Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_fbedf706-f8e1-4f72-9a4c-7751ca0d5ff3.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_fbedf706-f8e1-4f72-9a4c-7751ca0d5ff3.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 22422 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 22422 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\4886cf35-f13b-436c-8f88-460001a6b0a3
(copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\4886cf35-f13b-436c-8f88-460001a6b0a3.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 27 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2196 -parentBuildID 20230927232528 -prefsHandle 2108
-prefMapHandle 2100 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {5c4daa9b-a1d0-49df-b833-68d02750cc18} 1360 "\\.\pipe\gecko-crash-server-pipe.1360" 19fe596e910 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4284 -parentBuildID 20230927232528 -prefsHandle 2992
-prefMapHandle 4356 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d56eb04c-7f94-47f5-8980-12dd9ad4c01d}
1360 "\\.\pipe\gecko-crash-server-pipe.1360" 19ff7e6e710 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5040 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 4964 -prefMapHandle 4984 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {1de7083f-c361-4a27-8ccf-42b49249a843} 1360 "\\.\pipe\gecko-crash-server-pipe.1360" 19ff7537310 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://detectportal.firefox.com8
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://shavar.services.mozilla.comP
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warning
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://fpn.firefox.com
|
unknown
|
||
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
|
unknown
|
||
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://youtube.com/account?=https://accounts.google.co
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
http://www.inbox.lv/rfc2368/?value=%su
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
|
unknown
|
||
https://duckduckgo.com/?t=ffab&q=
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://truecolors.firefox.com/
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://relay.firefox.com/api/v1/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
|
unknown
|
||
https://topsites.services.mozilla.com/cid/
|
unknown
|
||
https://www.wykop.pl/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.0.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.193
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
52.222.236.80
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.186.110
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
142.250.186.46
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.193.140
|
||
ipv4only.arpa
|
192.0.0.170
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
52.222.236.80
|
services.addons.mozilla.org
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
142.250.186.110
|
youtube.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19FF73AC000
|
trusted library allocation
|
page read and write
|
||
19FF59AC000
|
trusted library allocation
|
page read and write
|
||
1A00132B000
|
trusted library allocation
|
page read and write
|
||
19FF76DB000
|
trusted library allocation
|
page read and write
|
||
19FF56A9000
|
heap
|
page read and write
|
||
19FF91A9000
|
trusted library allocation
|
page read and write
|
||
19FF6ABF000
|
trusted library allocation
|
page read and write
|
||
19FFDC88000
|
trusted library allocation
|
page read and write
|
||
19FF6D8B000
|
trusted library allocation
|
page read and write
|
||
19FF1623000
|
trusted library allocation
|
page read and write
|
||
19FF82CF000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FFFC68000
|
trusted library allocation
|
page read and write
|
||
19FF91F6000
|
trusted library allocation
|
page read and write
|
||
19FF532A000
|
trusted library allocation
|
page read and write
|
||
19FF767B000
|
trusted library allocation
|
page read and write
|
||
1A001DD3000
|
trusted library allocation
|
page read and write
|
||
19FF7460000
|
trusted library allocation
|
page read and write
|
||
19FFDC61000
|
trusted library allocation
|
page read and write
|
||
19FF564F000
|
heap
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FFF340000
|
trusted library allocation
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
96CCB9C000
|
trusted library allocation
|
page execute read
|
||
19FEC6EE000
|
heap
|
page read and write
|
||
19FF796A000
|
trusted library allocation
|
page read and write
|
||
19FF2C58000
|
trusted library allocation
|
page read and write
|
||
19FF8652000
|
trusted library allocation
|
page read and write
|
||
19FFDD56000
|
trusted library allocation
|
page read and write
|
||
19FEC6B5000
|
heap
|
page read and write
|
||
19FF74BE000
|
trusted library allocation
|
page read and write
|
||
19FF6C88000
|
trusted library allocation
|
page read and write
|
||
19FF8282000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF6C6D000
|
trusted library allocation
|
page read and write
|
||
19FF5733000
|
trusted library allocation
|
page read and write
|
||
19FF77A3000
|
trusted library allocation
|
page read and write
|
||
19FF77E2000
|
trusted library allocation
|
page read and write
|
||
19FF595C000
|
trusted library allocation
|
page read and write
|
||
19FF5BD4000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FF6FB0000
|
trusted library allocation
|
page read and write
|
||
19FF8539000
|
trusted library allocation
|
page read and write
|
||
19FF79B8000
|
trusted library allocation
|
page read and write
|
||
19FF6C29000
|
trusted library allocation
|
page read and write
|
||
19FFDCF2000
|
trusted library allocation
|
page read and write
|
||
19FF2C58000
|
trusted library allocation
|
page read and write
|
||
EA44BFE000
|
stack
|
page read and write
|
||
1A0003E3000
|
heap
|
page read and write
|
||
EA41BFB000
|
stack
|
page read and write
|
||
19FFDBCF000
|
trusted library allocation
|
page read and write
|
||
19FF2C58000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FF766B000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
33EC1FE000
|
stack
|
page read and write
|
||
19FFB6FB000
|
trusted library allocation
|
page read and write
|
||
1A0021AC000
|
trusted library allocation
|
page read and write
|
||
19FF769F000
|
trusted library allocation
|
page read and write
|
||
19FF85DC000
|
trusted library allocation
|
page read and write
|
||
19FF76E0000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FF5BAF000
|
trusted library allocation
|
page read and write
|
||
19FF5390000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FFDCE6000
|
trusted library allocation
|
page read and write
|
||
19FFDB55000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF78B4000
|
trusted library allocation
|
page read and write
|
||
1A562FE0000
|
heap
|
page read and write
|
||
19FF567F000
|
heap
|
page read and write
|
||
19FEC69A000
|
heap
|
page read and write
|
||
19FFFC7E000
|
trusted library allocation
|
page read and write
|
||
1A562FE3000
|
heap
|
page read and write
|
||
19FFDB76000
|
trusted library allocation
|
page read and write
|
||
19FEC6AB000
|
heap
|
page read and write
|
||
19FF7800000
|
trusted library allocation
|
page read and write
|
||
19FFFC1D000
|
trusted library allocation
|
page read and write
|
||
19FF75C1000
|
trusted library allocation
|
page read and write
|
||
19FF1782000
|
trusted library allocation
|
page read and write
|
||
19FF76BC000
|
trusted library allocation
|
page read and write
|
||
19FF9B92000
|
trusted library allocation
|
page read and write
|
||
19FF5EFA000
|
trusted library allocation
|
page read and write
|
||
19FF2A65000
|
trusted library allocation
|
page read and write
|
||
19FF58B9000
|
trusted library allocation
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FEC6C8000
|
heap
|
page read and write
|
||
19FF819D000
|
trusted library allocation
|
page read and write
|
||
19FF2CBA000
|
trusted library allocation
|
page read and write
|
||
1985220C000
|
trusted library allocation
|
page read and write
|
||
19FF6C40000
|
trusted library allocation
|
page read and write
|
||
19851FF0000
|
heap
|
page read and write
|
||
19FF7129000
|
trusted library allocation
|
page read and write
|
||
19FF2C8B000
|
trusted library allocation
|
page read and write
|
||
19FF77D8000
|
trusted library allocation
|
page read and write
|
||
19FFF394000
|
trusted library allocation
|
page read and write
|
||
19FF5698000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF2A73000
|
trusted library allocation
|
page read and write
|
||
19FFF88A000
|
trusted library allocation
|
page read and write
|
||
19FF5BAF000
|
trusted library allocation
|
page read and write
|
||
1FF4230A000
|
trusted library allocation
|
page read and write
|
||
19FF2C54000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF532A000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF50D3000
|
trusted library allocation
|
page read and write
|
||
19FF5B65000
|
trusted library allocation
|
page read and write
|
||
19FF74E9000
|
trusted library allocation
|
page read and write
|
||
19FF6C6D000
|
trusted library allocation
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FF5E85000
|
trusted library allocation
|
page read and write
|
||
19FF53DE000
|
trusted library allocation
|
page read and write
|
||
19FF28A8000
|
trusted library allocation
|
page read and write
|
||
19FEC6EB000
|
heap
|
page read and write
|
||
19FFDC77000
|
trusted library allocation
|
page read and write
|
||
19FF6B7A000
|
trusted library allocation
|
page read and write
|
||
19FFFC82000
|
trusted library allocation
|
page read and write
|
||
19FFDAC1000
|
trusted library allocation
|
page read and write
|
||
19FFFA00000
|
trusted library allocation
|
page read and write
|
||
19FFD94C000
|
trusted library allocation
|
page read and write
|
||
19FF7AD8000
|
trusted library allocation
|
page read and write
|
||
19FF2A93000
|
trusted library allocation
|
page read and write
|
||
19FF6D96000
|
trusted library allocation
|
page read and write
|
||
19FF71B4000
|
trusted library allocation
|
page read and write
|
||
19FF63F2000
|
trusted library allocation
|
page read and write
|
||
19FF825C000
|
trusted library allocation
|
page read and write
|
||
214A1EBD000
|
heap
|
page read and write
|
||
19FF5693000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FF5B85000
|
trusted library allocation
|
page read and write
|
||
19FF8659000
|
trusted library allocation
|
page read and write
|
||
19FF74FE000
|
trusted library allocation
|
page read and write
|
||
19FF9443000
|
trusted library allocation
|
page read and write
|
||
19FF5A76000
|
trusted library allocation
|
page read and write
|
||
19FF6B81000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF79F5000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF28DB000
|
trusted library allocation
|
page read and write
|
||
19FF56E0000
|
heap
|
page read and write
|
||
19FEC6A4000
|
heap
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FFDDD5000
|
trusted library allocation
|
page read and write
|
||
19FF2C4F000
|
trusted library allocation
|
page read and write
|
||
1A001EE6000
|
trusted library allocation
|
page read and write
|
||
19FFDBD5000
|
trusted library allocation
|
page read and write
|
||
19FF598D000
|
trusted library allocation
|
page read and write
|
||
19FF6B72000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF17E9000
|
trusted library allocation
|
page read and write
|
||
19FF1713000
|
trusted library allocation
|
page read and write
|
||
19FF77ED000
|
trusted library allocation
|
page read and write
|
||
19FF59CF000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF7958000
|
trusted library allocation
|
page read and write
|
||
19FF7130000
|
trusted library allocation
|
page read and write
|
||
19FF5E60000
|
trusted library allocation
|
page read and write
|
||
19FF7635000
|
trusted library allocation
|
page read and write
|
||
19FF8527000
|
trusted library allocation
|
page read and write
|
||
19FF6FED000
|
trusted library allocation
|
page read and write
|
||
19FF6360000
|
trusted library allocation
|
page read and write
|
||
19FF538F000
|
trusted library allocation
|
page read and write
|
||
2BFE56BA000
|
heap
|
page read and write
|
||
1A001E4E000
|
trusted library allocation
|
page read and write
|
||
19FF2CB5000
|
trusted library allocation
|
page read and write
|
||
19FF76DD000
|
trusted library allocation
|
page read and write
|
||
19FF748A000
|
trusted library allocation
|
page read and write
|
||
214A0EE0000
|
unclassified section
|
page readonly
|
||
19FFDBB0000
|
trusted library allocation
|
page read and write
|
||
19FF77F7000
|
trusted library allocation
|
page read and write
|
||
839103E000
|
unkown
|
page readonly
|
||
214A1A00000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FFF35A000
|
trusted library allocation
|
page read and write
|
||
19FEC6CC000
|
heap
|
page read and write
|
||
19FFB63C000
|
trusted library allocation
|
page read and write
|
||
19FF909B000
|
trusted library allocation
|
page read and write
|
||
19FF63B5000
|
trusted library allocation
|
page read and write
|
||
19FF6332000
|
trusted library allocation
|
page read and write
|
||
19FF915F000
|
trusted library allocation
|
page read and write
|
||
214A1F21000
|
heap
|
page read and write
|
||
19FF53C2000
|
trusted library allocation
|
page read and write
|
||
19FFF94B000
|
trusted library allocation
|
page read and write
|
||
19FF2CB4000
|
trusted library allocation
|
page read and write
|
||
214A108A000
|
heap
|
page read and write
|
||
19FF8583000
|
trusted library allocation
|
page read and write
|
||
1A002137000
|
trusted library allocation
|
page read and write
|
||
19FF56B1000
|
heap
|
page read and write
|
||
19FF9179000
|
trusted library allocation
|
page read and write
|
||
19FF50DF000
|
trusted library allocation
|
page read and write
|
||
19FF5BE3000
|
trusted library allocation
|
page read and write
|
||
19FF77DB000
|
trusted library allocation
|
page read and write
|
||
19FF77EB000
|
trusted library allocation
|
page read and write
|
||
19FF5094000
|
trusted library allocation
|
page read and write
|
||
19FF590D000
|
trusted library allocation
|
page read and write
|
||
1A001D9E000
|
trusted library allocation
|
page read and write
|
||
214A1860000
|
heap
|
page read and write
|
||
19FF6A96000
|
trusted library allocation
|
page read and write
|
||
19FF53E6000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FFB6FE000
|
trusted library allocation
|
page read and write
|
||
19FF71AB000
|
trusted library allocation
|
page read and write
|
||
19FF2CD7000
|
trusted library allocation
|
page read and write
|
||
19FF6FBA000
|
trusted library allocation
|
page read and write
|
||
19FF71C0000
|
trusted library allocation
|
page read and write
|
||
1A001DE3000
|
trusted library allocation
|
page read and write
|
||
19FF85A0000
|
trusted library allocation
|
page read and write
|
||
19FF2C7E000
|
trusted library allocation
|
page read and write
|
||
19FEC6EC000
|
heap
|
page read and write
|
||
19FF78C4000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF2A1B000
|
trusted library allocation
|
page read and write
|
||
F14000
|
heap
|
page read and write
|
||
19FFDB37000
|
trusted library allocation
|
page read and write
|
||
19FF76FD000
|
trusted library allocation
|
page read and write
|
||
19FFDB31000
|
trusted library allocation
|
page read and write
|
||
19FF7F8D000
|
trusted library allocation
|
page read and write
|
||
19FF6D61000
|
trusted library allocation
|
page read and write
|
||
19FF8273000
|
trusted library allocation
|
page read and write
|
||
19FFDCE6000
|
trusted library allocation
|
page read and write
|
||
19FF7691000
|
trusted library allocation
|
page read and write
|
||
1A001E8B000
|
trusted library allocation
|
page read and write
|
||
19FF74AC000
|
trusted library allocation
|
page read and write
|
||
19FFDAA1000
|
trusted library allocation
|
page read and write
|
||
839113E000
|
unkown
|
page readonly
|
||
19FF85A8000
|
trusted library allocation
|
page read and write
|
||
19FEC6E2000
|
heap
|
page read and write
|
||
19FF8081000
|
trusted library allocation
|
page read and write
|
||
19FF636F000
|
trusted library allocation
|
page read and write
|
||
19FFB688000
|
trusted library allocation
|
page read and write
|
||
1A563020000
|
heap
|
page readonly
|
||
1A00033F000
|
heap
|
page read and write
|
||
19FFD98D000
|
trusted library allocation
|
page read and write
|
||
19FF82A3000
|
trusted library allocation
|
page read and write
|
||
19FF5B84000
|
trusted library allocation
|
page read and write
|
||
2BFE71BE000
|
heap
|
page read and write
|
||
19FF7471000
|
trusted library allocation
|
page read and write
|
||
19FEC679000
|
heap
|
page read and write
|
||
19FFDAB4000
|
trusted library allocation
|
page read and write
|
||
214A1EA9000
|
heap
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF56A9000
|
heap
|
page read and write
|
||
19FEC69D000
|
heap
|
page read and write
|
||
19FF2CA7000
|
trusted library allocation
|
page read and write
|
||
19FF532A000
|
trusted library allocation
|
page read and write
|
||
19FF79E8000
|
trusted library allocation
|
page read and write
|
||
19FEC680000
|
heap
|
page read and write
|
||
19FEC6E4000
|
heap
|
page read and write
|
||
19FF5A9C000
|
trusted library allocation
|
page read and write
|
||
19852278000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
unkown
|
page readonly
|
||
19FF6C5E000
|
trusted library allocation
|
page read and write
|
||
19FF77BD000
|
trusted library allocation
|
page read and write
|
||
1A000505000
|
trusted library allocation
|
page read and write
|
||
1FF42200000
|
trusted library allocation
|
page read and write
|
||
1A001BE3000
|
trusted library allocation
|
page read and write
|
||
19FF858C000
|
trusted library allocation
|
page read and write
|
||
1A00054D000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FF5E56000
|
trusted library allocation
|
page read and write
|
||
19FF77F7000
|
trusted library allocation
|
page read and write
|
||
19851EB0000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF53CE000
|
trusted library allocation
|
page read and write
|
||
19FF2860000
|
trusted library allocation
|
page read and write
|
||
214A1F2D000
|
heap
|
page read and write
|
||
1A001373000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF7AD8000
|
trusted library allocation
|
page read and write
|
||
19FF79C2000
|
trusted library allocation
|
page read and write
|
||
19FF6B55000
|
trusted library allocation
|
page read and write
|
||
19FF8199000
|
trusted library allocation
|
page read and write
|
||
19FF6388000
|
trusted library allocation
|
page read and write
|
||
19FF5B9A000
|
trusted library allocation
|
page read and write
|
||
19FF85F9000
|
trusted library allocation
|
page read and write
|
||
19FF8045000
|
trusted library allocation
|
page read and write
|
||
19FF28B1000
|
trusted library allocation
|
page read and write
|
||
19FF770A000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF5BE3000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FF5A38000
|
trusted library allocation
|
page read and write
|
||
19FFDBB8000
|
trusted library allocation
|
page read and write
|
||
19FEC6EE000
|
heap
|
page read and write
|
||
1A5633F6000
|
heap
|
page read and write
|
||
19FF7478000
|
trusted library allocation
|
page read and write
|
||
19FFF93F000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
19FFF890000
|
trusted library allocation
|
page read and write
|
||
19FFDCF5000
|
trusted library allocation
|
page read and write
|
||
19FF74F2000
|
trusted library allocation
|
page read and write
|
||
19FF6B93000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF9B1B000
|
trusted library allocation
|
page read and write
|
||
1A563247000
|
trusted library allocation
|
page read and write
|
||
19FF770F000
|
trusted library allocation
|
page read and write
|
||
19FF63F2000
|
trusted library allocation
|
page read and write
|
||
19FFD9F9000
|
trusted library allocation
|
page read and write
|
||
19FF5333000
|
trusted library allocation
|
page read and write
|
||
19FF177D000
|
trusted library allocation
|
page read and write
|
||
1A5632EB000
|
trusted library allocation
|
page read and write
|
||
19FF6B7E000
|
trusted library allocation
|
page read and write
|
||
19FF53CD000
|
trusted library allocation
|
page read and write
|
||
214A1EA0000
|
heap
|
page read and write
|
||
1A00202F000
|
trusted library allocation
|
page read and write
|
||
19FF5EB8000
|
trusted library allocation
|
page read and write
|
||
19FF81F9000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF85CD000
|
trusted library allocation
|
page read and write
|
||
1A5632B9000
|
trusted library allocation
|
page read and write
|
||
19FF5B57000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF7119000
|
trusted library allocation
|
page read and write
|
||
19FF171B000
|
trusted library allocation
|
page read and write
|
||
19FEC6EE000
|
heap
|
page read and write
|
||
19FFB6FB000
|
trusted library allocation
|
page read and write
|
||
19FF6EBC000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
19FF76A2000
|
trusted library allocation
|
page read and write
|
||
19FF76E0000
|
trusted library allocation
|
page read and write
|
||
19FF7349000
|
trusted library allocation
|
page read and write
|
||
19FFDC43000
|
trusted library allocation
|
page read and write
|
||
214A1EF9000
|
heap
|
page read and write
|
||
19FF815E000
|
trusted library allocation
|
page read and write
|
||
19FF9501000
|
trusted library allocation
|
page read and write
|
||
19FF53F1000
|
trusted library allocation
|
page read and write
|
||
19FFDAA4000
|
trusted library allocation
|
page read and write
|
||
19FF5998000
|
trusted library allocation
|
page read and write
|
||
19FF794F000
|
trusted library allocation
|
page read and write
|
||
19FF82CF000
|
trusted library allocation
|
page read and write
|
||
19FF53AE000
|
trusted library allocation
|
page read and write
|
||
19FF74F4000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
214A1F26000
|
heap
|
page read and write
|
||
19FF6DBB000
|
trusted library allocation
|
page read and write
|
||
19FF7435000
|
trusted library allocation
|
page read and write
|
||
19FF6BDD000
|
trusted library allocation
|
page read and write
|
||
19FF5B8F000
|
trusted library allocation
|
page read and write
|
||
19FF6C6D000
|
trusted library allocation
|
page read and write
|
||
214A13AB000
|
trusted library allocation
|
page read and write
|
||
19FF74CE000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FFB682000
|
trusted library allocation
|
page read and write
|
||
19FF6D71000
|
trusted library allocation
|
page read and write
|
||
19FFDAAA000
|
trusted library allocation
|
page read and write
|
||
19FF74E0000
|
trusted library allocation
|
page read and write
|
||
C44B7FC000
|
stack
|
page read and write
|
||
19FFFA30000
|
trusted library allocation
|
page read and write
|
||
1FF42300000
|
trusted library allocation
|
page read and write
|
||
19FF71F5000
|
trusted library allocation
|
page read and write
|
||
19FFDB55000
|
trusted library allocation
|
page read and write
|
||
1A56326E000
|
trusted library allocation
|
page read and write
|
||
19FFD940000
|
trusted library allocation
|
page read and write
|
||
19FF2936000
|
trusted library allocation
|
page read and write
|
||
19FFDC7A000
|
trusted library allocation
|
page read and write
|
||
19FF766B000
|
trusted library allocation
|
page read and write
|
||
19FF6397000
|
trusted library allocation
|
page read and write
|
||
19FF53CD000
|
trusted library allocation
|
page read and write
|
||
19FFDCFE000
|
trusted library allocation
|
page read and write
|
||
19FF7616000
|
trusted library allocation
|
page read and write
|
||
19FF6BC5000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
198522B5000
|
trusted library allocation
|
page read and write
|
||
19FF6ABD000
|
trusted library allocation
|
page read and write
|
||
19FF2CAD000
|
trusted library allocation
|
page read and write
|
||
19FEC6A1000
|
heap
|
page read and write
|
||
19FF78C4000
|
trusted library allocation
|
page read and write
|
||
19FF79F5000
|
trusted library allocation
|
page read and write
|
||
214A1F84000
|
heap
|
page read and write
|
||
1A001B6E000
|
trusted library allocation
|
page read and write
|
||
19FF716A000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF5ECC000
|
trusted library allocation
|
page read and write
|
||
214A1F6A000
|
heap
|
page read and write
|
||
19FF794F000
|
trusted library allocation
|
page read and write
|
||
214A1F84000
|
heap
|
page read and write
|
||
19FF78DB000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF7745000
|
trusted library allocation
|
page read and write
|
||
19FF78EC000
|
trusted library allocation
|
page read and write
|
||
19FFFC12000
|
trusted library allocation
|
page read and write
|
||
19FEC6F4000
|
heap
|
page read and write
|
||
19FF28CB000
|
trusted library allocation
|
page read and write
|
||
19FF79DF000
|
trusted library allocation
|
page read and write
|
||
19FFDC73000
|
trusted library allocation
|
page read and write
|
||
19FEC6E2000
|
heap
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FEC6EB000
|
heap
|
page read and write
|
||
19FF5E52000
|
trusted library allocation
|
page read and write
|
||
19FEC730000
|
heap
|
page read and write
|
||
2BFE5700000
|
trusted library allocation
|
page read and write
|
||
19852270000
|
trusted library allocation
|
page read and write
|
||
19FF748F000
|
trusted library allocation
|
page read and write
|
||
19FF6B7A000
|
trusted library allocation
|
page read and write
|
||
19FF63A7000
|
trusted library allocation
|
page read and write
|
||
19FEC6E2000
|
heap
|
page read and write
|
||
19FF9407000
|
trusted library allocation
|
page read and write
|
||
19FF80F9000
|
trusted library allocation
|
page read and write
|
||
19FF76DB000
|
trusted library allocation
|
page read and write
|
||
19FF53BE000
|
trusted library allocation
|
page read and write
|
||
EA443FE000
|
stack
|
page read and write
|
||
19FF7FBC000
|
trusted library allocation
|
page read and write
|
||
1A001E99000
|
trusted library allocation
|
page read and write
|
||
C4D000
|
stack
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF636B000
|
trusted library allocation
|
page read and write
|
||
19FF7753000
|
trusted library allocation
|
page read and write
|
||
2BFE56BC000
|
heap
|
page read and write
|
||
19FF53C9000
|
trusted library allocation
|
page read and write
|
||
19FF6BD1000
|
trusted library allocation
|
page read and write
|
||
19FF8070000
|
trusted library allocation
|
page read and write
|
||
214A1EA0000
|
heap
|
page read and write
|
||
19FF6C6D000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF5654000
|
heap
|
page read and write
|
||
19FFDCD9000
|
trusted library allocation
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FF755B000
|
trusted library allocation
|
page read and write
|
||
19FF5EF1000
|
trusted library allocation
|
page read and write
|
||
19FF56A9000
|
heap
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF2C8B000
|
trusted library allocation
|
page read and write
|
||
19FF631B000
|
trusted library allocation
|
page read and write
|
||
19FF5B88000
|
trusted library allocation
|
page read and write
|
||
19FF6C26000
|
trusted library allocation
|
page read and write
|
||
1A002167000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FFB627000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FFDC1A000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FFDCBD000
|
trusted library allocation
|
page read and write
|
||
19FF78BF000
|
trusted library allocation
|
page read and write
|
||
19FF8290000
|
trusted library allocation
|
page read and write
|
||
1A001DF9000
|
trusted library allocation
|
page read and write
|
||
19FF6C5E000
|
trusted library allocation
|
page read and write
|
||
19FF79C6000
|
trusted library allocation
|
page read and write
|
||
1A001D57000
|
trusted library allocation
|
page read and write
|
||
19FF71C5000
|
trusted library allocation
|
page read and write
|
||
19FF77A2000
|
trusted library allocation
|
page read and write
|
||
19FF28C6000
|
trusted library allocation
|
page read and write
|
||
1A001DD4000
|
trusted library allocation
|
page read and write
|
||
19FEC710000
|
heap
|
page read and write
|
||
19FF6B97000
|
trusted library allocation
|
page read and write
|
||
19FF6BAA000
|
trusted library allocation
|
page read and write
|
||
19FF6B81000
|
trusted library allocation
|
page read and write
|
||
19FFDAB4000
|
trusted library allocation
|
page read and write
|
||
19FEC6E9000
|
heap
|
page read and write
|
||
1A000326000
|
heap
|
page read and write
|
||
19FF75C8000
|
trusted library allocation
|
page read and write
|
||
214A1F2D000
|
heap
|
page read and write
|
||
19FFF97C000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FF6C53000
|
trusted library allocation
|
page read and write
|
||
19FF6368000
|
trusted library allocation
|
page read and write
|
||
214A1232000
|
unclassified section
|
page read and write
|
||
19FF74A1000
|
trusted library allocation
|
page read and write
|
||
19FF562F000
|
heap
|
page read and write
|
||
19FF7EEF000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FF7DF8000
|
trusted library allocation
|
page read and write
|
||
19FFD9EF000
|
trusted library allocation
|
page read and write
|
||
19FEC697000
|
heap
|
page read and write
|
||
19FEC6B5000
|
heap
|
page read and write
|
||
19FF58D1000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FF9193000
|
trusted library allocation
|
page read and write
|
||
19FF5BFC000
|
trusted library allocation
|
page read and write
|
||
19FFDB31000
|
trusted library allocation
|
page read and write
|
||
19FF6BE1000
|
trusted library allocation
|
page read and write
|
||
1A563298000
|
trusted library allocation
|
page read and write
|
||
19FF8252000
|
trusted library allocation
|
page read and write
|
||
214A1EE8000
|
heap
|
page read and write
|
||
19FF78FB000
|
trusted library allocation
|
page read and write
|
||
19FF6BCB000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FFDCF5000
|
trusted library allocation
|
page read and write
|
||
EA43BFF000
|
stack
|
page read and write
|
||
19FFD952000
|
trusted library allocation
|
page read and write
|
||
19FEC679000
|
heap
|
page read and write
|
||
19FF289A000
|
trusted library allocation
|
page read and write
|
||
19FF2C8B000
|
trusted library allocation
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FF8191000
|
trusted library allocation
|
page read and write
|
||
19FF774D000
|
trusted library allocation
|
page read and write
|
||
214A1312000
|
trusted library allocation
|
page read and write
|
||
19FF6FE4000
|
trusted library allocation
|
page read and write
|
||
19FF718E000
|
trusted library allocation
|
page read and write
|
||
19FF807D000
|
trusted library allocation
|
page read and write
|
||
19FF2939000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FF6BC8000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF53A5000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF5EDF000
|
trusted library allocation
|
page read and write
|
||
19FFF3DF000
|
trusted library allocation
|
page read and write
|
||
214A1F31000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF77B3000
|
trusted library allocation
|
page read and write
|
||
19FF6C73000
|
trusted library allocation
|
page read and write
|
||
19FF765E000
|
trusted library allocation
|
page read and write
|
||
19FFB636000
|
trusted library allocation
|
page read and write
|
||
19FF81C4000
|
trusted library allocation
|
page read and write
|
||
19FF8537000
|
trusted library allocation
|
page read and write
|
||
19FFD800000
|
trusted library allocation
|
page read and write
|
||
214A1362000
|
trusted library allocation
|
page read and write
|
||
19FEC6F0000
|
heap
|
page read and write
|
||
19FFDC31000
|
trusted library allocation
|
page read and write
|
||
1A001BE3000
|
trusted library allocation
|
page read and write
|
||
19FF6AEE000
|
trusted library allocation
|
page read and write
|
||
19FF56BB000
|
heap
|
page read and write
|
||
EA433FF000
|
stack
|
page read and write
|
||
214A1F84000
|
heap
|
page read and write
|
||
19FF76E2000
|
trusted library allocation
|
page read and write
|
||
19FF766B000
|
trusted library allocation
|
page read and write
|
||
19FFFC7E000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF74C7000
|
trusted library allocation
|
page read and write
|
||
19FF568B000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF9D09000
|
heap
|
page read and write
|
||
19FF77A9000
|
trusted library allocation
|
page read and write
|
||
19FFDC77000
|
trusted library allocation
|
page read and write
|
||
1A001E99000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FFDDC8000
|
trusted library allocation
|
page read and write
|
||
19FFD9E1000
|
trusted library allocation
|
page read and write
|
||
19FFDC58000
|
trusted library allocation
|
page read and write
|
||
19FFB6B9000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
stack
|
page read and write
|
||
1A00171C000
|
trusted library allocation
|
page read and write
|
||
19FF78DB000
|
trusted library allocation
|
page read and write
|
||
19FF5A9C000
|
trusted library allocation
|
page read and write
|
||
19FEC6F0000
|
heap
|
page read and write
|
||
19FF861E000
|
trusted library allocation
|
page read and write
|
||
19FF7445000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
19FF56A1000
|
heap
|
page read and write
|
||
19FF6A3F000
|
trusted library allocation
|
page read and write
|
||
19FF2AB4000
|
trusted library allocation
|
page read and write
|
||
19FF53E2000
|
trusted library allocation
|
page read and write
|
||
19FFFA12000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF85EF000
|
trusted library allocation
|
page read and write
|
||
1A56325B000
|
trusted library allocation
|
page read and write
|
||
19FF8246000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF2CFC000
|
trusted library allocation
|
page read and write
|
||
19FFF94F000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF53BE000
|
trusted library allocation
|
page read and write
|
||
19FF5ECC000
|
trusted library allocation
|
page read and write
|
||
19FFFC24000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FEC701000
|
heap
|
page read and write
|
||
19FF8593000
|
trusted library allocation
|
page read and write
|
||
19FFDBF5000
|
trusted library allocation
|
page read and write
|
||
19FF10CC000
|
trusted library allocation
|
page read and write
|
||
19FEC6F0000
|
heap
|
page read and write
|
||
EA423FE000
|
stack
|
page read and write
|
||
19FF82FA000
|
trusted library allocation
|
page read and write
|
||
19FF6E53000
|
trusted library allocation
|
page read and write
|
||
19FEC6EE000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF56AD000
|
heap
|
page read and write
|
||
19851DB0000
|
unclassified section
|
page readonly
|
||
19FFF898000
|
trusted library allocation
|
page read and write
|
||
19FF6CC1000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FEC693000
|
heap
|
page read and write
|
||
19FF9B1B000
|
trusted library allocation
|
page read and write
|
||
19FFF92F000
|
trusted library allocation
|
page read and write
|
||
19FF77C6000
|
trusted library allocation
|
page read and write
|
||
214A1303000
|
trusted library allocation
|
page read and write
|
||
19FFD993000
|
trusted library allocation
|
page read and write
|
||
19FF53E2000
|
trusted library allocation
|
page read and write
|
||
19FF56A0000
|
heap
|
page read and write
|
||
19FF714A000
|
trusted library allocation
|
page read and write
|
||
19FF77C2000
|
trusted library allocation
|
page read and write
|
||
19FFF953000
|
trusted library allocation
|
page read and write
|
||
19FF637B000
|
trusted library allocation
|
page read and write
|
||
19FF6D17000
|
trusted library allocation
|
page read and write
|
||
19FEC6F0000
|
heap
|
page read and write
|
||
19FF503E000
|
trusted library allocation
|
page read and write
|
||
19FFDDAF000
|
trusted library allocation
|
page read and write
|
||
19FF91FE000
|
trusted library allocation
|
page read and write
|
||
96CCC41000
|
trusted library allocation
|
page execute read
|
||
19FF71AE000
|
trusted library allocation
|
page read and write
|
||
214A1F40000
|
heap
|
page read and write
|
||
19FFF8DA000
|
trusted library allocation
|
page read and write
|
||
19FFB62C000
|
trusted library allocation
|
page read and write
|
||
19FFFC15000
|
trusted library allocation
|
page read and write
|
||
19FF63AC000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF6377000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FF756E000
|
trusted library allocation
|
page read and write
|
||
19FF6BC3000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF53CD000
|
trusted library allocation
|
page read and write
|
||
19FF8539000
|
trusted library allocation
|
page read and write
|
||
19FF77C2000
|
trusted library allocation
|
page read and write
|
||
19FF7DF4000
|
trusted library allocation
|
page read and write
|
||
19FFB698000
|
trusted library allocation
|
page read and write
|
||
19FF6A8F000
|
trusted library allocation
|
page read and write
|
||
19FF6AA3000
|
trusted library allocation
|
page read and write
|
||
19FF6B81000
|
trusted library allocation
|
page read and write
|
||
19FF63ED000
|
trusted library allocation
|
page read and write
|
||
19FF6DB9000
|
trusted library allocation
|
page read and write
|
||
19FF2A6F000
|
trusted library allocation
|
page read and write
|
||
19FF71D4000
|
trusted library allocation
|
page read and write
|
||
19FF768F000
|
trusted library allocation
|
page read and write
|
||
19FF85DC000
|
trusted library allocation
|
page read and write
|
||
198522F4000
|
trusted library allocation
|
page read and write
|
||
19FFDDC5000
|
trusted library allocation
|
page read and write
|
||
19FF5E8D000
|
trusted library allocation
|
page read and write
|
||
19FFDB37000
|
trusted library allocation
|
page read and write
|
||
19FF861C000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF63ED000
|
trusted library allocation
|
page read and write
|
||
19FF54D2000
|
trusted library allocation
|
page read and write
|
||
19FF2A8B000
|
trusted library allocation
|
page read and write
|
||
214A123F000
|
unclassified section
|
page read and write
|
||
19FFDBF9000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF50B2000
|
trusted library allocation
|
page read and write
|
||
19FF56E0000
|
heap
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF5AA2000
|
trusted library allocation
|
page read and write
|
||
19FF7863000
|
trusted library allocation
|
page read and write
|
||
19FF7F22000
|
trusted library allocation
|
page read and write
|
||
19FF79E4000
|
trusted library allocation
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FFDCE8000
|
trusted library allocation
|
page read and write
|
||
33EEDBE000
|
stack
|
page read and write
|
||
19FF77C6000
|
trusted library allocation
|
page read and write
|
||
19FF53A0000
|
trusted library allocation
|
page read and write
|
||
19FF77E2000
|
trusted library allocation
|
page read and write
|
||
19FF6C46000
|
trusted library allocation
|
page read and write
|
||
19FF76FD000
|
trusted library allocation
|
page read and write
|
||
19FF74BE000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF637A000
|
trusted library allocation
|
page read and write
|
||
19FF77DF000
|
trusted library allocation
|
page read and write
|
||
214A1F7B000
|
heap
|
page read and write
|
||
1A001EC1000
|
trusted library allocation
|
page read and write
|
||
19FF7955000
|
trusted library allocation
|
page read and write
|
||
214A1060000
|
heap
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF9F13000
|
trusted library allocation
|
page read and write
|
||
19FFDB45000
|
trusted library allocation
|
page read and write
|
||
214A1210000
|
heap
|
page readonly
|
||
19FF71AE000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
10AB000
|
heap
|
page read and write
|
||
214A1EF9000
|
heap
|
page read and write
|
||
19FF63ED000
|
trusted library allocation
|
page read and write
|
||
19FEC6B7000
|
heap
|
page read and write
|
||
19FF5AA2000
|
trusted library allocation
|
page read and write
|
||
1A001A4D000
|
trusted library allocation
|
page read and write
|
||
19FF56AE000
|
heap
|
page read and write
|
||
19FF82A3000
|
trusted library allocation
|
page read and write
|
||
19FF53E6000
|
trusted library allocation
|
page read and write
|
||
19FF79FB000
|
trusted library allocation
|
page read and write
|
||
1A00209E000
|
trusted library allocation
|
page read and write
|
||
19FF85CD000
|
trusted library allocation
|
page read and write
|
||
19FF6C56000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FF5047000
|
trusted library allocation
|
page read and write
|
||
19FF5B94000
|
trusted library allocation
|
page read and write
|
||
19FF2A70000
|
trusted library allocation
|
page read and write
|
||
19FF53A7000
|
trusted library allocation
|
page read and write
|
||
1A56327B000
|
trusted library allocation
|
page read and write
|
||
214A1A14000
|
trusted library allocation
|
page read and write
|
||
19FF8523000
|
trusted library allocation
|
page read and write
|
||
19FF93C8000
|
trusted library allocation
|
page read and write
|
||
19FF6B7A000
|
trusted library allocation
|
page read and write
|
||
19FF62B4000
|
trusted library allocation
|
page read and write
|
||
19FF5F23000
|
trusted library allocation
|
page read and write
|
||
19FF5BBF000
|
trusted library allocation
|
page read and write
|
||
19FF6B6B000
|
trusted library allocation
|
page read and write
|
||
19FF76E8000
|
trusted library allocation
|
page read and write
|
||
19FF7FB9000
|
trusted library allocation
|
page read and write
|
||
19FFDCD3000
|
trusted library allocation
|
page read and write
|
||
19FFDC08000
|
trusted library allocation
|
page read and write
|
||
19FF94C5000
|
trusted library allocation
|
page read and write
|
||
19FF82E0000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FF6C3B000
|
trusted library allocation
|
page read and write
|
||
19FF2CE0000
|
trusted library allocation
|
page read and write
|
||
19FF868E000
|
trusted library allocation
|
page read and write
|
||
1A5632B4000
|
trusted library allocation
|
page read and write
|
||
19FEC6E9000
|
heap
|
page read and write
|
||
1A001E96000
|
trusted library allocation
|
page read and write
|
||
1A001D9A000
|
trusted library allocation
|
page read and write
|
||
19FF77D4000
|
trusted library allocation
|
page read and write
|
||
19FF769F000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FEC6B7000
|
heap
|
page read and write
|
||
19FF5022000
|
trusted library allocation
|
page read and write
|
||
19FF5BCF000
|
trusted library allocation
|
page read and write
|
||
19FF7F63000
|
trusted library allocation
|
page read and write
|
||
19FF56A8000
|
heap
|
page read and write
|
||
83911BE000
|
unkown
|
page readonly
|
||
214A13A4000
|
trusted library allocation
|
page read and write
|
||
19FFD92E000
|
trusted library allocation
|
page read and write
|
||
19FF79C2000
|
trusted library allocation
|
page read and write
|
||
19FF6D73000
|
trusted library allocation
|
page read and write
|
||
19FF53E2000
|
trusted library allocation
|
page read and write
|
||
19852334000
|
heap
|
page read and write
|
||
1A562E70000
|
remote allocation
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FF6C63000
|
trusted library allocation
|
page read and write
|
||
19FF82F8000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF7F63000
|
trusted library allocation
|
page read and write
|
||
1A0002D1000
|
trusted library allocation
|
page read and write
|
||
19FFDCF2000
|
trusted library allocation
|
page read and write
|
||
19FFDB6B000
|
trusted library allocation
|
page read and write
|
||
19FF5684000
|
heap
|
page read and write
|
||
19FF734F000
|
trusted library allocation
|
page read and write
|
||
19FF5692000
|
heap
|
page read and write
|
||
19FFDCDD000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF852A000
|
trusted library allocation
|
page read and write
|
||
19FF5EDF000
|
trusted library allocation
|
page read and write
|
||
19FF6E93000
|
trusted library allocation
|
page read and write
|
||
1A001DCF000
|
trusted library allocation
|
page read and write
|
||
19FF6D85000
|
trusted library allocation
|
page read and write
|
||
19FFDBC6000
|
trusted library allocation
|
page read and write
|
||
19FF76F7000
|
trusted library allocation
|
page read and write
|
||
19FF56A9000
|
heap
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FF53B1000
|
trusted library allocation
|
page read and write
|
||
19FF71F9000
|
trusted library allocation
|
page read and write
|
||
1A00037E000
|
heap
|
page read and write
|
||
214A1F62000
|
heap
|
page read and write
|
||
19FF56A8000
|
heap
|
page read and write
|
||
214A1F84000
|
heap
|
page read and write
|
||
2BFE56BA000
|
heap
|
page read and write
|
||
1A0013FB000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF5E5B000
|
trusted library allocation
|
page read and write
|
||
19FF6B93000
|
trusted library allocation
|
page read and write
|
||
19FEC6EE000
|
heap
|
page read and write
|
||
19FEC6E9000
|
heap
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FF6BAA000
|
trusted library allocation
|
page read and write
|
||
838EDCE000
|
stack
|
page read and write
|
||
19FF7976000
|
trusted library allocation
|
page read and write
|
||
19FF56A8000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
1A001AB0000
|
trusted library allocation
|
page read and write
|
||
19FF596A000
|
trusted library allocation
|
page read and write
|
||
214A12F7000
|
unkown
|
page execute read
|
||
19FF2868000
|
trusted library allocation
|
page read and write
|
||
19FF2CE9000
|
trusted library allocation
|
page read and write
|
||
19FFF8DE000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF77C2000
|
trusted library allocation
|
page read and write
|
||
19FEC6E7000
|
heap
|
page read and write
|
||
19FF2CE9000
|
trusted library allocation
|
page read and write
|
||
19FEC6A4000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FEC679000
|
heap
|
page read and write
|
||
1A001392000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FFDCC8000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF53BE000
|
trusted library allocation
|
page read and write
|
||
19FFDAAA000
|
trusted library allocation
|
page read and write
|
||
19FF53A5000
|
trusted library allocation
|
page read and write
|
||
19FF76BE000
|
trusted library allocation
|
page read and write
|
||
1A562E10000
|
unclassified section
|
page readonly
|
||
1A0005E4000
|
trusted library allocation
|
page read and write
|
||
1A001E96000
|
trusted library allocation
|
page read and write
|
||
19FF82F8000
|
trusted library allocation
|
page read and write
|
||
19FF9198000
|
trusted library allocation
|
page read and write
|
||
1A001ED9000
|
trusted library allocation
|
page read and write
|
||
19FF74AE000
|
trusted library allocation
|
page read and write
|
||
1A001E96000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FFDCF2000
|
trusted library allocation
|
page read and write
|
||
19FF56CC000
|
heap
|
page read and write
|
||
19FF9B27000
|
trusted library allocation
|
page read and write
|
||
19FF53A5000
|
trusted library allocation
|
page read and write
|
||
19FF6C36000
|
trusted library allocation
|
page read and write
|
||
19FF50DC000
|
trusted library allocation
|
page read and write
|
||
96CCC31000
|
trusted library allocation
|
page execute read
|
||
19FF77BA000
|
trusted library allocation
|
page read and write
|
||
19FF7682000
|
trusted library allocation
|
page read and write
|
||
1A001EC1000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF6C52000
|
trusted library allocation
|
page read and write
|
||
19FEC6B1000
|
heap
|
page read and write
|
||
19FF6C49000
|
trusted library allocation
|
page read and write
|
||
1A00036A000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FF5ACB000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF6C56000
|
trusted library allocation
|
page read and write
|
||
19FF5AA2000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
19FF7EF1000
|
trusted library allocation
|
page read and write
|
||
19851FD0000
|
heap
|
page readonly
|
||
19FF82FC000
|
trusted library allocation
|
page read and write
|
||
19FF5098000
|
trusted library allocation
|
page read and write
|
||
214A1FA9000
|
heap
|
page read and write
|
||
19FF6393000
|
trusted library allocation
|
page read and write
|
||
19FF76E0000
|
trusted library allocation
|
page read and write
|
||
19FF8662000
|
trusted library allocation
|
page read and write
|
||
19FFDCE8000
|
trusted library allocation
|
page read and write
|
||
19851FE2000
|
unclassified section
|
page read and write
|
||
19FF2CAD000
|
trusted library allocation
|
page read and write
|
||
19FF53E2000
|
trusted library allocation
|
page read and write
|
||
1A001793000
|
trusted library allocation
|
page read and write
|
||
19FEC6F9000
|
heap
|
page read and write
|
||
19FF76F5000
|
trusted library allocation
|
page read and write
|
||
19FF2CE9000
|
trusted library allocation
|
page read and write
|
||
19FFB6FB000
|
trusted library allocation
|
page read and write
|
||
19FFDDD5000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF6BDD000
|
trusted library allocation
|
page read and write
|
||
599000
|
stack
|
page read and write
|
||
19FEC686000
|
heap
|
page read and write
|
||
19FF6BD1000
|
trusted library allocation
|
page read and write
|
||
19FF53A7000
|
trusted library allocation
|
page read and write
|
||
19FF53A7000
|
trusted library allocation
|
page read and write
|
||
19FF8051000
|
trusted library allocation
|
page read and write
|
||
1A001B4D000
|
trusted library allocation
|
page read and write
|
||
19FF6F04000
|
trusted library allocation
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
1A0005C5000
|
trusted library allocation
|
page read and write
|
||
19852200000
|
trusted library allocation
|
page read and write
|
||
19FF6FBE000
|
trusted library allocation
|
page read and write
|
||
19FF91AE000
|
trusted library allocation
|
page read and write
|
||
19FFD991000
|
trusted library allocation
|
page read and write
|
||
1FF42307000
|
trusted library allocation
|
page read and write
|
||
1985225D000
|
trusted library allocation
|
page read and write
|
||
19FF2AB4000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
214A12D7000
|
unkown
|
page execute read
|
||
19FEC6AB000
|
heap
|
page read and write
|
||
19FFD995000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF91F8000
|
trusted library allocation
|
page read and write
|
||
214A1F31000
|
heap
|
page read and write
|
||
19FF596A000
|
trusted library allocation
|
page read and write
|
||
214A0ED0000
|
unclassified section
|
page readonly
|
||
19FF7DF8000
|
trusted library allocation
|
page read and write
|
||
19FFDDD9000
|
trusted library allocation
|
page read and write
|
||
19FF7331000
|
trusted library allocation
|
page read and write
|
||
1A0002C4000
|
trusted library allocation
|
page read and write
|
||
19FFF947000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FF2CE3000
|
trusted library allocation
|
page read and write
|
||
19FF73B5000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FEC690000
|
heap
|
page read and write
|
||
19FF75EF000
|
trusted library allocation
|
page read and write
|
||
19FFD9BB000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF2C44000
|
trusted library allocation
|
page read and write
|
||
19FFDCDB000
|
trusted library allocation
|
page read and write
|
||
19FEC6A7000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF7CF7000
|
trusted library allocation
|
page read and write
|
||
19FF178C000
|
trusted library allocation
|
page read and write
|
||
19FF5BA8000
|
trusted library allocation
|
page read and write
|
||
19FFDDE8000
|
trusted library allocation
|
page read and write
|
||
1FF42400000
|
heap
|
page read and write
|
||
19FF9B3F000
|
trusted library allocation
|
page read and write
|
||
19FF5EDF000
|
trusted library allocation
|
page read and write
|
||
19FFF953000
|
trusted library allocation
|
page read and write
|
||
19FF81E4000
|
trusted library allocation
|
page read and write
|
||
19FFDCC1000
|
trusted library allocation
|
page read and write
|
||
1A563403000
|
trusted library allocation
|
page read and write
|
||
19FF2CE0000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
19FF5BAF000
|
trusted library allocation
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FF7913000
|
trusted library allocation
|
page read and write
|
||
19FF5654000
|
heap
|
page read and write
|
||
1A001B73000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF5A9C000
|
trusted library allocation
|
page read and write
|
||
19FF8511000
|
trusted library allocation
|
page read and write
|
||
19FF769C000
|
trusted library allocation
|
page read and write
|
||
19FF748F000
|
trusted library allocation
|
page read and write
|
||
19FF50E4000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF77AD000
|
trusted library allocation
|
page read and write
|
||
19FF5BCF000
|
trusted library allocation
|
page read and write
|
||
19FFDAF2000
|
trusted library allocation
|
page read and write
|
||
19FF5031000
|
trusted library allocation
|
page read and write
|
||
19FF5E3D000
|
trusted library allocation
|
page read and write
|
||
19FFF9D9000
|
trusted library allocation
|
page read and write
|
||
19FF71D2000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF16FE000
|
trusted library allocation
|
page read and write
|
||
19FF86BD000
|
trusted library allocation
|
page read and write
|
||
19FEC694000
|
heap
|
page read and write
|
||
19FF7966000
|
trusted library allocation
|
page read and write
|
||
19FF91A9000
|
trusted library allocation
|
page read and write
|
||
19FF17AF000
|
trusted library allocation
|
page read and write
|
||
19FEC6AB000
|
heap
|
page read and write
|
||
214A1FA7000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF2C58000
|
trusted library allocation
|
page read and write
|
||
19FFDCBF000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FF7104000
|
trusted library allocation
|
page read and write
|
||
19FF85E8000
|
trusted library allocation
|
page read and write
|
||
19FF6CDB000
|
trusted library allocation
|
page read and write
|
||
19FF2CE0000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF6C5F000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
214A0F4E000
|
remote allocation
|
page execute read
|
||
19FEC692000
|
heap
|
page read and write
|
||
214A1F31000
|
heap
|
page read and write
|
||
19FFDAF2000
|
trusted library allocation
|
page read and write
|
||
19FF6E7F000
|
trusted library allocation
|
page read and write
|
||
19FF9F25000
|
trusted library allocation
|
page read and write
|
||
19FF53C9000
|
trusted library allocation
|
page read and write
|
||
19FFF991000
|
trusted library allocation
|
page read and write
|
||
19FF50B2000
|
trusted library allocation
|
page read and write
|
||
19FF76BC000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
1A002150000
|
trusted library allocation
|
page read and write
|
||
19FF804B000
|
trusted library allocation
|
page read and write
|
||
2BFE71C1000
|
heap
|
page read and write
|
||
19FFD9E1000
|
trusted library allocation
|
page read and write
|
||
19FF85C7000
|
trusted library allocation
|
page read and write
|
||
19FFDCB8000
|
trusted library allocation
|
page read and write
|
||
19FF76FD000
|
trusted library allocation
|
page read and write
|
||
19FEC687000
|
heap
|
page read and write
|
||
19FF6D69000
|
trusted library allocation
|
page read and write
|
||
214A1F2D000
|
heap
|
page read and write
|
||
19FFD94E000
|
trusted library allocation
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FFDB0F000
|
trusted library allocation
|
page read and write
|
||
19FF5E56000
|
trusted library allocation
|
page read and write
|
||
1A001EB1000
|
trusted library allocation
|
page read and write
|
||
19FF7663000
|
trusted library allocation
|
page read and write
|
||
1A00062C000
|
trusted library allocation
|
page read and write
|
||
19FEC6E8000
|
heap
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FF7764000
|
trusted library allocation
|
page read and write
|
||
19FF6C58000
|
trusted library allocation
|
page read and write
|
||
19FF7745000
|
trusted library allocation
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FF5BCF000
|
trusted library allocation
|
page read and write
|
||
19FF631E000
|
trusted library allocation
|
page read and write
|
||
19FF79EF000
|
trusted library allocation
|
page read and write
|
||
1A001E8B000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FFF3B2000
|
trusted library allocation
|
page read and write
|
||
19FF78FB000
|
trusted library allocation
|
page read and write
|
||
19FF7656000
|
trusted library allocation
|
page read and write
|
||
1FF42060000
|
heap
|
page read and write
|
||
19FF826F000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
unkown
|
page readonly
|
||
19FEC6DF000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF74BE000
|
trusted library allocation
|
page read and write
|
||
1A000543000
|
trusted library allocation
|
page read and write
|
||
19FF9096000
|
trusted library allocation
|
page read and write
|
||
19FEC690000
|
heap
|
page read and write
|
||
1A5632CB000
|
trusted library allocation
|
page read and write
|
||
19FF17A0000
|
trusted library allocation
|
page read and write
|
||
19FF94A3000
|
trusted library allocation
|
page read and write
|
||
19FF6368000
|
trusted library allocation
|
page read and write
|
||
198522F0000
|
trusted library allocation
|
page read and write
|
||
19FF5BDF000
|
trusted library allocation
|
page read and write
|
||
19FF768F000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF6CC9000
|
trusted library allocation
|
page read and write
|
||
19FFF34C000
|
trusted library allocation
|
page read and write
|
||
214A1230000
|
unclassified section
|
page read and write
|
||
19FFD94A000
|
trusted library allocation
|
page read and write
|
||
19FF7CD9000
|
trusted library allocation
|
page read and write
|
||
214A0F70000
|
heap
|
page read and write
|
||
19FF6E98000
|
trusted library allocation
|
page read and write
|
||
19FF53C7000
|
trusted library allocation
|
page read and write
|
||
19FF795E000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FFFC53000
|
trusted library allocation
|
page read and write
|
||
19FF6C50000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF6D65000
|
trusted library allocation
|
page read and write
|
||
19FF8534000
|
trusted library allocation
|
page read and write
|
||
214A1F3D000
|
heap
|
page read and write
|
||
19FEC684000
|
heap
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF10D4000
|
trusted library allocation
|
page read and write
|
||
19FEC6B7000
|
heap
|
page read and write
|
||
19FF17D5000
|
trusted library allocation
|
page read and write
|
||
19FF28A3000
|
trusted library allocation
|
page read and write
|
||
19FF946D000
|
trusted library allocation
|
page read and write
|
||
1A0002C2000
|
trusted library allocation
|
page read and write
|
||
19FF6E90000
|
trusted library allocation
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FF7966000
|
trusted library allocation
|
page read and write
|
||
19FF5998000
|
trusted library allocation
|
page read and write
|
||
19FFB634000
|
trusted library allocation
|
page read and write
|
||
19FF851B000
|
trusted library allocation
|
page read and write
|
||
19FF5695000
|
heap
|
page read and write
|
||
2BFE54F0000
|
heap
|
page read and write
|
||
19FFB680000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
2BFE590A000
|
trusted library allocation
|
page read and write
|
||
19FF59AF000
|
trusted library allocation
|
page read and write
|
||
1A001A85000
|
trusted library allocation
|
page read and write
|
||
19FF74D4000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF79F5000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF7691000
|
trusted library allocation
|
page read and write
|
||
19FF6BDD000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF597E000
|
trusted library allocation
|
page read and write
|
||
19FFDB41000
|
trusted library allocation
|
page read and write
|
||
19FF5BCB000
|
trusted library allocation
|
page read and write
|
||
19FF596A000
|
trusted library allocation
|
page read and write
|
||
19FF829A000
|
trusted library allocation
|
page read and write
|
||
19FF6D91000
|
trusted library allocation
|
page read and write
|
||
19FF79EF000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF53C9000
|
trusted library allocation
|
page read and write
|
||
19FF6E84000
|
trusted library allocation
|
page read and write
|
||
19FFF38F000
|
trusted library allocation
|
page read and write
|
||
839117E000
|
stack
|
page read and write
|
||
19FF5E3D000
|
trusted library allocation
|
page read and write
|
||
19FF8195000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
1A0002BE000
|
trusted library allocation
|
page read and write
|
||
214A1EAC000
|
heap
|
page read and write
|
||
1A563266000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FFDBD3000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF9F2B000
|
trusted library allocation
|
page read and write
|
||
B06FFE1E000
|
trusted library allocation
|
page read and write
|
||
19FF2C42000
|
trusted library allocation
|
page read and write
|
||
19FF53A7000
|
trusted library allocation
|
page read and write
|
||
1A001A89000
|
trusted library allocation
|
page read and write
|
||
198522B1000
|
trusted library allocation
|
page read and write
|
||
10B1000
|
heap
|
page read and write
|
||
19FFDA9B000
|
trusted library allocation
|
page read and write
|
||
19FF76DD000
|
trusted library allocation
|
page read and write
|
||
19FF6E9D000
|
trusted library allocation
|
page read and write
|
||
19FF730E000
|
trusted library allocation
|
page read and write
|
||
19FFDB62000
|
trusted library allocation
|
page read and write
|
||
19FF63C0000
|
trusted library allocation
|
page read and write
|
||
19FF5ED2000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF6B91000
|
trusted library allocation
|
page read and write
|
||
19FFB6B1000
|
trusted library allocation
|
page read and write
|
||
214A1EA4000
|
heap
|
page read and write
|
||
19FF50AA000
|
trusted library allocation
|
page read and write
|
||
19FF53AE000
|
trusted library allocation
|
page read and write
|
||
19FF86D1000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF769C000
|
trusted library allocation
|
page read and write
|
||
1A5633F4000
|
heap
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FFB6F1000
|
trusted library allocation
|
page read and write
|
||
1A001B3B000
|
trusted library allocation
|
page read and write
|
||
19FFDB81000
|
trusted library allocation
|
page read and write
|
||
19FF76E0000
|
trusted library allocation
|
page read and write
|
||
19FFF99F000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
1A001AB0000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF53C7000
|
trusted library allocation
|
page read and write
|
||
19FF2866000
|
trusted library allocation
|
page read and write
|
||
19FF53A7000
|
trusted library allocation
|
page read and write
|
||
19FF710A000
|
trusted library allocation
|
page read and write
|
||
1A001A2F000
|
trusted library allocation
|
page read and write
|
||
19FF2A29000
|
trusted library allocation
|
page read and write
|
||
19FF79C6000
|
trusted library allocation
|
page read and write
|
||
19FF5BAF000
|
trusted library allocation
|
page read and write
|
||
19FF5BBF000
|
trusted library allocation
|
page read and write
|
||
1A001E75000
|
trusted library allocation
|
page read and write
|
||
1A00056D000
|
trusted library allocation
|
page read and write
|
||
19FFDBD7000
|
trusted library allocation
|
page read and write
|
||
19FF796C000
|
trusted library allocation
|
page read and write
|
||
19FF6C32000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF6C67000
|
trusted library allocation
|
page read and write
|
||
19FF857D000
|
trusted library allocation
|
page read and write
|
||
19FF6B6B000
|
trusted library allocation
|
page read and write
|
||
19FFDAF2000
|
trusted library allocation
|
page read and write
|
||
214A1FA7000
|
heap
|
page read and write
|
||
19FFFA28000
|
trusted library allocation
|
page read and write
|
||
19FF6C50000
|
trusted library allocation
|
page read and write
|
||
214A1323000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FFF824000
|
trusted library allocation
|
page read and write
|
||
19FFDDD5000
|
trusted library allocation
|
page read and write
|
||
19FF5E62000
|
trusted library allocation
|
page read and write
|
||
19FF76BC000
|
trusted library allocation
|
page read and write
|
||
19FF716A000
|
trusted library allocation
|
page read and write
|
||
19FFDCD0000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
1A000371000
|
heap
|
page read and write
|
||
19FF91AE000
|
trusted library allocation
|
page read and write
|
||
19FFF92B000
|
trusted library allocation
|
page read and write
|
||
1A000601000
|
trusted library allocation
|
page read and write
|
||
19FF5E98000
|
trusted library allocation
|
page read and write
|
||
19FF76DD000
|
trusted library allocation
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FF9F31000
|
trusted library allocation
|
page read and write
|
||
19FF85E8000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF53AE000
|
trusted library allocation
|
page read and write
|
||
19FF5BCB000
|
trusted library allocation
|
page read and write
|
||
19FF53A7000
|
trusted library allocation
|
page read and write
|
||
19FF76DB000
|
trusted library allocation
|
page read and write
|
||
19FF85EF000
|
trusted library allocation
|
page read and write
|
||
19FF53DE000
|
trusted library allocation
|
page read and write
|
||
19FF5BE9000
|
trusted library allocation
|
page read and write
|
||
C44C7FF000
|
stack
|
page read and write
|
||
19FF5B4A000
|
trusted library allocation
|
page read and write
|
||
19FF76DB000
|
trusted library allocation
|
page read and write
|
||
19FF82FC000
|
trusted library allocation
|
page read and write
|
||
1A563264000
|
trusted library allocation
|
page read and write
|
||
19FF53AE000
|
trusted library allocation
|
page read and write
|
||
19FEC6E4000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
19FFDD9F000
|
trusted library allocation
|
page read and write
|
||
19FF74A1000
|
trusted library allocation
|
page read and write
|
||
19FEC6E5000
|
heap
|
page read and write
|
||
19FF79EA000
|
trusted library allocation
|
page read and write
|
||
19FF53AE000
|
trusted library allocation
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FF2A7F000
|
trusted library allocation
|
page read and write
|
||
19FF7708000
|
trusted library allocation
|
page read and write
|
||
19FF5025000
|
trusted library allocation
|
page read and write
|
||
19FFDA97000
|
trusted library allocation
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
1A56322E000
|
trusted library allocation
|
page read and write
|
||
19FF6E82000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FFFCFC000
|
trusted library allocation
|
page read and write
|
||
19FF77A8000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF5BC5000
|
trusted library allocation
|
page read and write
|
||
19FF745C000
|
trusted library allocation
|
page read and write
|
||
19FF6BB2000
|
trusted library allocation
|
page read and write
|
||
19FF7713000
|
trusted library allocation
|
page read and write
|
||
19FF8534000
|
trusted library allocation
|
page read and write
|
||
19FFF996000
|
trusted library allocation
|
page read and write
|
||
214A1F98000
|
heap
|
page read and write
|
||
19FF7FD4000
|
trusted library allocation
|
page read and write
|
||
19FF75ED000
|
trusted library allocation
|
page read and write
|
||
19FF77BD000
|
trusted library allocation
|
page read and write
|
||
214A1F32000
|
heap
|
page read and write
|
||
19FF6E9D000
|
trusted library allocation
|
page read and write
|
||
19852503000
|
trusted library allocation
|
page read and write
|
||
19FF82C6000
|
trusted library allocation
|
page read and write
|
||
19FF8539000
|
trusted library allocation
|
page read and write
|
||
19FEC701000
|
heap
|
page read and write
|
||
19FF6339000
|
trusted library allocation
|
page read and write
|
||
19FFD83C000
|
trusted library allocation
|
page read and write
|
||
19FFDCF5000
|
trusted library allocation
|
page read and write
|
||
19FFDCEF000
|
trusted library allocation
|
page read and write
|
||
19FF82A3000
|
trusted library allocation
|
page read and write
|
||
1A002193000
|
trusted library allocation
|
page read and write
|
||
1A00035C000
|
heap
|
page read and write
|
||
19FF7642000
|
trusted library allocation
|
page read and write
|
||
19FF5AA2000
|
trusted library allocation
|
page read and write
|
||
19FF53B8000
|
trusted library allocation
|
page read and write
|
||
214A1EBD000
|
heap
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF6B59000
|
trusted library allocation
|
page read and write
|
||
19FF1775000
|
trusted library allocation
|
page read and write
|
||
19FF63AF000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF76E0000
|
trusted library allocation
|
page read and write
|
||
19FF82CF000
|
trusted library allocation
|
page read and write
|
||
19FF53A5000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF6C58000
|
trusted library allocation
|
page read and write
|
||
1A0013CC000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF812A000
|
trusted library allocation
|
page read and write
|
||
214A10C0000
|
heap
|
page read and write
|
||
19FF56A8000
|
heap
|
page read and write
|
||
19FF28C6000
|
trusted library allocation
|
page read and write
|
||
19FF825E000
|
trusted library allocation
|
page read and write
|
||
19852262000
|
trusted library allocation
|
page read and write
|
||
19FEC6E4000
|
heap
|
page read and write
|
||
19FFD9F9000
|
trusted library allocation
|
page read and write
|
||
19FFF342000
|
trusted library allocation
|
page read and write
|
||
19FF5BD8000
|
trusted library allocation
|
page read and write
|
||
19FF75EA000
|
trusted library allocation
|
page read and write
|
||
19FF76F7000
|
trusted library allocation
|
page read and write
|
||
19FF536F000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF5690000
|
heap
|
page read and write
|
||
1A001E43000
|
trusted library allocation
|
page read and write
|
||
19FF825C000
|
trusted library allocation
|
page read and write
|
||
1A001AC3000
|
trusted library allocation
|
page read and write
|
||
19FF5374000
|
trusted library allocation
|
page read and write
|
||
19FF74CC000
|
trusted library allocation
|
page read and write
|
||
19FF76DD000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
839423E000
|
unkown
|
page readonly
|
||
19FFDB7B000
|
trusted library allocation
|
page read and write
|
||
19FF819B000
|
trusted library allocation
|
page read and write
|
||
19FF10F8000
|
trusted library allocation
|
page read and write
|
||
214A1F3D000
|
heap
|
page read and write
|
||
19FF5B3B000
|
trusted library allocation
|
page read and write
|
||
19FF7470000
|
trusted library allocation
|
page read and write
|
||
19FF5EA2000
|
trusted library allocation
|
page read and write
|
||
19FF7EA4000
|
trusted library allocation
|
page read and write
|
||
19FF952E000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF5BCB000
|
trusted library allocation
|
page read and write
|
||
1FF42190000
|
heap
|
page read and write
|
||
19FF85FD000
|
trusted library allocation
|
page read and write
|
||
19FEC6C1000
|
heap
|
page read and write
|
||
1A000633000
|
trusted library allocation
|
page read and write
|
||
1A5630C0000
|
unclassified section
|
page readonly
|
||
19FFDAA3000
|
trusted library allocation
|
page read and write
|
||
19FF6B68000
|
trusted library allocation
|
page read and write
|
||
214A1F28000
|
heap
|
page read and write
|
||
1A562E90000
|
unclassified section
|
page readonly
|
||
19FF5BE7000
|
trusted library allocation
|
page read and write
|
||
19FF7462000
|
trusted library allocation
|
page read and write
|
||
19FF6B43000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FFF8FB000
|
trusted library allocation
|
page read and write
|
||
19FFDAD6000
|
trusted library allocation
|
page read and write
|
||
19FF6AE2000
|
trusted library allocation
|
page read and write
|
||
19FF5369000
|
trusted library allocation
|
page read and write
|
||
19FF54DA000
|
trusted library allocation
|
page read and write
|
||
19FF7691000
|
trusted library allocation
|
page read and write
|
||
19852203000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF6E69000
|
trusted library allocation
|
page read and write
|
||
19FF5B96000
|
trusted library allocation
|
page read and write
|
||
19FEC6E4000
|
heap
|
page read and write
|
||
19FFF8D0000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF6BAE000
|
trusted library allocation
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
2BFE55E0000
|
heap
|
page read and write
|
||
19FF2CC0000
|
trusted library allocation
|
page read and write
|
||
19FF7AF7000
|
trusted library allocation
|
page read and write
|
||
1A001A60000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FF8539000
|
trusted library allocation
|
page read and write
|
||
2BFE56BC000
|
heap
|
page read and write
|
||
19FF75C6000
|
trusted library allocation
|
page read and write
|
||
19FF62FB000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF7625000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
19FF6CDB000
|
trusted library allocation
|
page read and write
|
||
19FF1900000
|
trusted library allocation
|
page read and write
|
||
19FF2C63000
|
trusted library allocation
|
page read and write
|
||
19FF7322000
|
trusted library allocation
|
page read and write
|
||
19FF56B7000
|
heap
|
page read and write
|
||
DAF77FE000
|
unkown
|
page readonly
|
||
19FFD917000
|
trusted library allocation
|
page read and write
|
||
2BFE5907000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF5991000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF5369000
|
trusted library allocation
|
page read and write
|
||
19FF2A99000
|
trusted library allocation
|
page read and write
|
||
19FF73D1000
|
trusted library allocation
|
page read and write
|
||
19FF6AB8000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FFD816000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
1A00206D000
|
trusted library allocation
|
page read and write
|
||
19FF5B34000
|
trusted library allocation
|
page read and write
|
||
1A000336000
|
heap
|
page read and write
|
||
19FF632A000
|
trusted library allocation
|
page read and write
|
||
1A0013D2000
|
trusted library allocation
|
page read and write
|
||
1A0013B3000
|
trusted library allocation
|
page read and write
|
||
1A001767000
|
trusted library allocation
|
page read and write
|
||
19FFDBAA000
|
trusted library allocation
|
page read and write
|
||
214A136F000
|
trusted library allocation
|
page read and write
|
||
19FF54F0000
|
trusted library allocation
|
page read and write
|
||
19FFDCE8000
|
trusted library allocation
|
page read and write
|
||
1A001AEB000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
2BFE56B1000
|
heap
|
page read and write
|
||
19FF7691000
|
trusted library allocation
|
page read and write
|
||
1A000541000
|
trusted library allocation
|
page read and write
|
||
1A001AD2000
|
trusted library allocation
|
page read and write
|
||
1A001AE9000
|
trusted library allocation
|
page read and write
|
||
19852213000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF2923000
|
trusted library allocation
|
page read and write
|
||
19FFF93F000
|
trusted library allocation
|
page read and write
|
||
19FEC6E8000
|
heap
|
page read and write
|
||
19FF53E6000
|
trusted library allocation
|
page read and write
|
||
19FFF8C1000
|
trusted library allocation
|
page read and write
|
||
19FF597E000
|
trusted library allocation
|
page read and write
|
||
19FF769F000
|
trusted library allocation
|
page read and write
|
||
19FF74E5000
|
trusted library allocation
|
page read and write
|
||
19FFB63F000
|
trusted library allocation
|
page read and write
|
||
19FF1676000
|
trusted library allocation
|
page read and write
|
||
19FF53A0000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF6C56000
|
trusted library allocation
|
page read and write
|
||
19FFF3DF000
|
trusted library allocation
|
page read and write
|
||
19FF76A3000
|
trusted library allocation
|
page read and write
|
||
19FF85AA000
|
trusted library allocation
|
page read and write
|
||
19FF7974000
|
trusted library allocation
|
page read and write
|
||
19FF5B39000
|
trusted library allocation
|
page read and write
|
||
1A00027A000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF63A7000
|
trusted library allocation
|
page read and write
|
||
19FF2C4F000
|
trusted library allocation
|
page read and write
|
||
19FF74DB000
|
trusted library allocation
|
page read and write
|
||
1A563203000
|
trusted library allocation
|
page read and write
|
||
214A1E40000
|
heap
|
page read and write
|
||
19FF7325000
|
trusted library allocation
|
page read and write
|
||
19FF5A9C000
|
trusted library allocation
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FF5A8C000
|
trusted library allocation
|
page read and write
|
||
19FFDB2D000
|
trusted library allocation
|
page read and write
|
||
19FF5630000
|
heap
|
page read and write
|
||
19FEC6DF000
|
heap
|
page read and write
|
||
19FF539E000
|
trusted library allocation
|
page read and write
|
||
19FF5E59000
|
trusted library allocation
|
page read and write
|
||
19FF5BD5000
|
trusted library allocation
|
page read and write
|
||
19FF2CB0000
|
trusted library allocation
|
page read and write
|
||
19FF76ED000
|
trusted library allocation
|
page read and write
|
||
19FF2AA9000
|
trusted library allocation
|
page read and write
|
||
19FF5F54000
|
trusted library allocation
|
page read and write
|
||
1A000487000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FF769F000
|
trusted library allocation
|
page read and write
|
||
19FF81C7000
|
trusted library allocation
|
page read and write
|
||
19FF53C7000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FF9448000
|
trusted library allocation
|
page read and write
|
||
19FF2A73000
|
trusted library allocation
|
page read and write
|
||
19FF7618000
|
trusted library allocation
|
page read and write
|
||
19FF5984000
|
trusted library allocation
|
page read and write
|
||
19FF6BC9000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF753C000
|
trusted library allocation
|
page read and write
|
||
19FF7745000
|
trusted library allocation
|
page read and write
|
||
19FEC6AB000
|
heap
|
page read and write
|
||
19FFDCB8000
|
trusted library allocation
|
page read and write
|
||
19FF10DF000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF86EB000
|
trusted library allocation
|
page read and write
|
||
19FE7239000
|
heap
|
page read and write
|
||
1A0003B9000
|
heap
|
page read and write
|
||
19FF539C000
|
trusted library allocation
|
page read and write
|
||
19FFF92B000
|
trusted library allocation
|
page read and write
|
||
1A56327D000
|
trusted library allocation
|
page read and write
|
||
19FF82C6000
|
trusted library allocation
|
page read and write
|
||
1A00036D000
|
heap
|
page read and write
|
||
19852224000
|
trusted library allocation
|
page read and write
|
||
19FFDB7D000
|
trusted library allocation
|
page read and write
|
||
1A001324000
|
trusted library allocation
|
page read and write
|
||
1A001A85000
|
trusted library allocation
|
page read and write
|
||
19FF6C67000
|
trusted library allocation
|
page read and write
|
||
19FEC6E4000
|
heap
|
page read and write
|
||
1A001E22000
|
trusted library allocation
|
page read and write
|
||
19FF6B72000
|
trusted library allocation
|
page read and write
|
||
214A1E9C000
|
heap
|
page read and write
|
||
19FF5984000
|
trusted library allocation
|
page read and write
|
||
19FF719A000
|
trusted library allocation
|
page read and write
|
||
19FF8266000
|
trusted library allocation
|
page read and write
|
||
19FF6B54000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
1A001AB0000
|
trusted library allocation
|
page read and write
|
||
19FFF864000
|
trusted library allocation
|
page read and write
|
||
2BFE56A2000
|
heap
|
page read and write
|
||
19FF75ED000
|
trusted library allocation
|
page read and write
|
||
19FFD9EE000
|
trusted library allocation
|
page read and write
|
||
19FF9B18000
|
trusted library allocation
|
page read and write
|
||
19FFDC7A000
|
trusted library allocation
|
page read and write
|
||
19FFDCD7000
|
trusted library allocation
|
page read and write
|
||
19FF2C87000
|
trusted library allocation
|
page read and write
|
||
19FF5F65000
|
trusted library allocation
|
page read and write
|
||
19FF7AFE000
|
trusted library allocation
|
page read and write
|
||
19FFFC68000
|
trusted library allocation
|
page read and write
|
||
19FF6B6B000
|
trusted library allocation
|
page read and write
|
||
19FF9F2F000
|
trusted library allocation
|
page read and write
|
||
19FF6CD7000
|
trusted library allocation
|
page read and write
|
||
19FF53A5000
|
trusted library allocation
|
page read and write
|
||
19FFF8F6000
|
trusted library allocation
|
page read and write
|
||
19FF79D7000
|
trusted library allocation
|
page read and write
|
||
19FF6365000
|
trusted library allocation
|
page read and write
|
||
19FF91CD000
|
trusted library allocation
|
page read and write
|
||
1A001BF5000
|
trusted library allocation
|
page read and write
|
||
19FF534E000
|
trusted library allocation
|
page read and write
|
||
19FF634F000
|
trusted library allocation
|
page read and write
|
||
19FFDAFE000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FEC694000
|
heap
|
page read and write
|
||
19FF8539000
|
trusted library allocation
|
page read and write
|
||
19FF5B8D000
|
trusted library allocation
|
page read and write
|
||
19FEC686000
|
heap
|
page read and write
|
||
19FEC6F4000
|
heap
|
page read and write
|
||
19FF6B7E000
|
trusted library allocation
|
page read and write
|
||
19FF8534000
|
trusted library allocation
|
page read and write
|
||
19FF7448000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FF6B5F000
|
trusted library allocation
|
page read and write
|
||
1A001DA2000
|
trusted library allocation
|
page read and write
|
||
839223E000
|
unkown
|
page readonly
|
||
DAF91FE000
|
stack
|
page read and write
|
||
19FF5B45000
|
trusted library allocation
|
page read and write
|
||
19FFB696000
|
trusted library allocation
|
page read and write
|
||
19FF1726000
|
trusted library allocation
|
page read and write
|
||
19FF28BF000
|
trusted library allocation
|
page read and write
|
||
214A1385000
|
trusted library allocation
|
page read and write
|
||
33EE4FE000
|
stack
|
page read and write
|
||
19FF6C46000
|
trusted library allocation
|
page read and write
|
||
19FF8276000
|
trusted library allocation
|
page read and write
|
||
19FF5362000
|
trusted library allocation
|
page read and write
|
||
19FF78BF000
|
trusted library allocation
|
page read and write
|
||
19FF6C53000
|
trusted library allocation
|
page read and write
|
||
19FFF35D000
|
trusted library allocation
|
page read and write
|
||
214A1F6D000
|
heap
|
page read and write
|
||
19FF6F06000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF5990000
|
trusted library allocation
|
page read and write
|
||
19FF5325000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FEC6C1000
|
heap
|
page read and write
|
||
214A135F000
|
trusted library allocation
|
page read and write
|
||
19FF8228000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
1A001EC4000
|
trusted library allocation
|
page read and write
|
||
19FF6C46000
|
trusted library allocation
|
page read and write
|
||
214A1240000
|
trusted library section
|
page readonly
|
||
19FF6BC3000
|
trusted library allocation
|
page read and write
|
||
19FF7129000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
2BFE568A000
|
heap
|
page read and write
|
||
19FF76ED000
|
trusted library allocation
|
page read and write
|
||
19FF864D000
|
trusted library allocation
|
page read and write
|
||
19FF6C52000
|
trusted library allocation
|
page read and write
|
||
19FEC6B5000
|
heap
|
page read and write
|
||
19FF77AD000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF76DB000
|
trusted library allocation
|
page read and write
|
||
19FF6BDD000
|
trusted library allocation
|
page read and write
|
||
1A000336000
|
heap
|
page read and write
|
||
19FF75B2000
|
trusted library allocation
|
page read and write
|
||
19FEC697000
|
heap
|
page read and write
|
||
19FF6C63000
|
trusted library allocation
|
page read and write
|
||
19FF71F9000
|
trusted library allocation
|
page read and write
|
||
19FF289C000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
1A001E33000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FFFC7C000
|
trusted library allocation
|
page read and write
|
||
19FF9F2B000
|
trusted library allocation
|
page read and write
|
||
19FFF9CE000
|
trusted library allocation
|
page read and write
|
||
19FF6CBF000
|
trusted library allocation
|
page read and write
|
||
19FF8032000
|
trusted library allocation
|
page read and write
|
||
19FF5EEF000
|
trusted library allocation
|
page read and write
|
||
19FF78AD000
|
trusted library allocation
|
page read and write
|
||
19FF7F63000
|
trusted library allocation
|
page read and write
|
||
19FEC698000
|
heap
|
page read and write
|
||
19FF85BB000
|
trusted library allocation
|
page read and write
|
||
19852600000
|
trusted library allocation
|
page read and write
|
||
19FF6D11000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FF16F6000
|
trusted library allocation
|
page read and write
|
||
19FF63F6000
|
trusted library allocation
|
page read and write
|
||
19FF8221000
|
trusted library allocation
|
page read and write
|
||
19FF6C40000
|
trusted library allocation
|
page read and write
|
||
19FF79DC000
|
trusted library allocation
|
page read and write
|
||
19FF7713000
|
trusted library allocation
|
page read and write
|
||
19FF79F5000
|
trusted library allocation
|
page read and write
|
||
19FFF8DA000
|
trusted library allocation
|
page read and write
|
||
19FF6B91000
|
trusted library allocation
|
page read and write
|
||
1A001D98000
|
trusted library allocation
|
page read and write
|
||
19FFDAF7000
|
trusted library allocation
|
page read and write
|
||
19FF53E6000
|
trusted library allocation
|
page read and write
|
||
19FFF364000
|
trusted library allocation
|
page read and write
|
||
1A5632E9000
|
trusted library allocation
|
page read and write
|
||
DAF5FD8000
|
stack
|
page read and write
|
||
19FFF981000
|
trusted library allocation
|
page read and write
|
||
214A1EA0000
|
heap
|
page read and write
|
||
1A0020F1000
|
trusted library allocation
|
page read and write
|
||
19FF7B66000
|
trusted library allocation
|
page read and write
|
||
19FFDDEE000
|
trusted library allocation
|
page read and write
|
||
19FF632A000
|
trusted library allocation
|
page read and write
|
||
2BFE5885000
|
heap
|
page read and write
|
||
19FEC691000
|
heap
|
page read and write
|
||
19FEC68B000
|
heap
|
page read and write
|
||
19FF17E9000
|
trusted library allocation
|
page read and write
|
||
1A562E87000
|
remote allocation
|
page execute read
|
||
19FF5311000
|
trusted library allocation
|
page read and write
|
||
19FFDCC8000
|
trusted library allocation
|
page read and write
|
||
214A1F98000
|
heap
|
page read and write
|
||
19FEC6B5000
|
heap
|
page read and write
|
||
1A001ED9000
|
trusted library allocation
|
page read and write
|
||
19FF6C60000
|
trusted library allocation
|
page read and write
|
||
19FF76DD000
|
trusted library allocation
|
page read and write
|
||
1A001D60000
|
trusted library allocation
|
page read and write
|
||
214A13EB000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FEC6F9000
|
heap
|
page read and write
|
||
19FF574E000
|
trusted library allocation
|
page read and write
|
||
1A0004A3000
|
trusted library allocation
|
page read and write
|
||
1FF421B0000
|
heap
|
page read and write
|
||
19FF9F0F000
|
trusted library allocation
|
page read and write
|
||
1A56341D000
|
trusted library allocation
|
page read and write
|
||
2BFE5900000
|
trusted library allocation
|
page read and write
|
||
19FF53C9000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FFF364000
|
trusted library allocation
|
page read and write
|
||
2BFE71B1000
|
heap
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FF5E94000
|
trusted library allocation
|
page read and write
|
||
19FF6362000
|
trusted library allocation
|
page read and write
|
||
19FF7627000
|
trusted library allocation
|
page read and write
|
||
19FF2AF7000
|
trusted library allocation
|
page read and write
|
||
19FF6360000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FFF99F000
|
trusted library allocation
|
page read and write
|
||
19FF77AB000
|
trusted library allocation
|
page read and write
|
||
19FF6393000
|
trusted library allocation
|
page read and write
|
||
19FF74F4000
|
trusted library allocation
|
page read and write
|
||
19FFB6A1000
|
trusted library allocation
|
page read and write
|
||
1A001E96000
|
trusted library allocation
|
page read and write
|
||
83910B7000
|
stack
|
page read and write
|
||
198522D7000
|
trusted library allocation
|
page read and write
|
||
19FF6372000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF80BC000
|
trusted library allocation
|
page read and write
|
||
19FF8217000
|
trusted library allocation
|
page read and write
|
||
19FF62BF000
|
trusted library allocation
|
page read and write
|
||
19FF73B5000
|
trusted library allocation
|
page read and write
|
||
19FEC694000
|
heap
|
page read and write
|
||
19851E3C000
|
remote allocation
|
page execute read
|
||
19FF631E000
|
trusted library allocation
|
page read and write
|
||
19FF5695000
|
heap
|
page read and write
|
||
19FF2CE0000
|
trusted library allocation
|
page read and write
|
||
19FEC730000
|
heap
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FF2C54000
|
trusted library allocation
|
page read and write
|
||
19FEC685000
|
heap
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FF5BE9000
|
trusted library allocation
|
page read and write
|
||
19FF6C5B000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FF5726000
|
trusted library allocation
|
page read and write
|
||
1A563223000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF7946000
|
trusted library allocation
|
page read and write
|
||
19FF53E6000
|
trusted library allocation
|
page read and write
|
||
19FF762B000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF829A000
|
trusted library allocation
|
page read and write
|
||
19FF7541000
|
trusted library allocation
|
page read and write
|
||
19FF7F9E000
|
trusted library allocation
|
page read and write
|
||
19FFD9FD000
|
trusted library allocation
|
page read and write
|
||
19FFDB65000
|
trusted library allocation
|
page read and write
|
||
19FF2A73000
|
trusted library allocation
|
page read and write
|
||
19FF2A5E000
|
trusted library allocation
|
page read and write
|
||
19FEC6B6000
|
heap
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FF533B000
|
trusted library allocation
|
page read and write
|
||
1A001E3A000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
19FF63C0000
|
trusted library allocation
|
page read and write
|
||
1A001DEE000
|
trusted library allocation
|
page read and write
|
||
19FF9533000
|
trusted library allocation
|
page read and write
|
||
19FF766B000
|
trusted library allocation
|
page read and write
|
||
19FF5031000
|
trusted library allocation
|
page read and write
|
||
1A0013CF000
|
trusted library allocation
|
page read and write
|
||
19FF6E6B000
|
trusted library allocation
|
page read and write
|
||
19FF78BF000
|
trusted library allocation
|
page read and write
|
||
19FF9B18000
|
trusted library allocation
|
page read and write
|
||
19FF858C000
|
trusted library allocation
|
page read and write
|
||
1A001EE6000
|
trusted library allocation
|
page read and write
|
||
19FF6B61000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
214A1880000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF78C2000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FF6C73000
|
trusted library allocation
|
page read and write
|
||
19FF7756000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
19FF633F000
|
trusted library allocation
|
page read and write
|
||
19FF74AC000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF75D1000
|
trusted library allocation
|
page read and write
|
||
19FF90C8000
|
trusted library allocation
|
page read and write
|
||
19FF71B2000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF6C40000
|
trusted library allocation
|
page read and write
|
||
19FF7642000
|
trusted library allocation
|
page read and write
|
||
19FF568B000
|
heap
|
page read and write
|
||
19FF80D8000
|
trusted library allocation
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FFF99F000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
214A19A0000
|
heap
|
page read and write
|
||
19FFDCDD000
|
trusted library allocation
|
page read and write
|
||
19FF7CE3000
|
trusted library allocation
|
page read and write
|
||
19FF76E8000
|
trusted library allocation
|
page read and write
|
||
19FEC6EB000
|
heap
|
page read and write
|
||
33EE5BE000
|
unkown
|
page readonly
|
||
19FF6CC3000
|
trusted library allocation
|
page read and write
|
||
19FF6C50000
|
trusted library allocation
|
page read and write
|
||
214A1FA7000
|
heap
|
page read and write
|
||
19FF5E6D000
|
trusted library allocation
|
page read and write
|
||
19FF733B000
|
trusted library allocation
|
page read and write
|
||
19FF7955000
|
trusted library allocation
|
page read and write
|
||
19FF7751000
|
trusted library allocation
|
page read and write
|
||
19FF85BD000
|
trusted library allocation
|
page read and write
|
||
1A001AD2000
|
trusted library allocation
|
page read and write
|
||
19FF825E000
|
trusted library allocation
|
page read and write
|
||
19FFDC38000
|
trusted library allocation
|
page read and write
|
||
19FF79EF000
|
trusted library allocation
|
page read and write
|
||
19FF6F0E000
|
trusted library allocation
|
page read and write
|
||
19FF91A1000
|
trusted library allocation
|
page read and write
|
||
19FF7166000
|
trusted library allocation
|
page read and write
|
||
19FF53E6000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
1A001ED9000
|
trusted library allocation
|
page read and write
|
||
19FF2A99000
|
trusted library allocation
|
page read and write
|
||
19FFF600000
|
trusted library allocation
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FF6B6B000
|
trusted library allocation
|
page read and write
|
||
19FFF348000
|
trusted library allocation
|
page read and write
|
||
19FF5690000
|
heap
|
page read and write
|
||
214A12C0000
|
trusted library allocation
|
page read and write
|
||
19FF764F000
|
trusted library allocation
|
page read and write
|
||
19FF6341000
|
trusted library allocation
|
page read and write
|
||
19FFDB55000
|
trusted library allocation
|
page read and write
|
||
19FEC6EE000
|
heap
|
page read and write
|
||
19FF918E000
|
trusted library allocation
|
page read and write
|
||
19FF76B0000
|
trusted library allocation
|
page read and write
|
||
19FFDCD9000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF7578000
|
trusted library allocation
|
page read and write
|
||
214A1365000
|
trusted library allocation
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FF715A000
|
trusted library allocation
|
page read and write
|
||
214A1284000
|
heap
|
page read and write
|
||
19FF6C5F000
|
trusted library allocation
|
page read and write
|
||
19FFDCDD000
|
trusted library allocation
|
page read and write
|
||
19FF75AB000
|
trusted library allocation
|
page read and write
|
||
19FF6C73000
|
trusted library allocation
|
page read and write
|
||
1A0005AC000
|
trusted library allocation
|
page read and write
|
||
19FF5B52000
|
trusted library allocation
|
page read and write
|
||
10B2000
|
heap
|
page read and write
|
||
19FFDCD3000
|
trusted library allocation
|
page read and write
|
||
19FF76BE000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
3850000
|
heap
|
page read and write
|
||
214A1300000
|
trusted library allocation
|
page read and write
|
||
19FEC6B3000
|
heap
|
page read and write
|
||
19FFDC14000
|
trusted library allocation
|
page read and write
|
||
19FF54C1000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF77F7000
|
trusted library allocation
|
page read and write
|
||
19FF6BC0000
|
trusted library allocation
|
page read and write
|
||
19FF6BDD000
|
trusted library allocation
|
page read and write
|
||
19FF2CBA000
|
trusted library allocation
|
page read and write
|
||
19FF80C2000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF5EF4000
|
trusted library allocation
|
page read and write
|
||
19FF795E000
|
trusted library allocation
|
page read and write
|
||
19FF79E6000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF6365000
|
trusted library allocation
|
page read and write
|
||
19FF7179000
|
trusted library allocation
|
page read and write
|
||
19FF79E8000
|
trusted library allocation
|
page read and write
|
||
19FF770B000
|
trusted library allocation
|
page read and write
|
||
19FF1081000
|
trusted library allocation
|
page read and write
|
||
19FFFC82000
|
trusted library allocation
|
page read and write
|
||
DAF6FFE000
|
stack
|
page read and write
|
||
19FF6D57000
|
trusted library allocation
|
page read and write
|
||
19FEC6A3000
|
heap
|
page read and write
|
||
19FF539E000
|
trusted library allocation
|
page read and write
|
||
2BFE5680000
|
heap
|
page read and write
|
||
19FF639A000
|
trusted library allocation
|
page read and write
|
||
19FF5736000
|
trusted library allocation
|
page read and write
|
||
19FF10B3000
|
trusted library allocation
|
page read and write
|
||
19FEC6B3000
|
heap
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FF6FDF000
|
trusted library allocation
|
page read and write
|
||
19FF5325000
|
trusted library allocation
|
page read and write
|
||
19FEC691000
|
heap
|
page read and write
|
||
19FF7EBB000
|
trusted library allocation
|
page read and write
|
||
33EE57D000
|
stack
|
page read and write
|
||
19851E20000
|
remote allocation
|
page read and write
|
||
214A135C000
|
trusted library allocation
|
page read and write
|
||
1A00178A000
|
trusted library allocation
|
page read and write
|
||
19FF7691000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FEC68B000
|
heap
|
page read and write
|
||
1A0017AC000
|
trusted library allocation
|
page read and write
|
||
19FF53AE000
|
trusted library allocation
|
page read and write
|
||
19FFD94C000
|
trusted library allocation
|
page read and write
|
||
19FF6C5B000
|
trusted library allocation
|
page read and write
|
||
19FF78AD000
|
trusted library allocation
|
page read and write
|
||
19FF7202000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
214A13CF000
|
trusted library allocation
|
page read and write
|
||
19FF5914000
|
trusted library allocation
|
page read and write
|
||
1A001AE9000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FFD922000
|
trusted library allocation
|
page read and write
|
||
19FF8290000
|
trusted library allocation
|
page read and write
|
||
19FEC6A1000
|
heap
|
page read and write
|
||
19FF7C9F000
|
trusted library allocation
|
page read and write
|
||
19FF2A73000
|
trusted library allocation
|
page read and write
|
||
19FF73AC000
|
trusted library allocation
|
page read and write
|
||
1A001EF2000
|
trusted library allocation
|
page read and write
|
||
19FF71BC000
|
trusted library allocation
|
page read and write
|
||
CD1000
|
unkown
|
page execute read
|
||
1A0003E1000
|
heap
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FF2AB4000
|
trusted library allocation
|
page read and write
|
||
19FF768F000
|
trusted library allocation
|
page read and write
|
||
19FFF9E4000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FF6CDD000
|
trusted library allocation
|
page read and write
|
||
19FEC67B000
|
heap
|
page read and write
|
||
214A1ECA000
|
heap
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FF2CBA000
|
trusted library allocation
|
page read and write
|
||
19FF162F000
|
trusted library allocation
|
page read and write
|
||
19FFDCDD000
|
trusted library allocation
|
page read and write
|
||
19FFF8CC000
|
trusted library allocation
|
page read and write
|
||
DAF797E000
|
unkown
|
page readonly
|
||
19FEC6C8000
|
heap
|
page read and write
|
||
19FF5695000
|
heap
|
page read and write
|
||
19FF28B2000
|
trusted library allocation
|
page read and write
|
||
19FEC6DE000
|
heap
|
page read and write
|
||
19FEC6A3000
|
heap
|
page read and write
|
||
19FF7674000
|
trusted library allocation
|
page read and write
|
||
19FF6BCB000
|
trusted library allocation
|
page read and write
|
||
19FF5800000
|
trusted library allocation
|
page read and write
|
||
19FF6C26000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF8271000
|
trusted library allocation
|
page read and write
|
||
19FF5BBB000
|
trusted library allocation
|
page read and write
|
||
214A1F6A000
|
heap
|
page read and write
|
||
1A001AEB000
|
trusted library allocation
|
page read and write
|
||
214A1348000
|
trusted library allocation
|
page read and write
|
||
19FF5BCB000
|
trusted library allocation
|
page read and write
|
||
19FFDB5F000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF171E000
|
trusted library allocation
|
page read and write
|
||
19FEC6A7000
|
heap
|
page read and write
|
||
19FEC68E000
|
heap
|
page read and write
|
||
19FF6DB3000
|
trusted library allocation
|
page read and write
|
||
19FF6C4B000
|
trusted library allocation
|
page read and write
|
||
19FF10D4000
|
trusted library allocation
|
page read and write
|
||
19FEC738000
|
heap
|
page read and write
|
||
19FEC69A000
|
heap
|
page read and write
|
||
19FEC6F9000
|
heap
|
page read and write
|
||
19FF7958000
|
trusted library allocation
|
page read and write
|
||
214A1F31000
|
heap
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF7A83000
|
trusted library allocation
|
page read and write
|
||
19FF5369000
|
trusted library allocation
|
page read and write
|
||
19FFDA8E000
|
trusted library allocation
|
page read and write
|
||
19FFDCED000
|
trusted library allocation
|
page read and write
|
||
19FF2CA6000
|
trusted library allocation
|
page read and write
|
||
19FF502A000
|
trusted library allocation
|
page read and write
|
||
1A001E9C000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
214A1F20000
|
heap
|
page read and write
|
||
19FF76FD000
|
trusted library allocation
|
page read and write
|
||
19FF76E0000
|
trusted library allocation
|
page read and write
|
||
1A563840000
|
heap
|
page read and write
|
||
19FF7C8D000
|
trusted library allocation
|
page read and write
|
||
19FFF3AE000
|
trusted library allocation
|
page read and write
|
||
19FF53CD000
|
trusted library allocation
|
page read and write
|
||
19FF109E000
|
trusted library allocation
|
page read and write
|
||
19FF857B000
|
trusted library allocation
|
page read and write
|
||
19FF6B7A000
|
trusted library allocation
|
page read and write
|
||
19FF7452000
|
trusted library allocation
|
page read and write
|
||
214A1F61000
|
heap
|
page read and write
|
||
1FF42069000
|
heap
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FF71F5000
|
trusted library allocation
|
page read and write
|
||
19FF5BAC000
|
trusted library allocation
|
page read and write
|
||
19FEC6E8000
|
heap
|
page read and write
|
||
1A001EC2000
|
trusted library allocation
|
page read and write
|
||
1A56303F000
|
unclassified section
|
page read and write
|
||
214A1EA0000
|
heap
|
page read and write
|
||
19FF6FDC000
|
trusted library allocation
|
page read and write
|
||
19FF7F1C000
|
trusted library allocation
|
page read and write
|
||
19FF77ED000
|
trusted library allocation
|
page read and write
|
||
19FF7661000
|
trusted library allocation
|
page read and write
|
||
19FFFC4D000
|
trusted library allocation
|
page read and write
|
||
19FF5B3B000
|
trusted library allocation
|
page read and write
|
||
19FF75BA000
|
trusted library allocation
|
page read and write
|
||
214A1EF2000
|
heap
|
page read and write
|
||
19FF74CE000
|
trusted library allocation
|
page read and write
|
||
19FF858C000
|
trusted library allocation
|
page read and write
|
||
19FF5BCF000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
19FF6B91000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF5695000
|
heap
|
page read and write
|
||
1C7E000
|
stack
|
page read and write
|
||
19FF6CA8000
|
trusted library allocation
|
page read and write
|
||
19FF6BCB000
|
trusted library allocation
|
page read and write
|
||
19FF745C000
|
trusted library allocation
|
page read and write
|
||
19FF749C000
|
trusted library allocation
|
page read and write
|
||
19FF76BE000
|
trusted library allocation
|
page read and write
|
||
1A56340E000
|
trusted library allocation
|
page read and write
|
||
19FFF32E000
|
trusted library allocation
|
page read and write
|
||
1A001BE3000
|
trusted library allocation
|
page read and write
|
||
19FEC6EB000
|
heap
|
page read and write
|
||
2BFE569D000
|
heap
|
page read and write
|
||
19FFDB25000
|
trusted library allocation
|
page read and write
|
||
19FF5BE7000
|
trusted library allocation
|
page read and write
|
||
19FF6E73000
|
trusted library allocation
|
page read and write
|
||
19FF56B1000
|
heap
|
page read and write
|
||
19FF5BCF000
|
trusted library allocation
|
page read and write
|
||
19FF7949000
|
trusted library allocation
|
page read and write
|
||
19FF8280000
|
trusted library allocation
|
page read and write
|
||
214A1F20000
|
heap
|
page read and write
|
||
19FF53C7000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
214A1F98000
|
heap
|
page read and write
|
||
19FF6E95000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
unkown
|
page readonly
|
||
19FF532A000
|
trusted library allocation
|
page read and write
|
||
19FF857D000
|
trusted library allocation
|
page read and write
|
||
19FF6BCB000
|
trusted library allocation
|
page read and write
|
||
19FFDB9F000
|
trusted library allocation
|
page read and write
|
||
1985228F000
|
trusted library allocation
|
page read and write
|
||
19FFF3AE000
|
trusted library allocation
|
page read and write
|
||
19FFDC77000
|
trusted library allocation
|
page read and write
|
||
19FFDB7F000
|
trusted library allocation
|
page read and write
|
||
19FF769A000
|
trusted library allocation
|
page read and write
|
||
19FF6AEE000
|
trusted library allocation
|
page read and write
|
||
19FF634F000
|
trusted library allocation
|
page read and write
|
||
19FF9B36000
|
trusted library allocation
|
page read and write
|
||
1A0002D9000
|
trusted library allocation
|
page read and write
|
||
19FF8262000
|
trusted library allocation
|
page read and write
|
||
214A1F20000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF6B97000
|
trusted library allocation
|
page read and write
|
||
19FF76F7000
|
trusted library allocation
|
page read and write
|
||
19FF6CBC000
|
trusted library allocation
|
page read and write
|
||
19FEC694000
|
heap
|
page read and write
|
||
214A1A1F000
|
trusted library allocation
|
page read and write
|
||
214A1280000
|
heap
|
page read and write
|
||
19FFB6F9000
|
trusted library allocation
|
page read and write
|
||
19851EB3000
|
heap
|
page read and write
|
||
1A00038B000
|
heap
|
page read and write
|
||
19FF6D47000
|
trusted library allocation
|
page read and write
|
||
1A001AB0000
|
trusted library allocation
|
page read and write
|
||
19FF56A9000
|
heap
|
page read and write
|
||
1A001BB3000
|
trusted library allocation
|
page read and write
|
||
19FF5BD5000
|
trusted library allocation
|
page read and write
|
||
19FF7745000
|
trusted library allocation
|
page read and write
|
||
19FF6B33000
|
trusted library allocation
|
page read and write
|
||
19FF5BB4000
|
trusted library allocation
|
page read and write
|
||
1A563200000
|
trusted library allocation
|
page read and write
|
||
19FF5E35000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FF5994000
|
trusted library allocation
|
page read and write
|
||
19FF78C4000
|
trusted library allocation
|
page read and write
|
||
19FF77C2000
|
trusted library allocation
|
page read and write
|
||
19FF17F6000
|
trusted library allocation
|
page read and write
|
||
19FEC701000
|
heap
|
page read and write
|
||
214A1E9C000
|
heap
|
page read and write
|
||
19FF5041000
|
trusted library allocation
|
page read and write
|
||
19FF6BCB000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
214A1EA9000
|
heap
|
page read and write
|
||
19FF62D0000
|
trusted library allocation
|
page read and write
|
||
19FF536F000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF5654000
|
heap
|
page read and write
|
||
19FFF378000
|
trusted library allocation
|
page read and write
|
||
19FF82F8000
|
trusted library allocation
|
page read and write
|
||
19FF7AFD000
|
trusted library allocation
|
page read and write
|
||
19FFF342000
|
trusted library allocation
|
page read and write
|
||
19FF91CA000
|
trusted library allocation
|
page read and write
|
||
19FF5E52000
|
trusted library allocation
|
page read and write
|
||
19FF857B000
|
trusted library allocation
|
page read and write
|
||
187E000
|
stack
|
page read and write
|
||
19FFDAA7000
|
trusted library allocation
|
page read and write
|
||
19FF9F38000
|
trusted library allocation
|
page read and write
|
||
19FF53BE000
|
trusted library allocation
|
page read and write
|
||
19FF6CA8000
|
trusted library allocation
|
page read and write
|
||
19FF6BCB000
|
trusted library allocation
|
page read and write
|
||
19FFF94F000
|
trusted library allocation
|
page read and write
|
||
19FF28AB000
|
trusted library allocation
|
page read and write
|
||
19FEC6A4000
|
heap
|
page read and write
|
||
19FF8070000
|
trusted library allocation
|
page read and write
|
||
19FEC710000
|
heap
|
page read and write
|
||
19FFFC0A000
|
trusted library allocation
|
page read and write
|
||
19FF863A000
|
trusted library allocation
|
page read and write
|
||
19FF77AB000
|
trusted library allocation
|
page read and write
|
||
19FFDD83000
|
trusted library allocation
|
page read and write
|
||
C44B7FF000
|
stack
|
page read and write
|
||
19FF53DE000
|
trusted library allocation
|
page read and write
|
||
19FF6BCB000
|
trusted library allocation
|
page read and write
|
||
1A563100000
|
trusted library allocation
|
page read and write
|
||
1A001A96000
|
trusted library allocation
|
page read and write
|
||
19FF5E20000
|
trusted library allocation
|
page read and write
|
||
19FF76A8000
|
trusted library allocation
|
page read and write
|
||
19FF56A8000
|
heap
|
page read and write
|
||
19FF75E5000
|
trusted library allocation
|
page read and write
|
||
19FF7147000
|
trusted library allocation
|
page read and write
|
||
19FF28CB000
|
trusted library allocation
|
page read and write
|
||
214A13B1000
|
trusted library allocation
|
page read and write
|
||
198522AC000
|
trusted library allocation
|
page read and write
|
||
19FF6C1B000
|
trusted library allocation
|
page read and write
|
||
19FF5BB9000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
214A19C0000
|
heap
|
page read and write
|
||
19FF77BA000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF1717000
|
trusted library allocation
|
page read and write
|
||
19FFDABB000
|
trusted library allocation
|
page read and write
|
||
19FF2CE0000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
214A1EA0000
|
heap
|
page read and write
|
||
1A0013AE000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF769C000
|
trusted library allocation
|
page read and write
|
||
19FEC738000
|
heap
|
page read and write
|
||
19FF71BC000
|
trusted library allocation
|
page read and write
|
||
19FF6B43000
|
trusted library allocation
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FF9F51000
|
trusted library allocation
|
page read and write
|
||
19FF768F000
|
trusted library allocation
|
page read and write
|
||
2BFE56BC000
|
heap
|
page read and write
|
||
19FFDC88000
|
trusted library allocation
|
page read and write
|
||
19FFDDE6000
|
trusted library allocation
|
page read and write
|
||
1A001D6B000
|
trusted library allocation
|
page read and write
|
||
19FF532A000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FF8276000
|
trusted library allocation
|
page read and write
|
||
2BFE71BE000
|
heap
|
page read and write
|
||
19FFDC2C000
|
trusted library allocation
|
page read and write
|
||
19FF59AC000
|
trusted library allocation
|
page read and write
|
||
19FF5BC2000
|
trusted library allocation
|
page read and write
|
||
DAF89FE000
|
unkown
|
page readonly
|
||
19FF769F000
|
trusted library allocation
|
page read and write
|
||
1A001E9C000
|
trusted library allocation
|
page read and write
|
||
19FF9F38000
|
trusted library allocation
|
page read and write
|
||
19FF7963000
|
trusted library allocation
|
page read and write
|
||
19FF62D2000
|
trusted library allocation
|
page read and write
|
||
19FEC6CC000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
1A00038D000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
1A001D9C000
|
trusted library allocation
|
page read and write
|
||
19FF5B99000
|
trusted library allocation
|
page read and write
|
||
19FF5697000
|
heap
|
page read and write
|
||
19FFDBF9000
|
trusted library allocation
|
page read and write
|
||
19FF6B7A000
|
trusted library allocation
|
page read and write
|
||
19FF63AF000
|
trusted library allocation
|
page read and write
|
||
19FEC715000
|
heap
|
page read and write
|
||
19FF5AA2000
|
trusted library allocation
|
page read and write
|
||
19FEC6E9000
|
heap
|
page read and write
|
||
19FFD9DE000
|
trusted library allocation
|
page read and write
|
||
1A002105000
|
trusted library allocation
|
page read and write
|
||
19FFF854000
|
trusted library allocation
|
page read and write
|
||
19FF56E0000
|
heap
|
page read and write
|
||
19FF78AD000
|
trusted library allocation
|
page read and write
|
||
19FF176B000
|
trusted library allocation
|
page read and write
|
||
19FF76EA000
|
trusted library allocation
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FF77A8000
|
trusted library allocation
|
page read and write
|
||
19FF6338000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FEC6A1000
|
heap
|
page read and write
|
||
19FF5BDF000
|
trusted library allocation
|
page read and write
|
||
1A001E8B000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF712D000
|
trusted library allocation
|
page read and write
|
||
19FF6C58000
|
trusted library allocation
|
page read and write
|
||
19FF8617000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF53A7000
|
trusted library allocation
|
page read and write
|
||
19FF5362000
|
trusted library allocation
|
page read and write
|
||
19FF6D39000
|
trusted library allocation
|
page read and write
|
||
19FF7AC5000
|
trusted library allocation
|
page read and write
|
||
19FF6C40000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
19FF765A000
|
trusted library allocation
|
page read and write
|
||
19FF8519000
|
trusted library allocation
|
page read and write
|
||
19FF74E3000
|
trusted library allocation
|
page read and write
|
||
19FF74F1000
|
trusted library allocation
|
page read and write
|
||
19FF5A6E000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF818F000
|
trusted library allocation
|
page read and write
|
||
19FF6B72000
|
trusted library allocation
|
page read and write
|
||
19FEC6A3000
|
heap
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF7192000
|
trusted library allocation
|
page read and write
|
||
19FFF35A000
|
trusted library allocation
|
page read and write
|
||
19FFDC73000
|
trusted library allocation
|
page read and write
|
||
19FF28AD000
|
trusted library allocation
|
page read and write
|
||
19851E80000
|
heap
|
page read and write
|
||
19FF79FB000
|
trusted library allocation
|
page read and write
|
||
10A3000
|
heap
|
page read and write
|
||
19FF1766000
|
trusted library allocation
|
page read and write
|
||
19FF53C9000
|
trusted library allocation
|
page read and write
|
||
19FFDA8B000
|
trusted library allocation
|
page read and write
|
||
19FF53B8000
|
trusted library allocation
|
page read and write
|
||
19FF5695000
|
heap
|
page read and write
|
||
19FF5ACB000
|
trusted library allocation
|
page read and write
|
||
1A000657000
|
trusted library allocation
|
page read and write
|
||
19FF5AA2000
|
trusted library allocation
|
page read and write
|
||
19FF6C9E000
|
trusted library allocation
|
page read and write
|
||
1A001E9C000
|
trusted library allocation
|
page read and write
|
||
33EF5BE000
|
unkown
|
page readonly
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF2A86000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF74EC000
|
trusted library allocation
|
page read and write
|
||
19FEC69A000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
1A001A85000
|
trusted library allocation
|
page read and write
|
||
19FF5A8A000
|
trusted library allocation
|
page read and write
|
||
1A001BC9000
|
trusted library allocation
|
page read and write
|
||
19FFDC53000
|
trusted library allocation
|
page read and write
|
||
19FFDAF0000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
1A001B86000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF2AF7000
|
trusted library allocation
|
page read and write
|
||
19FF768F000
|
trusted library allocation
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FF6BD1000
|
trusted library allocation
|
page read and write
|
||
19FF5697000
|
heap
|
page read and write
|
||
19FEC693000
|
heap
|
page read and write
|
||
19FF74AC000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FFD925000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FF6E5D000
|
trusted library allocation
|
page read and write
|
||
19FF7665000
|
trusted library allocation
|
page read and write
|
||
19FF7962000
|
trusted library allocation
|
page read and write
|
||
214A1F26000
|
heap
|
page read and write
|
||
19FF74FE000
|
trusted library allocation
|
page read and write
|
||
19FF757C000
|
trusted library allocation
|
page read and write
|
||
1A563296000
|
trusted library allocation
|
page read and write
|
||
19FF53A7000
|
trusted library allocation
|
page read and write
|
||
19FF78B4000
|
trusted library allocation
|
page read and write
|
||
19FF5098000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF6B72000
|
trusted library allocation
|
page read and write
|
||
19FF7141000
|
trusted library allocation
|
page read and write
|
||
1A001E8B000
|
trusted library allocation
|
page read and write
|
||
19FF6CD9000
|
trusted library allocation
|
page read and write
|
||
19FFDC84000
|
trusted library allocation
|
page read and write
|
||
19FF857D000
|
trusted library allocation
|
page read and write
|
||
1A001AC3000
|
trusted library allocation
|
page read and write
|
||
19FF77DC000
|
trusted library allocation
|
page read and write
|
||
19FF2AE1000
|
trusted library allocation
|
page read and write
|
||
19FEC693000
|
heap
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FEC69A000
|
heap
|
page read and write
|
||
19FF2AB2000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FF742A000
|
trusted library allocation
|
page read and write
|
||
19FFDAB2000
|
trusted library allocation
|
page read and write
|
||
214A1EE1000
|
heap
|
page read and write
|
||
19FF7124000
|
trusted library allocation
|
page read and write
|
||
1A563272000
|
trusted library allocation
|
page read and write
|
||
1A0005A7000
|
trusted library allocation
|
page read and write
|
||
19FF571E000
|
trusted library allocation
|
page read and write
|
||
19FFD952000
|
trusted library allocation
|
page read and write
|
||
19FFD92E000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19852282000
|
trusted library allocation
|
page read and write
|
||
19852030000
|
heap
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF7691000
|
trusted library allocation
|
page read and write
|
||
19FF85F9000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
1A001DE3000
|
trusted library allocation
|
page read and write
|
||
83919BE000
|
stack
|
page read and write
|
||
19FEC6B5000
|
heap
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FF6FC2000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF74E0000
|
trusted library allocation
|
page read and write
|
||
19FF8282000
|
trusted library allocation
|
page read and write
|
||
19FF292C000
|
trusted library allocation
|
page read and write
|
||
1A562E00000
|
unclassified section
|
page readonly
|
||
19FF10C0000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
214A1080000
|
heap
|
page read and write
|
||
19FFF8FB000
|
trusted library allocation
|
page read and write
|
||
1A001E9C000
|
trusted library allocation
|
page read and write
|
||
19FFF83F000
|
trusted library allocation
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
19FF5ACB000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
unkown
|
page readonly
|
||
1A563032000
|
unclassified section
|
page read and write
|
||
19FF5BBF000
|
trusted library allocation
|
page read and write
|
||
19FFDB75000
|
trusted library allocation
|
page read and write
|
||
19FF8241000
|
trusted library allocation
|
page read and write
|
||
19FF76DB000
|
trusted library allocation
|
page read and write
|
||
19FFDBEB000
|
trusted library allocation
|
page read and write
|
||
19FF2C58000
|
trusted library allocation
|
page read and write
|
||
19FEC6E4000
|
heap
|
page read and write
|
||
DAF81FE000
|
stack
|
page read and write
|
||
19FF764A000
|
trusted library allocation
|
page read and write
|
||
19852070000
|
unclassified section
|
page readonly
|
||
1A0004C8000
|
trusted library allocation
|
page read and write
|
||
19FF796C000
|
trusted library allocation
|
page read and write
|
||
19FFFC3B000
|
trusted library allocation
|
page read and write
|
||
1A0002DF000
|
trusted library allocation
|
page read and write
|
||
19FF2CE9000
|
trusted library allocation
|
page read and write
|
||
1A001A6E000
|
trusted library allocation
|
page read and write
|
||
19FF53B8000
|
trusted library allocation
|
page read and write
|
||
19FF5B8D000
|
trusted library allocation
|
page read and write
|
||
19FF78DB000
|
trusted library allocation
|
page read and write
|
||
19FF17C5000
|
trusted library allocation
|
page read and write
|
||
EA41BFF000
|
stack
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FFDB0A000
|
trusted library allocation
|
page read and write
|
||
214A1EA0000
|
heap
|
page read and write
|
||
19FF2CE0000
|
trusted library allocation
|
page read and write
|
||
19FF8048000
|
trusted library allocation
|
page read and write
|
||
19FF6CAA000
|
trusted library allocation
|
page read and write
|
||
19FF6CD9000
|
trusted library allocation
|
page read and write
|
||
839323E000
|
unkown
|
page readonly
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF91FE000
|
trusted library allocation
|
page read and write
|
||
19FF6C67000
|
trusted library allocation
|
page read and write
|
||
19FF7674000
|
trusted library allocation
|
page read and write
|
||
19FF10C0000
|
trusted library allocation
|
page read and write
|
||
19FF7616000
|
trusted library allocation
|
page read and write
|
||
19FF79FB000
|
trusted library allocation
|
page read and write
|
||
19FF1726000
|
trusted library allocation
|
page read and write
|
||
19FF5A8A000
|
trusted library allocation
|
page read and write
|
||
19FFDBF9000
|
trusted library allocation
|
page read and write
|
||
19FEC6E7000
|
heap
|
page read and write
|
||
19FF74CE000
|
trusted library allocation
|
page read and write
|
||
19FF6E6B000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF71A5000
|
trusted library allocation
|
page read and write
|
||
19FF85F9000
|
trusted library allocation
|
page read and write
|
||
19FF28A8000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF6C5E000
|
trusted library allocation
|
page read and write
|
||
19FF6C4B000
|
trusted library allocation
|
page read and write
|
||
19FF63C0000
|
trusted library allocation
|
page read and write
|
||
CD1000
|
unkown
|
page execute read
|
||
19FF5086000
|
trusted library allocation
|
page read and write
|
||
19FF8535000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF56A8000
|
heap
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF6FF3000
|
trusted library allocation
|
page read and write
|
||
1A001A45000
|
trusted library allocation
|
page read and write
|
||
1A001B32000
|
trusted library allocation
|
page read and write
|
||
19FF6BCB000
|
trusted library allocation
|
page read and write
|
||
19FF85D3000
|
trusted library allocation
|
page read and write
|
||
19FF6CC9000
|
trusted library allocation
|
page read and write
|
||
19FF6BC3000
|
trusted library allocation
|
page read and write
|
||
19FF6B5B000
|
trusted library allocation
|
page read and write
|
||
19FF2C54000
|
trusted library allocation
|
page read and write
|
||
19FF2A7F000
|
trusted library allocation
|
page read and write
|
||
33ECBD8000
|
stack
|
page read and write
|
||
19FFB6D9000
|
trusted library allocation
|
page read and write
|
||
10A3000
|
heap
|
page read and write
|
||
19FEC683000
|
heap
|
page read and write
|
||
19FF7679000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FEC6EB000
|
heap
|
page read and write
|
||
19FF77BD000
|
trusted library allocation
|
page read and write
|
||
19FF5321000
|
trusted library allocation
|
page read and write
|
||
19FF6DC8000
|
trusted library allocation
|
page read and write
|
||
19FF77EB000
|
trusted library allocation
|
page read and write
|
||
19FF63F6000
|
trusted library allocation
|
page read and write
|
||
19FF6349000
|
trusted library allocation
|
page read and write
|
||
19FF9163000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FFF94B000
|
trusted library allocation
|
page read and write
|
||
214A1E41000
|
heap
|
page read and write
|
||
19FF6E93000
|
trusted library allocation
|
page read and write
|
||
19FF77A2000
|
trusted library allocation
|
page read and write
|
||
33F05BE000
|
unkown
|
page readonly
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
838F7D8000
|
stack
|
page read and write
|
||
19FF7FE5000
|
trusted library allocation
|
page read and write
|
||
19FF801D000
|
trusted library allocation
|
page read and write
|
||
19FEC6EE000
|
heap
|
page read and write
|
||
19FF71F1000
|
trusted library allocation
|
page read and write
|
||
19FF768F000
|
trusted library allocation
|
page read and write
|
||
19FF5F3C000
|
trusted library allocation
|
page read and write
|
||
19FF53DE000
|
trusted library allocation
|
page read and write
|
||
19FF178C000
|
trusted library allocation
|
page read and write
|
||
19FF5BCC000
|
trusted library allocation
|
page read and write
|
||
19FF7625000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FF536F000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FFB6FB000
|
trusted library allocation
|
page read and write
|
||
19FEC694000
|
heap
|
page read and write
|
||
19FF8300000
|
trusted library allocation
|
page read and write
|
||
214A1EA3000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF75EA000
|
trusted library allocation
|
page read and write
|
||
19FF85AA000
|
trusted library allocation
|
page read and write
|
||
19FFDAC1000
|
trusted library allocation
|
page read and write
|
||
8390FFE000
|
unkown
|
page readonly
|
||
19FF6A2D000
|
trusted library allocation
|
page read and write
|
||
19FF53B1000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FFF8B8000
|
trusted library allocation
|
page read and write
|
||
19FF6B93000
|
trusted library allocation
|
page read and write
|
||
19FF6FD6000
|
trusted library allocation
|
page read and write
|
||
19FF77F2000
|
trusted library allocation
|
page read and write
|
||
1A00136A000
|
trusted library allocation
|
page read and write
|
||
19FFDCFE000
|
trusted library allocation
|
page read and write
|
||
19FF5325000
|
trusted library allocation
|
page read and write
|
||
19FF6B72000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF7618000
|
trusted library allocation
|
page read and write
|
||
214A1EBF000
|
heap
|
page read and write
|
||
19FF539C000
|
trusted library allocation
|
page read and write
|
||
19FF6C56000
|
trusted library allocation
|
page read and write
|
||
19FF536F000
|
trusted library allocation
|
page read and write
|
||
19FF6C3A000
|
trusted library allocation
|
page read and write
|
||
19FF720A000
|
trusted library allocation
|
page read and write
|
||
19FF53BE000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF6AA3000
|
trusted library allocation
|
page read and write
|
||
19FF7164000
|
trusted library allocation
|
page read and write
|
||
214A1286000
|
heap
|
page read and write
|
||
19FEC6E7000
|
heap
|
page read and write
|
||
19FFD92A000
|
trusted library allocation
|
page read and write
|
||
1A001EDF000
|
trusted library allocation
|
page read and write
|
||
1A001BE8000
|
trusted library allocation
|
page read and write
|
||
19FF5A8A000
|
trusted library allocation
|
page read and write
|
||
1A001DA0000
|
trusted library allocation
|
page read and write
|
||
19FEC6EB000
|
heap
|
page read and write
|
||
19FFDCE6000
|
trusted library allocation
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FF822C000
|
trusted library allocation
|
page read and write
|
||
19FF7958000
|
trusted library allocation
|
page read and write
|
||
19FF5A6B000
|
trusted library allocation
|
page read and write
|
||
19FF5E37000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF53A5000
|
trusted library allocation
|
page read and write
|
||
19FEC732000
|
heap
|
page read and write
|
||
19FFDA9F000
|
trusted library allocation
|
page read and write
|
||
19FF6397000
|
trusted library allocation
|
page read and write
|
||
19FEC687000
|
heap
|
page read and write
|
||
19FF91A9000
|
trusted library allocation
|
page read and write
|
||
1A001DF9000
|
trusted library allocation
|
page read and write
|
||
19851DC0000
|
unclassified section
|
page readonly
|
||
3851000
|
heap
|
page read and write
|
||
DAF783B000
|
stack
|
page read and write
|
||
19FF917D000
|
trusted library allocation
|
page read and write
|
||
19FF5B4D000
|
trusted library allocation
|
page read and write
|
||
19FF77EB000
|
trusted library allocation
|
page read and write
|
||
19FF79BA000
|
trusted library allocation
|
page read and write
|
||
19FF2A6C000
|
trusted library allocation
|
page read and write
|
||
19FF6B7E000
|
trusted library allocation
|
page read and write
|
||
19FEC730000
|
heap
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FFB6DC000
|
trusted library allocation
|
page read and write
|
||
19FF5E2B000
|
trusted library allocation
|
page read and write
|
||
19FF597E000
|
trusted library allocation
|
page read and write
|
||
19FF803C000
|
trusted library allocation
|
page read and write
|
||
1A001EC4000
|
trusted library allocation
|
page read and write
|
||
19FF5BC5000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19852330000
|
heap
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF5EF1000
|
trusted library allocation
|
page read and write
|
||
19FFD9DE000
|
trusted library allocation
|
page read and write
|
||
19FEC6A4000
|
heap
|
page read and write
|
||
19FF75C3000
|
trusted library allocation
|
page read and write
|
||
19FF568E000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF6B7E000
|
trusted library allocation
|
page read and write
|
||
19FF718B000
|
trusted library allocation
|
page read and write
|
||
19FEC6F0000
|
heap
|
page read and write
|
||
19FF17D2000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF8258000
|
trusted library allocation
|
page read and write
|
||
19FF53E6000
|
trusted library allocation
|
page read and write
|
||
19FF91A6000
|
trusted library allocation
|
page read and write
|
||
19FFDAB2000
|
trusted library allocation
|
page read and write
|
||
214A1ECA000
|
heap
|
page read and write
|
||
19FF9188000
|
trusted library allocation
|
page read and write
|
||
19FF5BBB000
|
trusted library allocation
|
page read and write
|
||
19FFDDC3000
|
trusted library allocation
|
page read and write
|
||
D9C000
|
unkown
|
page write copy
|
||
19FFDCF5000
|
trusted library allocation
|
page read and write
|
||
19FF8214000
|
trusted library allocation
|
page read and write
|
||
19FF28CB000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
1A001E4E000
|
trusted library allocation
|
page read and write
|
||
1A000345000
|
heap
|
page read and write
|
||
19FEC69D000
|
heap
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF9441000
|
trusted library allocation
|
page read and write
|
||
19FEC710000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF5BB9000
|
trusted library allocation
|
page read and write
|
||
1A000606000
|
trusted library allocation
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
1A001DE6000
|
trusted library allocation
|
page read and write
|
||
19FF5BE9000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FF50AC000
|
trusted library allocation
|
page read and write
|
||
19FF91BB000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF77BD000
|
trusted library allocation
|
page read and write
|
||
19FFDABC000
|
trusted library allocation
|
page read and write
|
||
19FF5BBB000
|
trusted library allocation
|
page read and write
|
||
19FFF870000
|
trusted library allocation
|
page read and write
|
||
19FF93A2000
|
trusted library allocation
|
page read and write
|
||
1A000F80000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF952C000
|
trusted library allocation
|
page read and write
|
||
214A1F2D000
|
heap
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF8647000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF77FC000
|
trusted library allocation
|
page read and write
|
||
1A001A34000
|
trusted library allocation
|
page read and write
|
||
1A001EF5000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FFF35D000
|
trusted library allocation
|
page read and write
|
||
19FF6CB1000
|
trusted library allocation
|
page read and write
|
||
19FF50B7000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
1A5632A7000
|
trusted library allocation
|
page read and write
|
||
19FF76BC000
|
trusted library allocation
|
page read and write
|
||
19FF7933000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FF7DF4000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF7CB7000
|
trusted library allocation
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FF7E09000
|
trusted library allocation
|
page read and write
|
||
19FF7F7B000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FEC6E8000
|
heap
|
page read and write
|
||
19FFD9DE000
|
trusted library allocation
|
page read and write
|
||
1A000548000
|
trusted library allocation
|
page read and write
|
||
214A1F28000
|
heap
|
page read and write
|
||
1A001A23000
|
trusted library allocation
|
page read and write
|
||
19FF7679000
|
trusted library allocation
|
page read and write
|
||
19FF6C40000
|
trusted library allocation
|
page read and write
|
||
19FF6C3B000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
1A563210000
|
trusted library allocation
|
page read and write
|
||
1A56308A000
|
heap
|
page read and write
|
||
19FF7F7D000
|
trusted library allocation
|
page read and write
|
||
19FF8278000
|
trusted library allocation
|
page read and write
|
||
19FF75BA000
|
trusted library allocation
|
page read and write
|
||
19FFF824000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FFF8D0000
|
trusted library allocation
|
page read and write
|
||
19FF78EC000
|
trusted library allocation
|
page read and write
|
||
19FF82DB000
|
trusted library allocation
|
page read and write
|
||
19FFDDCA000
|
trusted library allocation
|
page read and write
|
||
19FF5BB9000
|
trusted library allocation
|
page read and write
|
||
1A001B60000
|
trusted library allocation
|
page read and write
|
||
19FF562F000
|
heap
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF5EF8000
|
trusted library allocation
|
page read and write
|
||
1A001BE8000
|
trusted library allocation
|
page read and write
|
||
19FF59C4000
|
trusted library allocation
|
page read and write
|
||
8392A3E000
|
stack
|
page read and write
|
||
19FF10EF000
|
trusted library allocation
|
page read and write
|
||
19FFDBEB000
|
trusted library allocation
|
page read and write
|
||
214A1F28000
|
heap
|
page read and write
|
||
19FF81D7000
|
trusted library allocation
|
page read and write
|
||
19FF6377000
|
trusted library allocation
|
page read and write
|
||
19FFDAFC000
|
trusted library allocation
|
page read and write
|
||
10AF000
|
heap
|
page read and write
|
||
19FF5BFC000
|
trusted library allocation
|
page read and write
|
||
19FF77D1000
|
trusted library allocation
|
page read and write
|
||
19FFDCE8000
|
trusted library allocation
|
page read and write
|
||
19FF6B33000
|
trusted library allocation
|
page read and write
|
||
1A001BF5000
|
trusted library allocation
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FF2CAD000
|
trusted library allocation
|
page read and write
|
||
19FF26CA000
|
trusted library allocation
|
page read and write
|
||
19FF572B000
|
trusted library allocation
|
page read and write
|
||
19FF17B8000
|
trusted library allocation
|
page read and write
|
||
19FF2CC3000
|
trusted library allocation
|
page read and write
|
||
19FEC6B8000
|
heap
|
page read and write
|
||
19FF63A7000
|
trusted library allocation
|
page read and write
|
||
19FF5369000
|
trusted library allocation
|
page read and write
|
||
19FEC6B0000
|
heap
|
page read and write
|
||
19FF5B39000
|
trusted library allocation
|
page read and write
|
||
19FF6B4F000
|
trusted library allocation
|
page read and write
|
||
214A1369000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FEC6AA000
|
heap
|
page read and write
|
||
19FF71F9000
|
trusted library allocation
|
page read and write
|
||
19FF73C8000
|
trusted library allocation
|
page read and write
|
||
19FF73A3000
|
trusted library allocation
|
page read and write
|
||
19FF85CF000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF6CC9000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF77AB000
|
trusted library allocation
|
page read and write
|
||
19FEC6F6000
|
heap
|
page read and write
|
||
19FF9CF8000
|
heap
|
page read and write
|
||
1A0002B7000
|
trusted library allocation
|
page read and write
|
||
19FF814F000
|
trusted library allocation
|
page read and write
|
||
19FF573D000
|
trusted library allocation
|
page read and write
|
||
19FFD9A7000
|
trusted library allocation
|
page read and write
|
||
19FF9F38000
|
trusted library allocation
|
page read and write
|
||
19FF7974000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF867C000
|
trusted library allocation
|
page read and write
|
||
19FF9D09000
|
heap
|
page read and write
|
||
19FFDAD6000
|
trusted library allocation
|
page read and write
|
||
19FFDC3C000
|
trusted library allocation
|
page read and write
|
||
19FF8072000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF7745000
|
trusted library allocation
|
page read and write
|
||
19FF7CD0000
|
trusted library allocation
|
page read and write
|
||
19FF7137000
|
trusted library allocation
|
page read and write
|
||
19FF9B27000
|
trusted library allocation
|
page read and write
|
||
1A00138E000
|
trusted library allocation
|
page read and write
|
||
19FF10C0000
|
trusted library allocation
|
page read and write
|
||
1A00027E000
|
trusted library allocation
|
page read and write
|
||
19FF5EEF000
|
trusted library allocation
|
page read and write
|
||
19FF77E2000
|
trusted library allocation
|
page read and write
|
||
1A001705000
|
trusted library allocation
|
page read and write
|
||
19FF539E000
|
trusted library allocation
|
page read and write
|
||
19FF537F000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF6C50000
|
trusted library allocation
|
page read and write
|
||
19FEC701000
|
heap
|
page read and write
|
||
19FF50BB000
|
trusted library allocation
|
page read and write
|
||
19FF7F18000
|
trusted library allocation
|
page read and write
|
||
19FF53B6000
|
trusted library allocation
|
page read and write
|
||
1A001AD2000
|
trusted library allocation
|
page read and write
|
||
19FF8583000
|
trusted library allocation
|
page read and write
|
||
19FF6B97000
|
trusted library allocation
|
page read and write
|
||
19FFDAA7000
|
trusted library allocation
|
page read and write
|
||
1A001BF5000
|
trusted library allocation
|
page read and write
|
||
19FF5ACB000
|
trusted library allocation
|
page read and write
|
||
19FF10EF000
|
trusted library allocation
|
page read and write
|
||
214A1F31000
|
heap
|
page read and write
|
||
19FFDA99000
|
trusted library allocation
|
page read and write
|
||
19FF18C3000
|
trusted library allocation
|
page read and write
|
||
19FFDB15000
|
trusted library allocation
|
page read and write
|
||
19FEC732000
|
heap
|
page read and write
|
||
214A1FA7000
|
heap
|
page read and write
|
||
1A001DA4000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FF6C36000
|
trusted library allocation
|
page read and write
|
||
19FF5964000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FF79FB000
|
trusted library allocation
|
page read and write
|
||
19FF53F0000
|
trusted library allocation
|
page read and write
|
||
19FFDA49000
|
trusted library allocation
|
page read and write
|
||
19FF6BE1000
|
trusted library allocation
|
page read and write
|
||
19FF2C9C000
|
trusted library allocation
|
page read and write
|
||
C44BFFF000
|
stack
|
page read and write
|
||
19FF91C4000
|
trusted library allocation
|
page read and write
|
||
19FF76BC000
|
trusted library allocation
|
page read and write
|
||
19FF76E0000
|
trusted library allocation
|
page read and write
|
||
19FF2AF7000
|
trusted library allocation
|
page read and write
|
||
19FFDCD7000
|
trusted library allocation
|
page read and write
|
||
19FF94E4000
|
trusted library allocation
|
page read and write
|
||
19FF76BE000
|
trusted library allocation
|
page read and write
|
||
19FFF943000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF78FB000
|
trusted library allocation
|
page read and write
|
||
19FF2A70000
|
trusted library allocation
|
page read and write
|
||
19FF6C73000
|
trusted library allocation
|
page read and write
|
||
214A1F3D000
|
heap
|
page read and write
|
||
19FF77DC000
|
trusted library allocation
|
page read and write
|
||
2BFE56BA000
|
heap
|
page read and write
|
||
19FFDAD5000
|
trusted library allocation
|
page read and write
|
||
19FF7155000
|
trusted library allocation
|
page read and write
|
||
19FFFC3B000
|
trusted library allocation
|
page read and write
|
||
19FFDE00000
|
trusted library allocation
|
page read and write
|
||
19FEC6A7000
|
heap
|
page read and write
|
||
19FF7207000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
1A000301000
|
heap
|
page read and write
|
||
19FFDCB8000
|
trusted library allocation
|
page read and write
|
||
19FF6B93000
|
trusted library allocation
|
page read and write
|
||
19FF53E2000
|
trusted library allocation
|
page read and write
|
||
19FF536C000
|
trusted library allocation
|
page read and write
|
||
19FEC6A3000
|
heap
|
page read and write
|
||
1A0013B3000
|
trusted library allocation
|
page read and write
|
||
19FEC6F0000
|
heap
|
page read and write
|
||
214A1F98000
|
heap
|
page read and write
|
||
19FF85BD000
|
trusted library allocation
|
page read and write
|
||
19FF769F000
|
trusted library allocation
|
page read and write
|
||
19FF53CD000
|
trusted library allocation
|
page read and write
|
||
1A001DE3000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FF2860000
|
trusted library allocation
|
page read and write
|
||
1A00138C000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF28CE000
|
trusted library allocation
|
page read and write
|
||
1A001AC3000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FEC694000
|
heap
|
page read and write
|
||
19FFD832000
|
trusted library allocation
|
page read and write
|
||
19FF8300000
|
trusted library allocation
|
page read and write
|
||
19FF598D000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
1A000273000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF50B2000
|
trusted library allocation
|
page read and write
|
||
19FF53E2000
|
trusted library allocation
|
page read and write
|
||
1A00218A000
|
trusted library allocation
|
page read and write
|
||
2BFE56B2000
|
heap
|
page read and write
|
||
19FF8040000
|
trusted library allocation
|
page read and write
|
||
19FF800D000
|
trusted library allocation
|
page read and write
|
||
19FF53C7000
|
trusted library allocation
|
page read and write
|
||
19FF10CE000
|
trusted library allocation
|
page read and write
|
||
19FF79EF000
|
trusted library allocation
|
page read and write
|
||
19FF79E8000
|
trusted library allocation
|
page read and write
|
||
19FF767C000
|
trusted library allocation
|
page read and write
|
||
19FF719C000
|
trusted library allocation
|
page read and write
|
||
19FF8024000
|
trusted library allocation
|
page read and write
|
||
19FF6C4B000
|
trusted library allocation
|
page read and write
|
||
19FFF834000
|
trusted library allocation
|
page read and write
|
||
19FEC69D000
|
heap
|
page read and write
|
||
19FF5E63000
|
trusted library allocation
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FFFC4D000
|
trusted library allocation
|
page read and write
|
||
214A1A1C000
|
trusted library allocation
|
page read and write
|
||
19FEC6EB000
|
heap
|
page read and write
|
||
19FEC6C3000
|
heap
|
page read and write
|
||
19FF758C000
|
trusted library allocation
|
page read and write
|
||
19FF633F000
|
trusted library allocation
|
page read and write
|
||
214A1376000
|
trusted library allocation
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FF5BD8000
|
trusted library allocation
|
page read and write
|
||
19FF5BE7000
|
trusted library allocation
|
page read and write
|
||
19FFD935000
|
trusted library allocation
|
page read and write
|
||
1A563279000
|
trusted library allocation
|
page read and write
|
||
19FF7CC6000
|
trusted library allocation
|
page read and write
|
||
1A00211C000
|
trusted library allocation
|
page read and write
|
||
19FF6A2B000
|
trusted library allocation
|
page read and write
|
||
19FF79F5000
|
trusted library allocation
|
page read and write
|
||
19FFDACD000
|
trusted library allocation
|
page read and write
|
||
19FF633D000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FEC6B0000
|
heap
|
page read and write
|
||
19FF80D8000
|
trusted library allocation
|
page read and write
|
||
19FFDA47000
|
trusted library allocation
|
page read and write
|
||
19FF78EC000
|
trusted library allocation
|
page read and write
|
||
19FF53DE000
|
trusted library allocation
|
page read and write
|
||
19FF5BC2000
|
trusted library allocation
|
page read and write
|
||
1A001E99000
|
trusted library allocation
|
page read and write
|
||
19FFDCED000
|
trusted library allocation
|
page read and write
|
||
19FF77DF000
|
trusted library allocation
|
page read and write
|
||
10B1000
|
heap
|
page read and write
|
||
19FFDBC7000
|
trusted library allocation
|
page read and write
|
||
19FF6B8D000
|
trusted library allocation
|
page read and write
|
||
19FF865D000
|
trusted library allocation
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF825A000
|
trusted library allocation
|
page read and write
|
||
19FFB644000
|
trusted library allocation
|
page read and write
|
||
19FF78A3000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF598D000
|
trusted library allocation
|
page read and write
|
||
19FFF388000
|
trusted library allocation
|
page read and write
|
||
19FF6BE1000
|
trusted library allocation
|
page read and write
|
||
1A001E7F000
|
trusted library allocation
|
page read and write
|
||
19FF56A8000
|
heap
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
1A563432000
|
trusted library allocation
|
page read and write
|
||
19FF77BA000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF82D3000
|
trusted library allocation
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19852507000
|
trusted library allocation
|
page read and write
|
||
19FF53C9000
|
trusted library allocation
|
page read and write
|
||
19FF6B97000
|
trusted library allocation
|
page read and write
|
||
19FFDCBF000
|
trusted library allocation
|
page read and write
|
||
19FF76DB000
|
trusted library allocation
|
page read and write
|
||
1A001AC3000
|
trusted library allocation
|
page read and write
|
||
19FF6C6D000
|
trusted library allocation
|
page read and write
|
||
19FF9B15000
|
trusted library allocation
|
page read and write
|
||
19FF9F38000
|
trusted library allocation
|
page read and write
|
||
19FF5E12000
|
trusted library allocation
|
page read and write
|
||
19FF9F28000
|
trusted library allocation
|
page read and write
|
||
19FF858C000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FFDDAA000
|
trusted library allocation
|
page read and write
|
||
214A1EEA000
|
heap
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FF7581000
|
trusted library allocation
|
page read and write
|
||
19FFF392000
|
trusted library allocation
|
page read and write
|
||
19FF82DB000
|
trusted library allocation
|
page read and write
|
||
19FEC68B000
|
heap
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FEC6B0000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF78C2000
|
trusted library allocation
|
page read and write
|
||
19FF9405000
|
trusted library allocation
|
page read and write
|
||
19FF7E09000
|
trusted library allocation
|
page read and write
|
||
19FEC687000
|
heap
|
page read and write
|
||
1A563212000
|
trusted library allocation
|
page read and write
|
||
214A1EAC000
|
heap
|
page read and write
|
||
19FF53C7000
|
trusted library allocation
|
page read and write
|
||
19FEC69A000
|
heap
|
page read and write
|
||
19FEC6A7000
|
heap
|
page read and write
|
||
1A001BA9000
|
trusted library allocation
|
page read and write
|
||
19FF534C000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
1A001ED7000
|
trusted library allocation
|
page read and write
|
||
19FF53AE000
|
trusted library allocation
|
page read and write
|
||
19FFB6A3000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF6CDD000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FEC6EF000
|
heap
|
page read and write
|
||
19FF7B6E000
|
trusted library allocation
|
page read and write
|
||
19FFF8CD000
|
trusted library allocation
|
page read and write
|
||
19FFDCE6000
|
trusted library allocation
|
page read and write
|
||
19FFDC1B000
|
trusted library allocation
|
page read and write
|
||
19FF5A9C000
|
trusted library allocation
|
page read and write
|
||
19FF7160000
|
trusted library allocation
|
page read and write
|
||
19FF82D3000
|
trusted library allocation
|
page read and write
|
||
19FF5908000
|
trusted library allocation
|
page read and write
|
||
EA42BFE000
|
stack
|
page read and write
|
||
19FFFC20000
|
trusted library allocation
|
page read and write
|
||
19852216000
|
trusted library allocation
|
page read and write
|
||
19FF7764000
|
trusted library allocation
|
page read and write
|
||
19FF17F6000
|
trusted library allocation
|
page read and write
|
||
19FFDABB000
|
trusted library allocation
|
page read and write
|
||
19FF5377000
|
trusted library allocation
|
page read and write
|
||
19FFF93B000
|
trusted library allocation
|
page read and write
|
||
19FF6CBF000
|
trusted library allocation
|
page read and write
|
||
19FF9CF8000
|
heap
|
page read and write
|
||
19FF826D000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF7187000
|
trusted library allocation
|
page read and write
|
||
19FF9F31000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF7963000
|
trusted library allocation
|
page read and write
|
||
19FF5039000
|
trusted library allocation
|
page read and write
|
||
19FF5BD5000
|
trusted library allocation
|
page read and write
|
||
1A000275000
|
trusted library allocation
|
page read and write
|
||
19FF7618000
|
trusted library allocation
|
page read and write
|
||
19FF177F000
|
trusted library allocation
|
page read and write
|
||
19FEC710000
|
heap
|
page read and write
|
||
214A1F99000
|
heap
|
page read and write
|
||
19FF6C73000
|
trusted library allocation
|
page read and write
|
||
19FF79EF000
|
trusted library allocation
|
page read and write
|
||
19FF17E9000
|
trusted library allocation
|
page read and write
|
||
19FF91C7000
|
trusted library allocation
|
page read and write
|
||
19FF82DB000
|
trusted library allocation
|
page read and write
|
||
19FF76FD000
|
trusted library allocation
|
page read and write
|
||
19FFDC73000
|
trusted library allocation
|
page read and write
|
||
19FF53DE000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF77F7000
|
trusted library allocation
|
page read and write
|
||
19FF85B4000
|
trusted library allocation
|
page read and write
|
||
19FF7488000
|
trusted library allocation
|
page read and write
|
||
19FF5A6F000
|
trusted library allocation
|
page read and write
|
||
1A001750000
|
trusted library allocation
|
page read and write
|
||
19FFDCDD000
|
trusted library allocation
|
page read and write
|
||
19FF82D3000
|
trusted library allocation
|
page read and write
|
||
19FF769F000
|
trusted library allocation
|
page read and write
|
||
19851E60000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF6BC3000
|
trusted library allocation
|
page read and write
|
||
19FF5362000
|
trusted library allocation
|
page read and write
|
||
19FF76F7000
|
trusted library allocation
|
page read and write
|
||
1A002084000
|
trusted library allocation
|
page read and write
|
||
19FF77EB000
|
trusted library allocation
|
page read and write
|
||
19FF53AE000
|
trusted library allocation
|
page read and write
|
||
19FFF8C1000
|
trusted library allocation
|
page read and write
|
||
214A1100000
|
trusted library allocation
|
page read and write
|
||
19FFDCE6000
|
trusted library allocation
|
page read and write
|
||
1A0013FD000
|
trusted library allocation
|
page read and write
|
||
19FFF985000
|
trusted library allocation
|
page read and write
|
||
19FF63C3000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF6A2B000
|
trusted library allocation
|
page read and write
|
||
19FF7949000
|
trusted library allocation
|
page read and write
|
||
198522C4000
|
trusted library allocation
|
page read and write
|
||
19FFD9E1000
|
trusted library allocation
|
page read and write
|
||
19FFF92F000
|
trusted library allocation
|
page read and write
|
||
1A0002B6000
|
trusted library allocation
|
page read and write
|
||
1A563080000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF6D2F000
|
trusted library allocation
|
page read and write
|
||
19FF6FAB000
|
trusted library allocation
|
page read and write
|
||
19FF866C000
|
trusted library allocation
|
page read and write
|
||
1A001E99000
|
trusted library allocation
|
page read and write
|
||
19FF6C3A000
|
trusted library allocation
|
page read and write
|
||
19FEC6F4000
|
heap
|
page read and write
|
||
19FF6EFE000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
unkown
|
page readonly
|
||
1A00138C000
|
trusted library allocation
|
page read and write
|
||
19FF53BE000
|
trusted library allocation
|
page read and write
|
||
19FF77EB000
|
trusted library allocation
|
page read and write
|
||
19FF2A4E000
|
trusted library allocation
|
page read and write
|
||
214A1E8D000
|
heap
|
page read and write
|
||
17434EB03000
|
trusted library allocation
|
page read and write
|
||
19FF6C56000
|
trusted library allocation
|
page read and write
|
||
1A001EB2000
|
trusted library allocation
|
page read and write
|
||
19FF8193000
|
trusted library allocation
|
page read and write
|
||
19FF713D000
|
trusted library allocation
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
19FF7F22000
|
trusted library allocation
|
page read and write
|
||
DAF78FE000
|
unkown
|
page readonly
|
||
1A001E96000
|
trusted library allocation
|
page read and write
|
||
19FF71D2000
|
trusted library allocation
|
page read and write
|
||
19FF76DD000
|
trusted library allocation
|
page read and write
|
||
19FFDB7D000
|
trusted library allocation
|
page read and write
|
||
19FF77A7000
|
trusted library allocation
|
page read and write
|
||
214A0F50000
|
unclassified section
|
page readonly
|
||
19FF5EDF000
|
trusted library allocation
|
page read and write
|
||
19FF50D9000
|
trusted library allocation
|
page read and write
|
||
19FF76BE000
|
trusted library allocation
|
page read and write
|
||
19FF80C2000
|
trusted library allocation
|
page read and write
|
||
19FF501F000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF6C4B000
|
trusted library allocation
|
page read and write
|
||
19FF77D1000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF7E48000
|
trusted library allocation
|
page read and write
|
||
19FF6D83000
|
trusted library allocation
|
page read and write
|
||
19FFF983000
|
trusted library allocation
|
page read and write
|
||
19FF74F4000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF62BB000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
1985225F000
|
trusted library allocation
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
19FF2C8B000
|
trusted library allocation
|
page read and write
|
||
19FF2C3E000
|
trusted library allocation
|
page read and write
|
||
19FF7445000
|
trusted library allocation
|
page read and write
|
||
1A001322000
|
trusted library allocation
|
page read and write
|
||
1A20003F000
|
trusted library allocation
|
page read and write
|
||
19FF73C5000
|
trusted library allocation
|
page read and write
|
||
19FFDCBF000
|
trusted library allocation
|
page read and write
|
||
19FF85F9000
|
trusted library allocation
|
page read and write
|
||
1A001AD2000
|
trusted library allocation
|
page read and write
|
||
19FEC693000
|
heap
|
page read and write
|
||
19FF6CAA000
|
trusted library allocation
|
page read and write
|
||
19FFDDE2000
|
trusted library allocation
|
page read and write
|
||
DAF793E000
|
stack
|
page read and write
|
||
2BFE71C0000
|
heap
|
page read and write
|
||
214A130C000
|
trusted library allocation
|
page read and write
|
||
19FF7933000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FE7241000
|
heap
|
page read and write
|
||
19FF6B82000
|
trusted library allocation
|
page read and write
|
||
19FF76DB000
|
trusted library allocation
|
page read and write
|
||
19FF6BAE000
|
trusted library allocation
|
page read and write
|
||
19FF6BAD000
|
trusted library allocation
|
page read and write
|
||
19FFF394000
|
trusted library allocation
|
page read and write
|
||
19FF564F000
|
heap
|
page read and write
|
||
19FFFC8C000
|
trusted library allocation
|
page read and write
|
||
19FF53B8000
|
trusted library allocation
|
page read and write
|
||
19FF93E5000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
10A7000
|
heap
|
page read and write
|
||
1A001383000
|
trusted library allocation
|
page read and write
|
||
19FF5BDF000
|
trusted library allocation
|
page read and write
|
||
1A001737000
|
trusted library allocation
|
page read and write
|
||
33EFDBE000
|
stack
|
page read and write
|
||
19FF50A8000
|
trusted library allocation
|
page read and write
|
||
19FEC693000
|
heap
|
page read and write
|
||
19FF6E8E000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF6AAE000
|
trusted library allocation
|
page read and write
|
||
19FF6393000
|
trusted library allocation
|
page read and write
|
||
19FF90BB000
|
trusted library allocation
|
page read and write
|
||
19FF744F000
|
trusted library allocation
|
page read and write
|
||
19FF719F000
|
trusted library allocation
|
page read and write
|
||
214A1E49000
|
heap
|
page read and write
|
||
19FF9557000
|
trusted library allocation
|
page read and write
|
||
19FFDA91000
|
trusted library allocation
|
page read and write
|
||
19FF503E000
|
trusted library allocation
|
page read and write
|
||
19FF77FC000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF77F7000
|
trusted library allocation
|
page read and write
|
||
214A1F98000
|
heap
|
page read and write
|
||
19FF5BA8000
|
trusted library allocation
|
page read and write
|
||
19FF9F4D000
|
trusted library allocation
|
page read and write
|
||
19FF823B000
|
trusted library allocation
|
page read and write
|
||
214A1F61000
|
heap
|
page read and write
|
||
19FF5BF4000
|
trusted library allocation
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
19FF7F1D000
|
trusted library allocation
|
page read and write
|
||
1A000298000
|
trusted library allocation
|
page read and write
|
||
1A00062E000
|
trusted library allocation
|
page read and write
|
||
19FFDCF2000
|
trusted library allocation
|
page read and write
|
||
19FFD92A000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FFDD91000
|
trusted library allocation
|
page read and write
|
||
19FF85EF000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FF53E2000
|
trusted library allocation
|
page read and write
|
||
19FF6C1B000
|
trusted library allocation
|
page read and write
|
||
19FEC686000
|
heap
|
page read and write
|
||
19FFB6D1000
|
trusted library allocation
|
page read and write
|
||
19FF5BDC000
|
trusted library allocation
|
page read and write
|
||
1A562FA0000
|
heap
|
page read and write
|
||
19FF6380000
|
trusted library allocation
|
page read and write
|
||
19FF73A3000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
96CCBB1000
|
trusted library allocation
|
page execute read
|
||
19FF6376000
|
trusted library allocation
|
page read and write
|
||
19FF7946000
|
trusted library allocation
|
page read and write
|
||
19FF7462000
|
trusted library allocation
|
page read and write
|
||
19FF71B8000
|
trusted library allocation
|
page read and write
|
||
19FF5EFE000
|
trusted library allocation
|
page read and write
|
||
19FF53B1000
|
trusted library allocation
|
page read and write
|
||
214A13A7000
|
trusted library allocation
|
page read and write
|
||
19FF9F40000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
1A000347000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF5AA2000
|
trusted library allocation
|
page read and write
|
||
19FF857D000
|
trusted library allocation
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
19FF770F000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF53C9000
|
trusted library allocation
|
page read and write
|
||
1A563414000
|
trusted library allocation
|
page read and write
|
||
1A001EAF000
|
trusted library allocation
|
page read and write
|
||
33EE47D000
|
stack
|
page read and write
|
||
19FF71AB000
|
trusted library allocation
|
page read and write
|
||
19FF53B1000
|
trusted library allocation
|
page read and write
|
||
1A001E7F000
|
trusted library allocation
|
page read and write
|
||
19FF5377000
|
trusted library allocation
|
page read and write
|
||
19FF53AE000
|
trusted library allocation
|
page read and write
|
||
19FF5EF7000
|
trusted library allocation
|
page read and write
|
||
19FF8245000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF9093000
|
trusted library allocation
|
page read and write
|
||
19FF6C56000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FEC710000
|
heap
|
page read and write
|
||
19FF286F000
|
trusted library allocation
|
page read and write
|
||
19FFDCFE000
|
trusted library allocation
|
page read and write
|
||
19FEC6E4000
|
heap
|
page read and write
|
||
19FFDCD0000
|
trusted library allocation
|
page read and write
|
||
1A000507000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF5A66000
|
trusted library allocation
|
page read and write
|
||
19FEC6A4000
|
heap
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF76E8000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF793D000
|
trusted library allocation
|
page read and write
|
||
19FF16FB000
|
trusted library allocation
|
page read and write
|
||
19FFDAE6000
|
trusted library allocation
|
page read and write
|
||
19FF768F000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FF2856000
|
trusted library allocation
|
page read and write
|
||
19FF6A96000
|
trusted library allocation
|
page read and write
|
||
19FF74C4000
|
trusted library allocation
|
page read and write
|
||
19FF6332000
|
trusted library allocation
|
page read and write
|
||
19FFD939000
|
trusted library allocation
|
page read and write
|
||
19FF78C2000
|
trusted library allocation
|
page read and write
|
||
19FFDCD2000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
1985260C000
|
trusted library allocation
|
page read and write
|
||
19FFFCD5000
|
trusted library allocation
|
page read and write
|
||
214A12D2000
|
unkown
|
page execute read
|
||
19FF590D000
|
trusted library allocation
|
page read and write
|
||
19FF76ED000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19852230000
|
trusted library allocation
|
page read and write
|
||
214A12D4000
|
unkown
|
page execute read
|
||
19FF7616000
|
trusted library allocation
|
page read and write
|
||
19FEC6A7000
|
heap
|
page read and write
|
||
19FFF97D000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF5357000
|
trusted library allocation
|
page read and write
|
||
19852265000
|
trusted library allocation
|
page read and write
|
||
19FF6355000
|
trusted library allocation
|
page read and write
|
||
19FF74AC000
|
trusted library allocation
|
page read and write
|
||
19FEC701000
|
heap
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF71B8000
|
trusted library allocation
|
page read and write
|
||
19FF6D0D000
|
trusted library allocation
|
page read and write
|
||
19FF796C000
|
trusted library allocation
|
page read and write
|
||
19FEC6AB000
|
heap
|
page read and write
|
||
19FF77C4000
|
trusted library allocation
|
page read and write
|
||
19FF779B000
|
trusted library allocation
|
page read and write
|
||
19FF6C4B000
|
trusted library allocation
|
page read and write
|
||
19FF7390000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF5092000
|
trusted library allocation
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FF6A0E000
|
trusted library allocation
|
page read and write
|
||
19FEC697000
|
heap
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF74AC000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
1A0002FE000
|
trusted library allocation
|
page read and write
|
||
19FF77F7000
|
trusted library allocation
|
page read and write
|
||
1A001E9C000
|
trusted library allocation
|
page read and write
|
||
1A563849000
|
heap
|
page read and write
|
||
19FF9B15000
|
trusted library allocation
|
page read and write
|
||
19FEC6C1000
|
heap
|
page read and write
|
||
19FF53E6000
|
trusted library allocation
|
page read and write
|
||
19FF6F24000
|
trusted library allocation
|
page read and write
|
||
19FF1800000
|
trusted library allocation
|
page read and write
|
||
214A12E0000
|
trusted library allocation
|
page read and write
|
||
19FF6BC7000
|
trusted library allocation
|
page read and write
|
||
19FFF876000
|
trusted library allocation
|
page read and write
|
||
19FF5BBF000
|
trusted library allocation
|
page read and write
|
||
1A56320D000
|
trusted library allocation
|
page read and write
|
||
19FF5BE1000
|
trusted library allocation
|
page read and write
|
||
19FF6C4D000
|
trusted library allocation
|
page read and write
|
||
19FFD977000
|
trusted library allocation
|
page read and write
|
||
19FF76BC000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
214A1FA7000
|
heap
|
page read and write
|
||
19FF56A9000
|
heap
|
page read and write
|
||
1A001EFE000
|
trusted library allocation
|
page read and write
|
||
19FFDCE8000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
19FF76E8000
|
trusted library allocation
|
page read and write
|
||
214A1E9C000
|
heap
|
page read and write
|
||
19FFF8B8000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF6BAD000
|
trusted library allocation
|
page read and write
|
||
19FFFC24000
|
trusted library allocation
|
page read and write
|
||
19FEC691000
|
heap
|
page read and write
|
||
19851E40000
|
unclassified section
|
page readonly
|
||
1A0004E5000
|
trusted library allocation
|
page read and write
|
||
19FFDCF2000
|
trusted library allocation
|
page read and write
|
||
214A1F23000
|
heap
|
page read and write
|
||
19FF769C000
|
trusted library allocation
|
page read and write
|
||
19FFF96C000
|
trusted library allocation
|
page read and write
|
||
1A563283000
|
trusted library allocation
|
page read and write
|
||
19FF74C4000
|
trusted library allocation
|
page read and write
|
||
19FF851E000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
1A001B5C000
|
trusted library allocation
|
page read and write
|
||
19FF76DB000
|
trusted library allocation
|
page read and write
|
||
19FF78A3000
|
trusted library allocation
|
page read and write
|
||
1A5632C8000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FF562F000
|
heap
|
page read and write
|
||
1A0013FB000
|
trusted library allocation
|
page read and write
|
||
19FF6C50000
|
trusted library allocation
|
page read and write
|
||
83921BE000
|
unkown
|
page readonly
|
||
19FF50BF000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
1A0013AE000
|
trusted library allocation
|
page read and write
|
||
19FF79F5000
|
trusted library allocation
|
page read and write
|
||
19FF94A7000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF2CE0000
|
trusted library allocation
|
page read and write
|
||
19FF6CBC000
|
trusted library allocation
|
page read and write
|
||
19FFF96C000
|
trusted library allocation
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
19FF76DD000
|
trusted library allocation
|
page read and write
|
||
DAF99FE000
|
unkown
|
page readonly
|
||
19FF17B0000
|
trusted library allocation
|
page read and write
|
||
19852249000
|
trusted library allocation
|
page read and write
|
||
1A001DF9000
|
trusted library allocation
|
page read and write
|
||
19FFF328000
|
trusted library allocation
|
page read and write
|
||
19FF2AF7000
|
trusted library allocation
|
page read and write
|
||
214A1290000
|
trusted library allocation
|
page read and write
|
||
1A5633F0000
|
heap
|
page read and write
|
||
214A132F000
|
trusted library allocation
|
page read and write
|
||
1A563269000
|
trusted library allocation
|
page read and write
|
||
19FF7615000
|
trusted library allocation
|
page read and write
|
||
19FFF81B000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FFF933000
|
trusted library allocation
|
page read and write
|
||
19FF531E000
|
trusted library allocation
|
page read and write
|
||
1A000586000
|
trusted library allocation
|
page read and write
|
||
19FF82BC000
|
trusted library allocation
|
page read and write
|
||
19FF77D5000
|
trusted library allocation
|
page read and write
|
||
19FF79EB000
|
trusted library allocation
|
page read and write
|
||
19FF7691000
|
trusted library allocation
|
page read and write
|
||
19FF2A4E000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FF7143000
|
trusted library allocation
|
page read and write
|
||
19FF828C000
|
trusted library allocation
|
page read and write
|
||
19FF2A4E000
|
trusted library allocation
|
page read and write
|
||
1A00137B000
|
trusted library allocation
|
page read and write
|
||
19FF53A5000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FF53B8000
|
trusted library allocation
|
page read and write
|
||
19FF502A000
|
trusted library allocation
|
page read and write
|
||
19FF5E41000
|
trusted library allocation
|
page read and write
|
||
19FF6B51000
|
trusted library allocation
|
page read and write
|
||
19FF94AC000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FF5AA2000
|
trusted library allocation
|
page read and write
|
||
19FF9198000
|
trusted library allocation
|
page read and write
|
||
1A001E7F000
|
trusted library allocation
|
page read and write
|
||
19FF5E41000
|
trusted library allocation
|
page read and write
|
||
19FEC69D000
|
heap
|
page read and write
|
||
19FF91DA000
|
trusted library allocation
|
page read and write
|
||
19FFDB7B000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF76A8000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
unkown
|
page write copy
|
||
19FF5E94000
|
trusted library allocation
|
page read and write
|
||
19FF76BC000
|
trusted library allocation
|
page read and write
|
||
19FF6C73000
|
trusted library allocation
|
page read and write
|
||
19FF76BE000
|
trusted library allocation
|
page read and write
|
||
19FEC732000
|
heap
|
page read and write
|
||
19FF81D0000
|
trusted library allocation
|
page read and write
|
||
19FF761E000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF5B84000
|
trusted library allocation
|
page read and write
|
||
19FFF39D000
|
trusted library allocation
|
page read and write
|
||
19FFDC7A000
|
trusted library allocation
|
page read and write
|
||
2BFE5600000
|
heap
|
page read and write
|
||
19FF5088000
|
trusted library allocation
|
page read and write
|
||
19FF5BDF000
|
trusted library allocation
|
page read and write
|
||
2BFE71A0000
|
heap
|
page read and write
|
||
19FF28E2000
|
trusted library allocation
|
page read and write
|
||
19FF2AB2000
|
trusted library allocation
|
page read and write
|
||
19FF28F2000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF599A000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF5EDF000
|
trusted library allocation
|
page read and write
|
||
19FEC6F9000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
19FF77E2000
|
trusted library allocation
|
page read and write
|
||
19FF801B000
|
trusted library allocation
|
page read and write
|
||
19FF5A6E000
|
trusted library allocation
|
page read and write
|
||
19FEC681000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FFF93B000
|
trusted library allocation
|
page read and write
|
||
19FFDC38000
|
trusted library allocation
|
page read and write
|
||
19FFDBEB000
|
trusted library allocation
|
page read and write
|
||
19FF5E2F000
|
trusted library allocation
|
page read and write
|
||
19FF564F000
|
heap
|
page read and write
|
||
19852340000
|
heap
|
page read and write
|
||
19FFF981000
|
trusted library allocation
|
page read and write
|
||
19FF59D2000
|
trusted library allocation
|
page read and write
|
||
19FEC6AA000
|
heap
|
page read and write
|
||
19FEC6EE000
|
heap
|
page read and write
|
||
19FFDDC7000
|
trusted library allocation
|
page read and write
|
||
19FF59F7000
|
trusted library allocation
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
33EE4BE000
|
unkown
|
page readonly
|
||
19FF503E000
|
trusted library allocation
|
page read and write
|
||
19FFF846000
|
trusted library allocation
|
page read and write
|
||
D9C000
|
unkown
|
page read and write
|
||
19FEC694000
|
heap
|
page read and write
|
||
214A1F29000
|
heap
|
page read and write
|
||
19FF2AB2000
|
trusted library allocation
|
page read and write
|
||
1985226B000
|
trusted library allocation
|
page read and write
|
||
19FF7723000
|
trusted library allocation
|
page read and write
|
||
19FF6C56000
|
trusted library allocation
|
page read and write
|
||
19FF58D3000
|
trusted library allocation
|
page read and write
|
||
19FF503E000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
214A1381000
|
trusted library allocation
|
page read and write
|
||
19FEC6A1000
|
heap
|
page read and write
|
||
1A001E99000
|
trusted library allocation
|
page read and write
|
||
19FF5041000
|
trusted library allocation
|
page read and write
|
||
19FF828C000
|
trusted library allocation
|
page read and write
|
||
19FF7B23000
|
trusted library allocation
|
page read and write
|
||
19FF5A9C000
|
trusted library allocation
|
page read and write
|
||
19FEC6A4000
|
heap
|
page read and write
|
||
19FF79BA000
|
trusted library allocation
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
1A0013D2000
|
trusted library allocation
|
page read and write
|
||
19FF7639000
|
trusted library allocation
|
page read and write
|
||
19FF6C36000
|
trusted library allocation
|
page read and write
|
||
19FF59CF000
|
trusted library allocation
|
page read and write
|
||
19FF5050000
|
trusted library allocation
|
page read and write
|
||
19FF536F000
|
trusted library allocation
|
page read and write
|
||
19FF77EB000
|
trusted library allocation
|
page read and write
|
||
33EE3FE000
|
unkown
|
page readonly
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
1A001B97000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF17D2000
|
trusted library allocation
|
page read and write
|
||
19FF79EF000
|
trusted library allocation
|
page read and write
|
||
19FF10A4000
|
trusted library allocation
|
page read and write
|
||
19FF6A10000
|
trusted library allocation
|
page read and write
|
||
19FF7151000
|
trusted library allocation
|
page read and write
|
||
1A000399000
|
heap
|
page read and write
|
||
19FFDC93000
|
trusted library allocation
|
page read and write
|
||
19FFDB46000
|
trusted library allocation
|
page read and write
|
||
19FFDCF2000
|
trusted library allocation
|
page read and write
|
||
19FF2A9A000
|
trusted library allocation
|
page read and write
|
||
214A1F7B000
|
heap
|
page read and write
|
||
19FF5A5F000
|
trusted library allocation
|
page read and write
|
||
19FEC6E4000
|
heap
|
page read and write
|
||
19FFF98B000
|
trusted library allocation
|
page read and write
|
||
19FFDDE2000
|
trusted library allocation
|
page read and write
|
||
19FF7974000
|
trusted library allocation
|
page read and write
|
||
19FF53B8000
|
trusted library allocation
|
page read and write
|
||
19FFD91F000
|
trusted library allocation
|
page read and write
|
||
19FF91D4000
|
trusted library allocation
|
page read and write
|
||
19FF82BC000
|
trusted library allocation
|
page read and write
|
||
19FF53F1000
|
trusted library allocation
|
page read and write
|
||
19FFF853000
|
trusted library allocation
|
page read and write
|
||
19FF77FC000
|
trusted library allocation
|
page read and write
|
||
19FF54FC000
|
trusted library allocation
|
page read and write
|
||
19FFDD9D000
|
trusted library allocation
|
page read and write
|
||
19FF86DE000
|
trusted library allocation
|
page read and write
|
||
19FF54C3000
|
trusted library allocation
|
page read and write
|
||
19FF6B72000
|
trusted library allocation
|
page read and write
|
||
19FF6DDA000
|
trusted library allocation
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FF5369000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF9486000
|
trusted library allocation
|
page read and write
|
||
19FF829A000
|
trusted library allocation
|
page read and write
|
||
214A1F3D000
|
heap
|
page read and write
|
||
1985203A000
|
heap
|
page read and write
|
||
19FF6CB2000
|
trusted library allocation
|
page read and write
|
||
19FF6DB1000
|
trusted library allocation
|
page read and write
|
||
19FF568B000
|
heap
|
page read and write
|
||
19FF857B000
|
trusted library allocation
|
page read and write
|
||
19FFB6F7000
|
trusted library allocation
|
page read and write
|
||
19FFE000000
|
trusted library allocation
|
page read and write
|
||
19FF91B5000
|
trusted library allocation
|
page read and write
|
||
19FF7146000
|
trusted library allocation
|
page read and write
|
||
19FFDCFE000
|
trusted library allocation
|
page read and write
|
||
19FF2A65000
|
trusted library allocation
|
page read and write
|
||
19FF6B7E000
|
trusted library allocation
|
page read and write
|
||
1A0013D2000
|
trusted library allocation
|
page read and write
|
||
19FEC6EB000
|
heap
|
page read and write
|
||
19FF2AF7000
|
trusted library allocation
|
page read and write
|
||
19FF5307000
|
trusted library allocation
|
page read and write
|
||
19FF5BBF000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
1A00050C000
|
trusted library allocation
|
page read and write
|
||
19FF821E000
|
trusted library allocation
|
page read and write
|
||
19FF6BDD000
|
trusted library allocation
|
page read and write
|
||
1A00138E000
|
trusted library allocation
|
page read and write
|
||
19FEC6CC000
|
heap
|
page read and write
|
||
19FF63AC000
|
trusted library allocation
|
page read and write
|
||
19FFF988000
|
trusted library allocation
|
page read and write
|
||
19FF56E0000
|
heap
|
page read and write
|
||
19FFD9AA000
|
trusted library allocation
|
page read and write
|
||
19FF631A000
|
trusted library allocation
|
page read and write
|
||
19FF62BD000
|
trusted library allocation
|
page read and write
|
||
19FF53B1000
|
trusted library allocation
|
page read and write
|
||
19FEC697000
|
heap
|
page read and write
|
||
19FF868B000
|
trusted library allocation
|
page read and write
|
||
19FF5B4D000
|
trusted library allocation
|
page read and write
|
||
19FF568B000
|
heap
|
page read and write
|
||
19FFFC58000
|
trusted library allocation
|
page read and write
|
||
19FF8252000
|
trusted library allocation
|
page read and write
|
||
19FF81B5000
|
trusted library allocation
|
page read and write
|
||
19FF5E38000
|
trusted library allocation
|
page read and write
|
||
19FFDC8A000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
19FF63F6000
|
trusted library allocation
|
page read and write
|
||
19FF6A7E000
|
trusted library allocation
|
page read and write
|
||
19FF7155000
|
trusted library allocation
|
page read and write
|
||
19FEC6DE000
|
heap
|
page read and write
|
||
19FFF8CC000
|
trusted library allocation
|
page read and write
|
||
19FF85C7000
|
trusted library allocation
|
page read and write
|
||
19FF5BBF000
|
trusted library allocation
|
page read and write
|
||
214A1EA9000
|
heap
|
page read and write
|
||
19FF7666000
|
trusted library allocation
|
page read and write
|
||
19FF7FED000
|
trusted library allocation
|
page read and write
|
||
1A563030000
|
unclassified section
|
page read and write
|
||
19FF531C000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FF5364000
|
trusted library allocation
|
page read and write
|
||
19852276000
|
trusted library allocation
|
page read and write
|
||
19FEC6DF000
|
heap
|
page read and write
|
||
19FFDB81000
|
trusted library allocation
|
page read and write
|
||
8393A3E000
|
stack
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
19FF76BC000
|
trusted library allocation
|
page read and write
|
||
19FEC68B000
|
heap
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
33EE43E000
|
unkown
|
page readonly
|
||
19FF7494000
|
trusted library allocation
|
page read and write
|
||
19FF7FF7000
|
trusted library allocation
|
page read and write
|
||
19FF7FC4000
|
trusted library allocation
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FFB6DC000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF766B000
|
trusted library allocation
|
page read and write
|
||
19FF7733000
|
trusted library allocation
|
page read and write
|
||
19FEC6A4000
|
heap
|
page read and write
|
||
19FFA302000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF7426000
|
trusted library allocation
|
page read and write
|
||
19FF53B8000
|
trusted library allocation
|
page read and write
|
||
19FFF947000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF6CAA000
|
trusted library allocation
|
page read and write
|
||
1A001BE8000
|
trusted library allocation
|
page read and write
|
||
19FFF8FB000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FEC6B2000
|
heap
|
page read and write
|
||
19FF5EA7000
|
trusted library allocation
|
page read and write
|
||
19FF5BDF000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF715A000
|
trusted library allocation
|
page read and write
|
||
19FFFA00000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
19FF7FB3000
|
trusted library allocation
|
page read and write
|
||
19FEC68A000
|
heap
|
page read and write
|
||
19FF9506000
|
trusted library allocation
|
page read and write
|
||
19FF5BCB000
|
trusted library allocation
|
page read and write
|
||
19FF17D5000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FF76E8000
|
trusted library allocation
|
page read and write
|
||
19FF17C5000
|
trusted library allocation
|
page read and write
|
||
19FFDCA8000
|
trusted library allocation
|
page read and write
|
||
19FF53B1000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF8290000
|
trusted library allocation
|
page read and write
|
||
19FFDDE2000
|
trusted library allocation
|
page read and write
|
||
19FEC695000
|
heap
|
page read and write
|
||
19FFDBC5000
|
trusted library allocation
|
page read and write
|
||
19FF533B000
|
trusted library allocation
|
page read and write
|
||
33EDBFE000
|
stack
|
page read and write
|
||
19FF53AB000
|
trusted library allocation
|
page read and write
|
||
1A0005A3000
|
trusted library allocation
|
page read and write
|
||
1A001A57000
|
trusted library allocation
|
page read and write
|
||
19FFD9AA000
|
trusted library allocation
|
page read and write
|
||
19FF56AF000
|
heap
|
page read and write
|
||
1A001DEE000
|
trusted library allocation
|
page read and write
|
||
19FF5BF3000
|
trusted library allocation
|
page read and write
|
||
19FF53BE000
|
trusted library allocation
|
page read and write
|
||
19FFDCC8000
|
trusted library allocation
|
page read and write
|
||
19FF6CC9000
|
trusted library allocation
|
page read and write
|
||
33EE53E000
|
unkown
|
page readonly
|
||
19FF7E9E000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FF6368000
|
trusted library allocation
|
page read and write
|
||
19FF5EF8000
|
trusted library allocation
|
page read and write
|
||
19FFF8FB000
|
trusted library allocation
|
page read and write
|
||
19FF9084000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FF7517000
|
trusted library allocation
|
page read and write
|
||
19FF53F1000
|
trusted library allocation
|
page read and write
|
||
19FF6BC3000
|
trusted library allocation
|
page read and write
|
||
19FEC736000
|
heap
|
page read and write
|
||
19FF764A000
|
trusted library allocation
|
page read and write
|
||
19FF85AD000
|
trusted library allocation
|
page read and write
|
||
19FF76E8000
|
trusted library allocation
|
page read and write
|
||
19FF5ACB000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF6388000
|
trusted library allocation
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF71A5000
|
trusted library allocation
|
page read and write
|
||
19FF5ACB000
|
trusted library allocation
|
page read and write
|
||
19FF8258000
|
trusted library allocation
|
page read and write
|
||
19FF6B16000
|
trusted library allocation
|
page read and write
|
||
19FF7544000
|
trusted library allocation
|
page read and write
|
||
19FF8089000
|
trusted library allocation
|
page read and write
|
||
214A1319000
|
trusted library allocation
|
page read and write
|
||
19FF5ACB000
|
trusted library allocation
|
page read and write
|
||
19FFF394000
|
trusted library allocation
|
page read and write
|
||
19FF78B4000
|
trusted library allocation
|
page read and write
|
||
19FF17A8000
|
trusted library allocation
|
page read and write
|
||
19FF53B1000
|
trusted library allocation
|
page read and write
|
||
214A1F7B000
|
heap
|
page read and write
|
||
19FF76DD000
|
trusted library allocation
|
page read and write
|
||
19FFDC81000
|
trusted library allocation
|
page read and write
|
||
19FF9386000
|
trusted library allocation
|
page read and write
|
||
19FF6A10000
|
trusted library allocation
|
page read and write
|
||
19852211000
|
trusted library allocation
|
page read and write
|
||
19FF28A8000
|
trusted library allocation
|
page read and write
|
||
19FF6C6D000
|
trusted library allocation
|
page read and write
|
||
19FF6BDD000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FFDCF5000
|
trusted library allocation
|
page read and write
|
||
1A001ECF000
|
trusted library allocation
|
page read and write
|
||
19FF74AE000
|
trusted library allocation
|
page read and write
|
||
19851FE0000
|
unclassified section
|
page read and write
|
||
19FF91AE000
|
trusted library allocation
|
page read and write
|
||
19FF76A8000
|
trusted library allocation
|
page read and write
|
||
1A562FC0000
|
heap
|
page read and write
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FFDC3C000
|
trusted library allocation
|
page read and write
|
||
19FF53A7000
|
trusted library allocation
|
page read and write
|
||
19FF85E4000
|
trusted library allocation
|
page read and write
|
||
19FF764F000
|
trusted library allocation
|
page read and write
|
||
19FF7923000
|
trusted library allocation
|
page read and write
|
||
19FF940C000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
1A001399000
|
trusted library allocation
|
page read and write
|
||
19FF77E7000
|
trusted library allocation
|
page read and write
|
||
83921FE000
|
stack
|
page read and write
|
||
19FF75BF000
|
trusted library allocation
|
page read and write
|
||
19FF76BE000
|
trusted library allocation
|
page read and write
|
||
19FF825E000
|
trusted library allocation
|
page read and write
|
||
214A1E9F000
|
heap
|
page read and write
|
||
19FFDB7F000
|
trusted library allocation
|
page read and write
|
||
19FF7588000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FF8252000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
1A001AA8000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF5956000
|
trusted library allocation
|
page read and write
|
||
19FF5A7A000
|
trusted library allocation
|
page read and write
|
||
1A001DD3000
|
trusted library allocation
|
page read and write
|
||
19FF6C32000
|
trusted library allocation
|
page read and write
|
||
19FF762E000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
unkown
|
page readonly
|
||
19FFDB81000
|
trusted library allocation
|
page read and write
|
||
214A1F31000
|
heap
|
page read and write
|
||
19FF7FF6000
|
trusted library allocation
|
page read and write
|
||
19FF6A0B000
|
trusted library allocation
|
page read and write
|
||
19FFF100000
|
trusted library allocation
|
page read and write
|
||
19FF53BE000
|
trusted library allocation
|
page read and write
|
||
19FF74E3000
|
trusted library allocation
|
page read and write
|
||
214A1310000
|
trusted library allocation
|
page read and write
|
||
19FF79E4000
|
trusted library allocation
|
page read and write
|
||
19FF5ACB000
|
trusted library allocation
|
page read and write
|
||
1A00034D000
|
heap
|
page read and write
|
||
19FF7663000
|
trusted library allocation
|
page read and write
|
||
2BFE71BA000
|
heap
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FFDC0A000
|
trusted library allocation
|
page read and write
|
||
19FF79C2000
|
trusted library allocation
|
page read and write
|
||
19FF857D000
|
trusted library allocation
|
page read and write
|
||
19FF6C53000
|
trusted library allocation
|
page read and write
|
||
19FF76E8000
|
trusted library allocation
|
page read and write
|
||
19FF79EC000
|
trusted library allocation
|
page read and write
|
||
83910BB000
|
stack
|
page read and write
|
||
19FF91A6000
|
trusted library allocation
|
page read and write
|
||
D92000
|
unkown
|
page readonly
|
||
214A1F28000
|
heap
|
page read and write
|
||
19FF744B000
|
trusted library allocation
|
page read and write
|
||
214A1EA0000
|
heap
|
page read and write
|
||
19FF62C1000
|
trusted library allocation
|
page read and write
|
||
DAF78BD000
|
stack
|
page read and write
|
||
19FF767B000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF807A000
|
trusted library allocation
|
page read and write
|
||
19FF53E2000
|
trusted library allocation
|
page read and write
|
||
214A13F5000
|
trusted library allocation
|
page read and write
|
||
19FF5963000
|
trusted library allocation
|
page read and write
|
||
19FEC6E0000
|
heap
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
214A1A03000
|
trusted library allocation
|
page read and write
|
||
19FF53B8000
|
trusted library allocation
|
page read and write
|
||
19FF5B9C000
|
trusted library allocation
|
page read and write
|
||
19FF7682000
|
trusted library allocation
|
page read and write
|
||
19FF9D09000
|
heap
|
page read and write
|
||
19FFDD93000
|
trusted library allocation
|
page read and write
|
||
19FF85A3000
|
trusted library allocation
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FF6BDD000
|
trusted library allocation
|
page read and write
|
||
19FEC6B1000
|
heap
|
page read and write
|
||
19FF289C000
|
trusted library allocation
|
page read and write
|
||
19FFD94E000
|
trusted library allocation
|
page read and write
|
||
19FF6C50000
|
trusted library allocation
|
page read and write
|
||
19FF5BAF000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF286F000
|
trusted library allocation
|
page read and write
|
||
19FFF89F000
|
trusted library allocation
|
page read and write
|
||
19FEC6A3000
|
heap
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
19FF5690000
|
heap
|
page read and write
|
||
19FF90E0000
|
trusted library allocation
|
page read and write
|
||
19FFDAD9000
|
trusted library allocation
|
page read and write
|
||
19FF5A9C000
|
trusted library allocation
|
page read and write
|
||
19FF827D000
|
trusted library allocation
|
page read and write
|
||
19FEC686000
|
heap
|
page read and write
|
||
19FF5BA5000
|
trusted library allocation
|
page read and write
|
||
1A563400000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF75E7000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
1A56325D000
|
trusted library allocation
|
page read and write
|
||
1A001DEE000
|
trusted library allocation
|
page read and write
|
||
19FF77A4000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF6BCC000
|
trusted library allocation
|
page read and write
|
||
19851F90000
|
heap
|
page read and write
|
||
19FF2A60000
|
trusted library allocation
|
page read and write
|
||
19FF635D000
|
trusted library allocation
|
page read and write
|
||
1A001E8B000
|
trusted library allocation
|
page read and write
|
||
19FF54D6000
|
trusted library allocation
|
page read and write
|
||
19FF91A6000
|
trusted library allocation
|
page read and write
|
||
19FF631E000
|
trusted library allocation
|
page read and write
|
||
19852100000
|
trusted library allocation
|
page read and write
|
||
19FF74CE000
|
trusted library allocation
|
page read and write
|
||
2BFE5860000
|
heap
|
page read and write
|
||
19FFF402000
|
trusted library allocation
|
page read and write
|
||
19FF857B000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
19FFF8D0000
|
trusted library allocation
|
page read and write
|
||
19FF825A000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF2A75000
|
trusted library allocation
|
page read and write
|
||
1A0020CE000
|
trusted library allocation
|
page read and write
|
||
19FF63F2000
|
trusted library allocation
|
page read and write
|
||
19FF719C000
|
trusted library allocation
|
page read and write
|
||
19FFDDFE000
|
trusted library allocation
|
page read and write
|
||
19FF76F7000
|
trusted library allocation
|
page read and write
|
||
19FF7205000
|
trusted library allocation
|
page read and write
|
||
19FF567F000
|
heap
|
page read and write
|
||
19FF769F000
|
trusted library allocation
|
page read and write
|
||
19FF82C6000
|
trusted library allocation
|
page read and write
|
||
19FF8282000
|
trusted library allocation
|
page read and write
|
||
214A1FA7000
|
heap
|
page read and write
|
||
19FF6B16000
|
trusted library allocation
|
page read and write
|
||
214A1F6A000
|
heap
|
page read and write
|
||
19FF7373000
|
trusted library allocation
|
page read and write
|
||
19FFDCD2000
|
trusted library allocation
|
page read and write
|
||
19FF74E4000
|
trusted library allocation
|
page read and write
|
||
19FF73C3000
|
trusted library allocation
|
page read and write
|
||
19FF2880000
|
trusted library allocation
|
page read and write
|
||
19FF8623000
|
trusted library allocation
|
page read and write
|
||
19FF78A3000
|
trusted library allocation
|
page read and write
|
||
19FF6B97000
|
trusted library allocation
|
page read and write
|
||
19FF74CE000
|
trusted library allocation
|
page read and write
|
||
19FF6C77000
|
trusted library allocation
|
page read and write
|
||
19FF5A53000
|
trusted library allocation
|
page read and write
|
||
19FF828C000
|
trusted library allocation
|
page read and write
|
||
19FF5BD5000
|
trusted library allocation
|
page read and write
|
||
19FF77A5000
|
trusted library allocation
|
page read and write
|
||
19FF9B27000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FFDDEA000
|
trusted library allocation
|
page read and write
|
||
214A1EAC000
|
heap
|
page read and write
|
||
19FF76A3000
|
trusted library allocation
|
page read and write
|
||
1A0013FB000
|
trusted library allocation
|
page read and write
|
||
19FF53F1000
|
trusted library allocation
|
page read and write
|
||
214A1F23000
|
heap
|
page read and write
|
||
19FF53A5000
|
trusted library allocation
|
page read and write
|
||
19FF82FC000
|
trusted library allocation
|
page read and write
|
||
1A562EB0000
|
heap
|
page read and write
|
||
19852336000
|
heap
|
page read and write
|
||
19FF5A1D000
|
trusted library allocation
|
page read and write
|
||
19FF8583000
|
trusted library allocation
|
page read and write
|
||
19FEC69E000
|
heap
|
page read and write
|
||
19FF5BDF000
|
trusted library allocation
|
page read and write
|
||
19FEC68C000
|
heap
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
19FF77BF000
|
trusted library allocation
|
page read and write
|
||
19FEC696000
|
heap
|
page read and write
|
||
19FF75B2000
|
trusted library allocation
|
page read and write
|
||
19FF2CE9000
|
trusted library allocation
|
page read and write
|
||
19FF1793000
|
trusted library allocation
|
page read and write
|
||
1A0002FE000
|
trusted library allocation
|
page read and write
|
||
19FF7E95000
|
trusted library allocation
|
page read and write
|
||
19FF2AE7000
|
trusted library allocation
|
page read and write
|
||
19FFFC11000
|
trusted library allocation
|
page read and write
|
||
19FFF88F000
|
trusted library allocation
|
page read and write
|
||
19FF6D7D000
|
trusted library allocation
|
page read and write
|
||
214A1F2D000
|
heap
|
page read and write
|
||
19FEC6E6000
|
heap
|
page read and write
|
||
19FF77BA000
|
trusted library allocation
|
page read and write
|
||
214A1EA9000
|
heap
|
page read and write
|
||
19FF2CED000
|
trusted library allocation
|
page read and write
|
||
19FF9F1A000
|
trusted library allocation
|
page read and write
|
||
1A563040000
|
heap
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF82BC000
|
trusted library allocation
|
page read and write
|
||
19FFDCE6000
|
trusted library allocation
|
page read and write
|
||
19FFF933000
|
trusted library allocation
|
page read and write
|
||
19FF5096000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
D92000
|
unkown
|
page readonly
|
||
19FEC694000
|
heap
|
page read and write
|
||
19FF74BE000
|
trusted library allocation
|
page read and write
|
||
19FF5362000
|
trusted library allocation
|
page read and write
|
||
19FEC693000
|
heap
|
page read and write
|
||
19FF564F000
|
heap
|
page read and write
|
||
19FF74C7000
|
trusted library allocation
|
page read and write
|
||
1FF420A0000
|
heap
|
page read and write
|
||
19FFDAAF000
|
trusted library allocation
|
page read and write
|
||
19FFB6C1000
|
trusted library allocation
|
page read and write
|
||
19FFDCFE000
|
trusted library allocation
|
page read and write
|
||
1A0002F1000
|
trusted library allocation
|
page read and write
|
||
19FF6FF6000
|
trusted library allocation
|
page read and write
|
||
19FF793D000
|
trusted library allocation
|
page read and write
|
||
19FF7665000
|
trusted library allocation
|
page read and write
|
||
19FEC69F000
|
heap
|
page read and write
|
||
214A1F98000
|
heap
|
page read and write
|
||
19FF75EF000
|
trusted library allocation
|
page read and write
|
||
10A8000
|
heap
|
page read and write
|
||
19FF6A2D000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF71F5000
|
trusted library allocation
|
page read and write
|
||
19FF8583000
|
trusted library allocation
|
page read and write
|
||
19FF6C49000
|
trusted library allocation
|
page read and write
|
||
19FFF97C000
|
trusted library allocation
|
page read and write
|
||
19FFFCD5000
|
trusted library allocation
|
page read and write
|
||
19FEC6EA000
|
heap
|
page read and write
|
||
19FF2A70000
|
trusted library allocation
|
page read and write
|
||
B06FFE24000
|
trusted library allocation
|
page read and write
|
||
19FF533B000
|
trusted library allocation
|
page read and write
|
||
19FF5B85000
|
trusted library allocation
|
page read and write
|
||
19FF1098000
|
trusted library allocation
|
page read and write
|
||
19851FEF000
|
unclassified section
|
page read and write
|
||
19FF6C58000
|
trusted library allocation
|
page read and write
|
||
19FEC6E2000
|
heap
|
page read and write
|
||
19FF85CF000
|
trusted library allocation
|
page read and write
|
||
19FF2C8B000
|
trusted library allocation
|
page read and write
|
||
19FFB6C9000
|
trusted library allocation
|
page read and write
|
||
19FF17D2000
|
trusted library allocation
|
page read and write
|
||
1A000371000
|
heap
|
page read and write
|
||
83907FE000
|
stack
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FFDB41000
|
trusted library allocation
|
page read and write
|
||
19FF5B55000
|
trusted library allocation
|
page read and write
|
||
19FEC6A2000
|
heap
|
page read and write
|
||
1A001D96000
|
trusted library allocation
|
page read and write
|
||
19FF53C7000
|
trusted library allocation
|
page read and write
|
||
19FFDB53000
|
trusted library allocation
|
page read and write
|
||
19FFDCD2000
|
trusted library allocation
|
page read and write
|
||
19FEC693000
|
heap
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
DAF787E000
|
unkown
|
page readonly
|
||
19FF6BFE000
|
trusted library allocation
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FFDC0D000
|
trusted library allocation
|
page read and write
|
||
19FF80F9000
|
trusted library allocation
|
page read and write
|
||
19FF6C8D000
|
trusted library allocation
|
page read and write
|
||
19FF8583000
|
trusted library allocation
|
page read and write
|
||
19FF7151000
|
trusted library allocation
|
page read and write
|
||
19FEC6A3000
|
heap
|
page read and write
|
||
1A001DC8000
|
trusted library allocation
|
page read and write
|
||
19FF76A8000
|
trusted library allocation
|
page read and write
|
||
19FF76F7000
|
trusted library allocation
|
page read and write
|
||
19FF1090000
|
trusted library allocation
|
page read and write
|
||
19FEC6F0000
|
heap
|
page read and write
|
||
1A001A77000
|
trusted library allocation
|
page read and write
|
||
19FF5695000
|
heap
|
page read and write
|
||
19FFF943000
|
trusted library allocation
|
page read and write
|
||
19FF7390000
|
trusted library allocation
|
page read and write
|
||
19FF53C7000
|
trusted library allocation
|
page read and write
|
||
19FEC6AE000
|
heap
|
page read and write
|
||
19FFF378000
|
trusted library allocation
|
page read and write
|
||
19FEC6A0000
|
heap
|
page read and write
|
||
214A137B000
|
trusted library allocation
|
page read and write
|
||
19FEC679000
|
heap
|
page read and write
|
||
2BFE5880000
|
heap
|
page read and write
|
||
19FFF4A8000
|
trusted library allocation
|
page read and write
|
||
19FF71B7000
|
trusted library allocation
|
page read and write
|
||
19FF6CB6000
|
trusted library allocation
|
page read and write
|
||
19FF1671000
|
trusted library allocation
|
page read and write
|
||
19FFF362000
|
trusted library allocation
|
page read and write
|
||
19FF8197000
|
trusted library allocation
|
page read and write
|
||
19FF7DF8000
|
trusted library allocation
|
page read and write
|
||
1A00137E000
|
trusted library allocation
|
page read and write
|
||
19FEC6AD000
|
heap
|
page read and write
|
||
19FF944D000
|
trusted library allocation
|
page read and write
|
||
19FEC6AB000
|
heap
|
page read and write
|
||
19FEC6DC000
|
heap
|
page read and write
|
||
19FF53F0000
|
trusted library allocation
|
page read and write
|
||
19FF7588000
|
trusted library allocation
|
page read and write
|
||
19FF7939000
|
trusted library allocation
|
page read and write
|
||
19FEC693000
|
heap
|
page read and write
|
||
19FF76A2000
|
trusted library allocation
|
page read and write
|
||
19FF5BAF000
|
trusted library allocation
|
page read and write
|
||
1A001B6A000
|
trusted library allocation
|
page read and write
|
||
19FF5BB9000
|
trusted library allocation
|
page read and write
|
||
19FEC730000
|
heap
|
page read and write
|
||
214A1F29000
|
heap
|
page read and write
|
||
19FF9B72000
|
trusted library allocation
|
page read and write
|
||
19FEC730000
|
heap
|
page read and write
|
||
19FFFC1D000
|
trusted library allocation
|
page read and write
|
||
19FF8675000
|
trusted library allocation
|
page read and write
|
||
19FEC69C000
|
heap
|
page read and write
|
||
19FF769C000
|
trusted library allocation
|
page read and write
|
||
19FF5EF1000
|
trusted library allocation
|
page read and write
|
||
19FF5654000
|
heap
|
page read and write
|
||
19FF6CAE000
|
trusted library allocation
|
page read and write
|
||
19FF6341000
|
trusted library allocation
|
page read and write
|
||
1A001EF5000
|
trusted library allocation
|
page read and write
|
||
19FFDDEC000
|
trusted library allocation
|
page read and write
|
||
19FFDCD0000
|
trusted library allocation
|
page read and write
|
||
19FEC69B000
|
heap
|
page read and write
|
||
19FF717F000
|
trusted library allocation
|
page read and write
|
||
19FF76BE000
|
trusted library allocation
|
page read and write
|
||
19852245000
|
trusted library allocation
|
page read and write
|
||
19FFD9F1000
|
trusted library allocation
|
page read and write
|
||
214A1F2D000
|
heap
|
page read and write
|
||
19FF8232000
|
trusted library allocation
|
page read and write
|
||
19FF79FB000
|
trusted library allocation
|
page read and write
|
||
19FEC6E8000
|
heap
|
page read and write
|
||
2BFE71B2000
|
heap
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
1A0002D1000
|
trusted library allocation
|
page read and write
|
||
19FF63AE000
|
trusted library allocation
|
page read and write
|
||
19852500000
|
trusted library allocation
|
page read and write
|
||
19FEC693000
|
heap
|
page read and write
|
||
19FF79FB000
|
trusted library allocation
|
page read and write
|
||
19FEC6A5000
|
heap
|
page read and write
|
||
19FF77AD000
|
trusted library allocation
|
page read and write
|
||
19FF53CB000
|
trusted library allocation
|
page read and write
|
||
19FF56A8000
|
heap
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
19FF748F000
|
trusted library allocation
|
page read and write
|
||
1A001399000
|
trusted library allocation
|
page read and write
|
||
19FF6C29000
|
trusted library allocation
|
page read and write
|
||
19FF5A9C000
|
trusted library allocation
|
page read and write
|
||
19FF53F1000
|
trusted library allocation
|
page read and write
|
||
19FF53A5000
|
trusted library allocation
|
page read and write
|
||
1A001EFE000
|
trusted library allocation
|
page read and write
|
||
19FF53F1000
|
trusted library allocation
|
page read and write
|
||
19FF5A76000
|
trusted library allocation
|
page read and write
|
||
19FF634B000
|
trusted library allocation
|
page read and write
|
||
19FF858C000
|
trusted library allocation
|
page read and write
|
||
19FFFC8C000
|
trusted library allocation
|
page read and write
|
||
19FF85DF000
|
trusted library allocation
|
page read and write
|
||
19FEC692000
|
heap
|
page read and write
|
||
19FF7E3D000
|
trusted library allocation
|
page read and write
|
There are 3693 hidden memdumps, click here to show them.