Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_45fcd96f-7d16-4a2c-b54a-73b2ba21a852.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_45fcd96f-7d16-4a2c-b54a-73b2ba21a852.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\bcdaee9a-4819-42be-85cc-d4aac6b371e9
(copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\bcdaee9a-4819-42be-85cc-d4aac6b371e9.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 27 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2240
-prefMapHandle 2224 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {d28453ce-bbb3-47cc-a509-e2588d894b94} 7700 "\\.\pipe\gecko-crash-server-pipe.7700" 1b0c946f110 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4456 -parentBuildID 20230927232528 -prefsHandle 4216
-prefMapHandle 2752 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {60ec1ea3-4057-4a16-83ca-d99827d7004b}
7700 "\\.\pipe\gecko-crash-server-pipe.7700" 1b0db4da710 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5048 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 3032 -prefMapHandle 3028 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {9afbe1b9-40f8-47f5-924a-bbf70670cb96} 7700 "\\.\pipe\gecko-crash-server-pipe.7700" 1b0d9a1ed10 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
|
unknown
|
||
https://www.instagram.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://ok.ru/
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
http://detectportal.firefox.comX
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggestabout
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.0/
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
http://youtube.com/
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.1/
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://gpuweb.github.io/gpuweb/
|
unknown
|
||
https://relay.firefox.com/api/v1/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
|
unknown
|
||
https://topsites.services.mozilla.com/cid/
|
unknown
|
||
https://www.wykop.pl/
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
https://vk.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.196.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.193
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.193.91
|
||
dyna.wikimedia.org
|
185.15.58.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.181.78
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
172.217.17.78
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.193.140
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
151.101.193.91
|
services.addons.mozilla.org
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
142.250.181.78
|
youtube.com
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B0E147F000
|
trusted library allocation
|
page read and write
|
||
1B0DAA68000
|
trusted library allocation
|
page read and write
|
||
1B0DB591000
|
trusted library allocation
|
page read and write
|
||
1B0E12CD000
|
trusted library allocation
|
page read and write
|
||
1B0DB4CF000
|
trusted library allocation
|
page read and write
|
||
1B0E2CC5000
|
trusted library allocation
|
page read and write
|
||
1B0D018B000
|
heap
|
page read and write
|
||
1B0D9873000
|
trusted library allocation
|
page read and write
|
||
1B0E1458000
|
trusted library allocation
|
page read and write
|
||
1B0DC656000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
C2C000
|
unkown
|
page write copy
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DA6E5000
|
trusted library allocation
|
page read and write
|
||
1B0D0235000
|
heap
|
page read and write
|
||
1B0D01CC000
|
heap
|
page read and write
|
||
1B0D0185000
|
heap
|
page read and write
|
||
1B0E5366000
|
trusted library allocation
|
page read and write
|
||
1B0DA2B4000
|
trusted library allocation
|
page read and write
|
||
1FF82FEA000
|
heap
|
page read and write
|
||
1B0E19EB000
|
trusted library allocation
|
page read and write
|
||
1B0DB8E7000
|
trusted library allocation
|
page read and write
|
||
1B0DC780000
|
trusted library allocation
|
page read and write
|
||
1B0DA1C3000
|
trusted library allocation
|
page read and write
|
||
1B0E601C000
|
trusted library allocation
|
page read and write
|
||
1B0E2C99000
|
trusted library allocation
|
page read and write
|
||
1B0DB545000
|
trusted library allocation
|
page read and write
|
||
1B0E53C0000
|
trusted library allocation
|
page read and write
|
||
9C216BE000
|
unkown
|
page readonly
|
||
E77DFFF000
|
stack
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0D88B5000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
26AC8C60000
|
unclassified section
|
page readonly
|
||
1B0E552B000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E48F8000
|
trusted library allocation
|
page read and write
|
||
1B0DA660000
|
trusted library allocation
|
page read and write
|
||
1B0E14D6000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0E1697000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DAB9B000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0E19EF000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
237F7578000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D0216000
|
heap
|
page read and write
|
||
1B0E1159000
|
trusted library allocation
|
page read and write
|
||
1B0E14DA000
|
trusted library allocation
|
page read and write
|
||
1B0DAA9B000
|
trusted library allocation
|
page read and write
|
||
1B0E5191000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0E19D1000
|
trusted library allocation
|
page read and write
|
||
1B0E1482000
|
trusted library allocation
|
page read and write
|
||
1B0DB335000
|
trusted library allocation
|
page read and write
|
||
1B0E4F84000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D63A1000
|
trusted library allocation
|
page read and write
|
||
1B0E16CA000
|
trusted library allocation
|
page read and write
|
||
1B0E14F3000
|
trusted library allocation
|
page read and write
|
||
1B0E11E2000
|
trusted library allocation
|
page read and write
|
||
1B0DCB20000
|
trusted library allocation
|
page read and write
|
||
1B0DAB59000
|
trusted library allocation
|
page read and write
|
||
1B0DAD72000
|
trusted library allocation
|
page read and write
|
||
1B0E2BAC000
|
trusted library allocation
|
page read and write
|
||
1B0DCBA7000
|
trusted library allocation
|
page read and write
|
||
1B0DAD82000
|
trusted library allocation
|
page read and write
|
||
237F75F4000
|
trusted library allocation
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0E1AD9000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E1376000
|
trusted library allocation
|
page read and write
|
||
1B0D93CB000
|
trusted library allocation
|
page read and write
|
||
1B0DCBF2000
|
trusted library allocation
|
page read and write
|
||
1FF82F69000
|
heap
|
page read and write
|
||
1B0D91D8000
|
trusted library allocation
|
page read and write
|
||
1B0E53C6000
|
trusted library allocation
|
page read and write
|
||
1B0DADB2000
|
trusted library allocation
|
page read and write
|
||
1B0DC6A4000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DAD6F000
|
trusted library allocation
|
page read and write
|
||
1FF82FE0000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0E1A84000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E1959000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E182C000
|
trusted library allocation
|
page read and write
|
||
1B0D9980000
|
trusted library allocation
|
page read and write
|
||
1B0D01D3000
|
heap
|
page read and write
|
||
1B0E1215000
|
trusted library allocation
|
page read and write
|
||
1B0E1148000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E11AE000
|
trusted library allocation
|
page read and write
|
||
1B0DB900000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F0000
|
trusted library allocation
|
page read and write
|
||
1B0E546F000
|
trusted library allocation
|
page read and write
|
||
1B0D99AA000
|
trusted library allocation
|
page read and write
|
||
1B0DC6EF000
|
trusted library allocation
|
page read and write
|
||
1B0E19E1000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
F4A6DBE000
|
stack
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0DA360000
|
trusted library allocation
|
page read and write
|
||
1B0E48E0000
|
trusted library allocation
|
page read and write
|
||
1B0D9DB3000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E2BBB000
|
trusted library allocation
|
page read and write
|
||
24587170000
|
heap
|
page read and write
|
||
1B0DCBFA000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1B0DAA5D000
|
trusted library allocation
|
page read and write
|
||
1B0DA9B7000
|
trusted library allocation
|
page read and write
|
||
1B0D017F000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D017C000
|
heap
|
page read and write
|
||
1B0DADCD000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E4FD4000
|
trusted library allocation
|
page read and write
|
||
1B0E169E000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DADCD000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0DC7F9000
|
trusted library allocation
|
page read and write
|
||
1B0E12BB000
|
trusted library allocation
|
page read and write
|
||
1B0E19D8000
|
trusted library allocation
|
page read and write
|
||
1B0D0185000
|
heap
|
page read and write
|
||
1B0DCB29000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0E1A45000
|
trusted library allocation
|
page read and write
|
||
237F7800000
|
trusted library allocation
|
page read and write
|
||
1FF8232F000
|
trusted library allocation
|
page read and write
|
||
1B0D619C000
|
trusted library allocation
|
page read and write
|
||
1B0D930F000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0DA9ED000
|
trusted library allocation
|
page read and write
|
||
1B0E2DEB000
|
trusted library allocation
|
page read and write
|
||
1B0E1905000
|
trusted library allocation
|
page read and write
|
||
1B0DA9F9000
|
trusted library allocation
|
page read and write
|
||
1B0E4F9F000
|
trusted library allocation
|
page read and write
|
||
1B0E1159000
|
trusted library allocation
|
page read and write
|
||
1FF82F7D000
|
heap
|
page read and write
|
||
1B0DCBAD000
|
trusted library allocation
|
page read and write
|
||
1B0D91A5000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0E1174000
|
trusted library allocation
|
page read and write
|
||
1B0D933D000
|
trusted library allocation
|
page read and write
|
||
1B0DAB99000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E1A6C000
|
trusted library allocation
|
page read and write
|
||
1B0E1167000
|
trusted library allocation
|
page read and write
|
||
1B0D9061000
|
trusted library allocation
|
page read and write
|
||
1B0E1652000
|
trusted library allocation
|
page read and write
|
||
1B0E12C8000
|
trusted library allocation
|
page read and write
|
||
1B0DAB07000
|
trusted library allocation
|
page read and write
|
||
1B0D63EC000
|
trusted library allocation
|
page read and write
|
||
F4A643E000
|
unkown
|
page readonly
|
||
1B0DABFE000
|
trusted library allocation
|
page read and write
|
||
1B0E53BF000
|
trusted library allocation
|
page read and write
|
||
1FF82950000
|
heap
|
page read and write
|
||
1B0E53BC000
|
trusted library allocation
|
page read and write
|
||
1B0D8F9C000
|
trusted library allocation
|
page read and write
|
||
1B0D93AF000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DA988000
|
trusted library allocation
|
page read and write
|
||
1B0D01A1000
|
heap
|
page read and write
|
||
1B0DC7DC000
|
trusted library allocation
|
page read and write
|
||
1B0D0162000
|
heap
|
page read and write
|
||
1B0DB3B8000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0DA17F000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0DA6FB000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0DC7CC000
|
trusted library allocation
|
page read and write
|
||
1B0E5386000
|
trusted library allocation
|
page read and write
|
||
1B0D01A8000
|
heap
|
page read and write
|
||
1B0E10BB000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D9150000
|
trusted library allocation
|
page read and write
|
||
1B0E53DE000
|
trusted library allocation
|
page read and write
|
||
1B0DAB74000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DC538000
|
trusted library allocation
|
page read and write
|
||
1B0D51FE000
|
trusted library allocation
|
page read and write
|
||
1B0E4FC9000
|
trusted library allocation
|
page read and write
|
||
1B0DAB71000
|
trusted library allocation
|
page read and write
|
||
1B0E54B9000
|
trusted library allocation
|
page read and write
|
||
1B0E16BB000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DC5DF000
|
trusted library allocation
|
page read and write
|
||
1B0E3AA7000
|
trusted library allocation
|
page read and write
|
||
1B0E18CA000
|
trusted library allocation
|
page read and write
|
||
1B0E1278000
|
trusted library allocation
|
page read and write
|
||
1B0DAA80000
|
trusted library allocation
|
page read and write
|
||
1B0E5376000
|
trusted library allocation
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
1B0E57E1000
|
heap
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
1FF82303000
|
trusted library allocation
|
page read and write
|
||
1B0E11A9000
|
trusted library allocation
|
page read and write
|
||
1B0DB81B000
|
trusted library allocation
|
page read and write
|
||
1B0E14F6000
|
trusted library allocation
|
page read and write
|
||
1B0E2C58000
|
trusted library allocation
|
page read and write
|
||
1B0E5524000
|
trusted library allocation
|
page read and write
|
||
1B0E54B0000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DB4B0000
|
trusted library allocation
|
page read and write
|
||
26AC92C6000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DC886000
|
trusted library allocation
|
page read and write
|
||
1B0E10E7000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1FF82FB2000
|
heap
|
page read and write
|
||
1B0E14A3000
|
trusted library allocation
|
page read and write
|
||
1B0DABDE000
|
trusted library allocation
|
page read and write
|
||
1B0E1827000
|
trusted library allocation
|
page read and write
|
||
1B0E2C71000
|
trusted library allocation
|
page read and write
|
||
1B0E1184000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E19EA000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0D01CD000
|
heap
|
page read and write
|
||
892113C000
|
stack
|
page read and write
|
||
1B0E5215000
|
trusted library allocation
|
page read and write
|
||
1B0E54F4000
|
trusted library allocation
|
page read and write
|
||
1B0E5277000
|
trusted library allocation
|
page read and write
|
||
1B0E2BC7000
|
trusted library allocation
|
page read and write
|
||
264899B1000
|
trusted library allocation
|
page execute read
|
||
1B0E53CF000
|
trusted library allocation
|
page read and write
|
||
1B0D9047000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0DB862000
|
trusted library allocation
|
page read and write
|
||
1B0D918E000
|
trusted library allocation
|
page read and write
|
||
1B0E136C000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
26AC8E72000
|
trusted library allocation
|
page read and write
|
||
1B0DB345000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
1B0DAD0E000
|
trusted library allocation
|
page read and write
|
||
1B0DA23C000
|
trusted library allocation
|
page read and write
|
||
F4A63FE000
|
unkown
|
page readonly
|
||
1B0E53D1000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0DAB99000
|
trusted library allocation
|
page read and write
|
||
1B0D61F2000
|
trusted library allocation
|
page read and write
|
||
1B0E1174000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0E1839000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1FF82F60000
|
heap
|
page read and write
|
||
1B0D61EE000
|
trusted library allocation
|
page read and write
|
||
1B0DA1D2000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DA25B000
|
trusted library allocation
|
page read and write
|
||
1B0D8963000
|
trusted library allocation
|
page read and write
|
||
1B0DABF7000
|
trusted library allocation
|
page read and write
|
||
1B0DAD8E000
|
trusted library allocation
|
page read and write
|
||
1B0D9077000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0E37C3000
|
trusted library allocation
|
page read and write
|
||
1B0D89F4000
|
trusted library allocation
|
page read and write
|
||
1B0DAB59000
|
trusted library allocation
|
page read and write
|
||
1B0E19D8000
|
trusted library allocation
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
1B0DC5E6000
|
trusted library allocation
|
page read and write
|
||
1B0D8FC9000
|
trusted library allocation
|
page read and write
|
||
1B0DB463000
|
trusted library allocation
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E1100000
|
trusted library allocation
|
page read and write
|
||
1FF8302D000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E54DF000
|
trusted library allocation
|
page read and write
|
||
1B0DA2AC000
|
trusted library allocation
|
page read and write
|
||
1B0E51F3000
|
trusted library allocation
|
page read and write
|
||
1B0E18FD000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0E12BA000
|
trusted library allocation
|
page read and write
|
||
1B0E1ACA000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E3744000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA2FA000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E116A000
|
trusted library allocation
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0E2BB3000
|
trusted library allocation
|
page read and write
|
||
1B0DCBD0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
unkown
|
page write copy
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0D63E5000
|
trusted library allocation
|
page read and write
|
||
1B0DB4B2000
|
trusted library allocation
|
page read and write
|
||
1B0E529E000
|
trusted library allocation
|
page read and write
|
||
1B0E2CC5000
|
trusted library allocation
|
page read and write
|
||
1B0E5540000
|
trusted library allocation
|
page read and write
|
||
1FF82FFD000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0DADC3000
|
trusted library allocation
|
page read and write
|
||
1FF82130000
|
heap
|
page read and write
|
||
1B0E4F97000
|
trusted library allocation
|
page read and write
|
||
1B0D99B3000
|
trusted library allocation
|
page read and write
|
||
1B0E1132000
|
trusted library allocation
|
page read and write
|
||
1B0E54B9000
|
trusted library allocation
|
page read and write
|
||
1B0E51F8000
|
trusted library allocation
|
page read and write
|
||
1B0E2D4B000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0DC5D9000
|
trusted library allocation
|
page read and write
|
||
1B0D91C4000
|
trusted library allocation
|
page read and write
|
||
1B0E146F000
|
trusted library allocation
|
page read and write
|
||
1B0E2D4B000
|
trusted library allocation
|
page read and write
|
||
1B0E5529000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DB827000
|
trusted library allocation
|
page read and write
|
||
1FF823F0000
|
trusted library allocation
|
page read and write
|
||
1B0E1582000
|
trusted library allocation
|
page read and write
|
||
1B0D8F58000
|
trusted library allocation
|
page read and write
|
||
26AC9112000
|
trusted library allocation
|
page read and write
|
||
1B0DA988000
|
trusted library allocation
|
page read and write
|
||
1B0E4FD4000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
E1C000
|
heap
|
page read and write
|
||
1B0DA9F6000
|
trusted library allocation
|
page read and write
|
||
1B0DA665000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DCBAB000
|
trusted library allocation
|
page read and write
|
||
1B0DA2AC000
|
trusted library allocation
|
page read and write
|
||
1B0D01E6000
|
heap
|
page read and write
|
||
1B0DCBD0000
|
trusted library allocation
|
page read and write
|
||
1B0E536F000
|
trusted library allocation
|
page read and write
|
||
1B0DA916000
|
trusted library allocation
|
page read and write
|
||
1B0DABC6000
|
trusted library allocation
|
page read and write
|
||
1B0DA9E7000
|
trusted library allocation
|
page read and write
|
||
1B0E10C0000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0DB890000
|
trusted library allocation
|
page read and write
|
||
1B0DA302000
|
trusted library allocation
|
page read and write
|
||
1B0E48C1000
|
trusted library allocation
|
page read and write
|
||
1B0E18C8000
|
trusted library allocation
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
1B0DC88D000
|
trusted library allocation
|
page read and write
|
||
1B0DABF7000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0DC6EF000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DC5C1000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E4FA3000
|
trusted library allocation
|
page read and write
|
||
C22000
|
unkown
|
page readonly
|
||
9FE000
|
stack
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0DCBCB000
|
trusted library allocation
|
page read and write
|
||
1B0D9068000
|
trusted library allocation
|
page read and write
|
||
1B0D0185000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
19DE000
|
stack
|
page read and write
|
||
1B0E19ED000
|
trusted library allocation
|
page read and write
|
||
1FF82FF2000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E52C2000
|
trusted library allocation
|
page read and write
|
||
1B0D908A000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E15A2000
|
trusted library allocation
|
page read and write
|
||
1B0E2CD7000
|
trusted library allocation
|
page read and write
|
||
1B0E2D2E000
|
trusted library allocation
|
page read and write
|
||
1B0E53A0000
|
trusted library allocation
|
page read and write
|
||
237F7212000
|
remote allocation
|
page execute read
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DAA3F000
|
trusted library allocation
|
page read and write
|
||
237F7600000
|
unclassified section
|
page read and write
|
||
1B0E3737000
|
trusted library allocation
|
page read and write
|
||
1B0DB8ED000
|
trusted library allocation
|
page read and write
|
||
1B0D933A000
|
trusted library allocation
|
page read and write
|
||
1B0E52D7000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DABE8000
|
trusted library allocation
|
page read and write
|
||
24588DBA000
|
heap
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0E37AB000
|
trusted library allocation
|
page read and write
|
||
1B0D9D8E000
|
trusted library allocation
|
page read and write
|
||
1FF823F3000
|
trusted library allocation
|
page read and write
|
||
26AC8EC8000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DB324000
|
trusted library allocation
|
page read and write
|
||
1B0E12B2000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0D9072000
|
trusted library allocation
|
page read and write
|
||
1B0D61F4000
|
trusted library allocation
|
page read and write
|
||
1B0E1598000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E16D6000
|
trusted library allocation
|
page read and write
|
||
1B0DC6D2000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E1820000
|
trusted library allocation
|
page read and write
|
||
1B0DB9F0000
|
trusted library allocation
|
page read and write
|
||
1B0DC75A000
|
trusted library allocation
|
page read and write
|
||
1B0D022C000
|
heap
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
1B0DA114000
|
trusted library allocation
|
page read and write
|
||
1B0DB8F2000
|
trusted library allocation
|
page read and write
|
||
1B0DA9ED000
|
trusted library allocation
|
page read and write
|
||
1B0E4883000
|
trusted library allocation
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0DA97A000
|
trusted library allocation
|
page read and write
|
||
1B0E1ACA000
|
trusted library allocation
|
page read and write
|
||
1B0E1972000
|
trusted library allocation
|
page read and write
|
||
1FF81FC0000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E4FA3000
|
trusted library allocation
|
page read and write
|
||
1FF83067000
|
heap
|
page read and write
|
||
1B0DCBE3000
|
trusted library allocation
|
page read and write
|
||
1B0E54F4000
|
trusted library allocation
|
page read and write
|
||
1B0DABA6000
|
trusted library allocation
|
page read and write
|
||
35B1000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D8860000
|
trusted library allocation
|
page read and write
|
||
1B0DA16A000
|
trusted library allocation
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
1B0E1140000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E1840000
|
trusted library allocation
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
1B0DAD88000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
unkown
|
page readonly
|
||
1B0D01E9000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E114C000
|
trusted library allocation
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
1B0DAD33000
|
trusted library allocation
|
page read and write
|
||
1B0E18DB000
|
trusted library allocation
|
page read and write
|
||
1B0DADB8000
|
trusted library allocation
|
page read and write
|
||
1B0DCBF2000
|
trusted library allocation
|
page read and write
|
||
1FF8235C000
|
trusted library allocation
|
page read and write
|
||
1B0D9DB5000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D88DA000
|
trusted library allocation
|
page read and write
|
||
1B0D91BB000
|
trusted library allocation
|
page read and write
|
||
1B0E18F0000
|
trusted library allocation
|
page read and write
|
||
1B0E1934000
|
trusted library allocation
|
page read and write
|
||
1B0D52BC000
|
trusted library allocation
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
1B0DC6E9000
|
trusted library allocation
|
page read and write
|
||
1B0E5520000
|
trusted library allocation
|
page read and write
|
||
1B0D908A000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E2D46000
|
trusted library allocation
|
page read and write
|
||
1B0E2AA5000
|
trusted library allocation
|
page read and write
|
||
1B0DA9C2000
|
trusted library allocation
|
page read and write
|
||
1B0E18CF000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
C9BD9FF000
|
stack
|
page read and write
|
||
1B0E53CF000
|
trusted library allocation
|
page read and write
|
||
1B0D6448000
|
trusted library allocation
|
page read and write
|
||
1B0E2D60000
|
trusted library allocation
|
page read and write
|
||
1B0E1A91000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D01CD000
|
heap
|
page read and write
|
||
1B0E19EB000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E19D1000
|
trusted library allocation
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1FF82312000
|
trusted library allocation
|
page read and write
|
||
1B0E2D66000
|
trusted library allocation
|
page read and write
|
||
1B0DCBB1000
|
trusted library allocation
|
page read and write
|
||
1B0E3A07000
|
trusted library allocation
|
page read and write
|
||
1B0D8F78000
|
trusted library allocation
|
page read and write
|
||
1B0DB8F8000
|
trusted library allocation
|
page read and write
|
||
1B0D8F24000
|
trusted library allocation
|
page read and write
|
||
1B0E2C3B000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0E14BE000
|
trusted library allocation
|
page read and write
|
||
1B0DC77D000
|
trusted library allocation
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
1B0D88DC000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA65E000
|
trusted library allocation
|
page read and write
|
||
1B0E19BD000
|
trusted library allocation
|
page read and write
|
||
1B0E2D31000
|
trusted library allocation
|
page read and write
|
||
1B0D904B000
|
trusted library allocation
|
page read and write
|
||
1B0DA167000
|
trusted library allocation
|
page read and write
|
||
1B0E5815000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E18EA000
|
trusted library allocation
|
page read and write
|
||
1B0DA624000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1B0E2BB3000
|
trusted library allocation
|
page read and write
|
||
1B0E6093000
|
trusted library allocation
|
page read and write
|
||
1B0E4B00000
|
trusted library allocation
|
page read and write
|
||
1B0E3B06000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
26489921000
|
trusted library allocation
|
page execute read
|
||
1B0DABF3000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0DCB90000
|
trusted library allocation
|
page read and write
|
||
1B0E1140000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E4F9B000
|
trusted library allocation
|
page read and write
|
||
1B0DAB72000
|
trusted library allocation
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0D937D000
|
trusted library allocation
|
page read and write
|
||
1B0DADBA000
|
trusted library allocation
|
page read and write
|
||
1B0D9196000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0D908D000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
1B0E1297000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D8F18000
|
trusted library allocation
|
page read and write
|
||
1B0E48ED000
|
trusted library allocation
|
page read and write
|
||
1B0E52E9000
|
trusted library allocation
|
page read and write
|
||
1B0DAB9B000
|
trusted library allocation
|
page read and write
|
||
1B0E5521000
|
trusted library allocation
|
page read and write
|
||
35B1000
|
heap
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0E48AB000
|
trusted library allocation
|
page read and write
|
||
1B0DB8E1000
|
trusted library allocation
|
page read and write
|
||
1B0D6309000
|
trusted library allocation
|
page read and write
|
||
24587300000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
1B0E54EC000
|
trusted library allocation
|
page read and write
|
||
1B0E1697000
|
trusted library allocation
|
page read and write
|
||
1B0E1972000
|
trusted library allocation
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
1B0E16EF000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E14F3000
|
trusted library allocation
|
page read and write
|
||
1B0DA984000
|
trusted library allocation
|
page read and write
|
||
1B0E2AFB000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DAD94000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01D3000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
1B0E19ED000
|
trusted library allocation
|
page read and write
|
||
1B0DAB69000
|
trusted library allocation
|
page read and write
|
||
1B0E3A6D000
|
trusted library allocation
|
page read and write
|
||
1B0DAA42000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D64BE000
|
trusted library allocation
|
page read and write
|
||
1B0E18FA000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0E13EA000
|
trusted library allocation
|
page read and write
|
||
1B0DCBAB000
|
trusted library allocation
|
page read and write
|
||
1B0D01E6000
|
heap
|
page read and write
|
||
1B0DABFE000
|
trusted library allocation
|
page read and write
|
||
1B0E48BF000
|
trusted library allocation
|
page read and write
|
||
1B0DB87A000
|
trusted library allocation
|
page read and write
|
||
1B0E154F000
|
trusted library allocation
|
page read and write
|
||
1B0E53B0000
|
trusted library allocation
|
page read and write
|
||
1B0DC6D5000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0DB862000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0D01A1000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0DA2B7000
|
trusted library allocation
|
page read and write
|
||
1B0E53A4000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0DB6C4000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F3000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
B61000
|
unkown
|
page execute read
|
||
1FF82F00000
|
heap
|
page read and write
|
||
1B0DA671000
|
trusted library allocation
|
page read and write
|
||
26AC92C4000
|
heap
|
page read and write
|
||
1B0DA161000
|
trusted library allocation
|
page read and write
|
||
1B0DCBA9000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D64C7000
|
trusted library allocation
|
page read and write
|
||
1B0E2AF2000
|
trusted library allocation
|
page read and write
|
||
1B0D985B000
|
trusted library allocation
|
page read and write
|
||
1B0E16EC000
|
trusted library allocation
|
page read and write
|
||
1B0DB9DC000
|
trusted library allocation
|
page read and write
|
||
28D902D0000
|
heap
|
page read and write
|
||
1B0D52BF000
|
trusted library allocation
|
page read and write
|
||
1B0DB8E7000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DB37B000
|
trusted library allocation
|
page read and write
|
||
1FF821AF000
|
unclassified section
|
page read and write
|
||
1B0DC6D1000
|
trusted library allocation
|
page read and write
|
||
1B0DA225000
|
trusted library allocation
|
page read and write
|
||
1B0DCBF2000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D93EF000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0DA1D5000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0E52B8000
|
trusted library allocation
|
page read and write
|
||
1B0E18FA000
|
trusted library allocation
|
page read and write
|
||
1B0DADCD000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0E6067000
|
trusted library allocation
|
page read and write
|
||
8923C7E000
|
stack
|
page read and write
|
||
1B0DA676000
|
trusted library allocation
|
page read and write
|
||
1FF82000000
|
unclassified section
|
page readonly
|
||
E29000
|
heap
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0DC54B000
|
trusted library allocation
|
page read and write
|
||
C34000
|
unkown
|
page readonly
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
1B0E1839000
|
trusted library allocation
|
page read and write
|
||
1B0D01E7000
|
heap
|
page read and write
|
||
1FF8302A000
|
heap
|
page read and write
|
||
1B0E1689000
|
trusted library allocation
|
page read and write
|
||
1B0E5438000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1B0D64A5000
|
trusted library allocation
|
page read and write
|
||
1B0E3A05000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
26AC910F000
|
trusted library allocation
|
page read and write
|
||
1B0D0193000
|
heap
|
page read and write
|
||
1B0DB8B6000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E1A6C000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0E3735000
|
trusted library allocation
|
page read and write
|
||
1B0E53C5000
|
trusted library allocation
|
page read and write
|
||
1B0E12FE000
|
trusted library allocation
|
page read and write
|
||
1B0E19BD000
|
trusted library allocation
|
page read and write
|
||
1B0E5277000
|
trusted library allocation
|
page read and write
|
||
1FF823C7000
|
trusted library allocation
|
page read and write
|
||
1B0E552B000
|
trusted library allocation
|
page read and write
|
||
F4A4BD8000
|
stack
|
page read and write
|
||
1B0E1809000
|
trusted library allocation
|
page read and write
|
||
1B0DA2D3000
|
trusted library allocation
|
page read and write
|
||
1B0E11BB000
|
trusted library allocation
|
page read and write
|
||
1B0E1972000
|
trusted library allocation
|
page read and write
|
||
9C215FE000
|
unkown
|
page readonly
|
||
1B0E14B7000
|
trusted library allocation
|
page read and write
|
||
1B0E10FE000
|
trusted library allocation
|
page read and write
|
||
1B0DA110000
|
trusted library allocation
|
page read and write
|
||
1B0DA931000
|
trusted library allocation
|
page read and write
|
||
9C1E33B000
|
stack
|
page read and write
|
||
1B0D0179000
|
heap
|
page read and write
|
||
1B0E16DA000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E53DE000
|
trusted library allocation
|
page read and write
|
||
1B0D0179000
|
heap
|
page read and write
|
||
1B0E18FD000
|
trusted library allocation
|
page read and write
|
||
1B0D0199000
|
heap
|
page read and write
|
||
1B0E11A9000
|
trusted library allocation
|
page read and write
|
||
1B0DA282000
|
trusted library allocation
|
page read and write
|
||
1B0D019B000
|
heap
|
page read and write
|
||
1B0DAD43000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
1B0E54A1000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0DC6D5000
|
trusted library allocation
|
page read and write
|
||
1B0E52B8000
|
trusted library allocation
|
page read and write
|
||
1B0D01A1000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01A2000
|
heap
|
page read and write
|
||
1B0DC558000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F3000
|
trusted library allocation
|
page read and write
|
||
1B0E51FE000
|
trusted library allocation
|
page read and write
|
||
F4A64FE000
|
stack
|
page read and write
|
||
1B0DB6CB000
|
trusted library allocation
|
page read and write
|
||
1B0E195B000
|
trusted library allocation
|
page read and write
|
||
1B0DAACC000
|
trusted library allocation
|
page read and write
|
||
1B0D6382000
|
trusted library allocation
|
page read and write
|
||
1B0E2D41000
|
trusted library allocation
|
page read and write
|
||
1B0E16EF000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E561F000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D4BEF000
|
trusted library allocation
|
page read and write
|
||
1B0D01E0000
|
heap
|
page read and write
|
||
1B0DA2CB000
|
trusted library allocation
|
page read and write
|
||
1B0DAD0B000
|
trusted library allocation
|
page read and write
|
||
1B0DAB91000
|
trusted library allocation
|
page read and write
|
||
1B0E19F5000
|
trusted library allocation
|
page read and write
|
||
1B0DAB91000
|
trusted library allocation
|
page read and write
|
||
1B0E57E1000
|
heap
|
page read and write
|
||
1B0D017B000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DA2CE000
|
trusted library allocation
|
page read and write
|
||
28D902DF000
|
heap
|
page read and write
|
||
1B0DCBAF000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DAAC1000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E5388000
|
trusted library allocation
|
page read and write
|
||
1FF82F64000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
1B0D8FCA000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E154A000
|
trusted library allocation
|
page read and write
|
||
1B0D018D000
|
heap
|
page read and write
|
||
1B0DC7FD000
|
trusted library allocation
|
page read and write
|
||
1B0E57E1000
|
heap
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
1B0E52D7000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0DC8D5000
|
trusted library allocation
|
page read and write
|
||
1FF82F5C000
|
heap
|
page read and write
|
||
1B0D63E5000
|
trusted library allocation
|
page read and write
|
||
1B0DB882000
|
trusted library allocation
|
page read and write
|
||
1FF81FBA000
|
remote allocation
|
page execute read
|
||
DE8000
|
heap
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0D01EF000
|
heap
|
page read and write
|
||
1B0DB55B000
|
trusted library allocation
|
page read and write
|
||
1B0E13A9000
|
trusted library allocation
|
page read and write
|
||
1B0D88F2000
|
trusted library allocation
|
page read and write
|
||
1B0DC5D4000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0E2AA5000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E11F2000
|
trusted library allocation
|
page read and write
|
||
1B0D8BD0000
|
heap
|
page read and write
|
||
1B0DB890000
|
trusted library allocation
|
page read and write
|
||
1B0D0179000
|
heap
|
page read and write
|
||
892547E000
|
unkown
|
page readonly
|
||
1B0DADA8000
|
trusted library allocation
|
page read and write
|
||
1B0E10D4000
|
trusted library allocation
|
page read and write
|
||
237F760F000
|
unclassified section
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
1B0E18D4000
|
trusted library allocation
|
page read and write
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
1B0DA9FD000
|
trusted library allocation
|
page read and write
|
||
1FF82020000
|
heap
|
page read and write
|
||
1B0E1449000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E53B5000
|
trusted library allocation
|
page read and write
|
||
1B0E1A75000
|
trusted library allocation
|
page read and write
|
||
237F7513000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B9000
|
trusted library allocation
|
page read and write
|
||
1B0D98D8000
|
trusted library allocation
|
page read and write
|
||
1B0DACE4000
|
trusted library allocation
|
page read and write
|
||
1B0DC7BC000
|
trusted library allocation
|
page read and write
|
||
1B0E18C0000
|
trusted library allocation
|
page read and write
|
||
1B0D91FC000
|
trusted library allocation
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
1B0DA9F9000
|
trusted library allocation
|
page read and write
|
||
1B0DCBA7000
|
trusted library allocation
|
page read and write
|
||
1B0E11E2000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E108E000
|
trusted library allocation
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
1B0E37EF000
|
trusted library allocation
|
page read and write
|
||
1B0E19F5000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0DC7E4000
|
trusted library allocation
|
page read and write
|
||
1B0E2DE9000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E4F9D000
|
trusted library allocation
|
page read and write
|
||
1B0DACB5000
|
trusted library allocation
|
page read and write
|
||
1B0DAD63000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E53C9000
|
trusted library allocation
|
page read and write
|
||
1B0E5899000
|
heap
|
page read and write
|
||
1B0DC6E7000
|
trusted library allocation
|
page read and write
|
||
1B0E18E6000
|
trusted library allocation
|
page read and write
|
||
1B0DCE6D000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0DAB91000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D52AC000
|
trusted library allocation
|
page read and write
|
||
1B0DA2C5000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0D935A000
|
trusted library allocation
|
page read and write
|
||
1B0D021F000
|
heap
|
page read and write
|
||
1B0D8F9A000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01D9000
|
heap
|
page read and write
|
||
1B0DA2D9000
|
trusted library allocation
|
page read and write
|
||
1B0E16DF000
|
trusted library allocation
|
page read and write
|
||
1B0E19D6000
|
trusted library allocation
|
page read and write
|
||
1B0E1835000
|
trusted library allocation
|
page read and write
|
||
1B0DB9C3000
|
trusted library allocation
|
page read and write
|
||
1B0E48F8000
|
trusted library allocation
|
page read and write
|
||
1B0E2CD7000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1FF82110000
|
heap
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0DCBFA000
|
trusted library allocation
|
page read and write
|
||
1B0DA2E9000
|
trusted library allocation
|
page read and write
|
||
1FF8243A000
|
unkown
|
page execute read
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0E182C000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E18DD000
|
trusted library allocation
|
page read and write
|
||
1B0DA9A3000
|
trusted library allocation
|
page read and write
|
||
1B0DB8A5000
|
trusted library allocation
|
page read and write
|
||
1B0D0191000
|
heap
|
page read and write
|
||
1B0DB6EC000
|
trusted library allocation
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
1B0DC5D4000
|
trusted library allocation
|
page read and write
|
||
1B0E145F000
|
trusted library allocation
|
page read and write
|
||
1B0D5300000
|
trusted library allocation
|
page read and write
|
||
1B0E1A45000
|
trusted library allocation
|
page read and write
|
||
1B0DCBA7000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0E52B3000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1FF82F60000
|
heap
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0E14CA000
|
trusted library allocation
|
page read and write
|
||
1B0DA9ED000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D61F9000
|
trusted library allocation
|
page read and write
|
||
1FF82FE8000
|
heap
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0E2BCF000
|
trusted library allocation
|
page read and write
|
||
1B0E135E000
|
trusted library allocation
|
page read and write
|
||
1B0DAB35000
|
trusted library allocation
|
page read and write
|
||
24587130000
|
heap
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0DADC3000
|
trusted library allocation
|
page read and write
|
||
1B0E2DEB000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DB4CA000
|
trusted library allocation
|
page read and write
|
||
26AC8D70000
|
heap
|
page read and write
|
||
1B0E4870000
|
trusted library allocation
|
page read and write
|
||
1B0DA98F000
|
trusted library allocation
|
page read and write
|
||
1B0D01D7000
|
heap
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0E2AF4000
|
trusted library allocation
|
page read and write
|
||
1B0D01DB000
|
heap
|
page read and write
|
||
1B0E4FA1000
|
trusted library allocation
|
page read and write
|
||
1FF83067000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
245871D2000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E48ED000
|
trusted library allocation
|
page read and write
|
||
1FF8236F000
|
trusted library allocation
|
page read and write
|
||
1B0D01E7000
|
heap
|
page read and write
|
||
1B0DADB1000
|
trusted library allocation
|
page read and write
|
||
1B0D01EC000
|
heap
|
page read and write
|
||
1B0E3743000
|
trusted library allocation
|
page read and write
|
||
1B0D91A8000
|
trusted library allocation
|
page read and write
|
||
1B0DCBAF000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E48B9000
|
trusted library allocation
|
page read and write
|
||
237F7654000
|
heap
|
page read and write
|
||
1B0E18CF000
|
trusted library allocation
|
page read and write
|
||
1B0E1814000
|
trusted library allocation
|
page read and write
|
||
1B0E10DF000
|
trusted library allocation
|
page read and write
|
||
1B0E180E000
|
trusted library allocation
|
page read and write
|
||
1B0D017B000
|
heap
|
page read and write
|
||
1B0E5526000
|
trusted library allocation
|
page read and write
|
||
237F7190000
|
unclassified section
|
page readonly
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D91D8000
|
trusted library allocation
|
page read and write
|
||
1B0DAAE7000
|
trusted library allocation
|
page read and write
|
||
9C1FDFE000
|
stack
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
237F73D0000
|
heap
|
page read and write
|
||
1B0DC6D5000
|
trusted library allocation
|
page read and write
|
||
1B0DC8D1000
|
trusted library allocation
|
page read and write
|
||
1B0DC6E7000
|
trusted library allocation
|
page read and write
|
||
1B0DC764000
|
trusted library allocation
|
page read and write
|
||
1B0E2A98000
|
trusted library allocation
|
page read and write
|
||
1FF82FE1000
|
heap
|
page read and write
|
||
1B0E15CA000
|
trusted library allocation
|
page read and write
|
||
1B0DAB8A000
|
trusted library allocation
|
page read and write
|
||
1B0DC7B2000
|
trusted library allocation
|
page read and write
|
||
1B0E51B0000
|
trusted library allocation
|
page read and write
|
||
1B0D022F000
|
heap
|
page read and write
|
||
1B0E4FD4000
|
trusted library allocation
|
page read and write
|
||
1B0DAB6F000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D64BC000
|
trusted library allocation
|
page read and write
|
||
1B0D99D5000
|
trusted library allocation
|
page read and write
|
||
24588EC0000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E1A84000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DA2BE000
|
trusted library allocation
|
page read and write
|
||
26AC92D0000
|
heap
|
page read and write
|
||
1B0D4BCD000
|
trusted library allocation
|
page read and write
|
||
1B0DA2E9000
|
trusted library allocation
|
page read and write
|
||
1B0DAB5B000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E1676000
|
trusted library allocation
|
page read and write
|
||
1B0E1476000
|
trusted library allocation
|
page read and write
|
||
1B0E197E000
|
trusted library allocation
|
page read and write
|
||
1B0E112E000
|
trusted library allocation
|
page read and write
|
||
1B0D9D23000
|
trusted library allocation
|
page read and write
|
||
1B0E5215000
|
trusted library allocation
|
page read and write
|
||
1B0E1539000
|
trusted library allocation
|
page read and write
|
||
1B0DCB09000
|
trusted library allocation
|
page read and write
|
||
1B0E11A6000
|
trusted library allocation
|
page read and write
|
||
26AC8E23000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DA2E9000
|
trusted library allocation
|
page read and write
|
||
1B0D01ED000
|
heap
|
page read and write
|
||
1B0DCE2F000
|
trusted library allocation
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
1B0E52DF000
|
trusted library allocation
|
page read and write
|
||
1B0E1A52000
|
trusted library allocation
|
page read and write
|
||
1B0DA671000
|
trusted library allocation
|
page read and write
|
||
1B0D9175000
|
trusted library allocation
|
page read and write
|
||
1B0DCE9E000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D52C7000
|
trusted library allocation
|
page read and write
|
||
1B0DADC3000
|
trusted library allocation
|
page read and write
|
||
1B0E5386000
|
trusted library allocation
|
page read and write
|
||
1B0DC6C9000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DA288000
|
trusted library allocation
|
page read and write
|
||
1B0DB886000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01E7000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
1B0D99E7000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0DC66E000
|
trusted library allocation
|
page read and write
|
||
1B0DA3FC000
|
trusted library allocation
|
page read and write
|
||
1B0DAD92000
|
trusted library allocation
|
page read and write
|
||
237F7610000
|
heap
|
page read and write
|
||
1B0DA6A8000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E2CC5000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0DA935000
|
trusted library allocation
|
page read and write
|
||
1B0E114C000
|
trusted library allocation
|
page read and write
|
||
1B0E1A3F000
|
trusted library allocation
|
page read and write
|
||
1B0E1A3F000
|
trusted library allocation
|
page read and write
|
||
1B0D9179000
|
trusted library allocation
|
page read and write
|
||
1B0D9DFC000
|
trusted library allocation
|
page read and write
|
||
1B0DA9E1000
|
trusted library allocation
|
page read and write
|
||
1B0DCB63000
|
trusted library allocation
|
page read and write
|
||
1B0E1238000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0E128F000
|
trusted library allocation
|
page read and write
|
||
1B0E11AE000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0D0179000
|
heap
|
page read and write
|
||
1B0E4877000
|
trusted library allocation
|
page read and write
|
||
1B0D8860000
|
trusted library allocation
|
page read and write
|
||
1B0DA6FB000
|
trusted library allocation
|
page read and write
|
||
1B0E4852000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D63C5000
|
trusted library allocation
|
page read and write
|
||
1FF82FEA000
|
heap
|
page read and write
|
||
1B0E3A41000
|
trusted library allocation
|
page read and write
|
||
1B0DAAB1000
|
trusted library allocation
|
page read and write
|
||
237F7530000
|
trusted library allocation
|
page read and write
|
||
1B0E1694000
|
trusted library allocation
|
page read and write
|
||
1B0DB8A5000
|
trusted library allocation
|
page read and write
|
||
1B0E2BC7000
|
trusted library allocation
|
page read and write
|
||
1B0DC7DC000
|
trusted library allocation
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0DAA9B000
|
trusted library allocation
|
page read and write
|
||
1B0E53CC000
|
trusted library allocation
|
page read and write
|
||
1B0D9373000
|
trusted library allocation
|
page read and write
|
||
1FF8303B000
|
heap
|
page read and write
|
||
1B0E5492000
|
trusted library allocation
|
page read and write
|
||
1B0E1691000
|
trusted library allocation
|
page read and write
|
||
1B0DA3AE000
|
trusted library allocation
|
page read and write
|
||
1B0D8F9A000
|
trusted library allocation
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0DADC3000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0E11A4000
|
trusted library allocation
|
page read and write
|
||
26AC8F30000
|
unclassified section
|
page read and write
|
||
1B0DA2EB000
|
trusted library allocation
|
page read and write
|
||
1B0E2D60000
|
trusted library allocation
|
page read and write
|
||
1B0E48BD000
|
trusted library allocation
|
page read and write
|
||
1B0DAAE7000
|
trusted library allocation
|
page read and write
|
||
1B0D0238000
|
heap
|
page read and write
|
||
1FF82F7F000
|
heap
|
page read and write
|
||
1B0E1471000
|
trusted library allocation
|
page read and write
|
||
1B0D91BB000
|
trusted library allocation
|
page read and write
|
||
1B0DADBA000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01E6000
|
heap
|
page read and write
|
||
1B0D613E000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D61F4000
|
trusted library allocation
|
page read and write
|
||
1B0DAD92000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DAB94000
|
trusted library allocation
|
page read and write
|
||
1B0D93EC000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E4FA1000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E1151000
|
trusted library allocation
|
page read and write
|
||
1B0E54E9000
|
trusted library allocation
|
page read and write
|
||
1B0E489B000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E1116000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DA12B000
|
trusted library allocation
|
page read and write
|
||
1B0D9068000
|
trusted library allocation
|
page read and write
|
||
1B0DA231000
|
trusted library allocation
|
page read and write
|
||
1B0DAC93000
|
trusted library allocation
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0DA2B1000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E551B000
|
trusted library allocation
|
page read and write
|
||
1B0E3AC5000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E5380000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E53B7000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0DAB86000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DA22C000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0E5527000
|
trusted library allocation
|
page read and write
|
||
1B0E14BC000
|
trusted library allocation
|
page read and write
|
||
1B0DAB99000
|
trusted library allocation
|
page read and write
|
||
1B0DC660000
|
trusted library allocation
|
page read and write
|
||
1B0DADBB000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E1565000
|
trusted library allocation
|
page read and write
|
||
1B0DA287000
|
trusted library allocation
|
page read and write
|
||
1B0DAA5D000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0DABB9000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
237F71A0000
|
unclassified section
|
page readonly
|
||
1B0DA900000
|
trusted library allocation
|
page read and write
|
||
1B0D017B000
|
heap
|
page read and write
|
||
1B0E51F8000
|
trusted library allocation
|
page read and write
|
||
1B0DAADB000
|
trusted library allocation
|
page read and write
|
||
1B0E18D7000
|
trusted library allocation
|
page read and write
|
||
1B0D8F84000
|
trusted library allocation
|
page read and write
|
||
26AC8EE6000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0DA2C2000
|
trusted library allocation
|
page read and write
|
||
1B0DA972000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DA33E000
|
trusted library allocation
|
page read and write
|
||
1B0D64F6000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0DB446000
|
trusted library allocation
|
page read and write
|
||
1B0E14A0000
|
trusted library allocation
|
page read and write
|
||
1B0D61E3000
|
trusted library allocation
|
page read and write
|
||
1B0E1235000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA2C3000
|
trusted library allocation
|
page read and write
|
||
1B0D9DE3000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0DA633000
|
trusted library allocation
|
page read and write
|
||
1B0DAA7E000
|
trusted library allocation
|
page read and write
|
||
1B0DA142000
|
trusted library allocation
|
page read and write
|
||
245874F5000
|
heap
|
page read and write
|
||
1B0D8F71000
|
trusted library allocation
|
page read and write
|
||
1B0E15A4000
|
trusted library allocation
|
page read and write
|
||
1B0D933D000
|
trusted library allocation
|
page read and write
|
||
1B0E2D33000
|
trusted library allocation
|
page read and write
|
||
1B0E57EB000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D019C000
|
heap
|
page read and write
|
||
1B0E11A6000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DAD63000
|
trusted library allocation
|
page read and write
|
||
1B0E48DB000
|
trusted library allocation
|
page read and write
|
||
F4A7DBE000
|
stack
|
page read and write
|
||
1FF82386000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DC88D000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D0185000
|
heap
|
page read and write
|
||
1B0D9175000
|
trusted library allocation
|
page read and write
|
||
1B0E2C48000
|
trusted library allocation
|
page read and write
|
||
1B0E14FD000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
1B0D52F5000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E2AF6000
|
trusted library allocation
|
page read and write
|
||
1B0D9061000
|
trusted library allocation
|
page read and write
|
||
28D90507000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0DAB71000
|
trusted library allocation
|
page read and write
|
||
1B0D8F7C000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0E2D66000
|
trusted library allocation
|
page read and write
|
||
1B0E2DED000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E121C000
|
trusted library allocation
|
page read and write
|
||
1B0E2D41000
|
trusted library allocation
|
page read and write
|
||
1B0DABA6000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0D0191000
|
heap
|
page read and write
|
||
1B0DA2E7000
|
trusted library allocation
|
page read and write
|
||
28D9050A000
|
trusted library allocation
|
page read and write
|
||
1B0E11F7000
|
trusted library allocation
|
page read and write
|
||
1B0DB3A8000
|
trusted library allocation
|
page read and write
|
||
1B0E3A4D000
|
trusted library allocation
|
page read and write
|
||
1B0DA645000
|
trusted library allocation
|
page read and write
|
||
1B0E18F5000
|
trusted library allocation
|
page read and write
|
||
1B0DB3E1000
|
trusted library allocation
|
page read and write
|
||
1B0DA9D2000
|
trusted library allocation
|
page read and write
|
||
1B0E15FC000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
24587500000
|
trusted library allocation
|
page read and write
|
||
1B0D9158000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DC7CC000
|
trusted library allocation
|
page read and write
|
||
1B0E12E5000
|
trusted library allocation
|
page read and write
|
||
1FF82315000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DA2F3000
|
trusted library allocation
|
page read and write
|
||
1B0D9DBC000
|
trusted library allocation
|
page read and write
|
||
1B0DAD83000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0E545F000
|
trusted library allocation
|
page read and write
|
||
1B0E2BCA000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DCBAB000
|
trusted library allocation
|
page read and write
|
||
1B0DA676000
|
trusted library allocation
|
page read and write
|
||
E77BFFF000
|
stack
|
page read and write
|
||
1B0E14A6000
|
trusted library allocation
|
page read and write
|
||
1B0E16FE000
|
trusted library allocation
|
page read and write
|
||
1B0DC525000
|
trusted library allocation
|
page read and write
|
||
1FF82E1F000
|
trusted library allocation
|
page read and write
|
||
89210FE000
|
unkown
|
page readonly
|
||
1B0DB684000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DADBB000
|
trusted library allocation
|
page read and write
|
||
245871A7000
|
heap
|
page read and write
|
||
1B0D9193000
|
trusted library allocation
|
page read and write
|
||
1B0E5374000
|
trusted library allocation
|
page read and write
|
||
1B0DC5FA000
|
trusted library allocation
|
page read and write
|
||
1B0DAB90000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E18F2000
|
trusted library allocation
|
page read and write
|
||
1B0E2A9D000
|
trusted library allocation
|
page read and write
|
||
1B0DB5C8000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0E2AFB000
|
trusted library allocation
|
page read and write
|
||
1B0D913D000
|
trusted library allocation
|
page read and write
|
||
1B0E19D6000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E52AA000
|
trusted library allocation
|
page read and write
|
||
1B0DAD8C000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
C34000
|
unkown
|
page readonly
|
||
1B0DC563000
|
trusted library allocation
|
page read and write
|
||
1FF82FFD000
|
heap
|
page read and write
|
||
1B0D64DC000
|
trusted library allocation
|
page read and write
|
||
C22000
|
unkown
|
page readonly
|
||
1B0DB654000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0DB8BE000
|
trusted library allocation
|
page read and write
|
||
1B0DC8E5000
|
trusted library allocation
|
page read and write
|
||
1B0DAB90000
|
trusted library allocation
|
page read and write
|
||
1B0DABDE000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D01B2000
|
heap
|
page read and write
|
||
1B0DAA74000
|
trusted library allocation
|
page read and write
|
||
1B0DAADD000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0E53C1000
|
trusted library allocation
|
page read and write
|
||
1B0DA1C1000
|
trusted library allocation
|
page read and write
|
||
1B0D88E5000
|
trusted library allocation
|
page read and write
|
||
1B0E1A61000
|
trusted library allocation
|
page read and write
|
||
1B0D9376000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0DA641000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0E4FA5000
|
trusted library allocation
|
page read and write
|
||
1B0DCBF2000
|
trusted library allocation
|
page read and write
|
||
1B0E5388000
|
trusted library allocation
|
page read and write
|
||
1B0D0191000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E5542000
|
trusted library allocation
|
page read and write
|
||
1B0E19DB000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D9DD6000
|
trusted library allocation
|
page read and write
|
||
1B0D8905000
|
trusted library allocation
|
page read and write
|
||
1B0DAB91000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E54CD000
|
trusted library allocation
|
page read and write
|
||
1B0DA2AE000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DCE84000
|
trusted library allocation
|
page read and write
|
||
1B0E18C0000
|
trusted library allocation
|
page read and write
|
||
1B0D5226000
|
trusted library allocation
|
page read and write
|
||
1B0D9055000
|
trusted library allocation
|
page read and write
|
||
1B0DC5A9000
|
trusted library allocation
|
page read and write
|
||
1B0E3987000
|
trusted library allocation
|
page read and write
|
||
1B0E1438000
|
trusted library allocation
|
page read and write
|
||
1B0D018C000
|
heap
|
page read and write
|
||
1B0DA3E1000
|
trusted library allocation
|
page read and write
|
||
1B0DB8CC000
|
trusted library allocation
|
page read and write
|
||
1FF82FFD000
|
heap
|
page read and write
|
||
1B0E2D33000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DB85D000
|
trusted library allocation
|
page read and write
|
||
1B0D9352000
|
trusted library allocation
|
page read and write
|
||
1B0E48C1000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0DBAA3000
|
trusted library allocation
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0D01E6000
|
heap
|
page read and write
|
||
1B0D01D3000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E195B000
|
trusted library allocation
|
page read and write
|
||
26AC8ECB000
|
trusted library allocation
|
page read and write
|
||
1B0E2D4B000
|
trusted library allocation
|
page read and write
|
||
1B0E14D1000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E51EF000
|
trusted library allocation
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
1B0DAB86000
|
trusted library allocation
|
page read and write
|
||
1B0DA6FB000
|
trusted library allocation
|
page read and write
|
||
1B0D01E4000
|
heap
|
page read and write
|
||
F4A657E000
|
stack
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0DCF93000
|
trusted library allocation
|
page read and write
|
||
1B0E524E000
|
trusted library allocation
|
page read and write
|
||
1B0D63A1000
|
trusted library allocation
|
page read and write
|
||
1B0D01A8000
|
heap
|
page read and write
|
||
1B0E53BC000
|
trusted library allocation
|
page read and write
|
||
1B0E12CD000
|
trusted library allocation
|
page read and write
|
||
1B0E54B0000
|
trusted library allocation
|
page read and write
|
||
1B0DCBA9000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E19D3000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
237F7569000
|
trusted library allocation
|
page read and write
|
||
1B0E53D3000
|
trusted library allocation
|
page read and write
|
||
F4A85BE000
|
unkown
|
page readonly
|
||
1B0E2CFE000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E3AA3000
|
trusted library allocation
|
page read and write
|
||
1B0DABCE000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E12E5000
|
trusted library allocation
|
page read and write
|
||
1B0E12F6000
|
trusted library allocation
|
page read and write
|
||
1B0D901F000
|
trusted library allocation
|
page read and write
|
||
1B0DA927000
|
trusted library allocation
|
page read and write
|
||
1B0E5327000
|
trusted library allocation
|
page read and write
|
||
1B0E48FC000
|
trusted library allocation
|
page read and write
|
||
1B0D64F6000
|
trusted library allocation
|
page read and write
|
||
1B0E60AC000
|
trusted library allocation
|
page read and write
|
||
1B0DC744000
|
trusted library allocation
|
page read and write
|
||
1B0D99BA000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E51DD000
|
trusted library allocation
|
page read and write
|
||
1B0E159C000
|
trusted library allocation
|
page read and write
|
||
1B0E54CD000
|
trusted library allocation
|
page read and write
|
||
1B0E3AE4000
|
trusted library allocation
|
page read and write
|
||
1B0E529E000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D8F15000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0DADBA000
|
trusted library allocation
|
page read and write
|
||
1B0D88BF000
|
trusted library allocation
|
page read and write
|
||
1B0E4855000
|
trusted library allocation
|
page read and write
|
||
26AC8F20000
|
heap
|
page readonly
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
9C226BE000
|
unkown
|
page readonly
|
||
26AC8F32000
|
unclassified section
|
page read and write
|
||
1B0E52C2000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
237F755F000
|
trusted library allocation
|
page read and write
|
||
237F7582000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D0238000
|
heap
|
page read and write
|
||
1B0DAB4B000
|
trusted library allocation
|
page read and write
|
||
1B0E52C7000
|
trusted library allocation
|
page read and write
|
||
1B0DACA3000
|
trusted library allocation
|
page read and write
|
||
1B0D61FB000
|
trusted library allocation
|
page read and write
|
||
1B0D61A4000
|
trusted library allocation
|
page read and write
|
||
F4A75BE000
|
unkown
|
page readonly
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
1B0D01B2000
|
heap
|
page read and write
|
||
1B0E10CE000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E10D8000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0DB4E4000
|
trusted library allocation
|
page read and write
|
||
1B0DC7E6000
|
trusted library allocation
|
page read and write
|
||
1B0E54DF000
|
trusted library allocation
|
page read and write
|
||
1B0E48BD000
|
trusted library allocation
|
page read and write
|
||
1B0DA980000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E2CBB000
|
trusted library allocation
|
page read and write
|
||
1B0D8F6D000
|
trusted library allocation
|
page read and write
|
||
1B0E2A8B000
|
trusted library allocation
|
page read and write
|
||
1B0E2A8E000
|
trusted library allocation
|
page read and write
|
||
1B0DAB90000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0E1A6C000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
B61000
|
unkown
|
page execute read
|
||
1B0E53E4000
|
trusted library allocation
|
page read and write
|
||
1B0D01DD000
|
heap
|
page read and write
|
||
1B0DAB5D000
|
trusted library allocation
|
page read and write
|
||
1B0DB9DE000
|
trusted library allocation
|
page read and write
|
||
245871B1000
|
heap
|
page read and write
|
||
1B0E52E9000
|
trusted library allocation
|
page read and write
|
||
1B0E543E000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA2A8000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0DA6F3000
|
trusted library allocation
|
page read and write
|
||
1B0DA1BC000
|
trusted library allocation
|
page read and write
|
||
26AC9000000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0E2BA9000
|
trusted library allocation
|
page read and write
|
||
1B0DCB63000
|
trusted library allocation
|
page read and write
|
||
1B0DB422000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0E49A8000
|
trusted library allocation
|
page read and write
|
||
1B0E52D9000
|
trusted library allocation
|
page read and write
|
||
1B0D018D000
|
heap
|
page read and write
|
||
1B0D8F71000
|
trusted library allocation
|
page read and write
|
||
1B0E15EE000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F0000
|
trusted library allocation
|
page read and write
|
||
1B0D52C7000
|
trusted library allocation
|
page read and write
|
||
1B0D017D000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E1535000
|
trusted library allocation
|
page read and write
|
||
1B0D9DFE000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D8F54000
|
trusted library allocation
|
page read and write
|
||
1B0D0162000
|
heap
|
page read and write
|
||
1B0E16B3000
|
trusted library allocation
|
page read and write
|
||
1B0D9147000
|
trusted library allocation
|
page read and write
|
||
1B0E1151000
|
trusted library allocation
|
page read and write
|
||
1B0DA667000
|
trusted library allocation
|
page read and write
|
||
1B0E2BB6000
|
trusted library allocation
|
page read and write
|
||
1B0DB864000
|
trusted library allocation
|
page read and write
|
||
1B0D99C9000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E11D2000
|
trusted library allocation
|
page read and write
|
||
1B0D91D5000
|
trusted library allocation
|
page read and write
|
||
1B0E54A1000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0DCBE8000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D0166000
|
heap
|
page read and write
|
||
1B0D4B98000
|
trusted library allocation
|
page read and write
|
||
1FF82F69000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0DAD63000
|
trusted library allocation
|
page read and write
|
||
1B0E1363000
|
trusted library allocation
|
page read and write
|
||
1B0D938D000
|
trusted library allocation
|
page read and write
|
||
1B0E2D46000
|
trusted library allocation
|
page read and write
|
||
1B0DA6E5000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
237F7260000
|
heap
|
page read and write
|
||
1B0DA6B9000
|
trusted library allocation
|
page read and write
|
||
1B0D63C2000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
26AC8E67000
|
trusted library allocation
|
page read and write
|
||
1B0E2DC1000
|
trusted library allocation
|
page read and write
|
||
1B0E58C1000
|
heap
|
page read and write
|
||
1B0D61CE000
|
trusted library allocation
|
page read and write
|
||
1B0E19F5000
|
trusted library allocation
|
page read and write
|
||
26AC8E7B000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D017C000
|
heap
|
page read and write
|
||
1FF828C3000
|
unkown
|
page execute read
|
||
1B0DA2B9000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0DA244000
|
trusted library allocation
|
page read and write
|
||
1B0DA1B8000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DB8A5000
|
trusted library allocation
|
page read and write
|
||
1FF82300000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
1B0E48B9000
|
trusted library allocation
|
page read and write
|
||
1B0DAAB7000
|
trusted library allocation
|
page read and write
|
||
1B0E18DD000
|
trusted library allocation
|
page read and write
|
||
1B0D01EB000
|
heap
|
page read and write
|
||
1B0DC7C6000
|
trusted library allocation
|
page read and write
|
||
26AC8C80000
|
heap
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0E1165000
|
trusted library allocation
|
page read and write
|
||
1B0E48F8000
|
trusted library allocation
|
page read and write
|
||
1B0E4867000
|
trusted library allocation
|
page read and write
|
||
1B0E1959000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D5123000
|
trusted library allocation
|
page read and write
|
||
1B0D01D9000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E4F99000
|
trusted library allocation
|
page read and write
|
||
1B0DAB6A000
|
trusted library allocation
|
page read and write
|
||
1B0D01EB000
|
heap
|
page read and write
|
||
1B0DA244000
|
trusted library allocation
|
page read and write
|
||
1FF823C3000
|
trusted library allocation
|
page read and write
|
||
1B0E52A9000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E19E6000
|
trusted library allocation
|
page read and write
|
||
1B0E53CC000
|
trusted library allocation
|
page read and write
|
||
1B0DB3D6000
|
trusted library allocation
|
page read and write
|
||
237F7390000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
28D90400000
|
trusted library allocation
|
page read and write
|
||
1B0DADCD000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0DA6B9000
|
trusted library allocation
|
page read and write
|
||
1B0E1694000
|
trusted library allocation
|
page read and write
|
||
1B0DADA8000
|
trusted library allocation
|
page read and write
|
||
1B0D938D000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DC63F000
|
trusted library allocation
|
page read and write
|
||
1B0DA2BE000
|
trusted library allocation
|
page read and write
|
||
1B0DB8BE000
|
trusted library allocation
|
page read and write
|
||
1B0DA1BC000
|
trusted library allocation
|
page read and write
|
||
1B0DA2D9000
|
trusted library allocation
|
page read and write
|
||
1B0D8BB8000
|
heap
|
page read and write
|
||
1B0E487A000
|
trusted library allocation
|
page read and write
|
||
1B0D9045000
|
trusted library allocation
|
page read and write
|
||
1B0DAB9B000
|
trusted library allocation
|
page read and write
|
||
1B0D6141000
|
trusted library allocation
|
page read and write
|
||
1B0D8F8A000
|
trusted library allocation
|
page read and write
|
||
1B0E5834000
|
heap
|
page read and write
|
||
1B0D8FB3000
|
trusted library allocation
|
page read and write
|
||
1B0E14F6000
|
trusted library allocation
|
page read and write
|
||
1B0D91CC000
|
trusted library allocation
|
page read and write
|
||
1B0DA9D2000
|
trusted library allocation
|
page read and write
|
||
1B0E53CF000
|
trusted library allocation
|
page read and write
|
||
9C1E3BE000
|
unkown
|
page readonly
|
||
1B0E19DB000
|
trusted library allocation
|
page read and write
|
||
1B0DA2B4000
|
trusted library allocation
|
page read and write
|
||
1B0D99BE000
|
trusted library allocation
|
page read and write
|
||
1B0E19D8000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E165B000
|
trusted library allocation
|
page read and write
|
||
1B0E16DA000
|
trusted library allocation
|
page read and write
|
||
1B0DADA8000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D913B000
|
trusted library allocation
|
page read and write
|
||
1B0DA21A000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E5191000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0DC6EF000
|
trusted library allocation
|
page read and write
|
||
1B0DA1DE000
|
trusted library allocation
|
page read and write
|
||
1B0E48F8000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
1B0DABDE000
|
trusted library allocation
|
page read and write
|
||
1FF82377000
|
trusted library allocation
|
page read and write
|
||
1B0E12F9000
|
trusted library allocation
|
page read and write
|
||
1B0D018E000
|
heap
|
page read and write
|
||
1B0E4FC9000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E115C000
|
trusted library allocation
|
page read and write
|
||
1B0DA2E7000
|
trusted library allocation
|
page read and write
|
||
1B0E5524000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
1B0E57E1000
|
heap
|
page read and write
|
||
1B0D64AA000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D01DF000
|
heap
|
page read and write
|
||
1B0DAB6F000
|
trusted library allocation
|
page read and write
|
||
1B0E147B000
|
trusted library allocation
|
page read and write
|
||
245871A0000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0DA6F0000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DAB99000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0E11A6000
|
trusted library allocation
|
page read and write
|
||
1B0DA2A2000
|
trusted library allocation
|
page read and write
|
||
1B0D8889000
|
trusted library allocation
|
page read and write
|
||
1B0E5529000
|
trusted library allocation
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
1B0E2BA9000
|
trusted library allocation
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0DAD6F000
|
trusted library allocation
|
page read and write
|
||
1B0DC5F8000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0E2BA4000
|
trusted library allocation
|
page read and write
|
||
1B0E2B23000
|
trusted library allocation
|
page read and write
|
||
1B0E10B9000
|
trusted library allocation
|
page read and write
|
||
1B0E5851000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
24588DA0000
|
heap
|
page read and write
|
||
1B0E11F9000
|
trusted library allocation
|
page read and write
|
||
1B0DABFE000
|
trusted library allocation
|
page read and write
|
||
1FF82F8A000
|
heap
|
page read and write
|
||
1B0E10C4000
|
trusted library allocation
|
page read and write
|
||
1B0DA3E9000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E1428000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E18F0000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0DB492000
|
trusted library allocation
|
page read and write
|
||
1B0E19BD000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D5171000
|
trusted library allocation
|
page read and write
|
||
1B0E551D000
|
trusted library allocation
|
page read and write
|
||
1B0D01E3000
|
heap
|
page read and write
|
||
1B0D5217000
|
trusted library allocation
|
page read and write
|
||
1B0DB8D6000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D8FAC000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
1B0E16FD000
|
trusted library allocation
|
page read and write
|
||
1B0DA96A000
|
trusted library allocation
|
page read and write
|
||
1FF83022000
|
heap
|
page read and write
|
||
1B0DABE1000
|
trusted library allocation
|
page read and write
|
||
1B0DA22B000
|
trusted library allocation
|
page read and write
|
||
1B0E18C5000
|
trusted library allocation
|
page read and write
|
||
26AC8E12000
|
trusted library allocation
|
page read and write
|
||
1B0DC533000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DABE6000
|
trusted library allocation
|
page read and write
|
||
1B0DAABB000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B30003F000
|
trusted library allocation
|
page read and write
|
||
1B0D61FB000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DB3C7000
|
trusted library allocation
|
page read and write
|
||
1B0E48E5000
|
trusted library allocation
|
page read and write
|
||
1B0E54A0000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0E1378000
|
trusted library allocation
|
page read and write
|
||
1B0E3B2E000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0D01A1000
|
heap
|
page read and write
|
||
1B0E538B000
|
trusted library allocation
|
page read and write
|
||
1B0D93FE000
|
trusted library allocation
|
page read and write
|
||
1B0DCB63000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DCBB1000
|
trusted library allocation
|
page read and write
|
||
1B0E2CB9000
|
trusted library allocation
|
page read and write
|
||
1B0DA6A8000
|
trusted library allocation
|
page read and write
|
||
1B0DB870000
|
trusted library allocation
|
page read and write
|
||
1B0DA2D9000
|
trusted library allocation
|
page read and write
|
||
1B0E119E000
|
trusted library allocation
|
page read and write
|
||
1B0D637B000
|
trusted library allocation
|
page read and write
|
||
1B0D4BF8000
|
trusted library allocation
|
page read and write
|
||
1B0DC6E7000
|
trusted library allocation
|
page read and write
|
||
1B0E19E6000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B9000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E1839000
|
trusted library allocation
|
page read and write
|
||
1B0DAD53000
|
trusted library allocation
|
page read and write
|
||
1B0DA22C000
|
trusted library allocation
|
page read and write
|
||
1B0D51F6000
|
trusted library allocation
|
page read and write
|
||
1B0D8872000
|
trusted library allocation
|
page read and write
|
||
1B0E51F3000
|
trusted library allocation
|
page read and write
|
||
1B0E10F5000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D512F000
|
trusted library allocation
|
page read and write
|
||
1B0D0165000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
26AC8E5B000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0DA66F000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E2AF2000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
26AC910C000
|
trusted library allocation
|
page read and write
|
||
1B0E2CD7000
|
trusted library allocation
|
page read and write
|
||
1B0DB59D000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1FF82F60000
|
heap
|
page read and write
|
||
1B0DCBE8000
|
trusted library allocation
|
page read and write
|
||
1B0DA643000
|
trusted library allocation
|
page read and write
|
||
1B0E52E9000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1FF82FF1000
|
heap
|
page read and write
|
||
1B0D91FC000
|
trusted library allocation
|
page read and write
|
||
1B0E14A0000
|
trusted library allocation
|
page read and write
|
||
1B0D019F000
|
heap
|
page read and write
|
||
1B0D01AB000
|
heap
|
page read and write
|
||
1B0D018D000
|
heap
|
page read and write
|
||
1B0DA6F5000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DA979000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0DA282000
|
trusted library allocation
|
page read and write
|
||
1B0D88C9000
|
trusted library allocation
|
page read and write
|
||
1B0D0175000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E136A000
|
trusted library allocation
|
page read and write
|
||
1B0D93D5000
|
trusted library allocation
|
page read and write
|
||
1B0D017B000
|
heap
|
page read and write
|
||
1B0D99D1000
|
trusted library allocation
|
page read and write
|
||
26AC8E10000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D51F6000
|
trusted library allocation
|
page read and write
|
||
1B0E51CD000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0DAB4C000
|
trusted library allocation
|
page read and write
|
||
1FF823E9000
|
trusted library allocation
|
page read and write
|
||
1B0DCBAF000
|
trusted library allocation
|
page read and write
|
||
1B0E48C4000
|
trusted library allocation
|
page read and write
|
||
1B0DCBE3000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0E19E1000
|
trusted library allocation
|
page read and write
|
||
1B0D8833000
|
trusted library allocation
|
page read and write
|
||
1B0E11E1000
|
trusted library allocation
|
page read and write
|
||
1B0D93F0000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D0160000
|
heap
|
page read and write
|
||
1B0E19FD000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DB875000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F7000
|
trusted library allocation
|
page read and write
|
||
9C1E2BE000
|
unkown
|
page readonly
|
||
1B0E1939000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DA3CE000
|
trusted library allocation
|
page read and write
|
||
1B0D91FC000
|
trusted library allocation
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
1B0DB9F4000
|
trusted library allocation
|
page read and write
|
||
1B0E1A52000
|
trusted library allocation
|
page read and write
|
||
1B0D9147000
|
trusted library allocation
|
page read and write
|
||
1B0D8F54000
|
trusted library allocation
|
page read and write
|
||
1B0E16DA000
|
trusted library allocation
|
page read and write
|
||
1B0D0184000
|
heap
|
page read and write
|
||
1B0E16DA000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
1B0D63E6000
|
trusted library allocation
|
page read and write
|
||
1B0E5479000
|
trusted library allocation
|
page read and write
|
||
1B0E2A98000
|
trusted library allocation
|
page read and write
|
||
1B0E5386000
|
trusted library allocation
|
page read and write
|
||
1FF82FA1000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0DA6E5000
|
trusted library allocation
|
page read and write
|
||
1B0DA2E7000
|
trusted library allocation
|
page read and write
|
||
1B0D93FB000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E2BA9000
|
trusted library allocation
|
page read and write
|
||
1B0E4FA1000
|
trusted library allocation
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DA660000
|
trusted library allocation
|
page read and write
|
||
1B0E1484000
|
trusted library allocation
|
page read and write
|
||
1B0E5315000
|
trusted library allocation
|
page read and write
|
||
1FF83020000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E48ED000
|
trusted library allocation
|
page read and write
|
||
1FF82FF1000
|
heap
|
page read and write
|
||
26AC8E0D000
|
trusted library allocation
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
1B0E53CB000
|
trusted library allocation
|
page read and write
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
E32000
|
heap
|
page read and write
|
||
1B0DA6F3000
|
trusted library allocation
|
page read and write
|
||
1B0D61F9000
|
trusted library allocation
|
page read and write
|
||
1B0D5266000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0DAD9A000
|
trusted library allocation
|
page read and write
|
||
1B0E2DED000
|
trusted library allocation
|
page read and write
|
||
26AC92E0000
|
heap
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1FF82FFD000
|
heap
|
page read and write
|
||
1B0E2CAC000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
26AC8E2E000
|
trusted library allocation
|
page read and write
|
||
1B0D938D000
|
trusted library allocation
|
page read and write
|
||
1B0E1691000
|
trusted library allocation
|
page read and write
|
||
1B0DADDC000
|
trusted library allocation
|
page read and write
|
||
1B0D01F1000
|
heap
|
page read and write
|
||
1B0D9175000
|
trusted library allocation
|
page read and write
|
||
1B0E37B1000
|
trusted library allocation
|
page read and write
|
||
1B0D019F000
|
heap
|
page read and write
|
||
1B0DCF67000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA1A7000
|
trusted library allocation
|
page read and write
|
||
1B0E51A4000
|
trusted library allocation
|
page read and write
|
||
1B0E11C1000
|
trusted library allocation
|
page read and write
|
||
1FF82454000
|
heap
|
page read and write
|
||
1B0D019F000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0D021F000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
237F7240000
|
heap
|
page read and write
|
||
1B0DA2D9000
|
trusted library allocation
|
page read and write
|
||
1B0DB654000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E1840000
|
trusted library allocation
|
page read and write
|
||
1B0D6356000
|
trusted library allocation
|
page read and write
|
||
1B0D908A000
|
trusted library allocation
|
page read and write
|
||
26AC9104000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D619C000
|
trusted library allocation
|
page read and write
|
||
9C1E338000
|
stack
|
page read and write
|
||
1B0E6050000
|
trusted library allocation
|
page read and write
|
||
1B0DA9F9000
|
trusted library allocation
|
page read and write
|
||
1B0D9189000
|
trusted library allocation
|
page read and write
|
||
1B0D01A6000
|
heap
|
page read and write
|
||
1B0DAB86000
|
trusted library allocation
|
page read and write
|
||
1B0E19EF000
|
trusted library allocation
|
page read and write
|
||
1B0DABC6000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0DC5D2000
|
trusted library allocation
|
page read and write
|
||
1B0D9179000
|
trusted library allocation
|
page read and write
|
||
1B0DA2B7000
|
trusted library allocation
|
page read and write
|
||
1B0D99F2000
|
trusted library allocation
|
page read and write
|
||
1B0DAD93000
|
trusted library allocation
|
page read and write
|
||
1B0DB4F2000
|
trusted library allocation
|
page read and write
|
||
1B0DCBAD000
|
trusted library allocation
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
1B0E13EA000
|
trusted library allocation
|
page read and write
|
||
1B0DB4D6000
|
trusted library allocation
|
page read and write
|
||
1B0DADBD000
|
trusted library allocation
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
1B0D99CE000
|
trusted library allocation
|
page read and write
|
||
1B0E1817000
|
trusted library allocation
|
page read and write
|
||
1B0E1A91000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D0175000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
237F7660000
|
heap
|
page read and write
|
||
1B0E1940000
|
trusted library allocation
|
page read and write
|
||
1B0E1289000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0E11CC000
|
trusted library allocation
|
page read and write
|
||
1B0E1067000
|
trusted library allocation
|
page read and write
|
||
1B0E10E7000
|
trusted library allocation
|
page read and write
|
||
1B0D01E8000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E2CBB000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E53D3000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F0000
|
trusted library allocation
|
page read and write
|
||
1B0D0175000
|
heap
|
page read and write
|
||
1B0DAB81000
|
trusted library allocation
|
page read and write
|
||
1B0D9DE8000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA907000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D0184000
|
heap
|
page read and write
|
||
1B0DAB2C000
|
trusted library allocation
|
page read and write
|
||
1B0DA6A8000
|
trusted library allocation
|
page read and write
|
||
1B0DAB06000
|
trusted library allocation
|
page read and write
|
||
1B0DA91A000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D9179000
|
trusted library allocation
|
page read and write
|
||
1B0E2CFE000
|
trusted library allocation
|
page read and write
|
||
1B0DA305000
|
trusted library allocation
|
page read and write
|
||
1B0DAB91000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E48C7000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
unkown
|
page readonly
|
||
1B0D63E5000
|
trusted library allocation
|
page read and write
|
||
1B0E5521000
|
trusted library allocation
|
page read and write
|
||
1B0E48F5000
|
trusted library allocation
|
page read and write
|
||
237F73D3000
|
heap
|
page read and write
|
||
1B0E6005000
|
trusted library allocation
|
page read and write
|
||
1B0D9DC0000
|
trusted library allocation
|
page read and write
|
||
1B0E529E000
|
trusted library allocation
|
page read and write
|
||
1B0D8F63000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0DAA84000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0D9147000
|
trusted library allocation
|
page read and write
|
||
1B0DA2D9000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E53D3000
|
trusted library allocation
|
page read and write
|
||
1B0DC6EB000
|
trusted library allocation
|
page read and write
|
||
1B0E544B000
|
trusted library allocation
|
page read and write
|
||
1B0DA1DE000
|
trusted library allocation
|
page read and write
|
||
1B0E48BF000
|
trusted library allocation
|
page read and write
|
||
1B0E2BA9000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0E18E6000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
26AC8F50000
|
heap
|
page read and write
|
||
1B0D51FB000
|
trusted library allocation
|
page read and write
|
||
1FF83020000
|
heap
|
page read and write
|
||
1B0E2CD0000
|
trusted library allocation
|
page read and write
|
||
28D902D9000
|
heap
|
page read and write
|
||
1FF8303B000
|
heap
|
page read and write
|
||
1B0D4BA8000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DB591000
|
trusted library allocation
|
page read and write
|
||
1B0E16DF000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D631A000
|
trusted library allocation
|
page read and write
|
||
1B0E1939000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E2CD0000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0E16EC000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E2D3E000
|
trusted library allocation
|
page read and write
|
||
1B0DA6FB000
|
trusted library allocation
|
page read and write
|
||
1B0DC57F000
|
trusted library allocation
|
page read and write
|
||
1B0DABF7000
|
trusted library allocation
|
page read and write
|
||
1B0E19E1000
|
trusted library allocation
|
page read and write
|
||
1FF82361000
|
trusted library allocation
|
page read and write
|
||
1B0E16DF000
|
trusted library allocation
|
page read and write
|
||
1B0E2CBC000
|
trusted library allocation
|
page read and write
|
||
1B0D63C3000
|
trusted library allocation
|
page read and write
|
||
1B0E182C000
|
trusted library allocation
|
page read and write
|
||
1B0DAD5C000
|
trusted library allocation
|
page read and write
|
||
1B0D9877000
|
trusted library allocation
|
page read and write
|
||
1B0E1347000
|
trusted library allocation
|
page read and write
|
||
1B0E159E000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B9000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D9DDD000
|
trusted library allocation
|
page read and write
|
||
1B0E1151000
|
trusted library allocation
|
page read and write
|
||
1B0E15E9000
|
trusted library allocation
|
page read and write
|
||
1B0E48BD000
|
trusted library allocation
|
page read and write
|
||
1B0E2D3E000
|
trusted library allocation
|
page read and write
|
||
1B0E15A0000
|
trusted library allocation
|
page read and write
|
||
1B0DCF37000
|
trusted library allocation
|
page read and write
|
||
1B0D5176000
|
trusted library allocation
|
page read and write
|
||
1B0E197D000
|
trusted library allocation
|
page read and write
|
||
237F73F0000
|
heap
|
page readonly
|
||
1B0E18D4000
|
trusted library allocation
|
page read and write
|
||
1B0E18C0000
|
trusted library allocation
|
page read and write
|
||
1B0DAA7E000
|
trusted library allocation
|
page read and write
|
||
1B0D9182000
|
trusted library allocation
|
page read and write
|
||
1B0DAD9C000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DB8D6000
|
trusted library allocation
|
page read and write
|
||
1B0D017B000
|
heap
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0E2AF4000
|
trusted library allocation
|
page read and write
|
||
1B0DCB1B000
|
trusted library allocation
|
page read and write
|
||
1B0E2CE2000
|
trusted library allocation
|
page read and write
|
||
1B0E1694000
|
trusted library allocation
|
page read and write
|
||
1B0DAB5B000
|
trusted library allocation
|
page read and write
|
||
1B0D017B000
|
heap
|
page read and write
|
||
1B0DA3AB000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E1346000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D918E000
|
trusted library allocation
|
page read and write
|
||
1B0DA2C2000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
9C21EBE000
|
stack
|
page read and write
|
||
1B0E5320000
|
trusted library allocation
|
page read and write
|
||
1FF82430000
|
unkown
|
page execute read
|
||
1B0DB47F000
|
trusted library allocation
|
page read and write
|
||
1B0E18C8000
|
trusted library allocation
|
page read and write
|
||
1B0E1839000
|
trusted library allocation
|
page read and write
|
||
1B0D8987000
|
trusted library allocation
|
page read and write
|
||
1B0DC746000
|
trusted library allocation
|
page read and write
|
||
1B0D8BCF000
|
heap
|
page read and write
|
||
1B0D64AB000
|
trusted library allocation
|
page read and write
|
||
1B0E11F9000
|
trusted library allocation
|
page read and write
|
||
1B0E14FD000
|
trusted library allocation
|
page read and write
|
||
1B0E19BD000
|
trusted library allocation
|
page read and write
|
||
1B0DA984000
|
trusted library allocation
|
page read and write
|
||
1B0D9D27000
|
trusted library allocation
|
page read and write
|
||
1B0DB8CC000
|
trusted library allocation
|
page read and write
|
||
1B0E2A9D000
|
trusted library allocation
|
page read and write
|
||
1B0D91DC000
|
trusted library allocation
|
page read and write
|
||
1B0E2CFE000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E2CED000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0D01EC000
|
heap
|
page read and write
|
||
1B0E11F2000
|
trusted library allocation
|
page read and write
|
||
1B0D0216000
|
heap
|
page read and write
|
||
1B0E552D000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0E52DB000
|
trusted library allocation
|
page read and write
|
||
1B0D61AA000
|
trusted library allocation
|
page read and write
|
||
26AC8E79000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1FF82FEA000
|
heap
|
page read and write
|
||
1FF82FE6000
|
heap
|
page read and write
|
||
1B0E1174000
|
trusted library allocation
|
page read and write
|
||
1B0DABFC000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D918E000
|
trusted library allocation
|
page read and write
|
||
1B0DA95C000
|
trusted library allocation
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0E4FA5000
|
trusted library allocation
|
page read and write
|
||
1B0D0199000
|
heap
|
page read and write
|
||
1B0DCBD0000
|
trusted library allocation
|
page read and write
|
||
1B0E2CD0000
|
trusted library allocation
|
page read and write
|
||
1B0E53C9000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D908E000
|
trusted library allocation
|
page read and write
|
||
1B0D8F51000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0DA11C000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E2AF6000
|
trusted library allocation
|
page read and write
|
||
1B0E51FE000
|
trusted library allocation
|
page read and write
|
||
1B0E12C5000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E11CC000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E1A45000
|
trusted library allocation
|
page read and write
|
||
1B0E3AAC000
|
trusted library allocation
|
page read and write
|
||
1FF83058000
|
heap
|
page read and write
|
||
1B0DA676000
|
trusted library allocation
|
page read and write
|
||
1FF82FF1000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DABC9000
|
trusted library allocation
|
page read and write
|
||
1B0E12EB000
|
trusted library allocation
|
page read and write
|
||
32A6E8603000
|
trusted library allocation
|
page read and write
|
||
89211BE000
|
stack
|
page read and write
|
||
1B0D9318000
|
trusted library allocation
|
page read and write
|
||
9C22EBE000
|
stack
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0DACA5000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E2BCF000
|
trusted library allocation
|
page read and write
|
||
1B0E1A9D000
|
trusted library allocation
|
page read and write
|
||
1B0E56A7000
|
trusted library allocation
|
page read and write
|
||
1B0DA1D2000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E52C2000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0DA6F5000
|
trusted library allocation
|
page read and write
|
||
1B0E1827000
|
trusted library allocation
|
page read and write
|
||
1B0E3A48000
|
trusted library allocation
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
1B0D91A0000
|
trusted library allocation
|
page read and write
|
||
1B0E2BCA000
|
trusted library allocation
|
page read and write
|
||
1B0E2A8B000
|
trusted library allocation
|
page read and write
|
||
1B0D88E0000
|
trusted library allocation
|
page read and write
|
||
1B0E2A8E000
|
trusted library allocation
|
page read and write
|
||
1B0E5380000
|
trusted library allocation
|
page read and write
|
||
1B0D8F36000
|
trusted library allocation
|
page read and write
|
||
1B0E19BD000
|
trusted library allocation
|
page read and write
|
||
1B0E5524000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DADCD000
|
trusted library allocation
|
page read and write
|
||
26AC911D000
|
trusted library allocation
|
page read and write
|
||
1B0DCBE8000
|
trusted library allocation
|
page read and write
|
||
1B0E181E000
|
trusted library allocation
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0DA13E000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0E5191000
|
trusted library allocation
|
page read and write
|
||
1B0E1A3E000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
24588DBD000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E1A84000
|
trusted library allocation
|
page read and write
|
||
1B0D0185000
|
heap
|
page read and write
|
||
1B0DA2B9000
|
trusted library allocation
|
page read and write
|
||
1B0E1837000
|
trusted library allocation
|
page read and write
|
||
1B0E608A000
|
trusted library allocation
|
page read and write
|
||
1B0E18F8000
|
trusted library allocation
|
page read and write
|
||
1B0DC7EC000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0DA9E1000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E197E000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0E1443000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1FF8237A000
|
trusted library allocation
|
page read and write
|
||
237F7500000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E1174000
|
trusted library allocation
|
page read and write
|
||
1B0E16D6000
|
trusted library allocation
|
page read and write
|
||
89211FE000
|
unkown
|
page readonly
|
||
1B0E51FE000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E2DC4000
|
trusted library allocation
|
page read and write
|
||
1B0E18F5000
|
trusted library allocation
|
page read and write
|
||
1B0E4FC9000
|
trusted library allocation
|
page read and write
|
||
1B0E525F000
|
trusted library allocation
|
page read and write
|
||
1FF82FE3000
|
heap
|
page read and write
|
||
1B0D91BE000
|
trusted library allocation
|
page read and write
|
||
1B0DABFE000
|
trusted library allocation
|
page read and write
|
||
1B0E529E000
|
trusted library allocation
|
page read and write
|
||
1B0DB9F0000
|
trusted library allocation
|
page read and write
|
||
1B0DCF05000
|
trusted library allocation
|
page read and write
|
||
26AC8C40000
|
remote allocation
|
page read and write
|
||
1B0D64A1000
|
trusted library allocation
|
page read and write
|
||
26AC8E81000
|
trusted library allocation
|
page read and write
|
||
1B0D8F1C000
|
trusted library allocation
|
page read and write
|
||
1FF8302A000
|
heap
|
page read and write
|
||
1B0DA2FD000
|
trusted library allocation
|
page read and write
|
||
1B0D6196000
|
trusted library allocation
|
page read and write
|
||
1B0E113A000
|
trusted library allocation
|
page read and write
|
||
1B0DB6F0000
|
trusted library allocation
|
page read and write
|
||
1B0D9387000
|
trusted library allocation
|
page read and write
|
||
1B0E18C0000
|
trusted library allocation
|
page read and write
|
||
2458750A000
|
trusted library allocation
|
page read and write
|
||
1B0DA1D2000
|
trusted library allocation
|
page read and write
|
||
1B0DAAA4000
|
trusted library allocation
|
page read and write
|
||
1B0D01A6000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
1B0E19D1000
|
trusted library allocation
|
page read and write
|
||
1B0DC88D000
|
trusted library allocation
|
page read and write
|
||
1B0DCB37000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E4FA3000
|
trusted library allocation
|
page read and write
|
||
1B0DCBCB000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D8F7C000
|
trusted library allocation
|
page read and write
|
||
1B0DAB8B000
|
trusted library allocation
|
page read and write
|
||
1B0D93D7000
|
trusted library allocation
|
page read and write
|
||
1B0E1A61000
|
trusted library allocation
|
page read and write
|
||
E1F000
|
heap
|
page read and write
|
||
1B0D614F000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DA16D000
|
trusted library allocation
|
page read and write
|
||
1B0E1112000
|
trusted library allocation
|
page read and write
|
||
1B0E18F5000
|
trusted library allocation
|
page read and write
|
||
1B0DAB72000
|
trusted library allocation
|
page read and write
|
||
1B0E1426000
|
trusted library allocation
|
page read and write
|
||
237F7562000
|
trusted library allocation
|
page read and write
|
||
1B0D9D94000
|
trusted library allocation
|
page read and write
|
||
1B0E3000000
|
trusted library allocation
|
page read and write
|
||
1B0DB4E4000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
F4A5BFE000
|
stack
|
page read and write
|
||
1B0DAAA4000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1FF83058000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1FF82930000
|
heap
|
page read and write
|
||
1B0E19E6000
|
trusted library allocation
|
page read and write
|
||
1B0E2CAC000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D0184000
|
heap
|
page read and write
|
||
1B0E53D1000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
28D90500000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D01A6000
|
heap
|
page read and write
|
||
1B0E52A9000
|
trusted library allocation
|
page read and write
|
||
1B0E18CF000
|
trusted library allocation
|
page read and write
|
||
1B0D61F2000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0DAD93000
|
trusted library allocation
|
page read and write
|
||
1B0DC7FD000
|
trusted library allocation
|
page read and write
|
||
1B0E48B9000
|
trusted library allocation
|
page read and write
|
||
1B0DABA3000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E1148000
|
trusted library allocation
|
page read and write
|
||
1FF81FCA000
|
heap
|
page read and write
|
||
1B0DC6D5000
|
trusted library allocation
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0DA9E7000
|
trusted library allocation
|
page read and write
|
||
1B0E488B000
|
trusted library allocation
|
page read and write
|
||
1B0E520C000
|
trusted library allocation
|
page read and write
|
||
1B0DB882000
|
trusted library allocation
|
page read and write
|
||
1B0DABBC000
|
trusted library allocation
|
page read and write
|
||
1B0D91D8000
|
trusted library allocation
|
page read and write
|
||
1FF82F60000
|
heap
|
page read and write
|
||
1B0E11D2000
|
trusted library allocation
|
page read and write
|
||
1B0E4FD4000
|
trusted library allocation
|
page read and write
|
||
1B0E180C000
|
trusted library allocation
|
page read and write
|
||
1B0DCECE000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E15FE000
|
trusted library allocation
|
page read and write
|
||
1B0D88D5000
|
trusted library allocation
|
page read and write
|
||
1FF823BA000
|
trusted library allocation
|
page read and write
|
||
1B0DAD8F000
|
trusted library allocation
|
page read and write
|
||
1B0D01CD000
|
heap
|
page read and write
|
||
1B0DA6B9000
|
trusted library allocation
|
page read and write
|
||
245871BF000
|
heap
|
page read and write
|
||
1B0E12DA000
|
trusted library allocation
|
page read and write
|
||
1B0DA3B0000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D63C5000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
26AC8E03000
|
trusted library allocation
|
page read and write
|
||
1B0D0195000
|
heap
|
page read and write
|
||
1B0E486B000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E1476000
|
trusted library allocation
|
page read and write
|
||
1B0DCBFA000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0E1288000
|
trusted library allocation
|
page read and write
|
||
1B0D91B3000
|
trusted library allocation
|
page read and write
|
||
1B0E19D3000
|
trusted library allocation
|
page read and write
|
||
1B0E18FA000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0E19DB000
|
trusted library allocation
|
page read and write
|
||
1B0DC8DD000
|
trusted library allocation
|
page read and write
|
||
1B0DA6EC000
|
trusted library allocation
|
page read and write
|
||
1B0E4FC9000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA13C000
|
trusted library allocation
|
page read and write
|
||
1B0D8BA7000
|
heap
|
page read and write
|
||
1B0D8FF3000
|
trusted library allocation
|
page read and write
|
||
1B0E18F0000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
237F7200000
|
remote allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1FF83067000
|
heap
|
page read and write
|
||
1B0E1699000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0E11A9000
|
trusted library allocation
|
page read and write
|
||
F4A647E000
|
stack
|
page read and write
|
||
1B0DC5A4000
|
trusted library allocation
|
page read and write
|
||
1B0E1148000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0DAD86000
|
trusted library allocation
|
page read and write
|
||
1FF82F5C000
|
heap
|
page read and write
|
||
1B0E52B8000
|
trusted library allocation
|
page read and write
|
||
1B0E2C58000
|
trusted library allocation
|
page read and write
|
||
1B0D8833000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
237F7524000
|
trusted library allocation
|
page read and write
|
||
1B0DB4CF000
|
trusted library allocation
|
page read and write
|
||
1B0E2D60000
|
trusted library allocation
|
page read and write
|
||
1B0E4F9F000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0D0184000
|
heap
|
page read and write
|
||
1FF82FF1000
|
heap
|
page read and write
|
||
1B0D93EE000
|
trusted library allocation
|
page read and write
|
||
1B0DB88A000
|
trusted library allocation
|
page read and write
|
||
1B0D63B0000
|
trusted library allocation
|
page read and write
|
||
1B0DAAD6000
|
trusted library allocation
|
page read and write
|
||
1B0DB8B0000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E1972000
|
trusted library allocation
|
page read and write
|
||
1B0DB488000
|
trusted library allocation
|
page read and write
|
||
1B0DA9FD000
|
trusted library allocation
|
page read and write
|
||
1B0DC5A9000
|
trusted library allocation
|
page read and write
|
||
1B0D6145000
|
trusted library allocation
|
page read and write
|
||
1B0DA295000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E3A0C000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0DB6BA000
|
trusted library allocation
|
page read and write
|
||
1B0E2BCA000
|
trusted library allocation
|
page read and write
|
||
1B0D9994000
|
trusted library allocation
|
page read and write
|
||
1B0E113C000
|
trusted library allocation
|
page read and write
|
||
1B0DA282000
|
trusted library allocation
|
page read and write
|
||
1B0E14FD000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0DA95C000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DADC3000
|
trusted library allocation
|
page read and write
|
||
28D90280000
|
heap
|
page read and write
|
||
1B0E2D41000
|
trusted library allocation
|
page read and write
|
||
1B0DB5AD000
|
trusted library allocation
|
page read and write
|
||
1B0D52B0000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0DC6E9000
|
trusted library allocation
|
page read and write
|
||
1B0DAADD000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E5388000
|
trusted library allocation
|
page read and write
|
||
1B0E1840000
|
trusted library allocation
|
page read and write
|
||
1B0E52B8000
|
trusted library allocation
|
page read and write
|
||
1B0E19D1000
|
trusted library allocation
|
page read and write
|
||
1B0E2C21000
|
trusted library allocation
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0DC585000
|
trusted library allocation
|
page read and write
|
||
28D90650000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
26AC8BE0000
|
unclassified section
|
page readonly
|
||
1B0DA39D000
|
trusted library allocation
|
page read and write
|
||
1FF81F40000
|
unclassified section
|
page readonly
|
||
1B0E53E4000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0E18C0000
|
trusted library allocation
|
page read and write
|
||
1B0E122E000
|
trusted library allocation
|
page read and write
|
||
1B0D01A2000
|
heap
|
page read and write
|
||
1B0DA98F000
|
trusted library allocation
|
page read and write
|
||
1FF83044000
|
heap
|
page read and write
|
||
1B0E2C88000
|
trusted library allocation
|
page read and write
|
||
1B0DAB45000
|
trusted library allocation
|
page read and write
|
||
1B0E2A9B000
|
trusted library allocation
|
page read and write
|
||
24588DAC000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D8F6A000
|
trusted library allocation
|
page read and write
|
||
1FF82AB0000
|
heap
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
1B0DB5C1000
|
trusted library allocation
|
page read and write
|
||
1B0E2D78000
|
trusted library allocation
|
page read and write
|
||
26AC8EE9000
|
trusted library allocation
|
page read and write
|
||
1B0E12E2000
|
trusted library allocation
|
page read and write
|
||
1B0E5529000
|
trusted library allocation
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
1B0E18D4000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DB864000
|
trusted library allocation
|
page read and write
|
||
1B0E11BB000
|
trusted library allocation
|
page read and write
|
||
9C1E27D000
|
stack
|
page read and write
|
||
1B0DAA4C000
|
trusted library allocation
|
page read and write
|
||
1B0D8F58000
|
trusted library allocation
|
page read and write
|
||
1B0DA9B7000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DC6DA000
|
trusted library allocation
|
page read and write
|
||
15DF000
|
stack
|
page read and write
|
||
1B0DB572000
|
trusted library allocation
|
page read and write
|
||
1B0DA480000
|
trusted library allocation
|
page read and write
|
||
1B0DB859000
|
trusted library allocation
|
page read and write
|
||
1B0E18EA000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E136A000
|
trusted library allocation
|
page read and write
|
||
1B0DCBA9000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E11F9000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DB88A000
|
trusted library allocation
|
page read and write
|
||
1B0DB8BE000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DC7BF000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DC6CF000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0D0175000
|
heap
|
page read and write
|
||
1B0E2DE9000
|
trusted library allocation
|
page read and write
|
||
1B0DB8ED000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0DB4F2000
|
trusted library allocation
|
page read and write
|
||
1B0E53C5000
|
trusted library allocation
|
page read and write
|
||
1B0E2B4C000
|
trusted library allocation
|
page read and write
|
||
1B0DA2E7000
|
trusted library allocation
|
page read and write
|
||
1B0D8BD0000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D527F000
|
trusted library allocation
|
page read and write
|
||
1B0D9068000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E19E1000
|
trusted library allocation
|
page read and write
|
||
1B0D9DD6000
|
trusted library allocation
|
page read and write
|
||
1B0D01A8000
|
heap
|
page read and write
|
||
1B0E146B000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0DC6CF000
|
trusted library allocation
|
page read and write
|
||
1B0DA39A000
|
trusted library allocation
|
page read and write
|
||
1B0E5277000
|
trusted library allocation
|
page read and write
|
||
1B0E2C48000
|
trusted library allocation
|
page read and write
|
||
1B0D9924000
|
trusted library allocation
|
page read and write
|
||
1B0D89CF000
|
trusted library allocation
|
page read and write
|
||
1B0E1A80000
|
trusted library allocation
|
page read and write
|
||
1B0D91C4000
|
trusted library allocation
|
page read and write
|
||
1B0E18DB000
|
trusted library allocation
|
page read and write
|
||
1B0DB8B6000
|
trusted library allocation
|
page read and write
|
||
26AC9117000
|
trusted library allocation
|
page read and write
|
||
1B0E11A9000
|
trusted library allocation
|
page read and write
|
||
1B0DA231000
|
trusted library allocation
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E52C7000
|
trusted library allocation
|
page read and write
|
||
1B0E5831000
|
heap
|
page read and write
|
||
1B0DA90A000
|
trusted library allocation
|
page read and write
|
||
26AC8E6E000
|
trusted library allocation
|
page read and write
|
||
1B0DB819000
|
trusted library allocation
|
page read and write
|
||
1B0DADB1000
|
trusted library allocation
|
page read and write
|
||
1FF82E00000
|
trusted library allocation
|
page read and write
|
||
1B0DAAD6000
|
trusted library allocation
|
page read and write
|
||
1B0DA345000
|
trusted library allocation
|
page read and write
|
||
1B0E11A6000
|
trusted library allocation
|
page read and write
|
||
1B0DAB29000
|
trusted library allocation
|
page read and write
|
||
1B0DA2C3000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0DB8D6000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0E54B9000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DA1DC000
|
trusted library allocation
|
page read and write
|
||
1B0E4F62000
|
trusted library allocation
|
page read and write
|
||
1B0E5879000
|
heap
|
page read and write
|
||
1B0E2AF7000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D8F36000
|
trusted library allocation
|
page read and write
|
||
1B0E4855000
|
trusted library allocation
|
page read and write
|
||
237F75AA000
|
trusted library allocation
|
page read and write
|
||
1B0DABCE000
|
trusted library allocation
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0D01EF000
|
heap
|
page read and write
|
||
1B0D88E0000
|
trusted library allocation
|
page read and write
|
||
1B0D6496000
|
trusted library allocation
|
page read and write
|
||
1FF82FA8000
|
heap
|
page read and write
|
||
237F75B5000
|
trusted library allocation
|
page read and write
|
||
28D903E0000
|
heap
|
page read and write
|
||
1B0D01DF000
|
heap
|
page read and write
|
||
1B0E4600000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E1238000
|
trusted library allocation
|
page read and write
|
||
1B0DA6FB000
|
trusted library allocation
|
page read and write
|
||
1B0DC762000
|
trusted library allocation
|
page read and write
|
||
1B0DB87A000
|
trusted library allocation
|
page read and write
|
||
1FF82FF1000
|
heap
|
page read and write
|
||
1B0DA3C6000
|
trusted library allocation
|
page read and write
|
||
1B0D01D7000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0D017D000
|
heap
|
page read and write
|
||
892117E000
|
unkown
|
page readonly
|
||
1B0D4B90000
|
trusted library allocation
|
page read and write
|
||
1B0E2C55000
|
trusted library allocation
|
page read and write
|
||
1B0E4FA3000
|
trusted library allocation
|
page read and write
|
||
26AC8BD0000
|
unclassified section
|
page readonly
|
||
1B0D01A2000
|
heap
|
page read and write
|
||
1B0DA6E5000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0D8F7E000
|
trusted library allocation
|
page read and write
|
||
1B0D64BE000
|
trusted library allocation
|
page read and write
|
||
1B0E19E1000
|
trusted library allocation
|
page read and write
|
||
1B0E552D000
|
trusted library allocation
|
page read and write
|
||
1B0DAD83000
|
trusted library allocation
|
page read and write
|
||
89210BB000
|
stack
|
page read and write
|
||
1B0E10F7000
|
trusted library allocation
|
page read and write
|
||
1B0DC8CA000
|
trusted library allocation
|
page read and write
|
||
1B0E13C3000
|
trusted library allocation
|
page read and write
|
||
1B0DC5E1000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E19EF000
|
trusted library allocation
|
page read and write
|
||
1B0DB829000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E1AAB000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D91FC000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0E2B83000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E10CE000
|
trusted library allocation
|
page read and write
|
||
1B0DC66E000
|
trusted library allocation
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1FF82F6C000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
1B0D526A000
|
trusted library allocation
|
page read and write
|
||
1B0DA194000
|
trusted library allocation
|
page read and write
|
||
1B0DA94A000
|
trusted library allocation
|
page read and write
|
||
1B0DA3B2000
|
trusted library allocation
|
page read and write
|
||
1FF8302A000
|
heap
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E137A000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0DA2BE000
|
trusted library allocation
|
page read and write
|
||
1B0D9175000
|
trusted library allocation
|
page read and write
|
||
1B0D8F78000
|
trusted library allocation
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
237F7576000
|
trusted library allocation
|
page read and write
|
||
1B0E48E0000
|
trusted library allocation
|
page read and write
|
||
1B0DA9C2000
|
trusted library allocation
|
page read and write
|
||
1B0DAA8E000
|
trusted library allocation
|
page read and write
|
||
1B0DAB32000
|
trusted library allocation
|
page read and write
|
||
1B0E53CF000
|
trusted library allocation
|
page read and write
|
||
1B0DCD23000
|
trusted library allocation
|
page read and write
|
||
1B0DC689000
|
trusted library allocation
|
page read and write
|
||
1B0E137A000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DB8E7000
|
trusted library allocation
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0DA267000
|
trusted library allocation
|
page read and write
|
||
1B0DA676000
|
trusted library allocation
|
page read and write
|
||
237F75C4000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
245871DA000
|
heap
|
page read and write
|
||
1B0E1837000
|
trusted library allocation
|
page read and write
|
||
1B0DA29C000
|
trusted library allocation
|
page read and write
|
||
1B0E1837000
|
trusted library allocation
|
page read and write
|
||
1B0D906F000
|
trusted library allocation
|
page read and write
|
||
1B0DB349000
|
trusted library allocation
|
page read and write
|
||
1B0DAD09000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F5000
|
trusted library allocation
|
page read and write
|
||
1B0E1835000
|
trusted library allocation
|
page read and write
|
||
1B0E2AF6000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DDE02000
|
trusted library allocation
|
page read and write
|
||
1B0DB84E000
|
trusted library allocation
|
page read and write
|
||
1B0D01DF000
|
heap
|
page read and write
|
||
1B0DA14B000
|
trusted library allocation
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0E1A75000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E16EC000
|
trusted library allocation
|
page read and write
|
||
1B0DC7F9000
|
trusted library allocation
|
page read and write
|
||
1B0E18F0000
|
trusted library allocation
|
page read and write
|
||
1B0E129F000
|
trusted library allocation
|
page read and write
|
||
1B0DA660000
|
trusted library allocation
|
page read and write
|
||
1B0E4886000
|
trusted library allocation
|
page read and write
|
||
1B0D0184000
|
heap
|
page read and write
|
||
26AC8EB7000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0D88E2000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0D644E000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0DC656000
|
trusted library allocation
|
page read and write
|
||
1B0DCBC4000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0D01E7000
|
heap
|
page read and write
|
||
1B0E4883000
|
trusted library allocation
|
page read and write
|
||
1B0E18F5000
|
trusted library allocation
|
page read and write
|
||
1FF83058000
|
heap
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0E4FA5000
|
trusted library allocation
|
page read and write
|
||
1B0E48E1000
|
trusted library allocation
|
page read and write
|
||
1B0DAB37000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E51CA000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E1ABC000
|
trusted library allocation
|
page read and write
|
||
1B0D9338000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DB321000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0E19E6000
|
trusted library allocation
|
page read and write
|
||
1B0DCB4C000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
245871C4000
|
heap
|
page read and write
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
1B0D019B000
|
heap
|
page read and write
|
||
1B0DA6B9000
|
trusted library allocation
|
page read and write
|
||
1B0E548E000
|
trusted library allocation
|
page read and write
|
||
1B0DA2D0000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0E48AB000
|
trusted library allocation
|
page read and write
|
||
1B0DA120000
|
trusted library allocation
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
26AC8EA3000
|
trusted library allocation
|
page read and write
|
||
1B0D613A000
|
trusted library allocation
|
page read and write
|
||
1B0DA96C000
|
trusted library allocation
|
page read and write
|
||
1B0E1165000
|
trusted library allocation
|
page read and write
|
||
1B0E51F8000
|
trusted library allocation
|
page read and write
|
||
1B0D8B8B000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E16D8000
|
trusted library allocation
|
page read and write
|
||
1B0DACFD000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D61F4000
|
trusted library allocation
|
page read and write
|
||
1B0D881D000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0D919E000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0E3B2C000
|
trusted library allocation
|
page read and write
|
||
1B0E182C000
|
trusted library allocation
|
page read and write
|
||
1B0D018E000
|
heap
|
page read and write
|
||
1B0DA667000
|
trusted library allocation
|
page read and write
|
||
1B0DAAC3000
|
trusted library allocation
|
page read and write
|
||
1B0E16B5000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0E5482000
|
trusted library allocation
|
page read and write
|
||
E77E7FF000
|
stack
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E4902000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D017B000
|
heap
|
page read and write
|
||
1B0DC86F000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E53CF000
|
trusted library allocation
|
page read and write
|
||
1B0E5529000
|
trusted library allocation
|
page read and write
|
||
1B0E116A000
|
trusted library allocation
|
page read and write
|
||
1B0DACE2000
|
trusted library allocation
|
page read and write
|
||
1B0DADBA000
|
trusted library allocation
|
page read and write
|
||
1B0D52A3000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E2DC4000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
1B0E54B0000
|
trusted library allocation
|
page read and write
|
||
1B0DCBE8000
|
trusted library allocation
|
page read and write
|
||
1B0D6356000
|
trusted library allocation
|
page read and write
|
||
1B0DADC3000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0DACB7000
|
trusted library allocation
|
page read and write
|
||
26AC8E00000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D61FB000
|
trusted library allocation
|
page read and write
|
||
1B0D018E000
|
heap
|
page read and write
|
||
1B0E53E4000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D019F000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D91AA000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1FF8243E000
|
unkown
|
page execute read
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
1B0E51F8000
|
trusted library allocation
|
page read and write
|
||
1B0D6442000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0E1288000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D8BD0000
|
heap
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1FF82348000
|
trusted library allocation
|
page read and write
|
||
1B0DCBAB000
|
trusted library allocation
|
page read and write
|
||
1B0D8BD0000
|
heap
|
page read and write
|
||
1B0D017C000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0E546C000
|
trusted library allocation
|
page read and write
|
||
1B0D8860000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1FF82180000
|
heap
|
page readonly
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0DA2E7000
|
trusted library allocation
|
page read and write
|
||
1B0DA6FE000
|
trusted library allocation
|
page read and write
|
||
C9BD1FC000
|
stack
|
page read and write
|
||
33A000
|
stack
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0E53A7000
|
trusted library allocation
|
page read and write
|
||
1B0E19F5000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DA2BE000
|
trusted library allocation
|
page read and write
|
||
1B0D93E7000
|
trusted library allocation
|
page read and write
|
||
1B0DB814000
|
trusted library allocation
|
page read and write
|
||
1B0E12FE000
|
trusted library allocation
|
page read and write
|
||
1B0E4816000
|
trusted library allocation
|
page read and write
|
||
1B0E2CE1000
|
trusted library allocation
|
page read and write
|
||
1B0D637D000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0DC6F1000
|
trusted library allocation
|
page read and write
|
||
1B0D01B5000
|
heap
|
page read and write
|
||
1B0D0162000
|
heap
|
page read and write
|
||
1B0DA135000
|
trusted library allocation
|
page read and write
|
||
1B0E19EF000
|
trusted library allocation
|
page read and write
|
||
1B0D8B9F000
|
heap
|
page read and write
|
||
1B0D913B000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0E2DC2000
|
trusted library allocation
|
page read and write
|
||
1B0E51AA000
|
trusted library allocation
|
page read and write
|
||
1B0E51F6000
|
trusted library allocation
|
page read and write
|
||
1B0D0227000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E11F7000
|
trusted library allocation
|
page read and write
|
||
1FF82F60000
|
heap
|
page read and write
|
||
1B0E54DF000
|
trusted library allocation
|
page read and write
|
||
1FF821B0000
|
trusted library section
|
page readonly
|
||
1B0DA288000
|
trusted library allocation
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
1B0D8F71000
|
trusted library allocation
|
page read and write
|
||
1B0DA97A000
|
trusted library allocation
|
page read and write
|
||
1B0D8F47000
|
trusted library allocation
|
page read and write
|
||
1B0E14B8000
|
trusted library allocation
|
page read and write
|
||
1B0E2CE1000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E542C000
|
trusted library allocation
|
page read and write
|
||
1B0DADC0000
|
trusted library allocation
|
page read and write
|
||
1B0DABDE000
|
trusted library allocation
|
page read and write
|
||
1B0DAD93000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E16E6000
|
trusted library allocation
|
page read and write
|
||
1B0E53A7000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
26AC92D4000
|
heap
|
page read and write
|
||
1B0D01E7000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA9A8000
|
trusted library allocation
|
page read and write
|
||
26AC8E5D000
|
trusted library allocation
|
page read and write
|
||
1B0DC61E000
|
trusted library allocation
|
page read and write
|
||
1B0E19F2000
|
trusted library allocation
|
page read and write
|
||
1B0E1AF8000
|
trusted library allocation
|
page read and write
|
||
1B0DC6E9000
|
trusted library allocation
|
page read and write
|
||
1B0E5473000
|
trusted library allocation
|
page read and write
|
||
1B0E14D1000
|
trusted library allocation
|
page read and write
|
||
1B0DB85D000
|
trusted library allocation
|
page read and write
|
||
1B0DADC0000
|
trusted library allocation
|
page read and write
|
||
1B0DC5C1000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
237F7570000
|
trusted library allocation
|
page read and write
|
||
1B0D6196000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D0184000
|
heap
|
page read and write
|
||
1FF82365000
|
trusted library allocation
|
page read and write
|
||
1B0D914C000
|
trusted library allocation
|
page read and write
|
||
237F7602000
|
unclassified section
|
page read and write
|
||
1B0E53DA000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0DAB2C000
|
trusted library allocation
|
page read and write
|
||
1B0D019B000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E4FA1000
|
trusted library allocation
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0E19EF000
|
trusted library allocation
|
page read and write
|
||
1B0E10E3000
|
trusted library allocation
|
page read and write
|
||
1FF82F6C000
|
heap
|
page read and write
|
||
C9BD1FF000
|
stack
|
page read and write
|
||
1B0D9153000
|
trusted library allocation
|
page read and write
|
||
1B0D01A8000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E165F000
|
trusted library allocation
|
page read and write
|
||
1B0D93D5000
|
trusted library allocation
|
page read and write
|
||
1B0D8B8F000
|
heap
|
page read and write
|
||
1B0E2CD7000
|
trusted library allocation
|
page read and write
|
||
1B0D99F2000
|
trusted library allocation
|
page read and write
|
||
1B0DA198000
|
trusted library allocation
|
page read and write
|
||
1B0E3B01000
|
trusted library allocation
|
page read and write
|
||
1B0D88E0000
|
trusted library allocation
|
page read and write
|
||
1B0D9DFE000
|
trusted library allocation
|
page read and write
|
||
1B0DABE8000
|
trusted library allocation
|
page read and write
|
||
237F7566000
|
trusted library allocation
|
page read and write
|
||
1B0DA3FA000
|
trusted library allocation
|
page read and write
|
||
1B0D88E7000
|
trusted library allocation
|
page read and write
|
||
1B0D91D2000
|
trusted library allocation
|
page read and write
|
||
1B0E19DB000
|
trusted library allocation
|
page read and write
|
||
1B0E2E00000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E39A3000
|
trusted library allocation
|
page read and write
|
||
1B0D99D5000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E4F95000
|
trusted library allocation
|
page read and write
|
||
1B0D5213000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
26AC8E96000
|
trusted library allocation
|
page read and write
|
||
1B0E51A4000
|
trusted library allocation
|
page read and write
|
||
1B0E16EC000
|
trusted library allocation
|
page read and write
|
||
1B0D99C6000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0DAB37000
|
trusted library allocation
|
page read and write
|
||
1B0D01AA000
|
heap
|
page read and write
|
||
892447E000
|
unkown
|
page readonly
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1FF83058000
|
heap
|
page read and write
|
||
1B0DADA8000
|
trusted library allocation
|
page read and write
|
||
1FF82F60000
|
heap
|
page read and write
|
||
1B0DA9E1000
|
trusted library allocation
|
page read and write
|
||
1B0E18D4000
|
trusted library allocation
|
page read and write
|
||
237F7220000
|
unclassified section
|
page readonly
|
||
1B0DB886000
|
trusted library allocation
|
page read and write
|
||
1B0E10D4000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA676000
|
trusted library allocation
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0E4400000
|
trusted library allocation
|
page read and write
|
||
1B0D018B000
|
heap
|
page read and write
|
||
1B0E1AAB000
|
trusted library allocation
|
page read and write
|
||
1B0E12FE000
|
trusted library allocation
|
page read and write
|
||
1B0E11AE000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E2CD0000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E1954000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E53B5000
|
trusted library allocation
|
page read and write
|
||
1FF82F5C000
|
heap
|
page read and write
|
||
1B0DCBA7000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E48C4000
|
trusted library allocation
|
page read and write
|
||
1B0D8BD0000
|
heap
|
page read and write
|
||
1B0E538B000
|
trusted library allocation
|
page read and write
|
||
1B0E2D41000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
237F7760000
|
unclassified section
|
page readonly
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E129A000
|
trusted library allocation
|
page read and write
|
||
1B0DA21F000
|
trusted library allocation
|
page read and write
|
||
1B0DA6E5000
|
trusted library allocation
|
page read and write
|
||
1B0DB32A000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DADB3000
|
trusted library allocation
|
page read and write
|
||
1B0D908A000
|
trusted library allocation
|
page read and write
|
||
1B0E1627000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0E373B000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0DAD72000
|
trusted library allocation
|
page read and write
|
||
1B0E4D00000
|
trusted library allocation
|
page read and write
|
||
1B0DAD43000
|
trusted library allocation
|
page read and write
|
||
1B0E159A000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
26AC8DAA000
|
heap
|
page read and write
|
||
1B0DA9A8000
|
trusted library allocation
|
page read and write
|
||
1B0D63C5000
|
trusted library allocation
|
page read and write
|
||
26AC9120000
|
trusted library allocation
|
page read and write
|
||
1B0E1358000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D8F47000
|
trusted library allocation
|
page read and write
|
||
1B0D91BE000
|
trusted library allocation
|
page read and write
|
||
1B0DB644000
|
trusted library allocation
|
page read and write
|
||
1B0E484B000
|
trusted library allocation
|
page read and write
|
||
1B0D4BC1000
|
trusted library allocation
|
page read and write
|
||
237F7656000
|
heap
|
page read and write
|
||
1FF82F7D000
|
heap
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D0216000
|
heap
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0DA307000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0DB454000
|
trusted library allocation
|
page read and write
|
||
1B0D88C9000
|
trusted library allocation
|
page read and write
|
||
1B0E129C000
|
trusted library allocation
|
page read and write
|
||
1FF82E0C000
|
trusted library allocation
|
page read and write
|
||
1B0E10E3000
|
trusted library allocation
|
page read and write
|
||
1B0DA9A3000
|
trusted library allocation
|
page read and write
|
||
1B0DCBF7000
|
trusted library allocation
|
page read and write
|
||
1B0D6376000
|
trusted library allocation
|
page read and write
|
||
1B0E10D8000
|
trusted library allocation
|
page read and write
|
||
1B0DAB8A000
|
trusted library allocation
|
page read and write
|
||
1B0DA343000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DABA6000
|
trusted library allocation
|
page read and write
|
||
37757FC1E000
|
trusted library allocation
|
page read and write
|
||
1B0E116A000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D8F35000
|
trusted library allocation
|
page read and write
|
||
1B0DB687000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E2CE1000
|
trusted library allocation
|
page read and write
|
||
1B0E1977000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0E14F3000
|
trusted library allocation
|
page read and write
|
||
1FF82F6C000
|
heap
|
page read and write
|
||
1B0D8F4F000
|
trusted library allocation
|
page read and write
|
||
1B0E547B000
|
trusted library allocation
|
page read and write
|
||
1B0DADCD000
|
trusted library allocation
|
page read and write
|
||
237F7803000
|
trusted library allocation
|
page read and write
|
||
1B0D934E000
|
trusted library allocation
|
page read and write
|
||
1B0E18FD000
|
trusted library allocation
|
page read and write
|
||
1B0E48E5000
|
trusted library allocation
|
page read and write
|
||
1B0E483A000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DAB09000
|
trusted library allocation
|
page read and write
|
||
1B0E11F5000
|
trusted library allocation
|
page read and write
|
||
1FF82450000
|
heap
|
page read and write
|
||
26AC8C5B000
|
remote allocation
|
page execute read
|
||
1B0DCBCB000
|
trusted library allocation
|
page read and write
|
||
1B0E1AAB000
|
trusted library allocation
|
page read and write
|
||
1B0D017C000
|
heap
|
page read and write
|
||
1B0DADCD000
|
trusted library allocation
|
page read and write
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
1B0D9D2C000
|
trusted library allocation
|
page read and write
|
||
1B0D0179000
|
heap
|
page read and write
|
||
1B0D4BBF000
|
trusted library allocation
|
page read and write
|
||
1B0DABA3000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0E1940000
|
trusted library allocation
|
page read and write
|
||
1B0E18DB000
|
trusted library allocation
|
page read and write
|
||
1B0DAB94000
|
trusted library allocation
|
page read and write
|
||
1B0DA1D2000
|
trusted library allocation
|
page read and write
|
||
1FF8303B000
|
heap
|
page read and write
|
||
1B0E48E0000
|
trusted library allocation
|
page read and write
|
||
1B0D918E000
|
trusted library allocation
|
page read and write
|
||
1B0D9066000
|
trusted library allocation
|
page read and write
|
||
1FF81F50000
|
unclassified section
|
page readonly
|
||
24587140000
|
heap
|
page read and write
|
||
1B0D9DBC000
|
trusted library allocation
|
page read and write
|
||
1B0DAD63000
|
trusted library allocation
|
page read and write
|
||
1B0E2D33000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E5388000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0DA97B000
|
trusted library allocation
|
page read and write
|
||
1FF82FAA000
|
heap
|
page read and write
|
||
1B0DC6E9000
|
trusted library allocation
|
page read and write
|
||
1B0E10DF000
|
trusted library allocation
|
page read and write
|
||
1B0D8B98000
|
heap
|
page read and write
|
||
1FF83067000
|
heap
|
page read and write
|
||
1B0D9DB3000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D0186000
|
heap
|
page read and write
|
||
1B0D6359000
|
trusted library allocation
|
page read and write
|
||
1FF8236A000
|
trusted library allocation
|
page read and write
|
||
1B0D88DB000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E5382000
|
trusted library allocation
|
page read and write
|
||
1B0DB9F0000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0E54BF000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E181E000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0DADA0000
|
trusted library allocation
|
page read and write
|
||
1B0DADB7000
|
trusted library allocation
|
page read and write
|
||
26AC8EA0000
|
trusted library allocation
|
page read and write
|
||
1B0DA15B000
|
trusted library allocation
|
page read and write
|
||
1B0DABFE000
|
trusted library allocation
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0D88CD000
|
trusted library allocation
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
1B0DAB09000
|
trusted library allocation
|
page read and write
|
||
1B0E53BA000
|
trusted library allocation
|
page read and write
|
||
1B0E16EF000
|
trusted library allocation
|
page read and write
|
||
1B0D9D97000
|
trusted library allocation
|
page read and write
|
||
1B0DC7C2000
|
trusted library allocation
|
page read and write
|
||
1B0D93E7000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0D0186000
|
heap
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1FF82310000
|
trusted library allocation
|
page read and write
|
||
1FF82FEA000
|
heap
|
page read and write
|
||
1FF83044000
|
heap
|
page read and write
|
||
1B0E13C3000
|
trusted library allocation
|
page read and write
|
||
1B0E54E9000
|
trusted library allocation
|
page read and write
|
||
1B0D4BEF000
|
trusted library allocation
|
page read and write
|
||
1B0E11D2000
|
trusted library allocation
|
page read and write
|
||
1B0DA63D000
|
trusted library allocation
|
page read and write
|
||
1B0E18C5000
|
trusted library allocation
|
page read and write
|
||
1B0DA362000
|
trusted library allocation
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0D01F1000
|
heap
|
page read and write
|
||
237F790C000
|
trusted library allocation
|
page read and write
|
||
1B0E196A000
|
trusted library allocation
|
page read and write
|
||
1B0E48C1000
|
trusted library allocation
|
page read and write
|
||
1B0DA2BE000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DA1D2000
|
trusted library allocation
|
page read and write
|
||
1B0DB4B2000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0D9352000
|
trusted library allocation
|
page read and write
|
||
89233FE000
|
unkown
|
page readonly
|
||
1B0D8909000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D9338000
|
trusted library allocation
|
page read and write
|
||
1B0D918E000
|
trusted library allocation
|
page read and write
|
||
1B0DB9DE000
|
trusted library allocation
|
page read and write
|
||
1B0E48E7000
|
trusted library allocation
|
page read and write
|
||
1B0E1073000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
1B0D99C9000
|
trusted library allocation
|
page read and write
|
||
1B0DAD23000
|
trusted library allocation
|
page read and write
|
||
1B0E11A6000
|
trusted library allocation
|
page read and write
|
||
26AC8E0B000
|
trusted library allocation
|
page read and write
|
||
1B0E521F000
|
trusted library allocation
|
page read and write
|
||
1B0E53C5000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0DADBB000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1FF82F4D000
|
heap
|
page read and write
|
||
237F7511000
|
trusted library allocation
|
page read and write
|
||
1B0E16E6000
|
trusted library allocation
|
page read and write
|
||
1B0DAD8F000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E2C88000
|
trusted library allocation
|
page read and write
|
||
237F7650000
|
heap
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
1B0D0199000
|
heap
|
page read and write
|
||
1B0DCBC4000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DC553000
|
trusted library allocation
|
page read and write
|
||
1B0D905A000
|
trusted library allocation
|
page read and write
|
||
1B0E1ABC000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E2BCF000
|
trusted library allocation
|
page read and write
|
||
1B0E16C7000
|
trusted library allocation
|
page read and write
|
||
1B0E4870000
|
trusted library allocation
|
page read and write
|
||
1B0E53CC000
|
trusted library allocation
|
page read and write
|
||
1B0DC893000
|
trusted library allocation
|
page read and write
|
||
1B0E54F4000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0E11A4000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
E77D7FF000
|
stack
|
page read and write
|
||
1B0E2AF2000
|
trusted library allocation
|
page read and write
|
||
1B0DA9AB000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DA6A8000
|
trusted library allocation
|
page read and write
|
||
1B0D64DC000
|
trusted library allocation
|
page read and write
|
||
1B0DA3FE000
|
trusted library allocation
|
page read and write
|
||
1B0DB4CA000
|
trusted library allocation
|
page read and write
|
||
1B0D8B99000
|
heap
|
page read and write
|
||
1B0D9175000
|
trusted library allocation
|
page read and write
|
||
1B0DADCD000
|
trusted library allocation
|
page read and write
|
||
1B0E16E6000
|
trusted library allocation
|
page read and write
|
||
1B0DA6A8000
|
trusted library allocation
|
page read and write
|
||
1B0E18F8000
|
trusted library allocation
|
page read and write
|
||
1B0DB8CC000
|
trusted library allocation
|
page read and write
|
||
1B0DACC5000
|
trusted library allocation
|
page read and write
|
||
1B0E52B0000
|
trusted library allocation
|
page read and write
|
||
1B0DAB11000
|
trusted library allocation
|
page read and write
|
||
1B0D52B6000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
26AC8EA7000
|
trusted library allocation
|
page read and write
|
||
1B0E193E000
|
trusted library allocation
|
page read and write
|
||
1B0DC753000
|
trusted library allocation
|
page read and write
|
||
1B0E1A75000
|
trusted library allocation
|
page read and write
|
||
1B0D5275000
|
trusted library allocation
|
page read and write
|
||
1B0D8F90000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E51C4000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D0195000
|
heap
|
page read and write
|
||
1B0DA2AD000
|
trusted library allocation
|
page read and write
|
||
1B0E52B8000
|
trusted library allocation
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
E77BFFB000
|
stack
|
page read and write
|
||
1B0DA1D2000
|
trusted library allocation
|
page read and write
|
||
1B0DC519000
|
trusted library allocation
|
page read and write
|
||
1B0DAB8A000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0DA218000
|
trusted library allocation
|
page read and write
|
||
1B0E1ACA000
|
trusted library allocation
|
page read and write
|
||
1B0E10C8000
|
trusted library allocation
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0DB6D9000
|
trusted library allocation
|
page read and write
|
||
1B0D0167000
|
heap
|
page read and write
|
||
1B0DB943000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
1B0D01E9000
|
heap
|
page read and write
|
||
1B0D0186000
|
heap
|
page read and write
|
||
1B0DC656000
|
trusted library allocation
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
1B0DC746000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E1376000
|
trusted library allocation
|
page read and write
|
||
1B0D88C7000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0DB4B0000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E14A6000
|
trusted library allocation
|
page read and write
|
||
1B0E1159000
|
trusted library allocation
|
page read and write
|
||
1B0DA3C8000
|
trusted library allocation
|
page read and write
|
||
1B0DA1AC000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0DC7BF000
|
trusted library allocation
|
page read and write
|
||
1B0DCF50000
|
trusted library allocation
|
page read and write
|
||
1B0DB862000
|
trusted library allocation
|
page read and write
|
||
1B0E18DD000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0E52A9000
|
trusted library allocation
|
page read and write
|
||
1B0D01F1000
|
heap
|
page read and write
|
||
1B0E11C1000
|
trusted library allocation
|
page read and write
|
||
1B0DADC3000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D5226000
|
trusted library allocation
|
page read and write
|
||
1B0E2CD0000
|
trusted library allocation
|
page read and write
|
||
1B0DA9C7000
|
trusted library allocation
|
page read and write
|
||
1B0DC6D5000
|
trusted library allocation
|
page read and write
|
||
1B0DB882000
|
trusted library allocation
|
page read and write
|
||
1B0E19ED000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E1678000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
1B0DAA55000
|
trusted library allocation
|
page read and write
|
||
1B0E521B000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E52A5000
|
trusted library allocation
|
page read and write
|
||
1B0DC5F4000
|
trusted library allocation
|
page read and write
|
||
1B0D63E6000
|
trusted library allocation
|
page read and write
|
||
1B0E1184000
|
trusted library allocation
|
page read and write
|
||
1FF82FB9000
|
heap
|
page read and write
|
||
1B0E2D33000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0DAAE9000
|
trusted library allocation
|
page read and write
|
||
1B0E48F2000
|
trusted library allocation
|
page read and write
|
||
1B0D01D3000
|
heap
|
page read and write
|
||
1B0DA287000
|
trusted library allocation
|
page read and write
|
||
1FF83069000
|
heap
|
page read and write
|
||
1B0E18C5000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1FF821A0000
|
unclassified section
|
page read and write
|
||
1B0DB69A000
|
trusted library allocation
|
page read and write
|
||
1B0E4FA5000
|
trusted library allocation
|
page read and write
|
||
1B0DAD81000
|
trusted library allocation
|
page read and write
|
||
1B0E11AE000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0E116A000
|
trusted library allocation
|
page read and write
|
||
1B0E1947000
|
trusted library allocation
|
page read and write
|
||
1B0E4889000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DA955000
|
trusted library allocation
|
page read and write
|
||
1B0DABA3000
|
trusted library allocation
|
page read and write
|
||
1B0DA6A8000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0E146B000
|
trusted library allocation
|
page read and write
|
||
1B0E18F8000
|
trusted library allocation
|
page read and write
|
||
1B0DA19D000
|
trusted library allocation
|
page read and write
|
||
1B0DADC3000
|
trusted library allocation
|
page read and write
|
||
8922BFE000
|
stack
|
page read and write
|
||
1B0DA1BC000
|
trusted library allocation
|
page read and write
|
||
1B0DCBCB000
|
trusted library allocation
|
page read and write
|
||
1B0E1AF8000
|
trusted library allocation
|
page read and write
|
||
1B0E2AFB000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E119E000
|
trusted library allocation
|
page read and write
|
||
1B0D01A1000
|
heap
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0DB49E000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
1FF823BF000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0DB3B2000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E5542000
|
trusted library allocation
|
page read and write
|
||
1B0DAA68000
|
trusted library allocation
|
page read and write
|
||
237F75B1000
|
trusted library allocation
|
page read and write
|
||
1B0DA66E000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D52A3000
|
trusted library allocation
|
page read and write
|
||
1B0E5380000
|
trusted library allocation
|
page read and write
|
||
1B0DA2E7000
|
trusted library allocation
|
page read and write
|
||
1B0D01ED000
|
heap
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0DCBB9000
|
trusted library allocation
|
page read and write
|
||
1B0E16CA000
|
trusted library allocation
|
page read and write
|
||
1B0DAB35000
|
trusted library allocation
|
page read and write
|
||
1B0D4B9E000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0E5380000
|
trusted library allocation
|
page read and write
|
||
1B0DAD12000
|
trusted library allocation
|
page read and write
|
||
1B0DAD0B000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E2DE9000
|
trusted library allocation
|
page read and write
|
||
1B0D614F000
|
trusted library allocation
|
page read and write
|
||
1B0DA2FA000
|
trusted library allocation
|
page read and write
|
||
1B0DA6EC000
|
trusted library allocation
|
page read and write
|
||
1B0DAD83000
|
trusted library allocation
|
page read and write
|
||
C9BE1FF000
|
stack
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D8FB3000
|
trusted library allocation
|
page read and write
|
||
1FF82920000
|
heap
|
page read and write
|
||
1B0DA33B000
|
trusted library allocation
|
page read and write
|
||
26AC8E61000
|
trusted library allocation
|
page read and write
|
||
1B0E18EC000
|
trusted library allocation
|
page read and write
|
||
1B0E5522000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
245871DA000
|
heap
|
page read and write
|
||
1B0E1358000
|
trusted library allocation
|
page read and write
|
||
1B0E2CC5000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0DA9BF000
|
trusted library allocation
|
page read and write
|
||
1B0E37EF000
|
trusted library allocation
|
page read and write
|
||
1B0D8861000
|
trusted library allocation
|
page read and write
|
||
1B0DB85D000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DADCD000
|
trusted library allocation
|
page read and write
|
||
1B0DA941000
|
trusted library allocation
|
page read and write
|
||
1B0E1699000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E4876000
|
trusted library allocation
|
page read and write
|
||
1B0DCB34000
|
trusted library allocation
|
page read and write
|
||
1B0E135A000
|
trusted library allocation
|
page read and write
|
||
1B0D017B000
|
heap
|
page read and write
|
||
1B0E2CFE000
|
trusted library allocation
|
page read and write
|
||
1B0D61F2000
|
trusted library allocation
|
page read and write
|
||
1FF82FE3000
|
heap
|
page read and write
|
||
1B0DA6F7000
|
trusted library allocation
|
page read and write
|
||
1B0DB864000
|
trusted library allocation
|
page read and write
|
||
1FF82F60000
|
heap
|
page read and write
|
||
1B0E48B9000
|
trusted library allocation
|
page read and write
|
||
1B0DA292000
|
trusted library allocation
|
page read and write
|
||
1B0DAD8F000
|
trusted library allocation
|
page read and write
|
||
1FF82FE8000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DABCE000
|
trusted library allocation
|
page read and write
|
||
1B0DA63F000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0DA6E5000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
245874F0000
|
heap
|
page read and write
|
||
1B0E489B000
|
trusted library allocation
|
page read and write
|
||
1B0E553A000
|
trusted library allocation
|
page read and write
|
||
1B0D9A9A000
|
trusted library allocation
|
page read and write
|
||
1B0DCE00000
|
trusted library allocation
|
page read and write
|
||
1B0E53C7000
|
trusted library allocation
|
page read and write
|
||
1FF821F0000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E12F4000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DAB94000
|
trusted library allocation
|
page read and write
|
||
1B0DB498000
|
trusted library allocation
|
page read and write
|
||
1B0E1174000
|
trusted library allocation
|
page read and write
|
||
1B0E19E6000
|
trusted library allocation
|
page read and write
|
||
1B0E11A9000
|
trusted library allocation
|
page read and write
|
||
1B0E2D33000
|
trusted library allocation
|
page read and write
|
||
1B0E5524000
|
trusted library allocation
|
page read and write
|
||
1B0E52DD000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0E543C000
|
trusted library allocation
|
page read and write
|
||
1B0DC594000
|
trusted library allocation
|
page read and write
|
||
1B0E48B9000
|
trusted library allocation
|
page read and write
|
||
237F7370000
|
heap
|
page read and write
|
||
1B0D932E000
|
trusted library allocation
|
page read and write
|
||
1B0DA16D000
|
trusted library allocation
|
page read and write
|
||
1B0DC5D2000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1FF82381000
|
trusted library allocation
|
page read and write
|
||
1B0E109F000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D6451000
|
trusted library allocation
|
page read and write
|
||
1B0DB55A000
|
trusted library allocation
|
page read and write
|
||
1B0E48AB000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0DB9DE000
|
trusted library allocation
|
page read and write
|
||
1B0DAAD0000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DC542000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E2CBB000
|
trusted library allocation
|
page read and write
|
||
9C2163E000
|
unkown
|
page readonly
|
||
1B0DA676000
|
trusted library allocation
|
page read and write
|
||
1B0E1151000
|
trusted library allocation
|
page read and write
|
||
1B0DA9FB000
|
trusted library allocation
|
page read and write
|
||
1FF82F01000
|
heap
|
page read and write
|
||
1B0DC6E7000
|
trusted library allocation
|
page read and write
|
||
1B0E48C1000
|
trusted library allocation
|
page read and write
|
||
1FF8235F000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0E18F8000
|
trusted library allocation
|
page read and write
|
||
1FF82FEA000
|
heap
|
page read and write
|
||
1B0E11CC000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0E19ED000
|
trusted library allocation
|
page read and write
|
||
1B0E2AF2000
|
trusted library allocation
|
page read and write
|
||
1B0D01E7000
|
heap
|
page read and write
|
||
1FF82F60000
|
heap
|
page read and write
|
||
1B0E48F2000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E563F000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D931C000
|
trusted library allocation
|
page read and write
|
||
1B0E18DD000
|
trusted library allocation
|
page read and write
|
||
1B0E16D6000
|
trusted library allocation
|
page read and write
|
||
1B0D01B3000
|
heap
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0DA3C8000
|
trusted library allocation
|
page read and write
|
||
1B0D9087000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E2C94000
|
trusted library allocation
|
page read and write
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
1B0E12B0000
|
trusted library allocation
|
page read and write
|
||
1B0E1837000
|
trusted library allocation
|
page read and write
|
||
1B0DB870000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F3000
|
trusted library allocation
|
page read and write
|
||
1B0DC66E000
|
trusted library allocation
|
page read and write
|
||
1B0D0167000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DAD74000
|
trusted library allocation
|
page read and write
|
||
1B0E18EA000
|
trusted library allocation
|
page read and write
|
||
1B0E2AFA000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D64C7000
|
trusted library allocation
|
page read and write
|
||
1FF82FE6000
|
heap
|
page read and write
|
||
1B0DABDE000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D017C000
|
heap
|
page read and write
|
||
1B0D93C5000
|
trusted library allocation
|
page read and write
|
||
1B0E2AFB000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0D908A000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0E53AA000
|
trusted library allocation
|
page read and write
|
||
1B0E3A43000
|
trusted library allocation
|
page read and write
|
||
1B0D9DA2000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0D93E7000
|
trusted library allocation
|
page read and write
|
||
1B0DA9E7000
|
trusted library allocation
|
page read and write
|
||
1B0DAA8E000
|
trusted library allocation
|
page read and write
|
||
1B0E1A91000
|
trusted library allocation
|
page read and write
|
||
1B0D9867000
|
trusted library allocation
|
page read and write
|
||
1B0E5378000
|
trusted library allocation
|
page read and write
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
1B0E48F2000
|
trusted library allocation
|
page read and write
|
||
1B0D0185000
|
heap
|
page read and write
|
||
1B0DB87A000
|
trusted library allocation
|
page read and write
|
||
26AC8DE0000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0DCBC4000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E3B57000
|
trusted library allocation
|
page read and write
|
||
1B0E5445000
|
trusted library allocation
|
page read and write
|
||
1B0D9DC5000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
9C1E3FE000
|
stack
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0DA6FB000
|
trusted library allocation
|
page read and write
|
||
1B0D914E000
|
trusted library allocation
|
page read and write
|
||
1B0D903C000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0DABE9000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0E1835000
|
trusted library allocation
|
page read and write
|
||
1B0E37FB000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0DA148000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
1B0D0186000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D016D000
|
heap
|
page read and write
|
||
1B0E10B9000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0DB684000
|
trusted library allocation
|
page read and write
|
||
1B0DAD84000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0DB859000
|
trusted library allocation
|
page read and write
|
||
F4A653E000
|
unkown
|
page readonly
|
||
1B0DAB29000
|
trusted library allocation
|
page read and write
|
||
1B0E53B5000
|
trusted library allocation
|
page read and write
|
||
1B0D4BB3000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
26AC92C0000
|
heap
|
page read and write
|
||
1B0DA2B1000
|
trusted library allocation
|
page read and write
|
||
1B0D9AD3000
|
trusted library allocation
|
page read and write
|
||
1B0E19D3000
|
trusted library allocation
|
page read and write
|
||
1B0E18F2000
|
trusted library allocation
|
page read and write
|
||
1B0D01A8000
|
heap
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1FF83067000
|
heap
|
page read and write
|
||
1B0E19EF000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0D01AD000
|
heap
|
page read and write
|
||
1B0D01A1000
|
heap
|
page read and write
|
||
1B0D61F2000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0E52A9000
|
trusted library allocation
|
page read and write
|
||
1B0DB49E000
|
trusted library allocation
|
page read and write
|
||
1B0DAA84000
|
trusted library allocation
|
page read and write
|
||
1B0E2D61000
|
trusted library allocation
|
page read and write
|
||
1B0E112E000
|
trusted library allocation
|
page read and write
|
||
1B0D01B2000
|
heap
|
page read and write
|
||
1B0D01EC000
|
heap
|
page read and write
|
||
1B0E11A9000
|
trusted library allocation
|
page read and write
|
||
1B0DA9C2000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0DA93C000
|
trusted library allocation
|
page read and write
|
||
1B0DA9F9000
|
trusted library allocation
|
page read and write
|
||
1B0DAB2E000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0E1835000
|
trusted library allocation
|
page read and write
|
||
1B0D64EB000
|
trusted library allocation
|
page read and write
|
||
1B0DAB56000
|
trusted library allocation
|
page read and write
|
||
1B0D88C8000
|
trusted library allocation
|
page read and write
|
||
1B0E2AF4000
|
trusted library allocation
|
page read and write
|
||
1B0DA282000
|
trusted library allocation
|
page read and write
|
||
1B0E11A4000
|
trusted library allocation
|
page read and write
|
||
1B0E4F9F000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0DADBA000
|
trusted library allocation
|
page read and write
|
||
1B0E52A9000
|
trusted library allocation
|
page read and write
|
||
1B0DAAB9000
|
trusted library allocation
|
page read and write
|
||
1B0DA6A8000
|
trusted library allocation
|
page read and write
|
||
1B0E48C4000
|
trusted library allocation
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
1B0D01D9000
|
heap
|
page read and write
|
||
1B0D01A1000
|
heap
|
page read and write
|
||
8921BD8000
|
stack
|
page read and write
|
||
1B0DC66E000
|
trusted library allocation
|
page read and write
|
||
1B0E10C0000
|
trusted library allocation
|
page read and write
|
||
1B0DCBE3000
|
trusted library allocation
|
page read and write
|
||
1B0DAB99000
|
trusted library allocation
|
page read and write
|
||
1B0DADA0000
|
trusted library allocation
|
page read and write
|
||
1B0D01E7000
|
heap
|
page read and write
|
||
1B0E114C000
|
trusted library allocation
|
page read and write
|
||
1B0D6141000
|
trusted library allocation
|
page read and write
|
||
1B0D907D000
|
trusted library allocation
|
page read and write
|
||
1B0DAADB000
|
trusted library allocation
|
page read and write
|
||
1B0DB8F2000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
1FF82FE0000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
237F758F000
|
trusted library allocation
|
page read and write
|
||
1B0DCBFA000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E11F9000
|
trusted library allocation
|
page read and write
|
||
1B0E19D3000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
1B0D0226000
|
heap
|
page read and write
|
||
1B0DA2D9000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0E1378000
|
trusted library allocation
|
page read and write
|
||
237F755D000
|
trusted library allocation
|
page read and write
|
||
1B0D91B9000
|
trusted library allocation
|
page read and write
|
||
1B0D8F94000
|
trusted library allocation
|
page read and write
|
||
1B0E48C4000
|
trusted library allocation
|
page read and write
|
||
1B0DA94A000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DAD93000
|
trusted library allocation
|
page read and write
|
||
1B0E536F000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E53D3000
|
trusted library allocation
|
page read and write
|
||
1B0E18F2000
|
trusted library allocation
|
page read and write
|
||
1B0D4B81000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E39C8000
|
trusted library allocation
|
page read and write
|
||
1B0D017B000
|
heap
|
page read and write
|
||
1B0D91C7000
|
trusted library allocation
|
page read and write
|
||
1B0D01F1000
|
heap
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DA2D3000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
1B0E1479000
|
trusted library allocation
|
page read and write
|
||
1B0E2DFB000
|
trusted library allocation
|
page read and write
|
||
1B0E19F5000
|
trusted library allocation
|
page read and write
|
||
1B0DC594000
|
trusted library allocation
|
page read and write
|
||
1B0E11CC000
|
trusted library allocation
|
page read and write
|
||
1B0DAB4C000
|
trusted library allocation
|
page read and write
|
||
1B0D8F6A000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
24588DAA000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
26AC8DA0000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E48C4000
|
trusted library allocation
|
page read and write
|
||
1B0DB9DC000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E57E1000
|
heap
|
page read and write
|
||
1B0DC7E6000
|
trusted library allocation
|
page read and write
|
||
1B0E57E1000
|
heap
|
page read and write
|
||
1B0DA66B000
|
trusted library allocation
|
page read and write
|
||
1B0D914C000
|
trusted library allocation
|
page read and write
|
||
1B0E11BB000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
E77C7FE000
|
stack
|
page read and write
|
||
1B0DB660000
|
trusted library allocation
|
page read and write
|
||
1FF82FE8000
|
heap
|
page read and write
|
||
1B0DA1FB000
|
trusted library allocation
|
page read and write
|
||
1B0E18E6000
|
trusted library allocation
|
page read and write
|
||
1B0DA635000
|
trusted library allocation
|
page read and write
|
||
1B0DCBE3000
|
trusted library allocation
|
page read and write
|
||
1B0E19EB000
|
trusted library allocation
|
page read and write
|
||
1B0D0184000
|
heap
|
page read and write
|
||
1B0E51A4000
|
trusted library allocation
|
page read and write
|
||
9C2167E000
|
stack
|
page read and write
|
||
1B0D01EC000
|
heap
|
page read and write
|
||
1B0E51B1000
|
trusted library allocation
|
page read and write
|
||
1B0DA669000
|
trusted library allocation
|
page read and write
|
||
1B0DA943000
|
trusted library allocation
|
page read and write
|
||
1B0DC586000
|
trusted library allocation
|
page read and write
|
||
1B0E1A80000
|
trusted library allocation
|
page read and write
|
||
1FF83044000
|
heap
|
page read and write
|
||
1B0DC7BC000
|
trusted library allocation
|
page read and write
|
||
1B0DABB9000
|
trusted library allocation
|
page read and write
|
||
1B0E56AF000
|
trusted library allocation
|
page read and write
|
||
1B0E1159000
|
trusted library allocation
|
page read and write
|
||
1B0DAAD0000
|
trusted library allocation
|
page read and write
|
||
1B0D8F8A000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DA6F0000
|
trusted library allocation
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0DA6E5000
|
trusted library allocation
|
page read and write
|
||
1B0DABB9000
|
trusted library allocation
|
page read and write
|
||
1B0E117D000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0D88CD000
|
trusted library allocation
|
page read and write
|
||
1B0DCB48000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F3000
|
trusted library allocation
|
page read and write
|
||
1B0E48F2000
|
trusted library allocation
|
page read and write
|
||
1B0E2DE9000
|
trusted library allocation
|
page read and write
|
||
1B0D01B9000
|
heap
|
page read and write
|
||
1B0D9179000
|
trusted library allocation
|
page read and write
|
||
1B0E1230000
|
trusted library allocation
|
page read and write
|
||
1B0D8B99000
|
heap
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0E16C7000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0E5382000
|
trusted library allocation
|
page read and write
|
||
1B0DC510000
|
trusted library allocation
|
page read and write
|
||
1B0D98FC000
|
trusted library allocation
|
page read and write
|
||
1B0E147B000
|
trusted library allocation
|
page read and write
|
||
1B0DB8B0000
|
trusted library allocation
|
page read and write
|
||
1B0E1479000
|
trusted library allocation
|
page read and write
|
||
1B0E18F2000
|
trusted library allocation
|
page read and write
|
||
1B0E119E000
|
trusted library allocation
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0DCBA9000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0DA34B000
|
trusted library allocation
|
page read and write
|
||
1B0E12E4000
|
trusted library allocation
|
page read and write
|
||
1B0DB875000
|
trusted library allocation
|
page read and write
|
||
1B0DA676000
|
trusted library allocation
|
page read and write
|
||
1B0E52C2000
|
trusted library allocation
|
page read and write
|
||
1B0D9DC1000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0D90CE000
|
trusted library allocation
|
page read and write
|
||
1B0E5234000
|
trusted library allocation
|
page read and write
|
||
1B0E135A000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0D01A1000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1FF82F69000
|
heap
|
page read and write
|
||
237F7549000
|
trusted library allocation
|
page read and write
|
||
26AC8F3F000
|
unclassified section
|
page read and write
|
||
1B0DA2D9000
|
trusted library allocation
|
page read and write
|
||
1B0E11BB000
|
trusted library allocation
|
page read and write
|
||
1B0E552C000
|
trusted library allocation
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
1B0E53CF000
|
trusted library allocation
|
page read and write
|
||
1B0E19ED000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D017C000
|
heap
|
page read and write
|
||
1B0E5542000
|
trusted library allocation
|
page read and write
|
||
F4A41CE000
|
stack
|
page read and write
|
||
1B0DB4DF000
|
trusted library allocation
|
page read and write
|
||
1FF83044000
|
heap
|
page read and write
|
||
1B0D9195000
|
trusted library allocation
|
page read and write
|
||
1B0DC8E2000
|
trusted library allocation
|
page read and write
|
||
1B0D8F78000
|
trusted library allocation
|
page read and write
|
||
1B0E2DED000
|
trusted library allocation
|
page read and write
|
||
26AC8F70000
|
unclassified section
|
page readonly
|
||
1B0D017F000
|
heap
|
page read and write
|
||
1B0DB8B6000
|
trusted library allocation
|
page read and write
|
||
1B0DB8ED000
|
trusted library allocation
|
page read and write
|
||
1B0E52C2000
|
trusted library allocation
|
page read and write
|
||
1B0DC6EF000
|
trusted library allocation
|
page read and write
|
||
1B0D0216000
|
heap
|
page read and write
|
||
1B0D6532000
|
trusted library allocation
|
page read and write
|
||
1B0DB9E1000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D908A000
|
trusted library allocation
|
page read and write
|
||
1B0E1968000
|
trusted library allocation
|
page read and write
|
||
1B0DC6E7000
|
trusted library allocation
|
page read and write
|
||
1FF82F63000
|
heap
|
page read and write
|
||
1B0E51EF000
|
trusted library allocation
|
page read and write
|
||
1B0E14B8000
|
trusted library allocation
|
page read and write
|
||
1B0D0191000
|
heap
|
page read and write
|
||
1B0D8990000
|
trusted library allocation
|
page read and write
|
||
1B0E19D1000
|
trusted library allocation
|
page read and write
|
||
1B0DA6F5000
|
trusted library allocation
|
page read and write
|
||
1B0E54BF000
|
trusted library allocation
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
1B0DA979000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
26AC8E98000
|
trusted library allocation
|
page read and write
|
||
1B0E5191000
|
trusted library allocation
|
page read and write
|
||
1B0DC7C6000
|
trusted library allocation
|
page read and write
|
||
1B0E18EC000
|
trusted library allocation
|
page read and write
|
||
1B0E6037000
|
trusted library allocation
|
page read and write
|
||
1B0E2D46000
|
trusted library allocation
|
page read and write
|
||
1B0DA990000
|
trusted library allocation
|
page read and write
|
||
1B0E11AE000
|
trusted library allocation
|
page read and write
|
||
1B0D019D000
|
heap
|
page read and write
|
||
1B0E520A000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0E51CD000
|
trusted library allocation
|
page read and write
|
||
1B0E1A9D000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0E5482000
|
trusted library allocation
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
1B0DA339000
|
trusted library allocation
|
page read and write
|
||
1B0E18EA000
|
trusted library allocation
|
page read and write
|
||
1B0D913D000
|
trusted library allocation
|
page read and write
|
||
1B0DC7C2000
|
trusted library allocation
|
page read and write
|
||
1B0DA2D3000
|
trusted library allocation
|
page read and write
|
||
1B0E582D000
|
heap
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
26AC8F40000
|
heap
|
page read and write
|
||
1B0E11AE000
|
trusted library allocation
|
page read and write
|
||
1B0E136C000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0D934E000
|
trusted library allocation
|
page read and write
|
||
1B0DABBE000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
1B0DA23C000
|
trusted library allocation
|
page read and write
|
||
1B0DA136000
|
trusted library allocation
|
page read and write
|
||
1B0D0186000
|
heap
|
page read and write
|
||
1B0DB42B000
|
trusted library allocation
|
page read and write
|
||
1B0DAD96000
|
trusted library allocation
|
page read and write
|
||
1B0E51B3000
|
trusted library allocation
|
page read and write
|
||
1B0DC573000
|
trusted library allocation
|
page read and write
|
||
1B0DAD72000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0DCF8A000
|
trusted library allocation
|
page read and write
|
||
1B0E53B0000
|
trusted library allocation
|
page read and write
|
||
1B0E2AFB000
|
trusted library allocation
|
page read and write
|
||
1B0DB644000
|
trusted library allocation
|
page read and write
|
||
1B0DAB59000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0DB8F8000
|
trusted library allocation
|
page read and write
|
||
1FF82FB9000
|
heap
|
page read and write
|
||
1B0E5520000
|
trusted library allocation
|
page read and write
|
||
1B0D9332000
|
trusted library allocation
|
page read and write
|
||
1B0D91D8000
|
trusted library allocation
|
page read and write
|
||
1B0E182C000
|
trusted library allocation
|
page read and write
|
||
1B0DAD8F000
|
trusted library allocation
|
page read and write
|
||
1B0E12E0000
|
trusted library allocation
|
page read and write
|
||
1B0E1A9D000
|
trusted library allocation
|
page read and write
|
||
1B0E1806000
|
trusted library allocation
|
page read and write
|
||
1B0D61A4000
|
trusted library allocation
|
page read and write
|
||
1B0DC73A000
|
trusted library allocation
|
page read and write
|
||
1B0E5698000
|
trusted library allocation
|
page read and write
|
||
1B0DA2E7000
|
trusted library allocation
|
page read and write
|
||
1B0E12A5000
|
trusted library allocation
|
page read and write
|
||
1B0DAB9B000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0DADA8000
|
trusted library allocation
|
page read and write
|
||
1B0E5367000
|
trusted library allocation
|
page read and write
|
||
1B0D8E00000
|
trusted library allocation
|
page read and write
|
||
1FF82FF1000
|
heap
|
page read and write
|
||
1B0DB6A1000
|
trusted library allocation
|
page read and write
|
||
9C236BE000
|
unkown
|
page readonly
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
26AC8E47000
|
trusted library allocation
|
page read and write
|
||
1B0D919C000
|
trusted library allocation
|
page read and write
|
||
28D902A0000
|
heap
|
page read and write
|
||
E12000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E2CAA000
|
trusted library allocation
|
page read and write
|
||
1B0DB81D000
|
trusted library allocation
|
page read and write
|
||
9C205FE000
|
unkown
|
page readonly
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DAB86000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D01E9000
|
heap
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DAB8A000
|
trusted library allocation
|
page read and write
|
||
1B0D0184000
|
heap
|
page read and write
|
||
E77CFFE000
|
stack
|
page read and write
|
||
237F7807000
|
trusted library allocation
|
page read and write
|
||
1B0D01A1000
|
heap
|
page read and write
|
||
1B0E1292000
|
trusted library allocation
|
page read and write
|
||
1B0D019B000
|
heap
|
page read and write
|
||
1B0DA30A000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D0186000
|
heap
|
page read and write
|
||
1B0DABF1000
|
trusted library allocation
|
page read and write
|
||
1B0E4F75000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0D91CD000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0DAB47000
|
trusted library allocation
|
page read and write
|
||
1B0DCEF1000
|
trusted library allocation
|
page read and write
|
||
26AC9132000
|
trusted library allocation
|
page read and write
|
||
1B0E53E2000
|
trusted library allocation
|
page read and write
|
||
1B0DAB5B000
|
trusted library allocation
|
page read and write
|
||
1B0D0184000
|
heap
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0E552D000
|
trusted library allocation
|
page read and write
|
||
1B0E486D000
|
trusted library allocation
|
page read and write
|
||
1B0DCB8B000
|
trusted library allocation
|
page read and write
|
||
1B0E16E6000
|
trusted library allocation
|
page read and write
|
||
1B0E11F2000
|
trusted library allocation
|
page read and write
|
||
1B0E16DF000
|
trusted library allocation
|
page read and write
|
||
1B0DADA6000
|
trusted library allocation
|
page read and write
|
||
1B0E1165000
|
trusted library allocation
|
page read and write
|
||
1B0E53E2000
|
trusted library allocation
|
page read and write
|
||
1B0E2BC7000
|
trusted library allocation
|
page read and write
|
||
1B0E2DEB000
|
trusted library allocation
|
page read and write
|
||
1B0DB9C7000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0DAD23000
|
trusted library allocation
|
page read and write
|
||
1B0E19DB000
|
trusted library allocation
|
page read and write
|
||
1B0D4BDF000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0E1140000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0E553C000
|
trusted library allocation
|
page read and write
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0E5386000
|
trusted library allocation
|
page read and write
|
||
1B0DB3AA000
|
trusted library allocation
|
page read and write
|
||
1FF8239F000
|
trusted library allocation
|
page read and write
|
||
1B0D88E0000
|
trusted library allocation
|
page read and write
|
||
1B0E3A86000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E51B3000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E10BB000
|
trusted library allocation
|
page read and write
|
||
1B0DACF6000
|
trusted library allocation
|
page read and write
|
||
1B0DA9B4000
|
trusted library allocation
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0DABB8000
|
trusted library allocation
|
page read and write
|
||
1B0DAB6C000
|
trusted library allocation
|
page read and write
|
||
1B0DA970000
|
trusted library allocation
|
page read and write
|
||
1B0E529E000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D89C9000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0E5277000
|
trusted library allocation
|
page read and write
|
||
1B0E16FB000
|
trusted library allocation
|
page read and write
|
||
1B0DB809000
|
trusted library allocation
|
page read and write
|
||
1B0D8BD0000
|
heap
|
page read and write
|
||
1B0D0188000
|
heap
|
page read and write
|
||
1B0E2AF6000
|
trusted library allocation
|
page read and write
|
||
1B0DC5F2000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D9187000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0D9AFD000
|
trusted library allocation
|
page read and write
|
||
1B0DC86F000
|
trusted library allocation
|
page read and write
|
||
1B0E11E2000
|
trusted library allocation
|
page read and write
|
||
1B0E54CD000
|
trusted library allocation
|
page read and write
|
||
1B0DA106000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D017A000
|
heap
|
page read and write
|
||
1B0E54BF000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D01CC000
|
heap
|
page read and write
|
||
1B0D017C000
|
heap
|
page read and write
|
||
1B0D90A5000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D01A4000
|
heap
|
page read and write
|
||
1B0DA6E5000
|
trusted library allocation
|
page read and write
|
||
1B0D8F47000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E18C5000
|
trusted library allocation
|
page read and write
|
||
1B0DAD6F000
|
trusted library allocation
|
page read and write
|
||
1B0E2BB6000
|
trusted library allocation
|
page read and write
|
||
1B0D01D3000
|
heap
|
page read and write
|
||
1B0E19F5000
|
trusted library allocation
|
page read and write
|
||
1B0DABF3000
|
trusted library allocation
|
page read and write
|
||
1B0DAAAF000
|
trusted library allocation
|
page read and write
|
||
1B0E1AF8000
|
trusted library allocation
|
page read and write
|
||
1FF82456000
|
heap
|
page read and write
|
||
1B0DAD23000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DC6E9000
|
trusted library allocation
|
page read and write
|
||
1B0D913B000
|
trusted library allocation
|
page read and write
|
||
1B0E4F7A000
|
trusted library allocation
|
page read and write
|
||
1B0D8F84000
|
trusted library allocation
|
page read and write
|
||
1B0E486B000
|
trusted library allocation
|
page read and write
|
||
1B0E53AA000
|
trusted library allocation
|
page read and write
|
||
1B0E14C1000
|
trusted library allocation
|
page read and write
|
||
1B0DCBB9000
|
trusted library allocation
|
page read and write
|
||
1B0E14AA000
|
trusted library allocation
|
page read and write
|
||
1B0E16FE000
|
trusted library allocation
|
page read and write
|
||
1B0DADC3000
|
trusted library allocation
|
page read and write
|
||
1B0DA6B7000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
1B0DB8B0000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1FF82E17000
|
trusted library allocation
|
page read and write
|
||
1B0D9DC8000
|
trusted library allocation
|
page read and write
|
||
1B0DB689000
|
trusted library allocation
|
page read and write
|
||
1B0DA6FB000
|
trusted library allocation
|
page read and write
|
||
1B0DA176000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
1B0E53D1000
|
trusted library allocation
|
page read and write
|
||
1B0E2D41000
|
trusted library allocation
|
page read and write
|
||
1B0D913D000
|
trusted library allocation
|
page read and write
|
||
1B0E1585000
|
trusted library allocation
|
page read and write
|
||
1B0D8F5E000
|
trusted library allocation
|
page read and write
|
||
1B0E18E6000
|
trusted library allocation
|
page read and write
|
||
1B0E54EC000
|
trusted library allocation
|
page read and write
|
||
8924C7E000
|
stack
|
page read and write
|
||
1B0D01E7000
|
heap
|
page read and write
|
||
1B0D01F1000
|
heap
|
page read and write
|
||
1B0E37C3000
|
trusted library allocation
|
page read and write
|
||
1B0DAB9B000
|
trusted library allocation
|
page read and write
|
||
1B0D6196000
|
trusted library allocation
|
page read and write
|
||
1B0E18C8000
|
trusted library allocation
|
page read and write
|
||
1B0E51DD000
|
trusted library allocation
|
page read and write
|
||
1B0E14AF000
|
trusted library allocation
|
page read and write
|
||
1B0E12E5000
|
trusted library allocation
|
page read and write
|
||
1B0E2DFB000
|
trusted library allocation
|
page read and write
|
||
1B0D88DC000
|
trusted library allocation
|
page read and write
|
||
1B0E12E4000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0D01CE000
|
heap
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0DCBC4000
|
trusted library allocation
|
page read and write
|
||
1B0E1A61000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0E1A52000
|
trusted library allocation
|
page read and write
|
||
1B0E12BA000
|
trusted library allocation
|
page read and write
|
||
1B0DB858000
|
trusted library allocation
|
page read and write
|
||
1B0E2D41000
|
trusted library allocation
|
page read and write
|
||
1B0E4886000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
1B0DB67B000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0E19E1000
|
trusted library allocation
|
page read and write
|
||
1B0D9061000
|
trusted library allocation
|
page read and write
|
||
1B0DB84E000
|
trusted library allocation
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
1B0D521B000
|
trusted library allocation
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0D9053000
|
trusted library allocation
|
page read and write
|
||
1B0DAD0E000
|
trusted library allocation
|
page read and write
|
||
1B0D93C2000
|
trusted library allocation
|
page read and write
|
||
1B0D93D5000
|
trusted library allocation
|
page read and write
|
||
1B0D908C000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1FF83059000
|
heap
|
page read and write
|
||
1B0D88DB000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0DA21C000
|
trusted library allocation
|
page read and write
|
||
9C20DFE000
|
stack
|
page read and write
|
||
1B0DCBB9000
|
trusted library allocation
|
page read and write
|
||
1B0E2CBB000
|
trusted library allocation
|
page read and write
|
||
1B0D8984000
|
trusted library allocation
|
page read and write
|
||
1B0E14D1000
|
trusted library allocation
|
page read and write
|
||
1B0DB58B000
|
trusted library allocation
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
1B0DCB8B000
|
trusted library allocation
|
page read and write
|
||
1B0D01F2000
|
heap
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D9370000
|
trusted library allocation
|
page read and write
|
||
1B0DA34D000
|
trusted library allocation
|
page read and write
|
||
1B0DA63D000
|
trusted library allocation
|
page read and write
|
||
1B0E52C2000
|
trusted library allocation
|
page read and write
|
||
1B0E19EB000
|
trusted library allocation
|
page read and write
|
||
1B0E11E2000
|
trusted library allocation
|
page read and write
|
||
1B0E4F9F000
|
trusted library allocation
|
page read and write
|
||
1B0DCFAC000
|
trusted library allocation
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0D01D7000
|
heap
|
page read and write
|
||
237F750C000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0E538E000
|
trusted library allocation
|
page read and write
|
||
1B0E13A9000
|
trusted library allocation
|
page read and write
|
||
1B0E538E000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
237F7503000
|
trusted library allocation
|
page read and write
|
||
1B0DAB90000
|
trusted library allocation
|
page read and write
|
||
1B0E1228000
|
trusted library allocation
|
page read and write
|
||
1B0E19E6000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0D0185000
|
heap
|
page read and write
|
||
1B0E14C1000
|
trusted library allocation
|
page read and write
|
||
1B0DB6BE000
|
trusted library allocation
|
page read and write
|
||
1B0D649A000
|
trusted library allocation
|
page read and write
|
||
1B0DA2F6000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0DB870000
|
trusted library allocation
|
page read and write
|
||
1B0E5382000
|
trusted library allocation
|
page read and write
|
||
1B0E3B33000
|
trusted library allocation
|
page read and write
|
||
1B0D619C000
|
trusted library allocation
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0E19ED000
|
trusted library allocation
|
page read and write
|
||
1B0D01E1000
|
heap
|
page read and write
|
||
1B0D0169000
|
heap
|
page read and write
|
||
1B0DAA50000
|
trusted library allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0E5277000
|
trusted library allocation
|
page read and write
|
||
1FF83000000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0DB4DF000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0E1697000
|
trusted library allocation
|
page read and write
|
||
1FF82FEA000
|
heap
|
page read and write
|
||
1B0DA6F0000
|
trusted library allocation
|
page read and write
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0E11A6000
|
trusted library allocation
|
page read and write
|
||
1B0E165B000
|
trusted library allocation
|
page read and write
|
||
1B0D649D000
|
trusted library allocation
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
1B0DAA80000
|
trusted library allocation
|
page read and write
|
||
1B0D5282000
|
trusted library allocation
|
page read and write
|
||
1B0E5364000
|
trusted library allocation
|
page read and write
|
||
1B0DA6EC000
|
trusted library allocation
|
page read and write
|
||
1B0DCB37000
|
trusted library allocation
|
page read and write
|
||
1B0DB5BC000
|
trusted library allocation
|
page read and write
|
||
1B0DB88A000
|
trusted library allocation
|
page read and write
|
||
1B0E18DB000
|
trusted library allocation
|
page read and write
|
||
1B0D0186000
|
heap
|
page read and write
|
||
1B0DCBB9000
|
trusted library allocation
|
page read and write
|
||
1B0D63B0000
|
trusted library allocation
|
page read and write
|
||
1B0E53BC000
|
trusted library allocation
|
page read and write
|
||
245871D4000
|
heap
|
page read and write
|
||
1B0DAB9B000
|
trusted library allocation
|
page read and write
|
||
1B0DA9ED000
|
trusted library allocation
|
page read and write
|
||
1B0E1165000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E2CFE000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0D9975000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0E1ABC000
|
trusted library allocation
|
page read and write
|
||
1B0D01D0000
|
heap
|
page read and write
|
||
1B0DC5A4000
|
trusted library allocation
|
page read and write
|
||
1B0D0182000
|
heap
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0DA2C3000
|
trusted library allocation
|
page read and write
|
||
1B0E584A000
|
heap
|
page read and write
|
||
1B0E1827000
|
trusted library allocation
|
page read and write
|
||
1B0E2CFE000
|
trusted library allocation
|
page read and write
|
||
1B0DAA74000
|
trusted library allocation
|
page read and write
|
||
1B0D64EB000
|
trusted library allocation
|
page read and write
|
||
1B0DA2C3000
|
trusted library allocation
|
page read and write
|
||
1B0E11C1000
|
trusted library allocation
|
page read and write
|
||
1FF82F69000
|
heap
|
page read and write
|
||
1B0DB890000
|
trusted library allocation
|
page read and write
|
||
1B0DAB83000
|
trusted library allocation
|
page read and write
|
||
1B0E2D33000
|
trusted library allocation
|
page read and write
|
||
1B0E5382000
|
trusted library allocation
|
page read and write
|
||
1B0DAB9B000
|
trusted library allocation
|
page read and write
|
||
1B0DC7EC000
|
trusted library allocation
|
page read and write
|
||
1B0E10C8000
|
trusted library allocation
|
page read and write
|
||
1B0D91CE000
|
trusted library allocation
|
page read and write
|
||
1B0E19CE000
|
trusted library allocation
|
page read and write
|
||
1B0D644E000
|
trusted library allocation
|
page read and write
|
||
1B0D018F000
|
heap
|
page read and write
|
||
1B0D527D000
|
trusted library allocation
|
page read and write
|
||
1B0E52D7000
|
trusted library allocation
|
page read and write
|
||
1B0DA262000
|
trusted library allocation
|
page read and write
|
||
1B0DB3F8000
|
trusted library allocation
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1B0D63ED000
|
trusted library allocation
|
page read and write
|
||
1B0E53C1000
|
trusted library allocation
|
page read and write
|
||
1B0E11F9000
|
trusted library allocation
|
page read and write
|
||
1B0E53BC000
|
trusted library allocation
|
page read and write
|
||
237F7400000
|
trusted library allocation
|
page read and write
|
||
1B0E18FD000
|
trusted library allocation
|
page read and write
|
||
1FF82FE0000
|
heap
|
page read and write
|
||
1B0DCB48000
|
trusted library allocation
|
page read and write
|
||
1B0DAA52000
|
trusted library allocation
|
page read and write
|
||
1B0D919D000
|
trusted library allocation
|
page read and write
|
||
1B0E1184000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E2DD1000
|
trusted library allocation
|
page read and write
|
||
1B0D01E9000
|
heap
|
page read and write
|
||
1B0D0175000
|
heap
|
page read and write
|
||
1B0DA1D2000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1FF821A2000
|
unclassified section
|
page read and write
|
||
1B0E16EF000
|
trusted library allocation
|
page read and write
|
||
1B0E54E9000
|
trusted library allocation
|
page read and write
|
||
1B0DB875000
|
trusted library allocation
|
page read and write
|
||
1B0D0163000
|
heap
|
page read and write
|
||
C2C000
|
unkown
|
page read and write
|
||
1B0D887A000
|
trusted library allocation
|
page read and write
|
||
1B0D614F000
|
trusted library allocation
|
page read and write
|
||
1B0DA3C2000
|
trusted library allocation
|
page read and write
|
||
26AC9100000
|
trusted library allocation
|
page read and write
|
||
1B0DCBB1000
|
trusted library allocation
|
page read and write
|
||
1B0D93D5000
|
trusted library allocation
|
page read and write
|
||
26AC8F43000
|
heap
|
page read and write
|
||
1B0DA2A1000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
9C1EDD8000
|
stack
|
page read and write
|
||
1B0D0186000
|
heap
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0D99CF000
|
trusted library allocation
|
page read and write
|
||
1B0E18EC000
|
trusted library allocation
|
page read and write
|
||
1B0E1165000
|
trusted library allocation
|
page read and write
|
||
1B0D8B9A000
|
heap
|
page read and write
|
||
1B0D018C000
|
heap
|
page read and write
|
||
1B0DA6B5000
|
trusted library allocation
|
page read and write
|
||
1B0DCBAD000
|
trusted library allocation
|
page read and write
|
||
1B0E2CC5000
|
trusted library allocation
|
page read and write
|
||
1B0DADA0000
|
trusted library allocation
|
page read and write
|
||
26AC913D000
|
trusted library allocation
|
page read and write
|
||
1B0D8F61000
|
trusted library allocation
|
page read and write
|
||
1B0D0181000
|
heap
|
page read and write
|
||
1B0E2AFB000
|
trusted library allocation
|
page read and write
|
||
1B0DA3D7000
|
trusted library allocation
|
page read and write
|
||
1B0DA25D000
|
trusted library allocation
|
page read and write
|
||
1B0DAD92000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0DB886000
|
trusted library allocation
|
page read and write
|
||
1B0E1699000
|
trusted library allocation
|
page read and write
|
||
1B0DC7E4000
|
trusted library allocation
|
page read and write
|
||
1B0E1596000
|
trusted library allocation
|
page read and write
|
||
1B0DAB79000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D01F1000
|
heap
|
page read and write
|
||
1B0E11D2000
|
trusted library allocation
|
page read and write
|
||
1B0E583C000
|
heap
|
page read and write
|
||
1B0D019B000
|
heap
|
page read and write
|
||
1B0DAD92000
|
trusted library allocation
|
page read and write
|
||
1B0E39E5000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1B0E18C5000
|
trusted library allocation
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
237F7900000
|
trusted library allocation
|
page read and write
|
||
1B0DCBD0000
|
trusted library allocation
|
page read and write
|
||
1B0DA6EC000
|
trusted library allocation
|
page read and write
|
||
1B0E54EC000
|
trusted library allocation
|
page read and write
|
||
1FF82F09000
|
heap
|
page read and write
|
||
1B0DB54F000
|
trusted library allocation
|
page read and write
|
||
1B0D0164000
|
heap
|
page read and write
|
||
3EE000
|
stack
|
page read and write
|
||
1FF82F8A000
|
heap
|
page read and write
|
||
1B0DA9D2000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E10C4000
|
trusted library allocation
|
page read and write
|
||
1B0DA198000
|
trusted library allocation
|
page read and write
|
||
1B0DABF7000
|
trusted library allocation
|
page read and write
|
||
1B0DCBB1000
|
trusted library allocation
|
page read and write
|
||
1B0DA66E000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D9DE6000
|
trusted library allocation
|
page read and write
|
||
1B0E18FA000
|
trusted library allocation
|
page read and write
|
||
1B0E1840000
|
trusted library allocation
|
page read and write
|
||
1FF83067000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E2DED000
|
trusted library allocation
|
page read and write
|
||
1B0DAD9F000
|
trusted library allocation
|
page read and write
|
||
24587507000
|
trusted library allocation
|
page read and write
|
||
1B0E48E5000
|
trusted library allocation
|
page read and write
|
||
1FF82440000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0E1827000
|
trusted library allocation
|
page read and write
|
||
1B0D88E0000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E5322000
|
trusted library allocation
|
page read and write
|
||
1B0E10B1000
|
trusted library allocation
|
page read and write
|
||
1B0E1A80000
|
trusted library allocation
|
page read and write
|
||
1B0DA181000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E19EB000
|
trusted library allocation
|
page read and write
|
||
F4A64BE000
|
unkown
|
page readonly
|
||
1FF82FE8000
|
heap
|
page read and write
|
||
1B0DA269000
|
trusted library allocation
|
page read and write
|
||
1B0D0199000
|
heap
|
page read and write
|
||
1B0E2BA6000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0E2A9B000
|
trusted library allocation
|
page read and write
|
||
1B0E132B000
|
trusted library allocation
|
page read and write
|
||
1B0DC8DE000
|
trusted library allocation
|
page read and write
|
||
1B0D0194000
|
heap
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
1B0DCF1C000
|
trusted library allocation
|
page read and write
|
||
1B0DAB4B000
|
trusted library allocation
|
page read and write
|
||
1B0DC6D1000
|
trusted library allocation
|
page read and write
|
||
1B0D0180000
|
heap
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0D0199000
|
heap
|
page read and write
|
||
1B0D9152000
|
trusted library allocation
|
page read and write
|
||
1B0D637D000
|
trusted library allocation
|
page read and write
|
||
1B0D01DE000
|
heap
|
page read and write
|
||
1B0D9ACA000
|
trusted library allocation
|
page read and write
|
||
1B0DABB8000
|
trusted library allocation
|
page read and write
|
||
1B0E18EC000
|
trusted library allocation
|
page read and write
|
||
1B0E1691000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
F4A65BE000
|
unkown
|
page readonly
|
||
1B0D01D4000
|
heap
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0E544B000
|
trusted library allocation
|
page read and write
|
||
1B0DAD3B000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DABC9000
|
trusted library allocation
|
page read and write
|
||
1B0D019A000
|
heap
|
page read and write
|
||
1B0DB484000
|
trusted library allocation
|
page read and write
|
||
1B0D909E000
|
trusted library allocation
|
page read and write
|
||
1B0D0227000
|
heap
|
page read and write
|
||
1B0D521E000
|
trusted library allocation
|
page read and write
|
||
1B0E2CE1000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0E2C55000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
||
1B0DA676000
|
trusted library allocation
|
page read and write
|
||
1B0E2C94000
|
trusted library allocation
|
page read and write
|
||
1B0E116A000
|
trusted library allocation
|
page read and write
|
||
1B0E2DEB000
|
trusted library allocation
|
page read and write
|
||
1B0D93F0000
|
trusted library allocation
|
page read and write
|
||
237F726A000
|
heap
|
page read and write
|
||
35B1000
|
heap
|
page read and write
|
||
1B0D021F000
|
heap
|
page read and write
|
||
1B0E128D000
|
trusted library allocation
|
page read and write
|
||
1B0DAB74000
|
trusted library allocation
|
page read and write
|
||
1B0E2DC4000
|
trusted library allocation
|
page read and write
|
||
1B0E549E000
|
trusted library allocation
|
page read and write
|
||
1B0D01D8000
|
heap
|
page read and write
|
||
1FF82323000
|
trusted library allocation
|
page read and write
|
||
1FF82420000
|
trusted library allocation
|
page read and write
|
||
1B0D01DF000
|
heap
|
page read and write
|
||
1B0D917B000
|
trusted library allocation
|
page read and write
|
||
1B0E19DB000
|
trusted library allocation
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0D521E000
|
trusted library allocation
|
page read and write
|
||
1FF83058000
|
heap
|
page read and write
|
||
1B0D899D000
|
trusted library allocation
|
page read and write
|
||
1B0E11C1000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1FF83058000
|
heap
|
page read and write
|
||
1B0D01A5000
|
heap
|
page read and write
|
||
1B0D016C000
|
heap
|
page read and write
|
||
237F75DB000
|
trusted library allocation
|
page read and write
|
||
1B0D0196000
|
heap
|
page read and write
|
||
1B0DB829000
|
trusted library allocation
|
page read and write
|
||
1B0D01F7000
|
heap
|
page read and write
|
||
1B0E53CC000
|
trusted library allocation
|
page read and write
|
||
1B0D0189000
|
heap
|
page read and write
|
||
1B0E14AA000
|
trusted library allocation
|
page read and write
|
||
26AC8E63000
|
trusted library allocation
|
page read and write
|
||
1B0D9869000
|
trusted library allocation
|
page read and write
|
||
237F75B8000
|
trusted library allocation
|
page read and write
|
||
1B0E16FB000
|
trusted library allocation
|
page read and write
|
||
1B0DAA52000
|
trusted library allocation
|
page read and write
|
||
1B0E48BF000
|
trusted library allocation
|
page read and write
|
||
1B0D0185000
|
heap
|
page read and write
|
||
1B0E2AF4000
|
trusted library allocation
|
page read and write
|
||
1B0D0192000
|
heap
|
page read and write
|
||
1B0D01CB000
|
heap
|
page read and write
|
||
1B0DA660000
|
trusted library allocation
|
page read and write
|
||
1B0D01A0000
|
heap
|
page read and write
|
||
1B0D018A000
|
heap
|
page read and write
|
||
1FF82200000
|
trusted library allocation
|
page read and write
|
||
1B0DA2B9000
|
trusted library allocation
|
page read and write
|
||
1B0E5324000
|
trusted library allocation
|
page read and write
|
||
1B0D0190000
|
heap
|
page read and write
|
There are 4146 hidden memdumps, click here to show them.