||
1D5F4A58000
|
trusted library allocation
|
page read and write
|
||
1D5FC068000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
21F2BB0C000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F4AEA000
|
trusted library allocation
|
page read and write
|
||
1D5F3C8C000
|
trusted library allocation
|
page read and write
|
||
1D5F430E000
|
trusted library allocation
|
page read and write
|
||
1D5FBD09000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F56EE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F102C000
|
trusted library allocation
|
page read and write
|
||
1D5F53FB000
|
trusted library allocation
|
page read and write
|
||
1C947F0A000
|
trusted library allocation
|
page read and write
|
||
1D5F51BC000
|
trusted library allocation
|
page read and write
|
||
1D5F1620000
|
trusted library allocation
|
page read and write
|
||
1D5FF5DB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5FF9BB000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5FBFAD000
|
trusted library allocation
|
page read and write
|
||
1D5EADE1000
|
heap
|
page read and write
|
||
1D5FF5E8000
|
trusted library allocation
|
page read and write
|
||
1D5FC21D000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5F6367000
|
trusted library allocation
|
page read and write
|
||
1D5FD9E9000
|
trusted library allocation
|
page read and write
|
||
1D5FE5C1000
|
trusted library allocation
|
page read and write
|
||
1D5F5F87000
|
trusted library allocation
|
page read and write
|
||
1D5F73CA000
|
trusted library allocation
|
page read and write
|
||
1D5F4CC2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8B000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
3D00000
|
heap
|
page read and write
|
||
1D5F490B000
|
trusted library allocation
|
page read and write
|
||
1D5F53FB000
|
trusted library allocation
|
page read and write
|
||
222C6AB0000
|
heap
|
page read and write
|
||
1D5F76F4000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5FBD98000
|
trusted library allocation
|
page read and write
|
||
1D5FDAA8000
|
trusted library allocation
|
page read and write
|
||
222C6D00000
|
trusted library allocation
|
page read and write
|
||
1D5FF4CF000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F431B000
|
trusted library allocation
|
page read and write
|
||
2885DE40000
|
unclassified section
|
page readonly
|
||
1D5EADAB000
|
heap
|
page read and write
|
||
1D5F66D1000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5FBD9C000
|
trusted library allocation
|
page read and write
|
||
1D5FBCC7000
|
trusted library allocation
|
page read and write
|
||
1D5F4C22000
|
trusted library allocation
|
page read and write
|
||
1D5F56F2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F167A000
|
trusted library allocation
|
page read and write
|
||
1D5F3C92000
|
trusted library allocation
|
page read and write
|
||
1D5F73B6000
|
trusted library allocation
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
21F2BAB4000
|
trusted library allocation
|
page read and write
|
||
1D5FF9C4000
|
trusted library allocation
|
page read and write
|
||
1D5F3823000
|
heap
|
page read and write
|
||
1D5F533A000
|
trusted library allocation
|
page read and write
|
||
1D5F4CC2000
|
trusted library allocation
|
page read and write
|
||
1D5F4796000
|
trusted library allocation
|
page read and write
|
||
1D5FF5FB000
|
trusted library allocation
|
page read and write
|
||
1D5F56B1000
|
trusted library allocation
|
page read and write
|
||
1D5F5F4E000
|
trusted library allocation
|
page read and write
|
||
1D5F45A2000
|
trusted library allocation
|
page read and write
|
||
1D5F668C000
|
trusted library allocation
|
page read and write
|
||
1D5F5AFA000
|
trusted library allocation
|
page read and write
|
||
1D5EFEF0000
|
trusted library allocation
|
page read and write
|
||
1D5F47AD000
|
trusted library allocation
|
page read and write
|
||
1D5F5C86000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F5CF0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5FBF32000
|
trusted library allocation
|
page read and write
|
||
1D5F3B7D000
|
trusted library allocation
|
page read and write
|
||
1D5F40D4000
|
trusted library allocation
|
page read and write
|
||
1D5F4CFE000
|
trusted library allocation
|
page read and write
|
||
1D5F3B75000
|
trusted library allocation
|
page read and write
|
||
1D5F684C000
|
trusted library allocation
|
page read and write
|
||
1D5F54C3000
|
trusted library allocation
|
page read and write
|
||
1D5FBEB2000
|
trusted library allocation
|
page read and write
|
||
1D5FF4D5000
|
trusted library allocation
|
page read and write
|
||
1D5F0DA9000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F3C6C000
|
trusted library allocation
|
page read and write
|
||
1D5F574D000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F1662000
|
trusted library allocation
|
page read and write
|
||
1D5FC096000
|
trusted library allocation
|
page read and write
|
||
1D600BB1000
|
heap
|
page read and write
|
||
1D5F56C5000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
1D5F0D53000
|
trusted library allocation
|
page read and write
|
||
1566000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5FBEAA000
|
trusted library allocation
|
page read and write
|
||
1D5F3CF7000
|
trusted library allocation
|
page read and write
|
||
1D5F55A1000
|
trusted library allocation
|
page read and write
|
||
1D5F3C90000
|
trusted library allocation
|
page read and write
|
||
1D5F3856000
|
heap
|
page read and write
|
||
1D5FBEAA000
|
trusted library allocation
|
page read and write
|
||
1D6001BA000
|
trusted library allocation
|
page read and write
|
||
1D5F5A54000
|
trusted library allocation
|
page read and write
|
||
1D5F5DF7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5EAD64000
|
heap
|
page read and write
|
||
1D5FF8E6000
|
trusted library allocation
|
page read and write
|
||
1D5EFD2F000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EFDFE000
|
trusted library allocation
|
page read and write
|
||
1D600169000
|
trusted library allocation
|
page read and write
|
||
1D5FBEAA000
|
trusted library allocation
|
page read and write
|
||
1D5F56F1000
|
trusted library allocation
|
page read and write
|
||
1D5F5CFC000
|
trusted library allocation
|
page read and write
|
||
1D5EADDD000
|
heap
|
page read and write
|
||
1D5F5CB5000
|
trusted library allocation
|
page read and write
|
||
1D5F5753000
|
trusted library allocation
|
page read and write
|
||
1D5EFD76000
|
trusted library allocation
|
page read and write
|
||
1D5F73EC000
|
trusted library allocation
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F537C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD91000
|
heap
|
page read and write
|
||
1D5F51EC000
|
trusted library allocation
|
page read and write
|
||
1D5F573D000
|
trusted library allocation
|
page read and write
|
||
1D5F382A000
|
heap
|
page read and write
|
||
1D5FF5C9000
|
trusted library allocation
|
page read and write
|
||
1D5F479F000
|
trusted library allocation
|
page read and write
|
||
1D5FF4A4000
|
trusted library allocation
|
page read and write
|
||
15B3EC8A000
|
unkown
|
page execute read
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5F5612000
|
trusted library allocation
|
page read and write
|
||
1D5FD855000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F60E0000
|
trusted library allocation
|
page read and write
|
||
1D5F68F8000
|
trusted library allocation
|
page read and write
|
||
1D5F43A6000
|
trusted library allocation
|
page read and write
|
||
1D5F5537000
|
trusted library allocation
|
page read and write
|
||
1D5FBEAA000
|
trusted library allocation
|
page read and write
|
||
1D5F51B9000
|
trusted library allocation
|
page read and write
|
||
1D5FBD65000
|
trusted library allocation
|
page read and write
|
||
1C949822000
|
heap
|
page read and write
|
||
1D5EAE13000
|
heap
|
page read and write
|
||
1D5FD8E9000
|
trusted library allocation
|
page read and write
|
||
1D5F5C91000
|
trusted library allocation
|
page read and write
|
||
1D5F431B000
|
trusted library allocation
|
page read and write
|
||
1D5F5723000
|
trusted library allocation
|
page read and write
|
||
1D5F5CD0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
3DDF5B51000
|
trusted library allocation
|
page execute read
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F10F6000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5EAD8D000
|
heap
|
page read and write
|
||
1D5EADE5000
|
heap
|
page read and write
|
||
1D5F5A2D000
|
trusted library allocation
|
page read and write
|
||
1D5FBCD1000
|
trusted library allocation
|
page read and write
|
||
1D5EADE4000
|
heap
|
page read and write
|
||
1D5F4C42000
|
trusted library allocation
|
page read and write
|
||
1D5FF5B6000
|
trusted library allocation
|
page read and write
|
||
F3BA7BE000
|
unkown
|
page readonly
|
||
2885DF10000
|
heap
|
page read and write
|
||
1D60012C000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
1D5F67EE000
|
trusted library allocation
|
page read and write
|
||
1D5F67CC000
|
trusted library allocation
|
page read and write
|
||
1D5FC294000
|
trusted library allocation
|
page read and write
|
||
1D5FC2E9000
|
trusted library allocation
|
page read and write
|
||
1D5F535C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F51C8000
|
trusted library allocation
|
page read and write
|
||
1D5F4C70000
|
trusted library allocation
|
page read and write
|
||
1D5F5332000
|
trusted library allocation
|
page read and write
|
||
15B3F1F0000
|
heap
|
page read and write
|
||
1D5FBF9B000
|
trusted library allocation
|
page read and write
|
||
1D5F76B7000
|
trusted library allocation
|
page read and write
|
||
15B3EB62000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
2E8C9FC000
|
stack
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F4992000
|
trusted library allocation
|
page read and write
|
||
1D5FD887000
|
trusted library allocation
|
page read and write
|
||
1D5F3985000
|
trusted library allocation
|
page read and write
|
||
1D5FBEBD000
|
trusted library allocation
|
page read and write
|
||
2885E38F000
|
trusted library allocation
|
page read and write
|
||
1D5FF57A000
|
trusted library allocation
|
page read and write
|
||
1D5F4C17000
|
trusted library allocation
|
page read and write
|
||
1D5EF790000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
15B3EB86000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5FBFE3000
|
trusted library allocation
|
page read and write
|
||
1D5F67E2000
|
trusted library allocation
|
page read and write
|
||
1D5FC29F000
|
trusted library allocation
|
page read and write
|
||
1D5F56E7000
|
trusted library allocation
|
page read and write
|
||
21F2BA23000
|
trusted library allocation
|
page read and write
|
||
1D5F4310000
|
trusted library allocation
|
page read and write
|
||
1D5F3B75000
|
trusted library allocation
|
page read and write
|
||
1D5F531E000
|
trusted library allocation
|
page read and write
|
||
1D5F4CED000
|
trusted library allocation
|
page read and write
|
||
1D5F51DA000
|
trusted library allocation
|
page read and write
|
||
1D5F5C87000
|
trusted library allocation
|
page read and write
|
||
1D5F107E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD91000
|
heap
|
page read and write
|
||
21F2BF40000
|
heap
|
page read and write
|
||
1D5F0DAD000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5FBEC8000
|
trusted library allocation
|
page read and write
|
||
1D5F10A8000
|
trusted library allocation
|
page read and write
|
||
1D5EADE6000
|
heap
|
page read and write
|
||
F697CFE000
|
stack
|
page read and write
|
||
1D5EAE13000
|
heap
|
page read and write
|
||
1D5F4CCB000
|
trusted library allocation
|
page read and write
|
||
1D5FFC98000
|
trusted library allocation
|
page read and write
|
||
1D5FC12E000
|
trusted library allocation
|
page read and write
|
||
1D5FF45D000
|
trusted library allocation
|
page read and write
|
||
1D5EAD80000
|
heap
|
page read and write
|
||
F697CBE000
|
unkown
|
page readonly
|
||
1D5F383F000
|
heap
|
page read and write
|
||
1D5FF846000
|
trusted library allocation
|
page read and write
|
||
1551000
|
heap
|
page read and write
|
||
1D5FC1F9000
|
trusted library allocation
|
page read and write
|
||
155B000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F40E0000
|
trusted library allocation
|
page read and write
|
||
1D5FE6B1000
|
trusted library allocation
|
page read and write
|
||
1D5F5341000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
1D5F51E7000
|
trusted library allocation
|
page read and write
|
||
1D5FBD53000
|
trusted library allocation
|
page read and write
|
||
1D5FE3AD000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5F56E1000
|
trusted library allocation
|
page read and write
|
||
1D5FC1ED000
|
trusted library allocation
|
page read and write
|
||
1D5FC0E7000
|
trusted library allocation
|
page read and write
|
||
1D5FC0B8000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F5FE6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FF884000
|
trusted library allocation
|
page read and write
|
||
1D5F100E000
|
trusted library allocation
|
page read and write
|
||
1D5F63E0000
|
trusted library allocation
|
page read and write
|
||
1D5F63F8000
|
trusted library allocation
|
page read and write
|
||
1D5EFE17000
|
trusted library allocation
|
page read and write
|
||
1D5FBD8C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5F631E000
|
trusted library allocation
|
page read and write
|
||
1D5FF8FD000
|
trusted library allocation
|
page read and write
|
||
1D5EADE9000
|
heap
|
page read and write
|
||
3B1703B000
|
stack
|
page read and write
|
||
15B3F8FD000
|
heap
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
15B3E910000
|
heap
|
page read and write
|
||
1D5F43B3000
|
trusted library allocation
|
page read and write
|
||
1D5F5CF0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F5C97000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5FD8DE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1D5F5FB2000
|
trusted library allocation
|
page read and write
|
||
1D5F56DF000
|
trusted library allocation
|
page read and write
|
||
1D5F4C06000
|
trusted library allocation
|
page read and write
|
||
1D5EADEF000
|
heap
|
page read and write
|
||
1D5F45A4000
|
trusted library allocation
|
page read and write
|
||
1D5F399B000
|
trusted library allocation
|
page read and write
|
||
1D5F5546000
|
trusted library allocation
|
page read and write
|
||
1D5EADDE000
|
heap
|
page read and write
|
||
1D5FC0AB000
|
trusted library allocation
|
page read and write
|
||
1D5F16CC000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F161E000
|
trusted library allocation
|
page read and write
|
||
1D5F3CDE000
|
trusted library allocation
|
page read and write
|
||
2885DF6E000
|
heap
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5F73EC000
|
trusted library allocation
|
page read and write
|
||
1D5FC1E3000
|
trusted library allocation
|
page read and write
|
||
1D5F737A000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5F3B7F000
|
trusted library allocation
|
page read and write
|
||
1D5F477D000
|
trusted library allocation
|
page read and write
|
||
1D5F76D6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F43BA000
|
trusted library allocation
|
page read and write
|
||
15B3E820000
|
heap
|
page read and write
|
||
1D5F1623000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F62A3000
|
trusted library allocation
|
page read and write
|
||
1D5F635F000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
21F2B820000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D600127000
|
trusted library allocation
|
page read and write
|
||
1D5F67BD000
|
trusted library allocation
|
page read and write
|
||
1D5FE3EC000
|
trusted library allocation
|
page read and write
|
||
1D5F56F1000
|
trusted library allocation
|
page read and write
|
||
1D5FBFDE000
|
trusted library allocation
|
page read and write
|
||
15B3F8E9000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F0D37000
|
trusted library allocation
|
page read and write
|
||
1D5F4324000
|
trusted library allocation
|
page read and write
|
||
1D5FF9D2000
|
trusted library allocation
|
page read and write
|
||
1D5F6351000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F6361000
|
trusted library allocation
|
page read and write
|
||
1D5FBEB2000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F0DA9000
|
trusted library allocation
|
page read and write
|
||
1D5EADB3000
|
heap
|
page read and write
|
||
1D5FE3EE000
|
trusted library allocation
|
page read and write
|
||
1D5FE3DA000
|
trusted library allocation
|
page read and write
|
||
1D5FBF59000
|
trusted library allocation
|
page read and write
|
||
1D5FF5FE000
|
trusted library allocation
|
page read and write
|
||
1D5F10A1000
|
trusted library allocation
|
page read and write
|
||
1D5F4CEB000
|
trusted library allocation
|
page read and write
|
||
1D5EFE26000
|
trusted library allocation
|
page read and write
|
||
1D5FF9BB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EAD7F000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D6001E6000
|
trusted library allocation
|
page read and write
|
||
1D5F6757000
|
trusted library allocation
|
page read and write
|
||
1D5F10E6000
|
trusted library allocation
|
page read and write
|
||
1D5F56F9000
|
trusted library allocation
|
page read and write
|
||
1D5EFE1B000
|
trusted library allocation
|
page read and write
|
||
1D5F5FA3000
|
trusted library allocation
|
page read and write
|
||
1D5F0FC3000
|
trusted library allocation
|
page read and write
|
||
1D5F4C9E000
|
trusted library allocation
|
page read and write
|
||
1D5FBF39000
|
trusted library allocation
|
page read and write
|
||
1D60014C000
|
trusted library allocation
|
page read and write
|
||
1D5FC2FD000
|
trusted library allocation
|
page read and write
|
||
1D5F1011000
|
trusted library allocation
|
page read and write
|
||
1D5F47AA000
|
trusted library allocation
|
page read and write
|
||
1D5FC0BB000
|
trusted library allocation
|
page read and write
|
||
1D5F43BE000
|
trusted library allocation
|
page read and write
|
||
21F2B7F2000
|
unclassified section
|
page read and write
|
||
1D5F3CEA000
|
trusted library allocation
|
page read and write
|
||
1D5F5C97000
|
trusted library allocation
|
page read and write
|
||
1D5F5796000
|
trusted library allocation
|
page read and write
|
||
1D5F63D4000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F3B1F000
|
trusted library allocation
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
1D5F6369000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F5336000
|
trusted library allocation
|
page read and write
|
||
1D5FC2A0000
|
trusted library allocation
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5F76DD000
|
trusted library allocation
|
page read and write
|
||
1D5F56C5000
|
trusted library allocation
|
page read and write
|
||
B52000
|
unkown
|
page readonly
|
||
1D5F56A1000
|
trusted library allocation
|
page read and write
|
||
1D5F5C72000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
15B3F96B000
|
heap
|
page read and write
|
||
1D5F5F11000
|
trusted library allocation
|
page read and write
|
||
1D5F51A0000
|
trusted library allocation
|
page read and write
|
||
1D5F67C0000
|
trusted library allocation
|
page read and write
|
||
1D5F5499000
|
trusted library allocation
|
page read and write
|
||
1D5F53C5000
|
trusted library allocation
|
page read and write
|
||
1D5F3B8E000
|
trusted library allocation
|
page read and write
|
||
1D5FD9F1000
|
trusted library allocation
|
page read and write
|
||
1D5F47F9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FF8D6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0D000
|
heap
|
page read and write
|
||
1D5EADDD000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5EADE0000
|
heap
|
page read and write
|
||
1D5F4CB0000
|
trusted library allocation
|
page read and write
|
||
1D5F4CBD000
|
trusted library allocation
|
page read and write
|
||
15B3EB23000
|
trusted library allocation
|
page read and write
|
||
1D5F635D000
|
trusted library allocation
|
page read and write
|
||
9434FFE000
|
stack
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D600183000
|
trusted library allocation
|
page read and write
|
||
222C6E60000
|
heap
|
page read and write
|
||
1D5F45F8000
|
trusted library allocation
|
page read and write
|
||
15B3F86C000
|
heap
|
page read and write
|
||
1D5F4C7D000
|
trusted library allocation
|
page read and write
|
||
1D5FE5FC000
|
trusted library allocation
|
page read and write
|
||
1D5F66F7000
|
trusted library allocation
|
page read and write
|
||
1D5FBCDB000
|
trusted library allocation
|
page read and write
|
||
1D5F6151000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F5F16000
|
trusted library allocation
|
page read and write
|
||
3B191FE000
|
unkown
|
page readonly
|
||
1D5F76B7000
|
trusted library allocation
|
page read and write
|
||
1D5FF4E9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
2885E700000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F5A75000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F7691000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7E000
|
heap
|
page read and write
|
||
1561000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5FBFDC000
|
trusted library allocation
|
page read and write
|
||
1D5F56B9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1578000
|
heap
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5F392F000
|
trusted library allocation
|
page read and write
|
||
1D5EADE1000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F57EF000
|
trusted library allocation
|
page read and write
|
||
1D5FD877000
|
trusted library allocation
|
page read and write
|
||
1D5F75DD000
|
trusted library allocation
|
page read and write
|
||
1D5F67E2000
|
trusted library allocation
|
page read and write
|
||
1D5FF99F000
|
trusted library allocation
|
page read and write
|
||
1D5F76E2000
|
trusted library allocation
|
page read and write
|
||
1D5F3543000
|
trusted library allocation
|
page read and write
|
||
1D5F47A6000
|
trusted library allocation
|
page read and write
|
||
1D5FBCD1000
|
trusted library allocation
|
page read and write
|
||
1D5FC1BC000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
15B3F8F2000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5FC2C2000
|
trusted library allocation
|
page read and write
|
||
1D5F574B000
|
trusted library allocation
|
page read and write
|
||
1D5FBED6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F5CB5000
|
trusted library allocation
|
page read and write
|
||
1D5F663B000
|
trusted library allocation
|
page read and write
|
||
15B3F958000
|
heap
|
page read and write
|
||
1D5F3CFE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F63D7000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
1D5FD8A4000
|
trusted library allocation
|
page read and write
|
||
1D5F5E63000
|
trusted library allocation
|
page read and write
|
||
1D5F399B000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5FBEF1000
|
trusted library allocation
|
page read and write
|
||
1D5F73CF000
|
trusted library allocation
|
page read and write
|
||
1D5FE6B4000
|
trusted library allocation
|
page read and write
|
||
1D5FC2BF000
|
trusted library allocation
|
page read and write
|
||
1D600261000
|
trusted library allocation
|
page read and write
|
||
1D5FF953000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F56F9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FF8BF000
|
trusted library allocation
|
page read and write
|
||
15B3EBE9000
|
trusted library allocation
|
page read and write
|
||
1D5F4CB7000
|
trusted library allocation
|
page read and write
|
||
15B3F8F0000
|
heap
|
page read and write
|
||
1D5F56E6000
|
trusted library allocation
|
page read and write
|
||
1D5F476B000
|
trusted library allocation
|
page read and write
|
||
1D5FBD70000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D60054C000
|
trusted library allocation
|
page read and write
|
||
1D5FC0DB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5FC2C2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F675E000
|
trusted library allocation
|
page read and write
|
||
1D5F5FB3000
|
trusted library allocation
|
page read and write
|
||
1D5F67BD000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F459E000
|
trusted library allocation
|
page read and write
|
||
21F2B82A000
|
heap
|
page read and write
|
||
1D5EAD99000
|
heap
|
page read and write
|
||
1D5FBF99000
|
trusted library allocation
|
page read and write
|
||
15B3F921000
|
heap
|
page read and write
|
||
1D5F3563000
|
trusted library allocation
|
page read and write
|
||
1D5FF8BF000
|
trusted library allocation
|
page read and write
|
||
1D5F5AE8000
|
trusted library allocation
|
page read and write
|
||
1D600548000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FF5E8000
|
trusted library allocation
|
page read and write
|
||
1D5F5CF6000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
15B3F8E6000
|
heap
|
page read and write
|
||
1D5F5CD8000
|
trusted library allocation
|
page read and write
|
||
1D5F1064000
|
trusted library allocation
|
page read and write
|
||
15B3F977000
|
heap
|
page read and write
|
||
1D5F4334000
|
trusted library allocation
|
page read and write
|
||
1D5FBE2C000
|
trusted library allocation
|
page read and write
|
||
2885E0AF000
|
unclassified section
|
page read and write
|
||
15B3F96B000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
1D5F56EE000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F5752000
|
trusted library allocation
|
page read and write
|
||
1D5F3CE4000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F5722000
|
trusted library allocation
|
page read and write
|
||
15B3F8E6000
|
heap
|
page read and write
|
||
1D5F459E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD99000
|
heap
|
page read and write
|
||
15B3F8E9000
|
heap
|
page read and write
|
||
1D5F5C8B000
|
trusted library allocation
|
page read and write
|
||
1D5F7653000
|
trusted library allocation
|
page read and write
|
||
15B3F8F0000
|
heap
|
page read and write
|
||
1D5F10C7000
|
trusted library allocation
|
page read and write
|
||
1D5F397B000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5FD924000
|
trusted library allocation
|
page read and write
|
||
1D5F635D000
|
trusted library allocation
|
page read and write
|
||
1D5F5341000
|
trusted library allocation
|
page read and write
|
||
3D01000
|
heap
|
page read and write
|
||
1D5EAD70000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F4C88000
|
trusted library allocation
|
page read and write
|
||
1D5EADAC000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F5A2D000
|
trusted library allocation
|
page read and write
|
||
1D5FC241000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FE3ED000
|
trusted library allocation
|
page read and write
|
||
1D5F39D5000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5F76B9000
|
trusted library allocation
|
page read and write
|
||
1D5F5AFE000
|
trusted library allocation
|
page read and write
|
||
1D5FBEF1000
|
trusted library allocation
|
page read and write
|
||
1D5F162A000
|
trusted library allocation
|
page read and write
|
||
1D600183000
|
trusted library allocation
|
page read and write
|
||
1D5F61CE000
|
trusted library allocation
|
page read and write
|
||
1D5FF4FE000
|
trusted library allocation
|
page read and write
|
||
1D5F57FE000
|
trusted library allocation
|
page read and write
|
||
1D6005C4000
|
trusted library allocation
|
page read and write
|
||
1D5F5662000
|
trusted library allocation
|
page read and write
|
||
1D5F0FD8000
|
trusted library allocation
|
page read and write
|
||
1D5F577B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F10DD000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
1D5EAD8D000
|
heap
|
page read and write
|
||
15B3EC8D000
|
unkown
|
page execute read
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F5C3D000
|
trusted library allocation
|
page read and write
|
||
1D5FD933000
|
trusted library allocation
|
page read and write
|
||
1D5F627F000
|
trusted library allocation
|
page read and write
|
||
1D5F574D000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F10C7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5FC2CD000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
15B3F958000
|
heap
|
page read and write
|
||
1D5FF5E5000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F5505000
|
trusted library allocation
|
page read and write
|
||
1D5FF810000
|
trusted library allocation
|
page read and write
|
||
1D5FD8BE000
|
trusted library allocation
|
page read and write
|
||
1D5F0DE1000
|
trusted library allocation
|
page read and write
|
||
1D5F5352000
|
trusted library allocation
|
page read and write
|
||
1D5F60C0000
|
trusted library allocation
|
page read and write
|
||
1D5F5F2C000
|
trusted library allocation
|
page read and write
|
||
1D5F5752000
|
trusted library allocation
|
page read and write
|
||
1D5F401A000
|
trusted library allocation
|
page read and write
|
||
1D5F78F5000
|
trusted library allocation
|
page read and write
|
||
1D5F545F000
|
trusted library allocation
|
page read and write
|
||
1D5EADE1000
|
heap
|
page read and write
|
||
1D5F6868000
|
trusted library allocation
|
page read and write
|
||
1D5FBED3000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FC1ED000
|
trusted library allocation
|
page read and write
|
||
1D5F5180000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F5C3D000
|
trusted library allocation
|
page read and write
|
||
1D5FBD96000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9E000
|
heap
|
page read and write
|
||
1D5FF9C4000
|
trusted library allocation
|
page read and write
|
||
1D5F734D000
|
trusted library allocation
|
page read and write
|
||
1C947D3D000
|
heap
|
page read and write
|
||
1D5EADB2000
|
heap
|
page read and write
|
||
1D5FD88E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5FBE32000
|
trusted library allocation
|
page read and write
|
||
1D5F73F8000
|
trusted library allocation
|
page read and write
|
||
1D5F76C5000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5FBE60000
|
trusted library allocation
|
page read and write
|
||
21F2B7D0000
|
heap
|
page read and write
|
||
1D5F5F0B000
|
trusted library allocation
|
page read and write
|
||
15B3F977000
|
heap
|
page read and write
|
||
1D600121000
|
trusted library allocation
|
page read and write
|
||
1D5F3823000
|
heap
|
page read and write
|
||
1D5F5CB0000
|
trusted library allocation
|
page read and write
|
||
1D5FBCBD000
|
trusted library allocation
|
page read and write
|
||
1D5F40E0000
|
trusted library allocation
|
page read and write
|
||
3B167FE000
|
stack
|
page read and write
|
||
1D5F782B000
|
trusted library allocation
|
page read and write
|
||
1D5F68A2000
|
trusted library allocation
|
page read and write
|
||
1D5F3823000
|
heap
|
page read and write
|
||
1D5F574D000
|
trusted library allocation
|
page read and write
|
||
1D5FBCBF000
|
trusted library allocation
|
page read and write
|
||
1D5EADE4000
|
heap
|
page read and write
|
||
1D5F3827000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F10EB000
|
trusted library allocation
|
page read and write
|
||
1D5EADDF000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
15B3EB17000
|
trusted library allocation
|
page read and write
|
||
1D5EAD89000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD76000
|
heap
|
page read and write
|
||
1D5F4CBE000
|
trusted library allocation
|
page read and write
|
||
1D5FF8CD000
|
trusted library allocation
|
page read and write
|
||
15B3EB2F000
|
trusted library allocation
|
page read and write
|
||
1D5F63C8000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F56EA000
|
trusted library allocation
|
page read and write
|
||
1D5F68D9000
|
trusted library allocation
|
page read and write
|
||
1D5F55C7000
|
trusted library allocation
|
page read and write
|
||
B64000
|
unkown
|
page readonly
|
||
1D5EFEF0000
|
trusted library allocation
|
page read and write
|
||
1D5FF080000
|
trusted library allocation
|
page read and write
|
||
1D5F72E3000
|
trusted library allocation
|
page read and write
|
||
1D5FF833000
|
trusted library allocation
|
page read and write
|
||
1D5F4CB0000
|
trusted library allocation
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
1D5F5F84000
|
trusted library allocation
|
page read and write
|
||
1D5F5CB0000
|
trusted library allocation
|
page read and write
|
||
1D5FD89F000
|
trusted library allocation
|
page read and write
|
||
1D5FC03F000
|
trusted library allocation
|
page read and write
|
||
1D5F61C1000
|
trusted library allocation
|
page read and write
|
||
1D5F3B72000
|
trusted library allocation
|
page read and write
|
||
3B170FE000
|
unkown
|
page readonly
|
||
1D600BB1000
|
heap
|
page read and write
|
||
15B3EB66000
|
trusted library allocation
|
page read and write
|
||
1D5F76F4000
|
trusted library allocation
|
page read and write
|
||
130D000
|
stack
|
page read and write
|
||
1D5F56E7000
|
trusted library allocation
|
page read and write
|
||
1D5F106E000
|
trusted library allocation
|
page read and write
|
||
1D5FBF21000
|
trusted library allocation
|
page read and write
|
||
2885E090000
|
heap
|
page readonly
|
||
1D5F3552000
|
trusted library allocation
|
page read and write
|
||
1D5F4CA3000
|
trusted library allocation
|
page read and write
|
||
1C947E00000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F53A2000
|
trusted library allocation
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
1D5FBE19000
|
trusted library allocation
|
page read and write
|
||
1D5F5FE6000
|
trusted library allocation
|
page read and write
|
||
1D5F567D000
|
trusted library allocation
|
page read and write
|
||
2885E382000
|
trusted library allocation
|
page read and write
|
||
1D5F10C1000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5F382A000
|
heap
|
page read and write
|
||
1D5F5A4D000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
212E000
|
stack
|
page read and write
|
||
1D5F56EB000
|
trusted library allocation
|
page read and write
|
||
1C949824000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F735E000
|
trusted library allocation
|
page read and write
|
||
1D5F533D000
|
trusted library allocation
|
page read and write
|
||
15B3F8E3000
|
heap
|
page read and write
|
||
94367FE000
|
stack
|
page read and write
|
||
1D5F56CA000
|
trusted library allocation
|
page read and write
|
||
1D5F5A27000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5FF46F000
|
trusted library allocation
|
page read and write
|
||
1D5F5ED3000
|
trusted library allocation
|
page read and write
|
||
1D5F4C2F000
|
trusted library allocation
|
page read and write
|
||
1D5FC25F000
|
trusted library allocation
|
page read and write
|
||
1D5F76B3000
|
trusted library allocation
|
page read and write
|
||
1D5F62E5000
|
trusted library allocation
|
page read and write
|
||
1D5F5F5B000
|
trusted library allocation
|
page read and write
|
||
1D5F5F44000
|
trusted library allocation
|
page read and write
|
||
1D5F473D000
|
trusted library allocation
|
page read and write
|
||
1D5EFE1E000
|
trusted library allocation
|
page read and write
|
||
1C947D65000
|
heap
|
page read and write
|
||
1D5FBCCD000
|
trusted library allocation
|
page read and write
|
||
1D5F55B8000
|
trusted library allocation
|
page read and write
|
||
15B3F92A000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F53CE000
|
trusted library allocation
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
1D5FD87E000
|
trusted library allocation
|
page read and write
|
||
1D5FF81E000
|
trusted library allocation
|
page read and write
|
||
1D5F101A000
|
trusted library allocation
|
page read and write
|
||
1D6001E2000
|
trusted library allocation
|
page read and write
|
||
1D5FF8BF000
|
trusted library allocation
|
page read and write
|
||
15B3EA00000
|
trusted library allocation
|
page read and write
|
||
2885E040000
|
heap
|
page read and write
|
||
1D5EADE6000
|
heap
|
page read and write
|
||
1D5F10C7000
|
trusted library allocation
|
page read and write
|
||
1D5F67AA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FF862000
|
trusted library allocation
|
page read and write
|
||
1D5F4C8E000
|
trusted library allocation
|
page read and write
|
||
1D5F5356000
|
trusted library allocation
|
page read and write
|
||
1D5F0D20000
|
trusted library allocation
|
page read and write
|
||
1D6001EF000
|
trusted library allocation
|
page read and write
|
||
1D5F49F0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1538000
|
heap
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F67D6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F430C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D600873000
|
trusted library allocation
|
page read and write
|
||
1D5EADAC000
|
heap
|
page read and write
|
||
1D600540000
|
trusted library allocation
|
page read and write
|
||
1D5FBCAA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F5A54000
|
trusted library allocation
|
page read and write
|
||
15B3F86C000
|
heap
|
page read and write
|
||
1D5F3CA6000
|
trusted library allocation
|
page read and write
|
||
1D5F5CF6000
|
trusted library allocation
|
page read and write
|
||
1D5F5AED000
|
trusted library allocation
|
page read and write
|
||
1D5F76F4000
|
trusted library allocation
|
page read and write
|
||
1D5F4586000
|
trusted library allocation
|
page read and write
|
||
15B3EB48000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F106C000
|
trusted library allocation
|
page read and write
|
||
1D5F5320000
|
trusted library allocation
|
page read and write
|
||
1D5F76E6000
|
trusted library allocation
|
page read and write
|
||
1D5FBD16000
|
trusted library allocation
|
page read and write
|
||
1D5F4CEB000
|
trusted library allocation
|
page read and write
|
||
1D5FBD00000
|
trusted library allocation
|
page read and write
|
||
1D5F4C86000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D6001E2000
|
trusted library allocation
|
page read and write
|
||
1D5F4CF4000
|
trusted library allocation
|
page read and write
|
||
1D5F5FFA000
|
trusted library allocation
|
page read and write
|
||
1D5FBF39000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F4C3D000
|
trusted library allocation
|
page read and write
|
||
1D5FFC75000
|
trusted library allocation
|
page read and write
|
||
1D5EFEBC000
|
trusted library allocation
|
page read and write
|
||
1D5F6844000
|
trusted library allocation
|
page read and write
|
||
1D5F4CEB000
|
trusted library allocation
|
page read and write
|
||
1D5F10EB000
|
trusted library allocation
|
page read and write
|
||
1D5F3840000
|
heap
|
page read and write
|
||
15B3EBBA000
|
trusted library allocation
|
page read and write
|
||
1D5FC096000
|
trusted library allocation
|
page read and write
|
||
1D5FBEC2000
|
trusted library allocation
|
page read and write
|
||
1D5F5C8A000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9F000
|
heap
|
page read and write
|
||
1D5F6242000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5FC037000
|
trusted library allocation
|
page read and write
|
||
1D5FF833000
|
trusted library allocation
|
page read and write
|
||
21F2BB00000
|
trusted library allocation
|
page read and write
|
||
1D5F3847000
|
heap
|
page read and write
|
||
1D5FBDEA000
|
trusted library allocation
|
page read and write
|
||
1D5FE661000
|
trusted library allocation
|
page read and write
|
||
1D5FD8CD000
|
trusted library allocation
|
page read and write
|
||
1D5F3B63000
|
trusted library allocation
|
page read and write
|
||
1D5F61B9000
|
trusted library allocation
|
page read and write
|
||
1D5F56EA000
|
trusted library allocation
|
page read and write
|
||
1D5F4C70000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
1D5F571B000
|
trusted library allocation
|
page read and write
|
||
1D5F5CF6000
|
trusted library allocation
|
page read and write
|
||
1D5F16D9000
|
trusted library allocation
|
page read and write
|
||
1D5FE3E5000
|
trusted library allocation
|
page read and write
|
||
1D5F5FA5000
|
trusted library allocation
|
page read and write
|
||
1D60058C000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F109D000
|
trusted library allocation
|
page read and write
|
||
15B3F8E0000
|
heap
|
page read and write
|
||
15B3ECB4000
|
heap
|
page read and write
|
||
1D5FE5BA000
|
trusted library allocation
|
page read and write
|
||
1D5F477D000
|
trusted library allocation
|
page read and write
|
||
94337FA000
|
stack
|
page read and write
|
||
1D5F76C5000
|
trusted library allocation
|
page read and write
|
||
1D5F4CD5000
|
trusted library allocation
|
page read and write
|
||
1D5FBFA6000
|
trusted library allocation
|
page read and write
|
||
1D600199000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5FD9F9000
|
trusted library allocation
|
page read and write
|
||
1D5F66F7000
|
trusted library allocation
|
page read and write
|
||
1D5F66EA000
|
trusted library allocation
|
page read and write
|
||
1D5FC261000
|
trusted library allocation
|
page read and write
|
||
1D600169000
|
trusted library allocation
|
page read and write
|
||
1D5FBDEF000
|
trusted library allocation
|
page read and write
|
||
2885DEB0000
|
remote allocation
|
page read and write
|
||
1D5FC1B7000
|
trusted library allocation
|
page read and write
|
||
1D5F3832000
|
heap
|
page read and write
|
||
1D5F5692000
|
trusted library allocation
|
page read and write
|
||
2DB877503000
|
trusted library allocation
|
page read and write
|
||
1D5EAD99000
|
heap
|
page read and write
|
||
1D5F54E9000
|
trusted library allocation
|
page read and write
|
||
1D5FBCF7000
|
trusted library allocation
|
page read and write
|
||
1D5FF924000
|
trusted library allocation
|
page read and write
|
||
1D5FF96D000
|
trusted library allocation
|
page read and write
|
||
1D5F5CFA000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1563000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F67AE000
|
trusted library allocation
|
page read and write
|
||
1D5FBD5C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD75000
|
heap
|
page read and write
|
||
1D5FBFE4000
|
trusted library allocation
|
page read and write
|
||
1D5F3832000
|
heap
|
page read and write
|
||
1D5F6876000
|
trusted library allocation
|
page read and write
|
||
1D5F4C36000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1D5F5334000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F56F1000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5FD8C2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1C947D00000
|
heap
|
page read and write
|
||
1D5F56E9000
|
trusted library allocation
|
page read and write
|
||
F6973FE000
|
stack
|
page read and write
|
||
1D5F55B0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD80000
|
heap
|
page read and write
|
||
1D5F5344000
|
trusted library allocation
|
page read and write
|
||
1D5F4CC8000
|
trusted library allocation
|
page read and write
|
||
1D5FC121000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5FC2A4000
|
trusted library allocation
|
page read and write
|
||
1D5F106C000
|
trusted library allocation
|
page read and write
|
||
1D5F4C8E000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0D000
|
heap
|
page read and write
|
||
1D5F7355000
|
trusted library allocation
|
page read and write
|
||
1D5F384B000
|
heap
|
page read and write
|
||
1D5F0D9C000
|
trusted library allocation
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5F47F9000
|
trusted library allocation
|
page read and write
|
||
1D5FBCE3000
|
trusted library allocation
|
page read and write
|
||
1D5FC283000
|
trusted library allocation
|
page read and write
|
||
1D5F5CFA000
|
trusted library allocation
|
page read and write
|
||
1D5FC0AB000
|
trusted library allocation
|
page read and write
|
||
1D5F565E000
|
trusted library allocation
|
page read and write
|
||
1D5F532F000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F5664000
|
trusted library allocation
|
page read and write
|
||
1D5FC1ED000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F4C7B000
|
trusted library allocation
|
page read and write
|
||
1D5F572B000
|
trusted library allocation
|
page read and write
|
||
1D5FBD55000
|
trusted library allocation
|
page read and write
|
||
15B3EB12000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F5766000
|
trusted library allocation
|
page read and write
|
||
1D5F73CA000
|
trusted library allocation
|
page read and write
|
||
1D5FBED9000
|
trusted library allocation
|
page read and write
|
||
15B3F922000
|
heap
|
page read and write
|
||
1D5F4CED000
|
trusted library allocation
|
page read and write
|
||
1D5F533D000
|
trusted library allocation
|
page read and write
|
||
1D5F56EE000
|
trusted library allocation
|
page read and write
|
||
1D5F5E2C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F452B000
|
trusted library allocation
|
page read and write
|
||
1D5F765F000
|
trusted library allocation
|
page read and write
|
||
1D600893000
|
trusted library allocation
|
page read and write
|
||
1D5F47BD000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9C000
|
heap
|
page read and write
|
||
15B3EBC7000
|
trusted library allocation
|
page read and write
|
||
1D5F574A000
|
trusted library allocation
|
page read and write
|
||
1D600580000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F5684000
|
trusted library allocation
|
page read and write
|
||
1D5EFD69000
|
trusted library allocation
|
page read and write
|
||
1D5FBEB6000
|
trusted library allocation
|
page read and write
|
||
1D5F6117000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
1D5FBD36000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5FE3E4000
|
trusted library allocation
|
page read and write
|
||
2885E0A2000
|
unclassified section
|
page read and write
|
||
1D5F5A73000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5EADC1000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FBEAA000
|
trusted library allocation
|
page read and write
|
||
21F2BA61000
|
trusted library allocation
|
page read and write
|
||
1D5F5507000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D600171000
|
trusted library allocation
|
page read and write
|
||
1D5F5489000
|
trusted library allocation
|
page read and write
|
||
1D5FC24B000
|
trusted library allocation
|
page read and write
|
||
1D5F0D5B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FFCA3000
|
trusted library allocation
|
page read and write
|
||
1D5FF968000
|
trusted library allocation
|
page read and write
|
||
1D5FF8BB000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5FE6CA000
|
trusted library allocation
|
page read and write
|
||
1D5FBF44000
|
trusted library allocation
|
page read and write
|
||
F69953E000
|
stack
|
page read and write
|
||
1D5F4C8E000
|
trusted library allocation
|
page read and write
|
||
1D5F4325000
|
trusted library allocation
|
page read and write
|
||
1D5EFE66000
|
trusted library allocation
|
page read and write
|
||
1D5FE3E8000
|
trusted library allocation
|
page read and write
|
||
1D5F736C000
|
trusted library allocation
|
page read and write
|
||
3DDF5BE1000
|
trusted library allocation
|
page execute read
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5FC096000
|
trusted library allocation
|
page read and write
|
||
1D600542000
|
trusted library allocation
|
page read and write
|
||
1D5F0DC0000
|
trusted library allocation
|
page read and write
|
||
1D5F5D33000
|
trusted library allocation
|
page read and write
|
||
1D600B87000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F68F8000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
2885E311000
|
trusted library allocation
|
page read and write
|
||
1D5F6330000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5EADB7000
|
heap
|
page read and write
|
||
1D5F5F56000
|
trusted library allocation
|
page read and write
|
||
21F2BB06000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EFEE4000
|
trusted library allocation
|
page read and write
|
||
15B3F88D000
|
heap
|
page read and write
|
||
1D5EAE0A000
|
heap
|
page read and write
|
||
F697C3E000
|
unkown
|
page readonly
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F533A000
|
trusted library allocation
|
page read and write
|
||
1D5FBECC000
|
trusted library allocation
|
page read and write
|
||
15B3EC84000
|
unkown
|
page execute read
|
||
1D5F63FA000
|
trusted library allocation
|
page read and write
|
||
1563000
|
heap
|
page read and write
|
||
1D5FF9BB000
|
trusted library allocation
|
page read and write
|
||
1D5F3CE4000
|
trusted library allocation
|
page read and write
|
||
1D5FC0EA000
|
trusted library allocation
|
page read and write
|
||
1D5F537C000
|
trusted library allocation
|
page read and write
|
||
1D5F3C58000
|
trusted library allocation
|
page read and write
|
||
1D5FBE60000
|
trusted library allocation
|
page read and write
|
||
1D5FF924000
|
trusted library allocation
|
page read and write
|
||
1D5F4C6B000
|
trusted library allocation
|
page read and write
|
||
1D5F759D000
|
trusted library allocation
|
page read and write
|
||
1D5F4798000
|
trusted library allocation
|
page read and write
|
||
2885E607000
|
trusted library allocation
|
page read and write
|
||
21F2BAEB000
|
trusted library allocation
|
page read and write
|
||
1D5EFD23000
|
trusted library allocation
|
page read and write
|
||
15B3F92A000
|
heap
|
page read and write
|
||
1D5F3856000
|
heap
|
page read and write
|
||
1D5F4C6B000
|
trusted library allocation
|
page read and write
|
||
1D5F459B000
|
trusted library allocation
|
page read and write
|
||
1D5FC29C000
|
trusted library allocation
|
page read and write
|
||
1D5EADA9000
|
heap
|
page read and write
|
||
1D5F4CCB000
|
trusted library allocation
|
page read and write
|
||
1D5F4C7B000
|
trusted library allocation
|
page read and write
|
||
1D5FBF44000
|
trusted library allocation
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5F45A0000
|
trusted library allocation
|
page read and write
|
||
1D5F53E4000
|
trusted library allocation
|
page read and write
|
||
21F2BB1B000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5FD8FD000
|
trusted library allocation
|
page read and write
|
||
1D5F3CDE000
|
trusted library allocation
|
page read and write
|
||
1D5FBEBA000
|
trusted library allocation
|
page read and write
|
||
1D5F40AA000
|
trusted library allocation
|
page read and write
|
||
1D5F3CEE000
|
trusted library allocation
|
page read and write
|
||
1D5FBCD1000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5EADE6000
|
heap
|
page read and write
|
||
1D5FF5E8000
|
trusted library allocation
|
page read and write
|
||
1D5F3C3D000
|
trusted library allocation
|
page read and write
|
||
2885E30E000
|
trusted library allocation
|
page read and write
|
||
F3B7DD8000
|
stack
|
page read and write
|
||
1D5F4C24000
|
trusted library allocation
|
page read and write
|
||
1D5F10C1000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD9C000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FBEDE000
|
trusted library allocation
|
page read and write
|
||
1D5EADE2000
|
heap
|
page read and write
|
||
2E8D9FF000
|
stack
|
page read and write
|
||
1D5FE6F9000
|
trusted library allocation
|
page read and write
|
||
21F2B760000
|
heap
|
page read and write
|
||
1D5FC1FB000
|
trusted library allocation
|
page read and write
|
||
15B3E9F0000
|
trusted library allocation
|
page read and write
|
||
1D5F45AF000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5FF5F2000
|
trusted library allocation
|
page read and write
|
||
15B3F88A000
|
heap
|
page read and write
|
||
1D5FBFF7000
|
trusted library allocation
|
page read and write
|
||
1D5F72E6000
|
trusted library allocation
|
page read and write
|
||
1D5FF955000
|
trusted library allocation
|
page read and write
|
||
1D5FBDED000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F43BE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EADB3000
|
heap
|
page read and write
|
||
1D5F687D000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F459E000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5F10E6000
|
trusted library allocation
|
page read and write
|
||
1562000
|
heap
|
page read and write
|
||
1D5FF862000
|
trusted library allocation
|
page read and write
|
||
1D5FC0B3000
|
trusted library allocation
|
page read and write
|
||
1D5FE3DC000
|
trusted library allocation
|
page read and write
|
||
1D5F4AA6000
|
trusted library allocation
|
page read and write
|
||
1D5FC29E000
|
trusted library allocation
|
page read and write
|
||
1D5F532F000
|
trusted library allocation
|
page read and write
|
||
1D5F5327000
|
trusted library allocation
|
page read and write
|
||
1D5F5AB5000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5FBCE3000
|
trusted library allocation
|
page read and write
|
||
1D5FFCD3000
|
trusted library allocation
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
1D5F56D6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD63000
|
heap
|
page read and write
|
||
1D5F5794000
|
trusted library allocation
|
page read and write
|
||
15B3F860000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F67EE000
|
trusted library allocation
|
page read and write
|
||
1D5F4A5B000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
1D5F6180000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
21F2BA68000
|
trusted library allocation
|
page read and write
|
||
1D5F5FD6000
|
trusted library allocation
|
page read and write
|
||
15B3EB75000
|
trusted library allocation
|
page read and write
|
||
1D5F5CB8000
|
trusted library allocation
|
page read and write
|
||
1D60053D000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D6001EF000
|
trusted library allocation
|
page read and write
|
||
1D5FBD40000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5EAD9A000
|
heap
|
page read and write
|
||
1D5F3CEE000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
1D5F664F000
|
trusted library allocation
|
page read and write
|
||
1D5F5ECF000
|
trusted library allocation
|
page read and write
|
||
1D5F5744000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EADB0000
|
heap
|
page read and write
|
||
1D5FBCBF000
|
trusted library allocation
|
page read and write
|
||
1D5F55E5000
|
trusted library allocation
|
page read and write
|
||
1D5F4C24000
|
trusted library allocation
|
page read and write
|
||
222C6AB9000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5FF992000
|
trusted library allocation
|
page read and write
|
||
1D5F5CF6000
|
trusted library allocation
|
page read and write
|
||
1D5F40F6000
|
trusted library allocation
|
page read and write
|
||
1D5FF992000
|
trusted library allocation
|
page read and write
|
||
1D5F5CB8000
|
trusted library allocation
|
page read and write
|
||
1D5FF9A9000
|
trusted library allocation
|
page read and write
|
||
15B3EB6A000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
15B3F92D000
|
heap
|
page read and write
|
||
1D5F1079000
|
trusted library allocation
|
page read and write
|
||
1D5F56E1000
|
trusted library allocation
|
page read and write
|
||
1D5FD885000
|
trusted library allocation
|
page read and write
|
||
1D5F35FE000
|
trusted library allocation
|
page read and write
|
||
1D5FF5DB000
|
trusted library allocation
|
page read and write
|
||
1D5F383F000
|
heap
|
page read and write
|
||
1D5FBF5D000
|
trusted library allocation
|
page read and write
|
||
1D5EADAB000
|
heap
|
page read and write
|
||
1D5F4790000
|
trusted library allocation
|
page read and write
|
||
1D5F5CC0000
|
trusted library allocation
|
page read and write
|
||
1D5F6161000
|
trusted library allocation
|
page read and write
|
||
1D6001B6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F533D000
|
trusted library allocation
|
page read and write
|
||
1D5F4A17000
|
trusted library allocation
|
page read and write
|
||
1D5F4CB4000
|
trusted library allocation
|
page read and write
|
||
1D5FFCA0000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F4C65000
|
trusted library allocation
|
page read and write
|
||
1D5F5CA7000
|
trusted library allocation
|
page read and write
|
||
1D5F5FAD000
|
trusted library allocation
|
page read and write
|
||
1D5FF833000
|
trusted library allocation
|
page read and write
|
||
15B3F979000
|
heap
|
page read and write
|
||
1D5F3CFC000
|
trusted library allocation
|
page read and write
|
||
1D5F73DF000
|
trusted library allocation
|
page read and write
|
||
1D5F4C88000
|
trusted library allocation
|
page read and write
|
||
1D600BBE000
|
heap
|
page read and write
|
||
15B3F8B9000
|
heap
|
page read and write
|
||
1D5F5720000
|
trusted library allocation
|
page read and write
|
||
15B3F8A8000
|
heap
|
page read and write
|
||
1D5F452F000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5FD8E9000
|
trusted library allocation
|
page read and write
|
||
1D5F6679000
|
trusted library allocation
|
page read and write
|
||
1D5FF479000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5F638F000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5FBEDE000
|
trusted library allocation
|
page read and write
|
||
2885E605000
|
trusted library allocation
|
page read and write
|
||
1D5F112B000
|
trusted library allocation
|
page read and write
|
||
1D6001E6000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5FBFF7000
|
trusted library allocation
|
page read and write
|
||
1D5FF9D2000
|
trusted library allocation
|
page read and write
|
||
1D5FBECA000
|
trusted library allocation
|
page read and write
|
||
1D5F4923000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FBCD5000
|
trusted library allocation
|
page read and write
|
||
F69853E000
|
stack
|
page read and write
|
||
1D5F0D53000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1553000
|
heap
|
page read and write
|
||
1D5F45BB000
|
trusted library allocation
|
page read and write
|
||
1D5F4328000
|
trusted library allocation
|
page read and write
|
||
1D5FBCCD000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0D000
|
heap
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
1D5F3823000
|
heap
|
page read and write
|
||
1D5F3847000
|
heap
|
page read and write
|
||
1D5F3B85000
|
trusted library allocation
|
page read and write
|
||
1D5F56E1000
|
trusted library allocation
|
page read and write
|
||
1D5F0D2A000
|
trusted library allocation
|
page read and write
|
||
1D5F76CA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F5565000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5F537C000
|
trusted library allocation
|
page read and write
|
||
1D5F5F6D000
|
trusted library allocation
|
page read and write
|
||
1D60014C000
|
trusted library allocation
|
page read and write
|
||
1D5FE6FC000
|
trusted library allocation
|
page read and write
|
||
1D5F4CE3000
|
trusted library allocation
|
page read and write
|
||
15B3F85C000
|
heap
|
page read and write
|
||
1D5F4C6B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F3844000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5FBCC3000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F3900000
|
trusted library allocation
|
page read and write
|
||
1D5EADEF000
|
heap
|
page read and write
|
||
1D5FF839000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
2885DF3A000
|
heap
|
page read and write
|
||
1D5EAD83000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F73F8000
|
trusted library allocation
|
page read and write
|
||
1D5F76D6000
|
trusted library allocation
|
page read and write
|
||
1D5F55D2000
|
trusted library allocation
|
page read and write
|
||
1D5F3B63000
|
trusted library allocation
|
page read and write
|
||
1D5F688F000
|
trusted library allocation
|
page read and write
|
||
1D5EAE0D000
|
heap
|
page read and write
|
||
1D5F4CD8000
|
trusted library allocation
|
page read and write
|
||
1D5F1079000
|
trusted library allocation
|
page read and write
|
||
1D5F5786000
|
trusted library allocation
|
page read and write
|
||
15B3E98A000
|
heap
|
page read and write
|
||
1D5FC500000
|
trusted library allocation
|
page read and write
|
||
1D5F40E0000
|
trusted library allocation
|
page read and write
|
||
1D600580000
|
trusted library allocation
|
page read and write
|
||
1D600C21000
|
heap
|
page read and write
|
||
1D5F54A7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F7857000
|
trusted library allocation
|
page read and write
|
||
1D5EADDB000
|
heap
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D600155000
|
trusted library allocation
|
page read and write
|
||
1D5F56EE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5FE701000
|
trusted library allocation
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5EFE13000
|
trusted library allocation
|
page read and write
|
||
1D5EADA9000
|
heap
|
page read and write
|
||
1D5FF968000
|
trusted library allocation
|
page read and write
|
||
1D5F4C3E000
|
trusted library allocation
|
page read and write
|
||
1D5FD8DE000
|
trusted library allocation
|
page read and write
|
||
1D5EADDC000
|
heap
|
page read and write
|
||
3D01000
|
heap
|
page read and write
|
||
1D5F563B000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F439E000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5F567A000
|
trusted library allocation
|
page read and write
|
||
1D5F76EF000
|
trusted library allocation
|
page read and write
|
||
1D5F76E2000
|
trusted library allocation
|
page read and write
|
||
1D5F6855000
|
trusted library allocation
|
page read and write
|
||
1D5F4CCE000
|
trusted library allocation
|
page read and write
|
||
1D5FF810000
|
trusted library allocation
|
page read and write
|
||
1D5EADE6000
|
heap
|
page read and write
|
||
1D5F492F000
|
trusted library allocation
|
page read and write
|
||
1D5FBEAA000
|
trusted library allocation
|
page read and write
|
||
1D5FF968000
|
trusted library allocation
|
page read and write
|
||
15B3ECA0000
|
trusted library allocation
|
page read and write
|
||
1D5F5F4B000
|
trusted library allocation
|
page read and write
|
||
1D5F40A9000
|
trusted library allocation
|
page read and write
|
||
1D5F6133000
|
trusted library allocation
|
page read and write
|
||
9433FFE000
|
stack
|
page read and write
|
||
1D5FFCA0000
|
trusted library allocation
|
page read and write
|
||
1D5F783F000
|
trusted library allocation
|
page read and write
|
||
1D5F56F2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F56F9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F56E1000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
15B3F8E8000
|
heap
|
page read and write
|
||
21F2BA12000
|
trusted library allocation
|
page read and write
|
||
1D5F49DD000
|
trusted library allocation
|
page read and write
|
||
1D5F10F6000
|
trusted library allocation
|
page read and write
|
||
1D5F3B66000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F763B000
|
trusted library allocation
|
page read and write
|
||
1D5FC289000
|
trusted library allocation
|
page read and write
|
||
1D5FE6F9000
|
trusted library allocation
|
page read and write
|
||
1D5EADE1000
|
heap
|
page read and write
|
||
1D5FF992000
|
trusted library allocation
|
page read and write
|
||
1D5F5CC0000
|
trusted library allocation
|
page read and write
|
||
1D5FFC8F000
|
trusted library allocation
|
page read and write
|
||
1D5F5AFA000
|
trusted library allocation
|
page read and write
|
||
1D5F5CA6000
|
trusted library allocation
|
page read and write
|
||
1D5EADE1000
|
heap
|
page read and write
|
||
1D5F53C9000
|
trusted library allocation
|
page read and write
|
||
1D5F4CC4000
|
trusted library allocation
|
page read and write
|
||
1D5F456D000
|
trusted library allocation
|
page read and write
|
||
1D5FC4AD000
|
trusted library allocation
|
page read and write
|
||
1D5F5CB0000
|
trusted library allocation
|
page read and write
|
||
1D5F76C2000
|
trusted library allocation
|
page read and write
|
||
1D5FBD78000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D5EFD69000
|
trusted library allocation
|
page read and write
|
||
1D5EADAB000
|
heap
|
page read and write
|
||
1D5F571B000
|
trusted library allocation
|
page read and write
|
||
1D5F538F000
|
trusted library allocation
|
page read and write
|
||
1D5F7691000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F5F0F000
|
trusted library allocation
|
page read and write
|
||
2885E143000
|
heap
|
page read and write
|
||
1D5F1017000
|
trusted library allocation
|
page read and write
|
||
1D5F4CFE000
|
trusted library allocation
|
page read and write
|
||
1D5F63EE000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5FC2F6000
|
trusted library allocation
|
page read and write
|
||
15B3EB9E000
|
trusted library allocation
|
page read and write
|
||
1D5F4CCB000
|
trusted library allocation
|
page read and write
|
||
1D5F73D7000
|
trusted library allocation
|
page read and write
|
||
15B3EBF3000
|
trusted library allocation
|
page read and write
|
||
1D5EADE4000
|
heap
|
page read and write
|
||
1D5F62C6000
|
trusted library allocation
|
page read and write
|
||
1D5F4C6B000
|
trusted library allocation
|
page read and write
|
||
1D5F5372000
|
trusted library allocation
|
page read and write
|
||
1D5FC29F000
|
trusted library allocation
|
page read and write
|
||
1D5F6791000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADB3000
|
heap
|
page read and write
|
||
1D5F5320000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
21F2B7E0000
|
heap
|
page readonly
|
||
1D5F686C000
|
trusted library allocation
|
page read and write
|
||
1D5F384B000
|
heap
|
page read and write
|
||
1D5F0DAD000
|
trusted library allocation
|
page read and write
|
||
15B3EB10000
|
trusted library allocation
|
page read and write
|
||
1D5FF44B000
|
trusted library allocation
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5FF5E5000
|
trusted library allocation
|
page read and write
|
||
1D5FFC80000
|
trusted library allocation
|
page read and write
|
||
1D5F5D13000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F4790000
|
trusted library allocation
|
page read and write
|
||
1D5F76CA000
|
trusted library allocation
|
page read and write
|
||
1D5FC0BB000
|
trusted library allocation
|
page read and write
|
||
15B3F958000
|
heap
|
page read and write
|
||
1D5F1034000
|
trusted library allocation
|
page read and write
|
||
1D5FF992000
|
trusted library allocation
|
page read and write
|
||
1D5F3C6A000
|
trusted library allocation
|
page read and write
|
||
1D5F4CFE000
|
trusted library allocation
|
page read and write
|
||
21F2BA7B000
|
trusted library allocation
|
page read and write
|
||
1D5F6791000
|
trusted library allocation
|
page read and write
|
||
1D5FBCD5000
|
trusted library allocation
|
page read and write
|
||
1D5F16C6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8A000
|
heap
|
page read and write
|
||
1D5F76DD000
|
trusted library allocation
|
page read and write
|
||
1D5F4C9E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FF9C4000
|
trusted library allocation
|
page read and write
|
||
1D5F3B89000
|
trusted library allocation
|
page read and write
|
||
1D5F569F000
|
trusted library allocation
|
page read and write
|
||
1D5EADAF000
|
heap
|
page read and write
|
||
1D5FE666000
|
trusted library allocation
|
page read and write
|
||
1D5FF5E5000
|
trusted library allocation
|
page read and write
|
||
1D5EFE7D000
|
trusted library allocation
|
page read and write
|
||
1D5F5AEF000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5EFE75000
|
trusted library allocation
|
page read and write
|
||
15B3E9E2000
|
unclassified section
|
page read and write
|
||
1D5FBF59000
|
trusted library allocation
|
page read and write
|
||
1D5FC2B9000
|
trusted library allocation
|
page read and write
|
||
1D5F5334000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5EADDB000
|
heap
|
page read and write
|
||
1D5F3C5A000
|
trusted library allocation
|
page read and write
|
||
1D5FFC89000
|
trusted library allocation
|
page read and write
|
||
1D5F4CEB000
|
trusted library allocation
|
page read and write
|
||
1D5FD8E0000
|
trusted library allocation
|
page read and write
|
||
1D5F5598000
|
trusted library allocation
|
page read and write
|
||
1D5F537F000
|
trusted library allocation
|
page read and write
|
||
1D5F5678000
|
trusted library allocation
|
page read and write
|
||
1D5F6630000
|
trusted library allocation
|
page read and write
|
||
1D5F4C3E000
|
trusted library allocation
|
page read and write
|
||
1D5F572E000
|
trusted library allocation
|
page read and write
|
||
1D5FC458000
|
trusted library allocation
|
page read and write
|
||
F3BA83E000
|
unkown
|
page readonly
|
||
1D5F56A1000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5EADAA000
|
heap
|
page read and write
|
||
1D5FFCDA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FF5DB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EF7B3000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D600B41000
|
heap
|
page read and write
|
||
1D5F636B000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F3BA5000
|
trusted library allocation
|
page read and write
|
||
1D5EAD85000
|
heap
|
page read and write
|
||
1D5EAD87000
|
heap
|
page read and write
|
||
1D5F4593000
|
trusted library allocation
|
page read and write
|
||
1D5F572E000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F4C8E000
|
trusted library allocation
|
page read and write
|
||
1D5F61E6000
|
trusted library allocation
|
page read and write
|
||
1D5FD8D7000
|
trusted library allocation
|
page read and write
|
||
1D5F685A000
|
trusted library allocation
|
page read and write
|
||
21F2BA2E000
|
trusted library allocation
|
page read and write
|
||
1D5F1096000
|
trusted library allocation
|
page read and write
|
||
1D5F10A6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F5F3F000
|
trusted library allocation
|
page read and write
|
||
1D5F4C65000
|
trusted library allocation
|
page read and write
|
||
1D5F7296000
|
trusted library allocation
|
page read and write
|
||
1D5F40D6000
|
trusted library allocation
|
page read and write
|
||
1D5F45A9000
|
trusted library allocation
|
page read and write
|
||
1D5F1098000
|
trusted library allocation
|
page read and write
|
||
1D5FFCA0000
|
trusted library allocation
|
page read and write
|
||
1D5F5EA5000
|
trusted library allocation
|
page read and write
|
||
1D5F3857000
|
heap
|
page read and write
|
||
1D5F3C3D000
|
trusted library allocation
|
page read and write
|
||
1D5FBE2E000
|
trusted library allocation
|
page read and write
|
||
1D5F3856000
|
heap
|
page read and write
|
||
21F2BB37000
|
trusted library allocation
|
page read and write
|
||
1D5F5A2B000
|
trusted library allocation
|
page read and write
|
||
1D5F4CD5000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
unkown
|
page readonly
|
||
21F2BB1E000
|
trusted library allocation
|
page read and write
|
||
1D5EFEE1000
|
trusted library allocation
|
page read and write
|
||
1D5EFEE1000
|
trusted library allocation
|
page read and write
|
||
1D5F61E6000
|
trusted library allocation
|
page read and write
|
||
15B3F84D000
|
heap
|
page read and write
|
||
15B3F921000
|
heap
|
page read and write
|
||
1D5F3CEE000
|
trusted library allocation
|
page read and write
|
||
1D5FF940000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5FBCC3000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5FC1D3000
|
trusted library allocation
|
page read and write
|
||
1D5F5D73000
|
trusted library allocation
|
page read and write
|
||
1D6005A2000
|
trusted library allocation
|
page read and write
|
||
1D5F3858000
|
heap
|
page read and write
|
||
1D5F7551000
|
trusted library allocation
|
page read and write
|
||
1D5F0DE1000
|
trusted library allocation
|
page read and write
|
||
2885E4C6000
|
heap
|
page read and write
|
||
1D5EADB7000
|
heap
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D6001BA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5FBCF7000
|
trusted library allocation
|
page read and write
|
||
1D5EADEA000
|
heap
|
page read and write
|
||
1D6001EB000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
21F2BA43000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5FC0F2000
|
trusted library allocation
|
page read and write
|
||
1D5F16DA000
|
trusted library allocation
|
page read and write
|
||
1D5F1135000
|
trusted library allocation
|
page read and write
|
||
1D5FF5A1000
|
trusted library allocation
|
page read and write
|
||
1D600204000
|
trusted library allocation
|
page read and write
|
||
1D5F5CAC000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
1D5F16D5000
|
trusted library allocation
|
page read and write
|
||
1D5F3842000
|
heap
|
page read and write
|
||
1D5F76DD000
|
trusted library allocation
|
page read and write
|
||
1D5F43BE000
|
trusted library allocation
|
page read and write
|
||
1D5F40A5000
|
trusted library allocation
|
page read and write
|
||
1D600544000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F5AAA000
|
trusted library allocation
|
page read and write
|
||
1D5EAD93000
|
heap
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5F45AF000
|
trusted library allocation
|
page read and write
|
||
1D5F51F6000
|
trusted library allocation
|
page read and write
|
||
1D5FE689000
|
trusted library allocation
|
page read and write
|
||
1D5F452B000
|
trusted library allocation
|
page read and write
|
||
1D5F5A2A000
|
trusted library allocation
|
page read and write
|
||
1D5F5C61000
|
trusted library allocation
|
page read and write
|
||
1D5EADBB000
|
heap
|
page read and write
|
||
1D5F3856000
|
heap
|
page read and write
|
||
1D5F40EE000
|
trusted library allocation
|
page read and write
|
||
F3BA7FE000
|
stack
|
page read and write
|
||
1D5EAD99000
|
heap
|
page read and write
|
||
1D5F383F000
|
heap
|
page read and write
|
||
1D5EADA8000
|
heap
|
page read and write
|
||
1D5F61C3000
|
trusted library allocation
|
page read and write
|
||
1D5F56EB000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7D000
|
heap
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
1D5F76CA000
|
trusted library allocation
|
page read and write
|
||
1D5FF5E5000
|
trusted library allocation
|
page read and write
|
||
1D5F1017000
|
trusted library allocation
|
page read and write
|
||
1D5F3518000
|
trusted library allocation
|
page read and write
|
||
1D5F76EC000
|
trusted library allocation
|
page read and write
|
||
1D5F5681000
|
trusted library allocation
|
page read and write
|
||
1D5F56DF000
|
trusted library allocation
|
page read and write
|
||
1D5FD8E0000
|
trusted library allocation
|
page read and write
|
||
21F2BA5B000
|
trusted library allocation
|
page read and write
|
||
1D5F4CEB000
|
trusted library allocation
|
page read and write
|
||
1D5FC1EA000
|
trusted library allocation
|
page read and write
|
||
1D5F40D4000
|
trusted library allocation
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F76C2000
|
trusted library allocation
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1D5F5CA6000
|
trusted library allocation
|
page read and write
|
||
1D5F57DE000
|
trusted library allocation
|
page read and write
|
||
1D5F66CC000
|
trusted library allocation
|
page read and write
|
||
1D5EADF0000
|
heap
|
page read and write
|
||
1D5F45AC000
|
trusted library allocation
|
page read and write
|
||
1D5F3C94000
|
trusted library allocation
|
page read and write
|
||
1D5FBCDF000
|
trusted library allocation
|
page read and write
|
||
2885E4D0000
|
heap
|
page read and write
|
||
1D5F63D7000
|
trusted library allocation
|
page read and write
|
||
1D5FBFDC000
|
trusted library allocation
|
page read and write
|
||
1D5FC1F0000
|
trusted library allocation
|
page read and write
|
||
1D5FC130000
|
trusted library allocation
|
page read and write
|
||
1D5F76BB000
|
trusted library allocation
|
page read and write
|
||
1D5F51EC000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5EADF5000
|
heap
|
page read and write
|
||
1D5F4748000
|
trusted library allocation
|
page read and write
|
||
1D5F43E5000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F5F22000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
94347FE000
|
stack
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5EAE13000
|
heap
|
page read and write
|
||
1D5F6753000
|
trusted library allocation
|
page read and write
|
||
15B3EC70000
|
trusted library allocation
|
page read and write
|
||
1D5FC1F8000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1C94981E000
|
heap
|
page read and write
|
||
21F2B670000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F40A5000
|
trusted library allocation
|
page read and write
|
||
1D5F40E0000
|
trusted library allocation
|
page read and write
|
||
1D5FD9FC000
|
trusted library allocation
|
page read and write
|
||
1C94982B000
|
heap
|
page read and write
|
||
1D5FC123000
|
trusted library allocation
|
page read and write
|
||
94337FF000
|
stack
|
page read and write
|
||
1D5FBCBF000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5FBF26000
|
trusted library allocation
|
page read and write
|
||
15B3EB71000
|
trusted library allocation
|
page read and write
|
||
1D5FC0CB000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F10BE000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
15B3F96B000
|
heap
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F10BE000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
15B3F8F0000
|
heap
|
page read and write
|
||
1D5F382A000
|
heap
|
page read and write
|
||
1D5FC300000
|
trusted library allocation
|
page read and write
|
||
1D5F4CFE000
|
trusted library allocation
|
page read and write
|
||
1D5F63B5000
|
trusted library allocation
|
page read and write
|
||
1D5EAD91000
|
heap
|
page read and write
|
||
1D5F383F000
|
heap
|
page read and write
|
||
1D5F4313000
|
trusted library allocation
|
page read and write
|
||
1D5F679B000
|
trusted library allocation
|
page read and write
|
||
1D5F4CA6000
|
trusted library allocation
|
page read and write
|
||
15B3EC40000
|
heap
|
page read and write
|
||
1D5F10EB000
|
trusted library allocation
|
page read and write
|
||
1D5F76F4000
|
trusted library allocation
|
page read and write
|
||
1D5FF41A000
|
trusted library allocation
|
page read and write
|
||
1D5F0DAD000
|
trusted library allocation
|
page read and write
|
||
1D5FD859000
|
trusted library allocation
|
page read and write
|
||
1D5F4367000
|
trusted library allocation
|
page read and write
|
||
1D5FF5DB000
|
trusted library allocation
|
page read and write
|
||
1D5F4CCF000
|
trusted library allocation
|
page read and write
|
||
1C947F07000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5EADE0000
|
heap
|
page read and write
|
||
2885E0B0000
|
heap
|
page read and write
|
||
1D5EAD84000
|
heap
|
page read and write
|
||
1C949815000
|
heap
|
page read and write
|
||
15B3F860000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F674F000
|
trusted library allocation
|
page read and write
|
||
21F2BA6E000
|
trusted library allocation
|
page read and write
|
||
1D5F4C24000
|
trusted library allocation
|
page read and write
|
||
1D5F382A000
|
heap
|
page read and write
|
||
1D5F4C87000
|
trusted library allocation
|
page read and write
|
||
1D600169000
|
trusted library allocation
|
page read and write
|
||
1D5FC0BF000
|
trusted library allocation
|
page read and write
|
||
1D5F3CE9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F72FD000
|
trusted library allocation
|
page read and write
|
||
1D5F54F6000
|
trusted library allocation
|
page read and write
|
||
1D5FC077000
|
trusted library allocation
|
page read and write
|
||
1D5F5F53000
|
trusted library allocation
|
page read and write
|
||
1D5EADDA000
|
heap
|
page read and write
|
||
1D5F73D7000
|
trusted library allocation
|
page read and write
|
||
1D5EADA9000
|
heap
|
page read and write
|
||
1D5F51DD000
|
trusted library allocation
|
page read and write
|
||
1D5F78F8000
|
trusted library allocation
|
page read and write
|
||
15B3F87F000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F570C000
|
trusted library allocation
|
page read and write
|
||
1D5F5692000
|
trusted library allocation
|
page read and write
|
||
1D5F5338000
|
trusted library allocation
|
page read and write
|
||
1D5FE5BA000
|
trusted library allocation
|
page read and write
|
||
1D5F5F71000
|
trusted library allocation
|
page read and write
|
||
1D5F40E0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
21F2B650000
|
unclassified section
|
page readonly
|
||
1D5F0FF5000
|
trusted library allocation
|
page read and write
|
||
1D5F5736000
|
trusted library allocation
|
page read and write
|
||
1D5FF4C9000
|
trusted library allocation
|
page read and write
|
||
1D5F73EC000
|
trusted library allocation
|
page read and write
|
||
1D5EADB4000
|
heap
|
page read and write
|
||
1D5F4CA3000
|
trusted library allocation
|
page read and write
|
||
1D5F5CA7000
|
trusted library allocation
|
page read and write
|
||
1D5F1633000
|
trusted library allocation
|
page read and write
|
||
1D5F78B1000
|
trusted library allocation
|
page read and write
|
||
1D5F3B3C000
|
trusted library allocation
|
page read and write
|
||
15B3E800000
|
unclassified section
|
page readonly
|
||
1D5F6747000
|
trusted library allocation
|
page read and write
|
||
1D5F66B8000
|
trusted library allocation
|
page read and write
|
||
1D5F759A000
|
trusted library allocation
|
page read and write
|
||
1D5F5729000
|
trusted library allocation
|
page read and write
|
||
1D5F67FE000
|
trusted library allocation
|
page read and write
|
||
1D5EADAB000
|
heap
|
page read and write
|
||
1D5F4A19000
|
trusted library allocation
|
page read and write
|
||
1D5FF5C0000
|
trusted library allocation
|
page read and write
|
||
1D5F7399000
|
trusted library allocation
|
page read and write
|
||
F697C7D000
|
stack
|
page read and write
|
||
1D5EADE0000
|
heap
|
page read and write
|
||
1D6001E6000
|
trusted library allocation
|
page read and write
|
||
1D5FC1DF000
|
trusted library allocation
|
page read and write
|
||
1D5EADD9000
|
heap
|
page read and write
|
||
1D5F5EC4000
|
trusted library allocation
|
page read and write
|
||
1D5FFC98000
|
trusted library allocation
|
page read and write
|
||
1D5F4389000
|
trusted library allocation
|
page read and write
|
||
1D5F109D000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F109D000
|
trusted library allocation
|
page read and write
|
||
1D5F4C6A000
|
trusted library allocation
|
page read and write
|
||
1D5F387A000
|
heap
|
page read and write
|
||
1D6001E2000
|
trusted library allocation
|
page read and write
|
||
1D5F5F9F000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5F40F4000
|
trusted library allocation
|
page read and write
|
||
21F2B800000
|
heap
|
page read and write
|
||
1D5F72DC000
|
trusted library allocation
|
page read and write
|
||
1D5F574A000
|
trusted library allocation
|
page read and write
|
||
1D5F76C0000
|
trusted library allocation
|
page read and write
|
||
1D5F47F3000
|
trusted library allocation
|
page read and write
|
||
1D6005BE000
|
trusted library allocation
|
page read and write
|
||
1D5FBD9C000
|
trusted library allocation
|
page read and write
|
||
1D5F4324000
|
trusted library allocation
|
page read and write
|
||
1D5F3CE8000
|
trusted library allocation
|
page read and write
|
||
1D5F4C64000
|
trusted library allocation
|
page read and write
|
||
1D5FBFD5000
|
trusted library allocation
|
page read and write
|
||
1D5F3B5A000
|
trusted library allocation
|
page read and write
|
||
1D5F0F4A000
|
trusted library allocation
|
page read and write
|
||
1D5FF49C000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F67AA000
|
trusted library allocation
|
page read and write
|
||
1D5FBCE3000
|
trusted library allocation
|
page read and write
|
||
1D5F4593000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1D5F6365000
|
trusted library allocation
|
page read and write
|
||
1D5F3BCE000
|
trusted library allocation
|
page read and write
|
||
F6963D8000
|
stack
|
page read and write
|
||
1D5FF200000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5FBD4E000
|
trusted library allocation
|
page read and write
|
||
1D5F7296000
|
trusted library allocation
|
page read and write
|
||
1D5F5EA5000
|
trusted library allocation
|
page read and write
|
||
1D5F4346000
|
trusted library allocation
|
page read and write
|
||
1D5F674D000
|
trusted library allocation
|
page read and write
|
||
1D5F40E7000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5FBECC000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F5F56000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5FC2B9000
|
trusted library allocation
|
page read and write
|
||
1D5EAD8F000
|
heap
|
page read and write
|
||
1D5F0FC3000
|
trusted library allocation
|
page read and write
|
||
1D5F40AD000
|
trusted library allocation
|
page read and write
|
||
1D5F3823000
|
heap
|
page read and write
|
||
1D5F0D40000
|
trusted library allocation
|
page read and write
|
||
1D5F39D8000
|
trusted library allocation
|
page read and write
|
||
15B3F860000
|
heap
|
page read and write
|
||
1D5F534F000
|
trusted library allocation
|
page read and write
|
||
1D5EAD92000
|
heap
|
page read and write
|
||
1D5F63AC000
|
trusted library allocation
|
page read and write
|
||
1D5F63F6000
|
trusted library allocation
|
page read and write
|
||
1D5F0DE1000
|
trusted library allocation
|
page read and write
|
||
1D5EADA6000
|
heap
|
page read and write
|
||
1D5F55D8000
|
trusted library allocation
|
page read and write
|
||
1D5F67C0000
|
trusted library allocation
|
page read and write
|
||
1D5FBD3C000
|
trusted library allocation
|
page read and write
|
||
1D600576000
|
trusted library allocation
|
page read and write
|
||
1D5F5FFA000
|
trusted library allocation
|
page read and write
|
||
1D5FBCAA000
|
trusted library allocation
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
1D5EADA0000
|
heap
|
page read and write
|
||
1D5FF8CD000
|
trusted library allocation
|
page read and write
|
||
1D5F0FE9000
|
trusted library allocation
|
page read and write
|
||
1D5F67E4000
|
trusted library allocation
|
page read and write
|
||
1D5FBCF7000
|
trusted library allocation
|
page read and write
|
||
1D5F76E2000
|
trusted library allocation
|
page read and write
|
||
1D5F16BA000
|
trusted library allocation
|
page read and write
|
||
1D5F57E8000
|
trusted library allocation
|
page read and write
|
||
15B3F8E8000
|
heap
|
page read and write
|
||
1D5FC2A2000
|
trusted library allocation
|
page read and write
|
||
1D5F0DA9000
|
trusted library allocation
|
page read and write
|
||
1D5EADB9000
|
heap
|
page read and write
|
||
1D5EAE13000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F3B9E000
|
trusted library allocation
|
page read and write
|
||
1D5FC1ED000
|
trusted library allocation
|
page read and write
|
||
1D5F76DD000
|
trusted library allocation
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5FC1B7000
|
trusted library allocation
|
page read and write
|
||
1D5FC0B8000
|
trusted library allocation
|
page read and write
|
||
1D5FF5FB000
|
trusted library allocation
|
page read and write
|
||
1D5F3847000
|
heap
|
page read and write
|
||
1D5F5651000
|
trusted library allocation
|
page read and write
|
||
1D5FF5C9000
|
trusted library allocation
|
page read and write
|
||
1D5FBD76000
|
trusted library allocation
|
page read and write
|
||
1D5F51E3000
|
trusted library allocation
|
page read and write
|
||
1D5F6860000
|
trusted library allocation
|
page read and write
|
||
1D5FBD32000
|
trusted library allocation
|
page read and write
|
||
1D5F533A000
|
trusted library allocation
|
page read and write
|
||
1D5F39CB000
|
trusted library allocation
|
page read and write
|
||
1D5F387A000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F56D6000
|
trusted library allocation
|
page read and write
|
||
1D5EAD7F000
|
heap
|
page read and write
|
||
1D5F5CA7000
|
trusted library allocation
|
page read and write
|
||
1D5F7832000
|
trusted library allocation
|
page read and write
|
||
1D5F6894000
|
trusted library allocation
|
page read and write
|
||
11DB000
|
stack
|
page read and write
|
||
1D5F78AB000
|
trusted library allocation
|
page read and write
|
||
1D5EFE26000
|
trusted library allocation
|
page read and write
|
||
1D5EFEA2000
|
trusted library allocation
|
page read and write
|
||
1D5F76C0000
|
trusted library allocation
|
page read and write
|
||
1D5F384B000
|
heap
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F73B6000
|
trusted library allocation
|
page read and write
|
||
F698D3E000
|
unkown
|
page readonly
|
||
1D5FF8FD000
|
trusted library allocation
|
page read and write
|
||
1D5F5327000
|
trusted library allocation
|
page read and write
|
||
1D5F55BD000
|
trusted library allocation
|
page read and write
|
||
1D5F5F5B000
|
trusted library allocation
|
page read and write
|
||
F6959DE000
|
stack
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D600155000
|
trusted library allocation
|
page read and write
|
||
1D5FF47F000
|
trusted library allocation
|
page read and write
|
||
1D5F67C0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD95000
|
heap
|
page read and write
|
||
1D5EADD6000
|
heap
|
page read and write
|
||
1D5F3842000
|
heap
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
1D5FBD18000
|
trusted library allocation
|
page read and write
|
||
1D5FC2D0000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F5CB8000
|
trusted library allocation
|
page read and write
|
||
1D5F5671000
|
trusted library allocation
|
page read and write
|
||
1D5FBD78000
|
trusted library allocation
|
page read and write
|
||
1D5F10DB000
|
trusted library allocation
|
page read and write
|
||
1D5F49DD000
|
trusted library allocation
|
page read and write
|
||
1D5F0D3A000
|
trusted library allocation
|
page read and write
|
||
1D5FF8ED000
|
trusted library allocation
|
page read and write
|
||
1D5EAD9B000
|
heap
|
page read and write
|
||
1D5F0FC3000
|
trusted library allocation
|
page read and write
|
||
1D5F6185000
|
trusted library allocation
|
page read and write
|
||
1D5FF5F2000
|
trusted library allocation
|
page read and write
|
||
15B3F93B000
|
heap
|
page read and write
|
There are 3945 hidden memdumps, click here to show them.