Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b0bd22ac-4b5a-46d3-bae1-657a8d7542cc.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_b0bd22ac-4b5a-46d3-bae1-657a8d7542cc.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
|
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LZ2YW1XSG67FDESNELJ2.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MIIY1IP2EH99CYG5A62Z.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\d3868cce-c653-4977-a030-57a2f263a244
(copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\d3868cce-c653-4977-a030-57a2f263a244.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 32 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2244
-prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {3d30234f-83dc-4616-963d-c840c8c3c565} 2756 "\\.\pipe\gecko-crash-server-pipe.2756" 1fd4126ff10 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1568 -parentBuildID 20230927232528 -prefsHandle 4036
-prefMapHandle 2860 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1aae5212-1d50-4102-9b86-67ab97c1cbe9}
2756 "\\.\pipe\gecko-crash-server-pipe.2756" 1fd533ba410 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5036 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 5028 -prefMapHandle 2628 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {48db7f1c-968e-4dc6-9876-b2cfd4458117} 2756 "\\.\pipe\gecko-crash-server-pipe.2756" 1fd5aacfd10 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://youtube.comW
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://www.google.com/complete/searchf458e78b-9128-4027-b344-538f5661c148fa42b23a-30c5-46f3-8997-4a
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warning
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
|
unknown
|
||
https://www.instagram.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
|
unknown
|
||
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
http://youtube.com/
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.0.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.65
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
52.222.236.23
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.186.78
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
142.250.186.174
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.193.140
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.186.78
|
youtube.com
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
52.222.236.23
|
services.addons.mozilla.org
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
CDF000
|
heap
|
page read and write
|
||
1FD52D33000
|
trusted library allocation
|
page read and write
|
||
1FD539FD000
|
trusted library allocation
|
page read and write
|
||
1FD53940000
|
trusted library allocation
|
page read and write
|
||
1FD5ABEA000
|
trusted library allocation
|
page read and write
|
||
1FD5D406000
|
trusted library allocation
|
page read and write
|
||
1FD51A7B000
|
trusted library allocation
|
page read and write
|
||
256D908A000
|
heap
|
page read and write
|
||
1FD5D5DB000
|
trusted library allocation
|
page read and write
|
||
1FD51E9F000
|
trusted library allocation
|
page read and write
|
||
1FD524C4000
|
trusted library allocation
|
page read and write
|
||
256D912A000
|
heap
|
page read and write
|
||
1FD48091000
|
heap
|
page read and write
|
||
1FD52E52000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD523DC000
|
trusted library allocation
|
page read and write
|
||
1FD4E425000
|
trusted library allocation
|
page read and write
|
||
1FD52DBD000
|
trusted library allocation
|
page read and write
|
||
1FD532E8000
|
trusted library allocation
|
page read and write
|
||
1FD50CE3000
|
heap
|
page read and write
|
||
1FD592F4000
|
trusted library allocation
|
page read and write
|
||
1FD52E75000
|
trusted library allocation
|
page read and write
|
||
166BC71F000
|
unclassified section
|
page read and write
|
||
166BC710000
|
unclassified section
|
page read and write
|
||
1FD4E3DF000
|
trusted library allocation
|
page read and write
|
||
19B90B00000
|
trusted library allocation
|
page read and write
|
||
1FD592FC000
|
trusted library allocation
|
page read and write
|
||
1FD5D418000
|
trusted library allocation
|
page read and write
|
||
1FD52D91000
|
trusted library allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD5255D000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52D0B000
|
trusted library allocation
|
page read and write
|
||
1FD52E4E000
|
trusted library allocation
|
page read and write
|
||
1FD52E71000
|
trusted library allocation
|
page read and write
|
||
1FD480BC000
|
heap
|
page read and write
|
||
1FD5D442000
|
trusted library allocation
|
page read and write
|
||
1FD52C39000
|
trusted library allocation
|
page read and write
|
||
1FD5D268000
|
trusted library allocation
|
page read and write
|
||
1FD5459D000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD52DC5000
|
trusted library allocation
|
page read and write
|
||
256D9000000
|
heap
|
page read and write
|
||
1FD480D1000
|
heap
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD5B7A7000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD53982000
|
trusted library allocation
|
page read and write
|
||
1FD5263F000
|
trusted library allocation
|
page read and write
|
||
1FD4805D000
|
heap
|
page read and write
|
||
1FD5267A000
|
trusted library allocation
|
page read and write
|
||
1FD590BC000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD51E99000
|
trusted library allocation
|
page read and write
|
||
1FD58ECD000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD59038000
|
trusted library allocation
|
page read and write
|
||
1FD526AD000
|
trusted library allocation
|
page read and write
|
||
1FD51EAF000
|
trusted library allocation
|
page read and write
|
||
1FD5D5F0000
|
trusted library allocation
|
page read and write
|
||
1FD51A75000
|
trusted library allocation
|
page read and write
|
||
1FD545E6000
|
trusted library allocation
|
page read and write
|
||
1FD58FE3000
|
trusted library allocation
|
page read and write
|
||
1FD5315C000
|
trusted library allocation
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
1FD50D01000
|
heap
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD548CB000
|
trusted library allocation
|
page read and write
|
||
166BC7A4000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD52E4E000
|
trusted library allocation
|
page read and write
|
||
19B90830000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1141FAC4000
|
trusted library allocation
|
page read and write
|
||
256D84F3000
|
trusted library allocation
|
page read and write
|
||
1FD51A8F000
|
trusted library allocation
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD5B6A2000
|
trusted library allocation
|
page read and write
|
||
1FD5D48F000
|
trusted library allocation
|
page read and write
|
||
1FD539FB000
|
trusted library allocation
|
page read and write
|
||
1FD51E58000
|
trusted library allocation
|
page read and write
|
||
1FD5D194000
|
trusted library allocation
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
1FD528B0000
|
trusted library allocation
|
page read and write
|
||
1FD4F3CF000
|
trusted library allocation
|
page read and write
|
||
1FD52D39000
|
trusted library allocation
|
page read and write
|
||
1FD5AA73000
|
trusted library allocation
|
page read and write
|
||
1FD50D02000
|
heap
|
page read and write
|
||
256D9177000
|
heap
|
page read and write
|
||
1FD591CB000
|
trusted library allocation
|
page read and write
|
||
1FD52469000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD5D1A4000
|
trusted library allocation
|
page read and write
|
||
1FD52E5D000
|
trusted library allocation
|
page read and write
|
||
1FD4FA7F000
|
trusted library allocation
|
page read and write
|
||
1FD5DDBC000
|
trusted library allocation
|
page read and write
|
||
1FD52E73000
|
trusted library allocation
|
page read and write
|
||
1FD5B76D000
|
trusted library allocation
|
page read and write
|
||
1FD512EF000
|
trusted library allocation
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD53965000
|
trusted library allocation
|
page read and write
|
||
1FD52DB2000
|
trusted library allocation
|
page read and write
|
||
1FD51AD2000
|
trusted library allocation
|
page read and write
|
||
1FD52D73000
|
trusted library allocation
|
page read and write
|
||
1023FE000
|
unkown
|
page readonly
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD539FE000
|
trusted library allocation
|
page read and write
|
||
1FD5AAAF000
|
trusted library allocation
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD48057000
|
heap
|
page read and write
|
||
1FD51E8C000
|
trusted library allocation
|
page read and write
|
||
1FD51AEF000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD5260B000
|
trusted library allocation
|
page read and write
|
||
1FD51EA4000
|
trusted library allocation
|
page read and write
|
||
1FD5440B000
|
trusted library allocation
|
page read and write
|
||
1FD50D24000
|
heap
|
page read and write
|
||
1FD5959B000
|
trusted library allocation
|
page read and write
|
||
1FD52E67000
|
trusted library allocation
|
page read and write
|
||
1FD52EF8000
|
trusted library allocation
|
page read and write
|
||
1FD4FAEC000
|
trusted library allocation
|
page read and write
|
||
1141FB46000
|
heap
|
page read and write
|
||
1FD51AC7000
|
trusted library allocation
|
page read and write
|
||
1FD52D91000
|
trusted library allocation
|
page read and write
|
||
1FD4809C000
|
heap
|
page read and write
|
||
1FD52436000
|
trusted library allocation
|
page read and write
|
||
1FD53123000
|
trusted library allocation
|
page read and write
|
||
1FD5B7C5000
|
trusted library allocation
|
page read and write
|
||
1FD52A73000
|
trusted library allocation
|
page read and write
|
||
1FD52452000
|
trusted library allocation
|
page read and write
|
||
1FD4E22A000
|
trusted library allocation
|
page read and write
|
||
1FD5912B000
|
trusted library allocation
|
page read and write
|
||
1FD592CA000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1141FA6B000
|
trusted library allocation
|
page read and write
|
||
1FD54893000
|
trusted library allocation
|
page read and write
|
||
1FD523FD000
|
trusted library allocation
|
page read and write
|
||
1FD592A1000
|
trusted library allocation
|
page read and write
|
||
1FD52E06000
|
trusted library allocation
|
page read and write
|
||
1FD5ABDC000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD5AF1A000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD4E2E9000
|
trusted library allocation
|
page read and write
|
||
1FD5C700000
|
trusted library allocation
|
page read and write
|
||
1FD53295000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD52A50000
|
trusted library allocation
|
page read and write
|
||
1FD52469000
|
trusted library allocation
|
page read and write
|
||
1FD590F3000
|
trusted library allocation
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD52DBD000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD52AE8000
|
trusted library allocation
|
page read and write
|
||
1FD547CA000
|
trusted library allocation
|
page read and write
|
||
1FD52867000
|
trusted library allocation
|
page read and write
|
||
1FD52436000
|
trusted library allocation
|
page read and write
|
||
1FD590ED000
|
trusted library allocation
|
page read and write
|
||
1FD5D1D1000
|
trusted library allocation
|
page read and write
|
||
1FD5AAF9000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD58EB8000
|
trusted library allocation
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD4FACB000
|
trusted library allocation
|
page read and write
|
||
1FD594A6000
|
trusted library allocation
|
page read and write
|
||
1FD4809A000
|
heap
|
page read and write
|
||
1FD52EF4000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5909F000
|
trusted library allocation
|
page read and write
|
||
CF2000
|
heap
|
page read and write
|
||
1FD5245F000
|
trusted library allocation
|
page read and write
|
||
1FD51E92000
|
trusted library allocation
|
page read and write
|
||
1FD526E5000
|
trusted library allocation
|
page read and write
|
||
1FD5D5D5000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD53491000
|
trusted library allocation
|
page read and write
|
||
256D8E50000
|
trusted library allocation
|
page read and write
|
||
1FD4FA56000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
256D8423000
|
trusted library allocation
|
page read and write
|
||
1FD593BC000
|
trusted library allocation
|
page read and write
|
||
1FD539F2000
|
trusted library allocation
|
page read and write
|
||
1FD4F39F000
|
trusted library allocation
|
page read and write
|
||
19B90C95000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD52DF0000
|
trusted library allocation
|
page read and write
|
||
1FD58EE3000
|
trusted library allocation
|
page read and write
|
||
1FD48034000
|
heap
|
page read and write
|
||
1FD52D91000
|
trusted library allocation
|
page read and write
|
||
1FD5D45C000
|
trusted library allocation
|
page read and write
|
||
1FD5D66A000
|
heap
|
page read and write
|
||
1FD52ADD000
|
trusted library allocation
|
page read and write
|
||
1FD59593000
|
trusted library allocation
|
page read and write
|
||
1FD55106000
|
trusted library allocation
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
1FD480DA000
|
heap
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52D73000
|
trusted library allocation
|
page read and write
|
||
1FD52A73000
|
trusted library allocation
|
page read and write
|
||
1FD51AB2000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD52D39000
|
trusted library allocation
|
page read and write
|
||
1FD53017000
|
trusted library allocation
|
page read and write
|
||
1FD48091000
|
heap
|
page read and write
|
||
1FD544A2000
|
trusted library allocation
|
page read and write
|
||
1FD52DC7000
|
trusted library allocation
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
256D9009000
|
heap
|
page read and write
|
||
1FD58F28000
|
trusted library allocation
|
page read and write
|
||
1FD53287000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD58F16000
|
trusted library allocation
|
page read and write
|
||
1FD52EFC000
|
trusted library allocation
|
page read and write
|
||
1FD59261000
|
trusted library allocation
|
page read and write
|
||
DEFDD81000
|
trusted library allocation
|
page execute read
|
||
1FD51AD2000
|
trusted library allocation
|
page read and write
|
||
166BC712000
|
unclassified section
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD52436000
|
trusted library allocation
|
page read and write
|
||
1FD4FAF6000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52DF4000
|
trusted library allocation
|
page read and write
|
||
1FD5D595000
|
trusted library allocation
|
page read and write
|
||
1FD52D2B000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5242B000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD58ED1000
|
trusted library allocation
|
page read and write
|
||
1FD51A52000
|
trusted library allocation
|
page read and write
|
||
1FD52C3B000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD526FA000
|
trusted library allocation
|
page read and write
|
||
1FD48065000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD512A1000
|
trusted library allocation
|
page read and write
|
||
1FD52A50000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD5D593000
|
trusted library allocation
|
page read and write
|
||
1FD5AAA9000
|
trusted library allocation
|
page read and write
|
||
1FD59198000
|
trusted library allocation
|
page read and write
|
||
3E839D424000
|
trusted library allocation
|
page read and write
|
||
256D913B000
|
heap
|
page read and write
|
||
1FD512BD000
|
trusted library allocation
|
page read and write
|
||
1FD52FCA000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD52E90000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
166BC661000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD52D8B000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD48085000
|
heap
|
page read and write
|
||
1FD5D1FE000
|
trusted library allocation
|
page read and write
|
||
166BC67E000
|
trusted library allocation
|
page read and write
|
||
1FD52CEE000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD5121A000
|
trusted library allocation
|
page read and write
|
||
1FD5D5D5000
|
trusted library allocation
|
page read and write
|
||
256D8E46000
|
unkown
|
page execute read
|
||
1FD5DD32000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD51AB2000
|
trusted library allocation
|
page read and write
|
||
1FD51E6A000
|
trusted library allocation
|
page read and write
|
||
1FD523CD000
|
trusted library allocation
|
page read and write
|
||
1FD58F6B000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD51A95000
|
trusted library allocation
|
page read and write
|
||
1FD51EDC000
|
trusted library allocation
|
page read and write
|
||
C8795BB000
|
stack
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD4808B000
|
heap
|
page read and write
|
||
1FD52E73000
|
trusted library allocation
|
page read and write
|
||
1FD51E92000
|
trusted library allocation
|
page read and write
|
||
1FD51E92000
|
trusted library allocation
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
256D84C4000
|
trusted library allocation
|
page read and write
|
||
1FD52C3B000
|
trusted library allocation
|
page read and write
|
||
1FD52DB6000
|
trusted library allocation
|
page read and write
|
||
1FD535DC000
|
trusted library allocation
|
page read and write
|
||
6AC000
|
unkown
|
page readonly
|
||
19B90B0A000
|
trusted library allocation
|
page read and write
|
||
1FD480BC000
|
heap
|
page read and write
|
||
1FD595F3000
|
trusted library allocation
|
page read and write
|
||
1FD58EB3000
|
trusted library allocation
|
page read and write
|
||
1FD52ADB000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD52AAB000
|
trusted library allocation
|
page read and write
|
||
1FD51580000
|
trusted library allocation
|
page read and write
|
||
1FD480BE000
|
heap
|
page read and write
|
||
1FD58E9D000
|
trusted library allocation
|
page read and write
|
||
1FD48072000
|
heap
|
page read and write
|
||
1FD5248C000
|
trusted library allocation
|
page read and write
|
||
1FD59525000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52C39000
|
trusted library allocation
|
page read and write
|
||
1FD4FA56000
|
trusted library allocation
|
page read and write
|
||
1FD539F0000
|
trusted library allocation
|
page read and write
|
||
1FD53360000
|
trusted library allocation
|
page read and write
|
||
1FD5B748000
|
trusted library allocation
|
page read and write
|
||
1FD51AD2000
|
trusted library allocation
|
page read and write
|
||
1FD532E8000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD5D635000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5924C000
|
trusted library allocation
|
page read and write
|
||
1FD595F5000
|
trusted library allocation
|
page read and write
|
||
1FD512C4000
|
trusted library allocation
|
page read and write
|
||
1FD593B8000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52A32000
|
trusted library allocation
|
page read and write
|
||
1FD5D49F000
|
trusted library allocation
|
page read and write
|
||
1FD4E29D000
|
trusted library allocation
|
page read and write
|
||
6E4000
|
unkown
|
page readonly
|
||
1FD5DD9C000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
166BC67A000
|
trusted library allocation
|
page read and write
|
||
1FD59558000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD58F51000
|
trusted library allocation
|
page read and write
|
||
1FD51AF6000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD590AD000
|
trusted library allocation
|
page read and write
|
||
166BC665000
|
trusted library allocation
|
page read and write
|
||
1FD4809A000
|
heap
|
page read and write
|
||
1FD51ACA000
|
trusted library allocation
|
page read and write
|
||
1FD5D584000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
heap
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD4D1A3000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD58F8C000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD526E5000
|
trusted library allocation
|
page read and write
|
||
1FD52D0F000
|
trusted library allocation
|
page read and write
|
||
1FD52637000
|
trusted library allocation
|
page read and write
|
||
256D9169000
|
heap
|
page read and write
|
||
1FD5D5A3000
|
trusted library allocation
|
page read and write
|
||
1FD4CAC6000
|
trusted library allocation
|
page read and write
|
||
1FD4804D000
|
heap
|
page read and write
|
||
1FD54C9E000
|
trusted library allocation
|
page read and write
|
||
1FD51538000
|
trusted library allocation
|
page read and write
|
||
256D90F1000
|
heap
|
page read and write
|
||
1FD5E111000
|
trusted library allocation
|
page read and write
|
||
1FD5153C000
|
trusted library allocation
|
page read and write
|
||
1FD52F63000
|
trusted library allocation
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD51577000
|
trusted library allocation
|
page read and write
|
||
1FD51E6D000
|
trusted library allocation
|
page read and write
|
||
1FD53949000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD539FD000
|
trusted library allocation
|
page read and write
|
||
256D9063000
|
heap
|
page read and write
|
||
1FD525AB000
|
trusted library allocation
|
page read and write
|
||
1FD529E1000
|
trusted library allocation
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD58F51000
|
trusted library allocation
|
page read and write
|
||
1FD51AD5000
|
trusted library allocation
|
page read and write
|
||
1FD4D1AB000
|
trusted library allocation
|
page read and write
|
||
1FD5D4BD000
|
trusted library allocation
|
page read and write
|
||
1FD548E3000
|
trusted library allocation
|
page read and write
|
||
1FD5AA58000
|
trusted library allocation
|
page read and write
|
||
1FD5486A000
|
trusted library allocation
|
page read and write
|
||
1FD4E8D6000
|
trusted library allocation
|
page read and write
|
||
1FD51E8C000
|
trusted library allocation
|
page read and write
|
||
1FD5D5AF000
|
trusted library allocation
|
page read and write
|
||
1FD4D1D7000
|
trusted library allocation
|
page read and write
|
||
1FD5909B000
|
trusted library allocation
|
page read and write
|
||
1FD524EC000
|
trusted library allocation
|
page read and write
|
||
1FD480BC000
|
heap
|
page read and write
|
||
1FD52E67000
|
trusted library allocation
|
page read and write
|
||
1FD4E363000
|
trusted library allocation
|
page read and write
|
||
1FD50E22000
|
trusted library allocation
|
page read and write
|
||
1FD4D1B0000
|
trusted library allocation
|
page read and write
|
||
10347E000
|
unkown
|
page readonly
|
||
1FD51A95000
|
trusted library allocation
|
page read and write
|
||
256D90A1000
|
heap
|
page read and write
|
||
1FD5D56C000
|
trusted library allocation
|
page read and write
|
||
1FD4806B000
|
heap
|
page read and write
|
||
1FD4D0F6000
|
trusted library allocation
|
page read and write
|
||
1FD48057000
|
heap
|
page read and write
|
||
1FD545FA000
|
trusted library allocation
|
page read and write
|
||
1FD548D8000
|
trusted library allocation
|
page read and write
|
||
1FD5CFF8000
|
trusted library allocation
|
page read and write
|
||
1FD48098000
|
heap
|
page read and write
|
||
1FD547FD000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD51EBE000
|
trusted library allocation
|
page read and write
|
||
1FD52A8B000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD592E1000
|
trusted library allocation
|
page read and write
|
||
1FD5D50E000
|
trusted library allocation
|
page read and write
|
||
1FD52FC4000
|
trusted library allocation
|
page read and write
|
||
1FD52D71000
|
trusted library allocation
|
page read and write
|
||
1FD539DA000
|
trusted library allocation
|
page read and write
|
||
1FD4E98E000
|
trusted library allocation
|
page read and write
|
||
1FD54450000
|
trusted library allocation
|
page read and write
|
||
1FD52E44000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52DF0000
|
trusted library allocation
|
page read and write
|
||
1FD526B8000
|
trusted library allocation
|
page read and write
|
||
1FD53952000
|
trusted library allocation
|
page read and write
|
||
1FD5B741000
|
trusted library allocation
|
page read and write
|
||
1FD52533000
|
trusted library allocation
|
page read and write
|
||
1FD58EF7000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
256D913B000
|
heap
|
page read and write
|
||
1FD52EB0000
|
trusted library allocation
|
page read and write
|
||
1FD52469000
|
trusted library allocation
|
page read and write
|
||
1FD5245F000
|
trusted library allocation
|
page read and write
|
||
1FD58EF7000
|
trusted library allocation
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
ADB000
|
stack
|
page read and write
|
||
1FD53183000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD52637000
|
trusted library allocation
|
page read and write
|
||
1FD5B70C000
|
trusted library allocation
|
page read and write
|
||
1FD593BC000
|
trusted library allocation
|
page read and write
|
||
1FD52A22000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD545D5000
|
trusted library allocation
|
page read and write
|
||
256D8F0E000
|
trusted library allocation
|
page read and write
|
||
1FD58F39000
|
trusted library allocation
|
page read and write
|
||
1FD51A92000
|
trusted library allocation
|
page read and write
|
||
1FD4FA9F000
|
trusted library allocation
|
page read and write
|
||
1FD48084000
|
heap
|
page read and write
|
||
1FD545DA000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD52DE4000
|
trusted library allocation
|
page read and write
|
||
1FD48094000
|
heap
|
page read and write
|
||
1FD50D09000
|
heap
|
page read and write
|
||
1FD52461000
|
trusted library allocation
|
page read and write
|
||
1FD524F9000
|
trusted library allocation
|
page read and write
|
||
1FD51EB7000
|
trusted library allocation
|
page read and write
|
||
1FD58FDC000
|
trusted library allocation
|
page read and write
|
||
1FD52A20000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD545E2000
|
trusted library allocation
|
page read and write
|
||
1FD544CC000
|
trusted library allocation
|
page read and write
|
||
1FD58F43000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD5D522000
|
trusted library allocation
|
page read and write
|
||
1FD5B7E4000
|
trusted library allocation
|
page read and write
|
||
1FD595F3000
|
trusted library allocation
|
page read and write
|
||
1FD51889000
|
trusted library allocation
|
page read and write
|
||
1FD51E55000
|
trusted library allocation
|
page read and write
|
||
10017E000
|
unkown
|
page readonly
|
||
166BC612000
|
trusted library allocation
|
page read and write
|
||
1FD52E5D000
|
trusted library allocation
|
page read and write
|
||
1FD5DFF1000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
132671E000
|
stack
|
page read and write
|
||
1FD5C100000
|
trusted library allocation
|
page read and write
|
||
1FD594AC000
|
trusted library allocation
|
page read and write
|
||
1FD51AC7000
|
trusted library allocation
|
page read and write
|
||
1FD5245B000
|
trusted library allocation
|
page read and write
|
||
1FD4D200000
|
trusted library allocation
|
page read and write
|
||
1FD51E42000
|
trusted library allocation
|
page read and write
|
||
1FD535D2000
|
trusted library allocation
|
page read and write
|
||
1FD52AFD000
|
trusted library allocation
|
page read and write
|
||
256D8410000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD51AF6000
|
trusted library allocation
|
page read and write
|
||
1FD52A32000
|
trusted library allocation
|
page read and write
|
||
1FD5E141000
|
trusted library allocation
|
page read and write
|
||
1FD480D9000
|
heap
|
page read and write
|
||
1FD52E8A000
|
trusted library allocation
|
page read and write
|
||
1FD5B705000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD515B4000
|
trusted library allocation
|
page read and write
|
||
1FD548F8000
|
trusted library allocation
|
page read and write
|
||
1FD545D5000
|
trusted library allocation
|
page read and write
|
||
1FD52569000
|
trusted library allocation
|
page read and write
|
||
1FD592EB000
|
trusted library allocation
|
page read and write
|
||
1FD5D11E000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD4FA9F000
|
trusted library allocation
|
page read and write
|
||
256D905C000
|
heap
|
page read and write
|
||
1FD535CA000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD5955E000
|
trusted library allocation
|
page read and write
|
||
1000FB000
|
stack
|
page read and write
|
||
1FD52E75000
|
trusted library allocation
|
page read and write
|
||
1FD48094000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD5243B000
|
trusted library allocation
|
page read and write
|
||
1FD52A98000
|
trusted library allocation
|
page read and write
|
||
1FD59316000
|
trusted library allocation
|
page read and write
|
||
1FD526BB000
|
trusted library allocation
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD545CF000
|
trusted library allocation
|
page read and write
|
||
1FD5245F000
|
trusted library allocation
|
page read and write
|
||
1FD51A59000
|
trusted library allocation
|
page read and write
|
||
1FD4E948000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD5DD34000
|
trusted library allocation
|
page read and write
|
||
256D8477000
|
trusted library allocation
|
page read and write
|
||
1FD58EF3000
|
trusted library allocation
|
page read and write
|
||
CE6000
|
heap
|
page read and write
|
||
1FD52D91000
|
trusted library allocation
|
page read and write
|
||
1FD51E99000
|
trusted library allocation
|
page read and write
|
||
1FD51575000
|
trusted library allocation
|
page read and write
|
||
1FD4CAC4000
|
trusted library allocation
|
page read and write
|
||
1FD534AD000
|
trusted library allocation
|
page read and write
|
||
1FD52D91000
|
trusted library allocation
|
page read and write
|
||
1FD523F0000
|
trusted library allocation
|
page read and write
|
||
1FD54ACF000
|
trusted library allocation
|
page read and write
|
||
1FD4FA68000
|
trusted library allocation
|
page read and write
|
||
1FD4E2DC000
|
trusted library allocation
|
page read and write
|
||
1FD5D598000
|
trusted library allocation
|
page read and write
|
||
1FD5D1E2000
|
trusted library allocation
|
page read and write
|
||
1FD4D19C000
|
trusted library allocation
|
page read and write
|
||
1FD51A64000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
256D9060000
|
heap
|
page read and write
|
||
1FD5AA4B000
|
trusted library allocation
|
page read and write
|
||
1FD50D11000
|
heap
|
page read and write
|
||
1FD5243A000
|
trusted library allocation
|
page read and write
|
||
1FD51E89000
|
trusted library allocation
|
page read and write
|
||
1FD5302C000
|
trusted library allocation
|
page read and write
|
||
1FD530E6000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD480A8000
|
heap
|
page read and write
|
||
19B9245A000
|
heap
|
page read and write
|
||
1FD5D26A000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD52D8B000
|
trusted library allocation
|
page read and write
|
||
1FD59031000
|
trusted library allocation
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD51E8C000
|
trusted library allocation
|
page read and write
|
||
256D90B9000
|
heap
|
page read and write
|
||
1FD48065000
|
heap
|
page read and write
|
||
1FD48098000
|
heap
|
page read and write
|
||
1FD55041000
|
trusted library allocation
|
page read and write
|
||
1FD5B82E000
|
trusted library allocation
|
page read and write
|
||
1FD48096000
|
heap
|
page read and write
|
||
1FD5B6E5000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5D646000
|
heap
|
page read and write
|
||
1FD594E9000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD52FAE000
|
trusted library allocation
|
page read and write
|
||
1FD4FA84000
|
trusted library allocation
|
page read and write
|
||
1FD590F7000
|
trusted library allocation
|
page read and write
|
||
1FD59083000
|
trusted library allocation
|
page read and write
|
||
1FD535DA000
|
trusted library allocation
|
page read and write
|
||
1FD5919C000
|
trusted library allocation
|
page read and write
|
||
256D90E1000
|
heap
|
page read and write
|
||
1FD51AD5000
|
trusted library allocation
|
page read and write
|
||
1FD5D462000
|
trusted library allocation
|
page read and write
|
||
1FD48099000
|
heap
|
page read and write
|
||
1FD52FD4000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD4CA90000
|
trusted library allocation
|
page read and write
|
||
1FD52EF8000
|
trusted library allocation
|
page read and write
|
||
1FD48084000
|
heap
|
page read and write
|
||
1FD51AB2000
|
trusted library allocation
|
page read and write
|
||
1FD4E862000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD48091000
|
heap
|
page read and write
|
||
1FD5D52E000
|
trusted library allocation
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
1FD51EE3000
|
trusted library allocation
|
page read and write
|
||
1FD4806B000
|
heap
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD4809A000
|
heap
|
page read and write
|
||
1FD52D97000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD480E2000
|
heap
|
page read and write
|
||
1FD5ABF5000
|
trusted library allocation
|
page read and write
|
||
1FD5D264000
|
trusted library allocation
|
page read and write
|
||
13289FE000
|
unkown
|
page readonly
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD53374000
|
trusted library allocation
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
1FD51E58000
|
trusted library allocation
|
page read and write
|
||
1FD52FB6000
|
trusted library allocation
|
page read and write
|
||
1FD59160000
|
trusted library allocation
|
page read and write
|
||
1FD480DB000
|
heap
|
page read and write
|
||
1FD55086000
|
trusted library allocation
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
256D82B6000
|
heap
|
page read and write
|
||
256D9158000
|
heap
|
page read and write
|
||
1FD52EDA000
|
trusted library allocation
|
page read and write
|
||
1FD51E92000
|
trusted library allocation
|
page read and write
|
||
19B9085F000
|
heap
|
page read and write
|
||
1FD4FA99000
|
trusted library allocation
|
page read and write
|
||
1FD5DD32000
|
trusted library allocation
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
28113FE000
|
stack
|
page read and write
|
||
1FD51AC4000
|
trusted library allocation
|
page read and write
|
||
1FD5268D000
|
trusted library allocation
|
page read and write
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
1FD5D6E1000
|
heap
|
page read and write
|
||
1FD51ACA000
|
trusted library allocation
|
page read and write
|
||
1FD54ACF000
|
trusted library allocation
|
page read and write
|
||
1FD51EA6000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD529F1000
|
trusted library allocation
|
page read and write
|
||
1FD524DA000
|
trusted library allocation
|
page read and write
|
||
1FD51ACD000
|
trusted library allocation
|
page read and write
|
||
1FD54484000
|
trusted library allocation
|
page read and write
|
||
1FD50CE6000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
1FD5DF38000
|
trusted library allocation
|
page read and write
|
||
1141FD00000
|
trusted library allocation
|
page read and write
|
||
166BC65D000
|
trusted library allocation
|
page read and write
|
||
1FD4F39F000
|
trusted library allocation
|
page read and write
|
||
1FD5D462000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD480D0000
|
heap
|
page read and write
|
||
1FD51A82000
|
trusted library allocation
|
page read and write
|
||
1FD52D39000
|
trusted library allocation
|
page read and write
|
||
1FD52FFB000
|
trusted library allocation
|
page read and write
|
||
1FD539B4000
|
trusted library allocation
|
page read and write
|
||
1FD52484000
|
trusted library allocation
|
page read and write
|
||
1FD50CE6000
|
heap
|
page read and write
|
||
1FD480B2000
|
heap
|
page read and write
|
||
1FD52FB6000
|
trusted library allocation
|
page read and write
|
||
1FD52DE4000
|
trusted library allocation
|
page read and write
|
||
1FD535EA000
|
trusted library allocation
|
page read and write
|
||
1FD5D49F000
|
trusted library allocation
|
page read and write
|
||
256D9060000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD48094000
|
heap
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD5D595000
|
trusted library allocation
|
page read and write
|
||
1FD5D462000
|
trusted library allocation
|
page read and write
|
||
1FD4D076000
|
trusted library allocation
|
page read and write
|
||
1FD51EEF000
|
trusted library allocation
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD51564000
|
trusted library allocation
|
page read and write
|
||
1FD5953F000
|
trusted library allocation
|
page read and write
|
||
1FD512F1000
|
trusted library allocation
|
page read and write
|
||
256D9069000
|
heap
|
page read and write
|
||
1FD52623000
|
trusted library allocation
|
page read and write
|
||
1FD52D97000
|
trusted library allocation
|
page read and write
|
||
1FD480DB000
|
heap
|
page read and write
|
||
1FD4FAFD000
|
trusted library allocation
|
page read and write
|
||
1FD52DE4000
|
trusted library allocation
|
page read and write
|
||
1FD480B9000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD51EE3000
|
trusted library allocation
|
page read and write
|
||
1FD525E7000
|
trusted library allocation
|
page read and write
|
||
1FD5B7AC000
|
trusted library allocation
|
page read and write
|
||
1FD523EA000
|
trusted library allocation
|
page read and write
|
||
1FD51AC5000
|
trusted library allocation
|
page read and write
|
||
1FD543F2000
|
trusted library allocation
|
page read and write
|
||
1FD5346A000
|
trusted library allocation
|
page read and write
|
||
256D90E8000
|
heap
|
page read and write
|
||
1FD5B707000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD53256000
|
trusted library allocation
|
page read and write
|
||
1FD58F73000
|
trusted library allocation
|
page read and write
|
||
1FD4D1C6000
|
trusted library allocation
|
page read and write
|
||
1FD4E3B3000
|
trusted library allocation
|
page read and write
|
||
1FD5D1A4000
|
trusted library allocation
|
page read and write
|
||
1FD48091000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD5D17C000
|
trusted library allocation
|
page read and write
|
||
1FD51ECB000
|
trusted library allocation
|
page read and write
|
||
1FD48061000
|
heap
|
page read and write
|
||
1FD5DD21000
|
trusted library allocation
|
page read and write
|
||
1FD51E8C000
|
trusted library allocation
|
page read and write
|
||
1FD547A0000
|
trusted library allocation
|
page read and write
|
||
166BC610000
|
trusted library allocation
|
page read and write
|
||
1FD4E830000
|
trusted library allocation
|
page read and write
|
||
1FD52A9E000
|
trusted library allocation
|
page read and write
|
||
256D912D000
|
heap
|
page read and write
|
||
1FD594A8000
|
trusted library allocation
|
page read and write
|
||
1FD51A75000
|
trusted library allocation
|
page read and write
|
||
1FD52DE7000
|
trusted library allocation
|
page read and write
|
||
1FD58EB8000
|
trusted library allocation
|
page read and write
|
||
1FD58FFA000
|
trusted library allocation
|
page read and write
|
||
1FD592EB000
|
trusted library allocation
|
page read and write
|
||
1FD4E290000
|
trusted library allocation
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
1FD52DD0000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD50D5C000
|
heap
|
page read and write
|
||
1FD55048000
|
trusted library allocation
|
page read and write
|
||
1141FD06000
|
trusted library allocation
|
page read and write
|
||
1FD4CA9E000
|
trusted library allocation
|
page read and write
|
||
1FD50D2A000
|
heap
|
page read and write
|
||
1FD52DC0000
|
trusted library allocation
|
page read and write
|
||
1FD54ACD000
|
trusted library allocation
|
page read and write
|
||
1FD5AFFB000
|
trusted library allocation
|
page read and write
|
||
1FD531DB000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD58ECD000
|
trusted library allocation
|
page read and write
|
||
1FD48065000
|
heap
|
page read and write
|
||
1FD51ED5000
|
trusted library allocation
|
page read and write
|
||
1FD5DD19000
|
trusted library allocation
|
page read and write
|
||
1FD51824000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD51ED5000
|
trusted library allocation
|
page read and write
|
||
1FD526E5000
|
trusted library allocation
|
page read and write
|
||
1FD52D58000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD4FA94000
|
trusted library allocation
|
page read and write
|
||
1FD4809F000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD51AC2000
|
trusted library allocation
|
page read and write
|
||
1FD5955E000
|
trusted library allocation
|
page read and write
|
||
1FD5159B000
|
trusted library allocation
|
page read and write
|
||
1FD52463000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
3961000
|
heap
|
page read and write
|
||
1FD52873000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4FABF000
|
trusted library allocation
|
page read and write
|
||
1FD480EA000
|
heap
|
page read and write
|
||
1FD48084000
|
heap
|
page read and write
|
||
1FD523F9000
|
trusted library allocation
|
page read and write
|
||
1FD595F5000
|
trusted library allocation
|
page read and write
|
||
1FD4805D000
|
heap
|
page read and write
|
||
1FD50D00000
|
heap
|
page read and write
|
||
1FD52DED000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD54C2F000
|
trusted library allocation
|
page read and write
|
||
1FD54895000
|
trusted library allocation
|
page read and write
|
||
611000
|
unkown
|
page execute read
|
||
1FD4805C000
|
heap
|
page read and write
|
||
6D2000
|
unkown
|
page readonly
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
1FD480E4000
|
heap
|
page read and write
|
||
1FD51AD5000
|
trusted library allocation
|
page read and write
|
||
1FD51ECB000
|
trusted library allocation
|
page read and write
|
||
C87B8BE000
|
stack
|
page read and write
|
||
1FD51AC7000
|
trusted library allocation
|
page read and write
|
||
1FD51EB8000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
256D84C7000
|
trusted library allocation
|
page read and write
|
||
1FD58FFE000
|
trusted library allocation
|
page read and write
|
||
1FD4FA9F000
|
trusted library allocation
|
page read and write
|
||
1FD59129000
|
trusted library allocation
|
page read and write
|
||
1FD4E0C5000
|
trusted library allocation
|
page read and write
|
||
1FD5241B000
|
trusted library allocation
|
page read and write
|
||
1FD50E24000
|
trusted library allocation
|
page read and write
|
||
1FD58EBC000
|
trusted library allocation
|
page read and write
|
||
1FD53028000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD5D2C7000
|
trusted library allocation
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD51AD5000
|
trusted library allocation
|
page read and write
|
||
1FD4D182000
|
trusted library allocation
|
page read and write
|
||
1FD4E8CD000
|
trusted library allocation
|
page read and write
|
||
1FD52433000
|
trusted library allocation
|
page read and write
|
||
1FD480BA000
|
heap
|
page read and write
|
||
1FD51A30000
|
trusted library allocation
|
page read and write
|
||
1FD4E232000
|
trusted library allocation
|
page read and write
|
||
C87C0FE000
|
unkown
|
page read and write
|
||
1FD5D584000
|
trusted library allocation
|
page read and write
|
||
1FD592AB000
|
trusted library allocation
|
page read and write
|
||
1FD5B74D000
|
trusted library allocation
|
page read and write
|
||
1FD5301E000
|
trusted library allocation
|
page read and write
|
||
1FD52456000
|
trusted library allocation
|
page read and write
|
||
1FD54847000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD5240A000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD544EF000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD52E67000
|
trusted library allocation
|
page read and write
|
||
1FD4E379000
|
trusted library allocation
|
page read and write
|
||
1FD550A3000
|
trusted library allocation
|
page read and write
|
||
1FD51ACA000
|
trusted library allocation
|
page read and write
|
||
1FD52266000
|
trusted library allocation
|
page read and write
|
||
1FD52A55000
|
trusted library allocation
|
page read and write
|
||
256D9122000
|
heap
|
page read and write
|
||
1FD54879000
|
trusted library allocation
|
page read and write
|
||
1FD52D97000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD54AD7000
|
trusted library allocation
|
page read and write
|
||
1FD515A4000
|
trusted library allocation
|
page read and write
|
||
1FD48052000
|
heap
|
page read and write
|
||
1FD51EC0000
|
trusted library allocation
|
page read and write
|
||
1141F6B0000
|
unclassified section
|
page readonly
|
||
1FD52C74000
|
trusted library allocation
|
page read and write
|
||
1FD5B684000
|
trusted library allocation
|
page read and write
|
||
1FD51EAE000
|
trusted library allocation
|
page read and write
|
||
1FD5D418000
|
trusted library allocation
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
1FD4FAD6000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD5486D000
|
trusted library allocation
|
page read and write
|
||
1FD5AF4A000
|
trusted library allocation
|
page read and write
|
||
1FD5D42C000
|
trusted library allocation
|
page read and write
|
||
1FD4E92B000
|
trusted library allocation
|
page read and write
|
||
1FD52CFD000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4807B000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
256D90E8000
|
heap
|
page read and write
|
||
1FD52D39000
|
trusted library allocation
|
page read and write
|
||
1FD535DF000
|
trusted library allocation
|
page read and write
|
||
1141FB22000
|
unclassified section
|
page read and write
|
||
1FD51EF1000
|
trusted library allocation
|
page read and write
|
||
1FD52EF4000
|
trusted library allocation
|
page read and write
|
||
1FD51EDC000
|
trusted library allocation
|
page read and write
|
||
1FD548EE000
|
trusted library allocation
|
page read and write
|
||
1FD51AEF000
|
trusted library allocation
|
page read and write
|
||
1FD5D2C9000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD545A7000
|
trusted library allocation
|
page read and write
|
||
1FD48099000
|
heap
|
page read and write
|
||
1FD52DE7000
|
trusted library allocation
|
page read and write
|
||
1FD5D6BC000
|
heap
|
page read and write
|
||
1FD59225000
|
trusted library allocation
|
page read and write
|
||
1FD529D4000
|
trusted library allocation
|
page read and write
|
||
256D90AA000
|
heap
|
page read and write
|
||
1FD52E6C000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD590E4000
|
trusted library allocation
|
page read and write
|
||
1FD5DFCE000
|
trusted library allocation
|
page read and write
|
||
1FD52DE2000
|
trusted library allocation
|
page read and write
|
||
1FD52DD4000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD52D1C000
|
trusted library allocation
|
page read and write
|
||
1FD52AF4000
|
trusted library allocation
|
page read and write
|
||
1FD4FA86000
|
trusted library allocation
|
page read and write
|
||
1033FE000
|
unkown
|
page readonly
|
||
1FD48099000
|
heap
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD59329000
|
trusted library allocation
|
page read and write
|
||
1FD48085000
|
heap
|
page read and write
|
||
1FD4D1B0000
|
trusted library allocation
|
page read and write
|
||
256D90E8000
|
heap
|
page read and write
|
||
1FD51264000
|
trusted library allocation
|
page read and write
|
||
1FD5B833000
|
trusted library allocation
|
page read and write
|
||
1FD51EC0000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD51E7C000
|
trusted library allocation
|
page read and write
|
||
1FD52CE6000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
256D9100000
|
heap
|
page read and write
|
||
1FD5DF4E000
|
trusted library allocation
|
page read and write
|
||
1FD52470000
|
trusted library allocation
|
page read and write
|
||
1FD4CABF000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD4E34D000
|
trusted library allocation
|
page read and write
|
||
1FD5D16C000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1141FA62000
|
trusted library allocation
|
page read and write
|
||
1FD51ECB000
|
trusted library allocation
|
page read and write
|
||
256D9158000
|
heap
|
page read and write
|
||
256D9169000
|
heap
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
1FD51E92000
|
trusted library allocation
|
page read and write
|
||
1FD529F1000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4E2A7000
|
trusted library allocation
|
page read and write
|
||
1FD53028000
|
trusted library allocation
|
page read and write
|
||
1FD54AF0000
|
trusted library allocation
|
page read and write
|
||
1141F7B0000
|
heap
|
page read and write
|
||
14BD000
|
stack
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5D699000
|
heap
|
page read and write
|
||
1FD535CA000
|
trusted library allocation
|
page read and write
|
||
1FD52EBC000
|
trusted library allocation
|
page read and write
|
||
1FD5ABE8000
|
trusted library allocation
|
page read and write
|
||
1FD52D90000
|
trusted library allocation
|
page read and write
|
||
1FD4809C000
|
heap
|
page read and write
|
||
1FD51A6D000
|
trusted library allocation
|
page read and write
|
||
1FD53979000
|
trusted library allocation
|
page read and write
|
||
1FD54AD2000
|
trusted library allocation
|
page read and write
|
||
1FD533D3000
|
trusted library allocation
|
page read and write
|
||
1FD5159B000
|
trusted library allocation
|
page read and write
|
||
CE8000
|
heap
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
1FD51E99000
|
trusted library allocation
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD4FA69000
|
trusted library allocation
|
page read and write
|
||
1FD548EE000
|
trusted library allocation
|
page read and write
|
||
1FD526BF000
|
trusted library allocation
|
page read and write
|
||
1FD4E293000
|
trusted library allocation
|
page read and write
|
||
1FD54468000
|
trusted library allocation
|
page read and write
|
||
1FD5B70C000
|
trusted library allocation
|
page read and write
|
||
1FD58FAC000
|
trusted library allocation
|
page read and write
|
||
1FD4F37F000
|
trusted library allocation
|
page read and write
|
||
1FD594DF000
|
trusted library allocation
|
page read and write
|
||
1FD5D45E000
|
trusted library allocation
|
page read and write
|
||
1FD59198000
|
trusted library allocation
|
page read and write
|
||
6E4000
|
unkown
|
page readonly
|
||
1FD4CA98000
|
trusted library allocation
|
page read and write
|
||
1FD51A4B000
|
trusted library allocation
|
page read and write
|
||
256D9060000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1141F720000
|
remote allocation
|
page read and write
|
||
1FD58EB3000
|
trusted library allocation
|
page read and write
|
||
1FD5D49F000
|
trusted library allocation
|
page read and write
|
||
1FD52E65000
|
trusted library allocation
|
page read and write
|
||
1FD590DF000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD526AA000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD48051000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD524EC000
|
trusted library allocation
|
page read and write
|
||
1FD51E99000
|
trusted library allocation
|
page read and write
|
||
1FD51A75000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD52A65000
|
trusted library allocation
|
page read and write
|
||
1FD525D8000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
heap
|
page read and write
|
||
1FD527EB000
|
trusted library allocation
|
page read and write
|
||
1FD5D45C000
|
trusted library allocation
|
page read and write
|
||
1FD5B801000
|
trusted library allocation
|
page read and write
|
||
166BC681000
|
trusted library allocation
|
page read and write
|
||
1FD54897000
|
trusted library allocation
|
page read and write
|
||
1FD51AEE000
|
trusted library allocation
|
page read and write
|
||
1FD4E82C000
|
trusted library allocation
|
page read and write
|
||
1FD590FB000
|
trusted library allocation
|
page read and write
|
||
1FD545C5000
|
trusted library allocation
|
page read and write
|
||
1FD4F39F000
|
trusted library allocation
|
page read and write
|
||
1FD59230000
|
trusted library allocation
|
page read and write
|
||
256D89D1000
|
heap
|
page read and write
|
||
1FD51840000
|
trusted library allocation
|
page read and write
|
||
1FD5182D000
|
trusted library allocation
|
page read and write
|
||
1FD52A34000
|
trusted library allocation
|
page read and write
|
||
1FD50D02000
|
heap
|
page read and write
|
||
1FD52FC8000
|
trusted library allocation
|
page read and write
|
||
1FD50D14000
|
heap
|
page read and write
|
||
1FD518C0000
|
trusted library allocation
|
page read and write
|
||
1FD4E969000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD52459000
|
trusted library allocation
|
page read and write
|
||
1FD52D52000
|
trusted library allocation
|
page read and write
|
||
1FD5264F000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5B786000
|
trusted library allocation
|
page read and write
|
||
1FD52DEA000
|
trusted library allocation
|
page read and write
|
||
256D907D000
|
heap
|
page read and write
|
||
1FD5930C000
|
trusted library allocation
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
1FD53908000
|
trusted library allocation
|
page read and write
|
||
1FD5B801000
|
trusted library allocation
|
page read and write
|
||
1FD515E6000
|
trusted library allocation
|
page read and write
|
||
1FD5D5DB000
|
trusted library allocation
|
page read and write
|
||
1FD480B2000
|
heap
|
page read and write
|
||
1FD48051000
|
heap
|
page read and write
|
||
1FD5932C000
|
trusted library allocation
|
page read and write
|
||
1FD52C74000
|
trusted library allocation
|
page read and write
|
||
1FD524A7000
|
trusted library allocation
|
page read and write
|
||
1FD480BD000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD51E89000
|
trusted library allocation
|
page read and write
|
||
1FD5D439000
|
trusted library allocation
|
page read and write
|
||
1FD5D48F000
|
trusted library allocation
|
page read and write
|
||
1FD48091000
|
heap
|
page read and write
|
||
1FD52EF8000
|
trusted library allocation
|
page read and write
|
||
1FD51A82000
|
trusted library allocation
|
page read and write
|
||
256D90EB000
|
heap
|
page read and write
|
||
1FD4FADA000
|
trusted library allocation
|
page read and write
|
||
1FD51A64000
|
trusted library allocation
|
page read and write
|
||
1FD48045000
|
heap
|
page read and write
|
||
1FD5CFF8000
|
trusted library allocation
|
page read and write
|
||
1FD54AF4000
|
trusted library allocation
|
page read and write
|
||
1FD52DF6000
|
trusted library allocation
|
page read and write
|
||
166BC740000
|
unclassified section
|
page readonly
|
||
1FD50D0F000
|
heap
|
page read and write
|
||
1FD5453E000
|
trusted library allocation
|
page read and write
|
||
1FD4E2E6000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD53497000
|
trusted library allocation
|
page read and write
|
||
6D2000
|
unkown
|
page readonly
|
||
1FD4E8F2000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD4FA72000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD5B67F000
|
trusted library allocation
|
page read and write
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
1FD5954D000
|
trusted library allocation
|
page read and write
|
||
1FD52476000
|
trusted library allocation
|
page read and write
|
||
1FD5241B000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
19B90852000
|
heap
|
page read and write
|
||
256D8403000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD52D2B000
|
trusted library allocation
|
page read and write
|
||
1FD54A57000
|
trusted library allocation
|
page read and write
|
||
1FD51AEC000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD51AD2000
|
trusted library allocation
|
page read and write
|
||
1FD58EC1000
|
trusted library allocation
|
page read and write
|
||
1FD5AF85000
|
trusted library allocation
|
page read and write
|
||
C8795FE000
|
unkown
|
page readonly
|
||
1FD51E6D000
|
trusted library allocation
|
page read and write
|
||
1FD5457F000
|
trusted library allocation
|
page read and write
|
||
1FD526FA000
|
trusted library allocation
|
page read and write
|
||
1FD535DF000
|
trusted library allocation
|
page read and write
|
||
1FD5253F000
|
trusted library allocation
|
page read and write
|
||
1FD592E9000
|
trusted library allocation
|
page read and write
|
||
1FD524A7000
|
trusted library allocation
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
1FD54AD2000
|
trusted library allocation
|
page read and write
|
||
256D9144000
|
heap
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
4E715FF000
|
stack
|
page read and write
|
||
1FD526E1000
|
trusted library allocation
|
page read and write
|
||
1FD52C12000
|
trusted library allocation
|
page read and write
|
||
1FD5D19F000
|
trusted library allocation
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD54A59000
|
trusted library allocation
|
page read and write
|
||
1FD53952000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52D40000
|
trusted library allocation
|
page read and write
|
||
1FD550C5000
|
trusted library allocation
|
page read and write
|
||
166BC65B000
|
trusted library allocation
|
page read and write
|
||
1141F7BA000
|
heap
|
page read and write
|
||
1FD4E0FD000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD59040000
|
trusted library allocation
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4E22A000
|
trusted library allocation
|
page read and write
|
||
21DD0639000
|
heap
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD4E38F000
|
trusted library allocation
|
page read and write
|
||
1FD48098000
|
heap
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
256D9069000
|
heap
|
page read and write
|
||
1FD51530000
|
trusted library allocation
|
page read and write
|
||
1FD592BC000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD53974000
|
trusted library allocation
|
page read and write
|
||
1FD5D438000
|
trusted library allocation
|
page read and write
|
||
1FD4E381000
|
trusted library allocation
|
page read and write
|
||
1FD5B707000
|
trusted library allocation
|
page read and write
|
||
1FD51EBE000
|
trusted library allocation
|
page read and write
|
||
1FD5DF6D000
|
trusted library allocation
|
page read and write
|
||
1FD5246C000
|
trusted library allocation
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD50D09000
|
heap
|
page read and write
|
||
1FD5245F000
|
trusted library allocation
|
page read and write
|
||
1FD52E78000
|
trusted library allocation
|
page read and write
|
||
166BC4B0000
|
heap
|
page read and write
|
||
1FD590F7000
|
trusted library allocation
|
page read and write
|
||
1FD54859000
|
trusted library allocation
|
page read and write
|
||
1FD4F356000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD5B6C8000
|
trusted library allocation
|
page read and write
|
||
1FD52436000
|
trusted library allocation
|
page read and write
|
||
1FD58EE3000
|
trusted library allocation
|
page read and write
|
||
1FD51EB5000
|
trusted library allocation
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
1FD50E9B000
|
trusted library allocation
|
page read and write
|
||
1FD5AFBC000
|
trusted library allocation
|
page read and write
|
||
1FD5486D000
|
trusted library allocation
|
page read and write
|
||
1FD52A8B000
|
trusted library allocation
|
page read and write
|
||
256D8464000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5D606000
|
heap
|
page read and write
|
||
1FD480DB000
|
heap
|
page read and write
|
||
1FD4FA84000
|
trusted library allocation
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
1141F740000
|
unclassified section
|
page readonly
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD5240C000
|
trusted library allocation
|
page read and write
|
||
1FD51AD2000
|
trusted library allocation
|
page read and write
|
||
166BC908000
|
heap
|
page read and write
|
||
1FD545D9000
|
trusted library allocation
|
page read and write
|
||
1FD52E78000
|
trusted library allocation
|
page read and write
|
||
1FD592B6000
|
trusted library allocation
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
1FD5187B000
|
trusted library allocation
|
page read and write
|
||
1141FE0C000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD480D1000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD58EB8000
|
trusted library allocation
|
page read and write
|
||
1FD595AE000
|
trusted library allocation
|
page read and write
|
||
1FD51E89000
|
trusted library allocation
|
page read and write
|
||
256D8412000
|
trusted library allocation
|
page read and write
|
||
1FD535C4000
|
trusted library allocation
|
page read and write
|
||
1FD594D5000
|
trusted library allocation
|
page read and write
|
||
1FD5D18C000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD5DDE5000
|
trusted library allocation
|
page read and write
|
||
1FD535B2000
|
trusted library allocation
|
page read and write
|
||
1FD52A65000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1141FA1B000
|
trusted library allocation
|
page read and write
|
||
1FD5AB9B000
|
trusted library allocation
|
page read and write
|
||
1FD54891000
|
trusted library allocation
|
page read and write
|
||
1FD52EFA000
|
trusted library allocation
|
page read and write
|
||
1FD52C05000
|
trusted library allocation
|
page read and write
|
||
1FD51893000
|
trusted library allocation
|
page read and write
|
||
1FD52FC5000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52DF0000
|
trusted library allocation
|
page read and write
|
||
1FD5CFDF000
|
trusted library allocation
|
page read and write
|
||
1FD528B0000
|
trusted library allocation
|
page read and write
|
||
256D84C2000
|
trusted library allocation
|
page read and write
|
||
166BC330000
|
unclassified section
|
page readonly
|
||
1FD4E2AF000
|
trusted library allocation
|
page read and write
|
||
1FD594A4000
|
trusted library allocation
|
page read and write
|
||
1FD5390E000
|
trusted library allocation
|
page read and write
|
||
1FD52416000
|
trusted library allocation
|
page read and write
|
||
1FD4807E000
|
heap
|
page read and write
|
||
1FD4E946000
|
trusted library allocation
|
page read and write
|
||
256D906C000
|
heap
|
page read and write
|
||
1FD4804D000
|
heap
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD544F4000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD480D1000
|
heap
|
page read and write
|
||
1FD51E89000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD5AA8B000
|
trusted library allocation
|
page read and write
|
||
1FD5B748000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD529D5000
|
trusted library allocation
|
page read and write
|
||
1FD51EB5000
|
trusted library allocation
|
page read and write
|
||
1FD55157000
|
trusted library allocation
|
page read and write
|
||
1FD590BC000
|
trusted library allocation
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD51ABE000
|
trusted library allocation
|
page read and write
|
||
1141F8D0000
|
heap
|
page read and write
|
||
1FD52EF4000
|
trusted library allocation
|
page read and write
|
||
256D904D000
|
heap
|
page read and write
|
||
1FD52EF4000
|
trusted library allocation
|
page read and write
|
||
1FD512BA000
|
trusted library allocation
|
page read and write
|
||
1141FA0C000
|
trusted library allocation
|
page read and write
|
||
1FD48077000
|
heap
|
page read and write
|
||
1FD54599000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD4FA74000
|
trusted library allocation
|
page read and write
|
||
1FD58EC7000
|
trusted library allocation
|
page read and write
|
||
1FD52E57000
|
trusted library allocation
|
page read and write
|
||
1FD5D16D000
|
trusted library allocation
|
page read and write
|
||
1141F73B000
|
remote allocation
|
page execute read
|
||
1FD4FACB000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD50D14000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD51EB9000
|
trusted library allocation
|
page read and write
|
||
1FD51EAE000
|
trusted library allocation
|
page read and write
|
||
1FD51AEC000
|
trusted library allocation
|
page read and write
|
||
1141FAA2000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD58ED1000
|
trusted library allocation
|
page read and write
|
||
1FD50D09000
|
heap
|
page read and write
|
||
1FD51AC7000
|
trusted library allocation
|
page read and write
|
||
19B92455000
|
heap
|
page read and write
|
||
1FD4805D000
|
heap
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
19B9086A000
|
heap
|
page read and write
|
||
1FD4807E000
|
heap
|
page read and write
|
||
1FD4E933000
|
trusted library allocation
|
page read and write
|
||
1FD535D0000
|
trusted library allocation
|
page read and write
|
||
256D90E3000
|
heap
|
page read and write
|
||
1FD531EB000
|
trusted library allocation
|
page read and write
|
||
1FD52EFC000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD526C3000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1141FC70000
|
unclassified section
|
page readonly
|
||
1141FAB2000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD52FBD000
|
trusted library allocation
|
page read and write
|
||
1FD52ECB000
|
trusted library allocation
|
page read and write
|
||
1FD51895000
|
trusted library allocation
|
page read and write
|
||
1FD58F16000
|
trusted library allocation
|
page read and write
|
||
1FD5B74D000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD52633000
|
trusted library allocation
|
page read and write
|
||
1FD5D45C000
|
trusted library allocation
|
page read and write
|
||
1FD52A20000
|
trusted library allocation
|
page read and write
|
||
1FD526AD000
|
trusted library allocation
|
page read and write
|
||
1FD59255000
|
trusted library allocation
|
page read and write
|
||
1FD48051000
|
heap
|
page read and write
|
||
1FD52EC8000
|
trusted library allocation
|
page read and write
|
||
1FD5D49F000
|
trusted library allocation
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD480BC000
|
heap
|
page read and write
|
||
1FD594EF000
|
trusted library allocation
|
page read and write
|
||
1FD51AEA000
|
trusted library allocation
|
page read and write
|
||
1FD52DED000
|
trusted library allocation
|
page read and write
|
||
1FD51578000
|
trusted library allocation
|
page read and write
|
||
1FD52D1F000
|
trusted library allocation
|
page read and write
|
||
1FD50D08000
|
heap
|
page read and write
|
||
1FD4E36E000
|
trusted library allocation
|
page read and write
|
||
1FD51ECB000
|
trusted library allocation
|
page read and write
|
||
1FD5243A000
|
trusted library allocation
|
page read and write
|
||
256D90E0000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5512C000
|
trusted library allocation
|
page read and write
|
||
1FD51A98000
|
trusted library allocation
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD548DD000
|
trusted library allocation
|
page read and write
|
||
1FD54A69000
|
trusted library allocation
|
page read and write
|
||
1FD48053000
|
heap
|
page read and write
|
||
1FD52D90000
|
trusted library allocation
|
page read and write
|
||
1FD52E73000
|
trusted library allocation
|
page read and write
|
||
1FD4E08C000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD52D90000
|
trusted library allocation
|
page read and write
|
||
1FD4806B000
|
heap
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1141FA76000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD524B9000
|
trusted library allocation
|
page read and write
|
||
1FD4F38C000
|
trusted library allocation
|
page read and write
|
||
1FD515A4000
|
trusted library allocation
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1141FB20000
|
unclassified section
|
page read and write
|
||
1FD5261F000
|
trusted library allocation
|
page read and write
|
||
1FD52CFD000
|
trusted library allocation
|
page read and write
|
||
1FD5512E000
|
trusted library allocation
|
page read and write
|
||
166BC832000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD50D0F000
|
heap
|
page read and write
|
||
1FD4FAC0000
|
trusted library allocation
|
page read and write
|
||
1FD59160000
|
trusted library allocation
|
page read and write
|
||
1001FE000
|
unkown
|
page readonly
|
||
1FD52586000
|
trusted library allocation
|
page read and write
|
||
1FD52416000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD48050000
|
heap
|
page read and write
|
||
1FD48051000
|
heap
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD51AD2000
|
trusted library allocation
|
page read and write
|
||
6DC000
|
unkown
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD544C3000
|
trusted library allocation
|
page read and write
|
||
1FD50CE6000
|
heap
|
page read and write
|
||
1FD4FA7F000
|
trusted library allocation
|
page read and write
|
||
1FD480E4000
|
heap
|
page read and write
|
||
1FD5AA34000
|
trusted library allocation
|
page read and write
|
||
1FD591B3000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD52EFC000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD51532000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD52E44000
|
trusted library allocation
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD5D460000
|
trusted library allocation
|
page read and write
|
||
1FD5922E000
|
trusted library allocation
|
page read and write
|
||
1FD526B2000
|
trusted library allocation
|
page read and write
|
||
256D8E60000
|
unkown
|
page execute read
|
||
1FD523BE000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD5AA9B000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD48079000
|
heap
|
page read and write
|
||
1FD52D8E000
|
trusted library allocation
|
page read and write
|
||
1FD530CB000
|
trusted library allocation
|
page read and write
|
||
1FD526BB000
|
trusted library allocation
|
page read and write
|
||
1FD533A4000
|
trusted library allocation
|
page read and write
|
||
1FD59433000
|
trusted library allocation
|
page read and write
|
||
1FD5D1C4000
|
trusted library allocation
|
page read and write
|
||
1FD535CA000
|
trusted library allocation
|
page read and write
|
||
1FD51EB7000
|
trusted library allocation
|
page read and write
|
||
1FD535B4000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4FAE2000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD4E872000
|
trusted library allocation
|
page read and write
|
||
1FD52DE4000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD51A6B000
|
trusted library allocation
|
page read and write
|
||
1FD548A2000
|
trusted library allocation
|
page read and write
|
||
1FD52EFC000
|
trusted library allocation
|
page read and write
|
||
1FD58FDC000
|
trusted library allocation
|
page read and write
|
||
166BC350000
|
heap
|
page read and write
|
||
1FD52DF6000
|
trusted library allocation
|
page read and write
|
||
1FD5931C000
|
trusted library allocation
|
page read and write
|
||
1FD5240A000
|
trusted library allocation
|
page read and write
|
||
1FD59569000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5AAAF000
|
trusted library allocation
|
page read and write
|
||
19B92457000
|
heap
|
page read and write
|
||
1FD48092000
|
heap
|
page read and write
|
||
1FD4804D000
|
heap
|
page read and write
|
||
1FD52476000
|
trusted library allocation
|
page read and write
|
||
256D9001000
|
heap
|
page read and write
|
||
1FD52CF2000
|
trusted library allocation
|
page read and write
|
||
1FD5B833000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD52D40000
|
trusted library allocation
|
page read and write
|
||
1FD4D126000
|
trusted library allocation
|
page read and write
|
||
1FD480C2000
|
heap
|
page read and write
|
||
1FD52D2B000
|
trusted library allocation
|
page read and write
|
||
1FD4FA70000
|
trusted library allocation
|
page read and write
|
||
1FD5D42C000
|
trusted library allocation
|
page read and write
|
||
1FD595AD000
|
trusted library allocation
|
page read and write
|
||
1FD5265F000
|
trusted library allocation
|
page read and write
|
||
1FD4807E000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD5ABCF000
|
trusted library allocation
|
page read and write
|
||
1FD4F3CF000
|
trusted library allocation
|
page read and write
|
||
1FD48057000
|
heap
|
page read and write
|
||
1FD59160000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD53982000
|
trusted library allocation
|
page read and write
|
||
1FD58E9C000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD52C7A000
|
trusted library allocation
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD52A0D000
|
trusted library allocation
|
page read and write
|
||
1FD52DF0000
|
trusted library allocation
|
page read and write
|
||
1FD527F1000
|
trusted library allocation
|
page read and write
|
||
1FD52D78000
|
trusted library allocation
|
page read and write
|
||
1FD48099000
|
heap
|
page read and write
|
||
256D906C000
|
heap
|
page read and write
|
||
1FD50D0A000
|
heap
|
page read and write
|
||
1FD54C6D000
|
trusted library allocation
|
page read and write
|
||
1FD59177000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD58FA4000
|
trusted library allocation
|
page read and write
|
||
1FD50D24000
|
heap
|
page read and write
|
||
1FD5261F000
|
trusted library allocation
|
page read and write
|
||
1FD5D1FA000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
1FD52DC3000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD52672000
|
trusted library allocation
|
page read and write
|
||
1FD5243A000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD51558000
|
trusted library allocation
|
page read and write
|
||
1FD52DED000
|
trusted library allocation
|
page read and write
|
||
1FD52EFA000
|
trusted library allocation
|
page read and write
|
||
1FD543DC000
|
trusted library allocation
|
page read and write
|
||
1FD59167000
|
trusted library allocation
|
page read and write
|
||
1FD523FB000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD54FA2000
|
trusted library allocation
|
page read and write
|
||
1FD52DF8000
|
trusted library allocation
|
page read and write
|
||
1FD52E73000
|
trusted library allocation
|
page read and write
|
||
1FD51AB8000
|
trusted library allocation
|
page read and write
|
||
1FD58EC1000
|
trusted library allocation
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD52DED000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD4F3A6000
|
trusted library allocation
|
page read and write
|
||
1FD59145000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD5AF39000
|
trusted library allocation
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD51E6D000
|
trusted library allocation
|
page read and write
|
||
1FD5B806000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4FAD1000
|
trusted library allocation
|
page read and write
|
||
1FD4FA3C000
|
trusted library allocation
|
page read and write
|
||
1FD592B9000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD525B3000
|
trusted library allocation
|
page read and write
|
||
1141FA13000
|
trusted library allocation
|
page read and write
|
||
1FD4807F000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD48038000
|
heap
|
page read and write
|
||
19B92447000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52463000
|
trusted library allocation
|
page read and write
|
||
1FD52A92000
|
trusted library allocation
|
page read and write
|
||
1FD4E21A000
|
trusted library allocation
|
page read and write
|
||
1FD52433000
|
trusted library allocation
|
page read and write
|
||
256D89A0000
|
heap
|
page read and write
|
||
1FD5484C000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD55043000
|
trusted library allocation
|
page read and write
|
||
1FD54AF4000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD5D4B4000
|
trusted library allocation
|
page read and write
|
||
1FD52A92000
|
trusted library allocation
|
page read and write
|
||
1FD51E58000
|
trusted library allocation
|
page read and write
|
||
1FD4FABF000
|
trusted library allocation
|
page read and write
|
||
1FD51556000
|
trusted library allocation
|
page read and write
|
||
1FD5152D000
|
trusted library allocation
|
page read and write
|
||
256D8474000
|
trusted library allocation
|
page read and write
|
||
256D90A8000
|
heap
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD58F3C000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
256D90E9000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD50CE6000
|
heap
|
page read and write
|
||
1FD59505000
|
trusted library allocation
|
page read and write
|
||
1FD5D460000
|
trusted library allocation
|
page read and write
|
||
1FD593F5000
|
trusted library allocation
|
page read and write
|
||
1FD4FAF6000
|
trusted library allocation
|
page read and write
|
||
1FD5AAD5000
|
trusted library allocation
|
page read and write
|
||
1FD58EC1000
|
trusted library allocation
|
page read and write
|
||
1FD51ABE000
|
trusted library allocation
|
page read and write
|
||
1FD4E0F0000
|
trusted library allocation
|
page read and write
|
||
1FD5B857000
|
trusted library allocation
|
page read and write
|
||
256D9169000
|
heap
|
page read and write
|
||
1FD52C4B000
|
trusted library allocation
|
page read and write
|
||
13267DE000
|
unkown
|
page readonly
|
||
1FD4F37D000
|
trusted library allocation
|
page read and write
|
||
1FD5AAF4000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD52EF4000
|
trusted library allocation
|
page read and write
|
||
256D90E0000
|
heap
|
page read and write
|
||
1FD58F82000
|
trusted library allocation
|
page read and write
|
||
1FD50D02000
|
heap
|
page read and write
|
||
1FD54AD4000
|
trusted library allocation
|
page read and write
|
||
1FD52DB6000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD51E89000
|
trusted library allocation
|
page read and write
|
||
1FD53281000
|
trusted library allocation
|
page read and write
|
||
166BC66E000
|
trusted library allocation
|
page read and write
|
||
1FD4D1FA000
|
trusted library allocation
|
page read and write
|
||
1FD52D40000
|
trusted library allocation
|
page read and write
|
||
1FD545FA000
|
trusted library allocation
|
page read and write
|
||
1FD51ED5000
|
trusted library allocation
|
page read and write
|
||
1FD5262B000
|
trusted library allocation
|
page read and write
|
||
1141FAF6000
|
trusted library allocation
|
page read and write
|
||
166BC805000
|
trusted library allocation
|
page read and write
|
||
256D9169000
|
heap
|
page read and write
|
||
1FD523F0000
|
trusted library allocation
|
page read and write
|
||
1FD528CD000
|
trusted library allocation
|
page read and write
|
||
1FD51833000
|
trusted library allocation
|
page read and write
|
||
1FD4804D000
|
heap
|
page read and write
|
||
1FD52EFC000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD54AEB000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD50E69000
|
trusted library allocation
|
page read and write
|
||
1FD52DED000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52E63000
|
trusted library allocation
|
page read and write
|
||
1FD52E6A000
|
trusted library allocation
|
page read and write
|
||
1FD52C4B000
|
trusted library allocation
|
page read and write
|
||
1FD52C74000
|
trusted library allocation
|
page read and write
|
||
1FD58EE3000
|
trusted library allocation
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD539AA000
|
trusted library allocation
|
page read and write
|
||
1FD59334000
|
trusted library allocation
|
page read and write
|
||
1FD51528000
|
trusted library allocation
|
page read and write
|
||
1FD4D071000
|
trusted library allocation
|
page read and write
|
||
1FD50ECD000
|
trusted library allocation
|
page read and write
|
||
1FD5D5F6000
|
trusted library allocation
|
page read and write
|
||
1FD50D12000
|
heap
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD51EB5000
|
trusted library allocation
|
page read and write
|
||
1FD52EE2000
|
trusted library allocation
|
page read and write
|
||
256D9158000
|
heap
|
page read and write
|
||
1FD58EC7000
|
trusted library allocation
|
page read and write
|
||
1FD5D1ED000
|
trusted library allocation
|
page read and write
|
||
1FD58EB8000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD5D4F4000
|
trusted library allocation
|
page read and write
|
||
1FD52DF0000
|
trusted library allocation
|
page read and write
|
||
1FD51ED5000
|
trusted library allocation
|
page read and write
|
||
1FD590CF000
|
trusted library allocation
|
page read and write
|
||
1FD593B8000
|
trusted library allocation
|
page read and write
|
||
1FD5918B000
|
trusted library allocation
|
page read and write
|
||
1FD52C33000
|
trusted library allocation
|
page read and write
|
||
1FD51A5D000
|
trusted library allocation
|
page read and write
|
||
1FD58F5F000
|
trusted library allocation
|
page read and write
|
||
1FD4E03C000
|
trusted library allocation
|
page read and write
|
||
1FD539D3000
|
trusted library allocation
|
page read and write
|
||
1FD52EEA000
|
trusted library allocation
|
page read and write
|
||
1FD54838000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4E3F6000
|
trusted library allocation
|
page read and write
|
||
1FD4F3A6000
|
trusted library allocation
|
page read and write
|
||
1FD51A90000
|
trusted library allocation
|
page read and write
|
||
256D912A000
|
heap
|
page read and write
|
||
1FD54443000
|
trusted library allocation
|
page read and write
|
||
1FD532AE000
|
trusted library allocation
|
page read and write
|
||
1FD51A27000
|
trusted library allocation
|
page read and write
|
||
1FD51E53000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD5303D000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD51A68000
|
trusted library allocation
|
page read and write
|
||
1FD5500C000
|
trusted library allocation
|
page read and write
|
||
1FD48094000
|
heap
|
page read and write
|
||
1FD50D02000
|
heap
|
page read and write
|
||
1FD547A8000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
256D907F000
|
heap
|
page read and write
|
||
1FD58F55000
|
trusted library allocation
|
page read and write
|
||
1FD52469000
|
trusted library allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD52DEA000
|
trusted library allocation
|
page read and write
|
||
1FD51EDC000
|
trusted library allocation
|
page read and write
|
||
1FD480DB000
|
heap
|
page read and write
|
||
1FD5D421000
|
trusted library allocation
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
1FD52569000
|
trusted library allocation
|
page read and write
|
||
1FD545CF000
|
trusted library allocation
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
1FD58FCF000
|
trusted library allocation
|
page read and write
|
||
C87AFFE000
|
stack
|
page read and write
|
||
1FD52E22000
|
trusted library allocation
|
page read and write
|
||
1FD52D97000
|
trusted library allocation
|
page read and write
|
||
1FD535D0000
|
trusted library allocation
|
page read and write
|
||
1FD4E3B0000
|
trusted library allocation
|
page read and write
|
||
1FD52ECB000
|
trusted library allocation
|
page read and write
|
||
1FD5AA59000
|
trusted library allocation
|
page read and write
|
||
1FD5D48F000
|
trusted library allocation
|
page read and write
|
||
1FD5D626000
|
heap
|
page read and write
|
||
256D90F2000
|
heap
|
page read and write
|
||
21DD080A000
|
trusted library allocation
|
page read and write
|
||
1FD51ACD000
|
trusted library allocation
|
page read and write
|
||
1FD52DBA000
|
trusted library allocation
|
page read and write
|
||
1FD4E96B000
|
trusted library allocation
|
page read and write
|
||
1FD5D671000
|
heap
|
page read and write
|
||
1FD50D03000
|
heap
|
page read and write
|
||
1FD535B0000
|
trusted library allocation
|
page read and write
|
||
1FD52D51000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD544FB000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD4D1A3000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD591B1000
|
trusted library allocation
|
page read and write
|
||
1FD5910E000
|
trusted library allocation
|
page read and write
|
||
256D82B0000
|
heap
|
page read and write
|
||
1FD5CFB6000
|
trusted library allocation
|
page read and write
|
||
1FD48051000
|
heap
|
page read and write
|
||
1FD5D1E2000
|
trusted library allocation
|
page read and write
|
||
1FD534BD000
|
trusted library allocation
|
page read and write
|
||
1FD51E7C000
|
trusted library allocation
|
page read and write
|
||
1FD535F1000
|
trusted library allocation
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD59265000
|
trusted library allocation
|
page read and write
|
||
1FD48061000
|
heap
|
page read and write
|
||
256D80FD000
|
remote allocation
|
page execute read
|
||
1FD52D23000
|
trusted library allocation
|
page read and write
|
||
1FD4E3F8000
|
trusted library allocation
|
page read and write
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
1141F780000
|
heap
|
page read and write
|
||
1FD5D18C000
|
trusted library allocation
|
page read and write
|
||
1FD58FB0000
|
trusted library allocation
|
page read and write
|
||
1FD4808B000
|
heap
|
page read and write
|
||
1FD4FAD6000
|
trusted library allocation
|
page read and write
|
||
1FD59336000
|
trusted library allocation
|
page read and write
|
||
256D9179000
|
heap
|
page read and write
|
||
1FD5B7A3000
|
trusted library allocation
|
page read and write
|
||
1FD48051000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD58F32000
|
trusted library allocation
|
page read and write
|
||
1FD51AC7000
|
trusted library allocation
|
page read and write
|
||
256D8486000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD5D460000
|
trusted library allocation
|
page read and write
|
||
1FD52C7A000
|
trusted library allocation
|
page read and write
|
||
1FD524C4000
|
trusted library allocation
|
page read and write
|
||
1FD48045000
|
heap
|
page read and write
|
||
256D9177000
|
heap
|
page read and write
|
||
1FD52E1A000
|
trusted library allocation
|
page read and write
|
||
1FD5B6E5000
|
trusted library allocation
|
page read and write
|
||
1FD52A67000
|
trusted library allocation
|
page read and write
|
||
1FD5128B000
|
trusted library allocation
|
page read and write
|
||
1FD594E3000
|
trusted library allocation
|
page read and write
|
||
1FD5DD2E000
|
trusted library allocation
|
page read and write
|
||
1FD526A9000
|
trusted library allocation
|
page read and write
|
||
1FD51288000
|
trusted library allocation
|
page read and write
|
||
1FD58E9C000
|
trusted library allocation
|
page read and write
|
||
1FD5D250000
|
trusted library allocation
|
page read and write
|
||
1FD524A7000
|
trusted library allocation
|
page read and write
|
||
1FD528FD000
|
trusted library allocation
|
page read and write
|
||
1FD5D67E000
|
heap
|
page read and write
|
||
1FD4D1BE000
|
trusted library allocation
|
page read and write
|
||
CF2000
|
heap
|
page read and write
|
||
1FD4809A000
|
heap
|
page read and write
|
||
1FD50D09000
|
heap
|
page read and write
|
||
1FD58FFE000
|
trusted library allocation
|
page read and write
|
||
1FD4E962000
|
trusted library allocation
|
page read and write
|
||
1FD534CA000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD5ABEA000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD54433000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD51ECB000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD50D09000
|
heap
|
page read and write
|
||
256D9159000
|
heap
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD4FA79000
|
trusted library allocation
|
page read and write
|
||
1FD530FE000
|
trusted library allocation
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD5D506000
|
trusted library allocation
|
page read and write
|
||
1FD48050000
|
heap
|
page read and write
|
||
1FD55C02000
|
trusted library allocation
|
page read and write
|
||
1FD51AB3000
|
trusted library allocation
|
page read and write
|
||
166BC6E7000
|
trusted library allocation
|
page read and write
|
||
1FD594E9000
|
trusted library allocation
|
page read and write
|
||
1FD54599000
|
trusted library allocation
|
page read and write
|
||
1FD529C9000
|
trusted library allocation
|
page read and write
|
||
1FD58ED1000
|
trusted library allocation
|
page read and write
|
||
166BC6A8000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD54AC7000
|
trusted library allocation
|
page read and write
|
||
1FD5AF05000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD5506D000
|
trusted library allocation
|
page read and write
|
||
1FD51E8C000
|
trusted library allocation
|
page read and write
|
||
1FD51A82000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1141FA82000
|
trusted library allocation
|
page read and write
|
||
256D9121000
|
heap
|
page read and write
|
||
1FD5D406000
|
trusted library allocation
|
page read and write
|
||
1FD539FD000
|
trusted library allocation
|
page read and write
|
||
1FD52871000
|
trusted library allocation
|
page read and write
|
||
1FD54F84000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD51AF6000
|
trusted library allocation
|
page read and write
|
||
1141F760000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
1FD5154D000
|
trusted library allocation
|
page read and write
|
||
1FD595A6000
|
trusted library allocation
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
19B90800000
|
heap
|
page read and write
|
||
1FD54A75000
|
trusted library allocation
|
page read and write
|
||
1FD59135000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD5D133000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD52DED000
|
trusted library allocation
|
page read and write
|
||
1FD58EBC000
|
trusted library allocation
|
page read and write
|
||
1FD590D2000
|
trusted library allocation
|
page read and write
|
||
1FD52A8B000
|
trusted library allocation
|
page read and write
|
||
1FD51ACD000
|
trusted library allocation
|
page read and write
|
||
1FD51ECB000
|
trusted library allocation
|
page read and write
|
||
1FD539F0000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD59080000
|
trusted library allocation
|
page read and write
|
||
1FD595F5000
|
trusted library allocation
|
page read and write
|
||
1FD592E0000
|
trusted library allocation
|
page read and write
|
||
1FD5DF2F000
|
trusted library allocation
|
page read and write
|
||
1FD5D1BC000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD58E9C000
|
trusted library allocation
|
page read and write
|
||
1FD52DD6000
|
trusted library allocation
|
page read and write
|
||
1FD52D19000
|
trusted library allocation
|
page read and write
|
||
1FD4D1FA000
|
trusted library allocation
|
page read and write
|
||
1FD5949E000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
166BC7A6000
|
heap
|
page read and write
|
||
1FD52633000
|
trusted library allocation
|
page read and write
|
||
1FD5B743000
|
trusted library allocation
|
page read and write
|
||
1FD52C7A000
|
trusted library allocation
|
page read and write
|
||
256D908A000
|
heap
|
page read and write
|
||
1FD48099000
|
heap
|
page read and write
|
||
1FD4E2AC000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD59198000
|
trusted library allocation
|
page read and write
|
||
1FD52EFA000
|
trusted library allocation
|
page read and write
|
||
256D912A000
|
heap
|
page read and write
|
||
1FD5DD1E000
|
trusted library allocation
|
page read and write
|
||
1FD4E98E000
|
trusted library allocation
|
page read and write
|
||
1FD590CF000
|
trusted library allocation
|
page read and write
|
||
1FD534C4000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52EF8000
|
trusted library allocation
|
page read and write
|
||
1FD52EF7000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD52459000
|
trusted library allocation
|
page read and write
|
||
1FD52FF6000
|
trusted library allocation
|
page read and write
|
||
21DD0700000
|
trusted library allocation
|
page read and write
|
||
1FD4E9F5000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD5DD34000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD5AFE6000
|
trusted library allocation
|
page read and write
|
||
1141FA5D000
|
trusted library allocation
|
page read and write
|
||
1FD51EF1000
|
trusted library allocation
|
page read and write
|
||
256D82FF000
|
unclassified section
|
page read and write
|
||
1FD4CAEF000
|
trusted library allocation
|
page read and write
|
||
1FD4F3CF000
|
trusted library allocation
|
page read and write
|
||
1FD50D03000
|
heap
|
page read and write
|
||
1FD5CFC8000
|
trusted library allocation
|
page read and write
|
||
1FD52A55000
|
trusted library allocation
|
page read and write
|
||
1FD550A7000
|
trusted library allocation
|
page read and write
|
||
1FD533C9000
|
trusted library allocation
|
page read and write
|
||
1FD512AD000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
10007E000
|
unkown
|
page readonly
|
||
1FD4805C000
|
heap
|
page read and write
|
||
256D90E6000
|
heap
|
page read and write
|
||
1FD4E8C8000
|
trusted library allocation
|
page read and write
|
||
1FD58F8C000
|
trusted library allocation
|
page read and write
|
||
1FD5D1FE000
|
trusted library allocation
|
page read and write
|
||
1FD48094000
|
heap
|
page read and write
|
||
1FD51EA6000
|
trusted library allocation
|
page read and write
|
||
1FD4FAF9000
|
trusted library allocation
|
page read and write
|
||
1FD52E52000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD5D192000
|
trusted library allocation
|
page read and write
|
||
1FD52C53000
|
trusted library allocation
|
page read and write
|
||
1FD5245B000
|
trusted library allocation
|
page read and write
|
||
1FD5B833000
|
trusted library allocation
|
page read and write
|
||
1328A7E000
|
unkown
|
page readonly
|
||
256D908D000
|
heap
|
page read and write
|
||
1FD52EB0000
|
trusted library allocation
|
page read and write
|
||
1FD50D2A000
|
heap
|
page read and write
|
||
1FD5D292000
|
trusted library allocation
|
page read and write
|
||
1FD4804D000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD51EF8000
|
trusted library allocation
|
page read and write
|
||
1FD480BD000
|
heap
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD524C4000
|
trusted library allocation
|
page read and write
|
||
1FD5ABE8000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD534F1000
|
trusted library allocation
|
page read and write
|
||
DEFDCF1000
|
trusted library allocation
|
page execute read
|
||
1141FA0E000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD523F9000
|
trusted library allocation
|
page read and write
|
||
C87B8FE000
|
unkown
|
page readonly
|
||
1FD4805B000
|
heap
|
page read and write
|
||
19B92610000
|
heap
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD52CF9000
|
trusted library allocation
|
page read and write
|
||
1FD590B1000
|
trusted library allocation
|
page read and write
|
||
1FD54AFB000
|
trusted library allocation
|
page read and write
|
||
1FD4E862000
|
trusted library allocation
|
page read and write
|
||
1FD51ED5000
|
trusted library allocation
|
page read and write
|
||
1FD524C3000
|
trusted library allocation
|
page read and write
|
||
1141F8E0000
|
heap
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD5AA80000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD4805D000
|
heap
|
page read and write
|
||
1FD4FA7A000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
1FD51EDC000
|
trusted library allocation
|
page read and write
|
||
1FD52CA8000
|
trusted library allocation
|
page read and write
|
||
1FD5243A000
|
trusted library allocation
|
page read and write
|
||
1FD5B7AC000
|
trusted library allocation
|
page read and write
|
||
1FD548F5000
|
trusted library allocation
|
page read and write
|
||
1FD5B82C000
|
trusted library allocation
|
page read and write
|
||
256D9177000
|
heap
|
page read and write
|
||
1FD50E95000
|
trusted library allocation
|
page read and write
|
||
1FD5AF31000
|
trusted library allocation
|
page read and write
|
||
1FD51A68000
|
trusted library allocation
|
page read and write
|
||
1FD58F3D000
|
trusted library allocation
|
page read and write
|
||
1FD535B4000
|
trusted library allocation
|
page read and write
|
||
1FD50E75000
|
trusted library allocation
|
page read and write
|
||
21DD0670000
|
heap
|
page read and write
|
||
1FD52DFE000
|
trusted library allocation
|
page read and write
|
||
1FD52452000
|
trusted library allocation
|
page read and write
|
||
1FD50EB8000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD4E91B000
|
trusted library allocation
|
page read and write
|
||
1FD51AB2000
|
trusted library allocation
|
page read and write
|
||
1141FA00000
|
trusted library allocation
|
page read and write
|
||
256D82F0000
|
unclassified section
|
page read and write
|
||
1FD5AA52000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD5AAED000
|
trusted library allocation
|
page read and write
|
||
1FD51A82000
|
trusted library allocation
|
page read and write
|
||
1FD52EFA000
|
trusted library allocation
|
page read and write
|
||
1FD55007000
|
trusted library allocation
|
page read and write
|
||
1FD48075000
|
heap
|
page read and write
|
||
1FD58FB7000
|
trusted library allocation
|
page read and write
|
||
1FD51EB5000
|
trusted library allocation
|
page read and write
|
||
1FD58EF7000
|
trusted library allocation
|
page read and write
|
||
166BC603000
|
trusted library allocation
|
page read and write
|
||
1FD528CD000
|
trusted library allocation
|
page read and write
|
||
1FD592A4000
|
trusted library allocation
|
page read and write
|
||
1FD54427000
|
trusted library allocation
|
page read and write
|
||
1FD595A6000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD5239D000
|
trusted library allocation
|
page read and write
|
||
256D84E9000
|
trusted library allocation
|
page read and write
|
||
1FD480D5000
|
heap
|
page read and write
|
||
1FD48050000
|
heap
|
page read and write
|
||
1FD4E8FE000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD4F33D000
|
trusted library allocation
|
page read and write
|
||
1FD524A5000
|
trusted library allocation
|
page read and write
|
||
1FD52E4C000
|
trusted library allocation
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD48094000
|
heap
|
page read and write
|
||
1FD51562000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
166BC81C000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD52A73000
|
trusted library allocation
|
page read and write
|
||
1FD5DF9E000
|
trusted library allocation
|
page read and write
|
||
1FD5B743000
|
trusted library allocation
|
page read and write
|
||
1FD4FA9F000
|
trusted library allocation
|
page read and write
|
||
1FD50ED9000
|
trusted library allocation
|
page read and write
|
||
1FD5B7A7000
|
trusted library allocation
|
page read and write
|
||
1FD51881000
|
trusted library allocation
|
page read and write
|
||
256D845F000
|
trusted library allocation
|
page read and write
|
||
256D82F2000
|
unclassified section
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD545FA000
|
trusted library allocation
|
page read and write
|
||
1FD59510000
|
trusted library allocation
|
page read and write
|
||
256D90EB000
|
heap
|
page read and write
|
||
1FD52DCA000
|
trusted library allocation
|
page read and write
|
||
1FD52442000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD591B3000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD4804D000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD5268C000
|
trusted library allocation
|
page read and write
|
||
1FD51EB5000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD593F3000
|
trusted library allocation
|
page read and write
|
||
166BC321000
|
remote allocation
|
page execute read
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD480E4000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD51E54000
|
trusted library allocation
|
page read and write
|
||
1FD529E1000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD590F9000
|
trusted library allocation
|
page read and write
|
||
1FD4FA48000
|
trusted library allocation
|
page read and write
|
||
1FD52D80000
|
trusted library allocation
|
page read and write
|
||
1FD535AE000
|
trusted library allocation
|
page read and write
|
||
1FD54F7F000
|
trusted library allocation
|
page read and write
|
||
256D90E6000
|
heap
|
page read and write
|
||
1FD58F5F000
|
trusted library allocation
|
page read and write
|
||
1141FB40000
|
heap
|
page read and write
|
||
1FD5ABCF000
|
trusted library allocation
|
page read and write
|
||
256D90FD000
|
heap
|
page read and write
|
||
1FD5918B000
|
trusted library allocation
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
1FD480BD000
|
heap
|
page read and write
|
||
1FD4D1B6000
|
trusted library allocation
|
page read and write
|
||
1FD480EA000
|
heap
|
page read and write
|
||
1FD5D180000
|
trusted library allocation
|
page read and write
|
||
1FD5D40F000
|
trusted library allocation
|
page read and write
|
||
1FD58EBC000
|
trusted library allocation
|
page read and write
|
||
1141FA66000
|
trusted library allocation
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
1FD5D636000
|
heap
|
page read and write
|
||
1FD48098000
|
heap
|
page read and write
|
||
1FD51ED5000
|
trusted library allocation
|
page read and write
|
||
1FD54555000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD480B2000
|
heap
|
page read and write
|
||
1FD59541000
|
trusted library allocation
|
page read and write
|
||
1000F8000
|
stack
|
page read and write
|
||
1FD545A7000
|
trusted library allocation
|
page read and write
|
||
21DD0630000
|
heap
|
page read and write
|
||
1FD548DD000
|
trusted library allocation
|
page read and write
|
||
1FD52D15000
|
trusted library allocation
|
page read and write
|
||
1FD535DA000
|
trusted library allocation
|
page read and write
|
||
1FD4FABB000
|
trusted library allocation
|
page read and write
|
||
1FD48050000
|
heap
|
page read and write
|
||
1FD51E7C000
|
trusted library allocation
|
page read and write
|
||
1FD592E1000
|
trusted library allocation
|
page read and write
|
||
1FD5E12E000
|
trusted library allocation
|
page read and write
|
||
1FD51A64000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD4F37F000
|
trusted library allocation
|
page read and write
|
||
1FD4FADA000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
166BC6C8000
|
trusted library allocation
|
page read and write
|
||
1FD5B7C5000
|
trusted library allocation
|
page read and write
|
||
1FD4E28B000
|
trusted library allocation
|
page read and write
|
||
1FD5923B000
|
trusted library allocation
|
page read and write
|
||
1FD53278000
|
trusted library allocation
|
page read and write
|
||
1FD54405000
|
trusted library allocation
|
page read and write
|
||
1FD4E33E000
|
trusted library allocation
|
page read and write
|
||
1FD4E30F000
|
trusted library allocation
|
page read and write
|
||
1FD5926C000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
256D90EB000
|
heap
|
page read and write
|
||
1FD5D4C9000
|
trusted library allocation
|
page read and write
|
||
1FD480D1000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD5249C000
|
trusted library allocation
|
page read and write
|
||
1FD5AA12000
|
trusted library allocation
|
page read and write
|
||
1FD52484000
|
trusted library allocation
|
page read and write
|
||
1FD5CFDF000
|
trusted library allocation
|
page read and write
|
||
1FD52572000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
19B90C90000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD51A66000
|
trusted library allocation
|
page read and write
|
||
1FD52AF4000
|
trusted library allocation
|
page read and write
|
||
1FD5D111000
|
trusted library allocation
|
page read and write
|
||
1FD59262000
|
trusted library allocation
|
page read and write
|
||
1FD51A6B000
|
trusted library allocation
|
page read and write
|
||
1FD512AE000
|
trusted library allocation
|
page read and write
|
||
1FD4F35D000
|
trusted library allocation
|
page read and write
|
||
1FD5D53B000
|
trusted library allocation
|
page read and write
|
||
1FD5926A000
|
trusted library allocation
|
page read and write
|
||
1FD51EDC000
|
trusted library allocation
|
page read and write
|
||
1FD50E91000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
100BD8000
|
stack
|
page read and write
|
||
1FD5B806000
|
trusted library allocation
|
page read and write
|
||
1FD48094000
|
heap
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD4F3CF000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD480D0000
|
heap
|
page read and write
|
||
1FD5267A000
|
trusted library allocation
|
page read and write
|
||
1FD52DE8000
|
trusted library allocation
|
page read and write
|
||
1FD4FA3E000
|
trusted library allocation
|
page read and write
|
||
1FD51865000
|
trusted library allocation
|
page read and write
|
||
1FD5954D000
|
trusted library allocation
|
page read and write
|
||
1FD535F6000
|
trusted library allocation
|
page read and write
|
||
1FD535DF000
|
trusted library allocation
|
page read and write
|
||
1FD52FF6000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD52D23000
|
trusted library allocation
|
page read and write
|
||
1FD5B741000
|
trusted library allocation
|
page read and write
|
||
1FD51EF1000
|
trusted library allocation
|
page read and write
|
||
256D907D000
|
heap
|
page read and write
|
||
1FD52C68000
|
trusted library allocation
|
page read and write
|
||
1FD544C7000
|
trusted library allocation
|
page read and write
|
||
1FD51207000
|
trusted library allocation
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
1FD5153C000
|
trusted library allocation
|
page read and write
|
||
1FD58FE3000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD51E67000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD5913E000
|
trusted library allocation
|
page read and write
|
||
1FD4F35E000
|
trusted library allocation
|
page read and write
|
||
1FD51E99000
|
trusted library allocation
|
page read and write
|
||
1FD4F38D000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD5182D000
|
trusted library allocation
|
page read and write
|
||
1FD52E16000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD53478000
|
trusted library allocation
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
1FD4E27E000
|
trusted library allocation
|
page read and write
|
||
1FD4E27B000
|
trusted library allocation
|
page read and write
|
||
C87B87E000
|
unkown
|
page readonly
|
||
1FD48099000
|
heap
|
page read and write
|
||
1FD594E9000
|
trusted library allocation
|
page read and write
|
||
1FD58F12000
|
trusted library allocation
|
page read and write
|
||
1FD5AFEC000
|
trusted library allocation
|
page read and write
|
||
1FD4804D000
|
heap
|
page read and write
|
||
1FD5184D000
|
trusted library allocation
|
page read and write
|
||
256D905C000
|
heap
|
page read and write
|
||
256D9121000
|
heap
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1001BE000
|
stack
|
page read and write
|
||
1FD50ED3000
|
trusted library allocation
|
page read and write
|
||
1FD51EC0000
|
trusted library allocation
|
page read and write
|
||
1FD5B705000
|
trusted library allocation
|
page read and write
|
||
1FD526FE000
|
trusted library allocation
|
page read and write
|
||
1FD51E72000
|
trusted library allocation
|
page read and write
|
||
1FD532E5000
|
trusted library allocation
|
page read and write
|
||
1FD592DC000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD539F2000
|
trusted library allocation
|
page read and write
|
||
1FD4E935000
|
trusted library allocation
|
page read and write
|
||
1FD52D2E000
|
trusted library allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD5D407000
|
trusted library allocation
|
page read and write
|
||
1FD52CEA000
|
trusted library allocation
|
page read and write
|
||
1FD48072000
|
heap
|
page read and write
|
||
1FD51EE3000
|
trusted library allocation
|
page read and write
|
||
1FD544D9000
|
trusted library allocation
|
page read and write
|
||
1FD52471000
|
trusted library allocation
|
page read and write
|
||
1FD52DCA000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD52CA8000
|
trusted library allocation
|
page read and write
|
||
1FD52EDA000
|
trusted library allocation
|
page read and write
|
||
1FD4D023000
|
trusted library allocation
|
page read and write
|
||
1FD4D0FE000
|
trusted library allocation
|
page read and write
|
||
1FD4E959000
|
trusted library allocation
|
page read and write
|
||
1FD5927B000
|
trusted library allocation
|
page read and write
|
||
1FD52A22000
|
trusted library allocation
|
page read and write
|
||
1FD4806B000
|
heap
|
page read and write
|
||
1FD52DBD000
|
trusted library allocation
|
page read and write
|
||
1FD52FA3000
|
trusted library allocation
|
page read and write
|
||
1FD53297000
|
trusted library allocation
|
page read and write
|
||
1FD52471000
|
trusted library allocation
|
page read and write
|
||
1141FA30000
|
trusted library allocation
|
page read and write
|
||
1FD539A4000
|
trusted library allocation
|
page read and write
|
||
1FD592A1000
|
trusted library allocation
|
page read and write
|
||
256D8100000
|
unclassified section
|
page readonly
|
||
1FD5D45E000
|
trusted library allocation
|
page read and write
|
||
1FD4F39F000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
1FD51EC4000
|
trusted library allocation
|
page read and write
|
||
4E6FDFD000
|
stack
|
page read and write
|
||
1FD550AC000
|
trusted library allocation
|
page read and write
|
||
1FD4D18D000
|
trusted library allocation
|
page read and write
|
||
1FD52D9A000
|
trusted library allocation
|
page read and write
|
||
256D90F1000
|
heap
|
page read and write
|
||
1FD544BC000
|
trusted library allocation
|
page read and write
|
||
1FD548CB000
|
trusted library allocation
|
page read and write
|
||
1FD58F1A000
|
trusted library allocation
|
page read and write
|
||
1FD59261000
|
trusted library allocation
|
page read and write
|
||
1FD5B7A3000
|
trusted library allocation
|
page read and write
|
||
1FD52E5F000
|
trusted library allocation
|
page read and write
|
||
1FD5ABEF000
|
trusted library allocation
|
page read and write
|
||
3FBDA8003000
|
trusted library allocation
|
page read and write
|
||
1FD4E0FD000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD593CF000
|
trusted library allocation
|
page read and write
|
||
1FD50D13000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD51EAE000
|
trusted library allocation
|
page read and write
|
||
1FD590A6000
|
trusted library allocation
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD4E990000
|
trusted library allocation
|
page read and write
|
||
1FD52FBD000
|
trusted library allocation
|
page read and write
|
||
1FD52D40000
|
trusted library allocation
|
page read and write
|
||
1FD51EAE000
|
trusted library allocation
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
256D842F000
|
trusted library allocation
|
page read and write
|
||
1FD529DD000
|
trusted library allocation
|
page read and write
|
||
1FD4806B000
|
heap
|
page read and write
|
||
1FD545E2000
|
trusted library allocation
|
page read and write
|
||
1FD592BE000
|
trusted library allocation
|
page read and write
|
||
1FD4FA88000
|
trusted library allocation
|
page read and write
|
||
1FD5CFB6000
|
trusted library allocation
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5445B000
|
trusted library allocation
|
page read and write
|
||
1FD51E26000
|
trusted library allocation
|
page read and write
|
||
1FD480BD000
|
heap
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD4D1C6000
|
trusted library allocation
|
page read and write
|
||
1FD5D21F000
|
trusted library allocation
|
page read and write
|
||
1FD4E863000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD591CB000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD52AF1000
|
trusted library allocation
|
page read and write
|
||
1FD4D1B6000
|
trusted library allocation
|
page read and write
|
||
1FD4E384000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD50EFE000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD48098000
|
heap
|
page read and write
|
||
1FD52D1F000
|
trusted library allocation
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
166BC905000
|
heap
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD5240F000
|
trusted library allocation
|
page read and write
|
||
1FD51ED5000
|
trusted library allocation
|
page read and write
|
||
1FD4E2BD000
|
trusted library allocation
|
page read and write
|
||
1FD51E62000
|
trusted library allocation
|
page read and write
|
||
1FD51EAB000
|
trusted library allocation
|
page read and write
|
||
1FD5313B000
|
trusted library allocation
|
page read and write
|
||
1FD52DCA000
|
trusted library allocation
|
page read and write
|
||
1FD590DA000
|
trusted library allocation
|
page read and write
|
||
1FD480BE000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD59593000
|
trusted library allocation
|
page read and write
|
||
1FD5B6A3000
|
trusted library allocation
|
page read and write
|
||
1FD5ABE8000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4E862000
|
trusted library allocation
|
page read and write
|
||
1FD4E316000
|
trusted library allocation
|
page read and write
|
||
1FD51AAA000
|
trusted library allocation
|
page read and write
|
||
1FD51875000
|
trusted library allocation
|
page read and write
|
||
1FD59436000
|
trusted library allocation
|
page read and write
|
||
256D8448000
|
trusted library allocation
|
page read and write
|
||
1FD4E3C7000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD480BD000
|
heap
|
page read and write
|
||
1FD51E8C000
|
trusted library allocation
|
page read and write
|
||
1FD4807E000
|
heap
|
page read and write
|
||
1FD51AC7000
|
trusted library allocation
|
page read and write
|
||
1FD50CE6000
|
heap
|
page read and write
|
||
1FD5D462000
|
trusted library allocation
|
page read and write
|
||
1FD4CAEF000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5959B000
|
trusted library allocation
|
page read and write
|
||
1FD4FA54000
|
trusted library allocation
|
page read and write
|
||
1FD52458000
|
trusted library allocation
|
page read and write
|
||
1FD527DF000
|
trusted library allocation
|
page read and write
|
||
1FD52452000
|
trusted library allocation
|
page read and write
|
||
1FD5D43C000
|
trusted library allocation
|
page read and write
|
||
1FD4FADA000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD590B1000
|
trusted library allocation
|
page read and write
|
||
166BC813000
|
trusted library allocation
|
page read and write
|
||
256D90E8000
|
heap
|
page read and write
|
||
1FD58FBF000
|
trusted library allocation
|
page read and write
|
||
3961000
|
heap
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD51E58000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD52FAE000
|
trusted library allocation
|
page read and write
|
||
1FD5D4B6000
|
trusted library allocation
|
page read and write
|
||
1FD4CAB3000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5B76D000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD5955E000
|
trusted library allocation
|
page read and write
|
||
1FD52E52000
|
trusted library allocation
|
page read and write
|
||
1FD52458000
|
trusted library allocation
|
page read and write
|
||
1FD4809A000
|
heap
|
page read and write
|
||
1FD5D421000
|
trusted library allocation
|
page read and write
|
||
1FD594A0000
|
trusted library allocation
|
page read and write
|
||
1FD51E8C000
|
trusted library allocation
|
page read and write
|
||
1FD5488E000
|
trusted library allocation
|
page read and write
|
||
1FD52A08000
|
trusted library allocation
|
page read and write
|
||
1FD52E57000
|
trusted library allocation
|
page read and write
|
||
1FD52A09000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD4806B000
|
heap
|
page read and write
|
||
1FD52E71000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD4E8DA000
|
trusted library allocation
|
page read and write
|
||
1FD5255D000
|
trusted library allocation
|
page read and write
|
||
1FD480B9000
|
heap
|
page read and write
|
||
1FD545B4000
|
trusted library allocation
|
page read and write
|
||
1FD52D9C000
|
trusted library allocation
|
page read and write
|
||
256D89B0000
|
heap
|
page read and write
|
||
1FD4E8C8000
|
trusted library allocation
|
page read and write
|
||
1FD52A50000
|
trusted library allocation
|
page read and write
|
||
1FD544A4000
|
trusted library allocation
|
page read and write
|
||
1FD52DF4000
|
trusted library allocation
|
page read and write
|
||
1FD545EE000
|
trusted library allocation
|
page read and write
|
||
1FD52E78000
|
trusted library allocation
|
page read and write
|
||
1FD52E78000
|
trusted library allocation
|
page read and write
|
||
1FD53961000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD51AD7000
|
trusted library allocation
|
page read and write
|
||
1FD544E2000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD5245F000
|
trusted library allocation
|
page read and write
|
||
1FD480BD000
|
heap
|
page read and write
|
||
1FD4809F000
|
heap
|
page read and write
|
||
1FD52A92000
|
trusted library allocation
|
page read and write
|
||
1FD58F30000
|
trusted library allocation
|
page read and write
|
||
1FD59255000
|
trusted library allocation
|
page read and write
|
||
1FD539A4000
|
trusted library allocation
|
page read and write
|
||
1FD51E89000
|
trusted library allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD51AE7000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD48045000
|
heap
|
page read and write
|
||
1FD5952E000
|
trusted library allocation
|
page read and write
|
||
2000003F000
|
trusted library allocation
|
page read and write
|
||
256D8468000
|
trusted library allocation
|
page read and write
|
||
1FD480BD000
|
heap
|
page read and write
|
||
1FD4806D000
|
heap
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD52DF4000
|
trusted library allocation
|
page read and write
|
||
1FD4D1BE000
|
trusted library allocation
|
page read and write
|
||
1FD51EC0000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4E3F6000
|
trusted library allocation
|
page read and write
|
||
1FD52456000
|
trusted library allocation
|
page read and write
|
||
1FD545FD000
|
trusted library allocation
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD5B82E000
|
trusted library allocation
|
page read and write
|
||
1141FA11000
|
trusted library allocation
|
page read and write
|
||
1FD5DD16000
|
trusted library allocation
|
page read and write
|
||
1FD548F3000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD480D1000
|
heap
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD53949000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD4FA9F000
|
trusted library allocation
|
page read and write
|
||
1FD52E5D000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
256D9060000
|
heap
|
page read and write
|
||
1FD51E81000
|
trusted library allocation
|
page read and write
|
||
1FD5959B000
|
trusted library allocation
|
page read and write
|
||
1FD5264F000
|
trusted library allocation
|
page read and write
|
||
1FD54FE5000
|
trusted library allocation
|
page read and write
|
||
1FD5946C000
|
trusted library allocation
|
page read and write
|
||
1FD4FA72000
|
trusted library allocation
|
page read and write
|
||
1FD5911D000
|
trusted library allocation
|
page read and write
|
||
1FD52E32000
|
trusted library allocation
|
page read and write
|
||
1FD48050000
|
heap
|
page read and write
|
||
1FD591CB000
|
trusted library allocation
|
page read and write
|
||
1FD4E389000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
1FD4E8CD000
|
trusted library allocation
|
page read and write
|
||
1FD5B7AC000
|
trusted library allocation
|
page read and write
|
||
1FD4D196000
|
trusted library allocation
|
page read and write
|
||
1FD4FABF000
|
trusted library allocation
|
page read and write
|
||
1FD52ECA000
|
trusted library allocation
|
page read and write
|
||
1FD535DF000
|
trusted library allocation
|
page read and write
|
||
256D82D0000
|
heap
|
page readonly
|
||
1FD4FAD6000
|
trusted library allocation
|
page read and write
|
||
1FD53000000
|
trusted library allocation
|
page read and write
|
||
1FD52D73000
|
trusted library allocation
|
page read and write
|
||
1FD52A32000
|
trusted library allocation
|
page read and write
|
||
1FD52873000
|
trusted library allocation
|
page read and write
|
||
1FD5DD25000
|
trusted library allocation
|
page read and write
|
||
1FD4FAB3000
|
trusted library allocation
|
page read and write
|
||
1FD523FD000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD590A6000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52DE4000
|
trusted library allocation
|
page read and write
|
||
1FD54AD6000
|
trusted library allocation
|
page read and write
|
||
1FD53271000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD50D5B000
|
heap
|
page read and write
|
||
1FD4FA74000
|
trusted library allocation
|
page read and write
|
||
1FD52DB6000
|
trusted library allocation
|
page read and write
|
||
1141FB10000
|
heap
|
page readonly
|
||
1FD50D24000
|
heap
|
page read and write
|
||
1FD48091000
|
heap
|
page read and write
|
||
1FD480B3000
|
heap
|
page read and write
|
||
1FD535B0000
|
trusted library allocation
|
page read and write
|
||
1FD515B3000
|
trusted library allocation
|
page read and write
|
||
1FD5B7E4000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD531F2000
|
trusted library allocation
|
page read and write
|
||
1FD5911E000
|
trusted library allocation
|
page read and write
|
||
1FD480B7000
|
heap
|
page read and write
|
||
1FD512E3000
|
trusted library allocation
|
page read and write
|
||
1FD52DED000
|
trusted library allocation
|
page read and write
|
||
1FD51AC7000
|
trusted library allocation
|
page read and write
|
||
1FD5AA5D000
|
trusted library allocation
|
page read and write
|
||
1FD59338000
|
trusted library allocation
|
page read and write
|
||
1FD52A55000
|
trusted library allocation
|
page read and write
|
||
1FD595F3000
|
trusted library allocation
|
page read and write
|
||
1FD5240C000
|
trusted library allocation
|
page read and write
|
||
1FD4D113000
|
trusted library allocation
|
page read and write
|
||
1FD4E375000
|
trusted library allocation
|
page read and write
|
||
1FD524C4000
|
trusted library allocation
|
page read and write
|
||
1FD5CFD3000
|
trusted library allocation
|
page read and write
|
||
1FD52E1A000
|
trusted library allocation
|
page read and write
|
||
1FD5D421000
|
trusted library allocation
|
page read and write
|
||
1FD4809A000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
1FD51EB5000
|
trusted library allocation
|
page read and write
|
||
1FD51AF6000
|
trusted library allocation
|
page read and write
|
||
1FD54AD2000
|
trusted library allocation
|
page read and write
|
||
1FD52DF6000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD524DA000
|
trusted library allocation
|
page read and write
|
||
166BC393000
|
heap
|
page read and write
|
||
19B9086A000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD52DDB000
|
trusted library allocation
|
page read and write
|
||
1FD512C2000
|
trusted library allocation
|
page read and write
|
||
1FD4FA68000
|
trusted library allocation
|
page read and write
|
||
1FD480BC000
|
heap
|
page read and write
|
||
1FD52EF4000
|
trusted library allocation
|
page read and write
|
||
1FD54415000
|
trusted library allocation
|
page read and write
|
||
1FD5D579000
|
trusted library allocation
|
page read and write
|
||
256D8400000
|
trusted library allocation
|
page read and write
|
||
1FD59263000
|
trusted library allocation
|
page read and write
|
||
1FD51AAF000
|
trusted library allocation
|
page read and write
|
||
166BC6CB000
|
trusted library allocation
|
page read and write
|
||
1FD532FA000
|
trusted library allocation
|
page read and write
|
||
1FD52AB3000
|
trusted library allocation
|
page read and write
|
||
1FD5183B000
|
trusted library allocation
|
page read and write
|
||
1FD4E3EB000
|
trusted library allocation
|
page read and write
|
||
1FD52DF0000
|
trusted library allocation
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD51A66000
|
trusted library allocation
|
page read and write
|
||
1FD539AA000
|
trusted library allocation
|
page read and write
|
||
1FD52ACF000
|
trusted library allocation
|
page read and write
|
||
1FD594DF000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD595A6000
|
trusted library allocation
|
page read and write
|
||
1FD535EB000
|
trusted library allocation
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
1FD5ABFB000
|
trusted library allocation
|
page read and write
|
||
1FD4F3A6000
|
trusted library allocation
|
page read and write
|
||
1FD59567000
|
trusted library allocation
|
page read and write
|
||
256D90FD000
|
heap
|
page read and write
|
||
1FD5D5FD000
|
trusted library allocation
|
page read and write
|
||
1FD5326E000
|
trusted library allocation
|
page read and write
|
||
1FD4E07C000
|
trusted library allocation
|
page read and write
|
||
1FD52D8B000
|
trusted library allocation
|
page read and write
|
||
1FD592CA000
|
trusted library allocation
|
page read and write
|
||
1FD539FD000
|
trusted library allocation
|
page read and write
|
||
1FD59019000
|
trusted library allocation
|
page read and write
|
||
1FD52A22000
|
trusted library allocation
|
page read and write
|
||
1FD52DED000
|
trusted library allocation
|
page read and write
|
||
1FD544D2000
|
trusted library allocation
|
page read and write
|
||
1FD51EAB000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
21DD0610000
|
heap
|
page read and write
|
||
1FD480D8000
|
heap
|
page read and write
|
||
1FD4FA79000
|
trusted library allocation
|
page read and write
|
||
1FD51250000
|
trusted library allocation
|
page read and write
|
||
1FD5B786000
|
trusted library allocation
|
page read and write
|
||
1FD4E969000
|
trusted library allocation
|
page read and write
|
||
1FD5AA79000
|
trusted library allocation
|
page read and write
|
||
1FD51A7B000
|
trusted library allocation
|
page read and write
|
||
1FD480DA000
|
heap
|
page read and write
|
||
1FD52A8B000
|
trusted library allocation
|
page read and write
|
||
1FD51A7F000
|
trusted library allocation
|
page read and write
|
||
1FD548AE000
|
trusted library allocation
|
page read and write
|
||
1FD51A92000
|
trusted library allocation
|
page read and write
|
||
1FD590AD000
|
trusted library allocation
|
page read and write
|
||
1FD51AF6000
|
trusted library allocation
|
page read and write
|
||
1FD5242B000
|
trusted library allocation
|
page read and write
|
||
1FD535CD000
|
trusted library allocation
|
page read and write
|
||
1FD5DFCE000
|
trusted library allocation
|
page read and write
|
||
1FD4E9F5000
|
trusted library allocation
|
page read and write
|
||
256D9169000
|
heap
|
page read and write
|
||
1FD52DA3000
|
trusted library allocation
|
page read and write
|
||
1FD590D8000
|
trusted library allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD58EB3000
|
trusted library allocation
|
page read and write
|
||
1FD4FA3C000
|
trusted library allocation
|
page read and write
|
||
1FD5CFAC000
|
trusted library allocation
|
page read and write
|
||
1FD4E038000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD59567000
|
trusted library allocation
|
page read and write
|
||
1FD52625000
|
trusted library allocation
|
page read and write
|
||
1FD4E435000
|
trusted library allocation
|
page read and write
|
||
1FD5D1C8000
|
trusted library allocation
|
page read and write
|
||
1FD5929C000
|
trusted library allocation
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD58F00000
|
trusted library allocation
|
page read and write
|
||
1FD480D0000
|
heap
|
page read and write
|
||
1FD4E0C0000
|
trusted library allocation
|
page read and write
|
||
1FD5264F000
|
trusted library allocation
|
page read and write
|
||
1FD4F3A6000
|
trusted library allocation
|
page read and write
|
||
10003D000
|
stack
|
page read and write
|
||
1FD4FA7C000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD5D190000
|
trusted library allocation
|
page read and write
|
||
1FD5488E000
|
trusted library allocation
|
page read and write
|
||
1FD50E3E000
|
trusted library allocation
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD5D1D1000
|
trusted library allocation
|
page read and write
|
||
1FD526E5000
|
trusted library allocation
|
page read and write
|
||
1FD51AF6000
|
trusted library allocation
|
page read and write
|
||
1FD523AA000
|
trusted library allocation
|
page read and write
|
||
1FD5D42C000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD48071000
|
heap
|
page read and write
|
||
1FD52469000
|
trusted library allocation
|
page read and write
|
||
1FD480B2000
|
heap
|
page read and write
|
||
1FD4D1BE000
|
trusted library allocation
|
page read and write
|
||
1FD52DC3000
|
trusted library allocation
|
page read and write
|
||
1FD5454B000
|
trusted library allocation
|
page read and write
|
||
1FD5E13F000
|
trusted library allocation
|
page read and write
|
||
1FD4F35A000
|
trusted library allocation
|
page read and write
|
||
1FD52D9C000
|
trusted library allocation
|
page read and write
|
||
1FD51ECB000
|
trusted library allocation
|
page read and write
|
||
1FD4E3EB000
|
trusted library allocation
|
page read and write
|
||
1FD5B687000
|
trusted library allocation
|
page read and write
|
||
1FD52EDA000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD51531000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD52EB8000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD5D5AF000
|
trusted library allocation
|
page read and write
|
||
1FD52DD4000
|
trusted library allocation
|
page read and write
|
||
1FD52407000
|
trusted library allocation
|
page read and write
|
||
1FD51EAE000
|
trusted library allocation
|
page read and write
|
||
1FD5B707000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD58EF3000
|
trusted library allocation
|
page read and write
|
||
1FD526A7000
|
trusted library allocation
|
page read and write
|
||
1FD53343000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
heap
|
page read and write
|
||
1FD5D48F000
|
trusted library allocation
|
page read and write
|
||
1FD4D11E000
|
trusted library allocation
|
page read and write
|
||
1FD52D40000
|
trusted library allocation
|
page read and write
|
||
1FD5B7A3000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
heap
|
page read and write
|
||
1FD54A75000
|
trusted library allocation
|
page read and write
|
||
1FD51E99000
|
trusted library allocation
|
page read and write
|
||
1FD594E7000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5D173000
|
trusted library allocation
|
page read and write
|
||
1FD518FB000
|
trusted library allocation
|
page read and write
|
||
256D815A000
|
heap
|
page read and write
|
||
1FD52460000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD480D9000
|
heap
|
page read and write
|
||
1FD51EC0000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD524F9000
|
trusted library allocation
|
page read and write
|
||
1FD48079000
|
heap
|
page read and write
|
||
1FD52490000
|
trusted library allocation
|
page read and write
|
||
1141FB44000
|
heap
|
page read and write
|
||
1FD4F39F000
|
trusted library allocation
|
page read and write
|
||
1FD52DF6000
|
trusted library allocation
|
page read and write
|
||
1FD4E9F5000
|
trusted library allocation
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD4E8D5000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD52A42000
|
trusted library allocation
|
page read and write
|
||
1FD51AC2000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD5D118000
|
trusted library allocation
|
page read and write
|
||
1FD5909F000
|
trusted library allocation
|
page read and write
|
||
1FD524EC000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52DD6000
|
trusted library allocation
|
page read and write
|
||
C87B83C000
|
stack
|
page read and write
|
||
1FD52AD1000
|
trusted library allocation
|
page read and write
|
||
1FD51E7F000
|
trusted library allocation
|
page read and write
|
||
1FD590F9000
|
trusted library allocation
|
page read and write
|
||
1FD4E34B000
|
trusted library allocation
|
page read and write
|
||
1FD52D91000
|
trusted library allocation
|
page read and write
|
||
1FD5DF6D000
|
trusted library allocation
|
page read and write
|
||
1329A7E000
|
unkown
|
page readonly
|
||
256D8AB0000
|
trusted library allocation
|
page read and write
|
||
10447E000
|
unkown
|
page readonly
|
||
1FD51E6A000
|
trusted library allocation
|
page read and write
|
||
1FD5485E000
|
trusted library allocation
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
166BC900000
|
heap
|
page read and write
|
||
1FD5B6E5000
|
trusted library allocation
|
page read and write
|
||
1FD4F37B000
|
trusted library allocation
|
page read and write
|
||
1FD5455B000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5ABED000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
4E705FE000
|
stack
|
page read and write
|
||
1FD52E3A000
|
trusted library allocation
|
page read and write
|
||
1FD5926A000
|
trusted library allocation
|
page read and write
|
||
1FD480D1000
|
heap
|
page read and write
|
||
1FD593CD000
|
trusted library allocation
|
page read and write
|
||
1FD52D71000
|
trusted library allocation
|
page read and write
|
||
1FD524DA000
|
trusted library allocation
|
page read and write
|
||
1FD52DBD000
|
trusted library allocation
|
page read and write
|
||
2810BFF000
|
stack
|
page read and write
|
||
256D9060000
|
heap
|
page read and write
|
||
1FD5459D000
|
trusted library allocation
|
page read and write
|
||
166BC600000
|
trusted library allocation
|
page read and write
|
||
1FD4FAAA000
|
trusted library allocation
|
page read and write
|
||
1FD4E3DF000
|
trusted library allocation
|
page read and write
|
||
1FD5B743000
|
trusted library allocation
|
page read and write
|
||
1FD51AC2000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
1FD4807C000
|
heap
|
page read and write
|
||
1FD5D5E2000
|
trusted library allocation
|
page read and write
|
||
256D8481000
|
trusted library allocation
|
page read and write
|
||
1FD4F3A6000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD4F38C000
|
trusted library allocation
|
page read and write
|
||
1FD591B1000
|
trusted library allocation
|
page read and write
|
||
1FD51EB7000
|
trusted library allocation
|
page read and write
|
||
1FD5E13F000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD48045000
|
heap
|
page read and write
|
||
1141FAB6000
|
trusted library allocation
|
page read and write
|
||
19B92440000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5D287000
|
trusted library allocation
|
page read and write
|
||
1FD4F39F000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD5959B000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD51EDE000
|
trusted library allocation
|
page read and write
|
||
1FD52FA3000
|
trusted library allocation
|
page read and write
|
||
1FD54AD2000
|
trusted library allocation
|
page read and write
|
||
1FD52D2D000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD52DF4000
|
trusted library allocation
|
page read and write
|
||
1FD545FD000
|
trusted library allocation
|
page read and write
|
||
1FD51A52000
|
trusted library allocation
|
page read and write
|
||
256D8461000
|
trusted library allocation
|
page read and write
|
||
1FD548D1000
|
trusted library allocation
|
page read and write
|
||
1FD52DDC000
|
trusted library allocation
|
page read and write
|
||
1FD59567000
|
trusted library allocation
|
page read and write
|
||
1FD48094000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5DD84000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
166BC815000
|
trusted library allocation
|
page read and write
|
||
1FD4D11B000
|
trusted library allocation
|
page read and write
|
||
1FD48034000
|
heap
|
page read and write
|
||
1FD52A6A000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD532E5000
|
trusted library allocation
|
page read and write
|
||
1FD5D5F6000
|
trusted library allocation
|
page read and write
|
||
1FD52EEA000
|
trusted library allocation
|
page read and write
|
||
1FD535F1000
|
trusted library allocation
|
page read and write
|
||
1FD51898000
|
trusted library allocation
|
page read and write
|
||
1FD58FD1000
|
trusted library allocation
|
page read and write
|
||
1FD59024000
|
trusted library allocation
|
page read and write
|
||
1FD53366000
|
trusted library allocation
|
page read and write
|
||
1FD51C16000
|
trusted library allocation
|
page read and write
|
||
1FD5254C000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD525D5000
|
trusted library allocation
|
page read and write
|
||
1FD4E8CA000
|
trusted library allocation
|
page read and write
|
||
1FD5B82C000
|
trusted library allocation
|
page read and write
|
||
1FD53256000
|
trusted library allocation
|
page read and write
|
||
1FD5DD9C000
|
trusted library allocation
|
page read and write
|
||
256D8150000
|
heap
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD59267000
|
trusted library allocation
|
page read and write
|
||
1FD52D42000
|
trusted library allocation
|
page read and write
|
||
256D8E30000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5DFF1000
|
trusted library allocation
|
page read and write
|
||
1FD5D1F3000
|
trusted library allocation
|
page read and write
|
||
1FD544E7000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
13271D8000
|
stack
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD518A0000
|
trusted library allocation
|
page read and write
|
||
1FD50D03000
|
heap
|
page read and write
|
||
256D84BC000
|
trusted library allocation
|
page read and write
|
||
1FD51E2A000
|
trusted library allocation
|
page read and write
|
||
19B90868000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD50E2A000
|
trusted library allocation
|
page read and write
|
||
1FD5267A000
|
trusted library allocation
|
page read and write
|
||
1FD4E0E0000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5AAC9000
|
trusted library allocation
|
page read and write
|
||
1FD5245B000
|
trusted library allocation
|
page read and write
|
||
1CBE000
|
stack
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD5B6C8000
|
trusted library allocation
|
page read and write
|
||
1FD58F77000
|
trusted library allocation
|
page read and write
|
||
1FD5ABEA000
|
trusted library allocation
|
page read and write
|
||
1FD591B3000
|
trusted library allocation
|
page read and write
|
||
1FD51EDE000
|
trusted library allocation
|
page read and write
|
||
1141FA70000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD52597000
|
trusted library allocation
|
page read and write
|
||
1FD548D1000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52408000
|
trusted library allocation
|
page read and write
|
||
1FD52E44000
|
trusted library allocation
|
page read and write
|
||
1FD59125000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52494000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD50E38000
|
trusted library allocation
|
page read and write
|
||
1FD5D435000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD5D26E000
|
trusted library allocation
|
page read and write
|
||
1FD51E89000
|
trusted library allocation
|
page read and write
|
||
1FD548A1000
|
trusted library allocation
|
page read and write
|
||
166BC800000
|
trusted library allocation
|
page read and write
|
||
1FD53457000
|
trusted library allocation
|
page read and write
|
||
1FD4806B000
|
heap
|
page read and write
|
||
1FD51AB2000
|
trusted library allocation
|
page read and write
|
||
1FD51A7D000
|
trusted library allocation
|
page read and write
|
||
1FD50D02000
|
heap
|
page read and write
|
||
1FD4D17E000
|
trusted library allocation
|
page read and write
|
||
4E6F5FA000
|
stack
|
page read and write
|
||
1FD51AEF000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD5B74D000
|
trusted library allocation
|
page read and write
|
||
1FD52D96000
|
trusted library allocation
|
page read and write
|
||
1FD4E99D000
|
trusted library allocation
|
page read and write
|
||
1FD4E064000
|
trusted library allocation
|
page read and write
|
||
1FD4E39D000
|
trusted library allocation
|
page read and write
|
||
1FD5D435000
|
trusted library allocation
|
page read and write
|
||
1FD4E3B3000
|
trusted library allocation
|
page read and write
|
||
1FD52CA8000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD4FADA000
|
trusted library allocation
|
page read and write
|
||
1FD58F39000
|
trusted library allocation
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD4807F000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD54CF1000
|
trusted library allocation
|
page read and write
|
||
1FD4809A000
|
heap
|
page read and write
|
||
1FD52CF9000
|
trusted library allocation
|
page read and write
|
||
1FD51EBC000
|
trusted library allocation
|
page read and write
|
||
1FD5ABA2000
|
trusted library allocation
|
page read and write
|
||
166BC80C000
|
trusted library allocation
|
page read and write
|
||
1FD53452000
|
trusted library allocation
|
page read and write
|
||
1FD51E8C000
|
trusted library allocation
|
page read and write
|
||
1FD48053000
|
heap
|
page read and write
|
||
1FD5B857000
|
trusted library allocation
|
page read and write
|
||
1FD51250000
|
trusted library allocation
|
page read and write
|
||
1FD51E92000
|
trusted library allocation
|
page read and write
|
||
256D90EB000
|
heap
|
page read and write
|
||
1FD4FADA000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
256D9158000
|
heap
|
page read and write
|
||
1FD518CA000
|
trusted library allocation
|
page read and write
|
||
1FD58EC1000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
166BC647000
|
trusted library allocation
|
page read and write
|
||
1FD591CB000
|
trusted library allocation
|
page read and write
|
||
1FD4E232000
|
trusted library allocation
|
page read and write
|
||
1FD543AF000
|
trusted library allocation
|
page read and write
|
||
1FD5B741000
|
trusted library allocation
|
page read and write
|
||
1FD53384000
|
trusted library allocation
|
page read and write
|
||
1FD547C2000
|
trusted library allocation
|
page read and write
|
||
1FD4E35C000
|
trusted library allocation
|
page read and write
|
||
1FD5185B000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD5CF92000
|
trusted library allocation
|
page read and write
|
||
1FD59263000
|
trusted library allocation
|
page read and write
|
||
1FD5AAA9000
|
trusted library allocation
|
page read and write
|
||
1FD524A7000
|
trusted library allocation
|
page read and write
|
||
1FD5D1B7000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5D1C4000
|
trusted library allocation
|
page read and write
|
||
2811BFE000
|
stack
|
page read and write
|
||
1FD51EDE000
|
trusted library allocation
|
page read and write
|
||
1FD590A7000
|
trusted library allocation
|
page read and write
|
||
1FD59523000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD4E0D2000
|
trusted library allocation
|
page read and write
|
||
256D9144000
|
heap
|
page read and write
|
||
1FD50D11000
|
heap
|
page read and write
|
||
1FD512A4000
|
trusted library allocation
|
page read and write
|
||
1FD52D19000
|
trusted library allocation
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD51AC2000
|
trusted library allocation
|
page read and write
|
||
1FD51A24000
|
trusted library allocation
|
page read and write
|
||
1FD51A7F000
|
trusted library allocation
|
page read and write
|
||
1FD50D24000
|
heap
|
page read and write
|
||
1FD5242C000
|
trusted library allocation
|
page read and write
|
||
1FD51E92000
|
trusted library allocation
|
page read and write
|
||
1FD51E99000
|
trusted library allocation
|
page read and write
|
||
1FD52EDA000
|
trusted library allocation
|
page read and write
|
||
1FD5D63F000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD544BE000
|
trusted library allocation
|
page read and write
|
||
1FD51E67000
|
trusted library allocation
|
page read and write
|
||
1FD5B6A2000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD5D45E000
|
trusted library allocation
|
page read and write
|
||
1FD54AD0000
|
trusted library allocation
|
page read and write
|
||
1FD4E8D6000
|
trusted library allocation
|
page read and write
|
||
1FD5ACF3000
|
trusted library allocation
|
page read and write
|
||
1FD52DDB000
|
trusted library allocation
|
page read and write
|
||
1FD4E438000
|
trusted library allocation
|
page read and write
|
||
1FD52A67000
|
trusted library allocation
|
page read and write
|
||
1FD5D547000
|
trusted library allocation
|
page read and write
|
||
1FD5C302000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD5B857000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD5E137000
|
trusted library allocation
|
page read and write
|
||
1FD53965000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD526FA000
|
trusted library allocation
|
page read and write
|
||
1FD4E2DE000
|
trusted library allocation
|
page read and write
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
1FD50E2E000
|
trusted library allocation
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD5DF84000
|
trusted library allocation
|
page read and write
|
||
1FD5AB9D000
|
trusted library allocation
|
page read and write
|
||
1FD51A82000
|
trusted library allocation
|
page read and write
|
||
1FD5D671000
|
heap
|
page read and write
|
||
1FD48095000
|
heap
|
page read and write
|
||
132675E000
|
unkown
|
page readonly
|
||
1FD52D33000
|
trusted library allocation
|
page read and write
|
||
1FD526BD000
|
trusted library allocation
|
page read and write
|
||
1FD5DF84000
|
trusted library allocation
|
page read and write
|
||
1FD5D566000
|
trusted library allocation
|
page read and write
|
||
1FD51E72000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD51A95000
|
trusted library allocation
|
page read and write
|
||
1FD50E6F000
|
trusted library allocation
|
page read and write
|
||
1FD480BC000
|
heap
|
page read and write
|
||
1FD50EAD000
|
trusted library allocation
|
page read and write
|
||
1FD524B9000
|
trusted library allocation
|
page read and write
|
||
1FD544B6000
|
trusted library allocation
|
page read and write
|
||
1FD51AF6000
|
trusted library allocation
|
page read and write
|
||
1FD51826000
|
trusted library allocation
|
page read and write
|
||
166BC470000
|
heap
|
page read and write
|
||
1FD535CD000
|
trusted library allocation
|
page read and write
|
||
19B9245B000
|
heap
|
page read and write
|
||
256D9060000
|
heap
|
page read and write
|
||
1FD52D3A000
|
trusted library allocation
|
page read and write
|
||
1FD4D18D000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD51ED5000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD59458000
|
trusted library allocation
|
page read and write
|
||
256D90FD000
|
heap
|
page read and write
|
||
1FD48051000
|
heap
|
page read and write
|
||
1FD53082000
|
trusted library allocation
|
page read and write
|
||
256D8260000
|
heap
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD526E5000
|
trusted library allocation
|
page read and write
|
||
1FD539AF000
|
trusted library allocation
|
page read and write
|
||
1FD51A92000
|
trusted library allocation
|
page read and write
|
||
1FD52E5F000
|
trusted library allocation
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD4E3B9000
|
trusted library allocation
|
page read and write
|
||
1FD52DDB000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD48051000
|
heap
|
page read and write
|
||
1FD58EB3000
|
trusted library allocation
|
page read and write
|
||
1FD591B1000
|
trusted library allocation
|
page read and write
|
||
1FD4D175000
|
trusted library allocation
|
page read and write
|
||
1FD48079000
|
heap
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD52DF0000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD58F85000
|
trusted library allocation
|
page read and write
|
||
1141FA24000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD52DF0000
|
trusted library allocation
|
page read and write
|
||
1FD51EAE000
|
trusted library allocation
|
page read and write
|
||
1FD5287A000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
256D9060000
|
heap
|
page read and write
|
||
256D8AC0000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD5C3A8000
|
trusted library allocation
|
page read and write
|
||
1FD524DA000
|
trusted library allocation
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD52562000
|
trusted library allocation
|
page read and write
|
||
1FD52DF6000
|
trusted library allocation
|
page read and write
|
||
1FD592C5000
|
trusted library allocation
|
page read and write
|
||
1FD52DE4000
|
trusted library allocation
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD52EEA000
|
trusted library allocation
|
page read and write
|
||
1141F6C0000
|
unclassified section
|
page readonly
|
||
1FD5AA0B000
|
trusted library allocation
|
page read and write
|
||
1FD54ACF000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
1FD5D2C3000
|
trusted library allocation
|
page read and write
|
||
1FD592F5000
|
trusted library allocation
|
page read and write
|
||
1FD58ECD000
|
trusted library allocation
|
page read and write
|
||
256D9144000
|
heap
|
page read and write
|
||
1FD5AF43000
|
trusted library allocation
|
page read and write
|
||
256D90F1000
|
heap
|
page read and write
|
||
1FD590FB000
|
trusted library allocation
|
page read and write
|
||
1FD48091000
|
heap
|
page read and write
|
||
1FD592FC000
|
trusted library allocation
|
page read and write
|
||
1FD5D1D5000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
256D90E9000
|
heap
|
page read and write
|
||
1141FA8F000
|
trusted library allocation
|
page read and write
|
||
1FD58FCF000
|
trusted library allocation
|
page read and write
|
||
1FD5901F000
|
trusted library allocation
|
page read and write
|
||
1FD531F2000
|
trusted library allocation
|
page read and write
|
||
1FD480B9000
|
heap
|
page read and write
|
||
1FD52FCA000
|
trusted library allocation
|
page read and write
|
||
1FD52C13000
|
trusted library allocation
|
page read and write
|
||
1FD51E7C000
|
trusted library allocation
|
page read and write
|
||
1FD5D1C1000
|
trusted library allocation
|
page read and write
|
||
1FD526B8000
|
trusted library allocation
|
page read and write
|
||
1FD515A6000
|
trusted library allocation
|
page read and write
|
||
166BC310000
|
remote allocation
|
page read and write
|
||
1FD59485000
|
trusted library allocation
|
page read and write
|
||
1FD5D10C000
|
trusted library allocation
|
page read and write
|
||
1FD51ED9000
|
trusted library allocation
|
page read and write
|
||
1FD52EF4000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
21DD0520000
|
heap
|
page read and write
|
||
1FD5D2CB000
|
trusted library allocation
|
page read and write
|
||
1FD58F66000
|
trusted library allocation
|
page read and write
|
||
1FD53961000
|
trusted library allocation
|
page read and write
|
||
1FD51EB7000
|
trusted library allocation
|
page read and write
|
||
1FD52D6B000
|
trusted library allocation
|
page read and write
|
||
1FD51E99000
|
trusted library allocation
|
page read and write
|
||
1FD592C5000
|
trusted library allocation
|
page read and write
|
||
19B92442000
|
heap
|
page read and write
|
||
1FD5AF11000
|
trusted library allocation
|
page read and write
|
||
1FD52452000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD59198000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD52630000
|
trusted library allocation
|
page read and write
|
||
1FD4E0AA000
|
trusted library allocation
|
page read and write
|
||
1FD5189D000
|
trusted library allocation
|
page read and write
|
||
256D9069000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD535D2000
|
trusted library allocation
|
page read and write
|
||
1FD52430000
|
trusted library allocation
|
page read and write
|
||
1FD58F64000
|
trusted library allocation
|
page read and write
|
||
1FD50CE6000
|
heap
|
page read and write
|
||
1FD4E225000
|
trusted library allocation
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
1FD4D1C6000
|
trusted library allocation
|
page read and write
|
||
1FD52A50000
|
trusted library allocation
|
page read and write
|
||
1FD4E834000
|
trusted library allocation
|
page read and write
|
||
1FD54FC8000
|
trusted library allocation
|
page read and write
|
||
1FD52678000
|
trusted library allocation
|
page read and write
|
||
256D82B4000
|
heap
|
page read and write
|
||
CFE000
|
heap
|
page read and write
|
||
1FD545C5000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD52DE5000
|
trusted library allocation
|
page read and write
|
||
1FD54A59000
|
trusted library allocation
|
page read and write
|
||
1FD4E921000
|
trusted library allocation
|
page read and write
|
||
1FD480B2000
|
heap
|
page read and write
|
||
1FD4E29D000
|
trusted library allocation
|
page read and write
|
||
1FD5D4BD000
|
trusted library allocation
|
page read and write
|
||
256D8120000
|
heap
|
page read and write
|
||
1FD545EE000
|
trusted library allocation
|
page read and write
|
||
1FD52D9C000
|
trusted library allocation
|
page read and write
|
||
1FD4807A000
|
heap
|
page read and write
|
||
1FD4E209000
|
trusted library allocation
|
page read and write
|
||
1FD52D97000
|
trusted library allocation
|
page read and write
|
||
1FD480EA000
|
heap
|
page read and write
|
||
1FD52678000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD50CE8000
|
heap
|
page read and write
|
||
1FD51A66000
|
trusted library allocation
|
page read and write
|
||
1FD512C1000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD51E53000
|
trusted library allocation
|
page read and write
|
||
1FD52436000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD52469000
|
trusted library allocation
|
page read and write
|
||
1FD5D192000
|
trusted library allocation
|
page read and write
|
||
1FD591B1000
|
trusted library allocation
|
page read and write
|
||
1FD5D435000
|
trusted library allocation
|
page read and write
|
||
1141F900000
|
trusted library allocation
|
page read and write
|
||
1FD52C14000
|
trusted library allocation
|
page read and write
|
||
1FD54893000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
4E70DFE000
|
stack
|
page read and write
|
||
1FD52C3B000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD4FA94000
|
trusted library allocation
|
page read and write
|
||
1FD5442B000
|
trusted library allocation
|
page read and write
|
||
1FD590FB000
|
trusted library allocation
|
page read and write
|
||
1FD5953A000
|
trusted library allocation
|
page read and write
|
||
1FD58FFE000
|
trusted library allocation
|
page read and write
|
||
1FD532AE000
|
trusted library allocation
|
page read and write
|
||
1FD52C39000
|
trusted library allocation
|
page read and write
|
||
1FD5958F000
|
trusted library allocation
|
page read and write
|
||
1FD592F4000
|
trusted library allocation
|
page read and write
|
||
1FD4E2E6000
|
trusted library allocation
|
page read and write
|
||
1FD4806C000
|
heap
|
page read and write
|
||
1FD51AAF000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD52628000
|
trusted library allocation
|
page read and write
|
||
1FD4F37D000
|
trusted library allocation
|
page read and write
|
||
1FD52EF4000
|
trusted library allocation
|
page read and write
|
||
1FD4FADF000
|
trusted library allocation
|
page read and write
|
||
1FD4F33E000
|
trusted library allocation
|
page read and write
|
||
1FD5D2C5000
|
trusted library allocation
|
page read and write
|
||
1FD58FD9000
|
trusted library allocation
|
page read and write
|
||
1FD524EC000
|
trusted library allocation
|
page read and write
|
||
1FD51EDE000
|
trusted library allocation
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
1FD52C2B000
|
trusted library allocation
|
page read and write
|
||
611000
|
unkown
|
page execute read
|
||
1FD590FB000
|
trusted library allocation
|
page read and write
|
||
1FD53940000
|
trusted library allocation
|
page read and write
|
||
1FD5392A000
|
trusted library allocation
|
page read and write
|
||
1FD5185C000
|
trusted library allocation
|
page read and write
|
||
1141FB50000
|
heap
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
166BC696000
|
trusted library allocation
|
page read and write
|
||
1FD52E71000
|
trusted library allocation
|
page read and write
|
||
1FD4E3B0000
|
trusted library allocation
|
page read and write
|
||
1FD5286F000
|
trusted library allocation
|
page read and write
|
||
1FD5D1B4000
|
trusted library allocation
|
page read and write
|
||
1FD52CF6000
|
trusted library allocation
|
page read and write
|
||
1FD5DD2E000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1FD51AD5000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD4E3C7000
|
trusted library allocation
|
page read and write
|
||
1FD52672000
|
trusted library allocation
|
page read and write
|
||
1FD595AD000
|
trusted library allocation
|
page read and write
|
||
1FD4F39F000
|
trusted library allocation
|
page read and write
|
||
1FD51E6A000
|
trusted library allocation
|
page read and write
|
||
1FD52DE4000
|
trusted library allocation
|
page read and write
|
||
1FD59080000
|
trusted library allocation
|
page read and write
|
||
1FD5958F000
|
trusted library allocation
|
page read and write
|
||
166BC700000
|
heap
|
page readonly
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD523F6000
|
trusted library allocation
|
page read and write
|
||
1FD58F3F000
|
trusted library allocation
|
page read and write
|
||
1FD4E34D000
|
trusted library allocation
|
page read and write
|
||
1FD51EE3000
|
trusted library allocation
|
page read and write
|
||
1FD480BD000
|
heap
|
page read and write
|
||
1FD5AAB4000
|
trusted library allocation
|
page read and write
|
||
1FD550E4000
|
trusted library allocation
|
page read and write
|
||
1FD5D593000
|
trusted library allocation
|
page read and write
|
||
6DC000
|
unkown
|
page write copy
|
||
1FD52625000
|
trusted library allocation
|
page read and write
|
||
1FD4E422000
|
trusted library allocation
|
page read and write
|
||
1FD5486A000
|
trusted library allocation
|
page read and write
|
||
1FD594D7000
|
trusted library allocation
|
page read and write
|
||
19B90868000
|
heap
|
page read and write
|
||
1FD52E63000
|
trusted library allocation
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
1FD480D1000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD51A92000
|
trusted library allocation
|
page read and write
|
||
1FD5AA63000
|
trusted library allocation
|
page read and write
|
||
1FD52D36000
|
trusted library allocation
|
page read and write
|
||
1FD51ADF000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD52D33000
|
trusted library allocation
|
page read and write
|
||
1FD48053000
|
heap
|
page read and write
|
||
1FD5D1FB000
|
trusted library allocation
|
page read and write
|
||
256D90E3000
|
heap
|
page read and write
|
||
1FD480B2000
|
heap
|
page read and write
|
||
1FD52A2F000
|
trusted library allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD54468000
|
trusted library allocation
|
page read and write
|
||
256D840C000
|
trusted library allocation
|
page read and write
|
||
1FD530E6000
|
trusted library allocation
|
page read and write
|
||
1FD5D1E7000
|
trusted library allocation
|
page read and write
|
||
1FD5ABA5000
|
trusted library allocation
|
page read and write
|
||
1FD535E1000
|
trusted library allocation
|
page read and write
|
||
1FD5243D000
|
trusted library allocation
|
page read and write
|
||
1FD59567000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD592F4000
|
trusted library allocation
|
page read and write
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
1FD592FC000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
256D9177000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
21DD09B0000
|
heap
|
page read and write
|
||
1FD51E92000
|
trusted library allocation
|
page read and write
|
||
1FD5305E000
|
trusted library allocation
|
page read and write
|
||
1FD4E8BA000
|
trusted library allocation
|
page read and write
|
||
1FD593C3000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52A67000
|
trusted library allocation
|
page read and write
|
||
1FD51A7D000
|
trusted library allocation
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD52452000
|
trusted library allocation
|
page read and write
|
||
1FD532E5000
|
trusted library allocation
|
page read and write
|
||
1FD51596000
|
trusted library allocation
|
page read and write
|
||
1FD51E92000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD52452000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
10343E000
|
stack
|
page read and write
|
||
CE6000
|
heap
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
C87B7FE000
|
unkown
|
page readonly
|
||
1FD592E1000
|
trusted library allocation
|
page read and write
|
||
19B92448000
|
heap
|
page read and write
|
||
3E839D41E000
|
trusted library allocation
|
page read and write
|
||
1FD4D1FA000
|
trusted library allocation
|
page read and write
|
||
1FD51EC4000
|
trusted library allocation
|
page read and write
|
||
1FD590A6000
|
trusted library allocation
|
page read and write
|
||
1FD58FD9000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4809F000
|
heap
|
page read and write
|
||
1FD48075000
|
heap
|
page read and write
|
||
1FD5129B000
|
trusted library allocation
|
page read and write
|
||
1FD5B786000
|
trusted library allocation
|
page read and write
|
||
1FD5919C000
|
trusted library allocation
|
page read and write
|
||
1FD52D96000
|
trusted library allocation
|
page read and write
|
||
1FD4E806000
|
trusted library allocation
|
page read and write
|
||
1FD59190000
|
trusted library allocation
|
page read and write
|
||
1FD548D8000
|
trusted library allocation
|
page read and write
|
||
1FD55101000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
19B90861000
|
heap
|
page read and write
|
||
1FD54899000
|
trusted library allocation
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
1FD52D40000
|
trusted library allocation
|
page read and write
|
||
1FD592D0000
|
trusted library allocation
|
page read and write
|
||
1FD52FBF000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD48079000
|
heap
|
page read and write
|
||
1FD55133000
|
trusted library allocation
|
page read and write
|
||
1FD590FB000
|
trusted library allocation
|
page read and write
|
||
1FD4F3CF000
|
trusted library allocation
|
page read and write
|
||
1FD51A95000
|
trusted library allocation
|
page read and write
|
||
1FD53600000
|
trusted library allocation
|
page read and write
|
||
1FD4E8D6000
|
trusted library allocation
|
page read and write
|
||
1FD4E962000
|
trusted library allocation
|
page read and write
|
||
1FD52E71000
|
trusted library allocation
|
page read and write
|
||
1FD4809C000
|
heap
|
page read and write
|
||
1FD5D1B0000
|
trusted library allocation
|
page read and write
|
||
1FD51EF1000
|
trusted library allocation
|
page read and write
|
||
1FD52EF7000
|
trusted library allocation
|
page read and write
|
||
1FD58F18000
|
trusted library allocation
|
page read and write
|
||
1FD4CA81000
|
trusted library allocation
|
page read and write
|
||
1FD524F9000
|
trusted library allocation
|
page read and write
|
||
256D906C000
|
heap
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD52E5D000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD59125000
|
trusted library allocation
|
page read and write
|
||
1FD480BC000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD5A800000
|
trusted library allocation
|
page read and write
|
||
1FD4804D000
|
heap
|
page read and write
|
||
1FD52D90000
|
trusted library allocation
|
page read and write
|
||
256D90EB000
|
heap
|
page read and write
|
||
1FD52E6C000
|
trusted library allocation
|
page read and write
|
||
1FD593CA000
|
trusted library allocation
|
page read and write
|
||
256D909C000
|
heap
|
page read and write
|
||
1FD5153D000
|
trusted library allocation
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD5ABEA000
|
trusted library allocation
|
page read and write
|
||
1FD480B9000
|
heap
|
page read and write
|
||
1FD4FACF000
|
trusted library allocation
|
page read and write
|
||
1FD53974000
|
trusted library allocation
|
page read and write
|
||
1FD58ECD000
|
trusted library allocation
|
page read and write
|
||
1FD4F358000
|
trusted library allocation
|
page read and write
|
||
1FD54842000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1141FE00000
|
trusted library allocation
|
page read and write
|
||
1FD59177000
|
trusted library allocation
|
page read and write
|
||
6AC000
|
unkown
|
page readonly
|
||
1FD58EC7000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD594D0000
|
trusted library allocation
|
page read and write
|
||
166BC370000
|
heap
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD5153C000
|
trusted library allocation
|
page read and write
|
||
1FD52E75000
|
trusted library allocation
|
page read and write
|
||
1FD58F64000
|
trusted library allocation
|
page read and write
|
||
256D9060000
|
heap
|
page read and write
|
||
1FD51594000
|
trusted library allocation
|
page read and write
|
||
1FD59558000
|
trusted library allocation
|
page read and write
|
||
1FD51ACA000
|
trusted library allocation
|
page read and write
|
||
1FD545CD000
|
trusted library allocation
|
page read and write
|
||
1FD52E5F000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
C879FD8000
|
stack
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD5D645000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
103C7E000
|
stack
|
page read and write
|
||
1FD480D8000
|
heap
|
page read and write
|
||
101BFE000
|
stack
|
page read and write
|
||
1FD523C6000
|
trusted library allocation
|
page read and write
|
||
1FD5ABDE000
|
trusted library allocation
|
page read and write
|
||
1FD5302C000
|
trusted library allocation
|
page read and write
|
||
1FD52C19000
|
trusted library allocation
|
page read and write
|
||
1FD52D1A000
|
trusted library allocation
|
page read and write
|
||
1FD52E52000
|
trusted library allocation
|
page read and write
|
||
1FD480B2000
|
heap
|
page read and write
|
||
256D90F1000
|
heap
|
page read and write
|
||
1FD51AD2000
|
trusted library allocation
|
page read and write
|
||
1FD5919C000
|
trusted library allocation
|
page read and write
|
||
1FD52E16000
|
trusted library allocation
|
page read and write
|
||
1FD54897000
|
trusted library allocation
|
page read and write
|
||
1FD5D17E000
|
trusted library allocation
|
page read and write
|
||
1FD52DC9000
|
trusted library allocation
|
page read and write
|
||
1FD5C500000
|
trusted library allocation
|
page read and write
|
||
1FD51AA6000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD59569000
|
trusted library allocation
|
page read and write
|
||
1FD518F3000
|
trusted library allocation
|
page read and write
|
||
256D9177000
|
heap
|
page read and write
|
||
1FD5AFE6000
|
trusted library allocation
|
page read and write
|
||
1FD52494000
|
trusted library allocation
|
page read and write
|
||
256D905C000
|
heap
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
256D8300000
|
trusted library allocation
|
page read and write
|
||
1FD4FAC7000
|
trusted library allocation
|
page read and write
|
||
1FD51EF3000
|
trusted library allocation
|
page read and write
|
||
1141FA79000
|
trusted library allocation
|
page read and write
|
||
1FD4FA4A000
|
trusted library allocation
|
page read and write
|
||
1FD535A1000
|
trusted library allocation
|
page read and write
|
||
1FD50CFF000
|
heap
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD58F6B000
|
trusted library allocation
|
page read and write
|
||
1FD51AEA000
|
trusted library allocation
|
page read and write
|
||
1FD4E931000
|
trusted library allocation
|
page read and write
|
||
1FD50E63000
|
trusted library allocation
|
page read and write
|
||
1FD51ACA000
|
trusted library allocation
|
page read and write
|
||
1FD5D5A1000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4805D000
|
heap
|
page read and write
|
||
1FD4F3CF000
|
trusted library allocation
|
page read and write
|
||
1FD48079000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD48050000
|
heap
|
page read and write
|
||
1FD5B82E000
|
trusted library allocation
|
page read and write
|
||
1FD5D446000
|
trusted library allocation
|
page read and write
|
||
1FD5B76D000
|
trusted library allocation
|
page read and write
|
||
1FD59167000
|
trusted library allocation
|
page read and write
|
||
1FD50E7B000
|
trusted library allocation
|
page read and write
|
||
1FD4FAFD000
|
trusted library allocation
|
page read and write
|
||
1FD59147000
|
trusted library allocation
|
page read and write
|
||
1FD4809A000
|
heap
|
page read and write
|
||
256D90EB000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5398C000
|
trusted library allocation
|
page read and write
|
||
1FD480D1000
|
heap
|
page read and write
|
||
1FD52461000
|
trusted library allocation
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
166BC6A3000
|
trusted library allocation
|
page read and write
|
||
1FD4E962000
|
trusted library allocation
|
page read and write
|
||
1FD59569000
|
trusted library allocation
|
page read and write
|
||
166BC673000
|
trusted library allocation
|
page read and write
|
||
1FD4807F000
|
heap
|
page read and write
|
||
166BC62E000
|
trusted library allocation
|
page read and write
|
||
1FD51A7F000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD4FACB000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
256D9144000
|
heap
|
page read and write
|
||
256D8090000
|
unclassified section
|
page readonly
|
||
1FD54CCE000
|
trusted library allocation
|
page read and write
|
||
256D913B000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD527E4000
|
trusted library allocation
|
page read and write
|
||
1FD4E963000
|
trusted library allocation
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD592AE000
|
trusted library allocation
|
page read and write
|
||
1FD5D2CF000
|
trusted library allocation
|
page read and write
|
||
1FD5D524000
|
trusted library allocation
|
page read and write
|
||
1FD52686000
|
trusted library allocation
|
page read and write
|
||
1FD52546000
|
trusted library allocation
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
1FD51AAF000
|
trusted library allocation
|
page read and write
|
||
1FD52670000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD4E2B8000
|
trusted library allocation
|
page read and write
|
||
1FD5B686000
|
trusted library allocation
|
page read and write
|
||
1FD523CD000
|
trusted library allocation
|
page read and write
|
||
1141FA19000
|
trusted library allocation
|
page read and write
|
||
1FD51AC2000
|
trusted library allocation
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
166BC2B0000
|
unclassified section
|
page readonly
|
||
1FD51AAF000
|
trusted library allocation
|
page read and write
|
||
1FD480DB000
|
heap
|
page read and write
|
||
1FD590D3000
|
trusted library allocation
|
page read and write
|
||
1FD52FD4000
|
trusted library allocation
|
page read and write
|
||
1FD5D1EA000
|
trusted library allocation
|
page read and write
|
||
1FD55005000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD51E7F000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD52DEA000
|
trusted library allocation
|
page read and write
|
||
1FD5952F000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52DD0000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD480D1000
|
heap
|
page read and write
|
||
1FD54AF0000
|
trusted library allocation
|
page read and write
|
||
1FD5262E000
|
trusted library allocation
|
page read and write
|
||
1FD5245F000
|
trusted library allocation
|
page read and write
|
||
1FD523B7000
|
trusted library allocation
|
page read and write
|
||
1FD5349F000
|
trusted library allocation
|
page read and write
|
||
1FD48095000
|
heap
|
page read and write
|
||
1FD51AB2000
|
trusted library allocation
|
page read and write
|
||
1FD594D9000
|
trusted library allocation
|
page read and write
|
||
1FD4E833000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD5B7C5000
|
trusted library allocation
|
page read and write
|
||
1FD53979000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1141FB70000
|
heap
|
page read and write
|
||
1FD480D9000
|
heap
|
page read and write
|
||
1FD535D0000
|
trusted library allocation
|
page read and write
|
||
1FD50D13000
|
heap
|
page read and write
|
||
1FD48041000
|
heap
|
page read and write
|
||
1FD48096000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD592D3000
|
trusted library allocation
|
page read and write
|
||
1FD4E3EB000
|
trusted library allocation
|
page read and write
|
||
256D8F07000
|
trusted library allocation
|
page read and write
|
||
1FD4FA9C000
|
trusted library allocation
|
page read and write
|
||
1FD48075000
|
heap
|
page read and write
|
||
1FD52494000
|
trusted library allocation
|
page read and write
|
||
1FD535CD000
|
trusted library allocation
|
page read and write
|
||
1FD52494000
|
trusted library allocation
|
page read and write
|
||
1FD548F8000
|
trusted library allocation
|
page read and write
|
||
1FD52411000
|
trusted library allocation
|
page read and write
|
||
1FD5D24E000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD58F66000
|
trusted library allocation
|
page read and write
|
||
1FD51A6B000
|
trusted library allocation
|
page read and write
|
||
166BC6B7000
|
trusted library allocation
|
page read and write
|
||
1FD52494000
|
trusted library allocation
|
page read and write
|
||
1FD4807F000
|
heap
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD515E4000
|
trusted library allocation
|
page read and write
|
||
1FD50D0D000
|
heap
|
page read and write
|
||
256D9158000
|
heap
|
page read and write
|
||
1FD52E52000
|
trusted library allocation
|
page read and write
|
||
1FD5CF92000
|
trusted library allocation
|
page read and write
|
||
166BC390000
|
heap
|
page read and write
|
||
166BC2A0000
|
unclassified section
|
page readonly
|
||
1FD54865000
|
trusted library allocation
|
page read and write
|
||
1FD5457F000
|
trusted library allocation
|
page read and write
|
||
1FD52EF7000
|
trusted library allocation
|
page read and write
|
||
1FD545EE000
|
trusted library allocation
|
page read and write
|
||
1FD51ACA000
|
trusted library allocation
|
page read and write
|
||
1FD4F384000
|
trusted library allocation
|
page read and write
|
||
166BC47A000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD5D439000
|
trusted library allocation
|
page read and write
|
||
19B9084D000
|
heap
|
page read and write
|
||
1FD52633000
|
trusted library allocation
|
page read and write
|
||
1FD52ECB000
|
trusted library allocation
|
page read and write
|
||
1FD545B4000
|
trusted library allocation
|
page read and write
|
||
1FD4807F000
|
heap
|
page read and write
|
||
1FD5D442000
|
trusted library allocation
|
page read and write
|
||
1FD51E89000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD5B705000
|
trusted library allocation
|
page read and write
|
||
1FD51EAE000
|
trusted library allocation
|
page read and write
|
||
256D9158000
|
heap
|
page read and write
|
||
1FD52D4E000
|
trusted library allocation
|
page read and write
|
||
1FD52D6E000
|
trusted library allocation
|
page read and write
|
||
1FD5D2CD000
|
trusted library allocation
|
page read and write
|
||
1FD5AAD2000
|
trusted library allocation
|
page read and write
|
||
1FD52D97000
|
trusted library allocation
|
page read and write
|
||
1FD532E8000
|
trusted library allocation
|
page read and write
|
||
1FD52735000
|
trusted library allocation
|
page read and write
|
||
1FD53600000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD59569000
|
trusted library allocation
|
page read and write
|
||
1FD52408000
|
trusted library allocation
|
page read and write
|
||
1FD52533000
|
trusted library allocation
|
page read and write
|
||
1FD54AC7000
|
trusted library allocation
|
page read and write
|
||
1FD52D26000
|
trusted library allocation
|
page read and write
|
||
1FD5D6E1000
|
heap
|
page read and write
|
||
1FD594AA000
|
trusted library allocation
|
page read and write
|
||
1FD48098000
|
heap
|
page read and write
|
||
1FD544DD000
|
trusted library allocation
|
page read and write
|
||
1FD5AFFB000
|
trusted library allocation
|
page read and write
|
||
1FD594A2000
|
trusted library allocation
|
page read and write
|
||
1FD52EFA000
|
trusted library allocation
|
page read and write
|
||
1FD5D2FE000
|
trusted library allocation
|
page read and write
|
||
1FD5930F000
|
trusted library allocation
|
page read and write
|
||
1FD5D5FB000
|
trusted library allocation
|
page read and write
|
||
1FD52D40000
|
trusted library allocation
|
page read and write
|
||
1FD5D5F6000
|
trusted library allocation
|
page read and write
|
||
1FD5AF88000
|
trusted library allocation
|
page read and write
|
||
1FD524F9000
|
trusted library allocation
|
page read and write
|
||
1FD5ABC6000
|
trusted library allocation
|
page read and write
|
||
1FD52EEA000
|
trusted library allocation
|
page read and write
|
||
1FD480BC000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD48084000
|
heap
|
page read and write
|
||
1FD52A92000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD50CE7000
|
heap
|
page read and write
|
||
4E6F5FF000
|
stack
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD51EBE000
|
trusted library allocation
|
page read and write
|
||
1FD4806B000
|
heap
|
page read and write
|
||
1FD5D223000
|
trusted library allocation
|
page read and write
|
||
1FD52FF0000
|
trusted library allocation
|
page read and write
|
||
1FD48072000
|
heap
|
page read and write
|
||
1FD532FA000
|
trusted library allocation
|
page read and write
|
||
1FD48034000
|
heap
|
page read and write
|
||
C87C8FE000
|
unkown
|
page readonly
|
||
1FD5D689000
|
heap
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD5D262000
|
trusted library allocation
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD52D36000
|
trusted library allocation
|
page read and write
|
||
1FD52FFB000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
166BC720000
|
heap
|
page read and write
|
||
1FD4CADF000
|
trusted library allocation
|
page read and write
|
||
1FD5B70C000
|
trusted library allocation
|
page read and write
|
||
19B90868000
|
heap
|
page read and write
|
||
1FD4F3CF000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD51844000
|
trusted library allocation
|
page read and write
|
||
1FD5D1B7000
|
trusted library allocation
|
page read and write
|
||
1FD54439000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4FA94000
|
trusted library allocation
|
page read and write
|
||
1FD5B67B000
|
trusted library allocation
|
page read and write
|
||
1FD51EE3000
|
trusted library allocation
|
page read and write
|
||
1FD4FA70000
|
trusted library allocation
|
page read and write
|
||
166BC83C000
|
trusted library allocation
|
page read and write
|
||
1FD52637000
|
trusted library allocation
|
page read and write
|
||
166BC820000
|
trusted library allocation
|
page read and write
|
||
1FD4E998000
|
trusted library allocation
|
page read and write
|
||
1FD5D19D000
|
trusted library allocation
|
page read and write
|
||
1FD51EDC000
|
trusted library allocation
|
page read and write
|
||
1FD50D10000
|
heap
|
page read and write
|
||
1FD518CE000
|
trusted library allocation
|
page read and write
|
||
1FD4E833000
|
trusted library allocation
|
page read and write
|
||
1FD548A1000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD5448E000
|
trusted library allocation
|
page read and write
|
||
1FD54557000
|
trusted library allocation
|
page read and write
|
||
1FD535A1000
|
trusted library allocation
|
page read and write
|
||
1FD592D3000
|
trusted library allocation
|
page read and write
|
||
1FD52FF0000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD51EDE000
|
trusted library allocation
|
page read and write
|
||
1FD592E4000
|
trusted library allocation
|
page read and write
|
||
1FD5398C000
|
trusted library allocation
|
page read and write
|
||
1FD58EF3000
|
trusted library allocation
|
page read and write
|
||
1FD58EF3000
|
trusted library allocation
|
page read and write
|
||
1FD51E49000
|
trusted library allocation
|
page read and write
|
||
1FD4E04A000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD54AFD000
|
trusted library allocation
|
page read and write
|
||
1FD54F7B000
|
trusted library allocation
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD5B806000
|
trusted library allocation
|
page read and write
|
||
256D8080000
|
unclassified section
|
page readonly
|
||
1FD5D190000
|
trusted library allocation
|
page read and write
|
||
1FD545CD000
|
trusted library allocation
|
page read and write
|
||
1FD59700000
|
trusted library allocation
|
page read and write
|
||
166BC7A0000
|
heap
|
page read and write
|
||
1FD5D24C000
|
trusted library allocation
|
page read and write
|
||
1FD58F94000
|
trusted library allocation
|
page read and write
|
||
1FD52C0B000
|
trusted library allocation
|
page read and write
|
||
1FD526A7000
|
trusted library allocation
|
page read and write
|
||
1FD51A7D000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD51555000
|
trusted library allocation
|
page read and write
|
||
1FD5D55E000
|
trusted library allocation
|
page read and write
|
||
1FD53244000
|
trusted library allocation
|
page read and write
|
||
1FD52576000
|
trusted library allocation
|
page read and write
|
||
1FD525EE000
|
trusted library allocation
|
page read and write
|
||
19B9086A000
|
heap
|
page read and write
|
||
1FD535DC000
|
trusted library allocation
|
page read and write
|
||
1FD4807F000
|
heap
|
page read and write
|
||
1FD4E20D000
|
trusted library allocation
|
page read and write
|
||
1FD524B9000
|
trusted library allocation
|
page read and write
|
||
166BC819000
|
trusted library allocation
|
page read and write
|
||
1FD52E1A000
|
trusted library allocation
|
page read and write
|
||
1FD5D418000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD50D02000
|
heap
|
page read and write
|
||
1FD4E2AE000
|
trusted library allocation
|
page read and write
|
||
1FD52D71000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
256D8960000
|
trusted library section
|
page readonly
|
||
4B4000
|
heap
|
page read and write
|
||
1FD532AE000
|
trusted library allocation
|
page read and write
|
||
1FD4E37F000
|
trusted library allocation
|
page read and write
|
||
1FD4E946000
|
trusted library allocation
|
page read and write
|
||
1FD4CAA6000
|
trusted library allocation
|
page read and write
|
||
1FD52AEB000
|
trusted library allocation
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD535DA000
|
trusted library allocation
|
page read and write
|
||
256D9177000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD5268A000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
166BC623000
|
trusted library allocation
|
page read and write
|
||
1FD52ECB000
|
trusted library allocation
|
page read and write
|
||
1FD523F6000
|
trusted library allocation
|
page read and write
|
||
1FD51EBE000
|
trusted library allocation
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD532FA000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD51EC4000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5125B000
|
trusted library allocation
|
page read and write
|
||
1FD5AD80000
|
trusted library allocation
|
page read and write
|
||
1FD50CE9000
|
heap
|
page read and write
|
||
1FD52EDA000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
19B9244C000
|
heap
|
page read and write
|
||
1FD54552000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD480E4000
|
heap
|
page read and write
|
||
1FD5929C000
|
trusted library allocation
|
page read and write
|
||
1FD50D0D000
|
heap
|
page read and write
|
||
1FD4FAFD000
|
trusted library allocation
|
page read and write
|
||
1FD4E829000
|
trusted library allocation
|
page read and write
|
||
1FD51A59000
|
trusted library allocation
|
page read and write
|
||
166BC500000
|
trusted library allocation
|
page read and write
|
||
1FD5B7E4000
|
trusted library allocation
|
page read and write
|
||
1FD52562000
|
trusted library allocation
|
page read and write
|
||
1FD4D166000
|
trusted library allocation
|
page read and write
|
||
1FD480A2000
|
heap
|
page read and write
|
||
1FD48037000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1141FA49000
|
trusted library allocation
|
page read and write
|
||
1FD54AEB000
|
trusted library allocation
|
page read and write
|
||
1FD52E75000
|
trusted library allocation
|
page read and write
|
||
1FD51A68000
|
trusted library allocation
|
page read and write
|
||
1FD4E36A000
|
trusted library allocation
|
page read and write
|
||
1FD5287A000
|
trusted library allocation
|
page read and write
|
||
1FD52CF5000
|
trusted library allocation
|
page read and write
|
||
1FD4F3A6000
|
trusted library allocation
|
page read and write
|
||
1FD5E12A000
|
trusted library allocation
|
page read and write
|
||
1FD48045000
|
heap
|
page read and write
|
||
1FD52A55000
|
trusted library allocation
|
page read and write
|
||
1FD58EE3000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
19B907E0000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD525DD000
|
trusted library allocation
|
page read and write
|
||
1FD5ACDD000
|
trusted library allocation
|
page read and write
|
||
1FD5245F000
|
trusted library allocation
|
page read and write
|
||
256D8F00000
|
trusted library allocation
|
page read and write
|
||
1FD5DF9E000
|
trusted library allocation
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD53037000
|
trusted library allocation
|
page read and write
|
||
1FD54895000
|
trusted library allocation
|
page read and write
|
||
1FD54C84000
|
trusted library allocation
|
page read and write
|
||
1FD592E1000
|
trusted library allocation
|
page read and write
|
||
1FD5903B000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD5245F000
|
trusted library allocation
|
page read and write
|
||
1FD4E217000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4FA9C000
|
trusted library allocation
|
page read and write
|
||
1FD527F1000
|
trusted library allocation
|
page read and write
|
||
1FD50D09000
|
heap
|
page read and write
|
||
1FD52E67000
|
trusted library allocation
|
page read and write
|
||
1FD531D9000
|
trusted library allocation
|
page read and write
|
||
1FD5243A000
|
trusted library allocation
|
page read and write
|
||
1FD5D2D1000
|
trusted library allocation
|
page read and write
|
||
1FD52C0B000
|
trusted library allocation
|
page read and write
|
||
1FD4D1B6000
|
trusted library allocation
|
page read and write
|
||
1FD5D64D000
|
heap
|
page read and write
|
||
1141FADB000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD5254C000
|
trusted library allocation
|
page read and write
|
||
1FD51EBE000
|
trusted library allocation
|
page read and write
|
||
1FD525FD000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD590AF000
|
trusted library allocation
|
page read and write
|
||
256D90E0000
|
heap
|
page read and write
|
||
1FD58EF7000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD51A7F000
|
trusted library allocation
|
page read and write
|
||
1FD5D59B000
|
trusted library allocation
|
page read and write
|
||
1FD52D36000
|
trusted library allocation
|
page read and write
|
||
1FD52D78000
|
trusted library allocation
|
page read and write
|
||
1FD52ECB000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD5D4B6000
|
trusted library allocation
|
page read and write
|
||
1FD52E5F000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD5ABCF000
|
trusted library allocation
|
page read and write
|
||
1FD58EBC000
|
trusted library allocation
|
page read and write
|
||
1FD5D601000
|
heap
|
page read and write
|
||
1FD4D02F000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
256D8280000
|
heap
|
page read and write
|
||
1FD48093000
|
heap
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD52DD4000
|
trusted library allocation
|
page read and write
|
||
1FD51855000
|
trusted library allocation
|
page read and write
|
||
1FD5AF48000
|
trusted library allocation
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD4D1AB000
|
trusted library allocation
|
page read and write
|
||
256D90F1000
|
heap
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
1FD52EEA000
|
trusted library allocation
|
page read and write
|
||
1FD5927F000
|
trusted library allocation
|
page read and write
|
||
1FD5D43C000
|
trusted library allocation
|
page read and write
|
||
132679E000
|
stack
|
page read and write
|
||
1FD4E87A000
|
trusted library allocation
|
page read and write
|
||
1FD51A9D000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD5CFD3000
|
trusted library allocation
|
page read and write
|
||
1FD59222000
|
trusted library allocation
|
page read and write
|
||
1FD4E8CD000
|
trusted library allocation
|
page read and write
|
||
1FD53287000
|
trusted library allocation
|
page read and write
|
||
1141FA03000
|
trusted library allocation
|
page read and write
|
||
1FD52DF4000
|
trusted library allocation
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD52D82000
|
trusted library allocation
|
page read and write
|
||
1FD5D662000
|
heap
|
page read and write
|
||
1FD52E65000
|
trusted library allocation
|
page read and write
|
||
1FD54448000
|
trusted library allocation
|
page read and write
|
||
1FD54859000
|
trusted library allocation
|
page read and write
|
||
1FD54891000
|
trusted library allocation
|
page read and write
|
||
1FD48094000
|
heap
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD51A75000
|
trusted library allocation
|
page read and write
|
||
1FD5D4FE000
|
trusted library allocation
|
page read and write
|
||
1FD5240C000
|
trusted library allocation
|
page read and write
|
||
102BFE000
|
stack
|
page read and write
|
||
1FD50D10000
|
heap
|
page read and write
|
||
1FD5CFC8000
|
trusted library allocation
|
page read and write
|
||
1FD524A5000
|
trusted library allocation
|
page read and write
|
||
1FD5B6C8000
|
trusted library allocation
|
page read and write
|
||
1FD4F320000
|
trusted library allocation
|
page read and write
|
||
1FD48073000
|
heap
|
page read and write
|
||
1FD59085000
|
trusted library allocation
|
page read and write
|
||
19B90A00000
|
trusted library allocation
|
page read and write
|
||
1FD52A73000
|
trusted library allocation
|
page read and write
|
||
1FD5159B000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD50D14000
|
heap
|
page read and write
|
||
1FD48051000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD51A2A000
|
trusted library allocation
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD4F3A6000
|
trusted library allocation
|
page read and write
|
||
1FD51577000
|
trusted library allocation
|
page read and write
|
||
1FD54A69000
|
trusted library allocation
|
page read and write
|
||
1FD5504D000
|
trusted library allocation
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
1FD594DA000
|
trusted library allocation
|
page read and write
|
||
1FD5DD25000
|
trusted library allocation
|
page read and write
|
||
1FD512E3000
|
trusted library allocation
|
page read and write
|
||
1FD53295000
|
trusted library allocation
|
page read and write
|
||
1FD51ACA000
|
trusted library allocation
|
page read and write
|
||
1FD51AD5000
|
trusted library allocation
|
page read and write
|
||
1FD51A7D000
|
trusted library allocation
|
page read and write
|
||
1FD523D2000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD526B8000
|
trusted library allocation
|
page read and write
|
||
1FD52A65000
|
trusted library allocation
|
page read and write
|
||
1FD4D126000
|
trusted library allocation
|
page read and write
|
||
19B9244D000
|
heap
|
page read and write
|
||
1FD4804E000
|
heap
|
page read and write
|
||
1FD52EF7000
|
trusted library allocation
|
page read and write
|
||
1FD54AD6000
|
trusted library allocation
|
page read and write
|
||
1FD52494000
|
trusted library allocation
|
page read and write
|
||
1FD51A7B000
|
trusted library allocation
|
page read and write
|
||
1FD480B3000
|
heap
|
page read and write
|
||
1FD50D11000
|
heap
|
page read and write
|
||
1FD58F55000
|
trusted library allocation
|
page read and write
|
||
1FD50D24000
|
heap
|
page read and write
|
||
1FD4E3F6000
|
trusted library allocation
|
page read and write
|
||
256D846F000
|
trusted library allocation
|
page read and write
|
||
1FD52D97000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1141FA5F000
|
trusted library allocation
|
page read and write
|
||
1FD55463000
|
trusted library allocation
|
page read and write
|
||
1FD524F9000
|
trusted library allocation
|
page read and write
|
||
1FD50E6D000
|
trusted library allocation
|
page read and write
|
||
1FD54AD6000
|
trusted library allocation
|
page read and write
|
||
1FD526FA000
|
trusted library allocation
|
page read and write
|
||
1FD518A0000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD48099000
|
heap
|
page read and write
|
||
1FD51ECB000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD59596000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD58FF7000
|
trusted library allocation
|
page read and write
|
||
1FD51A31000
|
trusted library allocation
|
page read and write
|
||
21DD0807000
|
trusted library allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1FD52DE8000
|
trusted library allocation
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
1FD480BC000
|
heap
|
page read and write
|
||
1FD51536000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD58FE8000
|
trusted library allocation
|
page read and write
|
||
1FD52DD6000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD4FA94000
|
trusted library allocation
|
page read and write
|
||
1FD54549000
|
trusted library allocation
|
page read and write
|
||
1FD594D9000
|
trusted library allocation
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD51833000
|
trusted library allocation
|
page read and write
|
||
1FD50E00000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD59177000
|
trusted library allocation
|
page read and write
|
||
1FD51A6D000
|
trusted library allocation
|
page read and write
|
||
1FD4E2B5000
|
trusted library allocation
|
page read and write
|
||
1FD4804D000
|
heap
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD52D36000
|
trusted library allocation
|
page read and write
|
||
1FD5D5A8000
|
trusted library allocation
|
page read and write
|
||
1FD590A9000
|
trusted library allocation
|
page read and write
|
||
1FD5AFEC000
|
trusted library allocation
|
page read and write
|
||
1FD5E118000
|
trusted library allocation
|
page read and write
|
||
1FD5924E000
|
trusted library allocation
|
page read and write
|
||
1FD5E11D000
|
trusted library allocation
|
page read and write
|
||
1FD547B9000
|
trusted library allocation
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD48098000
|
heap
|
page read and write
|
||
1FD59447000
|
trusted library allocation
|
page read and write
|
||
1FD51E67000
|
trusted library allocation
|
page read and write
|
||
1FD526A9000
|
trusted library allocation
|
page read and write
|
||
1FD5B82C000
|
trusted library allocation
|
page read and write
|
||
256D8E40000
|
unkown
|
page execute read
|
||
1FD5D231000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
heap
|
page read and write
|
||
1FD515AC000
|
trusted library allocation
|
page read and write
|
||
256D84CE000
|
trusted library allocation
|
page read and write
|
||
1FD52DD0000
|
trusted library allocation
|
page read and write
|
||
1FD52FC8000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD50D5D000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1FD58F85000
|
trusted library allocation
|
page read and write
|
||
1FD52DCA000
|
trusted library allocation
|
page read and write
|
||
1FD523D2000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD5D4C0000
|
trusted library allocation
|
page read and write
|
||
1FD4E957000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
256D9064000
|
heap
|
page read and write
|
||
1FD51ACC000
|
trusted library allocation
|
page read and write
|
||
4E71DFF000
|
stack
|
page read and write
|
||
19B907C0000
|
heap
|
page read and write
|
||
1FD48075000
|
heap
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD591B3000
|
trusted library allocation
|
page read and write
|
||
1FD480B1000
|
heap
|
page read and write
|
||
1FD52D8E000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD480A7000
|
heap
|
page read and write
|
||
1FD58F09000
|
trusted library allocation
|
page read and write
|
||
1FD5D4B6000
|
trusted library allocation
|
page read and write
|
||
1FD52A65000
|
trusted library allocation
|
page read and write
|
||
1FD52EF8000
|
trusted library allocation
|
page read and write
|
||
1FD54559000
|
trusted library allocation
|
page read and write
|
||
1FD526BB000
|
trusted library allocation
|
page read and write
|
||
1FD4E916000
|
trusted library allocation
|
page read and write
|
||
1FD53065000
|
trusted library allocation
|
page read and write
|
||
1FD52473000
|
trusted library allocation
|
page read and write
|
||
256D9177000
|
heap
|
page read and write
|
||
19B92443000
|
heap
|
page read and write
|
||
1FD524A5000
|
trusted library allocation
|
page read and write
|
||
1FD51E86000
|
trusted library allocation
|
page read and write
|
||
1FD52678000
|
trusted library allocation
|
page read and write
|
||
1FD52D80000
|
trusted library allocation
|
page read and write
|
||
1FD524B1000
|
trusted library allocation
|
page read and write
|
||
1FD59228000
|
trusted library allocation
|
page read and write
|
||
1FD4806C000
|
heap
|
page read and write
|
||
1FD515B2000
|
trusted library allocation
|
page read and write
|
||
1FD4FA9C000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD4FABF000
|
trusted library allocation
|
page read and write
|
||
2810BFC000
|
stack
|
page read and write
|
||
1FD55483000
|
trusted library allocation
|
page read and write
|
||
1FD5D1F2000
|
trusted library allocation
|
page read and write
|
||
1FD51AC0000
|
trusted library allocation
|
page read and write
|
||
1FD5D59E000
|
trusted library allocation
|
page read and write
|
||
1FD52E57000
|
trusted library allocation
|
page read and write
|
||
1FD58F1F000
|
trusted library allocation
|
page read and write
|
||
1FD51EAE000
|
trusted library allocation
|
page read and write
|
||
1FD5D579000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD58FCD000
|
trusted library allocation
|
page read and write
|
||
1FD52A67000
|
trusted library allocation
|
page read and write
|
||
1FD52471000
|
trusted library allocation
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1FD48069000
|
heap
|
page read and write
|
||
1FD54AFC000
|
trusted library allocation
|
page read and write
|
||
1FD480DB000
|
heap
|
page read and write
|
||
1FD593C3000
|
trusted library allocation
|
page read and write
|
||
1FD5263F000
|
trusted library allocation
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD4E0D9000
|
trusted library allocation
|
page read and write
|
||
1FD5D2DD000
|
trusted library allocation
|
page read and write
|
||
1FD5B801000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD50D07000
|
heap
|
page read and write
|
||
1FD52D99000
|
trusted library allocation
|
page read and write
|
||
1FD52EF4000
|
trusted library allocation
|
page read and write
|
||
256D9069000
|
heap
|
page read and write
|
||
256D845C000
|
trusted library allocation
|
page read and write
|
||
1FD480DB000
|
heap
|
page read and write
|
||
1FD48054000
|
heap
|
page read and write
|
||
1FD59243000
|
trusted library allocation
|
page read and write
|
||
1FD523FB000
|
trusted library allocation
|
page read and write
|
||
1FD4D0FB000
|
trusted library allocation
|
page read and write
|
||
1FD51A8C000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD52E57000
|
trusted library allocation
|
page read and write
|
||
1FD51E7C000
|
trusted library allocation
|
page read and write
|
||
1FD5B748000
|
trusted library allocation
|
page read and write
|
||
1FD58F41000
|
trusted library allocation
|
page read and write
|
||
1FD50E9D000
|
trusted library allocation
|
page read and write
|
||
1FD52E13000
|
trusted library allocation
|
page read and write
|
||
1FD48058000
|
heap
|
page read and write
|
||
1FD594F1000
|
trusted library allocation
|
page read and write
|
||
1FD4805C000
|
heap
|
page read and write
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
1FD518F7000
|
trusted library allocation
|
page read and write
|
||
1FD48070000
|
heap
|
page read and write
|
||
1FD480B3000
|
heap
|
page read and write
|
||
43A000
|
stack
|
page read and write
|
||
1FD51E99000
|
trusted library allocation
|
page read and write
|
||
1FD480D3000
|
heap
|
page read and write
|
||
1FD480E1000
|
heap
|
page read and write
|
||
1FD50D24000
|
heap
|
page read and write
|
||
1FD51A7F000
|
trusted library allocation
|
page read and write
|
||
1FD51A4B000
|
trusted library allocation
|
page read and write
|
||
1FD480B8000
|
heap
|
page read and write
|
||
1FD4D118000
|
trusted library allocation
|
page read and write
|
||
1FD480CE000
|
heap
|
page read and write
|
||
256D90F1000
|
heap
|
page read and write
|
||
1FD525E0000
|
trusted library allocation
|
page read and write
|
||
1FD5D5FB000
|
trusted library allocation
|
page read and write
|
||
1FD58E78000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
21DD0800000
|
trusted library allocation
|
page read and write
|
||
1FD52A34000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
unkown
|
page write copy
|
||
1FD51A97000
|
trusted library allocation
|
page read and write
|
||
1FD52D94000
|
trusted library allocation
|
page read and write
|
||
1FD50CD6000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD58ED1000
|
trusted library allocation
|
page read and write
|
||
1FD51AC2000
|
trusted library allocation
|
page read and write
|
||
1FD4E91E000
|
trusted library allocation
|
page read and write
|
||
132927E000
|
stack
|
page read and write
|
||
1FD48071000
|
heap
|
page read and write
|
||
1FD59255000
|
trusted library allocation
|
page read and write
|
||
1FD4E82C000
|
trusted library allocation
|
page read and write
|
||
1FD5D518000
|
trusted library allocation
|
page read and write
|
||
1FD4E85A000
|
trusted library allocation
|
page read and write
|
||
1FD54899000
|
trusted library allocation
|
page read and write
|
||
1FD4806A000
|
heap
|
page read and write
|
||
1141F8D3000
|
heap
|
page read and write
|
||
1FD4E07C000
|
trusted library allocation
|
page read and write
|
||
1FD4E9D0000
|
trusted library allocation
|
page read and write
|
||
19B90B07000
|
trusted library allocation
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
1FD480C5000
|
heap
|
page read and write
|
||
1328A3E000
|
stack
|
page read and write
|
||
1FD5B7A7000
|
trusted library allocation
|
page read and write
|
||
1FD526FA000
|
trusted library allocation
|
page read and write
|
||
1FD52D8E000
|
trusted library allocation
|
page read and write
|
||
1FD592AB000
|
trusted library allocation
|
page read and write
|
||
1FD5336D000
|
trusted library allocation
|
page read and write
|
||
1FD5D266000
|
trusted library allocation
|
page read and write
|
||
1FD51EE3000
|
trusted library allocation
|
page read and write
|
||
1FD5AA9B000
|
trusted library allocation
|
page read and write
|
||
1FD4805B000
|
heap
|
page read and write
|
||
1FD4E3B9000
|
trusted library allocation
|
page read and write
|
||
1FD4FA81000
|
trusted library allocation
|
page read and write
|
||
1FD480B0000
|
heap
|
page read and write
|
||
1FD5AAC4000
|
trusted library allocation
|
page read and write
|
||
1FD52A19000
|
trusted library allocation
|
page read and write
|
||
1FD52DFC000
|
trusted library allocation
|
page read and write
|
||
1FD52FBF000
|
trusted library allocation
|
page read and write
|
||
1FD51EDE000
|
trusted library allocation
|
page read and write
|
||
1FD48068000
|
heap
|
page read and write
|
||
1FD4809A000
|
heap
|
page read and write
|
||
1FD52D9C000
|
trusted library allocation
|
page read and write
|
||
1FD4E232000
|
trusted library allocation
|
page read and write
|
||
1FD50D02000
|
heap
|
page read and write
|
||
1FD50D13000
|
heap
|
page read and write
|
||
1FD5D18E000
|
trusted library allocation
|
page read and write
|
||
1FD5D1A1000
|
trusted library allocation
|
page read and write
|
||
13281FE000
|
stack
|
page read and write
|
||
1FD5916A000
|
trusted library allocation
|
page read and write
|
||
1FD5D1DF000
|
trusted library allocation
|
page read and write
|
||
1FD48098000
|
heap
|
page read and write
|
||
1FD595A6000
|
trusted library allocation
|
page read and write
|
||
1FD5926D000
|
trusted library allocation
|
page read and write
|
||
1FD5919E000
|
trusted library allocation
|
page read and write
|
||
1FD58EC7000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD5ABE8000
|
trusted library allocation
|
page read and write
|
||
1FD5240E000
|
trusted library allocation
|
page read and write
|
||
1FD480DB000
|
heap
|
page read and write
|
||
1FD4FA3E000
|
trusted library allocation
|
page read and write
|
||
1FD48063000
|
heap
|
page read and write
|
||
1FD4806F000
|
heap
|
page read and write
|
||
256D8E42000
|
unkown
|
page execute read
|
||
1FD52DF6000
|
trusted library allocation
|
page read and write
|
||
1FD5D19B000
|
trusted library allocation
|
page read and write
|
||
1FD592EB000
|
trusted library allocation
|
page read and write
|
||
1FD4FAE0000
|
trusted library allocation
|
page read and write
|
||
1FD5D1D4000
|
trusted library allocation
|
page read and write
|
||
1FD48062000
|
heap
|
page read and write
|
||
1FD48077000
|
heap
|
page read and write
|
||
1141FB2F000
|
unclassified section
|
page read and write
|
||
1FD480BD000
|
heap
|
page read and write
|
||
1FD51EC4000
|
trusted library allocation
|
page read and write
|
||
3961000
|
heap
|
page read and write
|
||
1FD5909F000
|
trusted library allocation
|
page read and write
|
||
1FD54ACD000
|
trusted library allocation
|
page read and write
|
||
1FD4806B000
|
heap
|
page read and write
|
||
1FD51EF1000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD5CFAC000
|
trusted library allocation
|
page read and write
|
||
1FD48090000
|
heap
|
page read and write
|
||
1FD51AD5000
|
trusted library allocation
|
page read and write
|
||
1FD51E6D000
|
trusted library allocation
|
page read and write
|
||
1FD480D7000
|
heap
|
page read and write
|
||
1FD52CEE000
|
trusted library allocation
|
page read and write
|
||
256D9169000
|
heap
|
page read and write
|
||
1FD48079000
|
heap
|
page read and write
|
||
1FD52D23000
|
trusted library allocation
|
page read and write
|
||
CF2000
|
heap
|
page read and write
|
||
1FD48096000
|
heap
|
page read and write
|
||
1FD480EA000
|
heap
|
page read and write
|
||
1FD51EF1000
|
trusted library allocation
|
page read and write
|
||
1FD48073000
|
heap
|
page read and write
|
||
1FD51AB2000
|
trusted library allocation
|
page read and write
|
There are 3911 hidden memdumps, click here to show them.