Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d2baf1c1-67a3-4dbf-b204-8d4bc03195f7.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d2baf1c1-67a3-4dbf-b204-8d4bc03195f7.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
|
ASCII text, with very long lines (1769), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1769), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228
-prefMapHandle 2220 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {5ff868d4-e876-4eb3-90fc-8f920c308aec} 4256 "\\.\pipe\gecko-crash-server-pipe.4256" 1dd4596e910 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3860 -parentBuildID 20230927232528 -prefsHandle 3868
-prefMapHandle 3068 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5d50ed7-ac4a-4dd8-8fac-bb1be5cc9d47}
4256 "\\.\pipe\gecko-crash-server-pipe.4256" 1dd57beff10 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5092 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 5036 -prefMapHandle 5084 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {f165d4fc-795c-42a0-aec5-4aaa0c03c649} 4256 "\\.\pipe\gecko-crash-server-pipe.4256" 1dd5763c310 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
|
unknown
|
||
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
|
unknown
|
||
https://www.instagram.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://ok.ru/
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
|
unknown
|
||
https://youtube.com/account?=hte
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://amazon.com
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.0/
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://www.tsn.ca
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.1/
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
https://duckduckgo.com/?t=ffab&q=
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.196.35
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
twitter.com
|
104.244.42.65
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.193.91
|
||
dyna.wikimedia.org
|
185.15.58.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.181.78
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
dualstack.reddit.map.fastly.net
|
151.101.193.140
|
||
youtube-ui.l.google.com
|
142.250.181.110
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
151.101.193.91
|
services.addons.mozilla.org
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
142.250.181.78
|
youtube.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1DD5309C000
|
heap
|
page read and write
|
||
1DBB2F48000
|
trusted library allocation
|
page read and write
|
||
1DD58D28000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD563B5000
|
trusted library allocation
|
page read and write
|
||
1DD56ED4000
|
trusted library allocation
|
page read and write
|
||
1DD574BF000
|
trusted library allocation
|
page read and write
|
||
1DD4C76E000
|
heap
|
page read and write
|
||
1DD572D4000
|
trusted library allocation
|
page read and write
|
||
1DD5DCA8000
|
trusted library allocation
|
page read and write
|
||
1DD5D818000
|
trusted library allocation
|
page read and write
|
||
1DD4C77B000
|
heap
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
1DD58E9D000
|
trusted library allocation
|
page read and write
|
||
1DD55674000
|
trusted library allocation
|
page read and write
|
||
1DBB2CE0000
|
trusted library allocation
|
page read and write
|
||
1DD57EA8000
|
trusted library allocation
|
page read and write
|
||
1DD5701D000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD61014000
|
heap
|
page read and write
|
||
1DD529B5000
|
trusted library allocation
|
page read and write
|
||
1DD5825B000
|
trusted library allocation
|
page read and write
|
||
9DEE3E000
|
stack
|
page read and write
|
||
1DD530B3000
|
heap
|
page read and write
|
||
1DD5DB90000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1DD5744D000
|
trusted library allocation
|
page read and write
|
||
1DD575F6000
|
trusted library allocation
|
page read and write
|
||
1DD559D0000
|
trusted library allocation
|
page read and write
|
||
1DD4C78C000
|
heap
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD580CA000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1DD559E0000
|
trusted library allocation
|
page read and write
|
||
1DBB3AF1000
|
heap
|
page read and write
|
||
1DD57795000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD539BA000
|
trusted library allocation
|
page read and write
|
||
1DD573AA000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD5D97A000
|
trusted library allocation
|
page read and write
|
||
1DD5DC87000
|
trusted library allocation
|
page read and write
|
||
1DD609E8000
|
trusted library allocation
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
236B2C41000
|
heap
|
page read and write
|
||
1DD5586A000
|
trusted library allocation
|
page read and write
|
||
1DD574B9000
|
trusted library allocation
|
page read and write
|
||
1DD558A8000
|
trusted library allocation
|
page read and write
|
||
1DD58D7F000
|
trusted library allocation
|
page read and write
|
||
2CC000
|
unkown
|
page write copy
|
||
1DD5DE63000
|
trusted library allocation
|
page read and write
|
||
1DD52AF2000
|
trusted library allocation
|
page read and write
|
||
1DD56A92000
|
trusted library allocation
|
page read and write
|
||
1DD529CE000
|
trusted library allocation
|
page read and write
|
||
1DD527FB000
|
trusted library allocation
|
page read and write
|
||
1DD57DC3000
|
trusted library allocation
|
page read and write
|
||
1DD574B9000
|
trusted library allocation
|
page read and write
|
||
1DD4C78F000
|
heap
|
page read and write
|
||
1DD54125000
|
trusted library allocation
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
1DD52AC7000
|
trusted library allocation
|
page read and write
|
||
1DD5F73E000
|
trusted library allocation
|
page read and write
|
||
1DD5603D000
|
trusted library allocation
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
1DD56E43000
|
trusted library allocation
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD53933000
|
trusted library allocation
|
page read and write
|
||
1DD5DA4E000
|
trusted library allocation
|
page read and write
|
||
1DD5DC9A000
|
trusted library allocation
|
page read and write
|
||
1DD57872000
|
trusted library allocation
|
page read and write
|
||
1DD5DF20000
|
trusted library allocation
|
page read and write
|
||
1DD577D0000
|
trusted library allocation
|
page read and write
|
||
1DBB3A01000
|
heap
|
page read and write
|
||
1DD4C771000
|
heap
|
page read and write
|
||
33D000
|
stack
|
page read and write
|
||
1DD4C75F000
|
heap
|
page read and write
|
||
1DD570DB000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1DD5DEE4000
|
trusted library allocation
|
page read and write
|
||
1DD56172000
|
trusted library allocation
|
page read and write
|
||
236B30A5000
|
heap
|
page read and write
|
||
1DD4C769000
|
heap
|
page read and write
|
||
1DD57220000
|
trusted library allocation
|
page read and write
|
||
1DD57872000
|
trusted library allocation
|
page read and write
|
||
1DD4C786000
|
heap
|
page read and write
|
||
1DD5F7B3000
|
trusted library allocation
|
page read and write
|
||
1DD59370000
|
trusted library allocation
|
page read and write
|
||
1DD4C769000
|
heap
|
page read and write
|
||
1DD57442000
|
trusted library allocation
|
page read and write
|
||
1DD563FC000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
1DD60FAA000
|
heap
|
page read and write
|
||
1DD572E0000
|
trusted library allocation
|
page read and write
|
||
1DD529C6000
|
trusted library allocation
|
page read and write
|
||
1DD530B3000
|
heap
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD4C775000
|
heap
|
page read and write
|
||
1DD4C777000
|
heap
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD56E67000
|
trusted library allocation
|
page read and write
|
||
1DD55665000
|
trusted library allocation
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
1DD572C4000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD5D9F7000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1DD58E46000
|
trusted library allocation
|
page read and write
|
||
1DD5DBEC000
|
trusted library allocation
|
page read and write
|
||
6C761FE000
|
stack
|
page read and write
|
||
1DD56E4E000
|
trusted library allocation
|
page read and write
|
||
1DD591FE000
|
trusted library allocation
|
page read and write
|
||
1DBB3A60000
|
heap
|
page read and write
|
||
1DD572BD000
|
trusted library allocation
|
page read and write
|
||
1DD4C7BB000
|
heap
|
page read and write
|
||
1DD5567F000
|
trusted library allocation
|
page read and write
|
||
1DD58D19000
|
trusted library allocation
|
page read and write
|
||
1DD559E6000
|
trusted library allocation
|
page read and write
|
||
1DD590EC000
|
trusted library allocation
|
page read and write
|
||
1DD5F70C000
|
trusted library allocation
|
page read and write
|
||
1DD53928000
|
trusted library allocation
|
page read and write
|
||
1DD5DB6C000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
1DD61014000
|
heap
|
page read and write
|
||
1DD5DF2C000
|
trusted library allocation
|
page read and write
|
||
1DD529C3000
|
trusted library allocation
|
page read and write
|
||
1E877D00000
|
heap
|
page read and write
|
||
1DD52990000
|
trusted library allocation
|
page read and write
|
||
1DD5DBF6000
|
trusted library allocation
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
1DD5739B000
|
trusted library allocation
|
page read and write
|
||
1DD5820A000
|
trusted library allocation
|
page read and write
|
||
1DD530B8000
|
heap
|
page read and write
|
||
1DD607AA000
|
trusted library allocation
|
page read and write
|
||
1DD60C60000
|
trusted library allocation
|
page read and write
|
||
1DD5F7D9000
|
trusted library allocation
|
page read and write
|
||
1DD5DBAF000
|
trusted library allocation
|
page read and write
|
||
1DD5916B000
|
trusted library allocation
|
page read and write
|
||
1DD57068000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C1000
|
heap
|
page read and write
|
||
1DD57882000
|
trusted library allocation
|
page read and write
|
||
1DD581F0000
|
trusted library allocation
|
page read and write
|
||
1DD5D712000
|
trusted library allocation
|
page read and write
|
||
1DD559E0000
|
trusted library allocation
|
page read and write
|
||
1DD582D1000
|
trusted library allocation
|
page read and write
|
||
1DD559BA000
|
trusted library allocation
|
page read and write
|
||
1DD561C3000
|
trusted library allocation
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
1DD560A1000
|
trusted library allocation
|
page read and write
|
||
1DD56A67000
|
trusted library allocation
|
page read and write
|
||
1DD5735C000
|
trusted library allocation
|
page read and write
|
||
1DD5936B000
|
trusted library allocation
|
page read and write
|
||
1DD580D5000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD58E74000
|
trusted library allocation
|
page read and write
|
||
1DD56E83000
|
trusted library allocation
|
page read and write
|
||
1DD55BBA000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
1DD54143000
|
trusted library allocation
|
page read and write
|
||
1DD5757E000
|
trusted library allocation
|
page read and write
|
||
1DD56154000
|
trusted library allocation
|
page read and write
|
||
1DD59C24000
|
trusted library allocation
|
page read and write
|
||
1DD56362000
|
trusted library allocation
|
page read and write
|
||
1DD609CE000
|
trusted library allocation
|
page read and write
|
||
1DD57543000
|
trusted library allocation
|
page read and write
|
||
1DD577FB000
|
trusted library allocation
|
page read and write
|
||
1DD582F8000
|
trusted library allocation
|
page read and write
|
||
1DD563AF000
|
trusted library allocation
|
page read and write
|
||
1DD56DDF000
|
trusted library allocation
|
page read and write
|
||
1DD580FD000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
1DD56A73000
|
trusted library allocation
|
page read and write
|
||
1DD5637B000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD591F6000
|
trusted library allocation
|
page read and write
|
||
1DD54189000
|
trusted library allocation
|
page read and write
|
||
1DD5DCFA000
|
trusted library allocation
|
page read and write
|
||
1DD591A5000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
1DD57088000
|
trusted library allocation
|
page read and write
|
||
1DD58069000
|
trusted library allocation
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
191E1C0C000
|
trusted library allocation
|
page read and write
|
||
1DD5D8B8000
|
trusted library allocation
|
page read and write
|
||
1DD55891000
|
trusted library allocation
|
page read and write
|
||
1DD5D9BA000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
1DD591E4000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
1DD5DE8B000
|
trusted library allocation
|
page read and write
|
||
1E877B67000
|
trusted library allocation
|
page read and write
|
||
1DD530AA000
|
heap
|
page read and write
|
||
1DD563D1000
|
trusted library allocation
|
page read and write
|
||
1DD5DF38000
|
trusted library allocation
|
page read and write
|
||
1DD57312000
|
trusted library allocation
|
page read and write
|
||
1DBB2C00000
|
heap
|
page readonly
|
||
1DD5779A000
|
trusted library allocation
|
page read and write
|
||
1DD58273000
|
trusted library allocation
|
page read and write
|
||
E83C83E000
|
unkown
|
page readonly
|
||
1DD5DA47000
|
trusted library allocation
|
page read and write
|
||
1DD5DEBA000
|
trusted library allocation
|
page read and write
|
||
1DD57484000
|
trusted library allocation
|
page read and write
|
||
1DD52AC1000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
9DCB6E000
|
unkown
|
page readonly
|
||
1DD52AFE000
|
trusted library allocation
|
page read and write
|
||
1DD56E83000
|
trusted library allocation
|
page read and write
|
||
1DD560E5000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD578B5000
|
trusted library allocation
|
page read and write
|
||
1DD539F5000
|
trusted library allocation
|
page read and write
|
||
1DD580BC000
|
trusted library allocation
|
page read and write
|
||
1DD5DF12000
|
trusted library allocation
|
page read and write
|
||
191E1A86000
|
trusted library allocation
|
page read and write
|
||
1DD59199000
|
trusted library allocation
|
page read and write
|
||
1DD57ED7000
|
trusted library allocation
|
page read and write
|
||
1DD56F8D000
|
trusted library allocation
|
page read and write
|
||
1DD5DFC1000
|
trusted library allocation
|
page read and write
|
||
1DD578DB000
|
trusted library allocation
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD572BD000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD57079000
|
trusted library allocation
|
page read and write
|
||
1DD60C5A000
|
trusted library allocation
|
page read and write
|
||
1DD57741000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD575F3000
|
trusted library allocation
|
page read and write
|
||
1DD577CB000
|
trusted library allocation
|
page read and write
|
||
1DD56E59000
|
trusted library allocation
|
page read and write
|
||
1DD57244000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD530D1000
|
heap
|
page read and write
|
||
1DD57793000
|
trusted library allocation
|
page read and write
|
||
1DD53972000
|
trusted library allocation
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
1DD539EC000
|
trusted library allocation
|
page read and write
|
||
5A9D3E000
|
stack
|
page read and write
|
||
1DD5DEA0000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD577B2000
|
trusted library allocation
|
page read and write
|
||
1DD5DBF6000
|
trusted library allocation
|
page read and write
|
||
1DD607E0000
|
trusted library allocation
|
page read and write
|
||
1DD58089000
|
trusted library allocation
|
page read and write
|
||
1DD574E0000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD4C7BC000
|
heap
|
page read and write
|
||
1DD5F383000
|
trusted library allocation
|
page read and write
|
||
1DD4C777000
|
heap
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD58158000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD572C8000
|
trusted library allocation
|
page read and write
|
||
1DD57244000
|
trusted library allocation
|
page read and write
|
||
1DD58DEF000
|
trusted library allocation
|
page read and write
|
||
1DD5DC7F000
|
trusted library allocation
|
page read and write
|
||
1DD560B7000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD58EB0000
|
trusted library allocation
|
page read and write
|
||
1DD56AC3000
|
trusted library allocation
|
page read and write
|
||
236B2BA0000
|
heap
|
page read and write
|
||
1DD559B8000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5567B000
|
trusted library allocation
|
page read and write
|
||
1DD511F9000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
1DD5DE5F000
|
trusted library allocation
|
page read and write
|
||
1DD56161000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD559B4000
|
trusted library allocation
|
page read and write
|
||
1DD59044000
|
trusted library allocation
|
page read and write
|
||
191E1A13000
|
trusted library allocation
|
page read and write
|
||
1DD56E6E000
|
trusted library allocation
|
page read and write
|
||
191E1AF2000
|
trusted library allocation
|
page read and write
|
||
1DD56112000
|
trusted library allocation
|
page read and write
|
||
1DD57240000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
1DD5DE55000
|
trusted library allocation
|
page read and write
|
||
4E993FF000
|
stack
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD4C7C7000
|
heap
|
page read and write
|
||
1DD559A3000
|
trusted library allocation
|
page read and write
|
||
1DD53926000
|
trusted library allocation
|
page read and write
|
||
1DD5181E000
|
trusted library allocation
|
page read and write
|
||
1DD5DE8D000
|
trusted library allocation
|
page read and write
|
||
1DD60C9E000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD57264000
|
trusted library allocation
|
page read and write
|
||
1DD607AE000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1DD60FAA000
|
heap
|
page read and write
|
||
1DD577A4000
|
trusted library allocation
|
page read and write
|
||
1DD574F3000
|
trusted library allocation
|
page read and write
|
||
1DD5F361000
|
trusted library allocation
|
page read and write
|
||
1DD57760000
|
trusted library allocation
|
page read and write
|
||
1DD5FE9B000
|
trusted library allocation
|
page read and write
|
||
1E8779E6000
|
heap
|
page read and write
|
||
1DD58059000
|
trusted library allocation
|
page read and write
|
||
1DD5D7C3000
|
trusted library allocation
|
page read and write
|
||
1DD58EB5000
|
trusted library allocation
|
page read and write
|
||
1DD591E4000
|
trusted library allocation
|
page read and write
|
||
1DD5D7EA000
|
trusted library allocation
|
page read and write
|
||
1DD5DB98000
|
trusted library allocation
|
page read and write
|
||
1DD5DEA0000
|
trusted library allocation
|
page read and write
|
||
CBB000
|
heap
|
page read and write
|
||
1DD57D95000
|
trusted library allocation
|
page read and write
|
||
1DD5587A000
|
trusted library allocation
|
page read and write
|
||
1DD5DBD6000
|
trusted library allocation
|
page read and write
|
||
9DEE7E000
|
unkown
|
page readonly
|
||
DA5000
|
heap
|
page read and write
|
||
1DD56ED2000
|
trusted library allocation
|
page read and write
|
||
1DD4C7CA000
|
heap
|
page read and write
|
||
1DD53090000
|
heap
|
page read and write
|
||
1DD5DE59000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD575F4000
|
trusted library allocation
|
page read and write
|
||
1DD52AF6000
|
trusted library allocation
|
page read and write
|
||
1DD561BE000
|
trusted library allocation
|
page read and write
|
||
1DBB3B45000
|
heap
|
page read and write
|
||
1DD57B2C000
|
trusted library allocation
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
1DBB3AA8000
|
heap
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD5F2BA000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD570A5000
|
trusted library allocation
|
page read and write
|
||
1DD58D10000
|
trusted library allocation
|
page read and write
|
||
1DD5820B000
|
trusted library allocation
|
page read and write
|
||
1DD541C7000
|
trusted library allocation
|
page read and write
|
||
1E877853000
|
heap
|
page read and write
|
||
1DD5DEBA000
|
trusted library allocation
|
page read and write
|
||
1DD57788000
|
trusted library allocation
|
page read and write
|
||
1DD530CA000
|
heap
|
page read and write
|
||
1DD574B9000
|
trusted library allocation
|
page read and write
|
||
1DBB2FBA000
|
trusted library allocation
|
page read and write
|
||
1DD58EF8000
|
trusted library allocation
|
page read and write
|
||
B92000
|
heap
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
1DD558A8000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD561F5000
|
trusted library allocation
|
page read and write
|
||
1DD5D9EC000
|
trusted library allocation
|
page read and write
|
||
1DD5DF05000
|
trusted library allocation
|
page read and write
|
||
1DD5F7CE000
|
trusted library allocation
|
page read and write
|
||
1DD57257000
|
trusted library allocation
|
page read and write
|
||
1DD5F700000
|
trusted library allocation
|
page read and write
|
||
1DD581EC000
|
trusted library allocation
|
page read and write
|
||
1DD58226000
|
trusted library allocation
|
page read and write
|
||
1DD5DF11000
|
trusted library allocation
|
page read and write
|
||
1DD5DFED000
|
trusted library allocation
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
1DD55B20000
|
trusted library allocation
|
page read and write
|
||
1DD577C0000
|
trusted library allocation
|
page read and write
|
||
1DD539DA000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD530AC000
|
heap
|
page read and write
|
||
1DD57EFB000
|
trusted library allocation
|
page read and write
|
||
E83B6B8000
|
stack
|
page read and write
|
||
1DD591AC000
|
trusted library allocation
|
page read and write
|
||
1DD56091000
|
trusted library allocation
|
page read and write
|
||
1DD58049000
|
trusted library allocation
|
page read and write
|
||
1DD577BE000
|
trusted library allocation
|
page read and write
|
||
1DD56E24000
|
trusted library allocation
|
page read and write
|
||
1DD58089000
|
trusted library allocation
|
page read and write
|
||
1DBB2CF0000
|
unkown
|
page execute read
|
||
1DD56E96000
|
trusted library allocation
|
page read and write
|
||
1DD581B6000
|
trusted library allocation
|
page read and write
|
||
1DD5D7E0000
|
trusted library allocation
|
page read and write
|
||
1DD58EA5000
|
trusted library allocation
|
page read and write
|
||
1DD559B8000
|
trusted library allocation
|
page read and write
|
||
1DD577F9000
|
trusted library allocation
|
page read and write
|
||
1DD5DB90000
|
trusted library allocation
|
page read and write
|
||
1DD57D8E000
|
trusted library allocation
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
1DD55674000
|
trusted library allocation
|
page read and write
|
||
1DD52A9A000
|
trusted library allocation
|
page read and write
|
||
1DD5F361000
|
trusted library allocation
|
page read and write
|
||
1DD56E60000
|
trusted library allocation
|
page read and write
|
||
1DD57079000
|
trusted library allocation
|
page read and write
|
||
1DD4C7CB000
|
heap
|
page read and write
|
||
1DD57240000
|
trusted library allocation
|
page read and write
|
||
1DD5DB8B000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD5DE5F000
|
trusted library allocation
|
page read and write
|
||
1DD591CD000
|
trusted library allocation
|
page read and write
|
||
1DD55639000
|
trusted library allocation
|
page read and write
|
||
1DD5DB43000
|
trusted library allocation
|
page read and write
|
||
1DD57638000
|
trusted library allocation
|
page read and write
|
||
1DD52AF6000
|
trusted library allocation
|
page read and write
|
||
1DD56E47000
|
trusted library allocation
|
page read and write
|
||
1DD577F8000
|
trusted library allocation
|
page read and write
|
||
1DD58DD1000
|
trusted library allocation
|
page read and write
|
||
1DD5774D000
|
trusted library allocation
|
page read and write
|
||
1DD558A8000
|
trusted library allocation
|
page read and write
|
||
1DD530A1000
|
heap
|
page read and write
|
||
1DD5DE33000
|
trusted library allocation
|
page read and write
|
||
1DD5DBE1000
|
trusted library allocation
|
page read and write
|
||
1DD5808D000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD4C75F000
|
heap
|
page read and write
|
||
1DD580FD000
|
trusted library allocation
|
page read and write
|
||
1DD56E31000
|
trusted library allocation
|
page read and write
|
||
1DD5FFBE000
|
trusted library allocation
|
page read and write
|
||
1DD57795000
|
trusted library allocation
|
page read and write
|
||
1E877A00000
|
trusted library allocation
|
page read and write
|
||
1DD4C7BC000
|
heap
|
page read and write
|
||
1DD5DC73000
|
trusted library allocation
|
page read and write
|
||
1DD5F715000
|
trusted library allocation
|
page read and write
|
||
1DD563A1000
|
trusted library allocation
|
page read and write
|
||
1DD4C74E000
|
heap
|
page read and write
|
||
1DD5567B000
|
trusted library allocation
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
C6C000
|
heap
|
page read and write
|
||
1DD530B3000
|
heap
|
page read and write
|
||
1DD57D95000
|
trusted library allocation
|
page read and write
|
||
1DD54164000
|
trusted library allocation
|
page read and write
|
||
1DD57869000
|
trusted library allocation
|
page read and write
|
||
1DD53933000
|
trusted library allocation
|
page read and write
|
||
1DD58256000
|
trusted library allocation
|
page read and write
|
||
1DD5FE93000
|
trusted library allocation
|
page read and write
|
||
1DD5DB9A000
|
trusted library allocation
|
page read and write
|
||
1DD56FD6000
|
trusted library allocation
|
page read and write
|
||
1DD5DBCF000
|
trusted library allocation
|
page read and write
|
||
1DD574F0000
|
trusted library allocation
|
page read and write
|
||
1DD58CC9000
|
trusted library allocation
|
page read and write
|
||
1E877B5B000
|
trusted library allocation
|
page read and write
|
||
1DD60956000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD57D70000
|
trusted library allocation
|
page read and write
|
||
1DD5816D000
|
trusted library allocation
|
page read and write
|
||
1DD580D5000
|
trusted library allocation
|
page read and write
|
||
1DD593F3000
|
trusted library allocation
|
page read and write
|
||
1DD563C6000
|
trusted library allocation
|
page read and write
|
||
1DD5D828000
|
trusted library allocation
|
page read and write
|
||
1DD572F8000
|
trusted library allocation
|
page read and write
|
||
1DD581EC000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD60FAA000
|
heap
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD582F8000
|
trusted library allocation
|
page read and write
|
||
1DD5DE8F000
|
trusted library allocation
|
page read and write
|
||
1DD58E28000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
4E973FB000
|
stack
|
page read and write
|
||
1DD4C75C000
|
heap
|
page read and write
|
||
1DD4C766000
|
heap
|
page read and write
|
||
1DD572E0000
|
trusted library allocation
|
page read and write
|
||
1DD572D4000
|
trusted library allocation
|
page read and write
|
||
1DD518F2000
|
trusted library allocation
|
page read and write
|
||
1DD5936B000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD529D7000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD5DCAF000
|
trusted library allocation
|
page read and write
|
||
C77000
|
heap
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD5FF55000
|
trusted library allocation
|
page read and write
|
||
1DD5D876000
|
trusted library allocation
|
page read and write
|
||
1DD57869000
|
trusted library allocation
|
page read and write
|
||
1DD53963000
|
trusted library allocation
|
page read and write
|
||
1DBB3AE0000
|
heap
|
page read and write
|
||
1DD558D7000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD4C769000
|
heap
|
page read and write
|
||
1DD5DB3D000
|
trusted library allocation
|
page read and write
|
||
1DD575DB000
|
trusted library allocation
|
page read and write
|
||
1DD559D2000
|
trusted library allocation
|
page read and write
|
||
1DD5D917000
|
trusted library allocation
|
page read and write
|
||
1DD57EDA000
|
trusted library allocation
|
page read and write
|
||
1DD563B3000
|
trusted library allocation
|
page read and write
|
||
1DD57D25000
|
trusted library allocation
|
page read and write
|
||
1E877C03000
|
trusted library allocation
|
page read and write
|
||
1DD5DB40000
|
trusted library allocation
|
page read and write
|
||
1DD5D779000
|
trusted library allocation
|
page read and write
|
||
1DD57D65000
|
trusted library allocation
|
page read and write
|
||
1DD591AE000
|
trusted library allocation
|
page read and write
|
||
1DD57D42000
|
trusted library allocation
|
page read and write
|
||
191E1A49000
|
trusted library allocation
|
page read and write
|
||
1DD52B22000
|
trusted library allocation
|
page read and write
|
||
1DBB2F17000
|
trusted library allocation
|
page read and write
|
||
1DD577D3000
|
trusted library allocation
|
page read and write
|
||
1DD4C772000
|
heap
|
page read and write
|
||
1DD575C7000
|
trusted library allocation
|
page read and write
|
||
1DD55953000
|
trusted library allocation
|
page read and write
|
||
1DD580B1000
|
trusted library allocation
|
page read and write
|
||
1DD5DB6C000
|
trusted library allocation
|
page read and write
|
||
1DD609E8000
|
trusted library allocation
|
page read and write
|
||
1DD56A92000
|
trusted library allocation
|
page read and write
|
||
1DD577FC000
|
trusted library allocation
|
page read and write
|
||
1DD59AD4000
|
trusted library allocation
|
page read and write
|
||
1DD558A8000
|
trusted library allocation
|
page read and write
|
||
1DD570AB000
|
trusted library allocation
|
page read and write
|
||
1E877C11000
|
trusted library allocation
|
page read and write
|
||
1DD56170000
|
trusted library allocation
|
page read and write
|
||
1DD4C756000
|
heap
|
page read and write
|
||
3B7000
|
heap
|
page read and write
|
||
1DD5DCAD000
|
trusted library allocation
|
page read and write
|
||
1DD5DCAF000
|
trusted library allocation
|
page read and write
|
||
1DD574FB000
|
trusted library allocation
|
page read and write
|
||
1DD577F8000
|
trusted library allocation
|
page read and write
|
||
1DD57553000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD5DBE4000
|
trusted library allocation
|
page read and write
|
||
191E1A24000
|
trusted library allocation
|
page read and write
|
||
1E877700000
|
unclassified section
|
page readonly
|
||
DBF000
|
heap
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD530A8000
|
heap
|
page read and write
|
||
1DD561D2000
|
trusted library allocation
|
page read and write
|
||
1DD559B4000
|
trusted library allocation
|
page read and write
|
||
1DD575A8000
|
trusted library allocation
|
page read and write
|
||
1DD559E4000
|
trusted library allocation
|
page read and write
|
||
1DD56A0D000
|
trusted library allocation
|
page read and write
|
||
191E1800000
|
heap
|
page read and write
|
||
1DD60768000
|
trusted library allocation
|
page read and write
|
||
1DD5785A000
|
trusted library allocation
|
page read and write
|
||
1DD52A56000
|
trusted library allocation
|
page read and write
|
||
1DD56E67000
|
trusted library allocation
|
page read and write
|
||
4E98BFF000
|
stack
|
page read and write
|
||
1DD518BB000
|
trusted library allocation
|
page read and write
|
||
1DD58E3F000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
1DD608D6000
|
trusted library allocation
|
page read and write
|
||
1DD5417C000
|
trusted library allocation
|
page read and write
|
||
1DD5D747000
|
trusted library allocation
|
page read and write
|
||
1DD5DFEF000
|
trusted library allocation
|
page read and write
|
||
1DD5DFFA000
|
trusted library allocation
|
page read and write
|
||
1DD570A5000
|
trusted library allocation
|
page read and write
|
||
1DD56E47000
|
trusted library allocation
|
page read and write
|
||
1DD572C5000
|
trusted library allocation
|
page read and write
|
||
1DD5755E000
|
trusted library allocation
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
6C759FC000
|
stack
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD56EFA000
|
trusted library allocation
|
page read and write
|
||
1DD574BD000
|
trusted library allocation
|
page read and write
|
||
1DD556D9000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD5815E000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD60FAA000
|
heap
|
page read and write
|
||
1DD559DC000
|
trusted library allocation
|
page read and write
|
||
1DD472E7000
|
heap
|
page read and write
|
||
1DD52A8C000
|
trusted library allocation
|
page read and write
|
||
1DD60967000
|
trusted library allocation
|
page read and write
|
||
1DD5DE9E000
|
trusted library allocation
|
page read and write
|
||
1AE8D570000
|
heap
|
page read and write
|
||
1DD57558000
|
trusted library allocation
|
page read and write
|
||
1DD56161000
|
trusted library allocation
|
page read and write
|
||
1DD5275C000
|
trusted library allocation
|
page read and write
|
||
1DD56EC3000
|
trusted library allocation
|
page read and write
|
||
1DD58181000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD55BE2000
|
trusted library allocation
|
page read and write
|
||
1DD580FD000
|
trusted library allocation
|
page read and write
|
||
1DD5DCF8000
|
trusted library allocation
|
page read and write
|
||
1DD5DF0F000
|
trusted library allocation
|
page read and write
|
||
1DD51776000
|
trusted library allocation
|
page read and write
|
||
1DD593B1000
|
trusted library allocation
|
page read and write
|
||
1DD57D8E000
|
trusted library allocation
|
page read and write
|
||
1DD578B2000
|
trusted library allocation
|
page read and write
|
||
1DD5FED8000
|
trusted library allocation
|
page read and write
|
||
1DD4C771000
|
heap
|
page read and write
|
||
1DBB3A5F000
|
heap
|
page read and write
|
||
1DD57599000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
1DD59331000
|
trusted library allocation
|
page read and write
|
||
1DD5915E000
|
trusted library allocation
|
page read and write
|
||
1DD4C768000
|
heap
|
page read and write
|
||
1DBB2EE0000
|
heap
|
page read and write
|
||
5A61DD000
|
stack
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
1DBB3A60000
|
heap
|
page read and write
|
||
1DD56106000
|
trusted library allocation
|
page read and write
|
||
1DD530A2000
|
heap
|
page read and write
|
||
1DD5735C000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5568D000
|
trusted library allocation
|
page read and write
|
||
1DD5DC8B000
|
trusted library allocation
|
page read and write
|
||
1DD57EB7000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
1DD472E7000
|
heap
|
page read and write
|
||
1DBB2F6F000
|
trusted library allocation
|
page read and write
|
||
191E1683000
|
heap
|
page read and write
|
||
1DD5775E000
|
trusted library allocation
|
page read and write
|
||
1DD5DECC000
|
trusted library allocation
|
page read and write
|
||
1DD59B18000
|
trusted library allocation
|
page read and write
|
||
1DD57836000
|
trusted library allocation
|
page read and write
|
||
1DD57762000
|
trusted library allocation
|
page read and write
|
||
1DD5F3B1000
|
trusted library allocation
|
page read and write
|
||
1DD5DCCB000
|
trusted library allocation
|
page read and write
|
||
1DD54143000
|
trusted library allocation
|
page read and write
|
||
C8D000
|
heap
|
page read and write
|
||
1DD55B05000
|
trusted library allocation
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
1E877BC9000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
1DBB3B59000
|
heap
|
page read and write
|
||
1DD5702B000
|
trusted library allocation
|
page read and write
|
||
191E15E0000
|
unclassified section
|
page readonly
|
||
1DD51866000
|
trusted library allocation
|
page read and write
|
||
1DD58256000
|
trusted library allocation
|
page read and write
|
||
5A619E000
|
unkown
|
page readonly
|
||
1DD563B0000
|
trusted library allocation
|
page read and write
|
||
1DD5F361000
|
trusted library allocation
|
page read and write
|
||
1DD5815E000
|
trusted library allocation
|
page read and write
|
||
1DD57235000
|
trusted library allocation
|
page read and write
|
||
1DD5726B000
|
trusted library allocation
|
page read and write
|
||
1DD56E2A000
|
trusted library allocation
|
page read and write
|
||
1DD5DC81000
|
trusted library allocation
|
page read and write
|
||
1DD52AFE000
|
trusted library allocation
|
page read and write
|
||
1DD582EB000
|
trusted library allocation
|
page read and write
|
||
1DD5779C000
|
trusted library allocation
|
page read and write
|
||
1DD5DF09000
|
trusted library allocation
|
page read and write
|
||
1DD56EF8000
|
trusted library allocation
|
page read and write
|
||
1DD57F00000
|
trusted library allocation
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
1DD559E0000
|
trusted library allocation
|
page read and write
|
||
1DD5FED8000
|
trusted library allocation
|
page read and write
|
||
1DBB3AFC000
|
heap
|
page read and write
|
||
1DD563BF000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD578B2000
|
trusted library allocation
|
page read and write
|
||
1DD570F2000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD559F2000
|
trusted library allocation
|
page read and write
|
||
1DD572C4000
|
trusted library allocation
|
page read and write
|
||
1DD5DC8B000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
1DD5DFEF000
|
trusted library allocation
|
page read and write
|
||
1DD57B9B000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD5DC6A000
|
trusted library allocation
|
page read and write
|
||
1DD5779A000
|
trusted library allocation
|
page read and write
|
||
1DD577B0000
|
trusted library allocation
|
page read and write
|
||
1DD56A16000
|
trusted library allocation
|
page read and write
|
||
1DD559B9000
|
trusted library allocation
|
page read and write
|
||
1DD6098A000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD60CF0000
|
trusted library allocation
|
page read and write
|
||
1DD57785000
|
trusted library allocation
|
page read and write
|
||
1DD541CB000
|
trusted library allocation
|
page read and write
|
||
1DD56E6C000
|
trusted library allocation
|
page read and write
|
||
1DD574FB000
|
trusted library allocation
|
page read and write
|
||
1E877BA1000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD578D7000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD582E0000
|
trusted library allocation
|
page read and write
|
||
1DD60F50000
|
heap
|
page read and write
|
||
1DD5DEB0000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
heap
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
1DD5D8FB000
|
trusted library allocation
|
page read and write
|
||
1DD60980000
|
trusted library allocation
|
page read and write
|
||
1DD561BE000
|
trusted library allocation
|
page read and write
|
||
1DD558A1000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1DD4C773000
|
heap
|
page read and write
|
||
1DD57271000
|
trusted library allocation
|
page read and write
|
||
1DD60CF8000
|
trusted library allocation
|
page read and write
|
||
1DD5F35C000
|
trusted library allocation
|
page read and write
|
||
1DD58089000
|
trusted library allocation
|
page read and write
|
||
1DD5727B000
|
trusted library allocation
|
page read and write
|
||
1DD57343000
|
trusted library allocation
|
page read and write
|
||
1DD558A1000
|
trusted library allocation
|
page read and write
|
||
1DD5778B000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
DAB000
|
heap
|
page read and write
|
||
1DD56E71000
|
trusted library allocation
|
page read and write
|
||
1DD5DC89000
|
trusted library allocation
|
page read and write
|
||
1DD60CF8000
|
trusted library allocation
|
page read and write
|
||
1DD5FFD8000
|
trusted library allocation
|
page read and write
|
||
1DD5726D000
|
trusted library allocation
|
page read and write
|
||
1DD58EB5000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
1DD572F8000
|
trusted library allocation
|
page read and write
|
||
1DD5783E000
|
trusted library allocation
|
page read and write
|
||
1DD5F7BC000
|
trusted library allocation
|
page read and write
|
||
1DD57068000
|
trusted library allocation
|
page read and write
|
||
1DD51813000
|
trusted library allocation
|
page read and write
|
||
1DD5617E000
|
trusted library allocation
|
page read and write
|
||
191E15A0000
|
heap
|
page readonly
|
||
1E877BB7000
|
trusted library allocation
|
page read and write
|
||
1DD60967000
|
trusted library allocation
|
page read and write
|
||
1DBB2A00000
|
unclassified section
|
page readonly
|
||
1DD581F0000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD56E63000
|
trusted library allocation
|
page read and write
|
||
1DD57022000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD57634000
|
trusted library allocation
|
page read and write
|
||
1DD5D8B0000
|
trusted library allocation
|
page read and write
|
||
1DD60E95000
|
heap
|
page read and write
|
||
1DD56109000
|
trusted library allocation
|
page read and write
|
||
1DD5DB92000
|
trusted library allocation
|
page read and write
|
||
1DD5DCCB000
|
trusted library allocation
|
page read and write
|
||
1DD5759E000
|
trusted library allocation
|
page read and write
|
||
1DD4C7CB000
|
heap
|
page read and write
|
||
1DD577B2000
|
trusted library allocation
|
page read and write
|
||
1DBB2ED0000
|
trusted library allocation
|
page read and write
|
||
1DD55B57000
|
trusted library allocation
|
page read and write
|
||
1DD5807B000
|
trusted library allocation
|
page read and write
|
||
1DD57836000
|
trusted library allocation
|
page read and write
|
||
1DD56A92000
|
trusted library allocation
|
page read and write
|
||
1DD582A5000
|
trusted library allocation
|
page read and write
|
||
DDD000
|
heap
|
page read and write
|
||
1DD57875000
|
trusted library allocation
|
page read and write
|
||
1DD4C772000
|
heap
|
page read and write
|
||
1DD4C7B8000
|
heap
|
page read and write
|
||
1DD5DB42000
|
trusted library allocation
|
page read and write
|
||
1DD4C764000
|
heap
|
page read and write
|
||
1DBB2F76000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD5814E000
|
trusted library allocation
|
page read and write
|
||
1DD56151000
|
trusted library allocation
|
page read and write
|
||
1DD559E6000
|
trusted library allocation
|
page read and write
|
||
1DD575A2000
|
trusted library allocation
|
page read and write
|
||
1DD5DE68000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD57D3F000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
1DD4C7B8000
|
heap
|
page read and write
|
||
1DD5414B000
|
trusted library allocation
|
page read and write
|
||
1DD572C4000
|
trusted library allocation
|
page read and write
|
||
E83C7FE000
|
stack
|
page read and write
|
||
1DD472FE000
|
heap
|
page read and write
|
||
1DD563C3000
|
trusted library allocation
|
page read and write
|
||
1DD5733F000
|
trusted library allocation
|
page read and write
|
||
1DD607A8000
|
trusted library allocation
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
1DD5F770000
|
trusted library allocation
|
page read and write
|
||
1DD541A0000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD5DBB5000
|
trusted library allocation
|
page read and write
|
||
1DD5D833000
|
trusted library allocation
|
page read and write
|
||
5A84BE000
|
unkown
|
page readonly
|
||
1DD56066000
|
trusted library allocation
|
page read and write
|
||
1DD55883000
|
trusted library allocation
|
page read and write
|
||
E83D83E000
|
unkown
|
page readonly
|
||
1DD5DE62000
|
trusted library allocation
|
page read and write
|
||
1DD591E4000
|
trusted library allocation
|
page read and write
|
||
1DD56106000
|
trusted library allocation
|
page read and write
|
||
1DD53922000
|
trusted library allocation
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
1DD58D28000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD5DC7F000
|
trusted library allocation
|
page read and write
|
||
1AE8D6A0000
|
heap
|
page read and write
|
||
1DD5744B000
|
trusted library allocation
|
page read and write
|
||
1DD581AE000
|
trusted library allocation
|
page read and write
|
||
1DD56A1D000
|
trusted library allocation
|
page read and write
|
||
1DD5569D000
|
trusted library allocation
|
page read and write
|
||
1DD5FFDE000
|
trusted library allocation
|
page read and write
|
||
1DD57785000
|
trusted library allocation
|
page read and write
|
||
1DD55659000
|
trusted library allocation
|
page read and write
|
||
1DD5DB27000
|
trusted library allocation
|
page read and write
|
||
1DD57695000
|
trusted library allocation
|
page read and write
|
||
1DD60E91000
|
heap
|
page read and write
|
||
1DD5DCB3000
|
trusted library allocation
|
page read and write
|
||
1DD58191000
|
trusted library allocation
|
page read and write
|
||
1DD572A5000
|
trusted library allocation
|
page read and write
|
||
E83E03E000
|
stack
|
page read and write
|
||
1DD559AE000
|
trusted library allocation
|
page read and write
|
||
1DD608D9000
|
trusted library allocation
|
page read and write
|
||
E8393ED000
|
stack
|
page read and write
|
||
1DD56E51000
|
trusted library allocation
|
page read and write
|
||
1DD570A0000
|
trusted library allocation
|
page read and write
|
||
1DD57553000
|
trusted library allocation
|
page read and write
|
||
1DD57384000
|
trusted library allocation
|
page read and write
|
||
1DD57558000
|
trusted library allocation
|
page read and write
|
||
1DD54139000
|
trusted library allocation
|
page read and write
|
||
1DD57235000
|
trusted library allocation
|
page read and write
|
||
1DD56A05000
|
trusted library allocation
|
page read and write
|
||
1DD572C4000
|
trusted library allocation
|
page read and write
|
||
1DD5308F000
|
heap
|
page read and write
|
||
1DD530CB000
|
heap
|
page read and write
|
||
1DD56115000
|
trusted library allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
1DD5DB92000
|
trusted library allocation
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD5DC8B000
|
trusted library allocation
|
page read and write
|
||
1DD5597B000
|
trusted library allocation
|
page read and write
|
||
1DD574A8000
|
trusted library allocation
|
page read and write
|
||
1DD5DBE6000
|
trusted library allocation
|
page read and write
|
||
1DD5824A000
|
trusted library allocation
|
page read and write
|
||
1DD57271000
|
trusted library allocation
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
1DD58E41000
|
trusted library allocation
|
page read and write
|
||
1DD591A0000
|
trusted library allocation
|
page read and write
|
||
1DD55BFA000
|
trusted library allocation
|
page read and write
|
||
1DD575DB000
|
trusted library allocation
|
page read and write
|
||
1DD57DFC000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD529D2000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DBB2AA0000
|
heap
|
page read and write
|
||
1DD5DBD6000
|
trusted library allocation
|
page read and write
|
||
1DD58E4F000
|
trusted library allocation
|
page read and write
|
||
1DD5DB48000
|
trusted library allocation
|
page read and write
|
||
1DD4C756000
|
heap
|
page read and write
|
||
1DD53909000
|
trusted library allocation
|
page read and write
|
||
1DD57257000
|
trusted library allocation
|
page read and write
|
||
1DD591B9000
|
trusted library allocation
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
1DD529E5000
|
trusted library allocation
|
page read and write
|
||
1DD5DEA0000
|
trusted library allocation
|
page read and write
|
||
1DD607EB000
|
trusted library allocation
|
page read and write
|
||
1DD5789A000
|
trusted library allocation
|
page read and write
|
||
1DD5FE8C000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
1DD55632000
|
trusted library allocation
|
page read and write
|
||
1DD59351000
|
trusted library allocation
|
page read and write
|
||
1DD5DFE6000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD58071000
|
trusted library allocation
|
page read and write
|
||
1DBB3AE0000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD578B5000
|
trusted library allocation
|
page read and write
|
||
1DD5D97A000
|
trusted library allocation
|
page read and write
|
||
1DD4C78C000
|
heap
|
page read and write
|
||
1DD575A8000
|
trusted library allocation
|
page read and write
|
||
1DD518F2000
|
trusted library allocation
|
page read and write
|
||
1DD56E83000
|
trusted library allocation
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
1DD57095000
|
trusted library allocation
|
page read and write
|
||
1DD5F7CE000
|
trusted library allocation
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
1DD558D7000
|
trusted library allocation
|
page read and write
|
||
1DD580B5000
|
trusted library allocation
|
page read and write
|
||
1DD574B9000
|
trusted library allocation
|
page read and write
|
||
1DD574B3000
|
trusted library allocation
|
page read and write
|
||
29C000
|
unkown
|
page readonly
|
||
1DD58CCC000
|
trusted library allocation
|
page read and write
|
||
1DD560B0000
|
trusted library allocation
|
page read and write
|
||
1DD4C78B000
|
heap
|
page read and write
|
||
1DD57F84000
|
trusted library allocation
|
page read and write
|
||
236B2F07000
|
trusted library allocation
|
page read and write
|
||
1DD56E6E000
|
trusted library allocation
|
page read and write
|
||
1DBB2F5F000
|
trusted library allocation
|
page read and write
|
||
1DD53920000
|
trusted library allocation
|
page read and write
|
||
1DD5726B000
|
trusted library allocation
|
page read and write
|
||
1DD57318000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD570A7000
|
trusted library allocation
|
page read and write
|
||
1DD5F2BA000
|
trusted library allocation
|
page read and write
|
||
1DD59367000
|
trusted library allocation
|
page read and write
|
||
1DD581A6000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD5743C000
|
trusted library allocation
|
page read and write
|
||
1DD60C67000
|
trusted library allocation
|
page read and write
|
||
1DD559FB000
|
trusted library allocation
|
page read and write
|
||
1DD5DBBB000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
1DBB3B45000
|
heap
|
page read and write
|
||
1DD5D956000
|
trusted library allocation
|
page read and write
|
||
1DD58265000
|
trusted library allocation
|
page read and write
|
||
1DD60FA9000
|
heap
|
page read and write
|
||
1DD4C7CA000
|
heap
|
page read and write
|
||
1E87777D000
|
remote allocation
|
page execute read
|
||
1DD5934D000
|
trusted library allocation
|
page read and write
|
||
1DD558A1000
|
trusted library allocation
|
page read and write
|
||
1DD575A8000
|
trusted library allocation
|
page read and write
|
||
1DD472EB000
|
heap
|
page read and write
|
||
1DD5FFB2000
|
trusted library allocation
|
page read and write
|
||
1DD563C3000
|
trusted library allocation
|
page read and write
|
||
1DD5818D000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C4000
|
heap
|
page read and write
|
||
1DD60992000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5727F000
|
trusted library allocation
|
page read and write
|
||
1DD60EE0000
|
heap
|
page read and write
|
||
1DD56A12000
|
trusted library allocation
|
page read and write
|
||
1DBB2CFE000
|
unkown
|
page execute read
|
||
1DD58EFD000
|
trusted library allocation
|
page read and write
|
||
191E1A82000
|
trusted library allocation
|
page read and write
|
||
1DD5761B000
|
trusted library allocation
|
page read and write
|
||
1DD56A78000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD57980000
|
trusted library allocation
|
page read and write
|
||
1DD56E2D000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD5754C000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD57460000
|
trusted library allocation
|
page read and write
|
||
1DD56E6E000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD5704B000
|
trusted library allocation
|
page read and write
|
||
C4C000
|
heap
|
page read and write
|
||
1DD57D62000
|
trusted library allocation
|
page read and write
|
||
1E877B98000
|
trusted library allocation
|
page read and write
|
||
1DD5777B000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD56172000
|
trusted library allocation
|
page read and write
|
||
1DBB3AE6000
|
heap
|
page read and write
|
||
1DD5911E000
|
trusted library allocation
|
page read and write
|
||
1DD559B8000
|
trusted library allocation
|
page read and write
|
||
1DD5DBD6000
|
trusted library allocation
|
page read and write
|
||
1DD580BC000
|
trusted library allocation
|
page read and write
|
||
1DD53920000
|
trusted library allocation
|
page read and write
|
||
1DD5F3CA000
|
trusted library allocation
|
page read and write
|
||
1DD4C769000
|
heap
|
page read and write
|
||
1DD574E4000
|
trusted library allocation
|
page read and write
|
||
1DD56F84000
|
trusted library allocation
|
page read and write
|
||
1DD57793000
|
trusted library allocation
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
1DD591A8000
|
trusted library allocation
|
page read and write
|
||
1DD53092000
|
heap
|
page read and write
|
||
1DD57459000
|
trusted library allocation
|
page read and write
|
||
1DD57D1B000
|
trusted library allocation
|
page read and write
|
||
1DD5805B000
|
trusted library allocation
|
page read and write
|
||
1DD4C7BC000
|
heap
|
page read and write
|
||
1DD5DE46000
|
trusted library allocation
|
page read and write
|
||
D89000
|
heap
|
page read and write
|
||
1DD5DB39000
|
trusted library allocation
|
page read and write
|
||
1DD57D25000
|
trusted library allocation
|
page read and write
|
||
1DD574E4000
|
trusted library allocation
|
page read and write
|
||
1DD576FD000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD55B37000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
1DD5D7DD000
|
trusted library allocation
|
page read and write
|
||
1DD577E4000
|
trusted library allocation
|
page read and write
|
||
1DD577F8000
|
trusted library allocation
|
page read and write
|
||
1DD5D8B8000
|
trusted library allocation
|
page read and write
|
||
16083521E000
|
trusted library allocation
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
1DD5723B000
|
trusted library allocation
|
page read and write
|
||
1DD57459000
|
trusted library allocation
|
page read and write
|
||
1DD560A1000
|
trusted library allocation
|
page read and write
|
||
1DD4C75E000
|
heap
|
page read and write
|
||
CAE000
|
heap
|
page read and write
|
||
1DD574BD000
|
trusted library allocation
|
page read and write
|
||
1DD5DCA2000
|
trusted library allocation
|
page read and write
|
||
1E877B47000
|
trusted library allocation
|
page read and write
|
||
1DD57596000
|
trusted library allocation
|
page read and write
|
||
1DBB3B45000
|
heap
|
page read and write
|
||
1DD5D76D000
|
trusted library allocation
|
page read and write
|
||
1DD60992000
|
trusted library allocation
|
page read and write
|
||
DEC000
|
heap
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD5411D000
|
trusted library allocation
|
page read and write
|
||
1DD57E7A000
|
trusted library allocation
|
page read and write
|
||
1DD56E65000
|
trusted library allocation
|
page read and write
|
||
1DD529A5000
|
trusted library allocation
|
page read and write
|
||
1DD57DC3000
|
trusted library allocation
|
page read and write
|
||
1DD4C75E000
|
heap
|
page read and write
|
||
1DD582E7000
|
trusted library allocation
|
page read and write
|
||
1DD5F744000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD52A47000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD539D4000
|
trusted library allocation
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
1DD51882000
|
trusted library allocation
|
page read and write
|
||
1DD5778A000
|
trusted library allocation
|
page read and write
|
||
1DD4C767000
|
heap
|
page read and write
|
||
1DD57658000
|
trusted library allocation
|
page read and write
|
||
1DD5908B000
|
trusted library allocation
|
page read and write
|
||
1DBB3B18000
|
heap
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
1DD5744D000
|
trusted library allocation
|
page read and write
|
||
1DD580B5000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DBB2BB0000
|
heap
|
page read and write
|
||
1DD572E3000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD574F1000
|
trusted library allocation
|
page read and write
|
||
1DD559C0000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD54184000
|
trusted library allocation
|
page read and write
|
||
1DD56EAE000
|
trusted library allocation
|
page read and write
|
||
1DD574FE000
|
trusted library allocation
|
page read and write
|
||
1DD591B9000
|
trusted library allocation
|
page read and write
|
||
1DD609E8000
|
trusted library allocation
|
page read and write
|
||
1DD559C0000
|
trusted library allocation
|
page read and write
|
||
1DD5DE55000
|
trusted library allocation
|
page read and write
|
||
236B2C4C000
|
heap
|
page read and write
|
||
1DD5778A000
|
trusted library allocation
|
page read and write
|
||
1DD57D3F000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD559D0000
|
trusted library allocation
|
page read and write
|
||
1DD5D9F2000
|
trusted library allocation
|
page read and write
|
||
1DD57B33000
|
trusted library allocation
|
page read and write
|
||
1DD53926000
|
trusted library allocation
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD5F7D9000
|
trusted library allocation
|
page read and write
|
||
1DD57781000
|
trusted library allocation
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD52A95000
|
trusted library allocation
|
page read and write
|
||
1DD5F7ED000
|
trusted library allocation
|
page read and write
|
||
1DBB3AFC000
|
heap
|
page read and write
|
||
1DBB3900000
|
trusted library allocation
|
page read and write
|
||
BDC000
|
heap
|
page read and write
|
||
1DD57785000
|
trusted library allocation
|
page read and write
|
||
1DD58DED000
|
trusted library allocation
|
page read and write
|
||
1DD559E6000
|
trusted library allocation
|
page read and write
|
||
1DD53091000
|
heap
|
page read and write
|
||
1DD55687000
|
trusted library allocation
|
page read and write
|
||
1DD4C7BB000
|
heap
|
page read and write
|
||
1DD4C75C000
|
heap
|
page read and write
|
||
191E15B0000
|
unclassified section
|
page read and write
|
||
1DD575CB000
|
trusted library allocation
|
page read and write
|
||
1DD56A73000
|
trusted library allocation
|
page read and write
|
||
1DD58069000
|
trusted library allocation
|
page read and write
|
||
1DD55B94000
|
trusted library allocation
|
page read and write
|
||
1DD5DCBD000
|
trusted library allocation
|
page read and write
|
||
1DD5DCA2000
|
trusted library allocation
|
page read and write
|
||
1DD58D36000
|
trusted library allocation
|
page read and write
|
||
1DD580D5000
|
trusted library allocation
|
page read and write
|
||
1DD607DC000
|
trusted library allocation
|
page read and write
|
||
1DD5DECC000
|
trusted library allocation
|
page read and write
|
||
1DD5DBF6000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD5722C000
|
trusted library allocation
|
page read and write
|
||
1DD5634A000
|
trusted library allocation
|
page read and write
|
||
1DD5773B000
|
trusted library allocation
|
page read and write
|
||
1DD5815E000
|
trusted library allocation
|
page read and write
|
||
1DD559E4000
|
trusted library allocation
|
page read and write
|
||
191E19D0000
|
heap
|
page read and write
|
||
1DD4C7C1000
|
heap
|
page read and write
|
||
1DD582F8000
|
trusted library allocation
|
page read and write
|
||
1DD539C5000
|
trusted library allocation
|
page read and write
|
||
1DD4C78F000
|
heap
|
page read and write
|
||
1DD572FA000
|
trusted library allocation
|
page read and write
|
||
1DD4C74E000
|
heap
|
page read and write
|
||
1DD5DAFA000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
1DD56374000
|
trusted library allocation
|
page read and write
|
||
1DD5724B000
|
trusted library allocation
|
page read and write
|
||
1DD61021000
|
heap
|
page read and write
|
||
1DD570A7000
|
trusted library allocation
|
page read and write
|
||
1DD56362000
|
trusted library allocation
|
page read and write
|
||
1DD6098A000
|
trusted library allocation
|
page read and write
|
||
1DBB2A75000
|
remote allocation
|
page execute read
|
||
1DD4C75C000
|
heap
|
page read and write
|
||
1DD58152000
|
trusted library allocation
|
page read and write
|
||
1E877B00000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD57076000
|
trusted library allocation
|
page read and write
|
||
1DD517FB000
|
trusted library allocation
|
page read and write
|
||
1DD472F4000
|
heap
|
page read and write
|
||
1DD56E65000
|
trusted library allocation
|
page read and write
|
||
1DD52978000
|
trusted library allocation
|
page read and write
|
||
1DD572E3000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD59AFC000
|
trusted library allocation
|
page read and write
|
||
1DD52ADE000
|
trusted library allocation
|
page read and write
|
||
1DD55BAE000
|
trusted library allocation
|
page read and write
|
||
1DD5F7CE000
|
trusted library allocation
|
page read and write
|
||
1DD5DFD0000
|
trusted library allocation
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1DD57566000
|
trusted library allocation
|
page read and write
|
||
1DD5DBBE000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD5597B000
|
trusted library allocation
|
page read and write
|
||
1DD5F7A9000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD60C87000
|
trusted library allocation
|
page read and write
|
||
1DD511DF000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
1DD561C2000
|
trusted library allocation
|
page read and write
|
||
1DD559B0000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DBB3AF1000
|
heap
|
page read and write
|
||
1DD5566D000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1DD57897000
|
trusted library allocation
|
page read and write
|
||
1DBB2EF5000
|
unkown
|
page execute read
|
||
1DBB3AA1000
|
heap
|
page read and write
|
||
1DD5597C000
|
trusted library allocation
|
page read and write
|
||
1DD572E3000
|
trusted library allocation
|
page read and write
|
||
1DD577DD000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD57D62000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
191E1A30000
|
trusted library allocation
|
page read and write
|
||
1DD58EB0000
|
trusted library allocation
|
page read and write
|
||
1DD5DB8E000
|
trusted library allocation
|
page read and write
|
||
1DD58E9D000
|
trusted library allocation
|
page read and write
|
||
1DD61583000
|
trusted library allocation
|
page read and write
|
||
1DD57271000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD570AA000
|
trusted library allocation
|
page read and write
|
||
1DD58EB5000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD527E7000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
1DD55BBF000
|
trusted library allocation
|
page read and write
|
||
1DD575A6000
|
trusted library allocation
|
page read and write
|
||
1DD56083000
|
trusted library allocation
|
page read and write
|
||
191E1B03000
|
trusted library allocation
|
page read and write
|
||
B73000
|
heap
|
page read and write
|
||
1DD56F9F000
|
trusted library allocation
|
page read and write
|
||
1DD5D7AE000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD57387000
|
trusted library allocation
|
page read and write
|
||
1DD5DC89000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD5706B000
|
trusted library allocation
|
page read and write
|
||
1DD57CB3000
|
trusted library allocation
|
page read and write
|
||
1DD5273A000
|
trusted library allocation
|
page read and write
|
||
1DD570E8000
|
trusted library allocation
|
page read and write
|
||
1DD559B8000
|
trusted library allocation
|
page read and write
|
||
1DD5DF2E000
|
trusted library allocation
|
page read and write
|
||
1DD574F8000
|
trusted library allocation
|
page read and write
|
||
1DD4C7CB000
|
heap
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD56E2A000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD472DD000
|
heap
|
page read and write
|
||
1DD580D3000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
1DD559F2000
|
trusted library allocation
|
page read and write
|
||
1DD55670000
|
trusted library allocation
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
1DD59B89000
|
trusted library allocation
|
page read and write
|
||
1DD574E7000
|
trusted library allocation
|
page read and write
|
||
1E877BA8000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
heap
|
page read and write
|
||
1DD577D0000
|
trusted library allocation
|
page read and write
|
||
1DD572A5000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD4C75B000
|
heap
|
page read and write
|
||
1DD539DD000
|
trusted library allocation
|
page read and write
|
||
1DD577F8000
|
trusted library allocation
|
page read and write
|
||
1DBB3B3C000
|
heap
|
page read and write
|
||
1DD574F0000
|
trusted library allocation
|
page read and write
|
||
1DD57853000
|
trusted library allocation
|
page read and write
|
||
1DD57F84000
|
trusted library allocation
|
page read and write
|
||
1DD5DE7C000
|
trusted library allocation
|
page read and write
|
||
1DD560A1000
|
trusted library allocation
|
page read and write
|
||
1DD539C2000
|
trusted library allocation
|
page read and write
|
||
1DD5DB5E000
|
trusted library allocation
|
page read and write
|
||
1DD577B2000
|
trusted library allocation
|
page read and write
|
||
1DD577A0000
|
trusted library allocation
|
page read and write
|
||
1DD541FB000
|
trusted library allocation
|
page read and write
|
||
1DD59199000
|
trusted library allocation
|
page read and write
|
||
1DD5DC8F000
|
trusted library allocation
|
page read and write
|
||
1DD577E1000
|
trusted library allocation
|
page read and write
|
||
1DD55B8A000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
1DBB3A09000
|
heap
|
page read and write
|
||
1DD607FE000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B6000
|
heap
|
page read and write
|
||
1DD4C7B0000
|
heap
|
page read and write
|
||
1DD55670000
|
trusted library allocation
|
page read and write
|
||
1DD607B2000
|
trusted library allocation
|
page read and write
|
||
1DD53961000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1DD5D9F7000
|
trusted library allocation
|
page read and write
|
||
1DD5736D000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD58171000
|
trusted library allocation
|
page read and write
|
||
1DD56151000
|
trusted library allocation
|
page read and write
|
||
1DD591D2000
|
trusted library allocation
|
page read and write
|
||
1DD5FED9000
|
trusted library allocation
|
page read and write
|
||
1DD559DC000
|
trusted library allocation
|
page read and write
|
||
1DD608D9000
|
trusted library allocation
|
page read and write
|
||
1DD5DB53000
|
trusted library allocation
|
page read and write
|
||
1DBB390C000
|
trusted library allocation
|
page read and write
|
||
1DD57244000
|
trusted library allocation
|
page read and write
|
||
1DD54160000
|
trusted library allocation
|
page read and write
|
||
1DD57EA6000
|
trusted library allocation
|
page read and write
|
||
1DD572E3000
|
trusted library allocation
|
page read and write
|
||
1DD572A5000
|
trusted library allocation
|
page read and write
|
||
1DD591AA000
|
trusted library allocation
|
page read and write
|
||
1DD582D1000
|
trusted library allocation
|
page read and write
|
||
1DD56A9E000
|
trusted library allocation
|
page read and write
|
||
1DD577FC000
|
trusted library allocation
|
page read and write
|
||
1DD5D8AD000
|
trusted library allocation
|
page read and write
|
||
1DD529C3000
|
trusted library allocation
|
page read and write
|
||
191E1A5D000
|
trusted library allocation
|
page read and write
|
||
1DD56E6C000
|
trusted library allocation
|
page read and write
|
||
1DD561F5000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
heap
|
page read and write
|
||
1DD55BE9000
|
trusted library allocation
|
page read and write
|
||
1DD5744B000
|
trusted library allocation
|
page read and write
|
||
1DD57788000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD57459000
|
trusted library allocation
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
1DD5601E000
|
trusted library allocation
|
page read and write
|
||
1DD5607C000
|
trusted library allocation
|
page read and write
|
||
1DD54139000
|
trusted library allocation
|
page read and write
|
||
1DD5D749000
|
trusted library allocation
|
page read and write
|
||
1DD608D6000
|
trusted library allocation
|
page read and write
|
||
1DD5726D000
|
trusted library allocation
|
page read and write
|
||
1DD56AE6000
|
trusted library allocation
|
page read and write
|
||
1DBB3AE8000
|
heap
|
page read and write
|
||
1DD52AAA000
|
trusted library allocation
|
page read and write
|
||
C6C000
|
heap
|
page read and write
|
||
1DD573C3000
|
trusted library allocation
|
page read and write
|
||
1DD56E65000
|
trusted library allocation
|
page read and write
|
||
1DD4C7CB000
|
heap
|
page read and write
|
||
1DD52AC7000
|
trusted library allocation
|
page read and write
|
||
1DBB3AE6000
|
heap
|
page read and write
|
||
1DD5778E000
|
trusted library allocation
|
page read and write
|
||
1DD572BD000
|
trusted library allocation
|
page read and write
|
||
1DD60802000
|
trusted library allocation
|
page read and write
|
||
1DD5720A000
|
trusted library allocation
|
page read and write
|
||
1DD5614D000
|
trusted library allocation
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
1DD5FEEE000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B8000
|
heap
|
page read and write
|
||
1DD560AB000
|
trusted library allocation
|
page read and write
|
||
1DD5FEBC000
|
trusted library allocation
|
page read and write
|
||
1DD53956000
|
trusted library allocation
|
page read and write
|
||
1DD56DE4000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD5778D000
|
trusted library allocation
|
page read and write
|
||
236B2BE0000
|
heap
|
page read and write
|
||
1DD54125000
|
trusted library allocation
|
page read and write
|
||
191E1A66000
|
trusted library allocation
|
page read and write
|
||
1DD5DBDC000
|
trusted library allocation
|
page read and write
|
||
1DD578A9000
|
trusted library allocation
|
page read and write
|
||
1DD5779F000
|
trusted library allocation
|
page read and write
|
||
1DD58C69000
|
trusted library allocation
|
page read and write
|
||
1DD578F4000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD56A8B000
|
trusted library allocation
|
page read and write
|
||
1DBB3A00000
|
heap
|
page read and write
|
||
1DD59AB1000
|
trusted library allocation
|
page read and write
|
||
1DD5F424000
|
trusted library allocation
|
page read and write
|
||
1DD559C0000
|
trusted library allocation
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
DEF000
|
heap
|
page read and write
|
||
1DD4C7B3000
|
heap
|
page read and write
|
||
1DD5DC73000
|
trusted library allocation
|
page read and write
|
||
1DD5FEF4000
|
trusted library allocation
|
page read and write
|
||
1DD577E9000
|
trusted library allocation
|
page read and write
|
||
1DD577DA000
|
trusted library allocation
|
page read and write
|
||
1DD573E2000
|
trusted library allocation
|
page read and write
|
||
1DD58E70000
|
trusted library allocation
|
page read and write
|
||
1DD539FE000
|
trusted library allocation
|
page read and write
|
||
1DD4C753000
|
heap
|
page read and write
|
||
1DD5D832000
|
trusted library allocation
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
1DD5DBF6000
|
trusted library allocation
|
page read and write
|
||
1DD59AD9000
|
trusted library allocation
|
page read and write
|
||
1DD581D1000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
heap
|
page read and write
|
||
1DD57065000
|
trusted library allocation
|
page read and write
|
||
1DD570E2000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
1DD559E4000
|
trusted library allocation
|
page read and write
|
||
1DD57D8E000
|
trusted library allocation
|
page read and write
|
||
191E13E0000
|
unclassified section
|
page readonly
|
||
1DD4C772000
|
heap
|
page read and write
|
||
1DD57257000
|
trusted library allocation
|
page read and write
|
||
1DD5D9DC000
|
trusted library allocation
|
page read and write
|
||
1DD60C5D000
|
trusted library allocation
|
page read and write
|
||
1DD575E2000
|
trusted library allocation
|
page read and write
|
||
1DD5D71B000
|
trusted library allocation
|
page read and write
|
||
1DBB3A64000
|
heap
|
page read and write
|
||
1DD5418E000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD59B61000
|
trusted library allocation
|
page read and write
|
||
1DD4C777000
|
heap
|
page read and write
|
||
1DD57375000
|
trusted library allocation
|
page read and write
|
||
1DD5D83C000
|
trusted library allocation
|
page read and write
|
||
1DD57596000
|
trusted library allocation
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD577BE000
|
trusted library allocation
|
page read and write
|
||
1DD57B1C000
|
trusted library allocation
|
page read and write
|
||
1DD5D9FE000
|
trusted library allocation
|
page read and write
|
||
1DD4C764000
|
heap
|
page read and write
|
||
1DD60FAA000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD5DCA2000
|
trusted library allocation
|
page read and write
|
||
1DD57E94000
|
trusted library allocation
|
page read and write
|
||
1DD591A5000
|
trusted library allocation
|
page read and write
|
||
1DD54183000
|
trusted library allocation
|
page read and write
|
||
1DD55BDA000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD54113000
|
trusted library allocation
|
page read and write
|
||
1DD5DBD9000
|
trusted library allocation
|
page read and write
|
||
1DD5FE77000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
191E1C00000
|
trusted library allocation
|
page read and write
|
||
1DD57202000
|
trusted library allocation
|
page read and write
|
||
1DD57900000
|
trusted library allocation
|
page read and write
|
||
1885000
|
heap
|
page read and write
|
||
1DD572D2000
|
trusted library allocation
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
1DD5DBED000
|
trusted library allocation
|
page read and write
|
||
1DD57044000
|
trusted library allocation
|
page read and write
|
||
1DD5597B000
|
trusted library allocation
|
page read and write
|
||
D05000
|
heap
|
page read and write
|
||
1DD5D8E6000
|
trusted library allocation
|
page read and write
|
||
1DD591AC000
|
trusted library allocation
|
page read and write
|
||
1DD55609000
|
trusted library allocation
|
page read and write
|
||
1DD57F2F000
|
trusted library allocation
|
page read and write
|
||
1DD5DB4F000
|
trusted library allocation
|
page read and write
|
||
1DD5DB9A000
|
trusted library allocation
|
page read and write
|
||
1DBB2F86000
|
trusted library allocation
|
page read and write
|
||
1DD59BB1000
|
trusted library allocation
|
page read and write
|
||
1DD59AB6000
|
trusted library allocation
|
page read and write
|
||
1DD58E4F000
|
trusted library allocation
|
page read and write
|
||
1DD582D1000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD57D1B000
|
trusted library allocation
|
page read and write
|
||
1DD527FB000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD575A3000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD5634E000
|
trusted library allocation
|
page read and write
|
||
1DD591B0000
|
trusted library allocation
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
1DD5567F000
|
trusted library allocation
|
page read and write
|
||
1DD5724B000
|
trusted library allocation
|
page read and write
|
||
1DD60959000
|
trusted library allocation
|
page read and write
|
||
1DD572BF000
|
trusted library allocation
|
page read and write
|
||
1DD56E51000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD5569D000
|
trusted library allocation
|
page read and write
|
||
1DD5DF1D000
|
trusted library allocation
|
page read and write
|
||
1DD5805B000
|
trusted library allocation
|
page read and write
|
||
1DD4C759000
|
heap
|
page read and write
|
||
1DD5D8E7000
|
trusted library allocation
|
page read and write
|
||
1DD57564000
|
trusted library allocation
|
page read and write
|
||
1DD5F385000
|
trusted library allocation
|
page read and write
|
||
1DD5E000000
|
trusted library allocation
|
page read and write
|
||
1DD56F99000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD5612B000
|
trusted library allocation
|
page read and write
|
||
1DD56A20000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
1DD5DCA0000
|
trusted library allocation
|
page read and write
|
||
1DBB2F69000
|
trusted library allocation
|
page read and write
|
||
1DD4C75C000
|
heap
|
page read and write
|
||
1DD5726B000
|
trusted library allocation
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
1DBB3B00000
|
heap
|
page read and write
|
||
1DD5DC79000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD574F0000
|
trusted library allocation
|
page read and write
|
||
1DBB3B2E000
|
heap
|
page read and write
|
||
BE9000
|
heap
|
page read and write
|
||
1DD55687000
|
trusted library allocation
|
page read and write
|
||
1DD56112000
|
trusted library allocation
|
page read and write
|
||
1DD57033000
|
trusted library allocation
|
page read and write
|
||
1DBB2F14000
|
trusted library allocation
|
page read and write
|
||
1DD518A7000
|
trusted library allocation
|
page read and write
|
||
1DD5829C000
|
trusted library allocation
|
page read and write
|
||
1DBB3A69000
|
heap
|
page read and write
|
||
1DD56FFA000
|
trusted library allocation
|
page read and write
|
||
1DD57205000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD57257000
|
trusted library allocation
|
page read and write
|
||
1DD5DE8F000
|
trusted library allocation
|
page read and write
|
||
1DD5FFAB000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
1DD559E6000
|
trusted library allocation
|
page read and write
|
||
1DD58EF8000
|
trusted library allocation
|
page read and write
|
||
1DD60958000
|
trusted library allocation
|
page read and write
|
||
1DD4C75C000
|
heap
|
page read and write
|
||
1DD517F6000
|
trusted library allocation
|
page read and write
|
||
1DD56E75000
|
trusted library allocation
|
page read and write
|
||
1DD4C769000
|
heap
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD530A8000
|
heap
|
page read and write
|
||
1DD56EAA000
|
trusted library allocation
|
page read and write
|
||
1DD56E6E000
|
trusted library allocation
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DBB3AB9000
|
heap
|
page read and write
|
||
1DD4C78F000
|
heap
|
page read and write
|
||
1DD5DE76000
|
trusted library allocation
|
page read and write
|
||
1DD60E95000
|
heap
|
page read and write
|
||
1DD530AC000
|
heap
|
page read and write
|
||
1DD52ABE000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD5915B000
|
trusted library allocation
|
page read and write
|
||
1DD60959000
|
trusted library allocation
|
page read and write
|
||
1DD5DE8B000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD55B05000
|
trusted library allocation
|
page read and write
|
||
1DD52AC1000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
1DD56E1C000
|
trusted library allocation
|
page read and write
|
||
1DD58E63000
|
trusted library allocation
|
page read and write
|
||
1DD5D727000
|
trusted library allocation
|
page read and write
|
||
1DD56A70000
|
trusted library allocation
|
page read and write
|
||
1DD59C04000
|
trusted library allocation
|
page read and write
|
||
1DD5DC81000
|
trusted library allocation
|
page read and write
|
||
1DD60EF4000
|
heap
|
page read and write
|
||
191E1550000
|
heap
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD57B78000
|
trusted library allocation
|
page read and write
|
||
1DD5D9DC000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD527AB000
|
trusted library allocation
|
page read and write
|
||
1DD5D8B8000
|
trusted library allocation
|
page read and write
|
||
1DD591EB000
|
trusted library allocation
|
page read and write
|
||
1DD5DBAB000
|
trusted library allocation
|
page read and write
|
||
1DD57658000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD55BBA000
|
trusted library allocation
|
page read and write
|
||
1DD572D4000
|
trusted library allocation
|
page read and write
|
||
1DD5D988000
|
trusted library allocation
|
page read and write
|
||
1DD574DA000
|
trusted library allocation
|
page read and write
|
||
1DD573B2000
|
trusted library allocation
|
page read and write
|
||
1DD5DB98000
|
trusted library allocation
|
page read and write
|
||
191E14E0000
|
heap
|
page read and write
|
||
1DD58175000
|
trusted library allocation
|
page read and write
|
||
1DD5743C000
|
trusted library allocation
|
page read and write
|
||
1DD572BD000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD56E5B000
|
trusted library allocation
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
C77000
|
heap
|
page read and write
|
||
1DD57558000
|
trusted library allocation
|
page read and write
|
||
1DD529DC000
|
trusted library allocation
|
page read and write
|
||
1DD574B0000
|
trusted library allocation
|
page read and write
|
||
9E067E000
|
stack
|
page read and write
|
||
1DD53928000
|
trusted library allocation
|
page read and write
|
||
1DD577C1000
|
trusted library allocation
|
page read and write
|
||
1DD57EFD000
|
trusted library allocation
|
page read and write
|
||
1DD56E6C000
|
trusted library allocation
|
page read and write
|
||
1DD5FED6000
|
trusted library allocation
|
page read and write
|
||
1DD530B3000
|
heap
|
page read and write
|
||
1DD4C7C6000
|
heap
|
page read and write
|
||
1DD5F3F9000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1DBB3A8A000
|
heap
|
page read and write
|
||
1DD559F5000
|
trusted library allocation
|
page read and write
|
||
1E877C32000
|
trusted library allocation
|
page read and write
|
||
1DBB3B2B000
|
heap
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD5FEBC000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
heap
|
page read and write
|
||
1DD59143000
|
trusted library allocation
|
page read and write
|
||
1DD530CA000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1DD56F9D000
|
trusted library allocation
|
page read and write
|
||
1DD5DB84000
|
trusted library allocation
|
page read and write
|
||
1DD529B0000
|
trusted library allocation
|
page read and write
|
||
1DD56F94000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1DD518CD000
|
trusted library allocation
|
page read and write
|
||
191E1A16000
|
trusted library allocation
|
page read and write
|
||
1DD5F7B8000
|
trusted library allocation
|
page read and write
|
||
191E15C0000
|
heap
|
page read and write
|
||
1DD57240000
|
trusted library allocation
|
page read and write
|
||
1DD5762F000
|
trusted library allocation
|
page read and write
|
||
1DD5181B000
|
trusted library allocation
|
page read and write
|
||
1DD591A5000
|
trusted library allocation
|
page read and write
|
||
1DD5DEE4000
|
trusted library allocation
|
page read and write
|
||
1DD575DB000
|
trusted library allocation
|
page read and write
|
||
1DD58DB3000
|
trusted library allocation
|
page read and write
|
||
1DD5DBD6000
|
trusted library allocation
|
page read and write
|
||
C56000
|
heap
|
page read and write
|
||
1DD559DC000
|
trusted library allocation
|
page read and write
|
||
1DBB2F5C000
|
trusted library allocation
|
page read and write
|
||
E83E83E000
|
unkown
|
page readonly
|
||
1DD57E96000
|
trusted library allocation
|
page read and write
|
||
1DD55B7F000
|
trusted library allocation
|
page read and write
|
||
1DD58215000
|
trusted library allocation
|
page read and write
|
||
1DD575DB000
|
trusted library allocation
|
page read and write
|
||
1DD5DE72000
|
trusted library allocation
|
page read and write
|
||
1DD577D3000
|
trusted library allocation
|
page read and write
|
||
1DD5F7E9000
|
trusted library allocation
|
page read and write
|
||
1DD56E3C000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD5824A000
|
trusted library allocation
|
page read and write
|
||
1DD5F7AD000
|
trusted library allocation
|
page read and write
|
||
1DD56E83000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD561F5000
|
trusted library allocation
|
page read and write
|
||
1DD559DB000
|
trusted library allocation
|
page read and write
|
||
1DD5392B000
|
trusted library allocation
|
page read and write
|
||
1DD55993000
|
trusted library allocation
|
page read and write
|
||
1DD55BA9000
|
trusted library allocation
|
page read and write
|
||
1DD572FA000
|
trusted library allocation
|
page read and write
|
||
1DD60C00000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD4C74E000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD56AFD000
|
trusted library allocation
|
page read and write
|
||
1DD577D4000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD58158000
|
trusted library allocation
|
page read and write
|
||
1DD572D4000
|
trusted library allocation
|
page read and write
|
||
1DD574E4000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD59143000
|
trusted library allocation
|
page read and write
|
||
1DD574F5000
|
trusted library allocation
|
page read and write
|
||
1DD56084000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD56EC3000
|
trusted library allocation
|
page read and write
|
||
1DBB3B59000
|
heap
|
page read and write
|
||
1DD5DE55000
|
trusted library allocation
|
page read and write
|
||
1DD56385000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD518BB000
|
trusted library allocation
|
page read and write
|
||
1DD593AD000
|
trusted library allocation
|
page read and write
|
||
1DD5D7C4000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD57484000
|
trusted library allocation
|
page read and write
|
||
1DD56A08000
|
trusted library allocation
|
page read and write
|
||
1DD582E0000
|
trusted library allocation
|
page read and write
|
||
1DD56E99000
|
trusted library allocation
|
page read and write
|
||
1DD57566000
|
trusted library allocation
|
page read and write
|
||
1DD560FC000
|
trusted library allocation
|
page read and write
|
||
236B2E00000
|
trusted library allocation
|
page read and write
|
||
1DD4C777000
|
heap
|
page read and write
|
||
1DD59373000
|
trusted library allocation
|
page read and write
|
||
1DD4C761000
|
heap
|
page read and write
|
||
1DD5FEE6000
|
trusted library allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
1DD57076000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DBB3B6A000
|
heap
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
CEF000
|
heap
|
page read and write
|
||
DF3000
|
heap
|
page read and write
|
||
1DD60F74000
|
heap
|
page read and write
|
||
1DD4C75E000
|
heap
|
page read and write
|
||
1DD4C7B8000
|
heap
|
page read and write
|
||
DAD000
|
heap
|
page read and write
|
||
1AE8D580000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
1DD55B8E000
|
trusted library allocation
|
page read and write
|
||
1DD5822E000
|
trusted library allocation
|
page read and write
|
||
1DD5D993000
|
trusted library allocation
|
page read and write
|
||
1DD560F7000
|
trusted library allocation
|
page read and write
|
||
1DD5DEA0000
|
trusted library allocation
|
page read and write
|
||
1DD5DCF8000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1DD56DCD000
|
trusted library allocation
|
page read and write
|
||
5A843E000
|
unkown
|
page readonly
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD55600000
|
trusted library allocation
|
page read and write
|
||
1DBB3A69000
|
heap
|
page read and write
|
||
1DD5726B000
|
trusted library allocation
|
page read and write
|
||
1DD5D780000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD57F73000
|
trusted library allocation
|
page read and write
|
||
1DD5D7BE000
|
trusted library allocation
|
page read and write
|
||
C82000
|
heap
|
page read and write
|
||
1DD57447000
|
trusted library allocation
|
page read and write
|
||
1DD5DE8D000
|
trusted library allocation
|
page read and write
|
||
1DD57095000
|
trusted library allocation
|
page read and write
|
||
1DD51723000
|
trusted library allocation
|
page read and write
|
||
1DD530AB000
|
heap
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
1DD574FB000
|
trusted library allocation
|
page read and write
|
||
1DD60F04000
|
heap
|
page read and write
|
||
1DD58071000
|
trusted library allocation
|
page read and write
|
||
1DBB2FC2000
|
trusted library allocation
|
page read and write
|
||
1DD5DCF8000
|
trusted library allocation
|
page read and write
|
||
1E877780000
|
heap
|
page read and write
|
||
1DD574FB000
|
trusted library allocation
|
page read and write
|
||
1DD57355000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD560F5000
|
trusted library allocation
|
page read and write
|
||
1DD472F4000
|
heap
|
page read and write
|
||
1DD5828F000
|
trusted library allocation
|
page read and write
|
||
1DD5DE65000
|
trusted library allocation
|
page read and write
|
||
1DD61021000
|
heap
|
page read and write
|
||
1DD5F3B4000
|
trusted library allocation
|
page read and write
|
||
1DBB3931000
|
trusted library allocation
|
page read and write
|
||
1DD5D80D000
|
trusted library allocation
|
page read and write
|
||
1DD608CC000
|
trusted library allocation
|
page read and write
|
||
1DD5309E000
|
heap
|
page read and write
|
||
236B2C2D000
|
heap
|
page read and write
|
||
1DD56FF7000
|
trusted library allocation
|
page read and write
|
||
1DD4C779000
|
heap
|
page read and write
|
||
1DD581C1000
|
trusted library allocation
|
page read and write
|
||
191E15BF000
|
unclassified section
|
page read and write
|
||
1DD56136000
|
trusted library allocation
|
page read and write
|
||
1DD570AD000
|
trusted library allocation
|
page read and write
|
||
1DD4C75F000
|
heap
|
page read and write
|
||
1DD56E79000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
1DD4C7B2000
|
heap
|
page read and write
|
||
1DD5778D000
|
trusted library allocation
|
page read and write
|
||
1DD57B63000
|
trusted library allocation
|
page read and write
|
||
1DD5F7AD000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD580BC000
|
trusted library allocation
|
page read and write
|
||
1DD56AF4000
|
trusted library allocation
|
page read and write
|
||
1DD58D0A000
|
trusted library allocation
|
page read and write
|
||
1DD56E28000
|
trusted library allocation
|
page read and write
|
||
1DD580D3000
|
trusted library allocation
|
page read and write
|
||
1DD56E89000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD609E6000
|
trusted library allocation
|
page read and write
|
||
1DD563D4000
|
trusted library allocation
|
page read and write
|
||
1DBB3AE8000
|
heap
|
page read and write
|
||
1DBB3AE9000
|
heap
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD55665000
|
trusted library allocation
|
page read and write
|
||
1DD558A8000
|
trusted library allocation
|
page read and write
|
||
1DD58DCD000
|
trusted library allocation
|
page read and write
|
||
1DD55BE4000
|
trusted library allocation
|
page read and write
|
||
1DD55BAA000
|
trusted library allocation
|
page read and write
|
||
1DD570EA000
|
trusted library allocation
|
page read and write
|
||
1DD5F2E1000
|
trusted library allocation
|
page read and write
|
||
1DD5309E000
|
heap
|
page read and write
|
||
1DBB3A60000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
1DD5820D000
|
trusted library allocation
|
page read and write
|
||
1DD57F50000
|
trusted library allocation
|
page read and write
|
||
1DD616AD000
|
trusted library allocation
|
page read and write
|
||
1DD581D8000
|
trusted library allocation
|
page read and write
|
||
1DD5DEF9000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD53919000
|
trusted library allocation
|
page read and write
|
||
1DD4C772000
|
heap
|
page read and write
|
||
1DD579C3000
|
trusted library allocation
|
page read and write
|
||
1DBB3A4D000
|
heap
|
page read and write
|
||
1DD591F6000
|
trusted library allocation
|
page read and write
|
||
1DD4C769000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD574E4000
|
trusted library allocation
|
page read and write
|
||
1DD582EB000
|
trusted library allocation
|
page read and write
|
||
1DD5F385000
|
trusted library allocation
|
page read and write
|
||
1DD58EA8000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD539D4000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
DCB000
|
heap
|
page read and write
|
||
1DD59373000
|
trusted library allocation
|
page read and write
|
||
1DD561C3000
|
trusted library allocation
|
page read and write
|
||
1DD5DC8F000
|
trusted library allocation
|
page read and write
|
||
191E1700000
|
trusted library allocation
|
page read and write
|
||
1DD5817B000
|
trusted library allocation
|
page read and write
|
||
1DD5723B000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
heap
|
page read and write
|
||
1854000
|
heap
|
page read and write
|
||
1DD591CD000
|
trusted library allocation
|
page read and write
|
||
1E877B0B000
|
trusted library allocation
|
page read and write
|
||
1DD5DE8B000
|
trusted library allocation
|
page read and write
|
||
1DD60C5D000
|
trusted library allocation
|
page read and write
|
||
1DD60E99000
|
heap
|
page read and write
|
||
1DD572D4000
|
trusted library allocation
|
page read and write
|
||
9DE5FE000
|
stack
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD539EC000
|
trusted library allocation
|
page read and write
|
||
1DD5827E000
|
trusted library allocation
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
1DD5DBAB000
|
trusted library allocation
|
page read and write
|
||
1DBB3B2B000
|
heap
|
page read and write
|
||
1DD563B5000
|
trusted library allocation
|
page read and write
|
||
1DD57983000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD580A7000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD57447000
|
trusted library allocation
|
page read and write
|
||
1DD58EA5000
|
trusted library allocation
|
page read and write
|
||
1DD53971000
|
trusted library allocation
|
page read and write
|
||
1DD5DE4F000
|
trusted library allocation
|
page read and write
|
||
1DD5825B000
|
trusted library allocation
|
page read and write
|
||
191E15B2000
|
unclassified section
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD54140000
|
trusted library allocation
|
page read and write
|
||
1DD5279C000
|
trusted library allocation
|
page read and write
|
||
1DD5638C000
|
trusted library allocation
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
1DD54118000
|
trusted library allocation
|
page read and write
|
||
1DD609FE000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD530D1000
|
heap
|
page read and write
|
||
1DD575E9000
|
trusted library allocation
|
page read and write
|
||
1DD5DB63000
|
trusted library allocation
|
page read and write
|
||
1DD5412E000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C7000
|
heap
|
page read and write
|
||
BD1000
|
heap
|
page read and write
|
||
1DD5DE8F000
|
trusted library allocation
|
page read and write
|
||
1DD5DCB3000
|
trusted library allocation
|
page read and write
|
||
1DD591AA000
|
trusted library allocation
|
page read and write
|
||
1DD57BA6000
|
trusted library allocation
|
page read and write
|
||
1DD577BE000
|
trusted library allocation
|
page read and write
|
||
1DD4C77B000
|
heap
|
page read and write
|
||
1DD5F7AF000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
1DD52AC7000
|
trusted library allocation
|
page read and write
|
||
1E877B72000
|
trusted library allocation
|
page read and write
|
||
1DD539DD000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
191E1A70000
|
trusted library allocation
|
page read and write
|
||
236B4868000
|
heap
|
page read and write
|
||
1DD5FEE1000
|
trusted library allocation
|
page read and write
|
||
CC3000
|
heap
|
page read and write
|
||
1DD60959000
|
trusted library allocation
|
page read and write
|
||
1DD4C764000
|
heap
|
page read and write
|
||
1DD5D9EC000
|
trusted library allocation
|
page read and write
|
||
1DD55886000
|
trusted library allocation
|
page read and write
|
||
1DD559E8000
|
trusted library allocation
|
page read and write
|
||
191E1350000
|
unclassified section
|
page readonly
|
||
1DD56E60000
|
trusted library allocation
|
page read and write
|
||
1DD5DE65000
|
trusted library allocation
|
page read and write
|
||
1DD577B2000
|
trusted library allocation
|
page read and write
|
||
1DD57207000
|
trusted library allocation
|
page read and write
|
||
1DD5705E000
|
trusted library allocation
|
page read and write
|
||
1DD5DE41000
|
trusted library allocation
|
page read and write
|
||
1DD5757E000
|
trusted library allocation
|
page read and write
|
||
1DD607A3000
|
trusted library allocation
|
page read and write
|
||
1DD56A1D000
|
trusted library allocation
|
page read and write
|
||
1DD5DC7B000
|
trusted library allocation
|
page read and write
|
||
1DD5DCA6000
|
trusted library allocation
|
page read and write
|
||
191E1AF6000
|
trusted library allocation
|
page read and write
|
||
1DD56A88000
|
trusted library allocation
|
page read and write
|
||
1DD578DD000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD57D36000
|
trusted library allocation
|
page read and write
|
||
1DBB3B59000
|
heap
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD57E7F000
|
trusted library allocation
|
page read and write
|
||
1E8776F0000
|
unclassified section
|
page readonly
|
||
1DD4C768000
|
heap
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
1DD57800000
|
trusted library allocation
|
page read and write
|
||
1DD574E4000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD4C778000
|
heap
|
page read and write
|
||
1DD5DBF6000
|
trusted library allocation
|
page read and write
|
||
1DD5DCA0000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C6000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD5D775000
|
trusted library allocation
|
page read and write
|
||
1DD558A1000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
1DD575F3000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD5754C000
|
trusted library allocation
|
page read and write
|
||
1DD560E5000
|
trusted library allocation
|
page read and write
|
||
1DD570A7000
|
trusted library allocation
|
page read and write
|
||
1DD573C9000
|
trusted library allocation
|
page read and write
|
||
1DD52A7F000
|
trusted library allocation
|
page read and write
|
||
1DD577BE000
|
trusted library allocation
|
page read and write
|
||
1DD561D2000
|
trusted library allocation
|
page read and write
|
||
1DD53919000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD577F9000
|
trusted library allocation
|
page read and write
|
||
1DD55858000
|
trusted library allocation
|
page read and write
|
||
1DBB3A5C000
|
heap
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
1DD5DB90000
|
trusted library allocation
|
page read and write
|
||
1DD57D4D000
|
trusted library allocation
|
page read and write
|
||
1DD56E4B000
|
trusted library allocation
|
page read and write
|
||
1DD529AC000
|
trusted library allocation
|
page read and write
|
||
1DD57769000
|
trusted library allocation
|
page read and write
|
||
1DD54155000
|
trusted library allocation
|
page read and write
|
||
1DD5D9D6000
|
trusted library allocation
|
page read and write
|
||
1DD608CC000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
1DD56E24000
|
trusted library allocation
|
page read and write
|
||
1DD59361000
|
trusted library allocation
|
page read and write
|
||
1DD58E5C000
|
trusted library allocation
|
page read and write
|
||
1DD58EED000
|
trusted library allocation
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
1DD5DCAF000
|
trusted library allocation
|
page read and write
|
||
1DD5DE57000
|
trusted library allocation
|
page read and write
|
||
1DD57EB4000
|
trusted library allocation
|
page read and write
|
||
1DD5597B000
|
trusted library allocation
|
page read and write
|
||
1DD573C6000
|
trusted library allocation
|
page read and write
|
||
1DD5DC81000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
1DD4C75F000
|
heap
|
page read and write
|
||
BD9000
|
heap
|
page read and write
|
||
1DD539FD000
|
trusted library allocation
|
page read and write
|
||
1DD593F3000
|
trusted library allocation
|
page read and write
|
||
1DD57DFC000
|
trusted library allocation
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
1DD6156A000
|
trusted library allocation
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
1DD530AA000
|
heap
|
page read and write
|
||
1DD5F7AB000
|
trusted library allocation
|
page read and write
|
||
1DD574F0000
|
trusted library allocation
|
page read and write
|
||
1DD5DE6E000
|
trusted library allocation
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD607B4000
|
trusted library allocation
|
page read and write
|
||
1DD54149000
|
trusted library allocation
|
page read and write
|
||
1DD4C75E000
|
heap
|
page read and write
|
||
1DD60ED2000
|
heap
|
page read and write
|
||
1DD56E6C000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
1DBB2B90000
|
heap
|
page read and write
|
||
1DD57065000
|
trusted library allocation
|
page read and write
|
||
1DD5DB34000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD57081000
|
trusted library allocation
|
page read and write
|
||
1DD5397A000
|
trusted library allocation
|
page read and write
|
||
1DD5F7A6000
|
trusted library allocation
|
page read and write
|
||
1DD608D6000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
1DD609E6000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD52AF6000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
1DD5D771000
|
trusted library allocation
|
page read and write
|
||
1DD57F9B000
|
trusted library allocation
|
page read and write
|
||
1DD575E2000
|
trusted library allocation
|
page read and write
|
||
1DD5DBF6000
|
trusted library allocation
|
page read and write
|
||
1DD58181000
|
trusted library allocation
|
page read and write
|
||
1E877850000
|
heap
|
page read and write
|
||
1DD5594C000
|
trusted library allocation
|
page read and write
|
||
1DD5308F000
|
heap
|
page read and write
|
||
1DD5FE6F000
|
trusted library allocation
|
page read and write
|
||
1DD55BDA000
|
trusted library allocation
|
page read and write
|
||
B8B000
|
heap
|
page read and write
|
||
1DD5F3FC000
|
trusted library allocation
|
page read and write
|
||
1DD58EF5000
|
trusted library allocation
|
page read and write
|
||
1DBB3A7D000
|
heap
|
page read and write
|
||
1DD58D8A000
|
trusted library allocation
|
page read and write
|
||
1DD558A8000
|
trusted library allocation
|
page read and write
|
||
1DD560F7000
|
trusted library allocation
|
page read and write
|
||
1DD61561000
|
trusted library allocation
|
page read and write
|
||
1DD5DE6E000
|
trusted library allocation
|
page read and write
|
||
1DD60E97000
|
heap
|
page read and write
|
||
1DD5DBE1000
|
trusted library allocation
|
page read and write
|
||
1DD5765C000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD5DF36000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD5DCB1000
|
trusted library allocation
|
page read and write
|
||
1DD60ED8000
|
heap
|
page read and write
|
||
1DD56148000
|
trusted library allocation
|
page read and write
|
||
1DBB2EE4000
|
heap
|
page read and write
|
||
1DD5815B000
|
trusted library allocation
|
page read and write
|
||
1DD511EF000
|
trusted library allocation
|
page read and write
|
||
1DD559B8000
|
trusted library allocation
|
page read and write
|
||
1DD530AC000
|
heap
|
page read and write
|
||
1DD5D9FA000
|
trusted library allocation
|
page read and write
|
||
1DD56399000
|
trusted library allocation
|
page read and write
|
||
1DD59363000
|
trusted library allocation
|
page read and write
|
||
1DD5DB9A000
|
trusted library allocation
|
page read and write
|
||
1DD5786E000
|
trusted library allocation
|
page read and write
|
||
1DD5F3B4000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD5D9FC000
|
trusted library allocation
|
page read and write
|
||
1DD5613C000
|
trusted library allocation
|
page read and write
|
||
1DBB2F81000
|
trusted library allocation
|
page read and write
|
||
1DD563CF000
|
trusted library allocation
|
page read and write
|
||
1DD539EC000
|
trusted library allocation
|
page read and write
|
||
1DD55674000
|
trusted library allocation
|
page read and write
|
||
1DD577D0000
|
trusted library allocation
|
page read and write
|
||
1DD572D2000
|
trusted library allocation
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD5DCFA000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD5826A000
|
trusted library allocation
|
page read and write
|
||
1DD51875000
|
trusted library allocation
|
page read and write
|
||
1DD609C9000
|
trusted library allocation
|
page read and write
|
||
1DD607B0000
|
trusted library allocation
|
page read and write
|
||
1DD5DB94000
|
trusted library allocation
|
page read and write
|
||
1DD581E5000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD5F7BB000
|
trusted library allocation
|
page read and write
|
||
1DD541FB000
|
trusted library allocation
|
page read and write
|
||
1DBB2FC5000
|
trusted library allocation
|
page read and write
|
||
1DD57E8E000
|
trusted library allocation
|
page read and write
|
||
1DD53091000
|
heap
|
page read and write
|
||
1DD4C7B2000
|
heap
|
page read and write
|
||
1DD5FED6000
|
trusted library allocation
|
page read and write
|
||
1DD53961000
|
trusted library allocation
|
page read and write
|
||
CAE000
|
heap
|
page read and write
|
||
1DD5FEC4000
|
trusted library allocation
|
page read and write
|
||
3B7000
|
heap
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
1DD56040000
|
trusted library allocation
|
page read and write
|
||
1DD559E6000
|
trusted library allocation
|
page read and write
|
||
1DD59367000
|
trusted library allocation
|
page read and write
|
||
1DD5753B000
|
trusted library allocation
|
page read and write
|
||
1DD5607B000
|
trusted library allocation
|
page read and write
|
||
1DD573B5000
|
trusted library allocation
|
page read and write
|
||
1DD5727B000
|
trusted library allocation
|
page read and write
|
||
1DBB3A60000
|
heap
|
page read and write
|
||
1DD56A9E000
|
trusted library allocation
|
page read and write
|
||
1DD609FE000
|
trusted library allocation
|
page read and write
|
||
9DFE7E000
|
unkown
|
page readonly
|
||
1DD5744D000
|
trusted library allocation
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD60C9E000
|
trusted library allocation
|
page read and write
|
||
1DD57E7C000
|
trusted library allocation
|
page read and write
|
||
1DD511BF000
|
trusted library allocation
|
page read and write
|
||
236B2D40000
|
heap
|
page read and write
|
||
1DD558D7000
|
trusted library allocation
|
page read and write
|
||
1DD5D816000
|
trusted library allocation
|
page read and write
|
||
1DD560AB000
|
trusted library allocation
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD5DED5000
|
trusted library allocation
|
page read and write
|
||
1DD59BCA000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD5DED5000
|
trusted library allocation
|
page read and write
|
||
1DD58EAD000
|
trusted library allocation
|
page read and write
|
||
1DD56131000
|
trusted library allocation
|
page read and write
|
||
1DD57793000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
1DD574CE000
|
trusted library allocation
|
page read and write
|
||
1DD4C74E000
|
heap
|
page read and write
|
||
1DD4C7B9000
|
heap
|
page read and write
|
||
1DD5743C000
|
trusted library allocation
|
page read and write
|
||
1DD56399000
|
trusted library allocation
|
page read and write
|
||
1DD5595B000
|
trusted library allocation
|
page read and write
|
||
1DD52909000
|
trusted library allocation
|
page read and write
|
||
1DD60FAA000
|
heap
|
page read and write
|
||
1DD56A92000
|
trusted library allocation
|
page read and write
|
||
1DD529CE000
|
trusted library allocation
|
page read and write
|
||
1DD577BE000
|
trusted library allocation
|
page read and write
|
||
1DD5F708000
|
trusted library allocation
|
page read and write
|
||
1DD593B2000
|
trusted library allocation
|
page read and write
|
||
1DD560E5000
|
trusted library allocation
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
1DD57F8B000
|
trusted library allocation
|
page read and write
|
||
1DD591B9000
|
trusted library allocation
|
page read and write
|
||
1DD591AE000
|
trusted library allocation
|
page read and write
|
||
1DD57D8E000
|
trusted library allocation
|
page read and write
|
||
1DD580D3000
|
trusted library allocation
|
page read and write
|
||
1DD590D5000
|
trusted library allocation
|
page read and write
|
||
1DD58DFE000
|
trusted library allocation
|
page read and write
|
||
1DD5603D000
|
trusted library allocation
|
page read and write
|
||
1DD55B85000
|
trusted library allocation
|
page read and write
|
||
1DD5765C000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
1DD5F327000
|
trusted library allocation
|
page read and write
|
||
1DD5723B000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5D87A000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C1000
|
heap
|
page read and write
|
||
1DD577F8000
|
trusted library allocation
|
page read and write
|
||
1DD57FFB000
|
trusted library allocation
|
page read and write
|
||
1DD57492000
|
trusted library allocation
|
page read and write
|
||
1DD57F9A000
|
trusted library allocation
|
page read and write
|
||
1DD5DCB1000
|
trusted library allocation
|
page read and write
|
||
1DD52A9D000
|
trusted library allocation
|
page read and write
|
||
2D4000
|
unkown
|
page readonly
|
||
BC5000
|
heap
|
page read and write
|
||
1DD530A8000
|
heap
|
page read and write
|
||
1DD60980000
|
trusted library allocation
|
page read and write
|
||
1DD5DBC6000
|
trusted library allocation
|
page read and write
|
||
1DD58240000
|
trusted library allocation
|
page read and write
|
||
1DD5F7A6000
|
trusted library allocation
|
page read and write
|
||
1DD56AE2000
|
trusted library allocation
|
page read and write
|
||
1DD582EB000
|
trusted library allocation
|
page read and write
|
||
1DD529B5000
|
trusted library allocation
|
page read and write
|
||
1DD4C7BB000
|
heap
|
page read and write
|
||
1DD5DCFA000
|
trusted library allocation
|
page read and write
|
||
191E1400000
|
heap
|
page read and write
|
||
1DD57866000
|
trusted library allocation
|
page read and write
|
||
1DD56E67000
|
trusted library allocation
|
page read and write
|
||
1DD608A8000
|
trusted library allocation
|
page read and write
|
||
1DD541AC000
|
trusted library allocation
|
page read and write
|
||
1DD4C780000
|
heap
|
page read and write
|
||
1DBB3B3C000
|
heap
|
page read and write
|
||
1DD5119E000
|
trusted library allocation
|
page read and write
|
||
1DD581D1000
|
trusted library allocation
|
page read and write
|
||
1DD578D5000
|
trusted library allocation
|
page read and write
|
||
6C759FF000
|
stack
|
page read and write
|
||
1DD56DF5000
|
trusted library allocation
|
page read and write
|
||
1DD572BD000
|
trusted library allocation
|
page read and write
|
||
1DD5786C000
|
trusted library allocation
|
page read and write
|
||
1DD5D7E8000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
1DD60C8B000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD539F8000
|
trusted library allocation
|
page read and write
|
||
1DD57E8E000
|
trusted library allocation
|
page read and write
|
||
1DD5FF5F000
|
trusted library allocation
|
page read and write
|
||
1DD558A1000
|
trusted library allocation
|
page read and write
|
||
1DD52A7F000
|
trusted library allocation
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
1DD5D949000
|
trusted library allocation
|
page read and write
|
||
1DD57079000
|
trusted library allocation
|
page read and write
|
||
1DD609E6000
|
trusted library allocation
|
page read and write
|
||
D52000
|
heap
|
page read and write
|
||
1DD472E7000
|
heap
|
page read and write
|
||
1DD527AE000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD58240000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD55BA6000
|
trusted library allocation
|
page read and write
|
||
1DD582A5000
|
trusted library allocation
|
page read and write
|
||
1DD58D86000
|
trusted library allocation
|
page read and write
|
||
1DD58EB0000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD57839000
|
trusted library allocation
|
page read and write
|
||
1DD5778D000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
1DD5DCA6000
|
trusted library allocation
|
page read and write
|
||
1DD5DFF1000
|
trusted library allocation
|
page read and write
|
||
1DD5DE65000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DBB3B6A000
|
heap
|
page read and write
|
||
1DD57785000
|
trusted library allocation
|
page read and write
|
||
6C769FE000
|
stack
|
page read and write
|
||
1DD61021000
|
heap
|
page read and write
|
||
1DD59C01000
|
trusted library allocation
|
page read and write
|
||
1DD57065000
|
trusted library allocation
|
page read and write
|
||
1DD57D65000
|
trusted library allocation
|
page read and write
|
||
1DD57484000
|
trusted library allocation
|
page read and write
|
||
1DD58E39000
|
trusted library allocation
|
page read and write
|
||
1DD4C759000
|
heap
|
page read and write
|
||
1DD574E4000
|
trusted library allocation
|
page read and write
|
||
1DD52A50000
|
trusted library allocation
|
page read and write
|
||
1AE8D90A000
|
trusted library allocation
|
page read and write
|
||
1DD5F7AD000
|
trusted library allocation
|
page read and write
|
||
1DD559F2000
|
trusted library allocation
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
1DD4C7C7000
|
heap
|
page read and write
|
||
1DD60967000
|
trusted library allocation
|
page read and write
|
||
1DD558A1000
|
trusted library allocation
|
page read and write
|
||
1DD5DE63000
|
trusted library allocation
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
1DBB2FF3000
|
trusted library allocation
|
page read and write
|
||
1DD541A0000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD56E60000
|
trusted library allocation
|
page read and write
|
||
1DD591FA000
|
trusted library allocation
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD58049000
|
trusted library allocation
|
page read and write
|
||
1DD559FB000
|
trusted library allocation
|
page read and write
|
||
1DD57554000
|
trusted library allocation
|
page read and write
|
||
1DD51900000
|
trusted library allocation
|
page read and write
|
||
1DD5F7B9000
|
trusted library allocation
|
page read and write
|
||
1DD561CC000
|
trusted library allocation
|
page read and write
|
||
1DD56A89000
|
trusted library allocation
|
page read and write
|
||
1DD527DC000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD58D22000
|
trusted library allocation
|
page read and write
|
||
1DD60980000
|
trusted library allocation
|
page read and write
|
||
1DD56A70000
|
trusted library allocation
|
page read and write
|
||
1DD57271000
|
trusted library allocation
|
page read and write
|
||
1DD5F296000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD593E9000
|
trusted library allocation
|
page read and write
|
||
1DD5764E000
|
trusted library allocation
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
1DD5309E000
|
heap
|
page read and write
|
||
1DD5DECC000
|
trusted library allocation
|
page read and write
|
||
1DD591A8000
|
trusted library allocation
|
page read and write
|
||
1DD56A9E000
|
trusted library allocation
|
page read and write
|
||
1DD57793000
|
trusted library allocation
|
page read and write
|
||
C77000
|
heap
|
page read and write
|
||
1DD57441000
|
trusted library allocation
|
page read and write
|
||
1DD5D9F2000
|
trusted library allocation
|
page read and write
|
||
1DBB3B59000
|
heap
|
page read and write
|
||
1DD55B3C000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD4C7C6000
|
heap
|
page read and write
|
||
1DD5567F000
|
trusted library allocation
|
page read and write
|
||
1DD60992000
|
trusted library allocation
|
page read and write
|
||
1DD5617E000
|
trusted library allocation
|
page read and write
|
||
1DD58E44000
|
trusted library allocation
|
page read and write
|
||
1DD5D94E000
|
trusted library allocation
|
page read and write
|
||
1DD5DE4F000
|
trusted library allocation
|
page read and write
|
||
1DD5DB88000
|
trusted library allocation
|
page read and write
|
||
1DD5F318000
|
trusted library allocation
|
page read and write
|
||
1DD5D733000
|
trusted library allocation
|
page read and write
|
||
1DD5F359000
|
trusted library allocation
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
1E877C1A000
|
trusted library allocation
|
page read and write
|
||
1DD59393000
|
trusted library allocation
|
page read and write
|
||
1DD4C78D000
|
heap
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
1DD5D77D000
|
trusted library allocation
|
page read and write
|
||
1DD4C776000
|
heap
|
page read and write
|
||
1DD5593E000
|
trusted library allocation
|
page read and write
|
||
1DD57271000
|
trusted library allocation
|
page read and write
|
||
1DD5635B000
|
trusted library allocation
|
page read and write
|
||
1DBB3AAA000
|
heap
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD511EF000
|
trusted library allocation
|
page read and write
|
||
1DD5D924000
|
trusted library allocation
|
page read and write
|
||
1DD57728000
|
trusted library allocation
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
1DD56E83000
|
trusted library allocation
|
page read and write
|
||
1DD581EC000
|
trusted library allocation
|
page read and write
|
||
1DD57548000
|
trusted library allocation
|
page read and write
|
||
1DD573C9000
|
trusted library allocation
|
page read and write
|
||
1E877C3D000
|
trusted library allocation
|
page read and write
|
||
191E1A03000
|
trusted library allocation
|
page read and write
|
||
1DD572BD000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD575E2000
|
trusted library allocation
|
page read and write
|
||
1DBB2F12000
|
trusted library allocation
|
page read and write
|
||
1DD572A5000
|
trusted library allocation
|
page read and write
|
||
191E1A74000
|
trusted library allocation
|
page read and write
|
||
1DD591D2000
|
trusted library allocation
|
page read and write
|
||
1DD581FD000
|
trusted library allocation
|
page read and write
|
||
1DD572A5000
|
trusted library allocation
|
page read and write
|
||
1DBB3AF2000
|
heap
|
page read and write
|
||
1DD56E61000
|
trusted library allocation
|
page read and write
|
||
1DD56036000
|
trusted library allocation
|
page read and write
|
||
1DD56A8B000
|
trusted library allocation
|
page read and write
|
||
1DD5D8B8000
|
trusted library allocation
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD572E3000
|
trusted library allocation
|
page read and write
|
||
1DD582E7000
|
trusted library allocation
|
page read and write
|
||
1DD57257000
|
trusted library allocation
|
page read and write
|
||
1DD577D0000
|
trusted library allocation
|
page read and write
|
||
1DD578CF000
|
trusted library allocation
|
page read and write
|
||
3B5000
|
heap
|
page read and write
|
||
1DD4C764000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD56E65000
|
trusted library allocation
|
page read and write
|
||
1DD560F7000
|
trusted library allocation
|
page read and write
|
||
1DD5704C000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD58E24000
|
trusted library allocation
|
page read and write
|
||
1DD558A8000
|
trusted library allocation
|
page read and write
|
||
1DD53928000
|
trusted library allocation
|
page read and write
|
||
1DD573C9000
|
trusted library allocation
|
page read and write
|
||
1DBB3B6A000
|
heap
|
page read and write
|
||
1DD52AF4000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD5DBEC000
|
trusted library allocation
|
page read and write
|
||
1DD5309E000
|
heap
|
page read and write
|
||
1DD58212000
|
trusted library allocation
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
1DD558A1000
|
trusted library allocation
|
page read and write
|
||
1DD4C76A000
|
heap
|
page read and write
|
||
CCD000
|
heap
|
page read and write
|
||
1DD5DC7B000
|
trusted library allocation
|
page read and write
|
||
1DD57441000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
1DD5786E000
|
trusted library allocation
|
page read and write
|
||
1DD575B2000
|
trusted library allocation
|
page read and write
|
||
1DD59363000
|
trusted library allocation
|
page read and write
|
||
1DD57BC9000
|
trusted library allocation
|
page read and write
|
||
1DD55985000
|
trusted library allocation
|
page read and write
|
||
1DD582A0000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B2000
|
heap
|
page read and write
|
||
1DD5DCA0000
|
trusted library allocation
|
page read and write
|
||
1DD5744D000
|
trusted library allocation
|
page read and write
|
||
1DD5F401000
|
trusted library allocation
|
page read and write
|
||
1DD5D8AE000
|
trusted library allocation
|
page read and write
|
||
236B2C10000
|
heap
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
1DD57F9B000
|
trusted library allocation
|
page read and write
|
||
1DD58D10000
|
trusted library allocation
|
page read and write
|
||
1DD57076000
|
trusted library allocation
|
page read and write
|
||
1DD574F0000
|
trusted library allocation
|
page read and write
|
||
1DBB2D00000
|
trusted library allocation
|
page read and write
|
||
1870000
|
heap
|
page read and write
|
||
1DD6097E000
|
trusted library allocation
|
page read and write
|
||
1DD5FE93000
|
trusted library allocation
|
page read and write
|
||
1DD58E70000
|
trusted library allocation
|
page read and write
|
||
189000
|
stack
|
page read and write
|
||
1DD5D89D000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
1DD60956000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD4C77B000
|
heap
|
page read and write
|
||
1DD51198000
|
trusted library allocation
|
page read and write
|
||
1DD530B3000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
1DD60992000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD5392B000
|
trusted library allocation
|
page read and write
|
||
1DD5DFED000
|
trusted library allocation
|
page read and write
|
||
1DD58CC5000
|
trusted library allocation
|
page read and write
|
||
1DD561C3000
|
trusted library allocation
|
page read and write
|
||
1DD581E5000
|
trusted library allocation
|
page read and write
|
||
1DD53963000
|
trusted library allocation
|
page read and write
|
||
1DD56044000
|
trusted library allocation
|
page read and write
|
||
1DD55BFA000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
9DCBAD000
|
stack
|
page read and write
|
||
1DD5DEE0000
|
trusted library allocation
|
page read and write
|
||
1DD5779A000
|
trusted library allocation
|
page read and write
|
||
1E877970000
|
heap
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD578CF000
|
trusted library allocation
|
page read and write
|
||
1DD57460000
|
trusted library allocation
|
page read and write
|
||
1DD57566000
|
trusted library allocation
|
page read and write
|
||
1DD574E9000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
1DD56055000
|
trusted library allocation
|
page read and write
|
||
1DD56A5A000
|
trusted library allocation
|
page read and write
|
||
1DD529B5000
|
trusted library allocation
|
page read and write
|
||
1DD57033000
|
trusted library allocation
|
page read and write
|
||
1DD581EC000
|
trusted library allocation
|
page read and write
|
||
1DD616E1000
|
trusted library allocation
|
page read and write
|
||
1DD560E5000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B0000
|
heap
|
page read and write
|
||
1DD539DD000
|
trusted library allocation
|
page read and write
|
||
1DD575F9000
|
trusted library allocation
|
page read and write
|
||
1DBB3AFC000
|
heap
|
page read and write
|
||
1DD57685000
|
trusted library allocation
|
page read and write
|
||
1DD4C780000
|
heap
|
page read and write
|
||
1DD6076F000
|
trusted library allocation
|
page read and write
|
||
1DD52733000
|
trusted library allocation
|
page read and write
|
||
1DD559A7000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD577B2000
|
trusted library allocation
|
page read and write
|
||
1E8777E0000
|
heap
|
page read and write
|
||
1DD57FAE000
|
trusted library allocation
|
page read and write
|
||
1AE8D907000
|
trusted library allocation
|
page read and write
|
||
1DD5D874000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
1DD559A2000
|
trusted library allocation
|
page read and write
|
||
1DD56E99000
|
trusted library allocation
|
page read and write
|
||
1DD60FB2000
|
heap
|
page read and write
|
||
1DD57E94000
|
trusted library allocation
|
page read and write
|
||
1DD5814E000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B0000
|
heap
|
page read and write
|
||
1DD581D1000
|
trusted library allocation
|
page read and write
|
||
1DD57751000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
DD9000
|
heap
|
page read and write
|
||
1DD5DFB8000
|
trusted library allocation
|
page read and write
|
||
1DD578F7000
|
trusted library allocation
|
page read and write
|
||
1DD55870000
|
trusted library allocation
|
page read and write
|
||
1DD577B2000
|
trusted library allocation
|
page read and write
|
||
1DD5DCAD000
|
trusted library allocation
|
page read and write
|
||
1DD575F9000
|
trusted library allocation
|
page read and write
|
||
1DBB2C2F000
|
unclassified section
|
page read and write
|
||
1DBB3B78000
|
heap
|
page read and write
|
||
224ECE81000
|
trusted library allocation
|
page execute read
|
||
1DD5187D000
|
trusted library allocation
|
page read and write
|
||
1DBB3A60000
|
heap
|
page read and write
|
||
1DBB3B78000
|
heap
|
page read and write
|
||
1DD5724B000
|
trusted library allocation
|
page read and write
|
||
1DD574AB000
|
trusted library allocation
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD5599D000
|
trusted library allocation
|
page read and write
|
||
1DD5309E000
|
heap
|
page read and write
|
||
1DD609B9000
|
trusted library allocation
|
page read and write
|
||
1DD560F7000
|
trusted library allocation
|
page read and write
|
||
1DBB2EE6000
|
heap
|
page read and write
|
||
1DD5753A000
|
trusted library allocation
|
page read and write
|
||
1DD58EA8000
|
trusted library allocation
|
page read and write
|
||
1DD5F7AB000
|
trusted library allocation
|
page read and write
|
||
1DD5F33B000
|
trusted library allocation
|
page read and write
|
||
1DD591D2000
|
trusted library allocation
|
page read and write
|
||
1DD51819000
|
trusted library allocation
|
page read and write
|
||
1DBB2CA0000
|
trusted library section
|
page readonly
|
||
1DD57534000
|
trusted library allocation
|
page read and write
|
||
1DD5F35C000
|
trusted library allocation
|
page read and write
|
||
1DD55B25000
|
trusted library allocation
|
page read and write
|
||
191E19D4000
|
heap
|
page read and write
|
||
1DD556B6000
|
trusted library allocation
|
page read and write
|
||
1DD5D99B000
|
trusted library allocation
|
page read and write
|
||
1DD559DC000
|
trusted library allocation
|
page read and write
|
||
1DD5F359000
|
trusted library allocation
|
page read and write
|
||
1DD5D82B000
|
trusted library allocation
|
page read and write
|
||
1DD5DE59000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1DD5279C000
|
trusted library allocation
|
page read and write
|
||
1DD5DB27000
|
trusted library allocation
|
page read and write
|
||
1DD472DF000
|
heap
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
1DD530BA000
|
heap
|
page read and write
|
||
1DD55B29000
|
trusted library allocation
|
page read and write
|
||
1DD54143000
|
trusted library allocation
|
page read and write
|
||
1DBB3A9C000
|
heap
|
page read and write
|
||
1DD5DC89000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
DC7000
|
heap
|
page read and write
|
||
1DD575C6000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD5D9FC000
|
trusted library allocation
|
page read and write
|
||
1DD6097E000
|
trusted library allocation
|
page read and write
|
||
1DD53090000
|
heap
|
page read and write
|
||
191E1680000
|
heap
|
page read and write
|
||
1DD5DCAF000
|
trusted library allocation
|
page read and write
|
||
1DD5F7A9000
|
trusted library allocation
|
page read and write
|
||
1DD5747D000
|
trusted library allocation
|
page read and write
|
||
1DD5779A000
|
trusted library allocation
|
page read and write
|
||
1DD56AB0000
|
trusted library allocation
|
page read and write
|
||
1DD5F752000
|
trusted library allocation
|
page read and write
|
||
1DD5634E000
|
trusted library allocation
|
page read and write
|
||
1E877C17000
|
trusted library allocation
|
page read and write
|
||
1DD5918A000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B7000
|
heap
|
page read and write
|
||
1DD5709C000
|
trusted library allocation
|
page read and write
|
||
1DD572BF000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5567B000
|
trusted library allocation
|
page read and write
|
||
1DD5DB37000
|
trusted library allocation
|
page read and write
|
||
1E877B10000
|
trusted library allocation
|
page read and write
|
||
1DD5DEB0000
|
trusted library allocation
|
page read and write
|
||
1DD52AC7000
|
trusted library allocation
|
page read and write
|
||
1DD55940000
|
trusted library allocation
|
page read and write
|
||
1DD573C0000
|
trusted library allocation
|
page read and write
|
||
1DD559E0000
|
trusted library allocation
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD56031000
|
trusted library allocation
|
page read and write
|
||
1DD4C74E000
|
heap
|
page read and write
|
||
1DD582C5000
|
trusted library allocation
|
page read and write
|
||
1DD57752000
|
trusted library allocation
|
page read and write
|
||
1DD59365000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
191E1B00000
|
trusted library allocation
|
page read and write
|
||
4E973FF000
|
stack
|
page read and write
|
||
1DD56EFC000
|
trusted library allocation
|
page read and write
|
||
D39000
|
heap
|
page read and write
|
||
C1B000
|
heap
|
page read and write
|
||
1DD57018000
|
trusted library allocation
|
page read and write
|
||
1DD4C786000
|
heap
|
page read and write
|
||
1DD539F8000
|
trusted library allocation
|
page read and write
|
||
1DD527E7000
|
trusted library allocation
|
page read and write
|
||
1DBB2C22000
|
unclassified section
|
page read and write
|
||
1DD5802D000
|
trusted library allocation
|
page read and write
|
||
1DD57441000
|
trusted library allocation
|
page read and write
|
||
1DD57DE0000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD5F36A000
|
trusted library allocation
|
page read and write
|
||
1DD581C1000
|
trusted library allocation
|
page read and write
|
||
1DD5754C000
|
trusted library allocation
|
page read and write
|
||
1DD56FFC000
|
trusted library allocation
|
page read and write
|
||
1DD5D87A000
|
trusted library allocation
|
page read and write
|
||
1DD581D3000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD559E8000
|
trusted library allocation
|
page read and write
|
||
1DD5DED5000
|
trusted library allocation
|
page read and write
|
||
1DD5DE60000
|
trusted library allocation
|
page read and write
|
||
1DD581D3000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1DBB3B6A000
|
heap
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD607A6000
|
trusted library allocation
|
page read and write
|
||
1DD5DE9E000
|
trusted library allocation
|
page read and write
|
||
1DD5761B000
|
trusted library allocation
|
page read and write
|
||
1DD58E9D000
|
trusted library allocation
|
page read and write
|
||
1DD518A7000
|
trusted library allocation
|
page read and write
|
||
1DD609B1000
|
trusted library allocation
|
page read and write
|
||
1DD58049000
|
trusted library allocation
|
page read and write
|
||
1DD5FFAF000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1DD5DC67000
|
trusted library allocation
|
page read and write
|
||
1DD57387000
|
trusted library allocation
|
page read and write
|
||
1DD5759F000
|
trusted library allocation
|
page read and write
|
||
1DD58D48000
|
trusted library allocation
|
page read and write
|
||
4E97BFD000
|
stack
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD5DCCB000
|
trusted library allocation
|
page read and write
|
||
1DD5F780000
|
trusted library allocation
|
page read and write
|
||
191E1A0E000
|
trusted library allocation
|
page read and write
|
||
1DD56348000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD559B0000
|
trusted library allocation
|
page read and write
|
||
1DD578AC000
|
trusted library allocation
|
page read and write
|
||
1DD59348000
|
trusted library allocation
|
page read and write
|
||
1DD5726B000
|
trusted library allocation
|
page read and write
|
||
1DD57795000
|
trusted library allocation
|
page read and write
|
||
1DD572C4000
|
trusted library allocation
|
page read and write
|
||
1DD5DFDE000
|
trusted library allocation
|
page read and write
|
||
1DBB3A5C000
|
heap
|
page read and write
|
||
1DD577C8000
|
trusted library allocation
|
page read and write
|
||
1DD60FB3000
|
heap
|
page read and write
|
||
1DD5DE6E000
|
trusted library allocation
|
page read and write
|
||
1DD5D8E7000
|
trusted library allocation
|
page read and write
|
||
1DD572A5000
|
trusted library allocation
|
page read and write
|
||
1DD58188000
|
trusted library allocation
|
page read and write
|
||
1DD581F0000
|
trusted library allocation
|
page read and write
|
||
1DD530A8000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD60E95000
|
heap
|
page read and write
|
||
1DD4C78F000
|
heap
|
page read and write
|
||
1DD60C60000
|
trusted library allocation
|
page read and write
|
||
1DD56E6C000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DBB3A6C000
|
heap
|
page read and write
|
||
1DD5726D000
|
trusted library allocation
|
page read and write
|
||
1DD57244000
|
trusted library allocation
|
page read and write
|
||
1DD60989000
|
trusted library allocation
|
page read and write
|
||
1E877B03000
|
trusted library allocation
|
page read and write
|
||
1DD57399000
|
trusted library allocation
|
page read and write
|
||
1DD4C766000
|
heap
|
page read and write
|
||
1DD591CD000
|
trusted library allocation
|
page read and write
|
||
1DD60C67000
|
trusted library allocation
|
page read and write
|
||
1DD58EFD000
|
trusted library allocation
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
1DD5759E000
|
trusted library allocation
|
page read and write
|
||
1DD5DB30000
|
trusted library allocation
|
page read and write
|
||
1DD5743D000
|
trusted library allocation
|
page read and write
|
||
1DD575B2000
|
trusted library allocation
|
page read and write
|
||
1DD5758E000
|
trusted library allocation
|
page read and write
|
||
1DD6095F000
|
trusted library allocation
|
page read and write
|
||
1DD56360000
|
trusted library allocation
|
page read and write
|
||
1DD60FAA000
|
heap
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
191E1A5F000
|
trusted library allocation
|
page read and write
|
||
1DD5568D000
|
trusted library allocation
|
page read and write
|
||
1DD53092000
|
heap
|
page read and write
|
||
1DD5F7A4000
|
trusted library allocation
|
page read and write
|
||
1DD52756000
|
trusted library allocation
|
page read and write
|
||
1DD56A92000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
C31000
|
heap
|
page read and write
|
||
1DD4C76E000
|
heap
|
page read and write
|
||
1DD572C8000
|
trusted library allocation
|
page read and write
|
||
1DD5D787000
|
trusted library allocation
|
page read and write
|
||
1DD5D8E9000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD56A9E000
|
trusted library allocation
|
page read and write
|
||
1DD5DF17000
|
trusted library allocation
|
page read and write
|
||
1DD56E4B000
|
trusted library allocation
|
page read and write
|
||
1DD5DFE2000
|
trusted library allocation
|
page read and write
|
||
1DD4C7BB000
|
heap
|
page read and write
|
||
1DD591EB000
|
trusted library allocation
|
page read and write
|
||
1DD5AA02000
|
trusted library allocation
|
page read and write
|
||
1DD5F77E000
|
trusted library allocation
|
page read and write
|
||
1DD593BA000
|
trusted library allocation
|
page read and write
|
||
1DD4C78B000
|
heap
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
1DD4C78D000
|
heap
|
page read and write
|
||
1DD511CA000
|
trusted library allocation
|
page read and write
|
||
1DD5DCBA000
|
trusted library allocation
|
page read and write
|
||
1DD4C769000
|
heap
|
page read and write
|
||
1DD4C7B0000
|
heap
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
1DD530A8000
|
heap
|
page read and write
|
||
1E877B12000
|
trusted library allocation
|
page read and write
|
||
1DD53963000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD591FE000
|
trusted library allocation
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
1DD591AA000
|
trusted library allocation
|
page read and write
|
||
1DD5D88B000
|
trusted library allocation
|
page read and write
|
||
1DD5DC67000
|
trusted library allocation
|
page read and write
|
||
1DD58265000
|
trusted library allocation
|
page read and write
|
||
1DD59BB4000
|
trusted library allocation
|
page read and write
|
||
1DD57645000
|
trusted library allocation
|
page read and write
|
||
1DD529B8000
|
trusted library allocation
|
page read and write
|
||
1DD56A9E000
|
trusted library allocation
|
page read and write
|
||
1DD51181000
|
trusted library allocation
|
page read and write
|
||
1DD57CBB000
|
trusted library allocation
|
page read and write
|
||
1DD53090000
|
heap
|
page read and write
|
||
1DD5F7E9000
|
trusted library allocation
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
1DD5FEC3000
|
trusted library allocation
|
page read and write
|
||
1DD53975000
|
trusted library allocation
|
page read and write
|
||
1DD608D6000
|
trusted library allocation
|
page read and write
|
||
1DBB2A10000
|
unclassified section
|
page readonly
|
||
1DD5754E000
|
trusted library allocation
|
page read and write
|
||
1DD57D7C000
|
trusted library allocation
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD541A0000
|
trusted library allocation
|
page read and write
|
||
1DD578F4000
|
trusted library allocation
|
page read and write
|
||
1DD58D22000
|
trusted library allocation
|
page read and write
|
||
1DD608D9000
|
trusted library allocation
|
page read and write
|
||
1DD58D5A000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
1DD5747B000
|
trusted library allocation
|
page read and write
|
||
1DD56E90000
|
trusted library allocation
|
page read and write
|
||
1DD529B3000
|
trusted library allocation
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
1DD574DA000
|
trusted library allocation
|
page read and write
|
||
1DD4C76E000
|
heap
|
page read and write
|
||
1DD556C2000
|
trusted library allocation
|
page read and write
|
||
1DD5727B000
|
trusted library allocation
|
page read and write
|
||
1DD529D7000
|
trusted library allocation
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
E83ADFE000
|
stack
|
page read and write
|
||
1DD559E0000
|
trusted library allocation
|
page read and write
|
||
1DD57849000
|
trusted library allocation
|
page read and write
|
||
1E877B23000
|
trusted library allocation
|
page read and write
|
||
1DD5DB9F000
|
trusted library allocation
|
page read and write
|
||
1DD581E5000
|
trusted library allocation
|
page read and write
|
||
1DD5808D000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DBB3B78000
|
heap
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
1DD58DC5000
|
trusted library allocation
|
page read and write
|
||
5A6BD8000
|
stack
|
page read and write
|
||
1DD52A57000
|
trusted library allocation
|
page read and write
|
||
1DBB34D1000
|
heap
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
1E877990000
|
unclassified section
|
page readonly
|
||
1DD5DBE1000
|
trusted library allocation
|
page read and write
|
||
1DD577BE000
|
trusted library allocation
|
page read and write
|
||
191E1A1C000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD5D91B000
|
trusted library allocation
|
page read and write
|
||
CC3000
|
heap
|
page read and write
|
||
1DD60E95000
|
heap
|
page read and write
|
||
1DD563BF000
|
trusted library allocation
|
page read and write
|
||
1DD5F389000
|
trusted library allocation
|
page read and write
|
||
1DD5727C000
|
trusted library allocation
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
1DD56A8D000
|
trusted library allocation
|
page read and write
|
||
1DD5F7B3000
|
trusted library allocation
|
page read and write
|
||
1DD609CE000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5776E000
|
trusted library allocation
|
page read and write
|
||
1DD563CF000
|
trusted library allocation
|
page read and write
|
||
1DD578DB000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
1DD577DD000
|
trusted library allocation
|
page read and write
|
||
1DD5635A000
|
trusted library allocation
|
page read and write
|
||
1DD57553000
|
trusted library allocation
|
page read and write
|
||
1DD570AA000
|
trusted library allocation
|
page read and write
|
||
5AA53E000
|
unkown
|
page readonly
|
||
1DD5F7C3000
|
trusted library allocation
|
page read and write
|
||
1DBB3AE8000
|
heap
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
1DD55BFD000
|
trusted library allocation
|
page read and write
|
||
1E8777C0000
|
unclassified section
|
page readonly
|
||
1DD5724B000
|
trusted library allocation
|
page read and write
|
||
1DD58E22000
|
trusted library allocation
|
page read and write
|
||
1DD559A6000
|
trusted library allocation
|
page read and write
|
||
1DD58EA5000
|
trusted library allocation
|
page read and write
|
||
1DD572D2000
|
trusted library allocation
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
1DD55890000
|
trusted library allocation
|
page read and write
|
||
1DD572BF000
|
trusted library allocation
|
page read and write
|
||
1DD57460000
|
trusted library allocation
|
page read and write
|
||
1DD5758C000
|
trusted library allocation
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
1DD561C2000
|
trusted library allocation
|
page read and write
|
||
5A615B000
|
stack
|
page read and write
|
||
1DD4C7B0000
|
heap
|
page read and write
|
||
1DD57355000
|
trusted library allocation
|
page read and write
|
||
1DD593AD000
|
trusted library allocation
|
page read and write
|
||
1DD4C757000
|
heap
|
page read and write
|
||
1DBB2F03000
|
trusted library allocation
|
page read and write
|
||
1DD5DAE5000
|
trusted library allocation
|
page read and write
|
||
1DD56ED8000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD57FE3000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
1DBB3AE9000
|
heap
|
page read and write
|
||
1DD57070000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1DBB3B78000
|
heap
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
1DD5778D000
|
trusted library allocation
|
page read and write
|
||
1DD56E9C000
|
trusted library allocation
|
page read and write
|
||
1DD5DCA6000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
1DD57F00000
|
trusted library allocation
|
page read and write
|
||
1DD5D822000
|
trusted library allocation
|
page read and write
|
||
1DD574B3000
|
trusted library allocation
|
page read and write
|
||
191E1A77000
|
trusted library allocation
|
page read and write
|
||
1DD57397000
|
trusted library allocation
|
page read and write
|
||
1DD57FFB000
|
trusted library allocation
|
page read and write
|
||
1DD56E20000
|
trusted library allocation
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
1DBB3B59000
|
heap
|
page read and write
|
||
191E19D6000
|
heap
|
page read and write
|
||
1DD60C6C000
|
trusted library allocation
|
page read and write
|
||
B93000
|
heap
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD5DE57000
|
trusted library allocation
|
page read and write
|
||
1DD572BF000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD577D8000
|
trusted library allocation
|
page read and write
|
||
1DD5D99E000
|
trusted library allocation
|
page read and write
|
||
1DD4C773000
|
heap
|
page read and write
|
||
1DD51826000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B8000
|
heap
|
page read and write
|
||
1DD57F19000
|
trusted library allocation
|
page read and write
|
||
1DD54122000
|
trusted library allocation
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
1DD4C75E000
|
heap
|
page read and write
|
||
1DD5DC79000
|
trusted library allocation
|
page read and write
|
||
1DD56170000
|
trusted library allocation
|
page read and write
|
||
191E14EA000
|
heap
|
page read and write
|
||
1DD5DCFA000
|
trusted library allocation
|
page read and write
|
||
1DD5569F000
|
trusted library allocation
|
page read and write
|
||
224ECDC1000
|
trusted library allocation
|
page execute read
|
||
1DD53095000
|
heap
|
page read and write
|
||
1DBB2FC7000
|
trusted library allocation
|
page read and write
|
||
1DD575F3000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD572F8000
|
trusted library allocation
|
page read and write
|
||
1DD591F6000
|
trusted library allocation
|
page read and write
|
||
1DBB3B45000
|
heap
|
page read and write
|
||
1DD574F1000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
1DBB3B5A000
|
heap
|
page read and write
|
||
1DD4C753000
|
heap
|
page read and write
|
||
2D0000
|
unkown
|
page write copy
|
||
1DD58EAD000
|
trusted library allocation
|
page read and write
|
||
1DD51817000
|
trusted library allocation
|
page read and write
|
||
1DD593BA000
|
trusted library allocation
|
page read and write
|
||
1DD539F8000
|
trusted library allocation
|
page read and write
|
||
1DD5738C000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1E8779E0000
|
heap
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD5D9E4000
|
trusted library allocation
|
page read and write
|
||
BDD000
|
heap
|
page read and write
|
||
1DD558A8000
|
trusted library allocation
|
page read and write
|
||
1DD5DC95000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B2000
|
heap
|
page read and write
|
||
1DD574B3000
|
trusted library allocation
|
page read and write
|
||
1DD582E7000
|
trusted library allocation
|
page read and write
|
||
1DD4C779000
|
heap
|
page read and write
|
||
1DD5722D000
|
trusted library allocation
|
page read and write
|
||
1DD541FB000
|
trusted library allocation
|
page read and write
|
||
1DD5722D000
|
trusted library allocation
|
page read and write
|
||
1DD577EA000
|
trusted library allocation
|
page read and write
|
||
1DD572F8000
|
trusted library allocation
|
page read and write
|
||
1DD5807B000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1DD54181000
|
trusted library allocation
|
page read and write
|
||
1DD541AC000
|
trusted library allocation
|
page read and write
|
||
1DD56E79000
|
trusted library allocation
|
page read and write
|
||
1DD59343000
|
trusted library allocation
|
page read and write
|
||
1DD5D943000
|
trusted library allocation
|
page read and write
|
||
1DD560AB000
|
trusted library allocation
|
page read and write
|
||
1DD591FE000
|
trusted library allocation
|
page read and write
|
||
1DD56A49000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD6098A000
|
trusted library allocation
|
page read and write
|
||
1DD575DB000
|
trusted library allocation
|
page read and write
|
||
1DD55BDA000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
1DD5936B000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD5DB2E000
|
trusted library allocation
|
page read and write
|
||
1DBB3B23000
|
heap
|
page read and write
|
||
1DD4C75F000
|
heap
|
page read and write
|
||
1DD609BC000
|
trusted library allocation
|
page read and write
|
||
1DD57D4C000
|
trusted library allocation
|
page read and write
|
||
1DD5638C000
|
trusted library allocation
|
page read and write
|
||
1DD539EC000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD5DE6A000
|
trusted library allocation
|
page read and write
|
||
1DD5DBCD000
|
trusted library allocation
|
page read and write
|
||
1DD54181000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
DAB000
|
heap
|
page read and write
|
||
1DD58124000
|
trusted library allocation
|
page read and write
|
||
1DD5DFE2000
|
trusted library allocation
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
1DD58C23000
|
trusted library allocation
|
page read and write
|
||
1DD5723B000
|
trusted library allocation
|
page read and write
|
||
1DD4C76E000
|
heap
|
page read and write
|
||
1DD5DB8E000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DBB3A6C000
|
heap
|
page read and write
|
||
1DD60C5A000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD59115000
|
trusted library allocation
|
page read and write
|
||
1DD5608D000
|
trusted library allocation
|
page read and write
|
||
1DD4C773000
|
heap
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1E877B81000
|
trusted library allocation
|
page read and write
|
||
1DD57095000
|
trusted library allocation
|
page read and write
|
||
1DD582F0000
|
trusted library allocation
|
page read and write
|
||
1DD4C74E000
|
heap
|
page read and write
|
||
1DBB3A63000
|
heap
|
page read and write
|
||
1DD55822000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
E07000
|
heap
|
page read and write
|
||
1DBB3AE0000
|
heap
|
page read and write
|
||
1DD58C65000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
DE1000
|
heap
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
1DD5DBE1000
|
trusted library allocation
|
page read and write
|
||
236B30A0000
|
heap
|
page read and write
|
||
1DD57EFD000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
1DD590E0000
|
trusted library allocation
|
page read and write
|
||
1DD575DF000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD55667000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1DBB2FE9000
|
trusted library allocation
|
page read and write
|
||
1DD591A0000
|
trusted library allocation
|
page read and write
|
||
1DD57586000
|
trusted library allocation
|
page read and write
|
||
1DD5754E000
|
trusted library allocation
|
page read and write
|
||
236B2F0A000
|
trusted library allocation
|
page read and write
|
||
1DBB2F61000
|
trusted library allocation
|
page read and write
|
||
1DD5FEC4000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
1DD56AFA000
|
trusted library allocation
|
page read and write
|
||
1DD58DF8000
|
trusted library allocation
|
page read and write
|
||
1DD57070000
|
trusted library allocation
|
page read and write
|
||
1DD54189000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD539F8000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
1DD58EED000
|
trusted library allocation
|
page read and write
|
||
191E13C0000
|
remote allocation
|
page read and write
|
||
1DD530A0000
|
heap
|
page read and write
|
||
1DD57244000
|
trusted library allocation
|
page read and write
|
||
1DD5826F000
|
trusted library allocation
|
page read and write
|
||
1DD5F71B000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
BCE000
|
heap
|
page read and write
|
||
1DD4C7CB000
|
heap
|
page read and write
|
||
1DD56E83000
|
trusted library allocation
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
1DD578CF000
|
trusted library allocation
|
page read and write
|
||
1DD5777B000
|
trusted library allocation
|
page read and write
|
||
1DD4C772000
|
heap
|
page read and write
|
||
1DD57235000
|
trusted library allocation
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
1DD574D5000
|
trusted library allocation
|
page read and write
|
||
1DD559E2000
|
trusted library allocation
|
page read and write
|
||
1DD55B51000
|
trusted library allocation
|
page read and write
|
||
1DD56A2F000
|
trusted library allocation
|
page read and write
|
||
1DD530A2000
|
heap
|
page read and write
|
||
1DD4C760000
|
heap
|
page read and write
|
||
9DCB2E000
|
stack
|
page read and write
|
||
1DD5705E000
|
trusted library allocation
|
page read and write
|
||
1DD5912D000
|
trusted library allocation
|
page read and write
|
||
1DD5DB2E000
|
trusted library allocation
|
page read and write
|
||
1DD55B5E000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1DD57695000
|
trusted library allocation
|
page read and write
|
||
1DD572F8000
|
trusted library allocation
|
page read and write
|
||
1DD56ED4000
|
trusted library allocation
|
page read and write
|
||
1DD530CA000
|
heap
|
page read and write
|
||
1DD5F2FC000
|
trusted library allocation
|
page read and write
|
||
1DD5594A000
|
trusted library allocation
|
page read and write
|
||
1DD561C0000
|
trusted library allocation
|
page read and write
|
||
1DD5F776000
|
trusted library allocation
|
page read and write
|
||
1DD5308F000
|
heap
|
page read and write
|
||
1DBB3B2B000
|
heap
|
page read and write
|
||
1DD4C7C1000
|
heap
|
page read and write
|
||
1DD55B8A000
|
trusted library allocation
|
page read and write
|
||
1DD574E0000
|
trusted library allocation
|
page read and write
|
||
1DD580A7000
|
trusted library allocation
|
page read and write
|
||
1DD539C2000
|
trusted library allocation
|
page read and write
|
||
1DD578F7000
|
trusted library allocation
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
1DD57769000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C6000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1DD4C78F000
|
heap
|
page read and write
|
||
1DD5F366000
|
trusted library allocation
|
page read and write
|
||
1DD5DEE4000
|
trusted library allocation
|
page read and write
|
||
1DD57D79000
|
trusted library allocation
|
page read and write
|
||
2CC000
|
unkown
|
page read and write
|
||
1DD57434000
|
trusted library allocation
|
page read and write
|
||
1DD53961000
|
trusted library allocation
|
page read and write
|
||
1DD572E3000
|
trusted library allocation
|
page read and write
|
||
1DD5F3F9000
|
trusted library allocation
|
page read and write
|
||
1DD60E95000
|
heap
|
page read and write
|
||
1DD5F318000
|
trusted library allocation
|
page read and write
|
||
1DD5DB8E000
|
trusted library allocation
|
page read and write
|
||
1DD57233000
|
trusted library allocation
|
page read and write
|
||
1DD570E5000
|
trusted library allocation
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
1DBB3A5C000
|
heap
|
page read and write
|
||
1DD591EB000
|
trusted library allocation
|
page read and write
|
||
1DD57F3A000
|
trusted library allocation
|
page read and write
|
||
1DD60E00000
|
trusted library allocation
|
page read and write
|
||
1DD58DB5000
|
trusted library allocation
|
page read and write
|
||
1DD58EF5000
|
trusted library allocation
|
page read and write
|
||
1DD5DFC6000
|
trusted library allocation
|
page read and write
|
||
1E877962000
|
unclassified section
|
page read and write
|
||
1DD57554000
|
trusted library allocation
|
page read and write
|
||
2C2000
|
unkown
|
page readonly
|
||
1DD57E9E000
|
trusted library allocation
|
page read and write
|
||
1DD56FA5000
|
trusted library allocation
|
page read and write
|
||
1DD5DBC6000
|
trusted library allocation
|
page read and write
|
||
1DD60FAA000
|
heap
|
page read and write
|
||
1DD575B8000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD57441000
|
trusted library allocation
|
page read and write
|
||
1DD56EAA000
|
trusted library allocation
|
page read and write
|
||
1DD577B4000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1DBB2F2F000
|
trusted library allocation
|
page read and write
|
||
1DD57D60000
|
trusted library allocation
|
page read and write
|
||
1DD572D2000
|
trusted library allocation
|
page read and write
|
||
1DD570E8000
|
trusted library allocation
|
page read and write
|
||
1DD5DC87000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD577BE000
|
trusted library allocation
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
1DD52AA5000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD5DF0C000
|
trusted library allocation
|
page read and write
|
||
1DD582B1000
|
trusted library allocation
|
page read and write
|
||
1DD58EF5000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
1DD5DCFB000
|
trusted library allocation
|
page read and write
|
||
1DD560E5000
|
trusted library allocation
|
page read and write
|
||
1DD60E95000
|
heap
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD574DA000
|
trusted library allocation
|
page read and write
|
||
1DD57CBB000
|
trusted library allocation
|
page read and write
|
||
1DD55B55000
|
trusted library allocation
|
page read and write
|
||
1DD577F8000
|
trusted library allocation
|
page read and write
|
||
1DD577E4000
|
trusted library allocation
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
1E877BE6000
|
trusted library allocation
|
page read and write
|
||
1DD558D7000
|
trusted library allocation
|
page read and write
|
||
1DD4C74E000
|
heap
|
page read and write
|
||
1DD57054000
|
trusted library allocation
|
page read and write
|
||
236B4850000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1AE8D900000
|
trusted library allocation
|
page read and write
|
||
1DD5FEBB000
|
trusted library allocation
|
page read and write
|
||
1DD60956000
|
trusted library allocation
|
page read and write
|
||
1DD5759E000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B0000
|
heap
|
page read and write
|
||
1DD5F404000
|
trusted library allocation
|
page read and write
|
||
1DD57866000
|
trusted library allocation
|
page read and write
|
||
1DD5DFC1000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
heap
|
page read and write
|
||
1DD560C3000
|
trusted library allocation
|
page read and write
|
||
1DD529AF000
|
trusted library allocation
|
page read and write
|
||
1DD591A8000
|
trusted library allocation
|
page read and write
|
||
1DD527B4000
|
trusted library allocation
|
page read and write
|
||
1DD60FAA000
|
heap
|
page read and write
|
||
1DD5566D000
|
trusted library allocation
|
page read and write
|
||
1DD5309F000
|
heap
|
page read and write
|
||
1DD5D94E000
|
trusted library allocation
|
page read and write
|
||
1DD57DFC000
|
trusted library allocation
|
page read and write
|
||
1DD57460000
|
trusted library allocation
|
page read and write
|
||
1DD541A0000
|
trusted library allocation
|
page read and write
|
||
1DD59393000
|
trusted library allocation
|
page read and write
|
||
1DD56043000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD55986000
|
trusted library allocation
|
page read and write
|
||
1DD577D0000
|
trusted library allocation
|
page read and write
|
||
1DD563CF000
|
trusted library allocation
|
page read and write
|
||
1DD5FFC1000
|
trusted library allocation
|
page read and write
|
||
1DD5F3FC000
|
trusted library allocation
|
page read and write
|
||
1DBB33F0000
|
heap
|
page read and write
|
||
1DD5D9D6000
|
trusted library allocation
|
page read and write
|
||
1DD59B66000
|
trusted library allocation
|
page read and write
|
||
1DD5F75F000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
E83B63E000
|
unkown
|
page readonly
|
||
1DD55B70000
|
trusted library allocation
|
page read and write
|
||
1DD60F05000
|
heap
|
page read and write
|
||
1DD53963000
|
trusted library allocation
|
page read and write
|
||
1DD527B4000
|
trusted library allocation
|
page read and write
|
||
1DD581D1000
|
trusted library allocation
|
page read and write
|
||
1DD5DF15000
|
trusted library allocation
|
page read and write
|
||
1DD56EEE000
|
trusted library allocation
|
page read and write
|
||
1DD52A7F000
|
trusted library allocation
|
page read and write
|
||
1DD530A8000
|
heap
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
1DD4C766000
|
heap
|
page read and write
|
||
1DD4C7B0000
|
heap
|
page read and write
|
||
1DD60E99000
|
heap
|
page read and write
|
||
1DD59370000
|
trusted library allocation
|
page read and write
|
||
1DD570C5000
|
trusted library allocation
|
page read and write
|
||
1DD56E4E000
|
trusted library allocation
|
page read and write
|
||
1DD572F8000
|
trusted library allocation
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD5F2AD000
|
trusted library allocation
|
page read and write
|
||
1E877B6E000
|
trusted library allocation
|
page read and write
|
||
1DD572E0000
|
trusted library allocation
|
page read and write
|
||
1DD572E0000
|
trusted library allocation
|
page read and write
|
||
1DD59B85000
|
trusted library allocation
|
page read and write
|
||
1DD5764E000
|
trusted library allocation
|
page read and write
|
||
1DD5634B000
|
trusted library allocation
|
page read and write
|
||
1DD5822E000
|
trusted library allocation
|
page read and write
|
||
1DD56345000
|
trusted library allocation
|
page read and write
|
||
1DD5DBD9000
|
trusted library allocation
|
page read and write
|
||
1DD56E6E000
|
trusted library allocation
|
page read and write
|
||
1DD58195000
|
trusted library allocation
|
page read and write
|
||
1DD4C753000
|
heap
|
page read and write
|
||
1DD5DCBD000
|
trusted library allocation
|
page read and write
|
||
1DD577F8000
|
trusted library allocation
|
page read and write
|
||
1DD574E0000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
1DD5DB30000
|
trusted library allocation
|
page read and write
|
||
1DD4C7BB000
|
heap
|
page read and write
|
||
1DD55663000
|
trusted library allocation
|
page read and write
|
||
1DD5FF5F000
|
trusted library allocation
|
page read and write
|
||
1DD5726B000
|
trusted library allocation
|
page read and write
|
||
37E000
|
stack
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD56A5A000
|
trusted library allocation
|
page read and write
|
||
1DD5DC8F000
|
trusted library allocation
|
page read and write
|
||
1DD5744B000
|
trusted library allocation
|
page read and write
|
||
1DD539F8000
|
trusted library allocation
|
page read and write
|
||
1DD5D7AE000
|
trusted library allocation
|
page read and write
|
||
1DD577CC000
|
trusted library allocation
|
page read and write
|
||
1DD54139000
|
trusted library allocation
|
page read and write
|
||
1E877B7B000
|
trusted library allocation
|
page read and write
|
||
1DD4C75F000
|
heap
|
page read and write
|
||
1DD58DC7000
|
trusted library allocation
|
page read and write
|
||
1DD5DB90000
|
trusted library allocation
|
page read and write
|
||
1DD4C772000
|
heap
|
page read and write
|
||
1DD5DC7F000
|
trusted library allocation
|
page read and write
|
||
1DD59B5C000
|
trusted library allocation
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
1DD530A8000
|
heap
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DBB2A80000
|
unclassified section
|
page readonly
|
||
D60000
|
heap
|
page read and write
|
||
1DD53975000
|
trusted library allocation
|
page read and write
|
||
1DD57BE4000
|
trusted library allocation
|
page read and write
|
||
1DBB3B6A000
|
heap
|
page read and write
|
||
1DD57FFE000
|
trusted library allocation
|
page read and write
|
||
1DD5FEE1000
|
trusted library allocation
|
page read and write
|
||
1DD4C753000
|
heap
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1E877960000
|
unclassified section
|
page read and write
|
||
1AE8D880000
|
heap
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD577FE000
|
trusted library allocation
|
page read and write
|
||
1DD58D19000
|
trusted library allocation
|
page read and write
|
||
1DD58DC1000
|
trusted library allocation
|
page read and write
|
||
1DD58092000
|
trusted library allocation
|
page read and write
|
||
1DD53975000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD53922000
|
trusted library allocation
|
page read and write
|
||
1DD5DE5F000
|
trusted library allocation
|
page read and write
|
||
1DD56075000
|
trusted library allocation
|
page read and write
|
||
1DD4C7CB000
|
heap
|
page read and write
|
||
1DD57271000
|
trusted library allocation
|
page read and write
|
||
1DD558D7000
|
trusted library allocation
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
1DD52A99000
|
trusted library allocation
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1E877950000
|
heap
|
page readonly
|
||
1DD56E38000
|
trusted library allocation
|
page read and write
|
||
1DD5DCB1000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD4C7C6000
|
heap
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD530B3000
|
heap
|
page read and write
|
||
1DD55681000
|
trusted library allocation
|
page read and write
|
||
1DD56E5D000
|
trusted library allocation
|
page read and write
|
||
1DBB3AFC000
|
heap
|
page read and write
|
||
1DD5DE8D000
|
trusted library allocation
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD556C2000
|
trusted library allocation
|
page read and write
|
||
1DD56FB6000
|
trusted library allocation
|
page read and write
|
||
1DD4C768000
|
heap
|
page read and write
|
||
1DD56059000
|
trusted library allocation
|
page read and write
|
||
1DD56A9E000
|
trusted library allocation
|
page read and write
|
||
BAC000
|
heap
|
page read and write
|
||
1DBB2C20000
|
unclassified section
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD5D8C0000
|
trusted library allocation
|
page read and write
|
||
1DD570C8000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD55BFA000
|
trusted library allocation
|
page read and write
|
||
1E877B60000
|
trusted library allocation
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
DE1000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD53922000
|
trusted library allocation
|
page read and write
|
||
1DD51826000
|
trusted library allocation
|
page read and write
|
||
1DD6076D000
|
trusted library allocation
|
page read and write
|
||
1DD4C769000
|
heap
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD5DB95000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD56059000
|
trusted library allocation
|
page read and write
|
||
1DD52978000
|
trusted library allocation
|
page read and write
|
||
1DD56071000
|
trusted library allocation
|
page read and write
|
||
1DD5DECC000
|
trusted library allocation
|
page read and write
|
||
1DD577DD000
|
trusted library allocation
|
page read and write
|
||
1DD511C7000
|
trusted library allocation
|
page read and write
|
||
1DD560F7000
|
trusted library allocation
|
page read and write
|
||
1DD560F7000
|
trusted library allocation
|
page read and write
|
||
1DD577BE000
|
trusted library allocation
|
page read and write
|
||
1DD5DCA2000
|
trusted library allocation
|
page read and write
|
||
1DD57047000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD4C771000
|
heap
|
page read and write
|
||
E83C77E000
|
stack
|
page read and write
|
||
1DD58069000
|
trusted library allocation
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
1DD529F4000
|
trusted library allocation
|
page read and write
|
||
1DBB34B0000
|
heap
|
page read and write
|
||
1DD574E0000
|
trusted library allocation
|
page read and write
|
||
1DD56E59000
|
trusted library allocation
|
page read and write
|
||
1DD5F7A6000
|
trusted library allocation
|
page read and write
|
||
1DD57ED7000
|
trusted library allocation
|
page read and write
|
||
1DD5DE61000
|
trusted library allocation
|
page read and write
|
||
160835224000
|
trusted library allocation
|
page read and write
|
||
1DD581D3000
|
trusted library allocation
|
page read and write
|
||
1DD53095000
|
heap
|
page read and write
|
||
1DD56AE6000
|
trusted library allocation
|
page read and write
|
||
1DD5DCBD000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD572E0000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B9000
|
heap
|
page read and write
|
||
1DD58212000
|
trusted library allocation
|
page read and write
|
||
1DBB2C30000
|
trusted library allocation
|
page read and write
|
||
1DD5DCF8000
|
trusted library allocation
|
page read and write
|
||
1DD5F258000
|
trusted library allocation
|
page read and write
|
||
1DBB3B78000
|
heap
|
page read and write
|
||
1DD56E43000
|
trusted library allocation
|
page read and write
|
||
1DD58275000
|
trusted library allocation
|
page read and write
|
||
1DBB3B78000
|
heap
|
page read and write
|
||
1DD609FE000
|
trusted library allocation
|
page read and write
|
||
1DD59900000
|
trusted library allocation
|
page read and write
|
||
1DD58175000
|
trusted library allocation
|
page read and write
|
||
1DD572FA000
|
trusted library allocation
|
page read and write
|
||
E83C73E000
|
unkown
|
page readonly
|
||
1DD5DE91000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DBB3AF1000
|
heap
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
1DD5D89A000
|
trusted library allocation
|
page read and write
|
||
1DD5419A000
|
trusted library allocation
|
page read and write
|
||
1DD56A60000
|
trusted library allocation
|
page read and write
|
||
1DD52A50000
|
trusted library allocation
|
page read and write
|
||
1DD57D70000
|
trusted library allocation
|
page read and write
|
||
1DD57DC3000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1DBB3A8D000
|
heap
|
page read and write
|
||
1DD53977000
|
trusted library allocation
|
page read and write
|
||
1DD577D3000
|
trusted library allocation
|
page read and write
|
||
1DBB2F0C000
|
trusted library allocation
|
page read and write
|
||
1DD511EF000
|
trusted library allocation
|
page read and write
|
||
1DD57795000
|
trusted library allocation
|
page read and write
|
||
1DD559E0000
|
trusted library allocation
|
page read and write
|
||
236B4858000
|
heap
|
page read and write
|
||
1DD5804F000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD57598000
|
trusted library allocation
|
page read and write
|
||
1E877B5D000
|
trusted library allocation
|
page read and write
|
||
1DD563D1000
|
trusted library allocation
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
1DD5FEBD000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD580FD000
|
trusted library allocation
|
page read and write
|
||
1DD60C67000
|
trusted library allocation
|
page read and write
|
||
1DD590D1000
|
trusted library allocation
|
page read and write
|
||
1DD577D0000
|
trusted library allocation
|
page read and write
|
||
4E983FE000
|
stack
|
page read and write
|
||
1DD5706E000
|
trusted library allocation
|
page read and write
|
||
1DD60FF7000
|
heap
|
page read and write
|
||
1DD578F4000
|
trusted library allocation
|
page read and write
|
||
1DD558A1000
|
trusted library allocation
|
page read and write
|
||
1DD5DBE2000
|
trusted library allocation
|
page read and write
|
||
1DD54159000
|
trusted library allocation
|
page read and write
|
||
1DD56391000
|
trusted library allocation
|
page read and write
|
||
1DD5D8F5000
|
trusted library allocation
|
page read and write
|
||
1DD55883000
|
trusted library allocation
|
page read and write
|
||
1DD5D937000
|
trusted library allocation
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
1DD563D4000
|
trusted library allocation
|
page read and write
|
||
1DD56365000
|
trusted library allocation
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD5726D000
|
trusted library allocation
|
page read and write
|
||
1DD561FE000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
heap
|
page read and write
|
||
1DD593A7000
|
trusted library allocation
|
page read and write
|
||
1DD5DB63000
|
trusted library allocation
|
page read and write
|
||
1DD56E2A000
|
trusted library allocation
|
page read and write
|
||
B84000
|
heap
|
page read and write
|
||
1DD57ED1000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
1DD5DEE0000
|
trusted library allocation
|
page read and write
|
||
1DD5D9B5000
|
trusted library allocation
|
page read and write
|
||
1DD5828F000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD581C1000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD52ABE000
|
trusted library allocation
|
page read and write
|
||
1DD5D9BA000
|
trusted library allocation
|
page read and write
|
||
1DD5DBE4000
|
trusted library allocation
|
page read and write
|
||
1DD472EB000
|
heap
|
page read and write
|
||
1DD518CD000
|
trusted library allocation
|
page read and write
|
||
1DD57543000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD4C779000
|
heap
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD54133000
|
trusted library allocation
|
page read and write
|
||
1DD56AAC000
|
trusted library allocation
|
page read and write
|
||
1DD582B1000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5D8AA000
|
trusted library allocation
|
page read and write
|
||
1DD559E8000
|
trusted library allocation
|
page read and write
|
||
1DD5762F000
|
trusted library allocation
|
page read and write
|
||
1DD572FA000
|
trusted library allocation
|
page read and write
|
||
1DD541A0000
|
trusted library allocation
|
page read and write
|
||
1DBB3AF1000
|
heap
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD608D9000
|
trusted library allocation
|
page read and write
|
||
1DD4C76C000
|
heap
|
page read and write
|
||
191E1530000
|
heap
|
page read and write
|
||
1DD52A50000
|
trusted library allocation
|
page read and write
|
||
1DD57554000
|
trusted library allocation
|
page read and write
|
||
1DD577E4000
|
trusted library allocation
|
page read and write
|
||
1DD56E5D000
|
trusted library allocation
|
page read and write
|
||
1DD608CC000
|
trusted library allocation
|
page read and write
|
||
1DD5DBDC000
|
trusted library allocation
|
page read and write
|
||
EAD14403000
|
trusted library allocation
|
page read and write
|
||
1DBB2F23000
|
trusted library allocation
|
page read and write
|
||
1DD511EF000
|
trusted library allocation
|
page read and write
|
||
1DD57E9C000
|
trusted library allocation
|
page read and write
|
||
1DBB2F10000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD570A5000
|
trusted library allocation
|
page read and write
|
||
1DD5827E000
|
trusted library allocation
|
page read and write
|
||
1DD5F3B1000
|
trusted library allocation
|
page read and write
|
||
1DD5DCA0000
|
trusted library allocation
|
page read and write
|
||
1DD54184000
|
trusted library allocation
|
page read and write
|
||
1DD4C7CB000
|
heap
|
page read and write
|
||
1DD57088000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD539C8000
|
trusted library allocation
|
page read and write
|
||
1DD57244000
|
trusted library allocation
|
page read and write
|
||
1DD578F7000
|
trusted library allocation
|
page read and write
|
||
1DD53099000
|
heap
|
page read and write
|
||
E83B5FE000
|
unkown
|
page readonly
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD57447000
|
trusted library allocation
|
page read and write
|
||
1DD56E28000
|
trusted library allocation
|
page read and write
|
||
1DD56A16000
|
trusted library allocation
|
page read and write
|
||
1DD54160000
|
trusted library allocation
|
page read and write
|
||
1DD593E9000
|
trusted library allocation
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
1DD4C7B0000
|
heap
|
page read and write
|
||
1DD5826A000
|
trusted library allocation
|
page read and write
|
||
9DD5D8000
|
stack
|
page read and write
|
||
5A7BFE000
|
stack
|
page read and write
|
||
1DD5DC79000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD55B92000
|
trusted library allocation
|
page read and write
|
||
1DD57225000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD5807B000
|
trusted library allocation
|
page read and write
|
||
191E1AA6000
|
trusted library allocation
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD5F733000
|
trusted library allocation
|
page read and write
|
||
1DD55674000
|
trusted library allocation
|
page read and write
|
||
191E1A11000
|
trusted library allocation
|
page read and write
|
||
1DD57482000
|
trusted library allocation
|
page read and write
|
||
1DD577E4000
|
trusted library allocation
|
page read and write
|
||
1DD57459000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5816D000
|
trusted library allocation
|
page read and write
|
||
1DD57373000
|
trusted library allocation
|
page read and write
|
||
1DD5736B000
|
trusted library allocation
|
page read and write
|
||
1DD5612B000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD57533000
|
trusted library allocation
|
page read and write
|
||
1DD559B4000
|
trusted library allocation
|
page read and write
|
||
1DD52990000
|
trusted library allocation
|
page read and write
|
||
1DD5DB6C000
|
trusted library allocation
|
page read and write
|
||
1DD5DCA6000
|
trusted library allocation
|
page read and write
|
||
1DD57F5C000
|
trusted library allocation
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
1DD60E95000
|
heap
|
page read and write
|
||
1DD56E60000
|
trusted library allocation
|
page read and write
|
||
1DD4C7BC000
|
heap
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD5D813000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
1DD5DBEC000
|
trusted library allocation
|
page read and write
|
||
1DD559D0000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD57D4C000
|
trusted library allocation
|
page read and write
|
||
191E1360000
|
unclassified section
|
page readonly
|
||
1DD56E6E000
|
trusted library allocation
|
page read and write
|
||
1DD5D898000
|
trusted library allocation
|
page read and write
|
||
1DD5D9FE000
|
trusted library allocation
|
page read and write
|
||
1DD57586000
|
trusted library allocation
|
page read and write
|
||
1DD55980000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C1000
|
heap
|
page read and write
|
||
1DD5745C000
|
trusted library allocation
|
page read and write
|
||
E83B6BB000
|
stack
|
page read and write
|
||
1DD57ECB000
|
trusted library allocation
|
page read and write
|
||
1DD57CB3000
|
trusted library allocation
|
page read and write
|
||
1DD574FB000
|
trusted library allocation
|
page read and write
|
||
1DD57492000
|
trusted library allocation
|
page read and write
|
||
DC8000
|
heap
|
page read and write
|
||
1DD4C74E000
|
heap
|
page read and write
|
||
1DD5724B000
|
trusted library allocation
|
page read and write
|
||
1DD577D0000
|
trusted library allocation
|
page read and write
|
||
1DD60EE6000
|
heap
|
page read and write
|
||
1DD57551000
|
trusted library allocation
|
page read and write
|
||
1DD4C75C000
|
heap
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD563C3000
|
trusted library allocation
|
page read and write
|
||
1DD581AE000
|
trusted library allocation
|
page read and write
|
||
1DD5DE59000
|
trusted library allocation
|
page read and write
|
||
1DD574AE000
|
trusted library allocation
|
page read and write
|
||
1DD575E2000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD5DFEA000
|
trusted library allocation
|
page read and write
|
||
1DD57460000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DBB3AE8000
|
heap
|
page read and write
|
||
1DD5F7F1000
|
trusted library allocation
|
page read and write
|
||
1DD5778B000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD55998000
|
trusted library allocation
|
page read and write
|
||
1DD56059000
|
trusted library allocation
|
page read and write
|
||
1DD5DBF6000
|
trusted library allocation
|
page read and write
|
||
1DD591AE000
|
trusted library allocation
|
page read and write
|
||
1DD561EE000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD56A8F000
|
trusted library allocation
|
page read and write
|
||
1DD560F7000
|
trusted library allocation
|
page read and write
|
||
1DD56066000
|
trusted library allocation
|
page read and write
|
||
1DD54149000
|
trusted library allocation
|
page read and write
|
||
1DD55B9A000
|
trusted library allocation
|
page read and write
|
||
1DD52ABC000
|
trusted library allocation
|
page read and write
|
||
1DD570A0000
|
trusted library allocation
|
page read and write
|
||
1DD56D9D000
|
trusted library allocation
|
page read and write
|
||
1DD572E3000
|
trusted library allocation
|
page read and write
|
||
1DD57016000
|
trusted library allocation
|
page read and write
|
||
1DD58E33000
|
trusted library allocation
|
page read and write
|
||
1DBB2F7A000
|
trusted library allocation
|
page read and write
|
||
1DD5DEF9000
|
trusted library allocation
|
page read and write
|
||
1DD58138000
|
trusted library allocation
|
page read and write
|
||
1DD5DBB8000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD5786E000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
1DD577B0000
|
trusted library allocation
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD54160000
|
trusted library allocation
|
page read and write
|
||
1DD577DB000
|
trusted library allocation
|
page read and write
|
||
1DD54127000
|
trusted library allocation
|
page read and write
|
||
1DD574A9000
|
trusted library allocation
|
page read and write
|
||
1DD5D8EF000
|
trusted library allocation
|
page read and write
|
||
1DD5DE65000
|
trusted library allocation
|
page read and write
|
||
191E1A69000
|
trusted library allocation
|
page read and write
|
||
1DD560C3000
|
trusted library allocation
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
1DD5732B000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD582D1000
|
trusted library allocation
|
page read and write
|
||
1DD518EA000
|
trusted library allocation
|
page read and write
|
||
1E877B96000
|
trusted library allocation
|
page read and write
|
||
1DD574E0000
|
trusted library allocation
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
1DD58166000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD5727B000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5DE57000
|
trusted library allocation
|
page read and write
|
||
1DD527B4000
|
trusted library allocation
|
page read and write
|
||
1DD5784A000
|
trusted library allocation
|
page read and write
|
||
1DD5DA75000
|
trusted library allocation
|
page read and write
|
||
1DD56087000
|
trusted library allocation
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
1DD57594000
|
trusted library allocation
|
page read and write
|
||
1DD575B4000
|
trusted library allocation
|
page read and write
|
||
1DD60967000
|
trusted library allocation
|
page read and write
|
||
1DBB3AE3000
|
heap
|
page read and write
|
||
1DD5D7BF000
|
trusted library allocation
|
page read and write
|
||
1DD5759E000
|
trusted library allocation
|
page read and write
|
||
1DD58EA8000
|
trusted library allocation
|
page read and write
|
||
1DD55BA9000
|
trusted library allocation
|
page read and write
|
||
1DD4C764000
|
heap
|
page read and write
|
||
1DBB3B3C000
|
heap
|
page read and write
|
||
1DD6077A000
|
trusted library allocation
|
page read and write
|
||
1DD5744B000
|
trusted library allocation
|
page read and write
|
||
1DBB3A69000
|
heap
|
page read and write
|
||
1DD570E5000
|
trusted library allocation
|
page read and write
|
||
1DD57D25000
|
trusted library allocation
|
page read and write
|
||
1E877B16000
|
trusted library allocation
|
page read and write
|
||
1DD57240000
|
trusted library allocation
|
page read and write
|
||
1DD572A5000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
1DD60FDF000
|
heap
|
page read and write
|
||
1AE8D58A000
|
heap
|
page read and write
|
||
1DD4C7B9000
|
heap
|
page read and write
|
||
1DBB3AE3000
|
heap
|
page read and write
|
||
1DD5D782000
|
trusted library allocation
|
page read and write
|
||
1DD5778D000
|
trusted library allocation
|
page read and write
|
||
1DD58EFD000
|
trusted library allocation
|
page read and write
|
||
1DD5DBAB000
|
trusted library allocation
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
1DBB3AF1000
|
heap
|
page read and write
|
||
E83BF3E000
|
stack
|
page read and write
|
||
1DBB2C6A000
|
heap
|
page read and write
|
||
1DD58092000
|
trusted library allocation
|
page read and write
|
||
1DD5936B000
|
trusted library allocation
|
page read and write
|
||
1DD578D7000
|
trusted library allocation
|
page read and write
|
||
1DD4C778000
|
heap
|
page read and write
|
||
1DD57213000
|
trusted library allocation
|
page read and write
|
||
1DD572E0000
|
trusted library allocation
|
page read and write
|
||
1DD5DBD0000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1E877C00000
|
trusted library allocation
|
page read and write
|
||
1DD5778D000
|
trusted library allocation
|
page read and write
|
||
1DD574B5000
|
trusted library allocation
|
page read and write
|
||
1DD53977000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
236B4859000
|
heap
|
page read and write
|
||
1DD55697000
|
trusted library allocation
|
page read and write
|
||
9DCBEE000
|
unkown
|
page readonly
|
||
1DD5754C000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1DD5820D000
|
trusted library allocation
|
page read and write
|
||
1DD60E95000
|
heap
|
page read and write
|
||
1DBB3B18000
|
heap
|
page read and write
|
||
1DD5DE86000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
1DD55667000
|
trusted library allocation
|
page read and write
|
||
1DD59BF9000
|
trusted library allocation
|
page read and write
|
||
1DD5FFDE000
|
trusted library allocation
|
page read and write
|
||
1DBB3AE1000
|
heap
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
1DD572BF000
|
trusted library allocation
|
page read and write
|
||
DC7000
|
heap
|
page read and write
|
||
1E877760000
|
remote allocation
|
page read and write
|
||
1DD57D36000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
1E877B2E000
|
trusted library allocation
|
page read and write
|
||
1DD51190000
|
trusted library allocation
|
page read and write
|
||
1DD580B1000
|
trusted library allocation
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
236B2F00000
|
trusted library allocation
|
page read and write
|
||
1DD539D8000
|
trusted library allocation
|
page read and write
|
||
1DD57083000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD5D8B8000
|
trusted library allocation
|
page read and write
|
||
1DD529B0000
|
trusted library allocation
|
page read and write
|
||
1DD58E6D000
|
trusted library allocation
|
page read and write
|
||
1DD5744E000
|
trusted library allocation
|
page read and write
|
||
1DD58DDB000
|
trusted library allocation
|
page read and write
|
||
1DD5DFCB000
|
trusted library allocation
|
page read and write
|
||
1DD5638C000
|
trusted library allocation
|
page read and write
|
||
1DD527AB000
|
trusted library allocation
|
page read and write
|
||
1DD57780000
|
trusted library allocation
|
page read and write
|
||
1DD5DE8F000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
B7B000
|
heap
|
page read and write
|
||
1DD5DE4F000
|
trusted library allocation
|
page read and write
|
||
1DD55691000
|
trusted library allocation
|
page read and write
|
||
1DD60600000
|
trusted library allocation
|
page read and write
|
||
1DD54143000
|
trusted library allocation
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD577DA000
|
trusted library allocation
|
page read and write
|
||
DD3000
|
heap
|
page read and write
|
||
1DD58D48000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD56E6C000
|
trusted library allocation
|
page read and write
|
||
1DD5DEB0000
|
trusted library allocation
|
page read and write
|
||
1DD5639C000
|
trusted library allocation
|
page read and write
|
||
1DD57240000
|
trusted library allocation
|
page read and write
|
||
1DD5DEBA000
|
trusted library allocation
|
page read and write
|
||
1DD577E1000
|
trusted library allocation
|
page read and write
|
||
1DD58175000
|
trusted library allocation
|
page read and write
|
||
1E877800000
|
heap
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
E83C7BE000
|
unkown
|
page readonly
|
||
DA4000
|
heap
|
page read and write
|
||
1DD559B6000
|
trusted library allocation
|
page read and write
|
||
1DD578DD000
|
trusted library allocation
|
page read and write
|
||
1DD57375000
|
trusted library allocation
|
page read and write
|
||
1DD61696000
|
trusted library allocation
|
page read and write
|
||
1DD53928000
|
trusted library allocation
|
page read and write
|
||
1DD55665000
|
trusted library allocation
|
page read and write
|
||
E839DD8000
|
stack
|
page read and write
|
||
1AE8D6C0000
|
heap
|
page read and write
|
||
1DD57B36000
|
trusted library allocation
|
page read and write
|
||
1DD570C5000
|
trusted library allocation
|
page read and write
|
||
1DD5D967000
|
trusted library allocation
|
page read and write
|
||
1DD5DE49000
|
trusted library allocation
|
page read and write
|
||
1DD56020000
|
trusted library allocation
|
page read and write
|
||
1DD57588000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
1DD581AE000
|
trusted library allocation
|
page read and write
|
||
1DD56A65000
|
trusted library allocation
|
page read and write
|
||
1DD60E9F000
|
heap
|
page read and write
|
||
1DD578A9000
|
trusted library allocation
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5DEE0000
|
trusted library allocation
|
page read and write
|
||
1DD57327000
|
trusted library allocation
|
page read and write
|
||
1DD55693000
|
trusted library allocation
|
page read and write
|
||
1DD577F9000
|
trusted library allocation
|
page read and write
|
||
1DD55692000
|
trusted library allocation
|
page read and write
|
||
1DD5DBD6000
|
trusted library allocation
|
page read and write
|
||
1DD582B1000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1DD52756000
|
trusted library allocation
|
page read and write
|
||
5A83FE000
|
unkown
|
page readonly
|
||
1DD60C6F000
|
trusted library allocation
|
page read and write
|
||
1DD52B27000
|
trusted library allocation
|
page read and write
|
||
1DBB3A69000
|
heap
|
page read and write
|
||
1DD57088000
|
trusted library allocation
|
page read and write
|
||
1DD51189000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
191E1A0C000
|
trusted library allocation
|
page read and write
|
||
1DD56E60000
|
trusted library allocation
|
page read and write
|
||
1DD530A8000
|
heap
|
page read and write
|
||
1DD5DE72000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
1DD4C75C000
|
heap
|
page read and write
|
||
1DD5DCCB000
|
trusted library allocation
|
page read and write
|
||
1DD572D2000
|
trusted library allocation
|
page read and write
|
||
1DD609C9000
|
trusted library allocation
|
page read and write
|
||
1DD5703C000
|
trusted library allocation
|
page read and write
|
||
1DD5DFFA000
|
trusted library allocation
|
page read and write
|
||
1DD57D8A000
|
trusted library allocation
|
page read and write
|
||
1DD590F4000
|
trusted library allocation
|
page read and write
|
||
1DD58D77000
|
trusted library allocation
|
page read and write
|
||
1DD607D8000
|
trusted library allocation
|
page read and write
|
||
1DD57070000
|
trusted library allocation
|
page read and write
|
||
1DD55B25000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
1DD559F2000
|
trusted library allocation
|
page read and write
|
||
1DD5818E000
|
trusted library allocation
|
page read and write
|
||
1DD5615A000
|
trusted library allocation
|
page read and write
|
||
1DD5D99E000
|
trusted library allocation
|
page read and write
|
||
1DD577C8000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD53972000
|
trusted library allocation
|
page read and write
|
||
1DD593AF000
|
trusted library allocation
|
page read and write
|
||
1DD57866000
|
trusted library allocation
|
page read and write
|
||
1DD577F8000
|
trusted library allocation
|
page read and write
|
||
1DD5F401000
|
trusted library allocation
|
page read and write
|
||
1DD56A0F000
|
trusted library allocation
|
page read and write
|
||
1DD53961000
|
trusted library allocation
|
page read and write
|
||
1DD57032000
|
trusted library allocation
|
page read and write
|
||
191E1A45000
|
trusted library allocation
|
page read and write
|
||
1DD56E43000
|
trusted library allocation
|
page read and write
|
||
1DD5D89B000
|
trusted library allocation
|
page read and write
|
||
1DD5D956000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1E877C1F000
|
trusted library allocation
|
page read and write
|
||
1DD580B6000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD52AA1000
|
trusted library allocation
|
page read and write
|
||
236B2C43000
|
heap
|
page read and write
|
||
1DD558D7000
|
trusted library allocation
|
page read and write
|
||
1DD56E65000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD5789A000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C6000
|
heap
|
page read and write
|
||
1DD57346000
|
trusted library allocation
|
page read and write
|
||
1DD60C55000
|
trusted library allocation
|
page read and write
|
||
1DD5DEE4000
|
trusted library allocation
|
page read and write
|
||
1DD58124000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
4E99BFF000
|
stack
|
page read and write
|
||
1DD5DCB1000
|
trusted library allocation
|
page read and write
|
||
1DD577FC000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DBB3AF1000
|
heap
|
page read and write
|
||
1DD57E96000
|
trusted library allocation
|
page read and write
|
||
1DD57551000
|
trusted library allocation
|
page read and write
|
||
1DBB2F78000
|
trusted library allocation
|
page read and write
|
||
1DD574F8000
|
trusted library allocation
|
page read and write
|
||
1DD56ADF000
|
trusted library allocation
|
page read and write
|
||
1DD5D9FA000
|
trusted library allocation
|
page read and write
|
||
1DD59B59000
|
trusted library allocation
|
page read and write
|
||
1DD4C778000
|
heap
|
page read and write
|
||
1DD56A88000
|
trusted library allocation
|
page read and write
|
||
1DD56E75000
|
trusted library allocation
|
page read and write
|
||
1DD5726D000
|
trusted library allocation
|
page read and write
|
||
1DD5779A000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
191E1B08000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
1DD6097E000
|
trusted library allocation
|
page read and write
|
||
1DD5F304000
|
trusted library allocation
|
page read and write
|
||
1DD5744B000
|
trusted library allocation
|
page read and write
|
||
1DD58260000
|
trusted library allocation
|
page read and write
|
||
1DD52A56000
|
trusted library allocation
|
page read and write
|
||
1DBB34A0000
|
heap
|
page read and write
|
||
1DD572F8000
|
trusted library allocation
|
page read and write
|
||
1DD5DB98000
|
trusted library allocation
|
page read and write
|
||
1DD574C6000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C1000
|
heap
|
page read and write
|
||
1DD570AD000
|
trusted library allocation
|
page read and write
|
||
1DD570E8000
|
trusted library allocation
|
page read and write
|
||
1DD5DC95000
|
trusted library allocation
|
page read and write
|
||
1DD57D60000
|
trusted library allocation
|
page read and write
|
||
1DD4C7BB000
|
heap
|
page read and write
|
||
1DD5D967000
|
trusted library allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
DAB000
|
heap
|
page read and write
|
||
1DD5DED5000
|
trusted library allocation
|
page read and write
|
||
B58000
|
heap
|
page read and write
|
||
1DD561C2000
|
trusted library allocation
|
page read and write
|
||
1DD59BFC000
|
trusted library allocation
|
page read and write
|
||
1DD4C782000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
1DD5727B000
|
trusted library allocation
|
page read and write
|
||
1DD580FA000
|
trusted library allocation
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
1DD575E2000
|
trusted library allocation
|
page read and write
|
||
1E87778A000
|
heap
|
page read and write
|
||
1DD5DC7B000
|
trusted library allocation
|
page read and write
|
||
1DD5DCB3000
|
trusted library allocation
|
page read and write
|
||
236B2BB0000
|
heap
|
page read and write
|
||
1DD5F2C1000
|
trusted library allocation
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
1DD53928000
|
trusted library allocation
|
page read and write
|
||
1DBB2F00000
|
trusted library allocation
|
page read and write
|
||
1DD5804B000
|
trusted library allocation
|
page read and write
|
||
1DD56EAD000
|
trusted library allocation
|
page read and write
|
||
1DD572E0000
|
trusted library allocation
|
page read and write
|
||
1DD5595B000
|
trusted library allocation
|
page read and write
|
||
1DD609B7000
|
trusted library allocation
|
page read and write
|
||
1DD5DE6E000
|
trusted library allocation
|
page read and write
|
||
1DD58EAD000
|
trusted library allocation
|
page read and write
|
||
1DD582E0000
|
trusted library allocation
|
page read and write
|
||
1DD5DEBA000
|
trusted library allocation
|
page read and write
|
||
1DD561EE000
|
trusted library allocation
|
page read and write
|
||
1DD559E0000
|
trusted library allocation
|
page read and write
|
||
1DD5172F000
|
trusted library allocation
|
page read and write
|
||
DBC000
|
heap
|
page read and write
|
||
1DD57FFB000
|
trusted library allocation
|
page read and write
|
||
1DD5723B000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
5A8D3E000
|
stack
|
page read and write
|
||
1DD561FC000
|
trusted library allocation
|
page read and write
|
||
1DD5DBC6000
|
trusted library allocation
|
page read and write
|
||
1DD472E0000
|
heap
|
page read and write
|
||
1DD4C776000
|
heap
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD5804F000
|
trusted library allocation
|
page read and write
|
||
1DD581E5000
|
trusted library allocation
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
1DD5DC95000
|
trusted library allocation
|
page read and write
|
||
1DD5F2FC000
|
trusted library allocation
|
page read and write
|
||
1DD5DFFA000
|
trusted library allocation
|
page read and write
|
||
1DD572D4000
|
trusted library allocation
|
page read and write
|
||
1DD55658000
|
trusted library allocation
|
page read and write
|
||
1DD57011000
|
trusted library allocation
|
page read and write
|
||
1DD559DB000
|
trusted library allocation
|
page read and write
|
||
236B2C17000
|
heap
|
page read and write
|
||
1DD59370000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD574B3000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD55B1C000
|
trusted library allocation
|
page read and write
|
||
1DD57685000
|
trusted library allocation
|
page read and write
|
||
1DD53911000
|
trusted library allocation
|
page read and write
|
||
1DD5DEF9000
|
trusted library allocation
|
page read and write
|
||
1DD5D8E9000
|
trusted library allocation
|
page read and write
|
||
1DD472F4000
|
heap
|
page read and write
|
||
1DD608FD000
|
trusted library allocation
|
page read and write
|
||
1DD5919D000
|
trusted library allocation
|
page read and write
|
||
1DD5724B000
|
trusted library allocation
|
page read and write
|
||
1DD5759E000
|
trusted library allocation
|
page read and write
|
||
1DD5DBF3000
|
trusted library allocation
|
page read and write
|
||
1DD5818E000
|
trusted library allocation
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD578B5000
|
trusted library allocation
|
page read and write
|
||
1DD580CA000
|
trusted library allocation
|
page read and write
|
||
C43000
|
heap
|
page read and write
|
||
1DD61662000
|
trusted library allocation
|
page read and write
|
||
1DD572FA000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B0000
|
heap
|
page read and write
|
||
1DD572BF000
|
trusted library allocation
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1E8779E4000
|
heap
|
page read and write
|
||
1E877820000
|
heap
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD5DBD9000
|
trusted library allocation
|
page read and write
|
||
1DD5DBD0000
|
trusted library allocation
|
page read and write
|
||
1DD4C76A000
|
heap
|
page read and write
|
||
1DD5DF0B000
|
trusted library allocation
|
page read and write
|
||
1DD530A0000
|
heap
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
1DD5729C000
|
trusted library allocation
|
page read and write
|
||
1DD5601E000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD577D1000
|
trusted library allocation
|
page read and write
|
||
1DBB3A7D000
|
heap
|
page read and write
|
||
1DD56143000
|
trusted library allocation
|
page read and write
|
||
1DD582C6000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
B92000
|
heap
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD5DBD9000
|
trusted library allocation
|
page read and write
|
||
1DD575D1000
|
trusted library allocation
|
page read and write
|
||
1DD5D988000
|
trusted library allocation
|
page read and write
|
||
1DD577CB000
|
trusted library allocation
|
page read and write
|
||
1DBB2F9F000
|
trusted library allocation
|
page read and write
|
||
1DD5727B000
|
trusted library allocation
|
page read and write
|
||
1DD5757E000
|
trusted library allocation
|
page read and write
|
||
1DD572FA000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD57795000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B9000
|
heap
|
page read and write
|
||
1DD582A5000
|
trusted library allocation
|
page read and write
|
||
1DD4C7CB000
|
heap
|
page read and write
|
||
1DD577A6000
|
trusted library allocation
|
page read and write
|
||
1DD581C1000
|
trusted library allocation
|
page read and write
|
||
1DD57235000
|
trusted library allocation
|
page read and write
|
||
1DD5826F000
|
trusted library allocation
|
page read and write
|
||
1DD5778B000
|
trusted library allocation
|
page read and write
|
||
1DD517FE000
|
trusted library allocation
|
page read and write
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD563A5000
|
trusted library allocation
|
page read and write
|
||
1DD57235000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD5DBD9000
|
trusted library allocation
|
page read and write
|
||
1DD5DE49000
|
trusted library allocation
|
page read and write
|
||
1DD575F3000
|
trusted library allocation
|
page read and write
|
||
1DD58221000
|
trusted library allocation
|
page read and write
|
||
1DD5752D000
|
trusted library allocation
|
page read and write
|
||
1DD57384000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
1DD58169000
|
trusted library allocation
|
page read and write
|
||
1DD5F7AB000
|
trusted library allocation
|
page read and write
|
||
1DD6097E000
|
trusted library allocation
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
1DD591B0000
|
trusted library allocation
|
page read and write
|
||
1DD57274000
|
trusted library allocation
|
page read and write
|
||
1DD5FEE1000
|
trusted library allocation
|
page read and write
|
||
1DD55863000
|
trusted library allocation
|
page read and write
|
||
5A847E000
|
stack
|
page read and write
|
||
1DD5DE37000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
1DD5418E000
|
trusted library allocation
|
page read and write
|
||
1DD5F404000
|
trusted library allocation
|
page read and write
|
||
1DD559B9000
|
trusted library allocation
|
page read and write
|
||
1DD559AE000
|
trusted library allocation
|
page read and write
|
||
1DD57382000
|
trusted library allocation
|
page read and write
|
||
1DD530A3000
|
heap
|
page read and write
|
||
1DD5DE5B000
|
trusted library allocation
|
page read and write
|
||
1DD5F389000
|
trusted library allocation
|
page read and write
|
||
2C2000
|
unkown
|
page readonly
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD56395000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD4C78D000
|
heap
|
page read and write
|
||
1DD4C764000
|
heap
|
page read and write
|
||
1DD56E65000
|
trusted library allocation
|
page read and write
|
||
1DD5829C000
|
trusted library allocation
|
page read and write
|
||
1DD559BA000
|
trusted library allocation
|
page read and write
|
||
1DD4C74F000
|
heap
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
1DD5FEE1000
|
trusted library allocation
|
page read and write
|
||
1DD582F0000
|
trusted library allocation
|
page read and write
|
||
1DD58EED000
|
trusted library allocation
|
page read and write
|
||
1DD559A6000
|
trusted library allocation
|
page read and write
|
||
1E87796F000
|
unclassified section
|
page read and write
|
||
1DD5D800000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD530B2000
|
heap
|
page read and write
|
||
1DD574FC000
|
trusted library allocation
|
page read and write
|
||
1E877B64000
|
trusted library allocation
|
page read and write
|
||
1DD5745E000
|
trusted library allocation
|
page read and write
|
||
1DD5DCAD000
|
trusted library allocation
|
page read and write
|
||
1DD5DFE2000
|
trusted library allocation
|
page read and write
|
||
B7D000
|
heap
|
page read and write
|
||
1DD5DEB0000
|
trusted library allocation
|
page read and write
|
||
1DD5D78C000
|
trusted library allocation
|
page read and write
|
||
1DD57098000
|
trusted library allocation
|
page read and write
|
||
1DD4C779000
|
heap
|
page read and write
|
||
1DD5778C000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD5DFF1000
|
trusted library allocation
|
page read and write
|
||
1DD5779A000
|
trusted library allocation
|
page read and write
|
||
1DD5FEE1000
|
trusted library allocation
|
page read and write
|
||
1DBB3B22000
|
heap
|
page read and write
|
||
1DD5DE9E000
|
trusted library allocation
|
page read and write
|
||
1DD55B9A000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD4C764000
|
heap
|
page read and write
|
||
1DD539D9000
|
trusted library allocation
|
page read and write
|
||
1DD4C764000
|
heap
|
page read and write
|
||
1DD57785000
|
trusted library allocation
|
page read and write
|
||
1DD56EBC000
|
trusted library allocation
|
page read and write
|
||
191E1ABA000
|
trusted library allocation
|
page read and write
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD60E95000
|
heap
|
page read and write
|
||
1DD4C74E000
|
heap
|
page read and write
|
||
1DD59370000
|
trusted library allocation
|
page read and write
|
||
1DD52ADE000
|
trusted library allocation
|
page read and write
|
||
1DD57447000
|
trusted library allocation
|
page read and write
|
||
1DD5410F000
|
trusted library allocation
|
page read and write
|
||
1DD56E51000
|
trusted library allocation
|
page read and write
|
||
1DD5DEF9000
|
trusted library allocation
|
page read and write
|
||
1DD56078000
|
trusted library allocation
|
page read and write
|
||
1DD56E5D000
|
trusted library allocation
|
page read and write
|
||
1DD5DE7A000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD5DC87000
|
trusted library allocation
|
page read and write
|
||
1DD561EE000
|
trusted library allocation
|
page read and write
|
||
1DD559AA000
|
trusted library allocation
|
page read and write
|
||
1DD56A91000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C1000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD5DE9E000
|
trusted library allocation
|
page read and write
|
||
1DD58273000
|
trusted library allocation
|
page read and write
|
||
E83B73E000
|
unkown
|
page readonly
|
||
1DD57257000
|
trusted library allocation
|
page read and write
|
||
1DD5D7E8000
|
trusted library allocation
|
page read and write
|
||
191E1AAB000
|
trusted library allocation
|
page read and write
|
||
1DD577D3000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD58C60000
|
trusted library allocation
|
page read and write
|
||
1DD4C750000
|
heap
|
page read and write
|
||
1DD541D2000
|
trusted library allocation
|
page read and write
|
||
1DD5DB3A000
|
trusted library allocation
|
page read and write
|
||
1DD578DB000
|
trusted library allocation
|
page read and write
|
||
1DD539EC000
|
trusted library allocation
|
page read and write
|
||
9DF67E000
|
stack
|
page read and write
|
||
1DD4C774000
|
heap
|
page read and write
|
||
1DD52976000
|
trusted library allocation
|
page read and write
|
||
1DD57760000
|
trusted library allocation
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
1DD58E5C000
|
trusted library allocation
|
page read and write
|
||
1DD4C778000
|
heap
|
page read and write
|
||
1DD5DBF8000
|
trusted library allocation
|
page read and write
|
||
1DD57543000
|
trusted library allocation
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
1DD5DBED000
|
trusted library allocation
|
page read and write
|
||
1DD56A78000
|
trusted library allocation
|
page read and write
|
||
1DD57D95000
|
trusted library allocation
|
page read and write
|
||
1DD5DF0E000
|
trusted library allocation
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
1DD560E5000
|
trusted library allocation
|
page read and write
|
||
1DD5F79D000
|
trusted library allocation
|
page read and write
|
||
1DD527FB000
|
trusted library allocation
|
page read and write
|
||
E83D03E000
|
stack
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
1DD58CD9000
|
trusted library allocation
|
page read and write
|
||
1DD5D9A4000
|
trusted library allocation
|
page read and write
|
||
1DD581F0000
|
trusted library allocation
|
page read and write
|
||
1DD530AF000
|
heap
|
page read and write
|
||
1DD530B7000
|
heap
|
page read and write
|
||
1DD5726D000
|
trusted library allocation
|
page read and write
|
||
1DD60FDF000
|
heap
|
page read and write
|
||
1DD5588B000
|
trusted library allocation
|
page read and write
|
||
1DD530D5000
|
heap
|
page read and write
|
||
1DD5D7A6000
|
trusted library allocation
|
page read and write
|
||
1DD56FAF000
|
trusted library allocation
|
page read and write
|
||
2D4000
|
unkown
|
page readonly
|
||
1DD56D53000
|
trusted library allocation
|
page read and write
|
||
1DD4C7C6000
|
heap
|
page read and write
|
||
1DD541AC000
|
trusted library allocation
|
page read and write
|
||
1DD559E3000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1DD4C7C1000
|
heap
|
page read and write
|
||
1DD5D9B0000
|
trusted library allocation
|
page read and write
|
||
1DD55B1C000
|
trusted library allocation
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
1DD56E79000
|
trusted library allocation
|
page read and write
|
||
1DD5F3CA000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD559F2000
|
trusted library allocation
|
page read and write
|
||
1DD5DB8E000
|
trusted library allocation
|
page read and write
|
||
1DD55883000
|
trusted library allocation
|
page read and write
|
||
1DD58226000
|
trusted library allocation
|
page read and write
|
||
1DD5FE8E000
|
trusted library allocation
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD574CE000
|
trusted library allocation
|
page read and write
|
||
1DD57447000
|
trusted library allocation
|
page read and write
|
||
1DD56107000
|
trusted library allocation
|
page read and write
|
||
1DD5DBF8000
|
trusted library allocation
|
page read and write
|
||
1DD558D7000
|
trusted library allocation
|
page read and write
|
||
1DD5639C000
|
trusted library allocation
|
page read and write
|
||
1DD5774F000
|
trusted library allocation
|
page read and write
|
||
1DD5DFB8000
|
trusted library allocation
|
page read and write
|
||
1DD56A23000
|
trusted library allocation
|
page read and write
|
||
1DD56E79000
|
trusted library allocation
|
page read and write
|
||
1DD5567B000
|
trusted library allocation
|
page read and write
|
||
1DD4C777000
|
heap
|
page read and write
|
||
1DD5F2D6000
|
trusted library allocation
|
page read and write
|
||
C6F000
|
heap
|
page read and write
|
||
1DD5DB5C000
|
trusted library allocation
|
page read and write
|
||
1DBB2F74000
|
trusted library allocation
|
page read and write
|
||
1DD55B55000
|
trusted library allocation
|
page read and write
|
||
1DD5566D000
|
trusted library allocation
|
page read and write
|
||
1DD559FB000
|
trusted library allocation
|
page read and write
|
||
191E13DA000
|
remote allocation
|
page execute read
|
||
1DD56F72000
|
trusted library allocation
|
page read and write
|
||
1DD5DFDA000
|
trusted library allocation
|
page read and write
|
||
1DBB3AFC000
|
heap
|
page read and write
|
||
1DD5FEE8000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
1DBB3B78000
|
heap
|
page read and write
|
||
1DD5DE61000
|
trusted library allocation
|
page read and write
|
||
1DD57780000
|
trusted library allocation
|
page read and write
|
||
1DBB3A60000
|
heap
|
page read and write
|
||
1DD5DFC6000
|
trusted library allocation
|
page read and write
|
||
1DD530AC000
|
heap
|
page read and write
|
||
29C000
|
unkown
|
page readonly
|
||
DBE000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD570A0000
|
trusted library allocation
|
page read and write
|
||
1DBB3B22000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DBB3906000
|
trusted library allocation
|
page read and write
|
||
1DD58175000
|
trusted library allocation
|
page read and write
|
||
C6C000
|
heap
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD559E0000
|
trusted library allocation
|
page read and write
|
||
1DD570AA000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD561EE000
|
trusted library allocation
|
page read and write
|
||
1DD5DCBD000
|
trusted library allocation
|
page read and write
|
||
1DBB2CF9000
|
unkown
|
page execute read
|
||
1DD4C76B000
|
heap
|
page read and write
|
||
1DD61504000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DD5DBF8000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1DD574F0000
|
trusted library allocation
|
page read and write
|
||
1DD55638000
|
trusted library allocation
|
page read and write
|
||
1DD5598B000
|
trusted library allocation
|
page read and write
|
||
1DD55B40000
|
trusted library allocation
|
page read and write
|
||
CD7000
|
heap
|
page read and write
|
||
1E877B79000
|
trusted library allocation
|
page read and write
|
||
1DBB3B6A000
|
heap
|
page read and write
|
||
1DD5FF5B000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD5DEE0000
|
trusted library allocation
|
page read and write
|
||
1DD57E9C000
|
trusted library allocation
|
page read and write
|
||
1E877C0C000
|
trusted library allocation
|
page read and write
|
||
1DD572FA000
|
trusted library allocation
|
page read and write
|
||
1DD593AB000
|
trusted library allocation
|
page read and write
|
||
1DD5F7AF000
|
trusted library allocation
|
page read and write
|
||
1DBB3A60000
|
heap
|
page read and write
|
||
1DD5818D000
|
trusted library allocation
|
page read and write
|
||
1DD5F366000
|
trusted library allocation
|
page read and write
|
||
1DD530CB000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1DD591B0000
|
trusted library allocation
|
page read and write
|
||
1DD51771000
|
trusted library allocation
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
D0E000
|
heap
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD5418B000
|
trusted library allocation
|
page read and write
|
||
1DD5DE74000
|
trusted library allocation
|
page read and write
|
||
1DBB3B59000
|
heap
|
page read and write
|
||
1DD57F9A000
|
trusted library allocation
|
page read and write
|
||
1DD5F712000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD57068000
|
trusted library allocation
|
page read and write
|
||
1DD5391F000
|
trusted library allocation
|
page read and write
|
||
1DD57558000
|
trusted library allocation
|
page read and write
|
||
236B486D000
|
heap
|
page read and write
|
||
1DD4C755000
|
heap
|
page read and write
|
||
1DD511B3000
|
trusted library allocation
|
page read and write
|
||
1DD4C75F000
|
heap
|
page read and write
|
||
CC6000
|
heap
|
page read and write
|
||
1DD559B6000
|
trusted library allocation
|
page read and write
|
||
1DD4C75C000
|
heap
|
page read and write
|
||
1880000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
1DD55842000
|
trusted library allocation
|
page read and write
|
||
1DD4C764000
|
heap
|
page read and write
|
||
1DD472EB000
|
heap
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
1DD55BFA000
|
trusted library allocation
|
page read and write
|
||
1AE8D700000
|
trusted library allocation
|
page read and write
|
||
1DD5566D000
|
trusted library allocation
|
page read and write
|
||
1DD58D36000
|
trusted library allocation
|
page read and write
|
||
1DD5765A000
|
trusted library allocation
|
page read and write
|
||
1DD58275000
|
trusted library allocation
|
page read and write
|
||
1DD5778B000
|
trusted library allocation
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD5DBF6000
|
trusted library allocation
|
page read and write
|
||
1DD5DB37000
|
trusted library allocation
|
page read and write
|
||
1DD582A0000
|
trusted library allocation
|
page read and write
|
||
1DD608CD000
|
trusted library allocation
|
page read and write
|
||
1DD580CA000
|
trusted library allocation
|
page read and write
|
||
1DD57853000
|
trusted library allocation
|
page read and write
|
||
1DD575AB000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD511AA000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD58D0A000
|
trusted library allocation
|
page read and write
|
||
1DD5723B000
|
trusted library allocation
|
page read and write
|
||
1DD5607F000
|
trusted library allocation
|
page read and write
|
||
1DD575A6000
|
trusted library allocation
|
page read and write
|
||
1DD572D2000
|
trusted library allocation
|
page read and write
|
||
1DD58EF8000
|
trusted library allocation
|
page read and write
|
||
1DD4C75C000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD529D7000
|
trusted library allocation
|
page read and write
|
||
1DD55BE1000
|
trusted library allocation
|
page read and write
|
||
1DD57460000
|
trusted library allocation
|
page read and write
|
||
1DD575DF000
|
trusted library allocation
|
page read and write
|
||
1DD55BBF000
|
trusted library allocation
|
page read and write
|
||
1DD4C788000
|
heap
|
page read and write
|
||
1DD5DCB3000
|
trusted library allocation
|
page read and write
|
||
9E0E7E000
|
unkown
|
page readonly
|
||
1DD5D9BF000
|
trusted library allocation
|
page read and write
|
||
1DD58260000
|
trusted library allocation
|
page read and write
|
||
1DD5DCAD000
|
trusted library allocation
|
page read and write
|
||
1DD60C91000
|
trusted library allocation
|
page read and write
|
||
1DD5754C000
|
trusted library allocation
|
page read and write
|
||
191E1A00000
|
trusted library allocation
|
page read and write
|
||
1DD608F5000
|
trusted library allocation
|
page read and write
|
||
1DD518F2000
|
trusted library allocation
|
page read and write
|
||
1DD5DFBA000
|
trusted library allocation
|
page read and write
|
||
1DD5DA50000
|
trusted library allocation
|
page read and write
|
||
1DD57240000
|
trusted library allocation
|
page read and write
|
||
1DD582F0000
|
trusted library allocation
|
page read and write
|
||
1DD5DFBA000
|
trusted library allocation
|
page read and write
|
||
1DD4C7CB000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD57EDA000
|
trusted library allocation
|
page read and write
|
||
1DD574C4000
|
trusted library allocation
|
page read and write
|
||
1DD60F77000
|
heap
|
page read and write
|
||
1DD4C76E000
|
heap
|
page read and write
|
||
1DD56E31000
|
trusted library allocation
|
page read and write
|
||
1DBB3A8A000
|
heap
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD61678000
|
trusted library allocation
|
page read and write
|
||
1DD5598D000
|
trusted library allocation
|
page read and write
|
||
1DD575DF000
|
trusted library allocation
|
page read and write
|
||
1DD61022000
|
heap
|
page read and write
|
||
1DD56A2F000
|
trusted library allocation
|
page read and write
|
||
1DD6153B000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1DD57B58000
|
trusted library allocation
|
page read and write
|
||
1DD58162000
|
trusted library allocation
|
page read and write
|
||
1DBB2C60000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1DD56E5D000
|
trusted library allocation
|
page read and write
|
||
1DD4C77E000
|
heap
|
page read and write
|
||
1DD56EA8000
|
trusted library allocation
|
page read and write
|
||
1DD58DC3000
|
trusted library allocation
|
page read and write
|
||
1DD57D7C000
|
trusted library allocation
|
page read and write
|
||
236B2C31000
|
heap
|
page read and write
|
||
1DD530B3000
|
heap
|
page read and write
|
||
1DD56A09000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
1DBB3B79000
|
heap
|
page read and write
|
||
1DD57781000
|
trusted library allocation
|
page read and write
|
||
1DD57B15000
|
trusted library allocation
|
page read and write
|
||
1DD5DE71000
|
trusted library allocation
|
page read and write
|
||
1DD582C5000
|
trusted library allocation
|
page read and write
|
||
1DD5DC73000
|
trusted library allocation
|
page read and write
|
||
1DD56ED2000
|
trusted library allocation
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD593AF000
|
trusted library allocation
|
page read and write
|
||
1DD57596000
|
trusted library allocation
|
page read and write
|
||
1DD53095000
|
heap
|
page read and write
|
||
1DD5639E000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
1DD4C7C2000
|
heap
|
page read and write
|
||
1DD4C781000
|
heap
|
page read and write
|
||
1DD5F71E000
|
trusted library allocation
|
page read and write
|
||
1DD4C7B2000
|
heap
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
224ECE91000
|
trusted library allocation
|
page execute read
|
||
1DD57207000
|
trusted library allocation
|
page read and write
|
||
1DD56044000
|
trusted library allocation
|
page read and write
|
||
1DBB3A6C000
|
heap
|
page read and write
|
||
1DD4C75D000
|
heap
|
page read and write
|
||
1DD56EEE000
|
trusted library allocation
|
page read and write
|
||
1DD5F424000
|
trusted library allocation
|
page read and write
|
||
1DD575A6000
|
trusted library allocation
|
page read and write
|
||
1DD575CB000
|
trusted library allocation
|
page read and write
|
||
1DD4C770000
|
heap
|
page read and write
|
||
9DEDFE000
|
unkown
|
page readonly
|
||
1DD4C783000
|
heap
|
page read and write
|
||
1DD527AB000
|
trusted library allocation
|
page read and write
|
||
1DD4C77A000
|
heap
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
1DD56ED8000
|
trusted library allocation
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
1DD4C754000
|
heap
|
page read and write
|
||
1DD5804B000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
heap
|
page read and write
|
||
1DD56395000
|
trusted library allocation
|
page read and write
|
||
1DD5744D000
|
trusted library allocation
|
page read and write
|
||
1DD5F768000
|
trusted library allocation
|
page read and write
|
||
1DD561CC000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
1DD577D0000
|
trusted library allocation
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
1DD4C7BE000
|
heap
|
page read and write
|
||
191E1AD8000
|
trusted library allocation
|
page read and write
|
||
1DD582C5000
|
trusted library allocation
|
page read and write
|
||
1DD55B60000
|
trusted library allocation
|
page read and write
|
||
1DD56E5D000
|
trusted library allocation
|
page read and write
|
||
1DD57553000
|
trusted library allocation
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
1DD59AAE000
|
trusted library allocation
|
page read and write
|
||
1DD4C77F000
|
heap
|
page read and write
|
||
1DBB3A7F000
|
heap
|
page read and write
|
||
1DD5D896000
|
trusted library allocation
|
page read and write
|
||
5A953E000
|
unkown
|
page readonly
|
||
1DD570CB000
|
trusted library allocation
|
page read and write
|
||
1DD5778D000
|
trusted library allocation
|
page read and write
|
||
1DD527AB000
|
trusted library allocation
|
page read and write
|
||
1DD58071000
|
trusted library allocation
|
page read and write
|
||
1DD558D7000
|
trusted library allocation
|
page read and write
|
||
1DD581AE000
|
trusted library allocation
|
page read and write
|
||
1DD5F790000
|
trusted library allocation
|
page read and write
|
||
1DD530D6000
|
heap
|
page read and write
|
||
1DD5778D000
|
trusted library allocation
|
page read and write
|
||
1DD4C765000
|
heap
|
page read and write
|
||
1DD57EA6000
|
trusted library allocation
|
page read and write
|
||
1DD570D8000
|
trusted library allocation
|
page read and write
|
||
1DD563D4000
|
trusted library allocation
|
page read and write
|
||
1DD56A49000
|
trusted library allocation
|
page read and write
|
||
1DD5738C000
|
trusted library allocation
|
page read and write
|
||
1E877B7D000
|
trusted library allocation
|
page read and write
|
||
1DD59055000
|
trusted library allocation
|
page read and write
|
||
1DBB2F64000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
heap
|
page read and write
|
||
1DD57061000
|
trusted library allocation
|
page read and write
|
||
1DD4C789000
|
heap
|
page read and write
|
||
1DD61527000
|
trusted library allocation
|
page read and write
|
||
1DD55890000
|
trusted library allocation
|
page read and write
|
||
1DD5DC62000
|
trusted library allocation
|
page read and write
|
||
1DD607AC000
|
trusted library allocation
|
page read and write
|
There are 4090 hidden memdumps, click here to show them.