Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_f8de9437-4d1e-4f17-aa03-f198cdf45683.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_f8de9437-4d1e-4f17-aa03-f198cdf45683.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 27954 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 27954 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2240
-prefMapHandle 2232 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {a418fc79-5b10-472b-b3cd-23cdedc49dfe} 7704 "\\.\pipe\gecko-crash-server-pipe.7704" 1ade8070b10 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -parentBuildID 20230927232528 -prefsHandle 4392
-prefMapHandle 4388 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {047d8eaa-463a-4f5e-ba84-be975c9a4469}
7704 "\\.\pipe\gecko-crash-server-pipe.7704" 1adf7ed0610 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 4844 -prefMapHandle 5364 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {c385fcad-3934-4ff5-b833-6d8b82e95124} 7704 "\\.\pipe\gecko-crash-server-pipe.7704" 1adfa339310 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warning
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.google.com/complete/searchdf070348-e771-4bd5-964e-d19d82c1384ee98c663d-408d-4901-9666-66
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://ok.ru/
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggestabout
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.0/
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.1/
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
|
unknown
|
||
https://duckduckgo.com/?t=ffab&q=
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://gpuweb.github.io/gpuweb/
|
unknown
|
||
https://relay.firefox.com/api/v1/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
|
unknown
|
||
https://topsites.services.mozilla.com/cid/
|
unknown
|
||
https://www.wykop.pl/
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
https://vk.com/
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureWebExtensionUncheckedLastErr
|
unknown
|
||
https://www.olx.pl/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.0.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.65
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
52.222.236.80
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.185.142
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
142.250.186.142
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.65.140
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
206.23.85.13.in-addr.arpa
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 22 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
52.222.236.80
|
services.addons.mozilla.org
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
142.250.185.142
|
youtube.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1AE0366D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF829E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF4FDC000
|
trusted library allocation
|
page read and write
|
||
26DBB260000
|
heap
|
page read and write
|
||
1ADF5094000
|
trusted library allocation
|
page read and write
|
||
1ADF3E17000
|
trusted library allocation
|
page read and write
|
||
1ADFB20C000
|
trusted library allocation
|
page read and write
|
||
1ADF77BE000
|
heap
|
page read and write
|
||
1ADFFEB9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADFFD2D000
|
trusted library allocation
|
page read and write
|
||
1ADF9453000
|
trusted library allocation
|
page read and write
|
||
1ADF7B8B000
|
trusted library allocation
|
page read and write
|
||
1ADF94ED000
|
trusted library allocation
|
page read and write
|
||
1ADFFE38000
|
trusted library allocation
|
page read and write
|
||
17ECD600000
|
unclassified section
|
page readonly
|
||
1ADFA347000
|
trusted library allocation
|
page read and write
|
||
237E2C20000
|
heap
|
page read and write
|
||
1ADF7B8D000
|
trusted library allocation
|
page read and write
|
||
1ADF96E5000
|
trusted library allocation
|
page read and write
|
||
1ADF7CD8000
|
trusted library allocation
|
page read and write
|
||
1AE0232F000
|
trusted library allocation
|
page read and write
|
||
1ADF8B9C000
|
trusted library allocation
|
page read and write
|
||
1ADF82E8000
|
trusted library allocation
|
page read and write
|
||
1ADF9588000
|
trusted library allocation
|
page read and write
|
||
1ADFB4A5000
|
trusted library allocation
|
page read and write
|
||
1ADF9577000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF50DC000
|
trusted library allocation
|
page read and write
|
||
1ADFBCDE000
|
trusted library allocation
|
page read and write
|
||
1ADF9489000
|
trusted library allocation
|
page read and write
|
||
1ADF8E68000
|
trusted library allocation
|
page read and write
|
||
1ADFB2D1000
|
trusted library allocation
|
page read and write
|
||
1ADE9D5D000
|
heap
|
page read and write
|
||
1AE00046000
|
trusted library allocation
|
page read and write
|
||
1ADF8FEE000
|
trusted library allocation
|
page read and write
|
||
1ADFB5BA000
|
trusted library allocation
|
page read and write
|
||
1ADFFDA6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADF9533000
|
trusted library allocation
|
page read and write
|
||
1AE0029E000
|
trusted library allocation
|
page read and write
|
||
1ADF9289000
|
trusted library allocation
|
page read and write
|
||
1AE000CA000
|
trusted library allocation
|
page read and write
|
||
1ADF3D71000
|
trusted library allocation
|
page read and write
|
||
1ADF7A7E000
|
trusted library allocation
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADFBCCA000
|
trusted library allocation
|
page read and write
|
||
1ADF94F7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE3000
|
trusted library allocation
|
page read and write
|
||
1AE02477000
|
trusted library allocation
|
page read and write
|
||
17ECD4F4000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF8BE3000
|
trusted library allocation
|
page read and write
|
||
1ADF8F64000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADEEE52000
|
heap
|
page read and write
|
||
1ADF50EB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE60000
|
heap
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1AE01A50000
|
trusted library allocation
|
page read and write
|
||
1ADFB279000
|
trusted library allocation
|
page read and write
|
||
FEF000
|
stack
|
page read and write
|
||
1ADF8252000
|
trusted library allocation
|
page read and write
|
||
1ADFB5AE000
|
trusted library allocation
|
page read and write
|
||
1ADF7CC6000
|
trusted library allocation
|
page read and write
|
||
26DBB2B2000
|
heap
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADF7B74000
|
trusted library allocation
|
page read and write
|
||
26DBB27D000
|
heap
|
page read and write
|
||
1ADF8E1B000
|
trusted library allocation
|
page read and write
|
||
1ADFB2E2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4F000
|
heap
|
page read and write
|
||
1AE002D1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
8D2000
|
unkown
|
page readonly
|
||
1ADF829B000
|
trusted library allocation
|
page read and write
|
||
1ADF73AE000
|
trusted library allocation
|
page read and write
|
||
1ADF7794000
|
heap
|
page read and write
|
||
1ADF90E7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE05000
|
heap
|
page read and write
|
||
1ADF7CBC000
|
trusted library allocation
|
page read and write
|
||
1AE02B6B000
|
heap
|
page read and write
|
||
1AE024EC000
|
trusted library allocation
|
page read and write
|
||
1ADF97E6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF8DCC000
|
trusted library allocation
|
page read and write
|
||
1ADF75F4000
|
trusted library allocation
|
page read and write
|
||
26DBB358000
|
heap
|
page read and write
|
||
1ADF73BD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADEEE53000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADF828A000
|
trusted library allocation
|
page read and write
|
||
1ADEEDF8000
|
heap
|
page read and write
|
||
1ADF750F000
|
trusted library allocation
|
page read and write
|
||
1ADF90F8000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1ADF7C37000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADF3DFE000
|
trusted library allocation
|
page read and write
|
||
1ADF3781000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1AE0135B000
|
trusted library allocation
|
page read and write
|
||
1ADF934A000
|
trusted library allocation
|
page read and write
|
||
1AE014EB000
|
trusted library allocation
|
page read and write
|
||
1ADF87EF000
|
trusted library allocation
|
page read and write
|
||
1ADFFD61000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF90E0000
|
trusted library allocation
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADF93F9000
|
trusted library allocation
|
page read and write
|
||
1ADF9584000
|
trusted library allocation
|
page read and write
|
||
1AE01841000
|
trusted library allocation
|
page read and write
|
||
1AE002BA000
|
trusted library allocation
|
page read and write
|
||
1AE0249E000
|
trusted library allocation
|
page read and write
|
||
1AE002D0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE39000
|
heap
|
page read and write
|
||
1ADF8EB0000
|
trusted library allocation
|
page read and write
|
||
1ADFFDA4000
|
trusted library allocation
|
page read and write
|
||
1ADF73AE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF94CF000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADFB5C9000
|
trusted library allocation
|
page read and write
|
||
1ADF933F000
|
trusted library allocation
|
page read and write
|
||
1ADF82AD000
|
trusted library allocation
|
page read and write
|
||
1AE00227000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
292371AF000
|
trusted library allocation
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1AE001B3000
|
trusted library allocation
|
page read and write
|
||
24E859CA000
|
heap
|
page read and write
|
||
1AE01A67000
|
trusted library allocation
|
page read and write
|
||
1AE000CC000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBB000
|
trusted library allocation
|
page read and write
|
||
1ADF3D23000
|
trusted library allocation
|
page read and write
|
||
1ADF9059000
|
trusted library allocation
|
page read and write
|
||
24E873B0000
|
heap
|
page read and write
|
||
1ADF87DD000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1AE002E0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF90FC000
|
trusted library allocation
|
page read and write
|
||
1ADF825C000
|
trusted library allocation
|
page read and write
|
||
1ADF37C8000
|
trusted library allocation
|
page read and write
|
||
1AE018C5000
|
trusted library allocation
|
page read and write
|
||
17ECD250000
|
heap
|
page read and write
|
||
1ADF8B8F000
|
trusted library allocation
|
page read and write
|
||
1AE00094000
|
trusted library allocation
|
page read and write
|
||
1ADF93F9000
|
trusted library allocation
|
page read and write
|
||
1ADFB5AA000
|
trusted library allocation
|
page read and write
|
||
1AE008DA000
|
trusted library allocation
|
page read and write
|
||
1AE0149A000
|
trusted library allocation
|
page read and write
|
||
1ADF8E74000
|
trusted library allocation
|
page read and write
|
||
237E2BE0000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8E39000
|
trusted library allocation
|
page read and write
|
||
17ECD4C4000
|
trusted library allocation
|
page read and write
|
||
1ADF8E46000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF4D48000
|
trusted library allocation
|
page read and write
|
||
1ADF82A4000
|
trusted library allocation
|
page read and write
|
||
1ADF7C7A000
|
trusted library allocation
|
page read and write
|
||
1ADF3DF6000
|
trusted library allocation
|
page read and write
|
||
1AE0085D000
|
trusted library allocation
|
page read and write
|
||
1ADFFDB9000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB2000
|
trusted library allocation
|
page read and write
|
||
17ECD430000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1AE0029E000
|
trusted library allocation
|
page read and write
|
||
1AE0003D000
|
trusted library allocation
|
page read and write
|
||
1ADF7CBE000
|
trusted library allocation
|
page read and write
|
||
26DBA669000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADFFED4000
|
trusted library allocation
|
page read and write
|
||
1ADFBCC6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
26DBB32A000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADFA231000
|
trusted library allocation
|
page read and write
|
||
26DBB2E9000
|
heap
|
page read and write
|
||
1AE002D0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE63000
|
heap
|
page read and write
|
||
1ADFA29E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE33000
|
heap
|
page read and write
|
||
1ADFB213000
|
trusted library allocation
|
page read and write
|
||
1ADFA388000
|
trusted library allocation
|
page read and write
|
||
1AE01680000
|
trusted library allocation
|
page read and write
|
||
1AE013C2000
|
trusted library allocation
|
page read and write
|
||
1ADF8BF1000
|
trusted library allocation
|
page read and write
|
||
1ADF82E4000
|
trusted library allocation
|
page read and write
|
||
1ADF8F86000
|
trusted library allocation
|
page read and write
|
||
1ADF739D000
|
trusted library allocation
|
page read and write
|
||
1ADF82A2000
|
trusted library allocation
|
page read and write
|
||
1ADF9366000
|
trusted library allocation
|
page read and write
|
||
1ADFA2B9000
|
trusted library allocation
|
page read and write
|
||
17ECD46B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
1ADF8E71000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF87E2000
|
trusted library allocation
|
page read and write
|
||
1AE0002E000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1ADF7B8E000
|
trusted library allocation
|
page read and write
|
||
1ADF8F7B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1AE01360000
|
trusted library allocation
|
page read and write
|
||
1ADF4FBD000
|
trusted library allocation
|
page read and write
|
||
1ADF930C000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF823F000
|
trusted library allocation
|
page read and write
|
||
1ADFFDBD000
|
trusted library allocation
|
page read and write
|
||
1ADF934A000
|
trusted library allocation
|
page read and write
|
||
1ADFB156000
|
trusted library allocation
|
page read and write
|
||
1AE016F8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF8D4A000
|
trusted library allocation
|
page read and write
|
||
1ADF90C3000
|
trusted library allocation
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1ADF750F000
|
trusted library allocation
|
page read and write
|
||
1ADF8EA2000
|
trusted library allocation
|
page read and write
|
||
1AE024FA000
|
trusted library allocation
|
page read and write
|
||
1ADFB5EB000
|
trusted library allocation
|
page read and write
|
||
29236D60000
|
remote allocation
|
page read and write
|
||
1ADEEE43000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
17ECD405000
|
trusted library allocation
|
page read and write
|
||
292371C8000
|
trusted library allocation
|
page read and write
|
||
1ADF8298000
|
trusted library allocation
|
page read and write
|
||
1ADF93AC000
|
trusted library allocation
|
page read and write
|
||
1ADFA3F6000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADF7B61000
|
trusted library allocation
|
page read and write
|
||
1ADFA3BD000
|
trusted library allocation
|
page read and write
|
||
1ADF934D000
|
trusted library allocation
|
page read and write
|
||
1AE039C8000
|
trusted library allocation
|
page read and write
|
||
29237181000
|
trusted library allocation
|
page read and write
|
||
1ADFB2A6000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB4000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE0000
|
trusted library allocation
|
page read and write
|
||
1ADFB5C1000
|
trusted library allocation
|
page read and write
|
||
1ADF939F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE39000
|
heap
|
page read and write
|
||
1ADF94BD000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF8B29000
|
trusted library allocation
|
page read and write
|
||
1ADFB5AE000
|
trusted library allocation
|
page read and write
|
||
26DBB358000
|
heap
|
page read and write
|
||
1ADF82D1000
|
trusted library allocation
|
page read and write
|
||
1ADF778E000
|
heap
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADF8EFD000
|
trusted library allocation
|
page read and write
|
||
1ADFB7F9000
|
trusted library allocation
|
page read and write
|
||
F44B9ED000
|
stack
|
page read and write
|
||
1ADF9564000
|
trusted library allocation
|
page read and write
|
||
1ADF8E5B000
|
trusted library allocation
|
page read and write
|
||
1AE0008F000
|
trusted library allocation
|
page read and write
|
||
1ADF94B5000
|
trusted library allocation
|
page read and write
|
||
1ADFBCDE000
|
trusted library allocation
|
page read and write
|
||
1ADF82AB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE87000
|
heap
|
page read and write
|
||
74D230E000
|
unkown
|
page readonly
|
||
1ADEEE60000
|
heap
|
page read and write
|
||
1ADF82EE000
|
trusted library allocation
|
page read and write
|
||
1AE0041E000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF94C3000
|
trusted library allocation
|
page read and write
|
||
1ADF7AD4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADF82DF000
|
trusted library allocation
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1ADFB5F2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE41000
|
heap
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADF8EBB000
|
trusted library allocation
|
page read and write
|
||
26DBB27F000
|
heap
|
page read and write
|
||
1ADFA3C0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE52000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE60000
|
heap
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1AE000F2000
|
trusted library allocation
|
page read and write
|
||
1ADF7CAE000
|
trusted library allocation
|
page read and write
|
||
1ADFBC89000
|
trusted library allocation
|
page read and write
|
||
1ADF8E59000
|
trusted library allocation
|
page read and write
|
||
F44EE3E000
|
unkown
|
page readonly
|
||
1ADFBFC8000
|
trusted library allocation
|
page read and write
|
||
1ADF8EC0000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
26DBB2E0000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE8000
|
trusted library allocation
|
page read and write
|
||
1ADFB59B000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADFB4E6000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
1ADFB2CB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADFFEF4000
|
trusted library allocation
|
page read and write
|
||
1ADFB4D8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF8EB4000
|
trusted library allocation
|
page read and write
|
||
1ADFB296000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBA000
|
trusted library allocation
|
page read and write
|
||
1ADFA1C9000
|
trusted library allocation
|
page read and write
|
||
1ADF7CC8000
|
trusted library allocation
|
page read and write
|
||
1ADF8E9C000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1AE02B11000
|
heap
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
26DBA590000
|
trusted library section
|
page readonly
|
||
1ADFFE8E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE2A000
|
heap
|
page read and write
|
||
26DBB33B000
|
heap
|
page read and write
|
||
1ADF8AAD000
|
trusted library allocation
|
page read and write
|
||
1ADF8291000
|
trusted library allocation
|
page read and write
|
||
237E2C10000
|
heap
|
page read and write
|
||
1ADF96F9000
|
trusted library allocation
|
page read and write
|
||
1ADF8E47000
|
trusted library allocation
|
page read and write
|
||
1AE002E0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADF8EBB000
|
trusted library allocation
|
page read and write
|
||
17ECD2CF000
|
unclassified section
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF8B29000
|
trusted library allocation
|
page read and write
|
||
1ADFFEB2000
|
trusted library allocation
|
page read and write
|
||
1ADF7799000
|
heap
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADEEE2B000
|
heap
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADFA3E5000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
unkown
|
page write copy
|
||
1ADFB5BF000
|
trusted library allocation
|
page read and write
|
||
1ADF7B6A000
|
trusted library allocation
|
page read and write
|
||
1ADFFE40000
|
trusted library allocation
|
page read and write
|
||
1ADF9363000
|
trusted library allocation
|
page read and write
|
||
1ADF8E86000
|
trusted library allocation
|
page read and write
|
||
1ADF9BE6000
|
trusted library allocation
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1ADF7CE1000
|
trusted library allocation
|
page read and write
|
||
1ADFC048000
|
trusted library allocation
|
page read and write
|
||
1ADF85F1000
|
trusted library allocation
|
page read and write
|
||
1ADF96F0000
|
trusted library allocation
|
page read and write
|
||
1ADF8EAC000
|
trusted library allocation
|
page read and write
|
||
1ADF5090000
|
trusted library allocation
|
page read and write
|
||
26DBA62F000
|
trusted library allocation
|
page read and write
|
||
1ADF77A9000
|
heap
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADF8BCF000
|
trusted library allocation
|
page read and write
|
||
1ADF9544000
|
trusted library allocation
|
page read and write
|
||
1ADF933F000
|
trusted library allocation
|
page read and write
|
||
237E2C1A000
|
heap
|
page read and write
|
||
1ADF8FF2000
|
trusted library allocation
|
page read and write
|
||
1AE024E1000
|
trusted library allocation
|
page read and write
|
||
1AE00019000
|
trusted library allocation
|
page read and write
|
||
1ADFFEB8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE45000
|
heap
|
page read and write
|
||
1ADF977A000
|
trusted library allocation
|
page read and write
|
||
1ADF87D3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1AE013D9000
|
trusted library allocation
|
page read and write
|
||
1ADF8EAC000
|
trusted library allocation
|
page read and write
|
||
1ADF96B7000
|
trusted library allocation
|
page read and write
|
||
1ADF3E26000
|
trusted library allocation
|
page read and write
|
||
1ADEEE80000
|
heap
|
page read and write
|
||
1ADFFD94000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADF8FB6000
|
trusted library allocation
|
page read and write
|
||
1AE03984000
|
trusted library allocation
|
page read and write
|
||
1ADF8AAE000
|
trusted library allocation
|
page read and write
|
||
26DBB2EC000
|
heap
|
page read and write
|
||
26DBA580000
|
unclassified section
|
page read and write
|
||
1ADF8ED4000
|
trusted library allocation
|
page read and write
|
||
1ADF4F7A000
|
trusted library allocation
|
page read and write
|
||
24E873A4000
|
heap
|
page read and write
|
||
1ADFFDAA000
|
trusted library allocation
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADEEE53000
|
heap
|
page read and write
|
||
1ADF50FE000
|
trusted library allocation
|
page read and write
|
||
26DBB32D000
|
heap
|
page read and write
|
||
1ADF8B37000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4F000
|
heap
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
26DBA3E0000
|
heap
|
page read and write
|
||
1ADF7900000
|
trusted library allocation
|
page read and write
|
||
237E2D00000
|
trusted library allocation
|
page read and write
|
||
1ADF9349000
|
trusted library allocation
|
page read and write
|
||
1ADFB1F6000
|
trusted library allocation
|
page read and write
|
||
1ADF4F9C000
|
trusted library allocation
|
page read and write
|
||
1ADF82D7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF8E72000
|
trusted library allocation
|
page read and write
|
||
1AE000CE000
|
trusted library allocation
|
page read and write
|
||
1ADF90F4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADFFDB9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
26DBB344000
|
heap
|
page read and write
|
||
1ADF9366000
|
trusted library allocation
|
page read and write
|
||
1ADF7590000
|
trusted library allocation
|
page read and write
|
||
1AE0245F000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADF96D6000
|
trusted library allocation
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1AE00049000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADFA369000
|
trusted library allocation
|
page read and write
|
||
26DBAC77000
|
unkown
|
page execute read
|
||
1ADF87C5000
|
trusted library allocation
|
page read and write
|
||
1ADF90B5000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADF7C3B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5F000
|
heap
|
page read and write
|
||
1ADF508E000
|
trusted library allocation
|
page read and write
|
||
1ADF93C4000
|
trusted library allocation
|
page read and write
|
||
1AE01A8A000
|
trusted library allocation
|
page read and write
|
||
1ADF4FAE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7C000
|
heap
|
page read and write
|
||
1ADF955D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4E000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF9314000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF9462000
|
trusted library allocation
|
page read and write
|
||
1ADF8F97000
|
trusted library allocation
|
page read and write
|
||
2923731F000
|
trusted library allocation
|
page read and write
|
||
1ADF94C0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5C000
|
heap
|
page read and write
|
||
1ADFFEF4000
|
trusted library allocation
|
page read and write
|
||
1ADF9514000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
F45063E000
|
stack
|
page read and write
|
||
1ADF949C000
|
trusted library allocation
|
page read and write
|
||
1ADF823E000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
1ADF9E74000
|
trusted library allocation
|
page read and write
|
||
1ADFB0F3000
|
trusted library allocation
|
page read and write
|
||
1ADFB0CC000
|
trusted library allocation
|
page read and write
|
||
1AE000E6000
|
trusted library allocation
|
page read and write
|
||
26DBB344000
|
heap
|
page read and write
|
||
1ADF8FDF000
|
trusted library allocation
|
page read and write
|
||
1ADF7B61000
|
trusted library allocation
|
page read and write
|
||
1ADF4FB4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF7CD8000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADF8D6C000
|
trusted library allocation
|
page read and write
|
||
1ADF94C6000
|
trusted library allocation
|
page read and write
|
||
1ADFFFBD000
|
trusted library allocation
|
page read and write
|
||
26DBB2F1000
|
heap
|
page read and write
|
||
1AE01886000
|
trusted library allocation
|
page read and write
|
||
1AE00077000
|
trusted library allocation
|
page read and write
|
||
1ADF93EC000
|
trusted library allocation
|
page read and write
|
||
26DBB2EC000
|
heap
|
page read and write
|
||
1AE00026000
|
trusted library allocation
|
page read and write
|
||
1ADEEE68000
|
heap
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADFFDF0000
|
trusted library allocation
|
page read and write
|
||
1AE0041C000
|
trusted library allocation
|
page read and write
|
||
1ADF9766000
|
trusted library allocation
|
page read and write
|
||
1ADFB0E6000
|
trusted library allocation
|
page read and write
|
||
1AE03AAC000
|
trusted library allocation
|
page read and write
|
||
1ADF9342000
|
trusted library allocation
|
page read and write
|
||
1ADF77AB000
|
heap
|
page read and write
|
||
1ADFB4DA000
|
trusted library allocation
|
page read and write
|
||
1AE01848000
|
trusted library allocation
|
page read and write
|
||
1ADF7334000
|
trusted library allocation
|
page read and write
|
||
1ADFB576000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
26DBB2B9000
|
heap
|
page read and write
|
||
1AE03AA3000
|
trusted library allocation
|
page read and write
|
||
1AE000CA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE42000
|
heap
|
page read and write
|
||
1ADF9E9B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
24E85990000
|
heap
|
page read and write
|
||
1ADF9FC0000
|
trusted library allocation
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADF90E0000
|
trusted library allocation
|
page read and write
|
||
1AE02B6C000
|
heap
|
page read and write
|
||
1AE013CC000
|
trusted library allocation
|
page read and write
|
||
17ECD707000
|
trusted library allocation
|
page read and write
|
||
1ADF829B000
|
trusted library allocation
|
page read and write
|
||
1AE02486000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1AE00244000
|
trusted library allocation
|
page read and write
|
||
1ADF933F000
|
trusted library allocation
|
page read and write
|
||
1ADF7A57000
|
trusted library allocation
|
page read and write
|
||
1ADF93E8000
|
trusted library allocation
|
page read and write
|
||
1ADF7AE7000
|
trusted library allocation
|
page read and write
|
||
29236DD3000
|
heap
|
page read and write
|
||
1ADFA3DC000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF8F66000
|
trusted library allocation
|
page read and write
|
||
1ADF8EA3000
|
trusted library allocation
|
page read and write
|
||
1ADF73D3000
|
trusted library allocation
|
page read and write
|
||
29236F6F000
|
unclassified section
|
page read and write
|
||
17ECD424000
|
trusted library allocation
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1AE018E4000
|
trusted library allocation
|
page read and write
|
||
1ADFB296000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADF73A7000
|
trusted library allocation
|
page read and write
|
||
1ADFFE4A000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADF779F000
|
heap
|
page read and write
|
||
1ADF4F99000
|
trusted library allocation
|
page read and write
|
||
1ADF737C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
17ECD47B000
|
trusted library allocation
|
page read and write
|
||
1ADF7B6D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF7CAD000
|
trusted library allocation
|
page read and write
|
||
1ADF50F6000
|
trusted library allocation
|
page read and write
|
||
1AE0010C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7C000
|
heap
|
page read and write
|
||
1ADF8B1D000
|
trusted library allocation
|
page read and write
|
||
1ADFB0FE000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADFFFF4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADF85FB000
|
trusted library allocation
|
page read and write
|
||
1ADF8E49000
|
trusted library allocation
|
page read and write
|
||
1ADFFEC4000
|
trusted library allocation
|
page read and write
|
||
1ADF907F000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADF955D000
|
trusted library allocation
|
page read and write
|
||
1ADF9BE6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF8DC5000
|
trusted library allocation
|
page read and write
|
||
1AE001FB000
|
trusted library allocation
|
page read and write
|
||
1ADF7B8B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF93EC000
|
trusted library allocation
|
page read and write
|
||
3B30000
|
heap
|
page read and write
|
||
1ADFFD9D000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF4FA7000
|
trusted library allocation
|
page read and write
|
||
1ADF829E000
|
trusted library allocation
|
page read and write
|
||
17ECD0B0000
|
remote allocation
|
page read and write
|
||
1ADFB227000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADF942B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8F92000
|
trusted library allocation
|
page read and write
|
||
292371EB000
|
trusted library allocation
|
page read and write
|
||
1ADF7C68000
|
trusted library allocation
|
page read and write
|
||
1ADF87C7000
|
trusted library allocation
|
page read and write
|
||
1ADFB054000
|
trusted library allocation
|
page read and write
|
||
1ADF8BE6000
|
trusted library allocation
|
page read and write
|
||
1ADF823F000
|
trusted library allocation
|
page read and write
|
||
1ADF7C7E000
|
trusted library allocation
|
page read and write
|
||
1AE001B7000
|
trusted library allocation
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADFB5EB000
|
trusted library allocation
|
page read and write
|
||
1AE016EB000
|
trusted library allocation
|
page read and write
|
||
1ADF8F0B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADF7CBC000
|
trusted library allocation
|
page read and write
|
||
1ADF8E72000
|
trusted library allocation
|
page read and write
|
||
1ADFB0D4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADFB2C8000
|
trusted library allocation
|
page read and write
|
||
1ADF8F92000
|
trusted library allocation
|
page read and write
|
||
1ADF8E60000
|
trusted library allocation
|
page read and write
|
||
1ADFB4D5000
|
trusted library allocation
|
page read and write
|
||
1ADFBF7B000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
26DBB300000
|
heap
|
page read and write
|
||
1ADF73A7000
|
trusted library allocation
|
page read and write
|
||
1ADF94C8000
|
trusted library allocation
|
page read and write
|
||
1AE018A7000
|
trusted library allocation
|
page read and write
|
||
1ADF9FDC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1AE013F1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF75C8000
|
trusted library allocation
|
page read and write
|
||
1ADF8E51000
|
trusted library allocation
|
page read and write
|
||
1ADFB48D000
|
trusted library allocation
|
page read and write
|
||
1ADFB266000
|
trusted library allocation
|
page read and write
|
||
1ADF93E1000
|
trusted library allocation
|
page read and write
|
||
1AE01395000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1ADF50A6000
|
trusted library allocation
|
page read and write
|
||
1ADF7C7C000
|
trusted library allocation
|
page read and write
|
||
1ADF951A000
|
trusted library allocation
|
page read and write
|
||
1AE03B2E000
|
trusted library allocation
|
page read and write
|
||
1ADF87ED000
|
trusted library allocation
|
page read and write
|
||
2923716E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE16000
|
heap
|
page read and write
|
||
1ADFFD94000
|
trusted library allocation
|
page read and write
|
||
1ADFA2B9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE12000
|
heap
|
page read and write
|
||
1ADFB2E5000
|
trusted library allocation
|
page read and write
|
||
1ADF9325000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADF8E63000
|
trusted library allocation
|
page read and write
|
||
1AE002CC000
|
trusted library allocation
|
page read and write
|
||
26DBB260000
|
heap
|
page read and write
|
||
1AE00096000
|
trusted library allocation
|
page read and write
|
||
237E2E00000
|
trusted library allocation
|
page read and write
|
||
1ADF82E4000
|
trusted library allocation
|
page read and write
|
||
1ADF93B8000
|
trusted library allocation
|
page read and write
|
||
1ADF8FA2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1AE002BA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADEEE45000
|
heap
|
page read and write
|
||
1ADEEE75000
|
heap
|
page read and write
|
||
1ADF8F35000
|
trusted library allocation
|
page read and write
|
||
1ADFB5A7000
|
trusted library allocation
|
page read and write
|
||
1AE00096000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF8E6A000
|
trusted library allocation
|
page read and write
|
||
1ADF926C000
|
trusted library allocation
|
page read and write
|
||
1AE02B55000
|
heap
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF7C97000
|
trusted library allocation
|
page read and write
|
||
1ADF8E74000
|
trusted library allocation
|
page read and write
|
||
1ADEEE31000
|
heap
|
page read and write
|
||
17ECD48F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF951C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE96000
|
heap
|
page read and write
|
||
1ADF8F97000
|
trusted library allocation
|
page read and write
|
||
29237312000
|
trusted library allocation
|
page read and write
|
||
1AE0007B000
|
trusted library allocation
|
page read and write
|
||
1ADF930C000
|
trusted library allocation
|
page read and write
|
||
1ADF73A4000
|
trusted library allocation
|
page read and write
|
||
1ADFFFD6000
|
trusted library allocation
|
page read and write
|
||
1DC3A7D000
|
stack
|
page read and write
|
||
1ADFFDB4000
|
trusted library allocation
|
page read and write
|
||
1AE004ED000
|
trusted library allocation
|
page read and write
|
||
1ADFB5E2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADFFD76000
|
trusted library allocation
|
page read and write
|
||
1ADF93A4000
|
trusted library allocation
|
page read and write
|
||
1ADFA2BA000
|
trusted library allocation
|
page read and write
|
||
1ADFB5B7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE84000
|
heap
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1ADF8F4D000
|
trusted library allocation
|
page read and write
|
||
1AE024A8000
|
trusted library allocation
|
page read and write
|
||
1ADF73CD000
|
trusted library allocation
|
page read and write
|
||
1ADF8E46000
|
trusted library allocation
|
page read and write
|
||
1ADF3E1E000
|
trusted library allocation
|
page read and write
|
||
1ADFA32F000
|
trusted library allocation
|
page read and write
|
||
26DBB2E8000
|
heap
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADF7A5A000
|
trusted library allocation
|
page read and write
|
||
26DBB201000
|
heap
|
page read and write
|
||
1ADF8FBD000
|
trusted library allocation
|
page read and write
|
||
1AE01A37000
|
trusted library allocation
|
page read and write
|
||
1ADF9350000
|
trusted library allocation
|
page read and write
|
||
1ADF8F7D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE57000
|
heap
|
page read and write
|
||
1ADFB1CC000
|
trusted library allocation
|
page read and write
|
||
1ADF779F000
|
heap
|
page read and write
|
||
1ADF9523000
|
trusted library allocation
|
page read and write
|
||
1ADF5049000
|
trusted library allocation
|
page read and write
|
||
1ADF8FBA000
|
trusted library allocation
|
page read and write
|
||
1ADF829E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF50FE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADEEE25000
|
heap
|
page read and write
|
||
1AE000CE000
|
trusted library allocation
|
page read and write
|
||
74D234E000
|
stack
|
page read and write
|
||
1ADF90B8000
|
trusted library allocation
|
page read and write
|
||
1AE03B01000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB9000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
1ADF8EE3000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADF823B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF7B87000
|
trusted library allocation
|
page read and write
|
||
1ADF7CE1000
|
trusted library allocation
|
page read and write
|
||
1ADF73B3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADF8F97000
|
trusted library allocation
|
page read and write
|
||
1651C6A24000
|
trusted library allocation
|
page read and write
|
||
17ECD449000
|
trusted library allocation
|
page read and write
|
||
1ADF8EAC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1AE00251000
|
trusted library allocation
|
page read and write
|
||
1ADF7CB7000
|
trusted library allocation
|
page read and write
|
||
26DBAB82000
|
heap
|
page read and write
|
||
1ADF87C9000
|
trusted library allocation
|
page read and write
|
||
1ADF9BF9000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADFB254000
|
trusted library allocation
|
page read and write
|
||
1ADFA24A000
|
trusted library allocation
|
page read and write
|
||
1ADFBCB6000
|
trusted library allocation
|
page read and write
|
||
1ADF4DD3000
|
trusted library allocation
|
page read and write
|
||
1AE036CE000
|
trusted library allocation
|
page read and write
|
||
76D5FFE000
|
stack
|
page read and write
|
||
F450E3E000
|
unkown
|
page readonly
|
||
1ADF8EDA000
|
trusted library allocation
|
page read and write
|
||
1ADF9080000
|
trusted library allocation
|
page read and write
|
||
1ADF8E5E000
|
trusted library allocation
|
page read and write
|
||
1ADF75C8000
|
trusted library allocation
|
page read and write
|
||
1ADFFD00000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1AE024FA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE32000
|
heap
|
page read and write
|
||
1ADF4F93000
|
trusted library allocation
|
page read and write
|
||
1387000
|
heap
|
page read and write
|
||
1ADF93F9000
|
trusted library allocation
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1ADF7571000
|
trusted library allocation
|
page read and write
|
||
1ADF8F5C000
|
trusted library allocation
|
page read and write
|
||
76D57FE000
|
stack
|
page read and write
|
||
1ADF73AE000
|
trusted library allocation
|
page read and write
|
||
1ADF7CB7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4E000
|
heap
|
page read and write
|
||
1ADF951C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE75000
|
heap
|
page read and write
|
||
1ADFB59B000
|
trusted library allocation
|
page read and write
|
||
1ADFC0C5000
|
trusted library allocation
|
page read and write
|
||
26DBA678000
|
trusted library allocation
|
page read and write
|
||
1ADF87D1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADFFEBF000
|
trusted library allocation
|
page read and write
|
||
1ADFB0A5000
|
trusted library allocation
|
page read and write
|
||
26DBB26C000
|
heap
|
page read and write
|
||
26DBA6E9000
|
trusted library allocation
|
page read and write
|
||
1ADF9BE7000
|
trusted library allocation
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADF3E9E000
|
trusted library allocation
|
page read and write
|
||
1ADF7C8E000
|
trusted library allocation
|
page read and write
|
||
1ADFB0B9000
|
trusted library allocation
|
page read and write
|
||
1AE02B01000
|
heap
|
page read and write
|
||
1ADF779C000
|
heap
|
page read and write
|
||
1ADF8BEE000
|
trusted library allocation
|
page read and write
|
||
1ADF930C000
|
trusted library allocation
|
page read and write
|
||
1ADFFD59000
|
trusted library allocation
|
page read and write
|
||
1ADF9BF9000
|
trusted library allocation
|
page read and write
|
||
1ADF82CC000
|
trusted library allocation
|
page read and write
|
||
1ADF8E69000
|
trusted library allocation
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
1ADF77BF000
|
heap
|
page read and write
|
||
1ADF94CF000
|
trusted library allocation
|
page read and write
|
||
1ADF77BF000
|
heap
|
page read and write
|
||
1ADFFFB9000
|
trusted library allocation
|
page read and write
|
||
1ADF9698000
|
trusted library allocation
|
page read and write
|
||
1ADF778E000
|
heap
|
page read and write
|
||
1ADEEDF4000
|
heap
|
page read and write
|
||
1ADF8F7B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE48000
|
heap
|
page read and write
|
||
1ADEEE24000
|
heap
|
page read and write
|
||
1ADFB7F2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7C000
|
heap
|
page read and write
|
||
1AE0003B000
|
trusted library allocation
|
page read and write
|
||
2FE8721000
|
trusted library allocation
|
page execute read
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADF87D4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADEEE64000
|
heap
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADF82D7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1AE024DB000
|
trusted library allocation
|
page read and write
|
||
1ADF93A8000
|
trusted library allocation
|
page read and write
|
||
1ADF7519000
|
trusted library allocation
|
page read and write
|
||
1ADF3EB5000
|
trusted library allocation
|
page read and write
|
||
1ADFB54F000
|
trusted library allocation
|
page read and write
|
||
1ADF958A000
|
trusted library allocation
|
page read and write
|
||
1ADFA246000
|
trusted library allocation
|
page read and write
|
||
1ADFBC94000
|
trusted library allocation
|
page read and write
|
||
1AE016DA000
|
trusted library allocation
|
page read and write
|
||
1ADF9326000
|
trusted library allocation
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADF8B67000
|
trusted library allocation
|
page read and write
|
||
1ADF4F21000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1AE002A9000
|
trusted library allocation
|
page read and write
|
||
1DC4B3E000
|
unkown
|
page readonly
|
||
1ADF9400000
|
trusted library allocation
|
page read and write
|
||
1ADF90B8000
|
trusted library allocation
|
page read and write
|
||
1ADF8B37000
|
trusted library allocation
|
page read and write
|
||
1ADF7C3D000
|
trusted library allocation
|
page read and write
|
||
1ADFFD3C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF9BE6000
|
trusted library allocation
|
page read and write
|
||
1ADFFD8A000
|
trusted library allocation
|
page read and write
|
||
1ADF93FE000
|
trusted library allocation
|
page read and write
|
||
1ADFBCBC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE39000
|
heap
|
page read and write
|
||
1AE0003F000
|
trusted library allocation
|
page read and write
|
||
26DBA603000
|
trusted library allocation
|
page read and write
|
||
1ADF93F9000
|
trusted library allocation
|
page read and write
|
||
1ADF3EF0000
|
trusted library allocation
|
page read and write
|
||
1ADF7A55000
|
trusted library allocation
|
page read and write
|
||
1ADF8E8D000
|
trusted library allocation
|
page read and write
|
||
1AE032C3000
|
trusted library allocation
|
page read and write
|
||
1ADF37C6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7D000
|
heap
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
1ADF930C000
|
trusted library allocation
|
page read and write
|
||
1AE02B01000
|
heap
|
page read and write
|
||
1AE02BC8000
|
heap
|
page read and write
|
||
1ADFB2CE000
|
trusted library allocation
|
page read and write
|
||
1ADFA1D7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB4000
|
trusted library allocation
|
page read and write
|
||
1ADF8BE3000
|
trusted library allocation
|
page read and write
|
||
26DBA6BA000
|
trusted library allocation
|
page read and write
|
||
1ADF7AC2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADF4F99000
|
trusted library allocation
|
page read and write
|
||
1ADF8E3D000
|
trusted library allocation
|
page read and write
|
||
1ADF8F88000
|
trusted library allocation
|
page read and write
|
||
1ADF95FC000
|
trusted library allocation
|
page read and write
|
||
1ADF77AF000
|
heap
|
page read and write
|
||
1ADF4DD3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
17ECD411000
|
trusted library allocation
|
page read and write
|
||
1ADF9577000
|
trusted library allocation
|
page read and write
|
||
1ADFB07C000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF4FBD000
|
trusted library allocation
|
page read and write
|
||
1ADF7374000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF90E3000
|
trusted library allocation
|
page read and write
|
||
1ADF4FBD000
|
trusted library allocation
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1ADFB5E7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADF8E9C000
|
trusted library allocation
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1ADF93A5000
|
trusted library allocation
|
page read and write
|
||
1ADF8B8F000
|
trusted library allocation
|
page read and write
|
||
1ADF8F97000
|
trusted library allocation
|
page read and write
|
||
1ADF958A000
|
trusted library allocation
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
237E2AF0000
|
heap
|
page read and write
|
||
1ADF7799000
|
heap
|
page read and write
|
||
1ADF82D1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF9326000
|
trusted library allocation
|
page read and write
|
||
17ECD700000
|
trusted library allocation
|
page read and write
|
||
1AE00043000
|
trusted library allocation
|
page read and write
|
||
1ADF77AD000
|
heap
|
page read and write
|
||
1ADF8D33000
|
trusted library allocation
|
page read and write
|
||
1ADFB250000
|
trusted library allocation
|
page read and write
|
||
1ADF5073000
|
trusted library allocation
|
page read and write
|
||
1ADF93F3000
|
trusted library allocation
|
page read and write
|
||
1ADF8DE5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1AE00254000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
26DBB2AA000
|
heap
|
page read and write
|
||
1ADFB53C000
|
trusted library allocation
|
page read and write
|
||
1ADF9511000
|
trusted library allocation
|
page read and write
|
||
1AE001E9000
|
trusted library allocation
|
page read and write
|
||
26DBB25F000
|
heap
|
page read and write
|
||
26DBA65C000
|
trusted library allocation
|
page read and write
|
||
1AE01C00000
|
trusted library allocation
|
page read and write
|
||
1ADF7C79000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADF8FBC000
|
trusted library allocation
|
page read and write
|
||
17ECD2C2000
|
unclassified section
|
page read and write
|
||
1ADFB0B0000
|
trusted library allocation
|
page read and write
|
||
1ADF93E1000
|
trusted library allocation
|
page read and write
|
||
1ADFBCAD000
|
trusted library allocation
|
page read and write
|
||
29236DE0000
|
heap
|
page read and write
|
||
1AE0009E000
|
trusted library allocation
|
page read and write
|
||
1ADF90A4000
|
trusted library allocation
|
page read and write
|
||
1ADF73AE000
|
trusted library allocation
|
page read and write
|
||
1AE002C2000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBA000
|
trusted library allocation
|
page read and write
|
||
1ADF8F3A000
|
trusted library allocation
|
page read and write
|
||
3B31000
|
heap
|
page read and write
|
||
1ADF8F79000
|
trusted library allocation
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADF909D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7B000
|
heap
|
page read and write
|
||
1ADF90E7000
|
trusted library allocation
|
page read and write
|
||
1ADF7A83000
|
trusted library allocation
|
page read and write
|
||
1ADF7B5F000
|
trusted library allocation
|
page read and write
|
||
1ADF93F0000
|
trusted library allocation
|
page read and write
|
||
29236F62000
|
unclassified section
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADF8EAC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1AE03A48000
|
trusted library allocation
|
page read and write
|
||
1ADFA2B9000
|
trusted library allocation
|
page read and write
|
||
1ADF934D000
|
trusted library allocation
|
page read and write
|
||
1651C6A1E000
|
trusted library allocation
|
page read and write
|
||
1ADF8284000
|
trusted library allocation
|
page read and write
|
||
1ADF509D000
|
trusted library allocation
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
29236DA0000
|
heap
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
17ECD4D7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
26DBB2E6000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1ADF8FE0000
|
trusted library allocation
|
page read and write
|
||
1ADFC0AC000
|
trusted library allocation
|
page read and write
|
||
1AE02B6D000
|
heap
|
page read and write
|
||
1ADF93BC000
|
trusted library allocation
|
page read and write
|
||
26DBB369000
|
heap
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
1ADFA231000
|
trusted library allocation
|
page read and write
|
||
1ADF8E6C000
|
trusted library allocation
|
page read and write
|
||
1ADF4F1C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADEEE42000
|
heap
|
page read and write
|
||
1AE00028000
|
trusted library allocation
|
page read and write
|
||
1ADF7B81000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADF8F06000
|
trusted library allocation
|
page read and write
|
||
1AE000DD000
|
trusted library allocation
|
page read and write
|
||
1ADFA3FE000
|
trusted library allocation
|
page read and write
|
||
1AE0040A000
|
trusted library allocation
|
page read and write
|
||
26DBB28A000
|
heap
|
page read and write
|
||
1ADF8F53000
|
trusted library allocation
|
page read and write
|
||
1ADF97B4000
|
trusted library allocation
|
page read and write
|
||
26DBB2EC000
|
heap
|
page read and write
|
||
1AE00866000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADFFE2A000
|
trusted library allocation
|
page read and write
|
||
1ADF9347000
|
trusted library allocation
|
page read and write
|
||
1ADEEE05000
|
heap
|
page read and write
|
||
1ADFC0A3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF9033000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4F000
|
heap
|
page read and write
|
||
1ADF7799000
|
heap
|
page read and write
|
||
24E85945000
|
heap
|
page read and write
|
||
1ADFBCDA000
|
trusted library allocation
|
page read and write
|
||
1ADF9588000
|
trusted library allocation
|
page read and write
|
||
1ADF93E9000
|
trusted library allocation
|
page read and write
|
||
1ADF5031000
|
trusted library allocation
|
page read and write
|
||
1ADF73B3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1AE00038000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF7C3B000
|
trusted library allocation
|
page read and write
|
||
1ADF96F6000
|
trusted library allocation
|
page read and write
|
||
1ADF93A4000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF927F000
|
trusted library allocation
|
page read and write
|
||
1ADFC06D000
|
trusted library allocation
|
page read and write
|
||
1ADF50EB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF7C7D000
|
trusted library allocation
|
page read and write
|
||
1387000
|
heap
|
page read and write
|
||
1ADF7CE1000
|
trusted library allocation
|
page read and write
|
||
1392000
|
heap
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADFFFD6000
|
trusted library allocation
|
page read and write
|
||
1ADF8BA4000
|
trusted library allocation
|
page read and write
|
||
1AE01367000
|
trusted library allocation
|
page read and write
|
||
1ADF90B8000
|
trusted library allocation
|
page read and write
|
||
1ADF8F92000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8BF0000
|
trusted library allocation
|
page read and write
|
||
1ADF90C7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7D000
|
heap
|
page read and write
|
||
1ADFA29F000
|
trusted library allocation
|
page read and write
|
||
1ADF94A1000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADF93FA000
|
trusted library allocation
|
page read and write
|
||
1ADF82EB000
|
trusted library allocation
|
page read and write
|
||
1ADFB5B5000
|
trusted library allocation
|
page read and write
|
||
17ECD284000
|
heap
|
page read and write
|
||
1ADEEE18000
|
heap
|
page read and write
|
||
1ADFFD41000
|
trusted library allocation
|
page read and write
|
||
1ADF739D000
|
trusted library allocation
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
1ADFFE9A000
|
trusted library allocation
|
page read and write
|
||
1ADF92B7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEF000
|
trusted library allocation
|
page read and write
|
||
1ADF937B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE83000
|
heap
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
74D2DD8000
|
stack
|
page read and write
|
||
1ADF7362000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
17ECD45D000
|
trusted library allocation
|
page read and write
|
||
26DBB24D000
|
heap
|
page read and write
|
||
1AE03B06000
|
trusted library allocation
|
page read and write
|
||
1ADF3F00000
|
trusted library allocation
|
page read and write
|
||
1ADF8FA9000
|
trusted library allocation
|
page read and write
|
||
1ADF905A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE72000
|
heap
|
page read and write
|
||
1ADFA25D000
|
trusted library allocation
|
page read and write
|
||
24E859CA000
|
heap
|
page read and write
|
||
1ADF82D7000
|
trusted library allocation
|
page read and write
|
||
1ADF829F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8ED9000
|
trusted library allocation
|
page read and write
|
||
1ADF9350000
|
trusted library allocation
|
page read and write
|
||
1ADFFFCE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1AE0000B000
|
trusted library allocation
|
page read and write
|
||
1ADF82C1000
|
trusted library allocation
|
page read and write
|
||
1ADF7AF9000
|
trusted library allocation
|
page read and write
|
||
17ECD470000
|
trusted library allocation
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1AE002BC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE80000
|
heap
|
page read and write
|
||
1ADF9347000
|
trusted library allocation
|
page read and write
|
||
1ADF7338000
|
trusted library allocation
|
page read and write
|
||
1AE000D8000
|
trusted library allocation
|
page read and write
|
||
1ADF933F000
|
trusted library allocation
|
page read and write
|
||
1ADF939B000
|
trusted library allocation
|
page read and write
|
||
1AE013B1000
|
trusted library allocation
|
page read and write
|
||
29236F50000
|
heap
|
page readonly
|
||
1ADFFD6C000
|
trusted library allocation
|
page read and write
|
||
1ADF8E07000
|
trusted library allocation
|
page read and write
|
||
1ADF9355000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADF825A000
|
trusted library allocation
|
page read and write
|
||
2923730C000
|
trusted library allocation
|
page read and write
|
||
1ADF9506000
|
trusted library allocation
|
page read and write
|
||
1AE000DB000
|
trusted library allocation
|
page read and write
|
||
26DBB2E3000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
1ADF7B5F000
|
trusted library allocation
|
page read and write
|
||
1ADF9471000
|
trusted library allocation
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
26DBA673000
|
trusted library allocation
|
page read and write
|
||
F44FE3E000
|
unkown
|
page readonly
|
||
26DBB2F2000
|
heap
|
page read and write
|
||
1ADF8EBB000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADFFD37000
|
trusted library allocation
|
page read and write
|
||
1ADEEE75000
|
heap
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
2923731B000
|
trusted library allocation
|
page read and write
|
||
1AE002FB000
|
trusted library allocation
|
page read and write
|
||
1ADF9533000
|
trusted library allocation
|
page read and write
|
||
1ADF9570000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5C000
|
heap
|
page read and write
|
||
1ADFB5F8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5E000
|
heap
|
page read and write
|
||
1AE00278000
|
trusted library allocation
|
page read and write
|
||
1ADF8F64000
|
trusted library allocation
|
page read and write
|
||
1ADEEE48000
|
heap
|
page read and write
|
||
1ADF82E9000
|
trusted library allocation
|
page read and write
|
||
1ADF77BE000
|
heap
|
page read and write
|
||
1ADEEE3D000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1AE01460000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF7AB4000
|
trusted library allocation
|
page read and write
|
||
1ADF93C4000
|
trusted library allocation
|
page read and write
|
||
1AE0242F000
|
trusted library allocation
|
page read and write
|
||
1ADFFDBD000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADFB260000
|
trusted library allocation
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADF75A9000
|
trusted library allocation
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADFFD26000
|
trusted library allocation
|
page read and write
|
||
1ADF8BCF000
|
trusted library allocation
|
page read and write
|
||
74D3DFE000
|
stack
|
page read and write
|
||
1ADFBF84000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
26DBA3A0000
|
heap
|
page read and write
|
||
1ADF87C4000
|
trusted library allocation
|
page read and write
|
||
1ADF50BE000
|
trusted library allocation
|
page read and write
|
||
1ADFBC9D000
|
trusted library allocation
|
page read and write
|
||
1ADF9277000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB0000
|
trusted library allocation
|
page read and write
|
||
1ADF5122000
|
trusted library allocation
|
page read and write
|
||
1ADF8E55000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
1ADF93AC000
|
trusted library allocation
|
page read and write
|
||
1AE031E9000
|
trusted library allocation
|
page read and write
|
||
1ADF9544000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4F000
|
heap
|
page read and write
|
||
1AE02486000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1AE000DD000
|
trusted library allocation
|
page read and write
|
||
1ADFA246000
|
trusted library allocation
|
page read and write
|
||
138F000
|
heap
|
page read and write
|
||
24E873B9000
|
heap
|
page read and write
|
||
1ADFB5EB000
|
trusted library allocation
|
page read and write
|
||
1ADF8E5E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF9343000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6D000
|
heap
|
page read and write
|
||
1AE00881000
|
trusted library allocation
|
page read and write
|
||
1AE00227000
|
trusted library allocation
|
page read and write
|
||
1ADF4FBD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE21000
|
heap
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADF8E6C000
|
trusted library allocation
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
1ADF8930000
|
trusted library allocation
|
page read and write
|
||
1AE008FB000
|
trusted library allocation
|
page read and write
|
||
1AE03A43000
|
trusted library allocation
|
page read and write
|
||
1ADF3E7F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1AE00146000
|
trusted library allocation
|
page read and write
|
||
1ADF9366000
|
trusted library allocation
|
page read and write
|
||
1AE00221000
|
trusted library allocation
|
page read and write
|
||
1AE02BF1000
|
heap
|
page read and write
|
||
17ECD703000
|
trusted library allocation
|
page read and write
|
||
24E8599A000
|
heap
|
page read and write
|
||
1ADEEE82000
|
heap
|
page read and write
|
||
8E4000
|
unkown
|
page readonly
|
||
13A0000
|
heap
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADFA29E000
|
trusted library allocation
|
page read and write
|
||
1AE0242B000
|
trusted library allocation
|
page read and write
|
||
1AE014FB000
|
trusted library allocation
|
page read and write
|
||
1ADFA24B000
|
trusted library allocation
|
page read and write
|
||
1ADF9759000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADF9584000
|
trusted library allocation
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADF50C7000
|
trusted library allocation
|
page read and write
|
||
1ADF9478000
|
trusted library allocation
|
page read and write
|
||
1ADF73F2000
|
trusted library allocation
|
page read and write
|
||
1ADF50DC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
2923715B000
|
trusted library allocation
|
page read and write
|
||
26DBA6F3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADEEE78000
|
heap
|
page read and write
|
||
1ADFB5F4000
|
trusted library allocation
|
page read and write
|
||
1ADF77A9000
|
heap
|
page read and write
|
||
1ADF9341000
|
trusted library allocation
|
page read and write
|
||
1ADF9E91000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB2000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6B000
|
heap
|
page read and write
|
||
29237332000
|
trusted library allocation
|
page read and write
|
||
1ADFB40F000
|
trusted library allocation
|
page read and write
|
||
1ADFB06A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF96B7000
|
trusted library allocation
|
page read and write
|
||
1ADF50DD000
|
trusted library allocation
|
page read and write
|
||
1ADFFEF4000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADFB5C2000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE8000
|
trusted library allocation
|
page read and write
|
||
1ADF823F000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF82AA000
|
trusted library allocation
|
page read and write
|
||
1ADF7CE1000
|
trusted library allocation
|
page read and write
|
||
1ADF8AC6000
|
trusted library allocation
|
page read and write
|
||
1ADF82CC000
|
trusted library allocation
|
page read and write
|
||
1ADF90C9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
17ECD415000
|
trusted library allocation
|
page read and write
|
||
1ADF94B9000
|
trusted library allocation
|
page read and write
|
||
1ADF8FA9000
|
trusted library allocation
|
page read and write
|
||
1AE0007F000
|
trusted library allocation
|
page read and write
|
||
1ADF9355000
|
trusted library allocation
|
page read and write
|
||
1ADFA24A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF7B8B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADFA260000
|
trusted library allocation
|
page read and write
|
||
1ADF8261000
|
trusted library allocation
|
page read and write
|
||
1AE01462000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF9342000
|
trusted library allocation
|
page read and write
|
||
1ADF8D1D000
|
trusted library allocation
|
page read and write
|
||
811000
|
unkown
|
page execute read
|
||
1AE002C2000
|
trusted library allocation
|
page read and write
|
||
1ADF9514000
|
trusted library allocation
|
page read and write
|
||
1ADFB5A5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF90B5000
|
trusted library allocation
|
page read and write
|
||
1ADFC12E000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
26DBA6BD000
|
trusted library allocation
|
page read and write
|
||
1ADF9393000
|
trusted library allocation
|
page read and write
|
||
1ADF739D000
|
trusted library allocation
|
page read and write
|
||
1ADF9525000
|
trusted library allocation
|
page read and write
|
||
1ADFB166000
|
trusted library allocation
|
page read and write
|
||
1ADF90E0000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF4DFD000
|
trusted library allocation
|
page read and write
|
||
1ADF96A3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF77AB000
|
heap
|
page read and write
|
||
1ADFB575000
|
trusted library allocation
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADF8DE1000
|
trusted library allocation
|
page read and write
|
||
1ADF9355000
|
trusted library allocation
|
page read and write
|
||
1ADEEE8D000
|
heap
|
page read and write
|
||
1ADF8B8D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE43000
|
heap
|
page read and write
|
||
1ADF8E51000
|
trusted library allocation
|
page read and write
|
||
1ADF7799000
|
heap
|
page read and write
|
||
26DBA582000
|
unclassified section
|
page read and write
|
||
1ADFA1BF000
|
trusted library allocation
|
page read and write
|
||
26DBB27D000
|
heap
|
page read and write
|
||
1ADF509A000
|
trusted library allocation
|
page read and write
|
||
29237246000
|
heap
|
page read and write
|
||
1AE00866000
|
trusted library allocation
|
page read and write
|
||
1AE001B5000
|
trusted library allocation
|
page read and write
|
||
1ADF77A9000
|
heap
|
page read and write
|
||
1AE000CA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE80000
|
heap
|
page read and write
|
||
1ADF959E000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
29236D80000
|
unclassified section
|
page readonly
|
||
1ADF934A000
|
trusted library allocation
|
page read and write
|
||
1ADF8E74000
|
trusted library allocation
|
page read and write
|
||
1ADFA262000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4F000
|
heap
|
page read and write
|
||
26DBA3AA000
|
heap
|
page read and write
|
||
1ADF8E0A000
|
trusted library allocation
|
page read and write
|
||
1ADF96FA000
|
trusted library allocation
|
page read and write
|
||
1ADFFEB9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
1ADF950E000
|
trusted library allocation
|
page read and write
|
||
26DBB2F1000
|
heap
|
page read and write
|
||
1ADF8294000
|
trusted library allocation
|
page read and write
|
||
1ADF9076000
|
trusted library allocation
|
page read and write
|
||
1ADF7A99000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
237E2CB0000
|
heap
|
page read and write
|
||
26DBACA0000
|
heap
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
26DBB33B000
|
heap
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
17ECD120000
|
heap
|
page read and write
|
||
1AE02B11000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
26DBB344000
|
heap
|
page read and write
|
||
17ECD413000
|
trusted library allocation
|
page read and write
|
||
1ADF957D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADEEE25000
|
heap
|
page read and write
|
||
1ADFBCAD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1ADF93C4000
|
trusted library allocation
|
page read and write
|
||
1ADF50DF000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF8F3A000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
26DBB269000
|
heap
|
page read and write
|
||
1ADF8F88000
|
trusted library allocation
|
page read and write
|
||
1ADF957F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1B000
|
heap
|
page read and write
|
||
76D37FA000
|
stack
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
26DBA500000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADF93E8000
|
trusted library allocation
|
page read and write
|
||
1AE02B99000
|
heap
|
page read and write
|
||
1ADF77BE000
|
heap
|
page read and write
|
||
1ADF94BB000
|
trusted library allocation
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
1ADF4F9C000
|
trusted library allocation
|
page read and write
|
||
1ADF82D1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3F000
|
heap
|
page read and write
|
||
1ADFC0A7000
|
trusted library allocation
|
page read and write
|
||
1ADF82C1000
|
trusted library allocation
|
page read and write
|
||
1AE00899000
|
trusted library allocation
|
page read and write
|
||
1ADF9042000
|
trusted library allocation
|
page read and write
|
||
1ADF50FE000
|
trusted library allocation
|
page read and write
|
||
17ECD418000
|
trusted library allocation
|
page read and write
|
||
1ADEEE32000
|
heap
|
page read and write
|
||
1AE024F1000
|
trusted library allocation
|
page read and write
|
||
74D663E000
|
unkown
|
page readonly
|
||
1ADF9469000
|
trusted library allocation
|
page read and write
|
||
1ADF4F2B000
|
trusted library allocation
|
page read and write
|
||
1ADF939B000
|
trusted library allocation
|
page read and write
|
||
1ADF9326000
|
trusted library allocation
|
page read and write
|
||
1ADF7B8B000
|
trusted library allocation
|
page read and write
|
||
29237163000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1ADF937B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF82D3000
|
trusted library allocation
|
page read and write
|
||
1ADF4F8B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7B000
|
heap
|
page read and write
|
||
1ADF9753000
|
trusted library allocation
|
page read and write
|
||
1ADF8EFB000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADFB075000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADFB5F8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF93D5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1E000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8FB6000
|
trusted library allocation
|
page read and write
|
||
1ADF9FF3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1AE002DF000
|
trusted library allocation
|
page read and write
|
||
1ADF90F8000
|
trusted library allocation
|
page read and write
|
||
1ADF93F3000
|
trusted library allocation
|
page read and write
|
||
1ADFFFDA000
|
trusted library allocation
|
page read and write
|
||
1ADFA0D5000
|
trusted library allocation
|
page read and write
|
||
1ADF7A43000
|
trusted library allocation
|
page read and write
|
||
1ADF8FBA000
|
trusted library allocation
|
page read and write
|
||
1ADF8F64000
|
trusted library allocation
|
page read and write
|
||
1ADF93FE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADEEE5D000
|
heap
|
page read and write
|
||
1ADFB7F2000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1AE000FB000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBB000
|
trusted library allocation
|
page read and write
|
||
1AE008F6000
|
trusted library allocation
|
page read and write
|
||
1AE000BF000
|
trusted library allocation
|
page read and write
|
||
74D563E000
|
unkown
|
page readonly
|
||
1ADFA246000
|
trusted library allocation
|
page read and write
|
||
1ADF82D1000
|
trusted library allocation
|
page read and write
|
||
1ADF77BF000
|
heap
|
page read and write
|
||
1ADEEE78000
|
heap
|
page read and write
|
||
1ADF7B8D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADFB793000
|
trusted library allocation
|
page read and write
|
||
1AE02B36000
|
heap
|
page read and write
|
||
1ADF9342000
|
trusted library allocation
|
page read and write
|
||
1ADF7C79000
|
trusted library allocation
|
page read and write
|
||
1ADF9BE0000
|
trusted library allocation
|
page read and write
|
||
1ADF9635000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADF8FA9000
|
trusted library allocation
|
page read and write
|
||
1ADF90B5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5C000
|
heap
|
page read and write
|
||
1AE01807000
|
trusted library allocation
|
page read and write
|
||
1ADFFFC9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF8AF7000
|
trusted library allocation
|
page read and write
|
||
1ADFA248000
|
trusted library allocation
|
page read and write
|
||
1ADFB1EE000
|
trusted library allocation
|
page read and write
|
||
1ADF37EF000
|
trusted library allocation
|
page read and write
|
||
26DBB100000
|
trusted library allocation
|
page read and write
|
||
1ADFB0C5000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF7334000
|
trusted library allocation
|
page read and write
|
||
1ADFFD6C000
|
trusted library allocation
|
page read and write
|
||
26DBAB60000
|
heap
|
page read and write
|
||
1ADF8B24000
|
trusted library allocation
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADEEE8D000
|
heap
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADF7AD4000
|
trusted library allocation
|
page read and write
|
||
1ADF93E3000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
26DBB344000
|
heap
|
page read and write
|
||
1ADFA1F3000
|
trusted library allocation
|
page read and write
|
||
F44ED3E000
|
unkown
|
page readonly
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF90B6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF8D7C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADEEE29000
|
heap
|
page read and write
|
||
1ADF8EBA000
|
trusted library allocation
|
page read and write
|
||
1ADF955D000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADEEE65000
|
heap
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADF4FBD000
|
trusted library allocation
|
page read and write
|
||
1ADF9393000
|
trusted library allocation
|
page read and write
|
||
1ADEEE87000
|
heap
|
page read and write
|
||
1ADEEE4E000
|
heap
|
page read and write
|
||
1ADF9312000
|
trusted library allocation
|
page read and write
|
||
1ADEEE53000
|
heap
|
page read and write
|
||
1AE00244000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1AE0397B000
|
trusted library allocation
|
page read and write
|
||
1ADFA3C9000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
1ADF7B66000
|
trusted library allocation
|
page read and write
|
||
1ADFC157000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1AE00881000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5D000
|
heap
|
page read and write
|
||
1ADEEE31000
|
heap
|
page read and write
|
||
17ECD4B7000
|
trusted library allocation
|
page read and write
|
||
1AE0015A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADEEE64000
|
heap
|
page read and write
|
||
1ADF9366000
|
trusted library allocation
|
page read and write
|
||
1ADF82EE000
|
trusted library allocation
|
page read and write
|
||
1ADF7555000
|
trusted library allocation
|
page read and write
|
||
1ADF90F4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADFA1EA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE48000
|
heap
|
page read and write
|
||
26DBA681000
|
trusted library allocation
|
page read and write
|
||
1ADEEE24000
|
heap
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADF8B37000
|
trusted library allocation
|
page read and write
|
||
1AE039A2000
|
trusted library allocation
|
page read and write
|
||
1ADF3E26000
|
trusted library allocation
|
page read and write
|
||
1ADF85C3000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
1ADF96D6000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB0000
|
trusted library allocation
|
page read and write
|
||
1AE000D3000
|
trusted library allocation
|
page read and write
|
||
17ECD80C000
|
trusted library allocation
|
page read and write
|
||
26DBB269000
|
heap
|
page read and write
|
||
1ADF9F5D000
|
trusted library allocation
|
page read and write
|
||
1ADFFFDF000
|
trusted library allocation
|
page read and write
|
||
1ADFA06A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF9734000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1E000
|
heap
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1AE002F5000
|
trusted library allocation
|
page read and write
|
||
1ADF90E3000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADF8256000
|
trusted library allocation
|
page read and write
|
||
1ADEEE09000
|
heap
|
page read and write
|
||
1ADF93D5000
|
trusted library allocation
|
page read and write
|
||
1ADF8B4E000
|
trusted library allocation
|
page read and write
|
||
1ADF9E7D000
|
trusted library allocation
|
page read and write
|
||
1AE024E1000
|
trusted library allocation
|
page read and write
|
||
1ADFFE96000
|
trusted library allocation
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADF8B24000
|
trusted library allocation
|
page read and write
|
||
1ADFB485000
|
trusted library allocation
|
page read and write
|
||
1ADF77AB000
|
heap
|
page read and write
|
||
1AE000E4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADEEE65000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1AE01786000
|
trusted library allocation
|
page read and write
|
||
1ADFB4BE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF4DFD000
|
trusted library allocation
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1ADF73AE000
|
trusted library allocation
|
page read and write
|
||
1ADF82C1000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF90F8000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF9599000
|
trusted library allocation
|
page read and write
|
||
1AE03300000
|
trusted library allocation
|
page read and write
|
||
1ADFBCDA000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
1ADFA252000
|
trusted library allocation
|
page read and write
|
||
1ADF4DE5000
|
trusted library allocation
|
page read and write
|
||
1ADFA263000
|
trusted library allocation
|
page read and write
|
||
1ADF82DD000
|
trusted library allocation
|
page read and write
|
||
1ADFA249000
|
trusted library allocation
|
page read and write
|
||
1AE0002E000
|
trusted library allocation
|
page read and write
|
||
1ADF4FB3000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
1ADF93E1000
|
trusted library allocation
|
page read and write
|
||
1ADFFDF6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADF8E46000
|
trusted library allocation
|
page read and write
|
||
29236D73000
|
remote allocation
|
page execute read
|
||
1ADFFEF4000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB4000
|
trusted library allocation
|
page read and write
|
||
1ADF93CC000
|
trusted library allocation
|
page read and write
|
||
1ADF73DA000
|
trusted library allocation
|
page read and write
|
||
1AE002AD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF8B51000
|
trusted library allocation
|
page read and write
|
||
1AE01933000
|
trusted library allocation
|
page read and write
|
||
1ADFB5A3000
|
trusted library allocation
|
page read and write
|
||
1ADF9759000
|
trusted library allocation
|
page read and write
|
||
1ADF7B7C000
|
trusted library allocation
|
page read and write
|
||
24E873A6000
|
heap
|
page read and write
|
||
1ADF93CC000
|
trusted library allocation
|
page read and write
|
||
17ECD286000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADF7B79000
|
trusted library allocation
|
page read and write
|
||
1ADF939A000
|
trusted library allocation
|
page read and write
|
||
26DBB358000
|
heap
|
page read and write
|
||
1ADF7B80000
|
trusted library allocation
|
page read and write
|
||
1ADF93F5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADEEE53000
|
heap
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6B000
|
heap
|
page read and write
|
||
1ADF8246000
|
trusted library allocation
|
page read and write
|
||
1ADFA1FC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE56000
|
heap
|
page read and write
|
||
1ADEEE53000
|
heap
|
page read and write
|
||
1ADF90F8000
|
trusted library allocation
|
page read and write
|
||
1ADFFFAF000
|
trusted library allocation
|
page read and write
|
||
1ADF73BF000
|
trusted library allocation
|
page read and write
|
||
1ADF75CF000
|
trusted library allocation
|
page read and write
|
||
26DBB2F1000
|
heap
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
17ECD400000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADFB5E7000
|
trusted library allocation
|
page read and write
|
||
1ADF8F7D000
|
trusted library allocation
|
page read and write
|
||
1AE004FD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
29237112000
|
trusted library allocation
|
page read and write
|
||
1ADF8EC5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE72000
|
heap
|
page read and write
|
||
1ADEEE18000
|
heap
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADF8F88000
|
trusted library allocation
|
page read and write
|
||
FDB000
|
stack
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE3000
|
trusted library allocation
|
page read and write
|
||
1ADF7B61000
|
trusted library allocation
|
page read and write
|
||
1AE03A4D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
8AC000
|
unkown
|
page readonly
|
||
1ADFB45D000
|
trusted library allocation
|
page read and write
|
||
1ADF7C47000
|
trusted library allocation
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
1ADEEE53000
|
heap
|
page read and write
|
||
17ECD2A3000
|
heap
|
page read and write
|
||
26DBB2F1000
|
heap
|
page read and write
|
||
1ADF8FB6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADF94D6000
|
trusted library allocation
|
page read and write
|
||
1ADF4FDE000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADFA1E2000
|
trusted library allocation
|
page read and write
|
||
1ADFBCDA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
24E85B07000
|
trusted library allocation
|
page read and write
|
||
1ADFFE9D000
|
trusted library allocation
|
page read and write
|
||
17ECD12A000
|
heap
|
page read and write
|
||
1ADEEE43000
|
heap
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1AE024C1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE31000
|
heap
|
page read and write
|
||
1AE00022000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF959C000
|
trusted library allocation
|
page read and write
|
||
1ADF77AB000
|
heap
|
page read and write
|
||
1AE002DF000
|
trusted library allocation
|
page read and write
|
||
1ADF8FEC000
|
trusted library allocation
|
page read and write
|
||
1ADFC007000
|
trusted library allocation
|
page read and write
|
||
1ADFB7C0000
|
trusted library allocation
|
page read and write
|
||
1ADF8DDC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADFB21B000
|
trusted library allocation
|
page read and write
|
||
24E873B8000
|
heap
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF9366000
|
trusted library allocation
|
page read and write
|
||
1ADF7B8B000
|
trusted library allocation
|
page read and write
|
||
1ADF7AA8000
|
trusted library allocation
|
page read and write
|
||
1ADFB0AC000
|
trusted library allocation
|
page read and write
|
||
1ADF4F90000
|
trusted library allocation
|
page read and write
|
||
1ADF9363000
|
trusted library allocation
|
page read and write
|
||
1ADF7563000
|
trusted library allocation
|
page read and write
|
||
1ADF8E47000
|
trusted library allocation
|
page read and write
|
||
1ADF8F08000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF90CC000
|
trusted library allocation
|
page read and write
|
||
1ADF828E000
|
trusted library allocation
|
page read and write
|
||
1ADF9696000
|
trusted library allocation
|
page read and write
|
||
1ADF4DF2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF9ED1000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF4F97000
|
trusted library allocation
|
page read and write
|
||
1ADF73DC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE84000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF8FB6000
|
trusted library allocation
|
page read and write
|
||
1ADF9FDA000
|
trusted library allocation
|
page read and write
|
||
1AE0084D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF8F66000
|
trusted library allocation
|
page read and write
|
||
1AE03AE4000
|
trusted library allocation
|
page read and write
|
||
1AE01379000
|
trusted library allocation
|
page read and write
|
||
1ADF9481000
|
trusted library allocation
|
page read and write
|
||
1ADFFE08000
|
trusted library allocation
|
page read and write
|
||
1ADF8E93000
|
trusted library allocation
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE39000
|
heap
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF7785000
|
heap
|
page read and write
|
||
1AE024A8000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADF50F6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1AE004E0000
|
trusted library allocation
|
page read and write
|
||
1AE0146E000
|
trusted library allocation
|
page read and write
|
||
1ADF90E3000
|
trusted library allocation
|
page read and write
|
||
1ADF95BC000
|
trusted library allocation
|
page read and write
|
||
1ADF9694000
|
trusted library allocation
|
page read and write
|
||
1ADFB292000
|
trusted library allocation
|
page read and write
|
||
1ADFC106000
|
trusted library allocation
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1ADF3D76000
|
trusted library allocation
|
page read and write
|
||
1ADF90B5000
|
trusted library allocation
|
page read and write
|
||
1ADF93E6000
|
trusted library allocation
|
page read and write
|
||
26DBB322000
|
heap
|
page read and write
|
||
1ADF4FBD000
|
trusted library allocation
|
page read and write
|
||
1ADF95A3000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF82D7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF94BF000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
D608FFE000
|
stack
|
page read and write
|
||
26DBA66F000
|
trusted library allocation
|
page read and write
|
||
1ADF8F5C000
|
trusted library allocation
|
page read and write
|
||
1AE03283000
|
trusted library allocation
|
page read and write
|
||
1AE01369000
|
trusted library allocation
|
page read and write
|
||
1ADF90C9000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADFA3A1000
|
trusted library allocation
|
page read and write
|
||
1ADF7B6D000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADF93DB000
|
trusted library allocation
|
page read and write
|
||
1ADF93E3000
|
trusted library allocation
|
page read and write
|
||
1ADFC005000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADF82D1000
|
trusted library allocation
|
page read and write
|
||
1ADF8F88000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADF8B49000
|
trusted library allocation
|
page read and write
|
||
1ADF93BC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1ADFFD76000
|
trusted library allocation
|
page read and write
|
||
1ADF958D000
|
trusted library allocation
|
page read and write
|
||
1AE02D00000
|
trusted library allocation
|
page read and write
|
||
26DBB32A000
|
heap
|
page read and write
|
||
1ADF779F000
|
heap
|
page read and write
|
||
1ADEEE42000
|
heap
|
page read and write
|
||
1ADF9396000
|
trusted library allocation
|
page read and write
|
||
1AE00051000
|
trusted library allocation
|
page read and write
|
||
1ADF87E7000
|
trusted library allocation
|
page read and write
|
||
1ADF87C3000
|
trusted library allocation
|
page read and write
|
||
1ADF8BF0000
|
trusted library allocation
|
page read and write
|
||
1ADF8EFE000
|
trusted library allocation
|
page read and write
|
||
1ADF90C8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE52000
|
heap
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1AE000D1000
|
trusted library allocation
|
page read and write
|
||
1ADF8BF1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5D000
|
heap
|
page read and write
|
||
1AE001B9000
|
trusted library allocation
|
page read and write
|
||
1ADFB15A000
|
trusted library allocation
|
page read and write
|
||
1ADFA0DD000
|
trusted library allocation
|
page read and write
|
||
1ADF7C6F000
|
trusted library allocation
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
24E85B00000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF779A000
|
heap
|
page read and write
|
||
26DBB25C000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF5074000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF93E8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADFFE9A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1AE00231000
|
trusted library allocation
|
page read and write
|
||
F44DCBB000
|
stack
|
page read and write
|
||
1AE024D5000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF77AD000
|
heap
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADF4DDA000
|
trusted library allocation
|
page read and write
|
||
1ADFB15F000
|
trusted library allocation
|
page read and write
|
||
1ADFB5D1000
|
trusted library allocation
|
page read and write
|
||
1ADF5052000
|
trusted library allocation
|
page read and write
|
||
1ADFB4E3000
|
trusted library allocation
|
page read and write
|
||
1ADF8EDA000
|
trusted library allocation
|
page read and write
|
||
1AE000E2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4F000
|
heap
|
page read and write
|
||
1ADF9511000
|
trusted library allocation
|
page read and write
|
||
1ADF7CC6000
|
trusted library allocation
|
page read and write
|
||
1ADFFE8E000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF5090000
|
trusted library allocation
|
page read and write
|
||
1ADF8F7B000
|
trusted library allocation
|
page read and write
|
||
1AE00131000
|
trusted library allocation
|
page read and write
|
||
1ADF3E66000
|
trusted library allocation
|
page read and write
|
||
1ADF82D3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
unkown
|
page readonly
|
||
1ADEEE82000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF37B3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF85FB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5C000
|
heap
|
page read and write
|
||
1ADFC0E4000
|
trusted library allocation
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1ADF4FDC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADFB5F8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1E000
|
heap
|
page read and write
|
||
1AE02B71000
|
heap
|
page read and write
|
||
1ADFB0BF000
|
trusted library allocation
|
page read and write
|
||
1ADF8BE4000
|
trusted library allocation
|
page read and write
|
||
1ADF4DD3000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1ADF8FD6000
|
trusted library allocation
|
page read and write
|
||
1ADF7339000
|
trusted library allocation
|
page read and write
|
||
1ADF8EA5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE43000
|
heap
|
page read and write
|
||
1ADFBCAB000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
1ADF7B62000
|
trusted library allocation
|
page read and write
|
||
1ADF931B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1AE0024F000
|
trusted library allocation
|
page read and write
|
||
1AE018AC000
|
trusted library allocation
|
page read and write
|
||
1AE0130A000
|
trusted library allocation
|
page read and write
|
||
8AC000
|
unkown
|
page readonly
|
||
1ADF93CC000
|
trusted library allocation
|
page read and write
|
||
1ADF779C000
|
heap
|
page read and write
|
||
26DBB260000
|
heap
|
page read and write
|
||
1ADF7563000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF8EC0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF90C3000
|
trusted library allocation
|
page read and write
|
||
1ADF82D1000
|
trusted library allocation
|
page read and write
|
||
1ADF934A000
|
trusted library allocation
|
page read and write
|
||
1ADF828D000
|
trusted library allocation
|
page read and write
|
||
1ADF77AB000
|
heap
|
page read and write
|
||
1ADFB5E0000
|
trusted library allocation
|
page read and write
|
||
1ADF7A63000
|
trusted library allocation
|
page read and write
|
||
1ADF90A3000
|
trusted library allocation
|
page read and write
|
||
1ADF75FD000
|
trusted library allocation
|
page read and write
|
||
1ADFFDD9000
|
trusted library allocation
|
page read and write
|
||
1ADFB05D000
|
trusted library allocation
|
page read and write
|
||
1ADF73B1000
|
trusted library allocation
|
page read and write
|
||
24E859CA000
|
heap
|
page read and write
|
||
1ADF942E000
|
trusted library allocation
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
1ADF8D44000
|
trusted library allocation
|
page read and write
|
||
1ADEEDF7000
|
heap
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
26DBB263000
|
heap
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADFB5E2000
|
trusted library allocation
|
page read and write
|
||
26DBA6C7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
17ECD0C0000
|
remote allocation
|
page execute read
|
||
26DBA600000
|
trusted library allocation
|
page read and write
|
||
1ADFB1B3000
|
trusted library allocation
|
page read and write
|
||
26DBAC7F000
|
unkown
|
page execute read
|
||
1ADF9747000
|
trusted library allocation
|
page read and write
|
||
1ADF93F0000
|
trusted library allocation
|
page read and write
|
||
F44ED7E000
|
stack
|
page read and write
|
||
1ADFB075000
|
trusted library allocation
|
page read and write
|
||
1ADF945F000
|
trusted library allocation
|
page read and write
|
||
26DBB2EC000
|
heap
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF8DD5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE76000
|
heap
|
page read and write
|
||
1ADEEE57000
|
heap
|
page read and write
|
||
1ADFFD7B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1ADF933F000
|
trusted library allocation
|
page read and write
|
||
1ADF8BF1000
|
trusted library allocation
|
page read and write
|
||
1ADF8D1F000
|
trusted library allocation
|
page read and write
|
||
1ADF946F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADF92FA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE45000
|
heap
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADF7B83000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3F000
|
heap
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADF7B5A000
|
trusted library allocation
|
page read and write
|
||
1ADF8291000
|
trusted library allocation
|
page read and write
|
||
1ADF3D23000
|
trusted library allocation
|
page read and write
|
||
1ADF8E73000
|
trusted library allocation
|
page read and write
|
||
1ADFFD21000
|
trusted library allocation
|
page read and write
|
||
1ADFB5A7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE78000
|
heap
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1AE001BD000
|
trusted library allocation
|
page read and write
|
||
1AE0248C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADFFE30000
|
trusted library allocation
|
page read and write
|
||
F44D3FE000
|
stack
|
page read and write
|
||
17ECD2C0000
|
unclassified section
|
page read and write
|
||
1ADF903C000
|
trusted library allocation
|
page read and write
|
||
1ADFB4A2000
|
trusted library allocation
|
page read and write
|
||
1ADF82F8000
|
trusted library allocation
|
page read and write
|
||
1ADFBCC6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8FB6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADFB249000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0C000
|
heap
|
page read and write
|
||
1AE032D3000
|
trusted library allocation
|
page read and write
|
||
1AE000DB000
|
trusted library allocation
|
page read and write
|
||
1ADF8D82000
|
trusted library allocation
|
page read and write
|
||
1AE0029E000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF9588000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
1ADF8AF0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE82000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1AE02B01000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADEEE5F000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADFFD8A000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF50DF000
|
trusted library allocation
|
page read and write
|
||
1ADF50BC000
|
trusted library allocation
|
page read and write
|
||
1ADF90FA000
|
trusted library allocation
|
page read and write
|
||
1AE0192C000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADF3784000
|
trusted library allocation
|
page read and write
|
||
1ADEEE2C000
|
heap
|
page read and write
|
||
F44F63E000
|
stack
|
page read and write
|
||
1ADFC04D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADFB156000
|
trusted library allocation
|
page read and write
|
||
1ADF9521000
|
trusted library allocation
|
page read and write
|
||
17ECD4AF000
|
trusted library allocation
|
page read and write
|
||
1ADF8F98000
|
trusted library allocation
|
page read and write
|
||
1ADF82D7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADFFECE000
|
trusted library allocation
|
page read and write
|
||
1ADFFF6F000
|
trusted library allocation
|
page read and write
|
||
1AE0146A000
|
trusted library allocation
|
page read and write
|
||
1ADF8EFD000
|
trusted library allocation
|
page read and write
|
||
1AE00422000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF93B4000
|
trusted library allocation
|
page read and write
|
||
1ADF92FC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE8D000
|
heap
|
page read and write
|
||
1ADF9FF3000
|
trusted library allocation
|
page read and write
|
||
1ADFBFE5000
|
trusted library allocation
|
page read and write
|
||
1ADF9462000
|
trusted library allocation
|
page read and write
|
||
1ADF9573000
|
trusted library allocation
|
page read and write
|
||
24E873A0000
|
heap
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1AE008F2000
|
trusted library allocation
|
page read and write
|
||
1ADFB2AC000
|
trusted library allocation
|
page read and write
|
||
1ADF82D7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EFD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADF93F3000
|
trusted library allocation
|
page read and write
|
||
26DBB260000
|
heap
|
page read and write
|
||
1AE00034000
|
trusted library allocation
|
page read and write
|
||
1AE00248000
|
trusted library allocation
|
page read and write
|
||
1ADF96F0000
|
trusted library allocation
|
page read and write
|
||
1ADF9543000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADF50A8000
|
trusted library allocation
|
page read and write
|
||
1ADF50DD000
|
trusted library allocation
|
page read and write
|
||
1ADFA1FE000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
29237300000
|
trusted library allocation
|
page read and write
|
||
1ADF93C4000
|
trusted library allocation
|
page read and write
|
||
1AE002F7000
|
trusted library allocation
|
page read and write
|
||
26DBA210000
|
unclassified section
|
page readonly
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF7B5F000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEF000
|
trusted library allocation
|
page read and write
|
||
1ADF8F4D000
|
trusted library allocation
|
page read and write
|
||
26DBA676000
|
trusted library allocation
|
page read and write
|
||
1AE001F6000
|
trusted library allocation
|
page read and write
|
||
1ADFA0B0000
|
trusted library allocation
|
page read and write
|
||
1ADFA31F000
|
trusted library allocation
|
page read and write
|
||
1ADFFFFD000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
1ADF9349000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADFA318000
|
trusted library allocation
|
page read and write
|
||
1ADF9525000
|
trusted library allocation
|
page read and write
|
||
1ADFFE92000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3F000
|
heap
|
page read and write
|
||
1AE024E8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE44000
|
heap
|
page read and write
|
||
1ADF828E000
|
trusted library allocation
|
page read and write
|
||
1ADFA248000
|
trusted library allocation
|
page read and write
|
||
1ADF82D7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EFD000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADF8BFE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1DC3AFE000
|
stack
|
page read and write
|
||
8D2000
|
unkown
|
page readonly
|
||
1ADF9BDD000
|
trusted library allocation
|
page read and write
|
||
2FE8751000
|
trusted library allocation
|
page execute read
|
||
24E85940000
|
heap
|
page read and write
|
||
1AE0024F000
|
trusted library allocation
|
page read and write
|
||
1ADFB470000
|
trusted library allocation
|
page read and write
|
||
1AE03A0C000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEF000
|
trusted library allocation
|
page read and write
|
||
1ADEEE17000
|
heap
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADFC086000
|
trusted library allocation
|
page read and write
|
||
1ADF8EC0000
|
trusted library allocation
|
page read and write
|
||
1ADFA0AD000
|
trusted library allocation
|
page read and write
|
||
1ADFB23A000
|
trusted library allocation
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADFA26C000
|
trusted library allocation
|
page read and write
|
||
1ADF82AA000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1ADF9530000
|
trusted library allocation
|
page read and write
|
||
1ADF939F000
|
trusted library allocation
|
page read and write
|
||
1AE03A07000
|
trusted library allocation
|
page read and write
|
||
1ADF8F08000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADF7AAB000
|
trusted library allocation
|
page read and write
|
||
1AE00038000
|
trusted library allocation
|
page read and write
|
||
1ADF90C7000
|
trusted library allocation
|
page read and write
|
||
1ADFFD2D000
|
trusted library allocation
|
page read and write
|
||
1ADF9323000
|
trusted library allocation
|
page read and write
|
||
1ADFA298000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADF7B8D000
|
trusted library allocation
|
page read and write
|
||
1ADF9047000
|
trusted library allocation
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1ADF778F000
|
heap
|
page read and write
|
||
1AE01497000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADEEE3D000
|
heap
|
page read and write
|
||
1ADFFD76000
|
trusted library allocation
|
page read and write
|
||
1ADF8EC0000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1ADFB5F2000
|
trusted library allocation
|
page read and write
|
||
1ADF82CC000
|
trusted library allocation
|
page read and write
|
||
1ADF8EFD000
|
trusted library allocation
|
page read and write
|
||
1ADF4FDC000
|
trusted library allocation
|
page read and write
|
||
1ADF8E36000
|
trusted library allocation
|
page read and write
|
||
1ADEEE76000
|
heap
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADFB046000
|
trusted library allocation
|
page read and write
|
||
1ADFFE1D000
|
trusted library allocation
|
page read and write
|
||
1ADFB5A1000
|
trusted library allocation
|
page read and write
|
||
1ADF3D2F000
|
trusted library allocation
|
page read and write
|
||
1ADF9366000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADFA281000
|
trusted library allocation
|
page read and write
|
||
1ADF87F5000
|
trusted library allocation
|
page read and write
|
||
1ADF8EA5000
|
trusted library allocation
|
page read and write
|
||
1ADF509D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE82000
|
heap
|
page read and write
|
||
1ADF9766000
|
trusted library allocation
|
page read and write
|
||
1ADFFDAA000
|
trusted library allocation
|
page read and write
|
||
1ADFB2A2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE78000
|
heap
|
page read and write
|
||
1ADF7B3F000
|
trusted library allocation
|
page read and write
|
||
1ADF957D000
|
trusted library allocation
|
page read and write
|
||
1ADF9326000
|
trusted library allocation
|
page read and write
|
||
1ADF5098000
|
trusted library allocation
|
page read and write
|
||
1ADF8F47000
|
trusted library allocation
|
page read and write
|
||
1ADF8E3D000
|
trusted library allocation
|
page read and write
|
||
1ADFA31A000
|
trusted library allocation
|
page read and write
|
||
1ADF425B000
|
trusted library allocation
|
page read and write
|
||
1ADF8BF9000
|
trusted library allocation
|
page read and write
|
||
1ADF7B81000
|
trusted library allocation
|
page read and write
|
||
1AE000F7000
|
trusted library allocation
|
page read and write
|
||
1AE024A5000
|
trusted library allocation
|
page read and write
|
||
1AE03AC5000
|
trusted library allocation
|
page read and write
|
||
1ADF50BE000
|
trusted library allocation
|
page read and write
|
||
1ADF951C000
|
trusted library allocation
|
page read and write
|
||
1AE014FB000
|
trusted library allocation
|
page read and write
|
||
1ADF97F4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
74D22CC000
|
stack
|
page read and write
|
||
1ADF8EEF000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF7A62000
|
trusted library allocation
|
page read and write
|
||
1ADFA22D000
|
trusted library allocation
|
page read and write
|
||
1ADF8B8F000
|
trusted library allocation
|
page read and write
|
||
1ADF730B000
|
trusted library allocation
|
page read and write
|
||
1ADF8BCF000
|
trusted library allocation
|
page read and write
|
||
1AE0239F000
|
trusted library allocation
|
page read and write
|
||
1ADF8910000
|
trusted library allocation
|
page read and write
|
||
1AE01A1C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADFFE8E000
|
trusted library allocation
|
page read and write
|
||
76D3FFE000
|
stack
|
page read and write
|
||
1ADF9599000
|
trusted library allocation
|
page read and write
|
||
1AE017C8000
|
trusted library allocation
|
page read and write
|
||
1ADF8A75000
|
trusted library allocation
|
page read and write
|
||
1ADEEE31000
|
heap
|
page read and write
|
||
1ADF82C1000
|
trusted library allocation
|
page read and write
|
||
1AE024E2000
|
trusted library allocation
|
page read and write
|
||
1ADFFEC4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE68000
|
heap
|
page read and write
|
||
1ADF9FA5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1AE0083A000
|
trusted library allocation
|
page read and write
|
||
1AE0369E000
|
trusted library allocation
|
page read and write
|
||
1ADFA090000
|
trusted library allocation
|
page read and write
|
||
1ADF87C5000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF9523000
|
trusted library allocation
|
page read and write
|
||
8DC000
|
unkown
|
page write copy
|
||
1ADF50DC000
|
trusted library allocation
|
page read and write
|
||
1ADF9512000
|
trusted library allocation
|
page read and write
|
||
1ADF7AE7000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF5049000
|
trusted library allocation
|
page read and write
|
||
1ADFFD4F000
|
trusted library allocation
|
page read and write
|
||
1ADF7B8B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF82E0000
|
trusted library allocation
|
page read and write
|
||
24E859AD000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
F44E53E000
|
stack
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADFB5E2000
|
trusted library allocation
|
page read and write
|
||
1AE004F8000
|
trusted library allocation
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
17ECD2B0000
|
heap
|
page readonly
|
||
1ADEEE4E000
|
heap
|
page read and write
|
||
1ADF93D5000
|
trusted library allocation
|
page read and write
|
||
1AE002AD000
|
trusted library allocation
|
page read and write
|
||
1ADF82A4000
|
trusted library allocation
|
page read and write
|
||
29237314000
|
trusted library allocation
|
page read and write
|
||
1ADF7CAD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF3D2F000
|
trusted library allocation
|
page read and write
|
||
1AE02FA8000
|
trusted library allocation
|
page read and write
|
||
1ADFA3C0000
|
trusted library allocation
|
page read and write
|
||
1ADF8F06000
|
trusted library allocation
|
page read and write
|
||
1ADF93B8000
|
trusted library allocation
|
page read and write
|
||
1ADF906E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADFFDAB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1AE00035000
|
trusted library allocation
|
page read and write
|
||
1ADF9BF9000
|
trusted library allocation
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1ADF77BE000
|
heap
|
page read and write
|
||
1AE03B57000
|
trusted library allocation
|
page read and write
|
||
1ADF7C79000
|
trusted library allocation
|
page read and write
|
||
26DBB358000
|
heap
|
page read and write
|
||
1ADF9352000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADEEE72000
|
heap
|
page read and write
|
||
1AE01901000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
1ADFFEBF000
|
trusted library allocation
|
page read and write
|
||
1ADF9352000
|
trusted library allocation
|
page read and write
|
||
26DBB26C000
|
heap
|
page read and write
|
||
24E859C2000
|
heap
|
page read and write
|
||
26DBB264000
|
heap
|
page read and write
|
||
1AE023FA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF50C1000
|
trusted library allocation
|
page read and write
|
||
1ADF96A3000
|
trusted library allocation
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
29236F90000
|
unclassified section
|
page readonly
|
||
1ADFA0C7000
|
trusted library allocation
|
page read and write
|
||
1B5E000
|
stack
|
page read and write
|
||
17ECD40C000
|
trusted library allocation
|
page read and write
|
||
1AE0008C000
|
trusted library allocation
|
page read and write
|
||
1ADF4FA7000
|
trusted library allocation
|
page read and write
|
||
26DBA5D0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADF9EC7000
|
trusted library allocation
|
page read and write
|
||
1AE0006B000
|
trusted library allocation
|
page read and write
|
||
1ADF82D7000
|
trusted library allocation
|
page read and write
|
||
1AE000A4000
|
trusted library allocation
|
page read and write
|
||
1ADF9523000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADF903E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE53000
|
heap
|
page read and write
|
||
1ADF8E73000
|
trusted library allocation
|
page read and write
|
||
1ADF8F82000
|
trusted library allocation
|
page read and write
|
||
1ADF7AA8000
|
trusted library allocation
|
page read and write
|
||
1ADF825D000
|
trusted library allocation
|
page read and write
|
||
F44EDFE000
|
stack
|
page read and write
|
||
1AE004E9000
|
trusted library allocation
|
page read and write
|
||
1ADF7CD8000
|
trusted library allocation
|
page read and write
|
||
1ADF50BC000
|
trusted library allocation
|
page read and write
|
||
1ADF3EFB000
|
trusted library allocation
|
page read and write
|
||
1ADF934A000
|
trusted library allocation
|
page read and write
|
||
1ADF8F78000
|
trusted library allocation
|
page read and write
|
||
1ADFFD37000
|
trusted library allocation
|
page read and write
|
||
1ADFB0FE000
|
trusted library allocation
|
page read and write
|
||
26DBB260000
|
heap
|
page read and write
|
||
1ADEEE2B000
|
heap
|
page read and write
|
||
1ADF9599000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7D000
|
heap
|
page read and write
|
||
1ADF8EB6000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADEEE87000
|
heap
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADFFDF6000
|
trusted library allocation
|
page read and write
|
||
1ADF958D000
|
trusted library allocation
|
page read and write
|
||
1ADF94B0000
|
trusted library allocation
|
page read and write
|
||
1ADF73DC000
|
trusted library allocation
|
page read and write
|
||
1AE02B36000
|
heap
|
page read and write
|
||
1ADF7B6D000
|
trusted library allocation
|
page read and write
|
||
1ADF8EC5000
|
trusted library allocation
|
page read and write
|
||
1AE02B0B000
|
heap
|
page read and write
|
||
1ADFB073000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF97EC000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF7799000
|
heap
|
page read and write
|
||
1ADF8EE3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADF8B9B000
|
trusted library allocation
|
page read and write
|
||
1ADF7B87000
|
trusted library allocation
|
page read and write
|
||
26DBB115000
|
trusted library allocation
|
page read and write
|
||
1AE004F7000
|
trusted library allocation
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1ADF958A000
|
trusted library allocation
|
page read and write
|
||
1AE002C2000
|
trusted library allocation
|
page read and write
|
||
1DC3A3E000
|
unkown
|
page readonly
|
||
1ADFFFF0000
|
trusted library allocation
|
page read and write
|
||
1ADF5074000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADF8B2B000
|
trusted library allocation
|
page read and write
|
||
1AE01464000
|
trusted library allocation
|
page read and write
|
||
1ADF77B2000
|
heap
|
page read and write
|
||
1ADF8E74000
|
trusted library allocation
|
page read and write
|
||
1ADFFD7F000
|
trusted library allocation
|
page read and write
|
||
1ADFB2D1000
|
trusted library allocation
|
page read and write
|
||
1ADF90B5000
|
trusted library allocation
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3F000
|
heap
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE82000
|
heap
|
page read and write
|
||
1AE02B8E000
|
heap
|
page read and write
|
||
1AE024FA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADF8FA9000
|
trusted library allocation
|
page read and write
|
||
1ADFA2C6000
|
trusted library allocation
|
page read and write
|
||
1ADFA262000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3F000
|
heap
|
page read and write
|
||
2923710D000
|
trusted library allocation
|
page read and write
|
||
1AE000D8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7B000
|
heap
|
page read and write
|
||
26DBB200000
|
heap
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF8E95000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADFB45B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADF502B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF9FDE000
|
trusted library allocation
|
page read and write
|
||
26DBB359000
|
heap
|
page read and write
|
||
26DBB2A8000
|
heap
|
page read and write
|
||
26DBB2E0000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1ADFA297000
|
trusted library allocation
|
page read and write
|
||
1AE00084000
|
trusted library allocation
|
page read and write
|
||
1ADFFE2D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7D000
|
heap
|
page read and write
|
||
1ADF8E55000
|
trusted library allocation
|
page read and write
|
||
1ADF3DFB000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE83000
|
heap
|
page read and write
|
||
1ADF77A4000
|
heap
|
page read and write
|
||
1ADF9BE2000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE8000
|
trusted library allocation
|
page read and write
|
||
1ADF9573000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1AE013F5000
|
trusted library allocation
|
page read and write
|
||
1ADFB5A5000
|
trusted library allocation
|
page read and write
|
||
14B54EF03000
|
trusted library allocation
|
page read and write
|
||
1ADF93BC000
|
trusted library allocation
|
page read and write
|
||
1ADF3E7D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADEEE39000
|
heap
|
page read and write
|
||
1ADEEE18000
|
heap
|
page read and write
|
||
1ADF94CB000
|
trusted library allocation
|
page read and write
|
||
29237123000
|
trusted library allocation
|
page read and write
|
||
1ADF9347000
|
trusted library allocation
|
page read and write
|
||
1DC3B3E000
|
unkown
|
page readonly
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1ADFA248000
|
trusted library allocation
|
page read and write
|
||
1ADFA29E000
|
trusted library allocation
|
page read and write
|
||
1ADF82A4000
|
trusted library allocation
|
page read and write
|
||
1ADF77A8000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF96AD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8FE8000
|
trusted library allocation
|
page read and write
|
||
26DBB25C000
|
heap
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1AE013EF000
|
trusted library allocation
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
26DBA69F000
|
trusted library allocation
|
page read and write
|
||
1ADF93DC000
|
trusted library allocation
|
page read and write
|
||
1ADF3EA7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF9552000
|
trusted library allocation
|
page read and write
|
||
1ADF8BF0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4B000
|
heap
|
page read and write
|
||
1ADF7C6E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1D000
|
heap
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
1ADF9596000
|
trusted library allocation
|
page read and write
|
||
1AE0024D000
|
trusted library allocation
|
page read and write
|
||
1ADF8F98000
|
trusted library allocation
|
page read and write
|
||
1AE02B00000
|
trusted library allocation
|
page read and write
|
||
1ADF90B1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8F64000
|
trusted library allocation
|
page read and write
|
||
1ADF8E5C000
|
trusted library allocation
|
page read and write
|
||
1ADF7786000
|
heap
|
page read and write
|
||
1ADFB260000
|
trusted library allocation
|
page read and write
|
||
26DBB367000
|
heap
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADF7A99000
|
trusted library allocation
|
page read and write
|
||
1ADEEE05000
|
heap
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADF82D1000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
1ADFBCAD000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1ADFFF8F000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1AE004FD000
|
trusted library allocation
|
page read and write
|
||
26DBB32A000
|
heap
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADF7363000
|
trusted library allocation
|
page read and write
|
||
1ADF93DB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF934D000
|
trusted library allocation
|
page read and write
|
||
1AE00035000
|
trusted library allocation
|
page read and write
|
||
1ADF924A000
|
trusted library allocation
|
page read and write
|
||
1ADFB1CC000
|
trusted library allocation
|
page read and write
|
||
1ADF966C000
|
trusted library allocation
|
page read and write
|
||
1ADF77AB000
|
heap
|
page read and write
|
||
1AE0192E000
|
trusted library allocation
|
page read and write
|
||
1AE002A9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF82CC000
|
trusted library allocation
|
page read and write
|
||
1ADF7C68000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF82E9000
|
trusted library allocation
|
page read and write
|
||
1ADFA3A5000
|
trusted library allocation
|
page read and write
|
||
1ADF8B67000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF8E60000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8FDF000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
1ADF93E8000
|
trusted library allocation
|
page read and write
|
||
1AE036F1000
|
trusted library allocation
|
page read and write
|
||
1ADF77BF000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADFFD47000
|
trusted library allocation
|
page read and write
|
||
1ADF4D5F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF9BE7000
|
trusted library allocation
|
page read and write
|
||
1ADF933A000
|
trusted library allocation
|
page read and write
|
||
F44DBFE000
|
unkown
|
page readonly
|
||
1AE002D1000
|
trusted library allocation
|
page read and write
|
||
1ADFB55D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1AE00899000
|
trusted library allocation
|
page read and write
|
||
1ADF77A9000
|
heap
|
page read and write
|
||
1ADFBCCA000
|
trusted library allocation
|
page read and write
|
||
29236F60000
|
unclassified section
|
page read and write
|
||
1ADFC041000
|
trusted library allocation
|
page read and write
|
||
1ADF77A5000
|
heap
|
page read and write
|
||
1ADF90FA000
|
trusted library allocation
|
page read and write
|
||
1ADFFD21000
|
trusted library allocation
|
page read and write
|
||
1DC31FE000
|
stack
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADFFE8D000
|
trusted library allocation
|
page read and write
|
||
98A000
|
stack
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1AE0397F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE18000
|
heap
|
page read and write
|
||
1ADEEE60000
|
heap
|
page read and write
|
||
26DBB2E9000
|
heap
|
page read and write
|
||
1ADF7B8D000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBA000
|
trusted library allocation
|
page read and write
|
||
1ADFB28C000
|
trusted library allocation
|
page read and write
|
||
1AE0002E000
|
trusted library allocation
|
page read and write
|
||
1ADF93CA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE65000
|
heap
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADF8FB6000
|
trusted library allocation
|
page read and write
|
||
1AE014E4000
|
trusted library allocation
|
page read and write
|
||
1ADF50FE000
|
trusted library allocation
|
page read and write
|
||
29236CF0000
|
unclassified section
|
page readonly
|
||
1ADF933C000
|
trusted library allocation
|
page read and write
|
||
1AE02B01000
|
heap
|
page read and write
|
||
1ADF8B2D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADFA1BC000
|
trusted library allocation
|
page read and write
|
||
1ADFBCD4000
|
trusted library allocation
|
page read and write
|
||
1ADFFD9D000
|
trusted library allocation
|
page read and write
|
||
1ADFFD8A000
|
trusted library allocation
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1ADF96A0000
|
trusted library allocation
|
page read and write
|
||
1ADFA1C2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE90000
|
heap
|
page read and write
|
||
1ADF4DFD000
|
trusted library allocation
|
page read and write
|
||
1AE00199000
|
trusted library allocation
|
page read and write
|
||
26DBB2EC000
|
heap
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
26DBA623000
|
trusted library allocation
|
page read and write
|
||
1AE03A86000
|
trusted library allocation
|
page read and write
|
||
1AE00210000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1AE000F5000
|
trusted library allocation
|
page read and write
|
||
17ECD230000
|
heap
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
26DBB367000
|
heap
|
page read and write
|
||
26DBB260000
|
heap
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADEEE4E000
|
heap
|
page read and write
|
||
1ADF90FA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE33000
|
heap
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADF7CAE000
|
trusted library allocation
|
page read and write
|
||
1ADFFEEE000
|
trusted library allocation
|
page read and write
|
||
1ADF73F2000
|
trusted library allocation
|
page read and write
|
||
1ADF8B6E000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF93FE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADEEE5C000
|
heap
|
page read and write
|
||
1ADF9772000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF9544000
|
trusted library allocation
|
page read and write
|
||
1AE024F1000
|
trusted library allocation
|
page read and write
|
||
1ADF9511000
|
trusted library allocation
|
page read and write
|
||
1ADFBCCA000
|
trusted library allocation
|
page read and write
|
||
1AE00189000
|
trusted library allocation
|
page read and write
|
||
74D228E000
|
unkown
|
page readonly
|
||
1ADF8EB2000
|
trusted library allocation
|
page read and write
|
||
1ADF9512000
|
trusted library allocation
|
page read and write
|
||
1ADF8B1C000
|
trusted library allocation
|
page read and write
|
||
1ADF77A9000
|
heap
|
page read and write
|
||
74D5E3E000
|
stack
|
page read and write
|
||
1ADF87F5000
|
trusted library allocation
|
page read and write
|
||
2FE86C1000
|
trusted library allocation
|
page execute read
|
||
1AE0241A000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADF8B49000
|
trusted library allocation
|
page read and write
|
||
1ADF9520000
|
trusted library allocation
|
page read and write
|
||
1ADEEE87000
|
heap
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADF90B1000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
26DBB2E1000
|
heap
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
24E859B2000
|
heap
|
page read and write
|
||
24E858E0000
|
heap
|
page read and write
|
||
1ADF7374000
|
trusted library allocation
|
page read and write
|
||
1ADF779B000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
1ADFFD2D000
|
trusted library allocation
|
page read and write
|
||
1AE02B99000
|
heap
|
page read and write
|
||
1ADF77A9000
|
heap
|
page read and write
|
||
26DBB358000
|
heap
|
page read and write
|
||
1AE00051000
|
trusted library allocation
|
page read and write
|
||
1ADF87FA000
|
trusted library allocation
|
page read and write
|
||
1AE01316000
|
trusted library allocation
|
page read and write
|
||
26DBAC60000
|
trusted library allocation
|
page read and write
|
||
1ADF8E55000
|
trusted library allocation
|
page read and write
|
||
1ADF7B5A000
|
trusted library allocation
|
page read and write
|
||
1ADF87FD000
|
trusted library allocation
|
page read and write
|
||
1ADF8E93000
|
trusted library allocation
|
page read and write
|
||
1AE03A6D000
|
trusted library allocation
|
page read and write
|
||
26DBB367000
|
heap
|
page read and write
|
||
1ADF82CC000
|
trusted library allocation
|
page read and write
|
||
1ADF5090000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADF9BE7000
|
trusted library allocation
|
page read and write
|
||
1ADFB5E7000
|
trusted library allocation
|
page read and write
|
||
1ADF825C000
|
trusted library allocation
|
page read and write
|
||
1ADFA225000
|
trusted library allocation
|
page read and write
|
||
1ADF8295000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8247000
|
trusted library allocation
|
page read and write
|
||
1ADF8E6A000
|
trusted library allocation
|
page read and write
|
||
1ADF9033000
|
trusted library allocation
|
page read and write
|
||
26DBA648000
|
trusted library allocation
|
page read and write
|
||
1ADF50A1000
|
trusted library allocation
|
page read and write
|
||
1ADFB59B000
|
trusted library allocation
|
page read and write
|
||
1AE0362F000
|
trusted library allocation
|
page read and write
|
||
1ADFB166000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF82A4000
|
trusted library allocation
|
page read and write
|
||
1ADF90B8000
|
trusted library allocation
|
page read and write
|
||
26DBA220000
|
unclassified section
|
page readonly
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADFA34C000
|
trusted library allocation
|
page read and write
|
||
1ADF8E2C000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
1ADEEE56000
|
heap
|
page read and write
|
||
1ADF9713000
|
trusted library allocation
|
page read and write
|
||
1ADF8F5E000
|
trusted library allocation
|
page read and write
|
||
1ADF8FA5000
|
trusted library allocation
|
page read and write
|
||
74D238E000
|
unkown
|
page readonly
|
||
17ECD2A0000
|
heap
|
page read and write
|
||
1ADF779F000
|
heap
|
page read and write
|
||
26DBA2B0000
|
heap
|
page read and write
|
||
1ADF973A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
26DBB260000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF93EC000
|
trusted library allocation
|
page read and write
|
||
24E85900000
|
heap
|
page read and write
|
||
1ADF8ADD000
|
trusted library allocation
|
page read and write
|
||
1ADF7C79000
|
trusted library allocation
|
page read and write
|
||
1ADF73A3000
|
trusted library allocation
|
page read and write
|
||
1ADFB2F7000
|
trusted library allocation
|
page read and write
|
||
1ADF82FC000
|
trusted library allocation
|
page read and write
|
||
1ADF50C4000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE48000
|
heap
|
page read and write
|
||
1AE000BF000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
29236D00000
|
unclassified section
|
page readonly
|
||
1ADEEE75000
|
heap
|
page read and write
|
||
1AE01468000
|
trusted library allocation
|
page read and write
|
||
1AE002F5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4E000
|
heap
|
page read and write
|
||
1ADEEE3B000
|
heap
|
page read and write
|
||
26DBB367000
|
heap
|
page read and write
|
||
1ADFFFC5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE56000
|
heap
|
page read and write
|
||
1ADF8F7D000
|
trusted library allocation
|
page read and write
|
||
1AE004F3000
|
trusted library allocation
|
page read and write
|
||
1ADF9BF9000
|
trusted library allocation
|
page read and write
|
||
1ADF4FB4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE67000
|
heap
|
page read and write
|
||
1ADF8FE0000
|
trusted library allocation
|
page read and write
|
||
1ADFA372000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF7362000
|
trusted library allocation
|
page read and write
|
||
1ADFB0A7000
|
trusted library allocation
|
page read and write
|
||
138B000
|
heap
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1AE02B11000
|
heap
|
page read and write
|
||
1ADF9366000
|
trusted library allocation
|
page read and write
|
||
1ADF7B8D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1AE016C8000
|
trusted library allocation
|
page read and write
|
||
1ADFBC9F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF90D3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1AE00197000
|
trusted library allocation
|
page read and write
|
||
1ADF3EF0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE78000
|
heap
|
page read and write
|
||
1ADF8268000
|
trusted library allocation
|
page read and write
|
||
17ECD466000
|
trusted library allocation
|
page read and write
|
||
1ADF93AC000
|
trusted library allocation
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1DC17DE000
|
stack
|
page read and write
|
||
1ADFB2F5000
|
trusted library allocation
|
page read and write
|
||
1ADF93E9000
|
trusted library allocation
|
page read and write
|
||
1ADF9350000
|
trusted library allocation
|
page read and write
|
||
1ADF97E9000
|
trusted library allocation
|
page read and write
|
||
1ADF8AC6000
|
trusted library allocation
|
page read and write
|
||
1ADF90E0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADF92F2000
|
trusted library allocation
|
page read and write
|
||
1ADF50DD000
|
trusted library allocation
|
page read and write
|
||
1ADF778F000
|
heap
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADF8E60000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB2000
|
trusted library allocation
|
page read and write
|
||
1ADFFDC4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5F000
|
heap
|
page read and write
|
||
1ADFFF89000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3D000
|
heap
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF829E000
|
trusted library allocation
|
page read and write
|
||
1ADF96F7000
|
trusted library allocation
|
page read and write
|
||
1ADF77A9000
|
heap
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
26DBB358000
|
heap
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
1ADF3EFB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE53000
|
heap
|
page read and write
|
||
1ADF8291000
|
trusted library allocation
|
page read and write
|
||
1ADF8BEE000
|
trusted library allocation
|
page read and write
|
||
1ADFB5D1000
|
trusted library allocation
|
page read and write
|
||
1ADF4FDC000
|
trusted library allocation
|
page read and write
|
||
1ADFB223000
|
trusted library allocation
|
page read and write
|
||
26DBA560000
|
heap
|
page read and write
|
||
1ADFA1E6000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1AE024E8000
|
trusted library allocation
|
page read and write
|
||
1AE000D3000
|
trusted library allocation
|
page read and write
|
||
1ADF7B77000
|
trusted library allocation
|
page read and write
|
||
26DBA564000
|
heap
|
page read and write
|
||
1AE0011B000
|
trusted library allocation
|
page read and write
|
||
1ADF8BE6000
|
trusted library allocation
|
page read and write
|
||
29236E00000
|
heap
|
page read and write
|
||
1ADF750A000
|
trusted library allocation
|
page read and write
|
||
1AE0085D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADFA3F6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE82000
|
heap
|
page read and write
|
||
1ADF504E000
|
trusted library allocation
|
page read and write
|
||
1AE024A0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADF829C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF512D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3B000
|
heap
|
page read and write
|
||
1ADF8E50000
|
trusted library allocation
|
page read and write
|
||
1AE024DF000
|
trusted library allocation
|
page read and write
|
||
1ADF75CF000
|
trusted library allocation
|
page read and write
|
||
1ADFB5AA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4E000
|
heap
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADF9333000
|
trusted library allocation
|
page read and write
|
||
1ADEEDF4000
|
heap
|
page read and write
|
||
1ADEEE83000
|
heap
|
page read and write
|
||
26DBB2EC000
|
heap
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF37EF000
|
trusted library allocation
|
page read and write
|
||
1ADEEE05000
|
heap
|
page read and write
|
||
1ADF82AA000
|
trusted library allocation
|
page read and write
|
||
1ADF94C8000
|
trusted library allocation
|
page read and write
|
||
74D4E3E000
|
stack
|
page read and write
|
||
1ADF93A7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF96F6000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADFFE40000
|
trusted library allocation
|
page read and write
|
||
29237000000
|
trusted library allocation
|
page read and write
|
||
2923715D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4E000
|
heap
|
page read and write
|
||
1ADFB5DA000
|
trusted library allocation
|
page read and write
|
||
1ADF87D4000
|
trusted library allocation
|
page read and write
|
||
1ADFFF41000
|
trusted library allocation
|
page read and write
|
||
1ADF829E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1AE001AF000
|
trusted library allocation
|
page read and write
|
||
1ADFB7D2000
|
trusted library allocation
|
page read and write
|
||
1ADF87C9000
|
trusted library allocation
|
page read and write
|
||
1ADF93F9000
|
trusted library allocation
|
page read and write
|
||
1ADFBCBC000
|
trusted library allocation
|
page read and write
|
||
26DBAC70000
|
unkown
|
page execute read
|
||
1ADF8FD7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADF7C97000
|
trusted library allocation
|
page read and write
|
||
1AE024EC000
|
trusted library allocation
|
page read and write
|
||
1ADFA3C9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5C000
|
heap
|
page read and write
|
||
1ADFB5E2000
|
trusted library allocation
|
page read and write
|
||
1ADF9469000
|
trusted library allocation
|
page read and write
|
||
1ADF8FBA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0C000
|
heap
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF946D000
|
trusted library allocation
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
D6097FF000
|
stack
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
1ADF957F000
|
trusted library allocation
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
1ADF8BFE000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADF904B000
|
trusted library allocation
|
page read and write
|
||
29237198000
|
trusted library allocation
|
page read and write
|
||
1ADF97F4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADFB081000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1AE0132D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADFA0E4000
|
trusted library allocation
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1DC5B3E000
|
unkown
|
page readonly
|
||
1ADF954C000
|
trusted library allocation
|
page read and write
|
||
1AE013BC000
|
trusted library allocation
|
page read and write
|
||
1ADFA396000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1D000
|
heap
|
page read and write
|
||
1ADEEE73000
|
heap
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF7C74000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADFA29E000
|
trusted library allocation
|
page read and write
|
||
1ADF50C1000
|
trusted library allocation
|
page read and write
|
||
1ADF75C9000
|
trusted library allocation
|
page read and write
|
||
1ADFB2C8000
|
trusted library allocation
|
page read and write
|
||
1AE000AC000
|
trusted library allocation
|
page read and write
|
||
1ADFFE38000
|
trusted library allocation
|
page read and write
|
||
1AE00094000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADFB2ED000
|
trusted library allocation
|
page read and write
|
||
1ADF8B9A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF7B3E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADFB5C2000
|
trusted library allocation
|
page read and write
|
||
1ADF8B24000
|
trusted library allocation
|
page read and write
|
||
1ADFA1E8000
|
trusted library allocation
|
page read and write
|
||
1ADF8E3D000
|
trusted library allocation
|
page read and write
|
||
1AE01805000
|
trusted library allocation
|
page read and write
|
||
1ADF939F000
|
trusted library allocation
|
page read and write
|
||
1ADF7C6E000
|
trusted library allocation
|
page read and write
|
||
1ADF8E73000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
29237110000
|
trusted library allocation
|
page read and write
|
||
1ADF7C7C000
|
trusted library allocation
|
page read and write
|
||
1AE02B11000
|
heap
|
page read and write
|
||
1ADF7CC5000
|
trusted library allocation
|
page read and write
|
||
1ADF7582000
|
trusted library allocation
|
page read and write
|
||
1AE02B11000
|
heap
|
page read and write
|
||
1ADF82C1000
|
trusted library allocation
|
page read and write
|
||
24E87570000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF933F000
|
trusted library allocation
|
page read and write
|
||
1AE004F9000
|
trusted library allocation
|
page read and write
|
||
17ECD0D0000
|
unclassified section
|
page readonly
|
||
1ADFB073000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1AE00021000
|
trusted library allocation
|
page read and write
|
||
1AE00043000
|
trusted library allocation
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
1ADF9789000
|
trusted library allocation
|
page read and write
|
||
1ADEEE62000
|
heap
|
page read and write
|
||
1ADF7B61000
|
trusted library allocation
|
page read and write
|
||
1ADF823F000
|
trusted library allocation
|
page read and write
|
||
1ADFB098000
|
trusted library allocation
|
page read and write
|
||
1ADFA2C6000
|
trusted library allocation
|
page read and write
|
||
1ADF8FB1000
|
trusted library allocation
|
page read and write
|
||
26DBB2E6000
|
heap
|
page read and write
|
||
1ADF3790000
|
trusted library allocation
|
page read and write
|
||
1AE013A0000
|
trusted library allocation
|
page read and write
|
||
1ADF9533000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADF957F000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
76D37FF000
|
stack
|
page read and write
|
||
1ADF7C97000
|
trusted library allocation
|
page read and write
|
||
1ADFA310000
|
trusted library allocation
|
page read and write
|
||
1ADF82C1000
|
trusted library allocation
|
page read and write
|
||
1ADF8B6C000
|
trusted library allocation
|
page read and write
|
||
1ADFFEE6000
|
trusted library allocation
|
page read and write
|
||
1ADF951A000
|
trusted library allocation
|
page read and write
|
||
26DBA610000
|
trusted library allocation
|
page read and write
|
||
1ADF7B8D000
|
trusted library allocation
|
page read and write
|
||
26DBB2B9000
|
heap
|
page read and write
|
||
1AE008E7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE41000
|
heap
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1ADF8248000
|
trusted library allocation
|
page read and write
|
||
1ADF8E63000
|
trusted library allocation
|
page read and write
|
||
1ADF8B3B000
|
trusted library allocation
|
page read and write
|
||
1ADF829E000
|
trusted library allocation
|
page read and write
|
||
1ADF8E55000
|
trusted library allocation
|
page read and write
|
||
1ADEEE2D000
|
heap
|
page read and write
|
||
1ADF3E82000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF9514000
|
trusted library allocation
|
page read and write
|
||
1ADFFD6C000
|
trusted library allocation
|
page read and write
|
||
26DBAC73000
|
unkown
|
page execute read
|
||
1AE023F7000
|
trusted library allocation
|
page read and write
|
||
1ADF50E6000
|
trusted library allocation
|
page read and write
|
||
1ADF4F7A000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1AE008B8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5C000
|
heap
|
page read and write
|
||
1ADF969A000
|
trusted library allocation
|
page read and write
|
||
1ADF9753000
|
trusted library allocation
|
page read and write
|
||
1ADFFD7B000
|
trusted library allocation
|
page read and write
|
||
1ADF97E9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1AE01843000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8F79000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADF93F1000
|
trusted library allocation
|
page read and write
|
||
1ADF4FDC000
|
trusted library allocation
|
page read and write
|
||
1ADF87DD000
|
trusted library allocation
|
page read and write
|
||
1ADFFEFA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF7B3C000
|
trusted library allocation
|
page read and write
|
||
1ADF8F92000
|
trusted library allocation
|
page read and write
|
||
1ADF9383000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE3000
|
trusted library allocation
|
page read and write
|
||
1ADF50A6000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADF8F97000
|
trusted library allocation
|
page read and write
|
||
1AE013F9000
|
trusted library allocation
|
page read and write
|
||
1ADF3798000
|
trusted library allocation
|
page read and write
|
||
1AE000AB000
|
trusted library allocation
|
page read and write
|
||
1ADF77B2000
|
heap
|
page read and write
|
||
1ADF9366000
|
trusted library allocation
|
page read and write
|
||
1ADFBC9F000
|
trusted library allocation
|
page read and write
|
||
17ECD478000
|
trusted library allocation
|
page read and write
|
||
1ADF90E7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
24E857F0000
|
heap
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE85000
|
heap
|
page read and write
|
||
1ADEEE64000
|
heap
|
page read and write
|
||
1ADF8F92000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
74D224B000
|
stack
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADF8BE3000
|
trusted library allocation
|
page read and write
|
||
1ADF9294000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADF90F4000
|
trusted library allocation
|
page read and write
|
||
1ADF3E1B000
|
trusted library allocation
|
page read and write
|
||
1ADF8EDA000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADF8EFD000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEF000
|
trusted library allocation
|
page read and write
|
||
1ADFB2F7000
|
trusted library allocation
|
page read and write
|
||
1ADF4F7A000
|
trusted library allocation
|
page read and write
|
||
26DBB321000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8F97000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADF7505000
|
trusted library allocation
|
page read and write
|
||
29237100000
|
trusted library allocation
|
page read and write
|
||
1ADF93AC000
|
trusted library allocation
|
page read and write
|
||
26DBA566000
|
heap
|
page read and write
|
||
1ADF939F000
|
trusted library allocation
|
page read and write
|
||
1ADF9343000
|
trusted library allocation
|
page read and write
|
||
1ADF502B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADF93A4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE62000
|
heap
|
page read and write
|
||
1ADF8AFA000
|
trusted library allocation
|
page read and write
|
||
1ADF87F2000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADFC12C000
|
trusted library allocation
|
page read and write
|
||
1ADFBC96000
|
trusted library allocation
|
page read and write
|
||
1AE004F9000
|
trusted library allocation
|
page read and write
|
||
1AE024FA000
|
trusted library allocation
|
page read and write
|
||
1ADF8A6E000
|
trusted library allocation
|
page read and write
|
||
26DBB367000
|
heap
|
page read and write
|
||
1ADF82CC000
|
trusted library allocation
|
page read and write
|
||
1ADF8F97000
|
trusted library allocation
|
page read and write
|
||
1ADF8E5C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE64000
|
heap
|
page read and write
|
||
1AE03B2C000
|
trusted library allocation
|
page read and write
|
||
29237244000
|
heap
|
page read and write
|
||
1ADFFEE6000
|
trusted library allocation
|
page read and write
|
||
1AE013F7000
|
trusted library allocation
|
page read and write
|
||
F44DCB8000
|
stack
|
page read and write
|
||
1AE008DF000
|
trusted library allocation
|
page read and write
|
||
1ADFB5C9000
|
trusted library allocation
|
page read and write
|
||
1ADF8BF9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADEEE20000
|
heap
|
page read and write
|
||
26DBAC86000
|
unkown
|
page execute read
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF94F7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF9338000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE83000
|
heap
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
1AE02F02000
|
trusted library allocation
|
page read and write
|
||
1DC21D8000
|
stack
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADFFD61000
|
trusted library allocation
|
page read and write
|
||
1ADF9573000
|
trusted library allocation
|
page read and write
|
||
1ADF8B95000
|
trusted library allocation
|
page read and write
|
||
1ADF9782000
|
trusted library allocation
|
page read and write
|
||
1ADF8FA5000
|
trusted library allocation
|
page read and write
|
||
26DBA612000
|
trusted library allocation
|
page read and write
|
||
1AE0146C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE17000
|
heap
|
page read and write
|
||
1ADFFD9D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE42000
|
heap
|
page read and write
|
||
1ADFFD2B000
|
trusted library allocation
|
page read and write
|
||
1ADF37DF000
|
trusted library allocation
|
page read and write
|
||
1ADF7CE1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6D000
|
heap
|
page read and write
|
||
29236E2A000
|
heap
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1AE00861000
|
trusted library allocation
|
page read and write
|
||
1ADF50C7000
|
trusted library allocation
|
page read and write
|
||
1ADF7B9E000
|
trusted library allocation
|
page read and write
|
||
1ADF8F4D000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1AE024B3000
|
trusted library allocation
|
page read and write
|
||
1ADF85DA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE65000
|
heap
|
page read and write
|
||
29237147000
|
trusted library allocation
|
page read and write
|
||
29237172000
|
trusted library allocation
|
page read and write
|
||
1ADF9584000
|
trusted library allocation
|
page read and write
|
||
1ADF4D62000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3B000
|
heap
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
29237103000
|
trusted library allocation
|
page read and write
|
||
1ADF953B000
|
trusted library allocation
|
page read and write
|
||
1ADF50E4000
|
trusted library allocation
|
page read and write
|
||
1ADF9081000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1AE03A41000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADF77AB000
|
heap
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
26DBB2E0000
|
heap
|
page read and write
|
||
1ADFB245000
|
trusted library allocation
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADF9343000
|
trusted library allocation
|
page read and write
|
||
1ADFB2E2000
|
trusted library allocation
|
page read and write
|
||
26DBB2F1000
|
heap
|
page read and write
|
||
237E2E07000
|
trusted library allocation
|
page read and write
|
||
1AE024ED000
|
trusted library allocation
|
page read and write
|
||
1AE002AD000
|
trusted library allocation
|
page read and write
|
||
1ADF82BA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE52000
|
heap
|
page read and write
|
||
1ADFA3E5000
|
trusted library allocation
|
page read and write
|
||
24E85B0A000
|
trusted library allocation
|
page read and write
|
||
1ADF909E000
|
trusted library allocation
|
page read and write
|
||
1ADF93E8000
|
trusted library allocation
|
page read and write
|
||
1ADF756B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF75F5000
|
trusted library allocation
|
page read and write
|
||
1ADFB29D000
|
trusted library allocation
|
page read and write
|
||
1ADF9495000
|
trusted library allocation
|
page read and write
|
||
1ADF9518000
|
trusted library allocation
|
page read and write
|
||
1ADF9363000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
26DBB2FD000
|
heap
|
page read and write
|
||
3B31000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADFFE96000
|
trusted library allocation
|
page read and write
|
||
1ADF951C000
|
trusted library allocation
|
page read and write
|
||
1ADF73A5000
|
trusted library allocation
|
page read and write
|
||
1ADFFD7C000
|
trusted library allocation
|
page read and write
|
||
1ADF8E60000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
1ADF94F4000
|
trusted library allocation
|
page read and write
|
||
1ADF4FAF000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADFC101000
|
trusted library allocation
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
1AE0024D000
|
trusted library allocation
|
page read and write
|
||
1ADF829E000
|
trusted library allocation
|
page read and write
|
||
1ADF9085000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1AE024FA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF8BE6000
|
trusted library allocation
|
page read and write
|
||
1ADF77AD000
|
heap
|
page read and write
|
||
1ADFA3DC000
|
trusted library allocation
|
page read and write
|
||
1AE024F4000
|
trusted library allocation
|
page read and write
|
||
26DBB106000
|
trusted library allocation
|
page read and write
|
||
1AE002A9000
|
trusted library allocation
|
page read and write
|
||
1ADFA21F000
|
trusted library allocation
|
page read and write
|
||
1ADFB5E2000
|
trusted library allocation
|
page read and write
|
||
1AE02B01000
|
heap
|
page read and write
|
||
26DBB28A000
|
heap
|
page read and write
|
||
1AE001FD000
|
trusted library allocation
|
page read and write
|
||
1ADF9514000
|
trusted library allocation
|
page read and write
|
||
1ADF931B000
|
trusted library allocation
|
page read and write
|
||
1ADFB5C9000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
1AE0022C000
|
trusted library allocation
|
page read and write
|
||
1ADF7A97000
|
trusted library allocation
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1AE0001D000
|
trusted library allocation
|
page read and write
|
||
1ADE9D65000
|
heap
|
page read and write
|
||
1ADF85C9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8B2D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5F000
|
heap
|
page read and write
|
||
1ADF7CD6000
|
trusted library allocation
|
page read and write
|
||
2FE8741000
|
trusted library allocation
|
page execute read
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF92A5000
|
trusted library allocation
|
page read and write
|
||
1AE002C5000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADFB5EB000
|
trusted library allocation
|
page read and write
|
||
1ADF7CBC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE24000
|
heap
|
page read and write
|
||
1ADF379B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADF8E51000
|
trusted library allocation
|
page read and write
|
||
1ADFFEE8000
|
trusted library allocation
|
page read and write
|
||
1ADF8F64000
|
trusted library allocation
|
page read and write
|
||
1ADF3E75000
|
trusted library allocation
|
page read and write
|
||
1ADF8FBA000
|
trusted library allocation
|
page read and write
|
||
26DBB2E8000
|
heap
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADF7B66000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5D000
|
heap
|
page read and write
|
||
1ADFA298000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8FEC000
|
trusted library allocation
|
page read and write
|
||
F44EDBE000
|
unkown
|
page readonly
|
||
1ADEEE3B000
|
heap
|
page read and write
|
||
1ADFB250000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADEEE18000
|
heap
|
page read and write
|
||
1ADF778E000
|
heap
|
page read and write
|
||
26DBB119000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1AE01355000
|
trusted library allocation
|
page read and write
|
||
17ECD45F000
|
trusted library allocation
|
page read and write
|
||
1AE000EF000
|
trusted library allocation
|
page read and write
|
||
1ADF7333000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADF8E72000
|
trusted library allocation
|
page read and write
|
||
1ADFFEB2000
|
trusted library allocation
|
page read and write
|
||
1ADF9533000
|
trusted library allocation
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8F92000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1D000
|
heap
|
page read and write
|
||
1ADF8EDA000
|
trusted library allocation
|
page read and write
|
||
2923712E000
|
trusted library allocation
|
page read and write
|
||
1ADFB052000
|
trusted library allocation
|
page read and write
|
||
26DBB2E8000
|
heap
|
page read and write
|
||
1ADFA2C6000
|
trusted library allocation
|
page read and write
|
||
1AE00127000
|
trusted library allocation
|
page read and write
|
||
1ADF7CE1000
|
trusted library allocation
|
page read and write
|
||
1ADF85F1000
|
trusted library allocation
|
page read and write
|
||
1AE023E5000
|
trusted library allocation
|
page read and write
|
||
1AE01466000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADF8F90000
|
trusted library allocation
|
page read and write
|
||
1ADF50BE000
|
trusted library allocation
|
page read and write
|
||
1ADF8B3B000
|
trusted library allocation
|
page read and write
|
||
1ADF969E000
|
trusted library allocation
|
page read and write
|
||
1ADF93BC000
|
trusted library allocation
|
page read and write
|
||
1ADF90CC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF8B3E000
|
trusted library allocation
|
page read and write
|
||
1ADF8FBA000
|
trusted library allocation
|
page read and write
|
||
1ADF9689000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1F000
|
heap
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1ADF8FBA000
|
trusted library allocation
|
page read and write
|
||
1ADF826D000
|
trusted library allocation
|
page read and write
|
||
1ADFA265000
|
trusted library allocation
|
page read and write
|
||
1AE01AAC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE01000
|
heap
|
page read and write
|
||
1ADFB41A000
|
trusted library allocation
|
page read and write
|
||
17ECD0F0000
|
heap
|
page read and write
|
||
26DBAC7D000
|
unkown
|
page execute read
|
||
1AE001BB000
|
trusted library allocation
|
page read and write
|
||
1ADF9506000
|
trusted library allocation
|
page read and write
|
||
1ADF8BF9000
|
trusted library allocation
|
page read and write
|
||
1ADF93F9000
|
trusted library allocation
|
page read and write
|
||
1ADF90F4000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF8E86000
|
trusted library allocation
|
page read and write
|
||
1ADFB7F0000
|
trusted library allocation
|
page read and write
|
||
1ADF939F000
|
trusted library allocation
|
page read and write
|
||
1ADF7513000
|
trusted library allocation
|
page read and write
|
||
1ADFB802000
|
trusted library allocation
|
page read and write
|
||
1ADF8AF9000
|
trusted library allocation
|
page read and write
|
||
1ADFB09A000
|
trusted library allocation
|
page read and write
|
||
1ADFBCC6000
|
trusted library allocation
|
page read and write
|
||
1ADF504E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE64000
|
heap
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADF77AD000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADFB55A000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADF7585000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1E000
|
heap
|
page read and write
|
||
1ADF9352000
|
trusted library allocation
|
page read and write
|
||
1ADF8F53000
|
trusted library allocation
|
page read and write
|
||
1ADF5090000
|
trusted library allocation
|
page read and write
|
||
1ADF8FC0000
|
trusted library allocation
|
page read and write
|
||
1ADF97EC000
|
trusted library allocation
|
page read and write
|
||
29237309000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADFFDC4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF90E0000
|
trusted library allocation
|
page read and write
|
||
1ADFB0EE000
|
trusted library allocation
|
page read and write
|
||
2923717B000
|
trusted library allocation
|
page read and write
|
||
29236F70000
|
heap
|
page read and write
|
||
1ADFA21A000
|
trusted library allocation
|
page read and write
|
||
1AE00455000
|
trusted library allocation
|
page read and write
|
||
1ADEEE33000
|
heap
|
page read and write
|
||
1ADEEE68000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF9493000
|
trusted library allocation
|
page read and write
|
||
1ADF4DFD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF50C7000
|
trusted library allocation
|
page read and write
|
||
1ADFB4FE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
1ADF82C1000
|
trusted library allocation
|
page read and write
|
||
1ADF8D63000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADF8B3E000
|
trusted library allocation
|
page read and write
|
||
1ADF8BA4000
|
trusted library allocation
|
page read and write
|
||
1DC433E000
|
stack
|
page read and write
|
||
1ADF87D8000
|
trusted library allocation
|
page read and write
|
||
1ADF7B7E000
|
trusted library allocation
|
page read and write
|
||
1AE0242B000
|
trusted library allocation
|
page read and write
|
||
26DBAC7B000
|
unkown
|
page execute read
|
||
1ADF82C1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF8E69000
|
trusted library allocation
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1ADF93E1000
|
trusted library allocation
|
page read and write
|
||
1ADFB28C000
|
trusted library allocation
|
page read and write
|
||
1ADFFD4F000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF50F6000
|
trusted library allocation
|
page read and write
|
||
24E873AC000
|
heap
|
page read and write
|
||
1ADFFE1A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE78000
|
heap
|
page read and write
|
||
1ADF7A7E000
|
trusted library allocation
|
page read and write
|
||
1ADF7A47000
|
trusted library allocation
|
page read and write
|
||
1AE0007B000
|
trusted library allocation
|
page read and write
|
||
1ADF82F8000
|
trusted library allocation
|
page read and write
|
||
1AE024A5000
|
trusted library allocation
|
page read and write
|
||
1AE0003D000
|
trusted library allocation
|
page read and write
|
||
1AE00191000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF97FC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADFB1AD000
|
trusted library allocation
|
page read and write
|
||
1ADFB0B5000
|
trusted library allocation
|
page read and write
|
||
1AE0003F000
|
trusted library allocation
|
page read and write
|
||
1ADF77A9000
|
heap
|
page read and write
|
||
1ADF8F57000
|
trusted library allocation
|
page read and write
|
||
1ADF7AC2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1AE00254000
|
trusted library allocation
|
page read and write
|
||
26DBA550000
|
heap
|
page readonly
|
||
1ADFB2FD000
|
trusted library allocation
|
page read and write
|
||
1ADFA256000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF3EAB000
|
trusted library allocation
|
page read and write
|
||
1AE0184D000
|
trusted library allocation
|
page read and write
|
||
26DBAD50000
|
heap
|
page read and write
|
||
1ADF8E95000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADF828B000
|
trusted library allocation
|
page read and write
|
||
26DBB367000
|
heap
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF936C000
|
trusted library allocation
|
page read and write
|
||
1ADF939A000
|
trusted library allocation
|
page read and write
|
||
1AE000B3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE75000
|
heap
|
page read and write
|
||
1ADF9352000
|
trusted library allocation
|
page read and write
|
||
1AE004F0000
|
trusted library allocation
|
page read and write
|
||
1ADF94F1000
|
trusted library allocation
|
page read and write
|
||
1ADFB2F5000
|
trusted library allocation
|
page read and write
|
||
1ADF85DC000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
26DBB269000
|
heap
|
page read and write
|
||
1ADF50EB000
|
trusted library allocation
|
page read and write
|
||
1ADFFDA4000
|
trusted library allocation
|
page read and write
|
||
1ADFFECD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE78000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF8BE6000
|
trusted library allocation
|
page read and write
|
||
1ADF9588000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1ADFA1E4000
|
trusted library allocation
|
page read and write
|
||
1ADF977A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADFA222000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADF7B7E000
|
trusted library allocation
|
page read and write
|
||
1ADF7B55000
|
trusted library allocation
|
page read and write
|
||
811000
|
unkown
|
page execute read
|
||
1ADF8D5E000
|
trusted library allocation
|
page read and write
|
||
29236E20000
|
heap
|
page read and write
|
||
1ADF8E73000
|
trusted library allocation
|
page read and write
|
||
1ADFFE2A000
|
trusted library allocation
|
page read and write
|
||
26DBA58F000
|
unclassified section
|
page read and write
|
||
1ADFFE96000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF4F7E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1AE013F3000
|
trusted library allocation
|
page read and write
|
||
1ADF82E2000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE25000
|
heap
|
page read and write
|
||
1ADF939A000
|
trusted library allocation
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1ADF96DE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF93CC000
|
trusted library allocation
|
page read and write
|
||
1ADF93D5000
|
trusted library allocation
|
page read and write
|
||
1AE039E5000
|
trusted library allocation
|
page read and write
|
||
1ADF92F8000
|
trusted library allocation
|
page read and write
|
||
1AE000D3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE11000
|
heap
|
page read and write
|
||
1AE017A2000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADF8FB3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF9F8D000
|
trusted library allocation
|
page read and write
|
||
1ADF9363000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1ADF8E60000
|
trusted library allocation
|
page read and write
|
||
29237740000
|
heap
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF77BE000
|
heap
|
page read and write
|
||
1ADF8EEF000
|
trusted library allocation
|
page read and write
|
||
1ADFB298000
|
trusted library allocation
|
page read and write
|
||
1ADF37C2000
|
trusted library allocation
|
page read and write
|
||
26DBB209000
|
heap
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1ADF82B0000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADF9BE0000
|
trusted library allocation
|
page read and write
|
||
1ADFFD88000
|
trusted library allocation
|
page read and write
|
||
1AE02B4D000
|
heap
|
page read and write
|
||
1ADF9342000
|
trusted library allocation
|
page read and write
|
||
1AE008FB000
|
trusted library allocation
|
page read and write
|
||
1ADFA359000
|
trusted library allocation
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1ADF9079000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF948E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE43000
|
heap
|
page read and write
|
||
1ADFB5EE000
|
trusted library allocation
|
page read and write
|
||
1AE01906000
|
trusted library allocation
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADF90C7000
|
trusted library allocation
|
page read and write
|
||
1AE002C6000
|
trusted library allocation
|
page read and write
|
||
1AE03B33000
|
trusted library allocation
|
page read and write
|
||
1AE013ED000
|
trusted library allocation
|
page read and write
|
||
1ADF8E41000
|
trusted library allocation
|
page read and write
|
||
1ADF8EAA000
|
trusted library allocation
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4E000
|
heap
|
page read and write
|
||
1ADF7A81000
|
trusted library allocation
|
page read and write
|
||
1ADF9570000
|
trusted library allocation
|
page read and write
|
||
1ADF87D3000
|
trusted library allocation
|
page read and write
|
||
1ADFFE2F000
|
trusted library allocation
|
page read and write
|
||
1AE013FB000
|
trusted library allocation
|
page read and write
|
||
1ADF8E55000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
17ECD476000
|
trusted library allocation
|
page read and write
|
||
1F5E000
|
stack
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
26DBB25C000
|
heap
|
page read and write
|
||
1ADFBF7F000
|
trusted library allocation
|
page read and write
|
||
1ADF50D5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADFBFA2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1AE00221000
|
trusted library allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
1ADF7CD8000
|
trusted library allocation
|
page read and write
|
||
1ADF8F88000
|
trusted library allocation
|
page read and write
|
||
1AE024E8000
|
trusted library allocation
|
page read and write
|
||
1ADF779F000
|
heap
|
page read and write
|
||
1ADF4F2B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADFB5C9000
|
trusted library allocation
|
page read and write
|
||
1AE00458000
|
trusted library allocation
|
page read and write
|
||
1AE02BE3000
|
heap
|
page read and write
|
||
1ADFB254000
|
trusted library allocation
|
page read and write
|
||
1ADF8E4C000
|
trusted library allocation
|
page read and write
|
||
1ADF4F99000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF936F000
|
trusted library allocation
|
page read and write
|
||
1ADF936C000
|
trusted library allocation
|
page read and write
|
||
1ADF8E3D000
|
trusted library allocation
|
page read and write
|
||
1ADF933F000
|
trusted library allocation
|
page read and write
|
||
1AE00194000
|
trusted library allocation
|
page read and write
|
||
1ADF933A000
|
trusted library allocation
|
page read and write
|
||
1ADFA35D000
|
trusted library allocation
|
page read and write
|
||
1ADF94AA000
|
trusted library allocation
|
page read and write
|
||
1ADF9040000
|
trusted library allocation
|
page read and write
|
||
237E2C50000
|
heap
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADF8B97000
|
trusted library allocation
|
page read and write
|
||
1ADFA0A9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
17ECD482000
|
trusted library allocation
|
page read and write
|
||
1ADF82A4000
|
trusted library allocation
|
page read and write
|
||
1ADF9350000
|
trusted library allocation
|
page read and write
|
||
1ADEEE43000
|
heap
|
page read and write
|
||
1ADF90FA000
|
trusted library allocation
|
page read and write
|
||
1ADF93FA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE33000
|
heap
|
page read and write
|
||
1AE001B1000
|
trusted library allocation
|
page read and write
|
||
1ADF959E000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5B000
|
heap
|
page read and write
|
||
1ADF758D000
|
trusted library allocation
|
page read and write
|
||
1DC533E000
|
stack
|
page read and write
|
||
17ECD4B1000
|
trusted library allocation
|
page read and write
|
||
1ADF93F5000
|
trusted library allocation
|
page read and write
|
||
1ADFFD26000
|
trusted library allocation
|
page read and write
|
||
17ECD050000
|
unclassified section
|
page readonly
|
||
F44DD3E000
|
unkown
|
page readonly
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF934D000
|
trusted library allocation
|
page read and write
|
||
1ADF93E3000
|
trusted library allocation
|
page read and write
|
||
17ECD800000
|
trusted library allocation
|
page read and write
|
||
1ADF94E3000
|
trusted library allocation
|
page read and write
|
||
29237196000
|
trusted library allocation
|
page read and write
|
||
1ADF8912000
|
trusted library allocation
|
page read and write
|
||
1ADF82AA000
|
trusted library allocation
|
page read and write
|
||
1ADF8FBA000
|
trusted library allocation
|
page read and write
|
||
1ADF8E02000
|
trusted library allocation
|
page read and write
|
||
1ADF8B1C000
|
trusted library allocation
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADF82AA000
|
trusted library allocation
|
page read and write
|
||
1ADFFDB4000
|
trusted library allocation
|
page read and write
|
||
1ADF778B000
|
heap
|
page read and write
|
||
1ADFAD00000
|
trusted library allocation
|
page read and write
|
||
1ADF8A63000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
29236DD0000
|
heap
|
page read and write
|
||
1ADF9396000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
1ADFA25A000
|
trusted library allocation
|
page read and write
|
||
1ADF93CC000
|
trusted library allocation
|
page read and write
|
||
26DBAC90000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADFFD59000
|
trusted library allocation
|
page read and write
|
||
1AE014E6000
|
trusted library allocation
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADF8FB6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1AE0004F000
|
trusted library allocation
|
page read and write
|
||
1ADFBCD4000
|
trusted library allocation
|
page read and write
|
||
26DBA290000
|
unclassified section
|
page readonly
|
||
1ADF73B3000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF90B8000
|
trusted library allocation
|
page read and write
|
||
1AE02B52000
|
heap
|
page read and write
|
||
1ADEEE60000
|
heap
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADEEE60000
|
heap
|
page read and write
|
||
1ADF90DD000
|
trusted library allocation
|
page read and write
|
||
1ADF3D23000
|
trusted library allocation
|
page read and write
|
||
1ADF7589000
|
trusted library allocation
|
page read and write
|
||
17ECD500000
|
heap
|
page read and write
|
||
1ADF7547000
|
trusted library allocation
|
page read and write
|
||
1ADF82E9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
1ADF93E8000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE65000
|
heap
|
page read and write
|
||
1ADF9BE2000
|
trusted library allocation
|
page read and write
|
||
1ADF7CC2000
|
trusted library allocation
|
page read and write
|
||
1DC39FE000
|
unkown
|
page readonly
|
||
1ADF93BC000
|
trusted library allocation
|
page read and write
|
||
17ECD280000
|
heap
|
page read and write
|
||
1ADFB245000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1AE00096000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1AE024E8000
|
trusted library allocation
|
page read and write
|
||
24E859C3000
|
heap
|
page read and write
|
||
1ADF93D5000
|
trusted library allocation
|
page read and write
|
||
1ADF9350000
|
trusted library allocation
|
page read and write
|
||
1ADF923E000
|
trusted library allocation
|
page read and write
|
||
1ADF778C000
|
heap
|
page read and write
|
||
1ADF9518000
|
trusted library allocation
|
page read and write
|
||
1ADF7786000
|
heap
|
page read and write
|
||
1ADFB7F2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADFBCDE000
|
trusted library allocation
|
page read and write
|
||
1ADF3E13000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
1ADFB249000
|
trusted library allocation
|
page read and write
|
||
1ADF732F000
|
trusted library allocation
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
74D45FE000
|
unkown
|
page readonly
|
||
1ADF90F8000
|
trusted library allocation
|
page read and write
|
||
1ADFA29E000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF93CC000
|
trusted library allocation
|
page read and write
|
||
1ADF7799000
|
heap
|
page read and write
|
||
1ADF8ED9000
|
trusted library allocation
|
page read and write
|
||
26DBA686000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE0000
|
trusted library allocation
|
page read and write
|
||
1ADF77AD000
|
heap
|
page read and write
|
||
1ADF8FEC000
|
trusted library allocation
|
page read and write
|
||
1ADF8B3B000
|
trusted library allocation
|
page read and write
|
||
1AE0186D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF958C000
|
trusted library allocation
|
page read and write
|
||
1ADF7CBC000
|
trusted library allocation
|
page read and write
|
||
1AE024DB000
|
trusted library allocation
|
page read and write
|
||
1ADF93CC000
|
trusted library allocation
|
page read and write
|
||
1ADF779F000
|
heap
|
page read and write
|
||
1ADF7563000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
26DBA65F000
|
trusted library allocation
|
page read and write
|
||
1ADF93F1000
|
trusted library allocation
|
page read and write
|
||
1ADFFEEF000
|
trusted library allocation
|
page read and write
|
||
1AE000A2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADEEE3D000
|
heap
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
17ECD462000
|
trusted library allocation
|
page read and write
|
||
1ADFFD37000
|
trusted library allocation
|
page read and write
|
||
1ADF951B000
|
trusted library allocation
|
page read and write
|
||
1ADF82E0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8EFD000
|
trusted library allocation
|
page read and write
|
||
1ADF8EFB000
|
trusted library allocation
|
page read and write
|
||
1ADF8B2B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADEEE83000
|
heap
|
page read and write
|
||
1ADF96D6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADF7B83000
|
trusted library allocation
|
page read and write
|
||
1ADF8B8F000
|
trusted library allocation
|
page read and write
|
||
1ADFFF63000
|
trusted library allocation
|
page read and write
|
||
1ADF9511000
|
trusted library allocation
|
page read and write
|
||
1ADF8F99000
|
trusted library allocation
|
page read and write
|
||
1ADF8E59000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF829C000
|
trusted library allocation
|
page read and write
|
||
1AE03100000
|
trusted library allocation
|
page read and write
|
||
1ADFA248000
|
trusted library allocation
|
page read and write
|
||
1AE00851000
|
trusted library allocation
|
page read and write
|
||
26DBA618000
|
trusted library allocation
|
page read and write
|
||
1ADF7B8B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1AE001E1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADFB231000
|
trusted library allocation
|
page read and write
|
||
1ADFFEA9000
|
trusted library allocation
|
page read and write
|
||
1ADF82D1000
|
trusted library allocation
|
page read and write
|
||
1ADF82BF000
|
trusted library allocation
|
page read and write
|
||
1AE02B11000
|
heap
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF82A4000
|
trusted library allocation
|
page read and write
|
||
1ADF82FE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADF82FC000
|
trusted library allocation
|
page read and write
|
||
76D4FFE000
|
stack
|
page read and write
|
||
1ADF5031000
|
trusted library allocation
|
page read and write
|
||
1AE008F6000
|
trusted library allocation
|
page read and write
|
||
1AE00093000
|
trusted library allocation
|
page read and write
|
||
17ECD2D0000
|
heap
|
page read and write
|
||
1AE002BC000
|
trusted library allocation
|
page read and write
|
||
1ADF4F7A000
|
trusted library allocation
|
page read and write
|
||
1ADF3D2F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADFFE44000
|
trusted library allocation
|
page read and write
|
||
1ADF9395000
|
trusted library allocation
|
page read and write
|
||
1ADF82F0000
|
trusted library allocation
|
page read and write
|
||
1AE01351000
|
trusted library allocation
|
page read and write
|
||
1ADFFE4A000
|
trusted library allocation
|
page read and write
|
||
1ADF9727000
|
trusted library allocation
|
page read and write
|
||
1ADF82A4000
|
trusted library allocation
|
page read and write
|
||
1ADF8B24000
|
trusted library allocation
|
page read and write
|
||
1ADF4D65000
|
trusted library allocation
|
page read and write
|
||
1ADFB2ED000
|
trusted library allocation
|
page read and write
|
||
1ADFFD16000
|
trusted library allocation
|
page read and write
|
||
1ADF8E84000
|
trusted library allocation
|
page read and write
|
||
1ADF8EB0000
|
trusted library allocation
|
page read and write
|
||
1ADF82A4000
|
trusted library allocation
|
page read and write
|
||
1DC3ABE000
|
unkown
|
page readonly
|
||
1ADF9747000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8F66000
|
trusted library allocation
|
page read and write
|
||
1ADF7B5A000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF93CC000
|
trusted library allocation
|
page read and write
|
||
1ADFB266000
|
trusted library allocation
|
page read and write
|
||
1AE002BC000
|
trusted library allocation
|
page read and write
|
||
1ADF9506000
|
trusted library allocation
|
page read and write
|
||
1ADF7B1F000
|
trusted library allocation
|
page read and write
|
||
1ADF9EEE000
|
trusted library allocation
|
page read and write
|
||
1ADF9363000
|
trusted library allocation
|
page read and write
|
||
1ADF8B67000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF925C000
|
trusted library allocation
|
page read and write
|
||
1AE01300000
|
trusted library allocation
|
page read and write
|
||
1ADFB539000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
1ADF939F000
|
trusted library allocation
|
page read and write
|
||
1AE00014000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF939F000
|
trusted library allocation
|
page read and write
|
||
1ADF8E05000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF9394000
|
trusted library allocation
|
page read and write
|
||
1ADF9394000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADFFD41000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
17ECD403000
|
trusted library allocation
|
page read and write
|
||
1ADF75F1000
|
trusted library allocation
|
page read and write
|
||
1ADF93D5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF7A97000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1AE004D8000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1AE03A05000
|
trusted library allocation
|
page read and write
|
||
1AE002C2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1AE008DA000
|
trusted library allocation
|
page read and write
|
||
1ADF8244000
|
trusted library allocation
|
page read and write
|
||
1ADF939F000
|
trusted library allocation
|
page read and write
|
||
17ECD040000
|
unclassified section
|
page readonly
|
||
1ADF8BA6000
|
trusted library allocation
|
page read and write
|
||
1ADFFFE4000
|
trusted library allocation
|
page read and write
|
||
1ADF9326000
|
trusted library allocation
|
page read and write
|
||
1ADF94D6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF77B2000
|
heap
|
page read and write
|
||
1ADEEE3A000
|
heap
|
page read and write
|
||
1ADF8FB6000
|
trusted library allocation
|
page read and write
|
||
1ADF4F99000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF77BE000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
1AE01A93000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADFB7F9000
|
trusted library allocation
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE42000
|
heap
|
page read and write
|
||
1ADEEE41000
|
heap
|
page read and write
|
||
1ADFFF56000
|
trusted library allocation
|
page read and write
|
||
1ADF9326000
|
trusted library allocation
|
page read and write
|
||
26DBACB1000
|
unkown
|
page execute read
|
||
1ADF87D1000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1D000
|
heap
|
page read and write
|
||
1ADF82FC000
|
trusted library allocation
|
page read and write
|
||
1ADF73D0000
|
trusted library allocation
|
page read and write
|
||
1ADF7B6D000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF0000
|
trusted library allocation
|
page read and write
|
||
1ADF8B2B000
|
trusted library allocation
|
page read and write
|
||
1ADEEE60000
|
heap
|
page read and write
|
||
1ADF75A9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE72000
|
heap
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADFFD47000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3D000
|
heap
|
page read and write
|
||
1ADF8EEA000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF938F000
|
trusted library allocation
|
page read and write
|
||
1AE000CC000
|
trusted library allocation
|
page read and write
|
||
1ADF8F35000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1D000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
D6087FC000
|
stack
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
26DBB2F1000
|
heap
|
page read and write
|
||
1AE02B81000
|
heap
|
page read and write
|
||
1ADF9350000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED4000
|
trusted library allocation
|
page read and write
|
||
1ADFA2C6000
|
trusted library allocation
|
page read and write
|
||
1ADFB2FD000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADF77A3000
|
heap
|
page read and write
|
||
1ADF9782000
|
trusted library allocation
|
page read and write
|
||
1ADF8ADD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE83000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADF9085000
|
trusted library allocation
|
page read and write
|
||
1AE02331000
|
trusted library allocation
|
page read and write
|
||
1ADEEE6A000
|
heap
|
page read and write
|
||
1ADF9FF7000
|
trusted library allocation
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADF8DAF000
|
trusted library allocation
|
page read and write
|
||
26DBB2E8000
|
heap
|
page read and write
|
||
1ADEEE2B000
|
heap
|
page read and write
|
||
1AE00861000
|
trusted library allocation
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF8EC0000
|
trusted library allocation
|
page read and write
|
||
1ADF93F3000
|
trusted library allocation
|
page read and write
|
||
1ADF8E4C000
|
trusted library allocation
|
page read and write
|
||
1ADF8EA5000
|
trusted library allocation
|
page read and write
|
||
1ADF8E41000
|
trusted library allocation
|
page read and write
|
||
1ADEEE8D000
|
heap
|
page read and write
|
||
1AE000CE000
|
trusted library allocation
|
page read and write
|
||
1ADF7589000
|
trusted library allocation
|
page read and write
|
||
1ADF93E3000
|
trusted library allocation
|
page read and write
|
||
1ADF93B8000
|
trusted library allocation
|
page read and write
|
||
26DBB2FD000
|
heap
|
page read and write
|
||
1ADEEE44000
|
heap
|
page read and write
|
||
1ADF9FD8000
|
trusted library allocation
|
page read and write
|
||
1ADFB495000
|
trusted library allocation
|
page read and write
|
||
1ADEEE52000
|
heap
|
page read and write
|
||
1ADF829E000
|
trusted library allocation
|
page read and write
|
||
1ADF8256000
|
trusted library allocation
|
page read and write
|
||
1ADF8F7D000
|
trusted library allocation
|
page read and write
|
||
1ADFB2CE000
|
trusted library allocation
|
page read and write
|
||
1ADFFE92000
|
trusted library allocation
|
page read and write
|
||
1AE03684000
|
trusted library allocation
|
page read and write
|
||
1ADF9E81000
|
trusted library allocation
|
page read and write
|
||
29237240000
|
heap
|
page read and write
|
||
1ADF8F88000
|
trusted library allocation
|
page read and write
|
||
1ADF82D0000
|
trusted library allocation
|
page read and write
|
||
1AE02B4F000
|
heap
|
page read and write
|
||
1ADF82EE000
|
trusted library allocation
|
page read and write
|
||
29237166000
|
trusted library allocation
|
page read and write
|
||
1ADEEE83000
|
heap
|
page read and write
|
||
1ADF4F7A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE05000
|
heap
|
page read and write
|
||
1ADEEE2D000
|
heap
|
page read and write
|
||
26DBB2FD000
|
heap
|
page read and write
|
||
1ADF90C7000
|
trusted library allocation
|
page read and write
|
||
1ADF7CBC000
|
trusted library allocation
|
page read and write
|
||
1ADF93E5000
|
trusted library allocation
|
page read and write
|
||
1ADFFEE8000
|
trusted library allocation
|
page read and write
|
||
1ADF7B89000
|
trusted library allocation
|
page read and write
|
||
1ADF9584000
|
trusted library allocation
|
page read and write
|
||
1ADEEE10000
|
heap
|
page read and write
|
||
1ADF7C3D000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADEEE58000
|
heap
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF5094000
|
trusted library allocation
|
page read and write
|
||
26DBB2FD000
|
heap
|
page read and write
|
||
1ADF779F000
|
heap
|
page read and write
|
||
1ADFA0B8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1ADF8E84000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADEEE6E000
|
heap
|
page read and write
|
||
1ADF93EC000
|
trusted library allocation
|
page read and write
|
||
1ADF8BB0000
|
trusted library allocation
|
page read and write
|
||
1ADF9395000
|
trusted library allocation
|
page read and write
|
||
1ADF9772000
|
trusted library allocation
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
1ADEEE60000
|
heap
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1AE01957000
|
trusted library allocation
|
page read and write
|
||
1ADEEE7C000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADFB27E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE75000
|
heap
|
page read and write
|
||
1ADFFD94000
|
trusted library allocation
|
page read and write
|
||
1ADF379E000
|
trusted library allocation
|
page read and write
|
||
1ADF8B29000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF8F88000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED4000
|
trusted library allocation
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1AE0232C000
|
trusted library allocation
|
page read and write
|
||
1ADF93FD000
|
trusted library allocation
|
page read and write
|
||
1ADF8DAA000
|
trusted library allocation
|
page read and write
|
||
1ADF93BC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADF7799000
|
heap
|
page read and write
|
||
1ADFBCBC000
|
trusted library allocation
|
page read and write
|
||
1ADF8B9C000
|
trusted library allocation
|
page read and write
|
||
29237337000
|
trusted library allocation
|
page read and write
|
||
26DBB2E3000
|
heap
|
page read and write
|
||
1ADF85FD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE48000
|
heap
|
page read and write
|
||
1ADF50D5000
|
trusted library allocation
|
page read and write
|
||
1ADF9511000
|
trusted library allocation
|
page read and write
|
||
1ADF7519000
|
trusted library allocation
|
page read and write
|
||
1ADF959E000
|
trusted library allocation
|
page read and write
|
||
1ADF9319000
|
trusted library allocation
|
page read and write
|
||
1ADF7799000
|
heap
|
page read and write
|
||
26DBB269000
|
heap
|
page read and write
|
||
1ADF8ED3000
|
trusted library allocation
|
page read and write
|
||
1AE014CE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADFFD68000
|
trusted library allocation
|
page read and write
|
||
1AE0180C000
|
trusted library allocation
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADF9734000
|
trusted library allocation
|
page read and write
|
||
1ADF77CC000
|
heap
|
page read and write
|
||
1AE00119000
|
trusted library allocation
|
page read and write
|
||
1AE008B8000
|
trusted library allocation
|
page read and write
|
||
24E85A00000
|
trusted library allocation
|
page read and write
|
||
1ADFFEE8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8F97000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADF4D33000
|
trusted library allocation
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1AE0044D000
|
trusted library allocation
|
page read and write
|
||
1ADF7362000
|
trusted library allocation
|
page read and write
|
||
1AE00840000
|
trusted library allocation
|
page read and write
|
||
1ADFB4B8000
|
trusted library allocation
|
page read and write
|
||
1ADF7BCE000
|
trusted library allocation
|
page read and write
|
||
1ADF5094000
|
trusted library allocation
|
page read and write
|
||
1ADF969C000
|
trusted library allocation
|
page read and write
|
||
1AE000A8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADF8F92000
|
trusted library allocation
|
page read and write
|
||
1AE03AA7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
76D47FE000
|
stack
|
page read and write
|
||
1AE00420000
|
trusted library allocation
|
page read and write
|
||
1AE0131F000
|
trusted library allocation
|
page read and write
|
||
1ADF77BE000
|
heap
|
page read and write
|
||
1AE004D8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5C000
|
heap
|
page read and write
|
||
26DBB321000
|
heap
|
page read and write
|
||
1ADF8F92000
|
trusted library allocation
|
page read and write
|
||
1AE01364000
|
trusted library allocation
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADF8BFE000
|
trusted library allocation
|
page read and write
|
||
1ADF82CC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE1E000
|
heap
|
page read and write
|
||
1AE017E5000
|
trusted library allocation
|
page read and write
|
||
1ADFA361000
|
trusted library allocation
|
page read and write
|
||
1ADFB5E7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EAD000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEC000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF7000
|
trusted library allocation
|
page read and write
|
||
1ADF8BF9000
|
trusted library allocation
|
page read and write
|
||
1ADF37A7000
|
trusted library allocation
|
page read and write
|
||
1ADF9BC3000
|
trusted library allocation
|
page read and write
|
||
1AE02B11000
|
heap
|
page read and write
|
||
1ADF94C6000
|
trusted library allocation
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
1ADFFED5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE41000
|
heap
|
page read and write
|
||
1AE00170000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADEEE7D000
|
heap
|
page read and write
|
||
1ADF8FD4000
|
trusted library allocation
|
page read and write
|
||
3B31000
|
heap
|
page read and write
|
||
1ADF7B3D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADEEE4A000
|
heap
|
page read and write
|
||
1ADF7BA5000
|
trusted library allocation
|
page read and write
|
||
1ADF8E7C000
|
trusted library allocation
|
page read and write
|
||
1ADF7513000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3F000
|
heap
|
page read and write
|
||
1ADF9528000
|
trusted library allocation
|
page read and write
|
||
1ADF8EEF000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADFBC99000
|
trusted library allocation
|
page read and write
|
||
26DBA28C000
|
remote allocation
|
page execute read
|
||
1ADFFEE3000
|
trusted library allocation
|
page read and write
|
||
76D67FF000
|
stack
|
page read and write
|
||
1ADEEE64000
|
heap
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
26DBA666000
|
trusted library allocation
|
page read and write
|
||
2923730E000
|
trusted library allocation
|
page read and write
|
||
1ADEEE22000
|
heap
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADEEE5F000
|
heap
|
page read and write
|
||
1ADEEE25000
|
heap
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADF778E000
|
heap
|
page read and write
|
||
26DBB2A1000
|
heap
|
page read and write
|
||
1ADF7A6F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
1ADF8FA9000
|
trusted library allocation
|
page read and write
|
||
1ADF4FBD000
|
trusted library allocation
|
page read and write
|
||
1AE01A05000
|
trusted library allocation
|
page read and write
|
||
1ADF93B8000
|
trusted library allocation
|
page read and write
|
||
1ADF97FC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADEEE6D000
|
heap
|
page read and write
|
||
1ADFA3FE000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADFFEDF000
|
trusted library allocation
|
page read and write
|
||
1ADFB7A0000
|
trusted library allocation
|
page read and write
|
||
1ADF8EF4000
|
trusted library allocation
|
page read and write
|
||
1ADF973A000
|
trusted library allocation
|
page read and write
|
||
1ADEEE53000
|
heap
|
page read and write
|
||
1ADFA376000
|
trusted library allocation
|
page read and write
|
||
F44C3D8000
|
stack
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8FC4000
|
trusted library allocation
|
page read and write
|
||
1ADF7794000
|
heap
|
page read and write
|
||
1ADF82EA000
|
trusted library allocation
|
page read and write
|
||
1ADF92F6000
|
trusted library allocation
|
page read and write
|
||
1ADF9789000
|
trusted library allocation
|
page read and write
|
||
1ADF9864000
|
trusted library allocation
|
page read and write
|
||
1ADEEE59000
|
heap
|
page read and write
|
||
1ADEEE5D000
|
heap
|
page read and write
|
||
1ADEEE76000
|
heap
|
page read and write
|
||
1ADF82A4000
|
trusted library allocation
|
page read and write
|
||
1ADFC133000
|
trusted library allocation
|
page read and write
|
||
1ADF50DA000
|
trusted library allocation
|
page read and write
|
||
1ADE9D6A000
|
heap
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
1ADEEE3C000
|
heap
|
page read and write
|
||
292371B7000
|
trusted library allocation
|
page read and write
|
||
1ADF93E3000
|
trusted library allocation
|
page read and write
|
||
1ADF9E86000
|
trusted library allocation
|
page read and write
|
||
1ADF8AC0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADF8D97000
|
trusted library allocation
|
page read and write
|
||
1ADF90CC000
|
trusted library allocation
|
page read and write
|
||
1ADFB2CB000
|
trusted library allocation
|
page read and write
|
||
1ADFB292000
|
trusted library allocation
|
page read and write
|
||
1ADF7B6C000
|
trusted library allocation
|
page read and write
|
||
1ADF93AC000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1ADF4FDC000
|
trusted library allocation
|
page read and write
|
||
1AE002BA000
|
trusted library allocation
|
page read and write
|
||
1ADF93A4000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADF5073000
|
trusted library allocation
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
1ADF9393000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADF8EE7000
|
trusted library allocation
|
page read and write
|
||
1ADEEE46000
|
heap
|
page read and write
|
||
1ADEEE69000
|
heap
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
26DBA400000
|
trusted library allocation
|
page read and write
|
||
1ADF7B6D000
|
trusted library allocation
|
page read and write
|
||
1ADFC043000
|
trusted library allocation
|
page read and write
|
||
1AE014F6000
|
trusted library allocation
|
page read and write
|
||
1AE031F3000
|
trusted library allocation
|
page read and write
|
||
1ADF77CB000
|
heap
|
page read and write
|
||
1ADF8E9C000
|
trusted library allocation
|
page read and write
|
||
1ADFA31E000
|
trusted library allocation
|
page read and write
|
||
1ADF9352000
|
trusted library allocation
|
page read and write
|
||
1ADF77BF000
|
heap
|
page read and write
|
||
1ADF93BC000
|
trusted library allocation
|
page read and write
|
||
1ADF9518000
|
trusted library allocation
|
page read and write
|
||
1ADF937F000
|
trusted library allocation
|
page read and write
|
||
1AE024FA000
|
trusted library allocation
|
page read and write
|
||
1ADFA36D000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8FCD000
|
trusted library allocation
|
page read and write
|
||
1ADF50C1000
|
trusted library allocation
|
page read and write
|
||
1ADF739D000
|
trusted library allocation
|
page read and write
|
||
D6087FF000
|
stack
|
page read and write
|
||
1ADFB27E000
|
trusted library allocation
|
page read and write
|
||
1ADFFD32000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF8E46000
|
trusted library allocation
|
page read and write
|
||
1ADFB04F000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1ADFFDD9000
|
trusted library allocation
|
page read and write
|
||
1ADEEE2D000
|
heap
|
page read and write
|
||
1ADF8EBE000
|
trusted library allocation
|
page read and write
|
||
1ADF8B6C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4B000
|
heap
|
page read and write
|
||
1ADF9BE2000
|
trusted library allocation
|
page read and write
|
||
1ADF90E7000
|
trusted library allocation
|
page read and write
|
||
1ADF8E74000
|
trusted library allocation
|
page read and write
|
||
1ADF7B5F000
|
trusted library allocation
|
page read and write
|
||
1ADF87ED000
|
trusted library allocation
|
page read and write
|
||
1ADF4FDC000
|
trusted library allocation
|
page read and write
|
||
1ADF7A81000
|
trusted library allocation
|
page read and write
|
||
1ADF8EBB000
|
trusted library allocation
|
page read and write
|
||
1AE016D2000
|
trusted library allocation
|
page read and write
|
||
1ADF93A7000
|
trusted library allocation
|
page read and write
|
||
1ADF9352000
|
trusted library allocation
|
page read and write
|
||
1ADFFE96000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
8DC000
|
unkown
|
page read and write
|
||
1ADF8ECD000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF8EC0000
|
trusted library allocation
|
page read and write
|
||
1ADEEE40000
|
heap
|
page read and write
|
||
1ADF93F4000
|
trusted library allocation
|
page read and write
|
||
1ADF939F000
|
trusted library allocation
|
page read and write
|
||
F44DC3E000
|
unkown
|
page readonly
|
||
1ADF8DF2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE37000
|
heap
|
page read and write
|
||
1ADEEE82000
|
heap
|
page read and write
|
||
1ADF82C6000
|
trusted library allocation
|
page read and write
|
||
26DBB26C000
|
heap
|
page read and write
|
||
1ADEEE0A000
|
heap
|
page read and write
|
||
1ADF8FF5000
|
trusted library allocation
|
page read and write
|
||
1ADEEE54000
|
heap
|
page read and write
|
||
1ADEEE0D000
|
heap
|
page read and write
|
||
1AE01353000
|
trusted library allocation
|
page read and write
|
||
1ADF8E5E000
|
trusted library allocation
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF93E0000
|
trusted library allocation
|
page read and write
|
||
1AE02B5E000
|
heap
|
page read and write
|
||
1ADF8FBA000
|
trusted library allocation
|
page read and write
|
||
1ADF9FF7000
|
trusted library allocation
|
page read and write
|
||
1ADF8236000
|
trusted library allocation
|
page read and write
|
||
1ADF9570000
|
trusted library allocation
|
page read and write
|
||
1ADF8F4D000
|
trusted library allocation
|
page read and write
|
||
1ADF8F79000
|
trusted library allocation
|
page read and write
|
||
1ADFFEEB000
|
trusted library allocation
|
page read and write
|
||
1ADEEE15000
|
heap
|
page read and write
|
||
1ADFFE92000
|
trusted library allocation
|
page read and write
|
||
1ADF50AA000
|
trusted library allocation
|
page read and write
|
||
1ADF90C7000
|
trusted library allocation
|
page read and write
|
||
1AE023F4000
|
trusted library allocation
|
page read and write
|
||
1ADF939A000
|
trusted library allocation
|
page read and write
|
||
1ADF3EBA000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
26DBB33B000
|
heap
|
page read and write
|
||
1ADF82B8000
|
trusted library allocation
|
page read and write
|
||
1ADF8AC4000
|
trusted library allocation
|
page read and write
|
||
1ADFFEE2000
|
trusted library allocation
|
page read and write
|
||
1ADF77A9000
|
heap
|
page read and write
|
||
1ADF93F7000
|
trusted library allocation
|
page read and write
|
||
1ADF9085000
|
trusted library allocation
|
page read and write
|
||
1ADFBCD4000
|
trusted library allocation
|
page read and write
|
||
1ADF82F8000
|
trusted library allocation
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF8E4C000
|
trusted library allocation
|
page read and write
|
||
1AE018A3000
|
trusted library allocation
|
page read and write
|
||
1ADF8FD2000
|
trusted library allocation
|
page read and write
|
||
1ADEEE0E000
|
heap
|
page read and write
|
||
1ADF77AB000
|
heap
|
page read and write
|
||
1ADF77AB000
|
heap
|
page read and write
|
||
1ADFC00C000
|
trusted library allocation
|
page read and write
|
||
1ADEEE61000
|
heap
|
page read and write
|
||
1ADF90E3000
|
trusted library allocation
|
page read and write
|
||
1ADF92BD000
|
trusted library allocation
|
page read and write
|
||
1ADF90CC000
|
trusted library allocation
|
page read and write
|
||
1ADEEE4C000
|
heap
|
page read and write
|
||
1ADEEE14000
|
heap
|
page read and write
|
||
1ADF8256000
|
trusted library allocation
|
page read and write
|
||
1ADEEDF4000
|
heap
|
page read and write
|
||
1ADF7C79000
|
trusted library allocation
|
page read and write
|
||
1ADEEE5C000
|
heap
|
page read and write
|
||
17ECD300000
|
trusted library allocation
|
page read and write
|
||
1AE00246000
|
trusted library allocation
|
page read and write
|
||
1ADF9FDE000
|
trusted library allocation
|
page read and write
|
||
1AE02421000
|
trusted library allocation
|
page read and write
|
||
1ADF8FE4000
|
trusted library allocation
|
page read and write
|
||
1ADF7571000
|
trusted library allocation
|
page read and write
|
||
1ADF7A63000
|
trusted library allocation
|
page read and write
|
||
1ADF8E41000
|
trusted library allocation
|
page read and write
|
||
1ADFB1EE000
|
trusted library allocation
|
page read and write
|
||
1ADF90A0000
|
trusted library allocation
|
page read and write
|
There are 4026 hidden memdumps, click here to show them.