Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_624a379a-9541-4898-b5f3-64994def33a0.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_624a379a-9541-4898-b5f3-64994def33a0.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
|
ASCII text, with very long lines (1769), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1769), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2268 -parentBuildID 20230927232528 -prefsHandle 2212
-prefMapHandle 2204 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {4de06ef4-7b42-4cc5-b75b-16175537487e} 7992 "\\.\pipe\gecko-crash-server-pipe.7992" 1eb47a6f510 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4104 -parentBuildID 20230927232528 -prefsHandle 4128
-prefMapHandle 4124 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c009cfd6-4e48-44af-ba60-856a4eeb6978}
7992 "\\.\pipe\gecko-crash-server-pipe.7992" 1eb59ad6c10 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4992 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 4984 -prefMapHandle 4980 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {77f7aa6d-255c-483f-8a66-dc6825b39511} 7992 "\\.\pipe\gecko-crash-server-pipe.7992" 1eb617f6910 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema.
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://mathiasbynens.be/notes/javascript-escapes#single
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://youtube.com/account?=htr
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2020-12/schema/=
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
|
unknown
|
||
https://youtube.com/account?=htg
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://ok.ru/
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://youtube.com/account?=ht;
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.0/
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
http://youtube.com/
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.1/
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
https://duckduckgo.com/?t=ffab&q=
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mathiasbynens.be/
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://truecolors.firefox.com/
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://gpuweb.github.io/gpuweb/
|
unknown
|
||
https://relay.firefox.com/api/v1/
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.251.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.129
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.129.91
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.186.174
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
216.58.212.142
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.1.140
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.186.174
|
youtube.com
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
151.101.129.91
|
services.addons.mozilla.org
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
11F0000
|
heap
|
page read and write
|
||
1EB57C7D000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB58C4E000
|
trusted library allocation
|
page read and write
|
||
1EB57E4F000
|
trusted library allocation
|
page read and write
|
||
1EB5FEAD000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
2B39150C000
|
trusted library allocation
|
page execute read
|
||
1EB59000000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB5B42A000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB59DDD000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB5B5A1000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB5922F000
|
trusted library allocation
|
page read and write
|
||
1EB531EF000
|
trusted library allocation
|
page read and write
|
||
1EB63C7D000
|
trusted library allocation
|
page read and write
|
||
1EB63DAC000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB57A3E000
|
trusted library allocation
|
page read and write
|
||
1EB54AF9000
|
trusted library allocation
|
page read and write
|
||
1EB58BC5000
|
trusted library allocation
|
page read and write
|
||
1EB63C8D000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB5A2CA000
|
trusted library allocation
|
page read and write
|
||
1EB5B1CF000
|
trusted library allocation
|
page read and write
|
||
1EB5A2CC000
|
trusted library allocation
|
page read and write
|
||
1EB5FEA0000
|
trusted library allocation
|
page read and write
|
||
1EB59241000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
11FC000
|
heap
|
page read and write
|
||
1EB57A3E000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E86C000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
F15E27E000
|
unkown
|
page readonly
|
||
1EB576A8000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
28E8A9E3000
|
heap
|
page read and write
|
||
1EB58AA9000
|
trusted library allocation
|
page read and write
|
||
1EB64814000
|
trusted library allocation
|
page read and write
|
||
1EB56F4F000
|
trusted library allocation
|
page read and write
|
||
28E8999A000
|
heap
|
page read and write
|
||
1EB59AA2000
|
trusted library allocation
|
page read and write
|
||
1EB57AD3000
|
trusted library allocation
|
page read and write
|
||
1EB57CBC000
|
trusted library allocation
|
page read and write
|
||
1D036B00000
|
trusted library allocation
|
page read and write
|
||
28E89DC0000
|
trusted library allocation
|
page read and write
|
||
1EB5B598000
|
trusted library allocation
|
page read and write
|
||
1D0369E0000
|
heap
|
page read and write
|
||
1EB56EFE000
|
trusted library allocation
|
page read and write
|
||
1FA4E700000
|
trusted library allocation
|
page read and write
|
||
1EB59DF3000
|
trusted library allocation
|
page read and write
|
||
258C8FE000
|
unkown
|
page readonly
|
||
1EB56EF6000
|
trusted library allocation
|
page read and write
|
||
1EB5FF22000
|
trusted library allocation
|
page read and write
|
||
1EB59799000
|
trusted library allocation
|
page read and write
|
||
1EB5B447000
|
trusted library allocation
|
page read and write
|
||
1EB531BF000
|
trusted library allocation
|
page read and write
|
||
1EB64804000
|
trusted library allocation
|
page read and write
|
||
1EB5B743000
|
trusted library allocation
|
page read and write
|
||
1EB5B7C3000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB57E63000
|
trusted library allocation
|
page read and write
|
||
1EB57EC3000
|
trusted library allocation
|
page read and write
|
||
1EB617FB000
|
trusted library allocation
|
page read and write
|
||
1BE35C13000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB63CD4000
|
trusted library allocation
|
page read and write
|
||
1EB59AD2000
|
trusted library allocation
|
page read and write
|
||
1EB4E86C000
|
heap
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB57AE9000
|
trusted library allocation
|
page read and write
|
||
1EB58A8D000
|
trusted library allocation
|
page read and write
|
||
1EB57CE0000
|
trusted library allocation
|
page read and write
|
||
1EB58BA4000
|
trusted library allocation
|
page read and write
|
||
1EB56FD2000
|
trusted library allocation
|
page read and write
|
||
1EB5FE6B000
|
trusted library allocation
|
page read and write
|
||
1EB5FF20000
|
trusted library allocation
|
page read and write
|
||
1EB597C7000
|
trusted library allocation
|
page read and write
|
||
1EB4E839000
|
heap
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB59B7F000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57A98000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB58A6A000
|
trusted library allocation
|
page read and write
|
||
1EB58E48000
|
trusted library allocation
|
page read and write
|
||
1EB5FEA7000
|
trusted library allocation
|
page read and write
|
||
1EB5B645000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB58A8F000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB60140000
|
trusted library allocation
|
page read and write
|
||
1EB54899000
|
trusted library allocation
|
page read and write
|
||
1BE357D0000
|
unclassified section
|
page readonly
|
||
1EB5B793000
|
trusted library allocation
|
page read and write
|
||
1EB53723000
|
trusted library allocation
|
page read and write
|
||
1EB5B5E2000
|
trusted library allocation
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
139F1A00000
|
trusted library allocation
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB49363000
|
heap
|
page read and write
|
||
1EB4E876000
|
heap
|
page read and write
|
||
1EB4E878000
|
heap
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
28E89E5F000
|
trusted library allocation
|
page read and write
|
||
1EB5B5A5000
|
trusted library allocation
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB587B4000
|
trusted library allocation
|
page read and write
|
||
1EB592F1000
|
trusted library allocation
|
page read and write
|
||
1EB5FB8D000
|
trusted library allocation
|
page read and write
|
||
1EB577B5000
|
trusted library allocation
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
28E8A9F0000
|
heap
|
page read and write
|
||
1EB617F6000
|
trusted library allocation
|
page read and write
|
||
1EB601B6000
|
trusted library allocation
|
page read and write
|
||
28E8A9A1000
|
heap
|
page read and write
|
||
1EB58A65000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57AF0000
|
trusted library allocation
|
page read and write
|
||
28E8AA58000
|
heap
|
page read and write
|
||
1EB57AE6000
|
trusted library allocation
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB587E5000
|
trusted library allocation
|
page read and write
|
||
1EB59AEE000
|
trusted library allocation
|
page read and write
|
||
1EB601D6000
|
trusted library allocation
|
page read and write
|
||
1BE35CDB000
|
trusted library allocation
|
page read and write
|
||
1EB57CAD000
|
trusted library allocation
|
page read and write
|
||
1EB57E98000
|
trusted library allocation
|
page read and write
|
||
1EB5776B000
|
trusted library allocation
|
page read and write
|
||
1EB59758000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB57C37000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB60173000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB60066000
|
trusted library allocation
|
page read and write
|
||
1EB58B9A000
|
trusted library allocation
|
page read and write
|
||
28E89D70000
|
trusted library section
|
page readonly
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
28E89DDC000
|
unkown
|
page execute read
|
||
1EB5A19B000
|
trusted library allocation
|
page read and write
|
||
1EB63CFE000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB57291000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
1EB5B443000
|
trusted library allocation
|
page read and write
|
||
1EB601D3000
|
trusted library allocation
|
page read and write
|
||
1EB58744000
|
trusted library allocation
|
page read and write
|
||
1EB6485E000
|
trusted library allocation
|
page read and write
|
||
1EB5B305000
|
trusted library allocation
|
page read and write
|
||
1EB537F6000
|
trusted library allocation
|
page read and write
|
||
28E8A800000
|
trusted library allocation
|
page read and write
|
||
28E89E76000
|
trusted library allocation
|
page read and write
|
||
1EB5B7B8000
|
trusted library allocation
|
page read and write
|
||
1EB58A7F000
|
trusted library allocation
|
page read and write
|
||
1EB58B68000
|
trusted library allocation
|
page read and write
|
||
1EB5FCD0000
|
trusted library allocation
|
page read and write
|
||
1FA4E8EB000
|
trusted library allocation
|
page read and write
|
||
1EB58F95000
|
trusted library allocation
|
page read and write
|
||
1EB57E21000
|
trusted library allocation
|
page read and write
|
||
1EB5B477000
|
trusted library allocation
|
page read and write
|
||
1EB63CA8000
|
trusted library allocation
|
page read and write
|
||
1EB61DE3000
|
trusted library allocation
|
page read and write
|
||
1EB58BC9000
|
trusted library allocation
|
page read and write
|
||
1EB57674000
|
trusted library allocation
|
page read and write
|
||
1EB57CB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E831000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB58687000
|
trusted library allocation
|
page read and write
|
||
1EB5FE3E000
|
trusted library allocation
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB4E886000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB57EE1000
|
trusted library allocation
|
page read and write
|
||
1FA4E872000
|
trusted library allocation
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
1EB6476D000
|
trusted library allocation
|
page read and write
|
||
1EB5B5AF000
|
trusted library allocation
|
page read and write
|
||
1EB57CBA000
|
trusted library allocation
|
page read and write
|
||
1EB59AC0000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
28E8A9E8000
|
heap
|
page read and write
|
||
1EB63D96000
|
heap
|
page read and write
|
||
1EB6016F000
|
trusted library allocation
|
page read and write
|
||
1EB63B80000
|
trusted library allocation
|
page read and write
|
||
1EB5768A000
|
trusted library allocation
|
page read and write
|
||
1EB5AC2D000
|
trusted library allocation
|
page read and write
|
||
1EB4E86C000
|
heap
|
page read and write
|
||
1EB597C7000
|
trusted library allocation
|
page read and write
|
||
1EB54748000
|
trusted library allocation
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1EB4E82F000
|
heap
|
page read and write
|
||
1EB57AD6000
|
trusted library allocation
|
page read and write
|
||
1EB5B4D9000
|
trusted library allocation
|
page read and write
|
||
1EB57A51000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB58FCC000
|
trusted library allocation
|
page read and write
|
||
1EB538DA000
|
trusted library allocation
|
page read and write
|
||
28E89900000
|
unclassified section
|
page readonly
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB59DE7000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB58A74000
|
trusted library allocation
|
page read and write
|
||
1EB648AB000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1F2000
|
unkown
|
page readonly
|
||
1EB6017D000
|
trusted library allocation
|
page read and write
|
||
1EB63DBA000
|
heap
|
page read and write
|
||
20205FE000
|
stack
|
page read and write
|
||
1EB57AF5000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB5B7C3000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB57CAD000
|
trusted library allocation
|
page read and write
|
||
1EB61750000
|
trusted library allocation
|
page read and write
|
||
1EB57AAA000
|
trusted library allocation
|
page read and write
|
||
1EB56EA6000
|
trusted library allocation
|
page read and write
|
||
1EB59DE0000
|
trusted library allocation
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB538FE000
|
trusted library allocation
|
page read and write
|
||
1EB64B8A000
|
trusted library allocation
|
page read and write
|
||
1EB58A55000
|
trusted library allocation
|
page read and write
|
||
1EB576A1000
|
trusted library allocation
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
1EB4E8B3000
|
heap
|
page read and write
|
||
1EB58FD8000
|
trusted library allocation
|
page read and write
|
||
1EB58FD2000
|
trusted library allocation
|
page read and write
|
||
1D036C0A000
|
trusted library allocation
|
page read and write
|
||
1EB49378000
|
heap
|
page read and write
|
||
1EB58BEC000
|
trusted library allocation
|
page read and write
|
||
1EB5A2F1000
|
trusted library allocation
|
page read and write
|
||
28E89C40000
|
heap
|
page readonly
|
||
1EB63CE7000
|
trusted library allocation
|
page read and write
|
||
1FA4E5CF000
|
unclassified section
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
28E8AA77000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB57E7A000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB57ABC000
|
trusted library allocation
|
page read and write
|
||
1EB58BD8000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5B1DC000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB53826000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1BE35D30000
|
heap
|
page read and write
|
||
1EB617A5000
|
trusted library allocation
|
page read and write
|
||
1EB6016B000
|
trusted library allocation
|
page read and write
|
||
1EB575E5000
|
trusted library allocation
|
page read and write
|
||
1EB57680000
|
trusted library allocation
|
page read and write
|
||
1EB57E38000
|
trusted library allocation
|
page read and write
|
||
28E8A95C000
|
heap
|
page read and write
|
||
1EB58FD3000
|
trusted library allocation
|
page read and write
|
||
1EB57284000
|
heap
|
page read and write
|
||
1EB57CB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
28E8A9E0000
|
heap
|
page read and write
|
||
1FA4E90C000
|
trusted library allocation
|
page read and write
|
||
1EB57C9A000
|
trusted library allocation
|
page read and write
|
||
1EB547A5000
|
trusted library allocation
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB63CE7000
|
trusted library allocation
|
page read and write
|
||
1EB58BE9000
|
trusted library allocation
|
page read and write
|
||
1EB59227000
|
trusted library allocation
|
page read and write
|
||
1EB64806000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB5779C000
|
trusted library allocation
|
page read and write
|
||
1EB59CA9000
|
trusted library allocation
|
page read and write
|
||
1EB6483B000
|
trusted library allocation
|
page read and write
|
||
1EB59AA2000
|
trusted library allocation
|
page read and write
|
||
1EB59218000
|
trusted library allocation
|
page read and write
|
||
1EB54A95000
|
trusted library allocation
|
page read and write
|
||
1EB5877D000
|
trusted library allocation
|
page read and write
|
||
1EB63EA1000
|
heap
|
page read and write
|
||
1EB531B3000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB5B735000
|
trusted library allocation
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
1EB57CAD000
|
trusted library allocation
|
page read and write
|
||
1EB57772000
|
trusted library allocation
|
page read and write
|
||
1EB59799000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB5A1C7000
|
trusted library allocation
|
page read and write
|
||
1EB5A28B000
|
trusted library allocation
|
page read and write
|
||
1EB5B4E5000
|
trusted library allocation
|
page read and write
|
||
28E8A9F0000
|
heap
|
page read and write
|
||
1EB5FE97000
|
trusted library allocation
|
page read and write
|
||
1EB58B85000
|
trusted library allocation
|
page read and write
|
||
1EB634E1000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E876000
|
heap
|
page read and write
|
||
1EB5B122000
|
trusted library allocation
|
page read and write
|
||
1EB5B7E7000
|
trusted library allocation
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB59C43000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB587A6000
|
trusted library allocation
|
page read and write
|
||
1EB597F1000
|
trusted library allocation
|
page read and write
|
||
1EB5FC82000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
28E8A969000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB4E841000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
28E8AA2A000
|
heap
|
page read and write
|
||
1EB6484A000
|
trusted library allocation
|
page read and write
|
||
1EB59AE1000
|
trusted library allocation
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB57E67000
|
trusted library allocation
|
page read and write
|
||
1EB648E1000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
1EB59000000
|
trusted library allocation
|
page read and write
|
||
1EB597EB000
|
trusted library allocation
|
page read and write
|
||
1EB5FEDC000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB587AC000
|
trusted library allocation
|
page read and write
|
||
1EB577C1000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB54A8E000
|
trusted library allocation
|
page read and write
|
||
1EB5A048000
|
trusted library allocation
|
page read and write
|
||
1EB5929F000
|
trusted library allocation
|
page read and write
|
||
1EB5FE8D000
|
trusted library allocation
|
page read and write
|
||
28E89ECA000
|
trusted library allocation
|
page read and write
|
||
1EB64820000
|
trusted library allocation
|
page read and write
|
||
1EB5FCF7000
|
trusted library allocation
|
page read and write
|
||
1EB5727A000
|
heap
|
page read and write
|
||
1EB57222000
|
heap
|
page read and write
|
||
1EB59A85000
|
trusted library allocation
|
page read and write
|
||
1EB57E2D000
|
trusted library allocation
|
page read and write
|
||
1EB6200C000
|
trusted library allocation
|
page read and write
|
||
1EB57AB4000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB5B71F000
|
trusted library allocation
|
page read and write
|
||
1EB5B7BE000
|
trusted library allocation
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1EB4E859000
|
heap
|
page read and write
|
||
1EB58BF2000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB58A6D000
|
trusted library allocation
|
page read and write
|
||
1EB5FCB5000
|
trusted library allocation
|
page read and write
|
||
1EB5A197000
|
trusted library allocation
|
page read and write
|
||
1EB57E76000
|
trusted library allocation
|
page read and write
|
||
1FA4E903000
|
trusted library allocation
|
page read and write
|
||
1EB59A9E000
|
trusted library allocation
|
page read and write
|
||
1EB617B4000
|
trusted library allocation
|
page read and write
|
||
1EB58A65000
|
trusted library allocation
|
page read and write
|
||
1EB59A4A000
|
trusted library allocation
|
page read and write
|
||
1EB4E87E000
|
heap
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB597C1000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
28E8A98A000
|
heap
|
page read and write
|
||
28E8A960000
|
heap
|
page read and write
|
||
1EB60162000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E886000
|
heap
|
page read and write
|
||
1BE3600C000
|
trusted library allocation
|
page read and write
|
||
1EB57E63000
|
trusted library allocation
|
page read and write
|
||
1EB64867000
|
trusted library allocation
|
page read and write
|
||
1EB59B4D000
|
trusted library allocation
|
page read and write
|
||
1EB4E881000
|
heap
|
page read and write
|
||
1EB57CB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB58E80000
|
trusted library allocation
|
page read and write
|
||
1EB601D6000
|
trusted library allocation
|
page read and write
|
||
1EB601E8000
|
trusted library allocation
|
page read and write
|
||
1EB57A60000
|
trusted library allocation
|
page read and write
|
||
1EB54AC7000
|
trusted library allocation
|
page read and write
|
||
1FA4E922000
|
trusted library allocation
|
page read and write
|
||
1EB63F12000
|
heap
|
page read and write
|
||
F159F5E000
|
unkown
|
page readonly
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB637F5000
|
trusted library allocation
|
page read and write
|
||
1EB4E876000
|
heap
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
1EB60195000
|
trusted library allocation
|
page read and write
|
||
1EB58BD3000
|
trusted library allocation
|
page read and write
|
||
1EB62005000
|
trusted library allocation
|
page read and write
|
||
1EB5B713000
|
trusted library allocation
|
page read and write
|
||
28E8A900000
|
heap
|
page read and write
|
||
1EB597C1000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB4E86C000
|
heap
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB54B2C000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB57A51000
|
trusted library allocation
|
page read and write
|
||
1EB587FD000
|
trusted library allocation
|
page read and write
|
||
1EB57A60000
|
trusted library allocation
|
page read and write
|
||
1EB64748000
|
trusted library allocation
|
page read and write
|
||
1EB54AC1000
|
trusted library allocation
|
page read and write
|
||
1EB592B7000
|
trusted library allocation
|
page read and write
|
||
1EB57E7B000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB592E4000
|
trusted library allocation
|
page read and write
|
||
1EB59AA2000
|
trusted library allocation
|
page read and write
|
||
1EB64828000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB5AD2D000
|
trusted library allocation
|
page read and write
|
||
1EB57284000
|
heap
|
page read and write
|
||
1EB59726000
|
trusted library allocation
|
page read and write
|
||
28E89E5C000
|
trusted library allocation
|
page read and write
|
||
1EB57C7B000
|
trusted library allocation
|
page read and write
|
||
1EB634BF000
|
trusted library allocation
|
page read and write
|
||
1EB638FD000
|
trusted library allocation
|
page read and write
|
||
28E8AA44000
|
heap
|
page read and write
|
||
1EB57AB4000
|
trusted library allocation
|
page read and write
|
||
1EB5A27A000
|
trusted library allocation
|
page read and write
|
||
1EB61D71000
|
trusted library allocation
|
page read and write
|
||
1EB5B621000
|
trusted library allocation
|
page read and write
|
||
1EB54742000
|
trusted library allocation
|
page read and write
|
||
1EB57AB4000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
11F9000
|
heap
|
page read and write
|
||
1EB648A5000
|
trusted library allocation
|
page read and write
|
||
1EB57A4C000
|
trusted library allocation
|
page read and write
|
||
1EB57AA1000
|
trusted library allocation
|
page read and write
|
||
1EB57781000
|
trusted library allocation
|
page read and write
|
||
1EB57E9B000
|
trusted library allocation
|
page read and write
|
||
1EB5B5F8000
|
trusted library allocation
|
page read and write
|
||
1EB5B694000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB5FC4F000
|
trusted library allocation
|
page read and write
|
||
1EB57EFA000
|
trusted library allocation
|
page read and write
|
||
1EB57E06000
|
trusted library allocation
|
page read and write
|
||
1EB4E847000
|
heap
|
page read and write
|
||
1EB60191000
|
trusted library allocation
|
page read and write
|
||
820207D000
|
stack
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57284000
|
heap
|
page read and write
|
||
F15C1FE000
|
unkown
|
page readonly
|
||
1EB57A37000
|
trusted library allocation
|
page read and write
|
||
28E8AA77000
|
heap
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB57CC2000
|
trusted library allocation
|
page read and write
|
||
1EB57E9B000
|
trusted library allocation
|
page read and write
|
||
28E89EE9000
|
trusted library allocation
|
page read and write
|
||
1EB592E4000
|
trusted library allocation
|
page read and write
|
||
1EB600B9000
|
trusted library allocation
|
page read and write
|
||
1EB5FB81000
|
trusted library allocation
|
page read and write
|
||
1EB597F1000
|
trusted library allocation
|
page read and write
|
||
1FA4E879000
|
trusted library allocation
|
page read and write
|
||
1EB57A49000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB63C7D000
|
trusted library allocation
|
page read and write
|
||
1EB59241000
|
trusted library allocation
|
page read and write
|
||
1EB56E9A000
|
trusted library allocation
|
page read and write
|
||
1EB6017D000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB58BF6000
|
trusted library allocation
|
page read and write
|
||
1EB64828000
|
trusted library allocation
|
page read and write
|
||
1EB59770000
|
trusted library allocation
|
page read and write
|
||
1EB57AC8000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1BE35C11000
|
trusted library allocation
|
page read and write
|
||
139F1A07000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB57E67000
|
trusted library allocation
|
page read and write
|
||
1EB56E72000
|
trusted library allocation
|
page read and write
|
||
1EB56FFB000
|
trusted library allocation
|
page read and write
|
||
1EB5FE9B000
|
trusted library allocation
|
page read and write
|
||
1EB57AC8000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
28E8AA6B000
|
heap
|
page read and write
|
||
1EB5ADA2000
|
trusted library allocation
|
page read and write
|
||
1EB59DF5000
|
trusted library allocation
|
page read and write
|
||
1EB59AB1000
|
trusted library allocation
|
page read and write
|
||
1EB58AA5000
|
trusted library allocation
|
page read and write
|
||
1FA4E5F6000
|
heap
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB57220000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1BE358DF000
|
unclassified section
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB57C96000
|
trusted library allocation
|
page read and write
|
||
139F1900000
|
trusted library allocation
|
page read and write
|
||
1BE35D34000
|
heap
|
page read and write
|
||
1EB54A0F000
|
trusted library allocation
|
page read and write
|
||
1EB62093000
|
trusted library allocation
|
page read and write
|
||
1EB58BE1000
|
trusted library allocation
|
page read and write
|
||
1EB58B7C000
|
trusted library allocation
|
page read and write
|
||
1EB5A26A000
|
trusted library allocation
|
page read and write
|
||
28E8A94D000
|
heap
|
page read and write
|
||
1EB57CE6000
|
trusted library allocation
|
page read and write
|
||
201F5FE000
|
stack
|
page read and write
|
||
1BE35D40000
|
heap
|
page read and write
|
||
1EB57E84000
|
trusted library allocation
|
page read and write
|
||
2B391541000
|
trusted library allocation
|
page execute read
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
28E8A9F0000
|
heap
|
page read and write
|
||
1EB5AD7B000
|
trusted library allocation
|
page read and write
|
||
1EB58E42000
|
trusted library allocation
|
page read and write
|
||
1EB63C35000
|
trusted library allocation
|
page read and write
|
||
1EB5922F000
|
trusted library allocation
|
page read and write
|
||
1EB5B7D8000
|
trusted library allocation
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
1EB577C1000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB5FE5B000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB58A6D000
|
trusted library allocation
|
page read and write
|
||
1EB59AD2000
|
trusted library allocation
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
1EB5B1D8000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB57AE0000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB57E7A000
|
trusted library allocation
|
page read and write
|
||
1EB5A089000
|
trusted library allocation
|
page read and write
|
||
1EB59CAB000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB58FD2000
|
trusted library allocation
|
page read and write
|
||
1EB592E4000
|
trusted library allocation
|
page read and write
|
||
1EB6208A000
|
trusted library allocation
|
page read and write
|
||
1EB64BAC000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB5B5C4000
|
trusted library allocation
|
page read and write
|
||
1EB57E41000
|
trusted library allocation
|
page read and write
|
||
1EB4E875000
|
heap
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB57E63000
|
trusted library allocation
|
page read and write
|
||
1EB60134000
|
trusted library allocation
|
page read and write
|
||
1EB6015B000
|
trusted library allocation
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB57AC2000
|
trusted library allocation
|
page read and write
|
||
1EB59CE7000
|
trusted library allocation
|
page read and write
|
||
1EB601E8000
|
trusted library allocation
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
1EB57E52000
|
trusted library allocation
|
page read and write
|
||
1EB58A85000
|
trusted library allocation
|
page read and write
|
||
1EB54A9A000
|
trusted library allocation
|
page read and write
|
||
1EB4E846000
|
heap
|
page read and write
|
||
1EB57563000
|
trusted library allocation
|
page read and write
|
||
1EB5FF0E000
|
trusted library allocation
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB5929F000
|
trusted library allocation
|
page read and write
|
||
1EB54A13000
|
trusted library allocation
|
page read and write
|
||
1EB5FE7A000
|
trusted library allocation
|
page read and write
|
||
1EB5767E000
|
trusted library allocation
|
page read and write
|
||
1EB5A2EF000
|
trusted library allocation
|
page read and write
|
||
1EB57CA7000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB548DB000
|
trusted library allocation
|
page read and write
|
||
1EB5FFFB000
|
trusted library allocation
|
page read and write
|
||
1EB5778E000
|
trusted library allocation
|
page read and write
|
||
1EB4E878000
|
heap
|
page read and write
|
||
1EB4E863000
|
heap
|
page read and write
|
||
1EB58BE2000
|
trusted library allocation
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1EB4E871000
|
heap
|
page read and write
|
||
1EB57E74000
|
trusted library allocation
|
page read and write
|
||
1EB5B536000
|
trusted library allocation
|
page read and write
|
||
1EB57AF7000
|
trusted library allocation
|
page read and write
|
||
1EB63C29000
|
trusted library allocation
|
page read and write
|
||
1EB4935E000
|
heap
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB58CE0000
|
trusted library allocation
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1EB548DD000
|
trusted library allocation
|
page read and write
|
||
1EB6017B000
|
trusted library allocation
|
page read and write
|
||
1EB64865000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB63C96000
|
trusted library allocation
|
page read and write
|
||
1EB4E86C000
|
heap
|
page read and write
|
||
1EB60062000
|
trusted library allocation
|
page read and write
|
||
1EB57290000
|
heap
|
page read and write
|
||
1EB576D7000
|
trusted library allocation
|
page read and write
|
||
1EB58BF5000
|
trusted library allocation
|
page read and write
|
||
1EB57265000
|
heap
|
page read and write
|
||
1EB648D2000
|
trusted library allocation
|
page read and write
|
||
1EB5B733000
|
trusted library allocation
|
page read and write
|
||
1EB601A1000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB59BC5000
|
trusted library allocation
|
page read and write
|
||
258AFFE000
|
stack
|
page read and write
|
||
1EB57786000
|
trusted library allocation
|
page read and write
|
||
1EB57AE5000
|
trusted library allocation
|
page read and write
|
||
1EB587C6000
|
trusted library allocation
|
page read and write
|
||
1EB59227000
|
trusted library allocation
|
page read and write
|
||
139F1B10000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB58BFA000
|
trusted library allocation
|
page read and write
|
||
25894EE000
|
unkown
|
page readonly
|
||
1EB587C9000
|
trusted library allocation
|
page read and write
|
||
1EB6000C000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB4E846000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB617E8000
|
trusted library allocation
|
page read and write
|
||
1EB63D9C000
|
heap
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB5970F000
|
trusted library allocation
|
page read and write
|
||
1EB5971B000
|
trusted library allocation
|
page read and write
|
||
1EB5B5D4000
|
trusted library allocation
|
page read and write
|
||
1EB58BD5000
|
trusted library allocation
|
page read and write
|
||
1EB587BD000
|
trusted library allocation
|
page read and write
|
||
1EB5B33F000
|
trusted library allocation
|
page read and write
|
||
1EB58BF6000
|
trusted library allocation
|
page read and write
|
||
1EB5B729000
|
trusted library allocation
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1EB58CFE000
|
trusted library allocation
|
page read and write
|
||
1EB59DF3000
|
trusted library allocation
|
page read and write
|
||
139F1830000
|
heap
|
page read and write
|
||
1EB57CC3000
|
trusted library allocation
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1BE357B0000
|
remote allocation
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
1EB4E886000
|
heap
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB57AC8000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB592C9000
|
trusted library allocation
|
page read and write
|
||
1EB49376000
|
heap
|
page read and write
|
||
1EB58F8B000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB6011E000
|
trusted library allocation
|
page read and write
|
||
1EB5FB79000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB538F0000
|
trusted library allocation
|
page read and write
|
||
1EB58BE6000
|
trusted library allocation
|
page read and write
|
||
1EB5976D000
|
trusted library allocation
|
page read and write
|
||
28E8A95C000
|
heap
|
page read and write
|
||
1EB63CDD000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB57291000
|
heap
|
page read and write
|
||
1EB5FEA0000
|
trusted library allocation
|
page read and write
|
||
1EB5B112000
|
trusted library allocation
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB6013C000
|
trusted library allocation
|
page read and write
|
||
1EB57CB2000
|
trusted library allocation
|
page read and write
|
||
1EB4E878000
|
heap
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB56E78000
|
trusted library allocation
|
page read and write
|
||
1EB538A5000
|
trusted library allocation
|
page read and write
|
||
1EB4E875000
|
heap
|
page read and write
|
||
1EB5B5DD000
|
trusted library allocation
|
page read and write
|
||
1EB5B5A1000
|
trusted library allocation
|
page read and write
|
||
1EB5B733000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57E37000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
28E89DD9000
|
unkown
|
page execute read
|
||
1EB5FBA1000
|
trusted library allocation
|
page read and write
|
||
1EB4E844000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB58A43000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB538DF000
|
trusted library allocation
|
page read and write
|
||
1EB58DCC000
|
trusted library allocation
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
1EB58BA7000
|
trusted library allocation
|
page read and write
|
||
1EB60125000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5A256000
|
trusted library allocation
|
page read and write
|
||
1EB57E95000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
1EB58BEE000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB5A19F000
|
trusted library allocation
|
page read and write
|
||
1EB5721D000
|
heap
|
page read and write
|
||
1EB58BEC000
|
trusted library allocation
|
page read and write
|
||
1EB60184000
|
trusted library allocation
|
page read and write
|
||
1EB5726F000
|
heap
|
page read and write
|
||
1EB57A37000
|
trusted library allocation
|
page read and write
|
||
1EB57ADB000
|
trusted library allocation
|
page read and write
|
||
1EB57E84000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB58E12000
|
trusted library allocation
|
page read and write
|
||
1EB57AF7000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB60173000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1EB57CF5000
|
trusted library allocation
|
page read and write
|
||
1EB587CD000
|
trusted library allocation
|
page read and write
|
||
1EB648AB000
|
trusted library allocation
|
page read and write
|
||
1EB5FE40000
|
trusted library allocation
|
page read and write
|
||
1EB60188000
|
trusted library allocation
|
page read and write
|
||
1EB64804000
|
trusted library allocation
|
page read and write
|
||
1EB54748000
|
trusted library allocation
|
page read and write
|
||
1EB5A2F4000
|
trusted library allocation
|
page read and write
|
||
1EB586DE000
|
trusted library allocation
|
page read and write
|
||
1EB5A2C8000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB59AC0000
|
trusted library allocation
|
page read and write
|
||
1EB58BEC000
|
trusted library allocation
|
page read and write
|
||
1EB59DE3000
|
trusted library allocation
|
page read and write
|
||
1EB6004E000
|
trusted library allocation
|
page read and write
|
||
1EB4E869000
|
heap
|
page read and write
|
||
1EB59A92000
|
trusted library allocation
|
page read and write
|
||
1EB5ADE2000
|
trusted library allocation
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB5FE52000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB58DC8000
|
trusted library allocation
|
page read and write
|
||
1EB59A96000
|
trusted library allocation
|
page read and write
|
||
39A0000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
1EB57CC0000
|
trusted library allocation
|
page read and write
|
||
1EB58FCC000
|
trusted library allocation
|
page read and write
|
||
1EB59DE9000
|
trusted library allocation
|
page read and write
|
||
139F32C0000
|
heap
|
page read and write
|
||
1EB617E4000
|
trusted library allocation
|
page read and write
|
||
1EB57E52000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB575C4000
|
trusted library allocation
|
page read and write
|
||
1EB61DBD000
|
trusted library allocation
|
page read and write
|
||
1EB63C5F000
|
trusted library allocation
|
page read and write
|
||
1EB601CD000
|
trusted library allocation
|
page read and write
|
||
258C7FE000
|
unkown
|
page readonly
|
||
1EB586DE000
|
trusted library allocation
|
page read and write
|
||
1EB62157000
|
trusted library allocation
|
page read and write
|
||
1EB587BD000
|
trusted library allocation
|
page read and write
|
||
1EB538AA000
|
trusted library allocation
|
page read and write
|
||
1EB548A4000
|
trusted library allocation
|
page read and write
|
||
1EB57222000
|
heap
|
page read and write
|
||
28E8A290000
|
heap
|
page read and write
|
||
1EB5FEDC000
|
trusted library allocation
|
page read and write
|
||
1EB56E98000
|
trusted library allocation
|
page read and write
|
||
1EB5FFB7000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB587BF000
|
trusted library allocation
|
page read and write
|
||
1EB5A17E000
|
trusted library allocation
|
page read and write
|
||
1EB57A97000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB59CD5000
|
trusted library allocation
|
page read and write
|
||
1EB57E22000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB57E17000
|
trusted library allocation
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB59C53000
|
trusted library allocation
|
page read and write
|
||
1EB5FEE5000
|
trusted library allocation
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB538CC000
|
trusted library allocation
|
page read and write
|
||
1EB57ACF000
|
trusted library allocation
|
page read and write
|
||
1EB58FDF000
|
trusted library allocation
|
page read and write
|
||
1EB4E889000
|
heap
|
page read and write
|
||
1EB5FED3000
|
trusted library allocation
|
page read and write
|
||
1EB59758000
|
trusted library allocation
|
page read and write
|
||
1EB57E4D000
|
trusted library allocation
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB5FE84000
|
trusted library allocation
|
page read and write
|
||
28E8A9E3000
|
heap
|
page read and write
|
||
1EB5B7E1000
|
trusted library allocation
|
page read and write
|
||
1EB58A85000
|
trusted library allocation
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1EB63BB0000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB5B4BA000
|
trusted library allocation
|
page read and write
|
||
28E8A97D000
|
heap
|
page read and write
|
||
1EB4E846000
|
heap
|
page read and write
|
||
1EB634DD000
|
trusted library allocation
|
page read and write
|
||
1EB4E8B0000
|
heap
|
page read and write
|
||
1EB4E876000
|
heap
|
page read and write
|
||
1BE35B00000
|
trusted library allocation
|
page read and write
|
||
1EB58BF5000
|
trusted library allocation
|
page read and write
|
||
1EB57E5B000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB57CEA000
|
trusted library allocation
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
1EB4E8B0000
|
heap
|
page read and write
|
||
1EB5B5A1000
|
trusted library allocation
|
page read and write
|
||
1EB64719000
|
trusted library allocation
|
page read and write
|
||
1EB64806000
|
trusted library allocation
|
page read and write
|
||
28E8AA2A000
|
heap
|
page read and write
|
||
1EB4E886000
|
heap
|
page read and write
|
||
1EB58C46000
|
trusted library allocation
|
page read and write
|
||
1EB634E1000
|
trusted library allocation
|
page read and write
|
||
1EB5B5B8000
|
trusted library allocation
|
page read and write
|
||
1EB4E886000
|
heap
|
page read and write
|
||
1EB4E879000
|
heap
|
page read and write
|
||
1EB57E98000
|
trusted library allocation
|
page read and write
|
||
1EB57E63000
|
trusted library allocation
|
page read and write
|
||
1EB58BA4000
|
trusted library allocation
|
page read and write
|
||
1EB57543000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB57E7A000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
1EB58A71000
|
trusted library allocation
|
page read and write
|
||
1EB57EC8000
|
trusted library allocation
|
page read and write
|
||
1EB620AC000
|
trusted library allocation
|
page read and write
|
||
1EB57AF0000
|
trusted library allocation
|
page read and write
|
||
1EB57EDE000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB6483B000
|
trusted library allocation
|
page read and write
|
||
1EB57A4C000
|
trusted library allocation
|
page read and write
|
||
1EB58CE2000
|
trusted library allocation
|
page read and write
|
||
1EB5B527000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB58BE2000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB53190000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5FE76000
|
trusted library allocation
|
page read and write
|
||
1EB5B5C6000
|
trusted library allocation
|
page read and write
|
||
1EB5A1D4000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB617E0000
|
trusted library allocation
|
page read and write
|
||
1EB64B93000
|
trusted library allocation
|
page read and write
|
||
1EB57CFD000
|
trusted library allocation
|
page read and write
|
||
1EB5B4EF000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB58BF2000
|
trusted library allocation
|
page read and write
|
||
1EB5B77B000
|
trusted library allocation
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
25894AC000
|
stack
|
page read and write
|
||
1EB57CAD000
|
trusted library allocation
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
1EB5921D000
|
trusted library allocation
|
page read and write
|
||
1EB58DF9000
|
trusted library allocation
|
page read and write
|
||
1EB6017B000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB54AA1000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB5FBFD000
|
trusted library allocation
|
page read and write
|
||
1BE35CC4000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB57C8B000
|
trusted library allocation
|
page read and write
|
||
1EB4E866000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB58A07000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB5FFFB000
|
trusted library allocation
|
page read and write
|
||
1EB6456D000
|
trusted library allocation
|
page read and write
|
||
1EB538F0000
|
trusted library allocation
|
page read and write
|
||
1EB5A1DF000
|
trusted library allocation
|
page read and write
|
||
1EB637E5000
|
trusted library allocation
|
page read and write
|
||
1EB57C9A000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB5B0B8000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1EB58B9D000
|
trusted library allocation
|
page read and write
|
||
1EB5B4D5000
|
trusted library allocation
|
page read and write
|
||
1EB5B3D0000
|
trusted library allocation
|
page read and write
|
||
28E8A96C000
|
heap
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB587C6000
|
trusted library allocation
|
page read and write
|
||
1EB58E42000
|
trusted library allocation
|
page read and write
|
||
1EB60171000
|
trusted library allocation
|
page read and write
|
||
1EB5FFA5000
|
trusted library allocation
|
page read and write
|
||
1EB61FA3000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB59799000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5B5C4000
|
trusted library allocation
|
page read and write
|
||
1EB60146000
|
trusted library allocation
|
page read and write
|
||
1EB57283000
|
heap
|
page read and write
|
||
1EB5B1AD000
|
trusted library allocation
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB57299000
|
heap
|
page read and write
|
||
1EB587D6000
|
trusted library allocation
|
page read and write
|
||
1EB63CDB000
|
trusted library allocation
|
page read and write
|
||
1FA4E410000
|
remote allocation
|
page execute read
|
||
1BE358CC000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB57E93000
|
trusted library allocation
|
page read and write
|
||
1EB57CE0000
|
trusted library allocation
|
page read and write
|
||
139F32C2000
|
heap
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB571FD000
|
heap
|
page read and write
|
||
1EB5B3ED000
|
trusted library allocation
|
page read and write
|
||
1EB57E04000
|
trusted library allocation
|
page read and write
|
||
1EB59AC0000
|
trusted library allocation
|
page read and write
|
||
1EB57CB5000
|
trusted library allocation
|
page read and write
|
||
1EB57E06000
|
trusted library allocation
|
page read and write
|
||
1EB57AE4000
|
trusted library allocation
|
page read and write
|
||
1EB57CA7000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB538FE000
|
trusted library allocation
|
page read and write
|
||
1EB548B2000
|
trusted library allocation
|
page read and write
|
||
1EB57A49000
|
trusted library allocation
|
page read and write
|
||
1EB58FBC000
|
trusted library allocation
|
page read and write
|
||
1EB57E98000
|
trusted library allocation
|
page read and write
|
||
1EB57AD3000
|
trusted library allocation
|
page read and write
|
||
1EB57E83000
|
trusted library allocation
|
page read and write
|
||
1EB548CF000
|
trusted library allocation
|
page read and write
|
||
1EB601D3000
|
trusted library allocation
|
page read and write
|
||
1EB531EF000
|
trusted library allocation
|
page read and write
|
||
1EB59C6F000
|
trusted library allocation
|
page read and write
|
||
1EB58A65000
|
trusted library allocation
|
page read and write
|
||
1EB5FEF8000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB56F7F000
|
trusted library allocation
|
page read and write
|
||
1EB5FFAC000
|
trusted library allocation
|
page read and write
|
||
1EB577B4000
|
trusted library allocation
|
page read and write
|
||
1EB5FF15000
|
trusted library allocation
|
page read and write
|
||
28E8A98A000
|
heap
|
page read and write
|
||
1EB57CE0000
|
trusted library allocation
|
page read and write
|
||
1EB59799000
|
trusted library allocation
|
page read and write
|
||
1EB62106000
|
trusted library allocation
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB5A222000
|
trusted library allocation
|
page read and write
|
||
1EB6017D000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1BE35C03000
|
trusted library allocation
|
page read and write
|
||
2B3914E6000
|
trusted library allocation
|
page execute read
|
||
1EB57AD6000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB58DCC000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1BE35C00000
|
trusted library allocation
|
page read and write
|
||
1EB5778B000
|
trusted library allocation
|
page read and write
|
||
1EB4E82F000
|
heap
|
page read and write
|
||
1EB6016F000
|
trusted library allocation
|
page read and write
|
||
1EB576A1000
|
trusted library allocation
|
page read and write
|
||
1EB63C29000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB60053000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB57E39000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB58BC4000
|
trusted library allocation
|
page read and write
|
||
1EB576A1000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB53198000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
28E89E79000
|
trusted library allocation
|
page read and write
|
||
1EB5B1BC000
|
trusted library allocation
|
page read and write
|
||
1EB587AB000
|
trusted library allocation
|
page read and write
|
||
1EB58A9C000
|
trusted library allocation
|
page read and write
|
||
1EB59A4A000
|
trusted library allocation
|
page read and write
|
||
1EB54AC7000
|
trusted library allocation
|
page read and write
|
||
1EB638AB000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB63B7E000
|
trusted library allocation
|
page read and write
|
||
1EB5B5C1000
|
trusted library allocation
|
page read and write
|
||
1EB61757000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB6173D000
|
trusted library allocation
|
page read and write
|
||
1EB5B7C7000
|
trusted library allocation
|
page read and write
|
||
1F2000
|
unkown
|
page readonly
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB5923B000
|
trusted library allocation
|
page read and write
|
||
1EB56E7A000
|
trusted library allocation
|
page read and write
|
||
1EB600B9000
|
trusted library allocation
|
page read and write
|
||
1BE36000000
|
trusted library allocation
|
page read and write
|
||
1EB58E17000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB6473F000
|
trusted library allocation
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
1EB5720F000
|
heap
|
page read and write
|
||
1EB57AF5000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB58DCF000
|
trusted library allocation
|
page read and write
|
||
1EB64748000
|
trusted library allocation
|
page read and write
|
||
1EB59A96000
|
trusted library allocation
|
page read and write
|
||
1EB62157000
|
trusted library allocation
|
page read and write
|
||
1EB57A60000
|
trusted library allocation
|
page read and write
|
||
28E899E0000
|
heap
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB57C9A000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB60173000
|
trusted library allocation
|
page read and write
|
||
1EB5AD0C000
|
trusted library allocation
|
page read and write
|
||
1EB587CD000
|
trusted library allocation
|
page read and write
|
||
1EB54AAA000
|
trusted library allocation
|
page read and write
|
||
1EB5A2DD000
|
trusted library allocation
|
page read and write
|
||
1EB5B5EC000
|
trusted library allocation
|
page read and write
|
||
1EB57282000
|
heap
|
page read and write
|
||
1EB59DE3000
|
trusted library allocation
|
page read and write
|
||
1EB56EF6000
|
trusted library allocation
|
page read and write
|
||
1EB57AD6000
|
trusted library allocation
|
page read and write
|
||
1EB5922F000
|
trusted library allocation
|
page read and write
|
||
201FDFE000
|
stack
|
page read and write
|
||
1EB57285000
|
heap
|
page read and write
|
||
1EB56E0F000
|
trusted library allocation
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB6005A000
|
trusted library allocation
|
page read and write
|
||
1EB57E5B000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
28E89D64000
|
heap
|
page read and write
|
||
1EB592C9000
|
trusted library allocation
|
page read and write
|
||
1EB57EC8000
|
trusted library allocation
|
page read and write
|
||
1EB592E8000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB57E74000
|
trusted library allocation
|
page read and write
|
||
F159EDE000
|
unkown
|
page readonly
|
||
1EB601A1000
|
trusted library allocation
|
page read and write
|
||
1EB5FEDF000
|
trusted library allocation
|
page read and write
|
||
1EB58BA9000
|
trusted library allocation
|
page read and write
|
||
1EB5FB72000
|
trusted library allocation
|
page read and write
|
||
1EB58BC8000
|
trusted library allocation
|
page read and write
|
||
1EB638FD000
|
trusted library allocation
|
page read and write
|
||
1EB5FE9B000
|
trusted library allocation
|
page read and write
|
||
1EB57E93000
|
trusted library allocation
|
page read and write
|
||
1EB5774A000
|
trusted library allocation
|
page read and write
|
||
1EB57E67000
|
trusted library allocation
|
page read and write
|
||
1EB575D2000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB575CA000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB576A1000
|
trusted library allocation
|
page read and write
|
||
1EB548DD000
|
trusted library allocation
|
page read and write
|
||
139F32DA000
|
heap
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB58B80000
|
trusted library allocation
|
page read and write
|
||
1EB4E849000
|
heap
|
page read and write
|
||
1EB63DC1000
|
heap
|
page read and write
|
||
1EB58B80000
|
trusted library allocation
|
page read and write
|
||
1EB58AF6000
|
trusted library allocation
|
page read and write
|
||
1EB58BA9000
|
trusted library allocation
|
page read and write
|
||
1EB59238000
|
trusted library allocation
|
page read and write
|
||
1EB57A9D000
|
trusted library allocation
|
page read and write
|
||
1EB4E841000
|
heap
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
1EB58A7C000
|
trusted library allocation
|
page read and write
|
||
1EB5FE60000
|
trusted library allocation
|
page read and write
|
||
1EB5A129000
|
trusted library allocation
|
page read and write
|
||
1EB63DC1000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB58B59000
|
trusted library allocation
|
page read and write
|
||
1EB5A1AF000
|
trusted library allocation
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1EB58EE5000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB6001F000
|
trusted library allocation
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB5B742000
|
trusted library allocation
|
page read and write
|
||
1EB592C9000
|
trusted library allocation
|
page read and write
|
||
1EB54877000
|
trusted library allocation
|
page read and write
|
||
1EB59E00000
|
trusted library allocation
|
page read and write
|
||
1EB58FDF000
|
trusted library allocation
|
page read and write
|
||
1EB538DA000
|
trusted library allocation
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB648C4000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB5B4A9000
|
trusted library allocation
|
page read and write
|
||
1EB63B6E000
|
trusted library allocation
|
page read and write
|
||
1EB5FBD8000
|
trusted library allocation
|
page read and write
|
||
1EB5AD9A000
|
trusted library allocation
|
page read and write
|
||
1EB5923D000
|
trusted library allocation
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB58B59000
|
trusted library allocation
|
page read and write
|
||
1EB5728A000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB63CDD000
|
trusted library allocation
|
page read and write
|
||
1EB5974B000
|
trusted library allocation
|
page read and write
|
||
1EB57ABC000
|
trusted library allocation
|
page read and write
|
||
1EB63C46000
|
trusted library allocation
|
page read and write
|
||
1EB4E84B000
|
heap
|
page read and write
|
||
1EB648E1000
|
trusted library allocation
|
page read and write
|
||
1EB64873000
|
trusted library allocation
|
page read and write
|
||
1EB4E835000
|
heap
|
page read and write
|
||
1EB58AA5000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB62133000
|
trusted library allocation
|
page read and write
|
||
1EB597AD000
|
trusted library allocation
|
page read and write
|
||
1EB57AE4000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB57CFD000
|
trusted library allocation
|
page read and write
|
||
1EB57271000
|
heap
|
page read and write
|
||
1EB5B1AF000
|
trusted library allocation
|
page read and write
|
||
1EB58A05000
|
trusted library allocation
|
page read and write
|
||
1EB58DC8000
|
trusted library allocation
|
page read and write
|
||
1EB64812000
|
trusted library allocation
|
page read and write
|
||
28E8AA6B000
|
heap
|
page read and write
|
||
1EB63B7C000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB56E4E000
|
trusted library allocation
|
page read and write
|
||
1EB58CC4000
|
trusted library allocation
|
page read and write
|
||
1EB54759000
|
trusted library allocation
|
page read and write
|
||
1EB5B1AD000
|
trusted library allocation
|
page read and write
|
||
1EB59785000
|
trusted library allocation
|
page read and write
|
||
1EB57E76000
|
trusted library allocation
|
page read and write
|
||
1EB576D7000
|
trusted library allocation
|
page read and write
|
||
28E89E0C000
|
trusted library allocation
|
page read and write
|
||
1EB5B595000
|
trusted library allocation
|
page read and write
|
||
1EB56FCB000
|
trusted library allocation
|
page read and write
|
||
1EB54AC7000
|
trusted library allocation
|
page read and write
|
||
1EB57CAD000
|
trusted library allocation
|
page read and write
|
||
1EB57E21000
|
trusted library allocation
|
page read and write
|
||
1EB638FB000
|
trusted library allocation
|
page read and write
|
||
1EB597EB000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB57205000
|
heap
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB4E881000
|
heap
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E863000
|
heap
|
page read and write
|
||
1EB4E879000
|
heap
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB57E6F000
|
trusted library allocation
|
page read and write
|
||
28E8AA77000
|
heap
|
page read and write
|
||
1EB61FF1000
|
trusted library allocation
|
page read and write
|
||
1EB648CA000
|
trusted library allocation
|
page read and write
|
||
1EB54AF9000
|
trusted library allocation
|
page read and write
|
||
1BE35D36000
|
heap
|
page read and write
|
||
1EB57AED000
|
trusted library allocation
|
page read and write
|
||
1EB61D20000
|
trusted library allocation
|
page read and write
|
||
28E89980000
|
unclassified section
|
page readonly
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB59231000
|
trusted library allocation
|
page read and write
|
||
1EB4E849000
|
heap
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB54B22000
|
trusted library allocation
|
page read and write
|
||
19CE000
|
stack
|
page read and write
|
||
1EB57E1E000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5A18B000
|
trusted library allocation
|
page read and write
|
||
1EB60195000
|
trusted library allocation
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB5AD48000
|
trusted library allocation
|
page read and write
|
||
1EB57E74000
|
trusted library allocation
|
page read and write
|
||
1EB5B4E7000
|
trusted library allocation
|
page read and write
|
||
1EB5FC00000
|
trusted library allocation
|
page read and write
|
||
1EB60143000
|
trusted library allocation
|
page read and write
|
||
1EB5B7A4000
|
trusted library allocation
|
page read and write
|
||
1EB58EE5000
|
trusted library allocation
|
page read and write
|
||
1EB5B0C9000
|
trusted library allocation
|
page read and write
|
||
1EB4E86F000
|
heap
|
page read and write
|
||
1EB56E63000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB6470D000
|
trusted library allocation
|
page read and write
|
||
1EB548DA000
|
trusted library allocation
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
1EB63CFE000
|
trusted library allocation
|
page read and write
|
||
1EB57AF7000
|
trusted library allocation
|
page read and write
|
||
1FA4E86E000
|
trusted library allocation
|
page read and write
|
||
1EB4E843000
|
heap
|
page read and write
|
||
1EB64719000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB58BA1000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB592C1000
|
trusted library allocation
|
page read and write
|
||
1EB57CBE000
|
trusted library allocation
|
page read and write
|
||
1EB64847000
|
trusted library allocation
|
page read and write
|
||
1EB53826000
|
trusted library allocation
|
page read and write
|
||
1EB634E1000
|
trusted library allocation
|
page read and write
|
||
1EB5B61C000
|
trusted library allocation
|
page read and write
|
||
1EB58B59000
|
trusted library allocation
|
page read and write
|
||
1EB59BA5000
|
trusted library allocation
|
page read and write
|
||
1BE35C70000
|
trusted library allocation
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
28E8AA6B000
|
heap
|
page read and write
|
||
1EB58CC2000
|
trusted library allocation
|
page read and write
|
||
1EB54A6E000
|
trusted library allocation
|
page read and write
|
||
1EB4E857000
|
heap
|
page read and write
|
||
1EB58FD3000
|
trusted library allocation
|
page read and write
|
||
1EB5FCFD000
|
trusted library allocation
|
page read and write
|
||
1EB57AC2000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB5726F000
|
heap
|
page read and write
|
||
1EB5878C000
|
trusted library allocation
|
page read and write
|
||
1EB57E5B000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB63C70000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB58BA5000
|
trusted library allocation
|
page read and write
|
||
1EB57AF5000
|
trusted library allocation
|
page read and write
|
||
1EB597F7000
|
trusted library allocation
|
page read and write
|
||
1EB57E6F000
|
trusted library allocation
|
page read and write
|
||
1EB57685000
|
trusted library allocation
|
page read and write
|
||
1EB5876E000
|
trusted library allocation
|
page read and write
|
||
1EB617FB000
|
trusted library allocation
|
page read and write
|
||
1EB587FD000
|
trusted library allocation
|
page read and write
|
||
1EB5B5E5000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
stack
|
page read and write
|
||
1EB62050000
|
trusted library allocation
|
page read and write
|
||
1EB63CF6000
|
trusted library allocation
|
page read and write
|
||
1EB5FBFD000
|
trusted library allocation
|
page read and write
|
||
1EB5B3B6000
|
trusted library allocation
|
page read and write
|
||
1EB53817000
|
trusted library allocation
|
page read and write
|
||
1EB5923E000
|
trusted library allocation
|
page read and write
|
||
1EB58BEC000
|
trusted library allocation
|
page read and write
|
||
1EB60195000
|
trusted library allocation
|
page read and write
|
||
1EB57ACF000
|
trusted library allocation
|
page read and write
|
||
1EB5929F000
|
trusted library allocation
|
page read and write
|
||
1EB5755F000
|
trusted library allocation
|
page read and write
|
||
1EB5B5C4000
|
trusted library allocation
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
1EB57E2D000
|
trusted library allocation
|
page read and write
|
||
1EB587D9000
|
trusted library allocation
|
page read and write
|
||
1FA4E91C000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB601A7000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB5AD8C000
|
trusted library allocation
|
page read and write
|
||
1EB601A7000
|
trusted library allocation
|
page read and write
|
||
1EB63BFD000
|
trusted library allocation
|
page read and write
|
||
1EB56E4E000
|
trusted library allocation
|
page read and write
|
||
1BE35CB2000
|
trusted library allocation
|
page read and write
|
||
1EB634D1000
|
trusted library allocation
|
page read and write
|
||
1EB59238000
|
trusted library allocation
|
page read and write
|
||
1EB58BC5000
|
trusted library allocation
|
page read and write
|
||
1EB57ED6000
|
trusted library allocation
|
page read and write
|
||
1EB58BA4000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB5A1CD000
|
trusted library allocation
|
page read and write
|
||
1EB57E4D000
|
trusted library allocation
|
page read and write
|
||
1EB64820000
|
trusted library allocation
|
page read and write
|
||
1EB617E0000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB5B4CA000
|
trusted library allocation
|
page read and write
|
||
1EB5A09B000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AE000
|
heap
|
page read and write
|
||
1EB617E0000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB576D7000
|
trusted library allocation
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
1EB592B5000
|
trusted library allocation
|
page read and write
|
||
1EB5B6E7000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB548A9000
|
trusted library allocation
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB6177A000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB60195000
|
trusted library allocation
|
page read and write
|
||
1EB63C55000
|
trusted library allocation
|
page read and write
|
||
1EB5B117000
|
trusted library allocation
|
page read and write
|
||
1EB57A9D000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB587F8000
|
trusted library allocation
|
page read and write
|
||
1EB61DE4000
|
trusted library allocation
|
page read and write
|
||
1EB56EDA000
|
trusted library allocation
|
page read and write
|
||
1EB64B50000
|
trusted library allocation
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB57E83000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
131000
|
unkown
|
page execute read
|
||
1EB64B05000
|
trusted library allocation
|
page read and write
|
||
1EB61D78000
|
trusted library allocation
|
page read and write
|
||
1EB587C4000
|
trusted library allocation
|
page read and write
|
||
1FA4E900000
|
trusted library allocation
|
page read and write
|
||
1EB54A86000
|
trusted library allocation
|
page read and write
|
||
1EB5FE42000
|
trusted library allocation
|
page read and write
|
||
1EB617E4000
|
trusted library allocation
|
page read and write
|
||
1EB57C8D000
|
trusted library allocation
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB5B445000
|
trusted library allocation
|
page read and write
|
||
1EB5B1B1000
|
trusted library allocation
|
page read and write
|
||
1EB57C89000
|
trusted library allocation
|
page read and write
|
||
1EB61760000
|
trusted library allocation
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1EB58BA4000
|
trusted library allocation
|
page read and write
|
||
1EB62E00000
|
trusted library allocation
|
page read and write
|
||
1EB64847000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB58BC5000
|
trusted library allocation
|
page read and write
|
||
28E8A9AA000
|
heap
|
page read and write
|
||
1EB57222000
|
heap
|
page read and write
|
||
1EB59DF5000
|
trusted library allocation
|
page read and write
|
||
1EB5B523000
|
trusted library allocation
|
page read and write
|
||
1EB54A6E000
|
trusted library allocation
|
page read and write
|
||
1EB5B5E2000
|
trusted library allocation
|
page read and write
|
||
1EB61D95000
|
trusted library allocation
|
page read and write
|
||
1EB638BF000
|
trusted library allocation
|
page read and write
|
||
1EB5FF17000
|
trusted library allocation
|
page read and write
|
||
1EB637E0000
|
trusted library allocation
|
page read and write
|
||
1EB57CE6000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5AD74000
|
trusted library allocation
|
page read and write
|
||
1EB64748000
|
trusted library allocation
|
page read and write
|
||
1EB57CFD000
|
trusted library allocation
|
page read and write
|
||
1EB57C6A000
|
trusted library allocation
|
page read and write
|
||
1EB597AD000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB5FBA4000
|
trusted library allocation
|
page read and write
|
||
1EB59A96000
|
trusted library allocation
|
page read and write
|
||
1EB57AA9000
|
trusted library allocation
|
page read and write
|
||
1EB592FD000
|
trusted library allocation
|
page read and write
|
||
1EB57205000
|
heap
|
page read and write
|
||
1EB5B5AF000
|
trusted library allocation
|
page read and write
|
||
1EB5B7CE000
|
trusted library allocation
|
page read and write
|
||
1EB56FFB000
|
trusted library allocation
|
page read and write
|
||
1EB5759C000
|
trusted library allocation
|
page read and write
|
||
1EB5B729000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB59788000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB6013A000
|
trusted library allocation
|
page read and write
|
||
1EB63E08000
|
heap
|
page read and write
|
||
1EB620AC000
|
trusted library allocation
|
page read and write
|
||
28E89E23000
|
trusted library allocation
|
page read and write
|
||
1EB60045000
|
trusted library allocation
|
page read and write
|
||
1EB5B16F000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB57E5E000
|
trusted library allocation
|
page read and write
|
||
1EB57EB6000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB597F7000
|
trusted library allocation
|
page read and write
|
||
1EB62048000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1EB5489D000
|
trusted library allocation
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
82020FE000
|
stack
|
page read and write
|
||
1EB57E22000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1BE35C77000
|
trusted library allocation
|
page read and write
|
||
1EB5B1B1000
|
trusted library allocation
|
page read and write
|
||
1EB5ACCE000
|
trusted library allocation
|
page read and write
|
||
1EB58AB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
1EB5B75F000
|
trusted library allocation
|
page read and write
|
||
1EB6017B000
|
trusted library allocation
|
page read and write
|
||
1EB61FC8000
|
trusted library allocation
|
page read and write
|
||
1EB5FE8B000
|
trusted library allocation
|
page read and write
|
||
1EB5B165000
|
trusted library allocation
|
page read and write
|
||
1EB5B5A5000
|
trusted library allocation
|
page read and write
|
||
1EB5A0F5000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1FA4E85D000
|
trusted library allocation
|
page read and write
|
||
1EB58BF5000
|
trusted library allocation
|
page read and write
|
||
1EB57ACF000
|
trusted library allocation
|
page read and write
|
||
1EB5B5D9000
|
trusted library allocation
|
page read and write
|
||
827FDDE000
|
stack
|
page read and write
|
||
1EB57CB2000
|
trusted library allocation
|
page read and write
|
||
1EB4E882000
|
heap
|
page read and write
|
||
1EB5A091000
|
trusted library allocation
|
page read and write
|
||
1EB5AD0A000
|
trusted library allocation
|
page read and write
|
||
2589568000
|
stack
|
page read and write
|
||
1EB54728000
|
trusted library allocation
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
1EB57573000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB56E99000
|
trusted library allocation
|
page read and write
|
||
1EB5757E000
|
trusted library allocation
|
page read and write
|
||
28E89DE0000
|
heap
|
page read and write
|
||
1EB592FD000
|
trusted library allocation
|
page read and write
|
||
1EB5AD29000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB57274000
|
heap
|
page read and write
|
||
1EB58BD6000
|
trusted library allocation
|
page read and write
|
||
1EB56EF6000
|
trusted library allocation
|
page read and write
|
||
28E8AA6B000
|
heap
|
page read and write
|
||
1EB6212E000
|
trusted library allocation
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB5B7BE000
|
trusted library allocation
|
page read and write
|
||
1EB57C90000
|
trusted library allocation
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB5B4A7000
|
trusted library allocation
|
page read and write
|
||
1EB5B7FB000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB537FE000
|
trusted library allocation
|
page read and write
|
||
28E89E10000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1FA4E390000
|
unclassified section
|
page readonly
|
||
1EB5B75F000
|
trusted library allocation
|
page read and write
|
||
1EB634BF000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57AB4000
|
trusted library allocation
|
page read and write
|
||
1EB57E74000
|
trusted library allocation
|
page read and write
|
||
1EB587FC000
|
trusted library allocation
|
page read and write
|
||
1EB592D1000
|
trusted library allocation
|
page read and write
|
||
1EB5B5BF000
|
trusted library allocation
|
page read and write
|
||
1EB57E9B000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB58BE2000
|
trusted library allocation
|
page read and write
|
||
1EB5B328000
|
trusted library allocation
|
page read and write
|
||
1EB58DC8000
|
trusted library allocation
|
page read and write
|
||
1EB58BC4000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB59775000
|
trusted library allocation
|
page read and write
|
||
1EB64898000
|
trusted library allocation
|
page read and write
|
||
1EB592AB000
|
trusted library allocation
|
page read and write
|
||
1EB53893000
|
trusted library allocation
|
page read and write
|
||
1EB634B4000
|
trusted library allocation
|
page read and write
|
||
1EB571FB000
|
heap
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB61DE3000
|
trusted library allocation
|
page read and write
|
||
1EB4E86C000
|
heap
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB57EC8000
|
trusted library allocation
|
page read and write
|
||
1EB5B521000
|
trusted library allocation
|
page read and write
|
||
1FA4E914000
|
trusted library allocation
|
page read and write
|
||
1EB57E43000
|
trusted library allocation
|
page read and write
|
||
1EB5FC93000
|
trusted library allocation
|
page read and write
|
||
1EB59C98000
|
trusted library allocation
|
page read and write
|
||
139F1872000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB58DC5000
|
trusted library allocation
|
page read and write
|
||
1EB58AB0000
|
trusted library allocation
|
page read and write
|
||
1EB5B6E9000
|
trusted library allocation
|
page read and write
|
||
1EB4E842000
|
heap
|
page read and write
|
||
1EB5B796000
|
trusted library allocation
|
page read and write
|
||
1EB62106000
|
trusted library allocation
|
page read and write
|
||
1EB58BE9000
|
trusted library allocation
|
page read and write
|
||
1EB5387F000
|
trusted library allocation
|
page read and write
|
||
1EB6002C000
|
trusted library allocation
|
page read and write
|
||
28E8AA79000
|
heap
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB57AA1000
|
trusted library allocation
|
page read and write
|
||
28E8AA77000
|
heap
|
page read and write
|
||
1EB53893000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB5B328000
|
trusted library allocation
|
page read and write
|
||
1EB5A180000
|
trusted library allocation
|
page read and write
|
||
1EB57E6F000
|
trusted library allocation
|
page read and write
|
||
1EB57205000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB538DA000
|
trusted library allocation
|
page read and write
|
||
28E8A960000
|
heap
|
page read and write
|
||
1EB57AEE000
|
trusted library allocation
|
page read and write
|
||
1EB57A35000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB58BC8000
|
trusted library allocation
|
page read and write
|
||
1EB59227000
|
trusted library allocation
|
page read and write
|
||
1EB58CD6000
|
trusted library allocation
|
page read and write
|
||
1EB57ABC000
|
trusted library allocation
|
page read and write
|
||
1EB56E61000
|
trusted library allocation
|
page read and write
|
||
1EB5A013000
|
trusted library allocation
|
page read and write
|
||
1EB57528000
|
trusted library allocation
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB57222000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1BE35C65000
|
trusted library allocation
|
page read and write
|
||
F15CA7E000
|
stack
|
page read and write
|
||
1EB64730000
|
trusted library allocation
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
1EB5B740000
|
trusted library allocation
|
page read and write
|
||
1EB61D5C000
|
trusted library allocation
|
page read and write
|
||
139F1B15000
|
heap
|
page read and write
|
||
1EB4E86C000
|
heap
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB5FED3000
|
trusted library allocation
|
page read and write
|
||
1EB4E8B2000
|
heap
|
page read and write
|
||
1EB61FCE000
|
trusted library allocation
|
page read and write
|
||
1EB597C3000
|
trusted library allocation
|
page read and write
|
||
1EB587DC000
|
trusted library allocation
|
page read and write
|
||
1EB4E87F000
|
heap
|
page read and write
|
||
1EB5978F000
|
trusted library allocation
|
page read and write
|
||
1EB6006B000
|
trusted library allocation
|
page read and write
|
||
1EB60137000
|
trusted library allocation
|
page read and write
|
||
1EB60084000
|
trusted library allocation
|
page read and write
|
||
1EB59DF7000
|
trusted library allocation
|
page read and write
|
||
1EB57589000
|
trusted library allocation
|
page read and write
|
||
1EB6013A000
|
trusted library allocation
|
page read and write
|
||
1EB5B3B9000
|
trusted library allocation
|
page read and write
|
||
1EB617C2000
|
trusted library allocation
|
page read and write
|
||
28E89ED1000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB58AA5000
|
trusted library allocation
|
page read and write
|
||
1EB60045000
|
trusted library allocation
|
page read and write
|
||
1EB57E30000
|
trusted library allocation
|
page read and write
|
||
1EB57ACF000
|
trusted library allocation
|
page read and write
|
||
1EB57A59000
|
trusted library allocation
|
page read and write
|
||
1EB538DA000
|
trusted library allocation
|
page read and write
|
||
28E89D60000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E872000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB4E889000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB5728E000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB63CFE000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB57683000
|
trusted library allocation
|
page read and write
|
||
1BE35C49000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57AED000
|
trusted library allocation
|
page read and write
|
||
1EB5B4BA000
|
trusted library allocation
|
page read and write
|
||
1EB538AA000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB58A7C000
|
trusted library allocation
|
page read and write
|
||
1EB58BFB000
|
trusted library allocation
|
page read and write
|
||
1EB57E37000
|
trusted library allocation
|
page read and write
|
||
1EB6204D000
|
trusted library allocation
|
page read and write
|
||
131000
|
unkown
|
page execute read
|
||
1EB4E886000
|
heap
|
page read and write
|
||
39A1000
|
heap
|
page read and write
|
||
1EB597E1000
|
trusted library allocation
|
page read and write
|
||
1EB49376000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB5B343000
|
trusted library allocation
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1EB57E41000
|
trusted library allocation
|
page read and write
|
||
1EB57AB4000
|
trusted library allocation
|
page read and write
|
||
1EB57679000
|
trusted library allocation
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB538CC000
|
trusted library allocation
|
page read and write
|
||
1EB5FFED000
|
trusted library allocation
|
page read and write
|
||
1EB59BFC000
|
trusted library allocation
|
page read and write
|
||
1EB60069000
|
trusted library allocation
|
page read and write
|
||
1EB57AB4000
|
trusted library allocation
|
page read and write
|
||
1BE357C8000
|
remote allocation
|
page execute read
|
||
1EB57CE6000
|
trusted library allocation
|
page read and write
|
||
1EB57A87000
|
trusted library allocation
|
page read and write
|
||
1EB5B785000
|
trusted library allocation
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
1EB57A4C000
|
trusted library allocation
|
page read and write
|
||
F15DA7E000
|
stack
|
page read and write
|
||
1EB601D9000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
28E89E03000
|
trusted library allocation
|
page read and write
|
||
1EB576A8000
|
trusted library allocation
|
page read and write
|
||
1EB57783000
|
trusted library allocation
|
page read and write
|
||
1EB5FCF9000
|
trusted library allocation
|
page read and write
|
||
1EB576A8000
|
trusted library allocation
|
page read and write
|
||
1EB5FBB9000
|
trusted library allocation
|
page read and write
|
||
1EB5B598000
|
trusted library allocation
|
page read and write
|
||
1EB63CEA000
|
trusted library allocation
|
page read and write
|
||
1EB5A25D000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB5FEDF000
|
trusted library allocation
|
page read and write
|
||
28E8A3A4000
|
unkown
|
page execute read
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB58B94000
|
trusted library allocation
|
page read and write
|
||
1EB5B581000
|
trusted library allocation
|
page read and write
|
||
1EB5A2E3000
|
trusted library allocation
|
page read and write
|
||
1EB576A8000
|
trusted library allocation
|
page read and write
|
||
25895EE000
|
unkown
|
page readonly
|
||
28E89E00000
|
trusted library allocation
|
page read and write
|
||
1EB58A35000
|
trusted library allocation
|
page read and write
|
||
28E8A97F000
|
heap
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB57E76000
|
trusted library allocation
|
page read and write
|
||
1EB5B527000
|
trusted library allocation
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB547B8000
|
trusted library allocation
|
page read and write
|
||
28E8A960000
|
heap
|
page read and write
|
||
1EB592D1000
|
trusted library allocation
|
page read and write
|
||
1EB4E835000
|
heap
|
page read and write
|
||
1EB5FE97000
|
trusted library allocation
|
page read and write
|
||
1EB63E33000
|
heap
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1FA4E5C2000
|
unclassified section
|
page read and write
|
||
1EB5FC99000
|
trusted library allocation
|
page read and write
|
||
1EB57E87000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB58BDE000
|
trusted library allocation
|
page read and write
|
||
1EB57AC2000
|
trusted library allocation
|
page read and write
|
||
1EB59265000
|
trusted library allocation
|
page read and write
|
||
1EB57E7A000
|
trusted library allocation
|
page read and write
|
||
82017FE000
|
stack
|
page read and write
|
||
1EB57272000
|
heap
|
page read and write
|
||
28E89E15000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB57AA1000
|
trusted library allocation
|
page read and write
|
||
1EB57CBC000
|
trusted library allocation
|
page read and write
|
||
1EB592F0000
|
trusted library allocation
|
page read and write
|
||
1EB57265000
|
heap
|
page read and write
|
||
1EB58BC5000
|
trusted library allocation
|
page read and write
|
||
1EB6017B000
|
trusted library allocation
|
page read and write
|
||
1EB57E57000
|
trusted library allocation
|
page read and write
|
||
1EB620A7000
|
trusted library allocation
|
page read and write
|
||
1EB592E4000
|
trusted library allocation
|
page read and write
|
||
1EB58BF1000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB597F7000
|
trusted library allocation
|
page read and write
|
||
1EB638B7000
|
trusted library allocation
|
page read and write
|
||
28E89E64000
|
trusted library allocation
|
page read and write
|
||
1EB6201C000
|
trusted library allocation
|
page read and write
|
||
1EB58B8A000
|
trusted library allocation
|
page read and write
|
||
1EB601EC000
|
trusted library allocation
|
page read and write
|
||
1EB57E35000
|
trusted library allocation
|
page read and write
|
||
1EB5B3CB000
|
trusted library allocation
|
page read and write
|
||
1EB59DF5000
|
trusted library allocation
|
page read and write
|
||
1EB587C4000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB5A1D4000
|
trusted library allocation
|
page read and write
|
||
1EB57AD6000
|
trusted library allocation
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB58BE9000
|
trusted library allocation
|
page read and write
|
||
1EB57E52000
|
trusted library allocation
|
page read and write
|
||
1EB57A3E000
|
trusted library allocation
|
page read and write
|
||
1BE358E0000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB577B8000
|
trusted library allocation
|
page read and write
|
||
1EB577B6000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB60095000
|
trusted library allocation
|
page read and write
|
||
1EB59C59000
|
trusted library allocation
|
page read and write
|
||
1EB597E9000
|
trusted library allocation
|
page read and write
|
||
1EB4E889000
|
heap
|
page read and write
|
||
1EB5FC16000
|
trusted library allocation
|
page read and write
|
||
1EB59767000
|
trusted library allocation
|
page read and write
|
||
1EB57E6F000
|
trusted library allocation
|
page read and write
|
||
1EB57249000
|
heap
|
page read and write
|
||
28E8AA58000
|
heap
|
page read and write
|
||
1EB63CDD000
|
trusted library allocation
|
page read and write
|
||
1EB57ECE000
|
trusted library allocation
|
page read and write
|
||
1EB5FC82000
|
trusted library allocation
|
page read and write
|
||
1EB64812000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB53866000
|
trusted library allocation
|
page read and write
|
||
1EB57E99000
|
trusted library allocation
|
page read and write
|
||
1EB63C8F000
|
trusted library allocation
|
page read and write
|
||
139F32CA000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1EB4E86F000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
820203E000
|
unkown
|
page readonly
|
||
1EB5FEAD000
|
trusted library allocation
|
page read and write
|
||
1EB58BE5000
|
trusted library allocation
|
page read and write
|
||
28E8AA00000
|
heap
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB5FFA5000
|
trusted library allocation
|
page read and write
|
||
1EB59B4D000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB57C72000
|
trusted library allocation
|
page read and write
|
||
1EB57AC2000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB58BF2000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
28E89E12000
|
trusted library allocation
|
page read and write
|
||
1EB57AC2000
|
trusted library allocation
|
page read and write
|
||
1EB61DE8000
|
trusted library allocation
|
page read and write
|
||
1EB576A1000
|
trusted library allocation
|
page read and write
|
||
1EB54A9D000
|
trusted library allocation
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
1EB5B536000
|
trusted library allocation
|
page read and write
|
||
1FA4E89E000
|
trusted library allocation
|
page read and write
|
||
1EB57ECC000
|
trusted library allocation
|
page read and write
|
||
16EDFFF000
|
stack
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB57E35000
|
trusted library allocation
|
page read and write
|
||
1EB5389F000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB53181000
|
trusted library allocation
|
page read and write
|
||
1EB63CEA000
|
trusted library allocation
|
page read and write
|
||
1EB59CCE000
|
trusted library allocation
|
page read and write
|
||
1EB63CD4000
|
trusted library allocation
|
page read and write
|
||
1EB5A19B000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB5873F000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
28E89AD0000
|
heap
|
page read and write
|
||
1EB57228000
|
heap
|
page read and write
|
||
1EB4E86F000
|
heap
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB4E8AC000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5B1FD000
|
trusted library allocation
|
page read and write
|
||
1EB57E22000
|
trusted library allocation
|
page read and write
|
||
1EB59ACB000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB4E8B2000
|
heap
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB5FEA4000
|
trusted library allocation
|
page read and write
|
||
139F1800000
|
heap
|
page read and write
|
||
1BE358D2000
|
unclassified section
|
page read and write
|
||
1EB62041000
|
trusted library allocation
|
page read and write
|
||
1EB5A1B3000
|
trusted library allocation
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
28E8AA21000
|
heap
|
page read and write
|
||
1EB57A44000
|
trusted library allocation
|
page read and write
|
||
1EB58BA0000
|
trusted library allocation
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1EB620C5000
|
trusted library allocation
|
page read and write
|
||
1EB57E4D000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB5381B000
|
trusted library allocation
|
page read and write
|
||
1EB58BF5000
|
trusted library allocation
|
page read and write
|
||
1EB60092000
|
trusted library allocation
|
page read and write
|
||
1EB57691000
|
trusted library allocation
|
page read and write
|
||
1EB59B6D000
|
trusted library allocation
|
page read and write
|
||
1EB5AD24000
|
trusted library allocation
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E83A000
|
heap
|
page read and write
|
||
1EB600B9000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E83A000
|
heap
|
page read and write
|
||
28E8A2B3000
|
heap
|
page read and write
|
||
1EB5978F000
|
trusted library allocation
|
page read and write
|
||
1EB5B4C2000
|
trusted library allocation
|
page read and write
|
||
1EB60134000
|
trusted library allocation
|
page read and write
|
||
1EB538AE000
|
trusted library allocation
|
page read and write
|
||
1EB59238000
|
trusted library allocation
|
page read and write
|
||
1EB57E2D000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB57EC8000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57563000
|
trusted library allocation
|
page read and write
|
||
1EB577B0000
|
trusted library allocation
|
page read and write
|
||
1EB5FED5000
|
trusted library allocation
|
page read and write
|
||
1EB634D1000
|
trusted library allocation
|
page read and write
|
||
1EB597EB000
|
trusted library allocation
|
page read and write
|
||
1EB4E84C000
|
heap
|
page read and write
|
||
1EB58BF5000
|
trusted library allocation
|
page read and write
|
||
1EB5B0FD000
|
trusted library allocation
|
page read and write
|
||
1EB5B595000
|
trusted library allocation
|
page read and write
|
||
1EB57CE6000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5754B000
|
trusted library allocation
|
page read and write
|
||
1EB58F91000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5B4CA000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB57E5B000
|
trusted library allocation
|
page read and write
|
||
1EB5A2C2000
|
trusted library allocation
|
page read and write
|
||
1EB4E87F000
|
heap
|
page read and write
|
||
1EB5A0B1000
|
trusted library allocation
|
page read and write
|
||
1EB61FA2000
|
trusted library allocation
|
page read and write
|
||
1EB601EC000
|
trusted library allocation
|
page read and write
|
||
1EB57CBE000
|
trusted library allocation
|
page read and write
|
||
1EB58BE9000
|
trusted library allocation
|
page read and write
|
||
1EB58C51000
|
trusted library allocation
|
page read and write
|
||
1EB57E98000
|
trusted library allocation
|
page read and write
|
||
28E8A963000
|
heap
|
page read and write
|
||
1EB56F8D000
|
trusted library allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1EB58B8A000
|
trusted library allocation
|
page read and write
|
||
1EB592E4000
|
trusted library allocation
|
page read and write
|
||
1EB4E868000
|
heap
|
page read and write
|
||
1EB58BAC000
|
trusted library allocation
|
page read and write
|
||
1EB5B733000
|
trusted library allocation
|
page read and write
|
||
1EB4E87F000
|
heap
|
page read and write
|
||
28E8AA77000
|
heap
|
page read and write
|
||
1EB57CB2000
|
trusted library allocation
|
page read and write
|
||
16EEFFF000
|
stack
|
page read and write
|
||
1EB5929B000
|
trusted library allocation
|
page read and write
|
||
1EB4E857000
|
heap
|
page read and write
|
||
1EB57E67000
|
trusted library allocation
|
page read and write
|
||
1EB5FE78000
|
trusted library allocation
|
page read and write
|
||
1EB59A92000
|
trusted library allocation
|
page read and write
|
||
1EB57ACF000
|
trusted library allocation
|
page read and write
|
||
1EB56F87000
|
trusted library allocation
|
page read and write
|
||
1EB5FE7A000
|
trusted library allocation
|
page read and write
|
||
1EB6017D000
|
trusted library allocation
|
page read and write
|
||
1EB5B47E000
|
trusted library allocation
|
page read and write
|
||
1EB5921C000
|
trusted library allocation
|
page read and write
|
||
1EB548B5000
|
trusted library allocation
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1BE35F03000
|
trusted library allocation
|
page read and write
|
||
28E89DF1000
|
unkown
|
page execute read
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB58BA7000
|
trusted library allocation
|
page read and write
|
||
1EB54AF6000
|
trusted library allocation
|
page read and write
|
||
1EB5AC63000
|
trusted library allocation
|
page read and write
|
||
1EB5A2F4000
|
trusted library allocation
|
page read and write
|
||
1EB59B8C000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
28E89EC8000
|
trusted library allocation
|
page read and write
|
||
1EB63CEA000
|
trusted library allocation
|
page read and write
|
||
1EB6012B000
|
trusted library allocation
|
page read and write
|
||
258C83E000
|
stack
|
page read and write
|
||
1EB62005000
|
trusted library allocation
|
page read and write
|
||
1EB58AAD000
|
trusted library allocation
|
page read and write
|
||
1EB5B0B8000
|
trusted library allocation
|
page read and write
|
||
1EB5B7D4000
|
trusted library allocation
|
page read and write
|
||
1EB57E37000
|
trusted library allocation
|
page read and write
|
||
1EB5759C000
|
trusted library allocation
|
page read and write
|
||
1EB648D0000
|
trusted library allocation
|
page read and write
|
||
28E89EC3000
|
trusted library allocation
|
page read and write
|
||
28E8A9E0000
|
heap
|
page read and write
|
||
1EB57A73000
|
trusted library allocation
|
page read and write
|
||
1EB601CB000
|
trusted library allocation
|
page read and write
|
||
1EB4E886000
|
heap
|
page read and write
|
||
1EB59467000
|
trusted library allocation
|
page read and write
|
||
1EB58778000
|
trusted library allocation
|
page read and write
|
||
1EB60173000
|
trusted library allocation
|
page read and write
|
||
1BE35993000
|
heap
|
page read and write
|
||
1EB5475C000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1EB59473000
|
trusted library allocation
|
page read and write
|
||
1FC000
|
unkown
|
page write copy
|
||
1EB54AF6000
|
trusted library allocation
|
page read and write
|
||
1EB57CBC000
|
trusted library allocation
|
page read and write
|
||
1EB62101000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
258E8FE000
|
unkown
|
page readonly
|
||
1EB57A87000
|
trusted library allocation
|
page read and write
|
||
1EB576D7000
|
trusted library allocation
|
page read and write
|
||
1EB56E98000
|
trusted library allocation
|
page read and write
|
||
1EB58A85000
|
trusted library allocation
|
page read and write
|
||
1EB5A18F000
|
trusted library allocation
|
page read and write
|
||
1EB58A9C000
|
trusted library allocation
|
page read and write
|
||
1EB58A69000
|
trusted library allocation
|
page read and write
|
||
1BE35890000
|
heap
|
page read and write
|
||
1EB57E6F000
|
trusted library allocation
|
page read and write
|
||
1EB58A7C000
|
trusted library allocation
|
page read and write
|
||
1EB4E866000
|
heap
|
page read and write
|
||
1EB57E0C000
|
trusted library allocation
|
page read and write
|
||
1EB5978F000
|
trusted library allocation
|
page read and write
|
||
1EB56F63000
|
trusted library allocation
|
page read and write
|
||
1EB5873E000
|
trusted library allocation
|
page read and write
|
||
1EB57E80000
|
trusted library allocation
|
page read and write
|
||
1EB57CC0000
|
trusted library allocation
|
page read and write
|
||
1EB5FF24000
|
trusted library allocation
|
page read and write
|
||
1EB5B5D4000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB57A9D000
|
trusted library allocation
|
page read and write
|
||
1EB57666000
|
trusted library allocation
|
page read and write
|
||
1EB58DA3000
|
trusted library allocation
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB5B752000
|
trusted library allocation
|
page read and write
|
||
1EB58C14000
|
trusted library allocation
|
page read and write
|
||
1EB57AB4000
|
trusted library allocation
|
page read and write
|
||
1EB63BFB000
|
trusted library allocation
|
page read and write
|
||
258B7FE000
|
unkown
|
page readonly
|
||
28E89E48000
|
trusted library allocation
|
page read and write
|
||
1EB56ECA000
|
trusted library allocation
|
page read and write
|
||
1EB54A8E000
|
trusted library allocation
|
page read and write
|
||
1EB54ADD000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB64820000
|
trusted library allocation
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB5FC32000
|
trusted library allocation
|
page read and write
|
||
1EB531A7000
|
trusted library allocation
|
page read and write
|
||
1EB57E99000
|
trusted library allocation
|
page read and write
|
||
1EB5AD4F000
|
trusted library allocation
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB57A08000
|
trusted library allocation
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
1EB57C72000
|
trusted library allocation
|
page read and write
|
||
1EB57581000
|
trusted library allocation
|
page read and write
|
||
1EB5929F000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB57E26000
|
trusted library allocation
|
page read and write
|
||
1EB6483B000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB62101000
|
trusted library allocation
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB6014A000
|
trusted library allocation
|
page read and write
|
||
1EB5925E000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB5FEAA000
|
trusted library allocation
|
page read and write
|
||
1EB57AED000
|
trusted library allocation
|
page read and write
|
||
1EB58ABB000
|
trusted library allocation
|
page read and write
|
||
1EB57622000
|
trusted library allocation
|
page read and write
|
||
139F1884000
|
heap
|
page read and write
|
||
1EB59AE1000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB58BE9000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
1EB58A7F000
|
trusted library allocation
|
page read and write
|
||
1FA4E939000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB59231000
|
trusted library allocation
|
page read and write
|
||
1EB53875000
|
trusted library allocation
|
page read and write
|
||
1EB57C34000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB58ABB000
|
trusted library allocation
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB6015B000
|
trusted library allocation
|
page read and write
|
||
1EB62037000
|
trusted library allocation
|
page read and write
|
||
1EB6017B000
|
trusted library allocation
|
page read and write
|
||
1EB58BE5000
|
trusted library allocation
|
page read and write
|
||
1EB57CA0000
|
trusted library allocation
|
page read and write
|
||
1EB58E42000
|
trusted library allocation
|
page read and write
|
||
1EB4E878000
|
heap
|
page read and write
|
||
1EB5B5D4000
|
trusted library allocation
|
page read and write
|
||
1EB57284000
|
heap
|
page read and write
|
||
1EB6016D000
|
trusted library allocation
|
page read and write
|
||
1EB57284000
|
heap
|
page read and write
|
||
1EB59C5E000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB57A97000
|
trusted library allocation
|
page read and write
|
||
1EB5B6A1000
|
trusted library allocation
|
page read and write
|
||
1EB59238000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB58B90000
|
trusted library allocation
|
page read and write
|
||
1EB57AC8000
|
trusted library allocation
|
page read and write
|
||
28E8A80D000
|
trusted library allocation
|
page read and write
|
||
1EB638FB000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB5B4AB000
|
trusted library allocation
|
page read and write
|
||
1EB587F5000
|
trusted library allocation
|
page read and write
|
||
1EB5B52E000
|
trusted library allocation
|
page read and write
|
||
1EB5727A000
|
heap
|
page read and write
|
||
1EB57E06000
|
trusted library allocation
|
page read and write
|
||
1EB58BF5000
|
trusted library allocation
|
page read and write
|
||
1EB58BF5000
|
trusted library allocation
|
page read and write
|
||
1EB57E63000
|
trusted library allocation
|
page read and write
|
||
1EB57E5B000
|
trusted library allocation
|
page read and write
|
||
1EB5B1FD000
|
trusted library allocation
|
page read and write
|
||
1EB58CA0000
|
trusted library allocation
|
page read and write
|
||
1EB5A1A3000
|
trusted library allocation
|
page read and write
|
||
1EB58B63000
|
trusted library allocation
|
page read and write
|
||
1EB5ACF4000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB58DCF000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1EB59215000
|
trusted library allocation
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB58A7F000
|
trusted library allocation
|
page read and write
|
||
1EB577B4000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1CC000
|
unkown
|
page readonly
|
||
1EB5B5FE000
|
trusted library allocation
|
page read and write
|
||
1EB6016B000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB58CC9000
|
trusted library allocation
|
page read and write
|
||
1FA4E800000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB57E76000
|
trusted library allocation
|
page read and write
|
||
1EB58A43000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB597AD000
|
trusted library allocation
|
page read and write
|
||
1EB58E17000
|
trusted library allocation
|
page read and write
|
||
1EB57E26000
|
trusted library allocation
|
page read and write
|
||
1EB58DFA000
|
trusted library allocation
|
page read and write
|
||
1EB5B529000
|
trusted library allocation
|
page read and write
|
||
1FA4E8A9000
|
trusted library allocation
|
page read and write
|
||
1EB59BFC000
|
trusted library allocation
|
page read and write
|
||
1EB58724000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1FA4E861000
|
trusted library allocation
|
page read and write
|
||
1EB5A2E8000
|
trusted library allocation
|
page read and write
|
||
1EB5B4AD000
|
trusted library allocation
|
page read and write
|
||
1EB5B499000
|
trusted library allocation
|
page read and write
|
||
1EB58BF6000
|
trusted library allocation
|
page read and write
|
||
1EB5FE7E000
|
trusted library allocation
|
page read and write
|
||
1EB6015B000
|
trusted library allocation
|
page read and write
|
||
1EB5921C000
|
trusted library allocation
|
page read and write
|
||
1EB637D6000
|
trusted library allocation
|
page read and write
|
||
1EB587AC000
|
trusted library allocation
|
page read and write
|
||
1EB548B5000
|
trusted library allocation
|
page read and write
|
||
1EB5B52E000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1BE35C68000
|
trusted library allocation
|
page read and write
|
||
1EB59A9E000
|
trusted library allocation
|
page read and write
|
||
1EB58A85000
|
trusted library allocation
|
page read and write
|
||
1EB6013E000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB5B527000
|
trusted library allocation
|
page read and write
|
||
1EB4E878000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB57AD6000
|
trusted library allocation
|
page read and write
|
||
1EB57CB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
1EB60152000
|
trusted library allocation
|
page read and write
|
||
1EB57E74000
|
trusted library allocation
|
page read and write
|
||
1EB58B2E000
|
trusted library allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1EB61DC5000
|
trusted library allocation
|
page read and write
|
||
1EB62007000
|
trusted library allocation
|
page read and write
|
||
F159FDE000
|
unkown
|
page readonly
|
||
1EB620C5000
|
trusted library allocation
|
page read and write
|
||
1EB5B5E2000
|
trusted library allocation
|
page read and write
|
||
1FA4E3A0000
|
unclassified section
|
page readonly
|
||
1EB57E76000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB57ADE000
|
trusted library allocation
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB64850000
|
trusted library allocation
|
page read and write
|
||
1EB645CE000
|
trusted library allocation
|
page read and write
|
||
1EB5B4A9000
|
trusted library allocation
|
page read and write
|
||
1EB58BEE000
|
trusted library allocation
|
page read and write
|
||
1EB58E12000
|
trusted library allocation
|
page read and write
|
||
1BE358D0000
|
unclassified section
|
page read and write
|
||
1EB58B82000
|
trusted library allocation
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB60138000
|
trusted library allocation
|
page read and write
|
||
1EB60162000
|
trusted library allocation
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB5B49C000
|
trusted library allocation
|
page read and write
|
||
1EB56E63000
|
trusted library allocation
|
page read and write
|
||
1EB5FBD3000
|
trusted library allocation
|
page read and write
|
||
1EB57A73000
|
trusted library allocation
|
page read and write
|
||
1EB56E73000
|
trusted library allocation
|
page read and write
|
||
1EB63B58000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB57AF7000
|
trusted library allocation
|
page read and write
|
||
1EB5A0BC000
|
trusted library allocation
|
page read and write
|
||
1EB4E82F000
|
heap
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1EB6212E000
|
trusted library allocation
|
page read and write
|
||
1EB63EA3000
|
heap
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
1EB57A43000
|
trusted library allocation
|
page read and write
|
||
1EB57C7B000
|
trusted library allocation
|
page read and write
|
||
1EB577BC000
|
trusted library allocation
|
page read and write
|
||
1EB5878C000
|
trusted library allocation
|
page read and write
|
||
1EB58B2E000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB5777A000
|
trusted library allocation
|
page read and write
|
||
1EB5B1CF000
|
trusted library allocation
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
1EB620A7000
|
trusted library allocation
|
page read and write
|
||
1EB5475E000
|
trusted library allocation
|
page read and write
|
||
1EB57AA1000
|
trusted library allocation
|
page read and write
|
||
139F1858000
|
heap
|
page read and write
|
||
1EB54759000
|
trusted library allocation
|
page read and write
|
||
1EB4E847000
|
heap
|
page read and write
|
||
1EB57CB2000
|
trusted library allocation
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB5B5CB000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB58B6D000
|
trusted library allocation
|
page read and write
|
||
1EB57AA1000
|
trusted library allocation
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB59A92000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB57292000
|
heap
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB5B7F5000
|
trusted library allocation
|
page read and write
|
||
1EB63CA4000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB5B618000
|
trusted library allocation
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
1EB601B5000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB58764000
|
trusted library allocation
|
page read and write
|
||
1EB53900000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1BE357F0000
|
heap
|
page read and write
|
||
1EB6013C000
|
trusted library allocation
|
page read and write
|
||
1EB638B7000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB54A84000
|
trusted library allocation
|
page read and write
|
||
1EB5B61C000
|
trusted library allocation
|
page read and write
|
||
1EB5B595000
|
trusted library allocation
|
page read and write
|
||
1EB587E5000
|
trusted library allocation
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB57271000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB5727D000
|
heap
|
page read and write
|
||
1EB58A85000
|
trusted library allocation
|
page read and write
|
||
1EB5B461000
|
trusted library allocation
|
page read and write
|
||
1EB54A9A000
|
trusted library allocation
|
page read and write
|
||
1EB5387D000
|
trusted library allocation
|
page read and write
|
||
1EB5FCDE000
|
trusted library allocation
|
page read and write
|
||
1EB57C7B000
|
trusted library allocation
|
page read and write
|
||
1EB592AE000
|
trusted library allocation
|
page read and write
|
||
139F32C8000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB57ABC000
|
trusted library allocation
|
page read and write
|
||
1EB5B164000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB5B51D000
|
trusted library allocation
|
page read and write
|
||
1EB4E878000
|
heap
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
28E8A901000
|
heap
|
page read and write
|
||
1EB57264000
|
heap
|
page read and write
|
||
1EB57AF7000
|
trusted library allocation
|
page read and write
|
||
1EB5B7EB000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB6489D000
|
trusted library allocation
|
page read and write
|
||
1EB5FFAC000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB634EA000
|
trusted library allocation
|
page read and write
|
||
1EB5372F000
|
trusted library allocation
|
page read and write
|
||
1EB57A9D000
|
trusted library allocation
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
139F32CB000
|
heap
|
page read and write
|
||
1EB5A240000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB645F1000
|
trusted library allocation
|
page read and write
|
||
1EB62048000
|
trusted library allocation
|
page read and write
|
||
1EB60176000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB620E4000
|
trusted library allocation
|
page read and write
|
||
1EB6004E000
|
trusted library allocation
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
28E8A805000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB5FFE8000
|
trusted library allocation
|
page read and write
|
||
1EB5AD42000
|
trusted library allocation
|
page read and write
|
||
1EB4E872000
|
heap
|
page read and write
|
||
1EB5A197000
|
trusted library allocation
|
page read and write
|
||
28E8A960000
|
heap
|
page read and write
|
||
1EB58BEC000
|
trusted library allocation
|
page read and write
|
||
1EB6016C000
|
trusted library allocation
|
page read and write
|
||
1EB4E846000
|
heap
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page write copy
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB61DED000
|
trusted library allocation
|
page read and write
|
||
1EB538E4000
|
trusted library allocation
|
page read and write
|
||
258BFFE000
|
stack
|
page read and write
|
||
1EB5B130000
|
trusted library allocation
|
page read and write
|
||
1EB648B4000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB5B5C2000
|
trusted library allocation
|
page read and write
|
||
1BE35C82000
|
trusted library allocation
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1EB57AE0000
|
trusted library allocation
|
page read and write
|
||
28E8A96C000
|
heap
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB59DF3000
|
trusted library allocation
|
page read and write
|
||
258956B000
|
stack
|
page read and write
|
||
1EB58BA2000
|
trusted library allocation
|
page read and write
|
||
1EB4E847000
|
heap
|
page read and write
|
||
1EB617E4000
|
trusted library allocation
|
page read and write
|
||
1EB57E52000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB4E8B2000
|
heap
|
page read and write
|
||
1EB59751000
|
trusted library allocation
|
page read and write
|
||
1EB587B4000
|
trusted library allocation
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB57AD6000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB5B735000
|
trusted library allocation
|
page read and write
|
||
1EB5A187000
|
trusted library allocation
|
page read and write
|
||
1EB4E832000
|
heap
|
page read and write
|
||
1EB601D6000
|
trusted library allocation
|
page read and write
|
||
1EB577C1000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB5B1D8000
|
trusted library allocation
|
page read and write
|
||
28E8A98D000
|
heap
|
page read and write
|
||
1EB5B649000
|
trusted library allocation
|
page read and write
|
||
1EB57A43000
|
trusted library allocation
|
page read and write
|
||
1EB63CD4000
|
trusted library allocation
|
page read and write
|
||
1EB61D90000
|
trusted library allocation
|
page read and write
|
||
1EB58BFA000
|
trusted library allocation
|
page read and write
|
||
1EB5B7EB000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB54728000
|
trusted library allocation
|
page read and write
|
||
1EB6016F000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1EB60134000
|
trusted library allocation
|
page read and write
|
||
1EB58665000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB638BE000
|
trusted library allocation
|
page read and write
|
||
1EB4E846000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
820393E000
|
stack
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB5AD0A000
|
trusted library allocation
|
page read and write
|
||
1EB4E8B2000
|
heap
|
page read and write
|
||
1EB4E8AC000
|
heap
|
page read and write
|
||
1EB6014A000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB58C46000
|
trusted library allocation
|
page read and write
|
||
1EB587F8000
|
trusted library allocation
|
page read and write
|
||
1EB5971D000
|
trusted library allocation
|
page read and write
|
||
1EB601D9000
|
trusted library allocation
|
page read and write
|
||
1EB57271000
|
heap
|
page read and write
|
||
28E8AA21000
|
heap
|
page read and write
|
||
1EB5B0E3000
|
trusted library allocation
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
1EB5AC68000
|
trusted library allocation
|
page read and write
|
||
1FA4E5D0000
|
heap
|
page read and write
|
||
1EB6017D000
|
trusted library allocation
|
page read and write
|
||
28E89D66000
|
heap
|
page read and write
|
||
1EB58BE6000
|
trusted library allocation
|
page read and write
|
||
1EB57C74000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB601E0000
|
trusted library allocation
|
page read and write
|
||
1EB58A6B000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB58E39000
|
trusted library allocation
|
page read and write
|
||
1EB5B4AD000
|
trusted library allocation
|
page read and write
|
||
1FA4EA00000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB648AB000
|
trusted library allocation
|
page read and write
|
||
1EB57E9B000
|
trusted library allocation
|
page read and write
|
||
1EB58BF5000
|
trusted library allocation
|
page read and write
|
||
1EB5FEF4000
|
trusted library allocation
|
page read and write
|
||
1EB587CD000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB5FC3F000
|
trusted library allocation
|
page read and write
|
||
1EB58A02000
|
trusted library allocation
|
page read and write
|
||
1EB5B69E000
|
trusted library allocation
|
page read and write
|
||
1EB5768E000
|
trusted library allocation
|
page read and write
|
||
1EB5FEAA000
|
trusted library allocation
|
page read and write
|
||
1EB5AD0C000
|
trusted library allocation
|
page read and write
|
||
1EB53813000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB54A84000
|
trusted library allocation
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB57793000
|
trusted library allocation
|
page read and write
|
||
1EB5489B000
|
trusted library allocation
|
page read and write
|
||
1EB587D6000
|
trusted library allocation
|
page read and write
|
||
28E89D32000
|
unclassified section
|
page read and write
|
||
1EB601D3000
|
trusted library allocation
|
page read and write
|
||
1EB6016B000
|
trusted library allocation
|
page read and write
|
||
1EB5979E000
|
trusted library allocation
|
page read and write
|
||
1EB5B5D4000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB57A9D000
|
trusted library allocation
|
page read and write
|
||
1EB58A9F000
|
trusted library allocation
|
page read and write
|
||
1EB617F6000
|
trusted library allocation
|
page read and write
|
||
1EB63B72000
|
trusted library allocation
|
page read and write
|
||
1EB64832000
|
trusted library allocation
|
page read and write
|
||
1EB5B33F000
|
trusted library allocation
|
page read and write
|
||
1EB57CC0000
|
trusted library allocation
|
page read and write
|
||
1EB5B1C8000
|
trusted library allocation
|
page read and write
|
||
1EB601D9000
|
trusted library allocation
|
page read and write
|
||
1EB5FBA3000
|
trusted library allocation
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB56F34000
|
trusted library allocation
|
page read and write
|
||
1EB576A8000
|
trusted library allocation
|
page read and write
|
||
1EB59A4A000
|
trusted library allocation
|
page read and write
|
||
1EB63C3C000
|
trusted library allocation
|
page read and write
|
||
1EB5B7DE000
|
trusted library allocation
|
page read and write
|
||
1EB5A180000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E87F000
|
heap
|
page read and write
|
||
1EB57CE6000
|
trusted library allocation
|
page read and write
|
||
1EB57CE0000
|
trusted library allocation
|
page read and write
|
||
1EB58AA3000
|
trusted library allocation
|
page read and write
|
||
1EB5489F000
|
trusted library allocation
|
page read and write
|
||
28E89EC0000
|
trusted library allocation
|
page read and write
|
||
28E8A96C000
|
heap
|
page read and write
|
||
1EB58F8E000
|
trusted library allocation
|
page read and write
|
||
1EB5B0C9000
|
trusted library allocation
|
page read and write
|
||
2020DFE000
|
stack
|
page read and write
|
||
1EB58B2E000
|
trusted library allocation
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
28E89973000
|
remote allocation
|
page execute read
|
||
1EB57261000
|
heap
|
page read and write
|
||
1EB5B0E1000
|
trusted library allocation
|
page read and write
|
||
1BE35750000
|
unclassified section
|
page readonly
|
||
1EB58A9C000
|
trusted library allocation
|
page read and write
|
||
1EB5AD15000
|
trusted library allocation
|
page read and write
|
||
1EB592D1000
|
trusted library allocation
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB57E7F000
|
trusted library allocation
|
page read and write
|
||
28E8A9FD000
|
heap
|
page read and write
|
||
1FA4E540000
|
heap
|
page read and write
|
||
1EB637E5000
|
trusted library allocation
|
page read and write
|
||
1EB6003E000
|
trusted library allocation
|
page read and write
|
||
1EB57772000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB5B4AB000
|
trusted library allocation
|
page read and write
|
||
1EB6200C000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57A49000
|
trusted library allocation
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
1EB57A33000
|
trusted library allocation
|
page read and write
|
||
1EB57AE9000
|
trusted library allocation
|
page read and write
|
||
1EB57E0C000
|
trusted library allocation
|
page read and write
|
||
1EB634DD000
|
trusted library allocation
|
page read and write
|
||
1EB538BF000
|
trusted library allocation
|
page read and write
|
||
1FA4E881000
|
trusted library allocation
|
page read and write
|
||
1D036A60000
|
heap
|
page read and write
|
||
1EB5929B000
|
trusted library allocation
|
page read and write
|
||
1EB60184000
|
trusted library allocation
|
page read and write
|
||
1EB58ABD000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
28E8A99C000
|
heap
|
page read and write
|
||
1EB57E74000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
1EB5A1A3000
|
trusted library allocation
|
page read and write
|
||
1EB57CBC000
|
trusted library allocation
|
page read and write
|
||
1EB638D4000
|
trusted library allocation
|
page read and write
|
||
1FA4E433000
|
heap
|
page read and write
|
||
1EB5ADAA000
|
trusted library allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1EB601D3000
|
trusted library allocation
|
page read and write
|
||
1EB597F1000
|
trusted library allocation
|
page read and write
|
||
1EB57A73000
|
trusted library allocation
|
page read and write
|
||
1EB59227000
|
trusted library allocation
|
page read and write
|
||
1EB64B67000
|
trusted library allocation
|
page read and write
|
||
1EB576D7000
|
trusted library allocation
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB537FB000
|
trusted library allocation
|
page read and write
|
||
1EB53771000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
28E8AA58000
|
heap
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB54793000
|
trusted library allocation
|
page read and write
|
||
1EB61D8E000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E876000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB5B5CB000
|
trusted library allocation
|
page read and write
|
||
1EB54ABC000
|
trusted library allocation
|
page read and write
|
||
1EB5B599000
|
trusted library allocation
|
page read and write
|
||
28E8A9E9000
|
heap
|
page read and write
|
||
1EB57AF0000
|
trusted library allocation
|
page read and write
|
||
1EB63B82000
|
trusted library allocation
|
page read and write
|
||
1FA4E430000
|
heap
|
page read and write
|
||
28E8A9F2000
|
heap
|
page read and write
|
||
1EB6454E000
|
trusted library allocation
|
page read and write
|
||
1EB63B48000
|
trusted library allocation
|
page read and write
|
||
1EB57C8B000
|
trusted library allocation
|
page read and write
|
||
1EB5B7E1000
|
trusted library allocation
|
page read and write
|
||
1EB5B5D4000
|
trusted library allocation
|
page read and write
|
||
1EB538BF000
|
trusted library allocation
|
page read and write
|
||
28E89D3F000
|
unclassified section
|
page read and write
|
||
1EB600C3000
|
trusted library allocation
|
page read and write
|
||
1EB57E76000
|
trusted library allocation
|
page read and write
|
||
1EB5B5B3000
|
trusted library allocation
|
page read and write
|
||
1EB5C902000
|
trusted library allocation
|
page read and write
|
||
1EB58B7D000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB4E87E000
|
heap
|
page read and write
|
||
1EB5B7D9000
|
trusted library allocation
|
page read and write
|
||
28E89B00000
|
trusted library allocation
|
page read and write
|
||
1EB63C55000
|
trusted library allocation
|
page read and write
|
||
1EB601D9000
|
trusted library allocation
|
page read and write
|
||
1EB5973E000
|
trusted library allocation
|
page read and write
|
||
1EB6013E000
|
trusted library allocation
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1EB58A98000
|
trusted library allocation
|
page read and write
|
||
28E8AA3B000
|
heap
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB4E854000
|
heap
|
page read and write
|
||
1EB5FFB1000
|
trusted library allocation
|
page read and write
|
||
1EB5B7EB000
|
trusted library allocation
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E849000
|
heap
|
page read and write
|
||
1EB57222000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB60188000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB57AA9000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5B53D000
|
trusted library allocation
|
page read and write
|
||
1EB5B5B1000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB4E886000
|
heap
|
page read and write
|
||
1EB59DE7000
|
trusted library allocation
|
page read and write
|
||
1EB5A2E3000
|
trusted library allocation
|
page read and write
|
||
1EB58E17000
|
trusted library allocation
|
page read and write
|
||
1EB4E872000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB617E8000
|
trusted library allocation
|
page read and write
|
||
1EB57E6A000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB62086000
|
trusted library allocation
|
page read and write
|
||
1EB62067000
|
trusted library allocation
|
page read and write
|
||
1EB5875D000
|
trusted library allocation
|
page read and write
|
||
1EB58E42000
|
trusted library allocation
|
page read and write
|
||
28E89E7E000
|
trusted library allocation
|
page read and write
|
||
1EB547DA000
|
trusted library allocation
|
page read and write
|
||
1EB63E33000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB57AF0000
|
trusted library allocation
|
page read and write
|
||
1EB60173000
|
trusted library allocation
|
page read and write
|
||
1EB6459E000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB5FCB5000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB587EE000
|
trusted library allocation
|
page read and write
|
||
1EB5B1E3000
|
trusted library allocation
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB4E840000
|
heap
|
page read and write
|
||
1EB5B4A7000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB6016B000
|
trusted library allocation
|
page read and write
|
||
1EB5B73D000
|
trusted library allocation
|
page read and write
|
||
2B391570000
|
trusted library allocation
|
page execute read
|
||
1EB5B589000
|
trusted library allocation
|
page read and write
|
||
1BE35C1C000
|
trusted library allocation
|
page read and write
|
||
1EB58CD0000
|
trusted library allocation
|
page read and write
|
||
1EB5B598000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB64730000
|
trusted library allocation
|
page read and write
|
||
1EB59DC2000
|
trusted library allocation
|
page read and write
|
||
1EB53882000
|
trusted library allocation
|
page read and write
|
||
1EB592C2000
|
trusted library allocation
|
page read and write
|
||
1EB5B536000
|
trusted library allocation
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB58B68000
|
trusted library allocation
|
page read and write
|
||
1EB57AA1000
|
trusted library allocation
|
page read and write
|
||
1EB620AC000
|
trusted library allocation
|
page read and write
|
||
1FA4E8B9000
|
trusted library allocation
|
page read and write
|
||
1EB54875000
|
trusted library allocation
|
page read and write
|
||
1EB637DD000
|
trusted library allocation
|
page read and write
|
||
1EB620A3000
|
trusted library allocation
|
page read and write
|
||
1EB57E63000
|
trusted library allocation
|
page read and write
|
||
F159F1C000
|
stack
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB57A43000
|
trusted library allocation
|
page read and write
|
||
1EB5FC48000
|
trusted library allocation
|
page read and write
|
||
1EB5B7E7000
|
trusted library allocation
|
page read and write
|
||
1EB58E48000
|
trusted library allocation
|
page read and write
|
||
1EB57A87000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB5B3F7000
|
trusted library allocation
|
page read and write
|
||
1EB5B5C2000
|
trusted library allocation
|
page read and write
|
||
1EB60069000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5FCD0000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB57E6F000
|
trusted library allocation
|
page read and write
|
||
1EB59C61000
|
trusted library allocation
|
page read and write
|
||
1EB5381E000
|
trusted library allocation
|
page read and write
|
||
1EB57781000
|
trusted library allocation
|
page read and write
|
||
1EB587C1000
|
trusted library allocation
|
page read and write
|
||
1EB58B59000
|
trusted library allocation
|
page read and write
|
||
1EB5AD78000
|
trusted library allocation
|
page read and write
|
||
1EB60188000
|
trusted library allocation
|
page read and write
|
||
1EB57AA1000
|
trusted library allocation
|
page read and write
|
||
1EB58BEE000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB57A9D000
|
trusted library allocation
|
page read and write
|
||
1EB5B0C9000
|
trusted library allocation
|
page read and write
|
||
1EB57E76000
|
trusted library allocation
|
page read and write
|
||
1EB587EE000
|
trusted library allocation
|
page read and write
|
||
1FA4E897000
|
trusted library allocation
|
page read and write
|
||
1EB57CC0000
|
trusted library allocation
|
page read and write
|
||
1EB5FEA0000
|
trusted library allocation
|
page read and write
|
||
1EB59DE5000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB57E87000
|
trusted library allocation
|
page read and write
|
||
1EB57A9D000
|
trusted library allocation
|
page read and write
|
||
1EB5ADF2000
|
trusted library allocation
|
page read and write
|
||
1EB60171000
|
trusted library allocation
|
page read and write
|
||
28E8A9E8000
|
heap
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB634C7000
|
trusted library allocation
|
page read and write
|
||
1EB58A65000
|
trusted library allocation
|
page read and write
|
||
1EB5FBB9000
|
trusted library allocation
|
page read and write
|
||
1EB57A35000
|
trusted library allocation
|
page read and write
|
||
1EB5B149000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB57E4D000
|
trusted library allocation
|
page read and write
|
||
1EB57ABC000
|
trusted library allocation
|
page read and write
|
||
1EB5B7E1000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
1EB6017F000
|
trusted library allocation
|
page read and write
|
||
1EB59C8C000
|
trusted library allocation
|
page read and write
|
||
235933B24000
|
trusted library allocation
|
page read and write
|
||
1EB5A19F000
|
trusted library allocation
|
page read and write
|
||
28E8A9E0000
|
heap
|
page read and write
|
||
1BE35C0C000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5FE99000
|
trusted library allocation
|
page read and write
|
||
1EB59751000
|
trusted library allocation
|
page read and write
|
||
1EB4E847000
|
heap
|
page read and write
|
||
1EB5B7EB000
|
trusted library allocation
|
page read and write
|
||
1EB58AA3000
|
trusted library allocation
|
page read and write
|
||
1EB60036000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1FA4E5C0000
|
unclassified section
|
page read and write
|
||
1BE35F00000
|
trusted library allocation
|
page read and write
|
||
1EB54AF6000
|
trusted library allocation
|
page read and write
|
||
1EB57ABC000
|
trusted library allocation
|
page read and write
|
||
204000
|
unkown
|
page readonly
|
||
1EB5B15E000
|
trusted library allocation
|
page read and write
|
||
1EB63CE7000
|
trusted library allocation
|
page read and write
|
||
1EB5FE8B000
|
trusted library allocation
|
page read and write
|
||
1EB6016F000
|
trusted library allocation
|
page read and write
|
||
1EB63F12000
|
heap
|
page read and write
|
||
1EB597F1000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB59DE0000
|
trusted library allocation
|
page read and write
|
||
1EB5921C000
|
trusted library allocation
|
page read and write
|
||
1EB5720F000
|
heap
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB62A80000
|
trusted library allocation
|
page read and write
|
||
1EB63D85000
|
heap
|
page read and write
|
||
1EB5FEF4000
|
trusted library allocation
|
page read and write
|
||
11FF000
|
heap
|
page read and write
|
||
1EB601D3000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB57E74000
|
trusted library allocation
|
page read and write
|
||
1EB5A2F1000
|
trusted library allocation
|
page read and write
|
||
1EB57A9D000
|
trusted library allocation
|
page read and write
|
||
1EB57AF5000
|
trusted library allocation
|
page read and write
|
||
1EB586F1000
|
trusted library allocation
|
page read and write
|
||
1EB5B3BC000
|
trusted library allocation
|
page read and write
|
||
1EB61FE5000
|
trusted library allocation
|
page read and write
|
||
1EB64814000
|
trusted library allocation
|
page read and write
|
||
139F32C7000
|
heap
|
page read and write
|
||
28E8A960000
|
heap
|
page read and write
|
||
1EB61D37000
|
trusted library allocation
|
page read and write
|
||
1EB5ACDB000
|
trusted library allocation
|
page read and write
|
||
1EB5B7C7000
|
trusted library allocation
|
page read and write
|
||
1EB57CE0000
|
trusted library allocation
|
page read and write
|
||
1EB5FEDC000
|
trusted library allocation
|
page read and write
|
||
16EDFFC000
|
stack
|
page read and write
|
||
1EB58A3B000
|
trusted library allocation
|
page read and write
|
||
1EB59BCD000
|
trusted library allocation
|
page read and write
|
||
1EB5B5A5000
|
trusted library allocation
|
page read and write
|
||
1EB5B3E8000
|
trusted library allocation
|
page read and write
|
||
1EB57AD3000
|
trusted library allocation
|
page read and write
|
||
28E8A97D000
|
heap
|
page read and write
|
||
1DCF000
|
stack
|
page read and write
|
||
1EB61F9E000
|
trusted library allocation
|
page read and write
|
||
1EB547EF000
|
trusted library allocation
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
F15A9D8000
|
stack
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB587C9000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB5B542000
|
trusted library allocation
|
page read and write
|
||
1EB4E833000
|
heap
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
1EB57EE6000
|
trusted library allocation
|
page read and write
|
||
1EB58AA3000
|
trusted library allocation
|
page read and write
|
||
1EB58FAC000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB54A8E000
|
trusted library allocation
|
page read and write
|
||
1EB6018D000
|
trusted library allocation
|
page read and write
|
||
1EB57AE9000
|
trusted library allocation
|
page read and write
|
||
1EB59DF0000
|
trusted library allocation
|
page read and write
|
||
1EB6012B000
|
trusted library allocation
|
page read and write
|
||
1EB58E80000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB64538000
|
trusted library allocation
|
page read and write
|
||
1EB57AD6000
|
trusted library allocation
|
page read and write
|
||
1FA4E810000
|
trusted library allocation
|
page read and write
|
||
1EB5AEDC000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB5FC46000
|
trusted library allocation
|
page read and write
|
||
1EB648A5000
|
trusted library allocation
|
page read and write
|
||
28E8AA6B000
|
heap
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB57778000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB5879D000
|
trusted library allocation
|
page read and write
|
||
1EB57AC8000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB60113000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB59CA3000
|
trusted library allocation
|
page read and write
|
||
1EB57E7F000
|
trusted library allocation
|
page read and write
|
||
1EB5B152000
|
trusted library allocation
|
page read and write
|
||
1EB57EB6000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB5FC80000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
82007D8000
|
stack
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
1EB59CA9000
|
trusted library allocation
|
page read and write
|
||
1EB61DED000
|
trusted library allocation
|
page read and write
|
||
1EB5A1DF000
|
trusted library allocation
|
page read and write
|
||
1EB600C3000
|
trusted library allocation
|
page read and write
|
||
1EB64832000
|
trusted library allocation
|
page read and write
|
||
1EB6485E000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB57CE6000
|
trusted library allocation
|
page read and write
|
||
1EB5B5B8000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB5FE37000
|
trusted library allocation
|
page read and write
|
||
1EB57C3E000
|
trusted library allocation
|
page read and write
|
||
1EB5A2DD000
|
trusted library allocation
|
page read and write
|
||
1EB6484A000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB60092000
|
trusted library allocation
|
page read and write
|
||
1EB577CB000
|
trusted library allocation
|
page read and write
|
||
1EB5B5E2000
|
trusted library allocation
|
page read and write
|
||
28E8AA6B000
|
heap
|
page read and write
|
||
1EB5877B000
|
trusted library allocation
|
page read and write
|
||
1EB5922C000
|
trusted library allocation
|
page read and write
|
||
201EDFF000
|
stack
|
page read and write
|
||
28E8AA58000
|
heap
|
page read and write
|
||
1EB587C9000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB4E878000
|
heap
|
page read and write
|
||
1EB57ADC000
|
trusted library allocation
|
page read and write
|
||
1EB5B305000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB57ABC000
|
trusted library allocation
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB5A23B000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB63CDB000
|
trusted library allocation
|
page read and write
|
||
1EB5B6E5000
|
trusted library allocation
|
page read and write
|
||
82020BE000
|
unkown
|
page readonly
|
||
1EB57400000
|
trusted library allocation
|
page read and write
|
||
1EB5B1BC000
|
trusted library allocation
|
page read and write
|
||
28E8A9E8000
|
heap
|
page read and write
|
||
262585804000
|
trusted library allocation
|
page read and write
|
||
28E89D30000
|
unclassified section
|
page read and write
|
||
1EB5B7CC000
|
trusted library allocation
|
page read and write
|
||
1EB63D86000
|
heap
|
page read and write
|
||
1EB5756A000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
28E8A960000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB617FB000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB5B62F000
|
trusted library allocation
|
page read and write
|
||
1EB57AD3000
|
trusted library allocation
|
page read and write
|
||
1EB548DD000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB5B7D9000
|
trusted library allocation
|
page read and write
|
||
139F1720000
|
heap
|
page read and write
|
||
1EB5B477000
|
trusted library allocation
|
page read and write
|
||
1EB5B52E000
|
trusted library allocation
|
page read and write
|
||
1EB58A8B000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
20215FE000
|
stack
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
820313E000
|
unkown
|
page readonly
|
||
1EB58E36000
|
trusted library allocation
|
page read and write
|
||
1EB5A0DE000
|
trusted library allocation
|
page read and write
|
||
1EB576D7000
|
trusted library allocation
|
page read and write
|
||
1EB5B1E3000
|
trusted library allocation
|
page read and write
|
||
1EB538A5000
|
trusted library allocation
|
page read and write
|
||
1EB57CE0000
|
trusted library allocation
|
page read and write
|
||
1EB5923D000
|
trusted library allocation
|
page read and write
|
||
1FA4E640000
|
unclassified section
|
page readonly
|
||
1EB600AE000
|
trusted library allocation
|
page read and write
|
||
1EB57E39000
|
trusted library allocation
|
page read and write
|
||
1BE35C63000
|
trusted library allocation
|
page read and write
|
||
1EB60140000
|
trusted library allocation
|
page read and write
|
||
1EB5977F000
|
trusted library allocation
|
page read and write
|
||
1EB57E33000
|
trusted library allocation
|
page read and write
|
||
1EB58657000
|
trusted library allocation
|
page read and write
|
||
1EB57CC0000
|
trusted library allocation
|
page read and write
|
||
1EB638AB000
|
trusted library allocation
|
page read and write
|
||
1FA4E420000
|
unclassified section
|
page readonly
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB5B431000
|
trusted library allocation
|
page read and write
|
||
1EB5FE56000
|
trusted library allocation
|
page read and write
|
||
1EB4E838000
|
heap
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1FA4E823000
|
trusted library allocation
|
page read and write
|
||
1EB63DDC000
|
heap
|
page read and write
|
||
1EB5B7E5000
|
trusted library allocation
|
page read and write
|
||
1EB5922C000
|
trusted library allocation
|
page read and write
|
||
1EB5FE9B000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1FA4E560000
|
heap
|
page read and write
|
||
1EB6016B000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB58E39000
|
trusted library allocation
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
1EB57E3C000
|
trusted library allocation
|
page read and write
|
||
1EB5B618000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
28E8AA3B000
|
heap
|
page read and write
|
||
1EB58C5E000
|
trusted library allocation
|
page read and write
|
||
1EB57299000
|
heap
|
page read and write
|
||
1EB634EA000
|
trusted library allocation
|
page read and write
|
||
1BE35880000
|
heap
|
page readonly
|
||
1EB59AB1000
|
trusted library allocation
|
page read and write
|
||
1EB54AC1000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB58DB3000
|
trusted library allocation
|
page read and write
|
||
1EB577BC000
|
trusted library allocation
|
page read and write
|
||
1EB57A2F000
|
trusted library allocation
|
page read and write
|
||
1EB58A74000
|
trusted library allocation
|
page read and write
|
||
1EB57AA1000
|
trusted library allocation
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
1EB59ACB000
|
trusted library allocation
|
page read and write
|
||
1EB638B5000
|
trusted library allocation
|
page read and write
|
||
1EB601EC000
|
trusted library allocation
|
page read and write
|
||
1EB58FB3000
|
trusted library allocation
|
page read and write
|
||
1EB57AE9000
|
trusted library allocation
|
page read and write
|
||
1EB58BAC000
|
trusted library allocation
|
page read and write
|
||
1EB58E36000
|
trusted library allocation
|
page read and write
|
||
1EB58C9E000
|
trusted library allocation
|
page read and write
|
||
1EB5A18F000
|
trusted library allocation
|
page read and write
|
||
1EB57CBE000
|
trusted library allocation
|
page read and write
|
||
1EB63B4E000
|
trusted library allocation
|
page read and write
|
||
1EB5B7E1000
|
trusted library allocation
|
page read and write
|
||
1EB577B0000
|
trusted library allocation
|
page read and write
|
||
1EB57AF5000
|
trusted library allocation
|
page read and write
|
||
1EB58DCF000
|
trusted library allocation
|
page read and write
|
||
1EB63BF9000
|
trusted library allocation
|
page read and write
|
||
1EB59ACB000
|
trusted library allocation
|
page read and write
|
||
1EB57E63000
|
trusted library allocation
|
page read and write
|
||
1EB57CBE000
|
trusted library allocation
|
page read and write
|
||
1EB58A38000
|
trusted library allocation
|
page read and write
|
||
1FA4E82E000
|
trusted library allocation
|
page read and write
|
||
1EB6483B000
|
trusted library allocation
|
page read and write
|
||
1EB592E4000
|
trusted library allocation
|
page read and write
|
||
1EB4E85D000
|
heap
|
page read and write
|
||
1EB64840000
|
trusted library allocation
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB577FD000
|
trusted library allocation
|
page read and write
|
||
1EB58A85000
|
trusted library allocation
|
page read and write
|
||
1EB5977F000
|
trusted library allocation
|
page read and write
|
||
1EB531F9000
|
trusted library allocation
|
page read and write
|
||
1EB58BC9000
|
trusted library allocation
|
page read and write
|
||
1EB5A1C7000
|
trusted library allocation
|
page read and write
|
||
1EB637DD000
|
trusted library allocation
|
page read and write
|
||
1EB5FC46000
|
trusted library allocation
|
page read and write
|
||
1EB58BFA000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB601E8000
|
trusted library allocation
|
page read and write
|
||
1EB57AD6000
|
trusted library allocation
|
page read and write
|
||
1EB5FEDF000
|
trusted library allocation
|
page read and write
|
||
139F3440000
|
heap
|
page read and write
|
||
1FA4E8C8000
|
trusted library allocation
|
page read and write
|
||
2589FD8000
|
stack
|
page read and write
|
||
1EB57EB6000
|
trusted library allocation
|
page read and write
|
||
1EB4E866000
|
heap
|
page read and write
|
||
1EB57A58000
|
trusted library allocation
|
page read and write
|
||
28E8A420000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB597B7000
|
trusted library allocation
|
page read and write
|
||
1EB5B4CF000
|
trusted library allocation
|
page read and write
|
||
1EB4E8C3000
|
heap
|
page read and write
|
||
1CC000
|
unkown
|
page readonly
|
||
1EB63C46000
|
trusted library allocation
|
page read and write
|
||
1EB57AC2000
|
trusted library allocation
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
1EB6016F000
|
trusted library allocation
|
page read and write
|
||
258C8BE000
|
stack
|
page read and write
|
||
1EB57ACF000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB57663000
|
trusted library allocation
|
page read and write
|
||
1EB4E889000
|
heap
|
page read and write
|
||
1EB57CBE000
|
trusted library allocation
|
page read and write
|
||
1EB5B1BC000
|
trusted library allocation
|
page read and write
|
||
1EB57222000
|
heap
|
page read and write
|
||
1EB5B0FD000
|
trusted library allocation
|
page read and write
|
||
1EB58BEE000
|
trusted library allocation
|
page read and write
|
||
1EB58DCC000
|
trusted library allocation
|
page read and write
|
||
1EB58CFB000
|
trusted library allocation
|
page read and write
|
||
1BE35CF6000
|
trusted library allocation
|
page read and write
|
||
1EB5FB7D000
|
trusted library allocation
|
page read and write
|
||
1EB5720F000
|
heap
|
page read and write
|
||
1EB648AB000
|
trusted library allocation
|
page read and write
|
||
1EB59788000
|
trusted library allocation
|
page read and write
|
||
1EB57E76000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB5FBD8000
|
trusted library allocation
|
page read and write
|
||
1EB5B1AB000
|
trusted library allocation
|
page read and write
|
||
1EB600CC000
|
trusted library allocation
|
page read and write
|
||
1EB60184000
|
trusted library allocation
|
page read and write
|
||
1EB4E87A000
|
heap
|
page read and write
|
||
1EB56ECA000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB58AEB000
|
trusted library allocation
|
page read and write
|
||
1EB57A5D000
|
trusted library allocation
|
page read and write
|
||
1EB57ACF000
|
trusted library allocation
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB5B4DD000
|
trusted library allocation
|
page read and write
|
||
1EB62041000
|
trusted library allocation
|
page read and write
|
||
1EB57ECC000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB577C1000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB634C7000
|
trusted library allocation
|
page read and write
|
||
1EB5B79B000
|
trusted library allocation
|
page read and write
|
||
1EB5472A000
|
trusted library allocation
|
page read and write
|
||
8201FFE000
|
unkown
|
page readonly
|
||
1EB5778E000
|
trusted library allocation
|
page read and write
|
||
1EB57A89000
|
trusted library allocation
|
page read and write
|
||
1EB5B1E3000
|
trusted library allocation
|
page read and write
|
||
1EB58F83000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB57A73000
|
trusted library allocation
|
page read and write
|
||
1EB61D95000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB58A7A000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB5ADEA000
|
trusted library allocation
|
page read and write
|
||
1EB57790000
|
trusted library allocation
|
page read and write
|
||
1EB4E849000
|
heap
|
page read and write
|
||
1EB5AD7D000
|
trusted library allocation
|
page read and write
|
||
1EB59766000
|
trusted library allocation
|
page read and write
|
||
1EB54A99000
|
trusted library allocation
|
page read and write
|
||
1EB634BF000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB5FC93000
|
trusted library allocation
|
page read and write
|
||
1EB4E8B2000
|
heap
|
page read and write
|
||
28E89DFC000
|
unkown
|
page execute read
|
||
1EB597B7000
|
trusted library allocation
|
page read and write
|
||
1EB58B7C000
|
trusted library allocation
|
page read and write
|
||
1EB54ADD000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB6013A000
|
trusted library allocation
|
page read and write
|
||
1BE35740000
|
unclassified section
|
page readonly
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1BE3589A000
|
heap
|
page read and write
|
||
1EB5B5B8000
|
trusted library allocation
|
page read and write
|
||
1EB58A6B000
|
trusted library allocation
|
page read and write
|
||
1D036A50000
|
heap
|
page read and write
|
||
1EB64806000
|
trusted library allocation
|
page read and write
|
||
1EB58A65000
|
trusted library allocation
|
page read and write
|
||
1EB531BF000
|
trusted library allocation
|
page read and write
|
||
1EB61DE3000
|
trusted library allocation
|
page read and write
|
||
1FA4E883000
|
trusted library allocation
|
page read and write
|
||
1EB57CF0000
|
trusted library allocation
|
page read and write
|
||
1EB6204D000
|
trusted library allocation
|
page read and write
|
||
1EB5B7D1000
|
trusted library allocation
|
page read and write
|
||
1EB57C9A000
|
trusted library allocation
|
page read and write
|
||
1EB5FC99000
|
trusted library allocation
|
page read and write
|
||
1EB638FB000
|
trusted library allocation
|
page read and write
|
||
1EB648D2000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB5FE8D000
|
trusted library allocation
|
page read and write
|
||
1EB4E886000
|
heap
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1EB58BC5000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB61F2F000
|
trusted library allocation
|
page read and write
|
||
1EB58AC9000
|
trusted library allocation
|
page read and write
|
||
1EB4E843000
|
heap
|
page read and write
|
||
1EB58BA7000
|
trusted library allocation
|
page read and write
|
||
1EB58B82000
|
trusted library allocation
|
page read and write
|
||
1EB577CE000
|
trusted library allocation
|
page read and write
|
||
1EB5B1D4000
|
trusted library allocation
|
page read and write
|
||
1EB5FC48000
|
trusted library allocation
|
page read and write
|
||
1EB5B5CB000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB576A1000
|
trusted library allocation
|
page read and write
|
||
1EB58BA9000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB5B1DC000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB58A9F000
|
trusted library allocation
|
page read and write
|
||
1EB5B128000
|
trusted library allocation
|
page read and write
|
||
1EB59A9E000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB4E8AC000
|
heap
|
page read and write
|
||
1EB5777A000
|
trusted library allocation
|
page read and write
|
||
1EB5B0E3000
|
trusted library allocation
|
page read and write
|
||
1EB57A60000
|
trusted library allocation
|
page read and write
|
||
1EB58CE9000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB5B447000
|
trusted library allocation
|
page read and write
|
||
1EB60173000
|
trusted library allocation
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
1EB57E33000
|
trusted library allocation
|
page read and write
|
||
1EB5B5A1000
|
trusted library allocation
|
page read and write
|
||
1BE35C30000
|
trusted library allocation
|
page read and write
|
||
2B3915F1000
|
trusted library allocation
|
page execute read
|
||
1EB4E866000
|
heap
|
page read and write
|
||
1EB61DEA000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB5B71F000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
258E0FE000
|
stack
|
page read and write
|
||
28E8A9F0000
|
heap
|
page read and write
|
||
1EB58CF4000
|
trusted library allocation
|
page read and write
|
||
1EB58FD2000
|
trusted library allocation
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB56ECA000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB58B5F000
|
trusted library allocation
|
page read and write
|
||
1EB58AA9000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5A053000
|
trusted library allocation
|
page read and write
|
||
1EB56F87000
|
trusted library allocation
|
page read and write
|
||
1EB57277000
|
heap
|
page read and write
|
||
1EB57CE6000
|
trusted library allocation
|
page read and write
|
||
1BE35C5D000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB5FE7E000
|
trusted library allocation
|
page read and write
|
||
1EB57271000
|
heap
|
page read and write
|
||
1EB60156000
|
trusted library allocation
|
page read and write
|
||
139F1850000
|
heap
|
page read and write
|
||
1EB60129000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB576A1000
|
trusted library allocation
|
page read and write
|
||
1EB5A21D000
|
trusted library allocation
|
page read and write
|
||
1FC000
|
unkown
|
page read and write
|
||
1EB62086000
|
trusted library allocation
|
page read and write
|
||
1EB617E8000
|
trusted library allocation
|
page read and write
|
||
1EB54ABE000
|
trusted library allocation
|
page read and write
|
||
1EB58BEC000
|
trusted library allocation
|
page read and write
|
||
1EB57A69000
|
trusted library allocation
|
page read and write
|
||
1EB64B1C000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB5A069000
|
trusted library allocation
|
page read and write
|
||
1EB6017B000
|
trusted library allocation
|
page read and write
|
||
1BE35CA2000
|
trusted library allocation
|
page read and write
|
||
1EB60173000
|
trusted library allocation
|
page read and write
|
||
1EB5B1AB000
|
trusted library allocation
|
page read and write
|
||
1BE35C8F000
|
trusted library allocation
|
page read and write
|
||
1EB6014E000
|
trusted library allocation
|
page read and write
|
||
1EB4E866000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB634D1000
|
trusted library allocation
|
page read and write
|
||
39A1000
|
heap
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB57793000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB63C9F000
|
trusted library allocation
|
page read and write
|
||
1EB587C6000
|
trusted library allocation
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB587D6000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB60188000
|
trusted library allocation
|
page read and write
|
||
1EB57589000
|
trusted library allocation
|
page read and write
|
||
1EB63B91000
|
trusted library allocation
|
page read and write
|
||
1EB64867000
|
trusted library allocation
|
page read and write
|
||
1EB57CC0000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB58794000
|
trusted library allocation
|
page read and write
|
||
1EB5875B000
|
trusted library allocation
|
page read and write
|
||
1EB57E37000
|
trusted library allocation
|
page read and write
|
||
1EB531EF000
|
trusted library allocation
|
page read and write
|
||
1EB64716000
|
trusted library allocation
|
page read and write
|
||
1EB587CD000
|
trusted library allocation
|
page read and write
|
||
1EB57EB6000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB5B166000
|
trusted library allocation
|
page read and write
|
||
139F1A0A000
|
trusted library allocation
|
page read and write
|
||
1EB571FD000
|
heap
|
page read and write
|
||
1EB57C93000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB59BA5000
|
trusted library allocation
|
page read and write
|
||
1EB58C66000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
28E89E68000
|
trusted library allocation
|
page read and write
|
||
1FA4E5F0000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57A98000
|
trusted library allocation
|
page read and write
|
||
1EB57E93000
|
trusted library allocation
|
page read and write
|
||
1EB538B0000
|
trusted library allocation
|
page read and write
|
||
1EB538DF000
|
trusted library allocation
|
page read and write
|
||
1EB64898000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB64732000
|
trusted library allocation
|
page read and write
|
||
1EB637D6000
|
trusted library allocation
|
page read and write
|
||
1EB57CE6000
|
trusted library allocation
|
page read and write
|
||
1EB63C2F000
|
trusted library allocation
|
page read and write
|
||
1EB57270000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB61D16000
|
trusted library allocation
|
page read and write
|
||
1EB5A129000
|
trusted library allocation
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB5FB85000
|
trusted library allocation
|
page read and write
|
||
1EB63D51000
|
heap
|
page read and write
|
||
1EB58A9A000
|
trusted library allocation
|
page read and write
|
||
1EB5962A000
|
trusted library allocation
|
page read and write
|
||
1EB57AF0000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB59CC2000
|
trusted library allocation
|
page read and write
|
||
1EB58AC9000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E843000
|
heap
|
page read and write
|
||
28E8A960000
|
heap
|
page read and write
|
||
1EB57CE0000
|
trusted library allocation
|
page read and write
|
||
1EB58BA4000
|
trusted library allocation
|
page read and write
|
||
1EB58A6D000
|
trusted library allocation
|
page read and write
|
||
1EB57CE0000
|
trusted library allocation
|
page read and write
|
||
1EB53184000
|
trusted library allocation
|
page read and write
|
||
1EB60109000
|
trusted library allocation
|
page read and write
|
||
1EB5B5BF000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB5FED6000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
28E8A9FD000
|
heap
|
page read and write
|
||
1EB57E63000
|
trusted library allocation
|
page read and write
|
||
1EB5777D000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB54A20000
|
trusted library allocation
|
page read and write
|
||
1EB58B2E000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57E5B000
|
trusted library allocation
|
page read and write
|
||
1EB4E876000
|
heap
|
page read and write
|
||
28E8A9A8000
|
heap
|
page read and write
|
||
28E89910000
|
unclassified section
|
page readonly
|
||
1EB587FD000
|
trusted library allocation
|
page read and write
|
||
1EB59AEE000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB634C7000
|
trusted library allocation
|
page read and write
|
||
1EB58CF0000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB5876B000
|
trusted library allocation
|
page read and write
|
||
1EB5779B000
|
trusted library allocation
|
page read and write
|
||
1EB59DF0000
|
trusted library allocation
|
page read and write
|
||
1EB6175C000
|
trusted library allocation
|
page read and write
|
||
1EB6017D000
|
trusted library allocation
|
page read and write
|
||
1EB63CDB000
|
trusted library allocation
|
page read and write
|
||
1EB5922C000
|
trusted library allocation
|
page read and write
|
||
1EB61F86000
|
trusted library allocation
|
page read and write
|
||
1EB59484000
|
trusted library allocation
|
page read and write
|
||
1EB58D53000
|
trusted library allocation
|
page read and write
|
||
28E8AA44000
|
heap
|
page read and write
|
||
1EB5B164000
|
trusted library allocation
|
page read and write
|
||
1EB61FC8000
|
trusted library allocation
|
page read and write
|
||
1EB59DF7000
|
trusted library allocation
|
page read and write
|
||
1EB59B8C000
|
trusted library allocation
|
page read and write
|
||
1EB57A97000
|
trusted library allocation
|
page read and write
|
||
1EB58BF6000
|
trusted library allocation
|
page read and write
|
||
28E8A9F0000
|
heap
|
page read and write
|
||
1EB5B1A5000
|
trusted library allocation
|
page read and write
|
||
1EB57CBC000
|
trusted library allocation
|
page read and write
|
||
1EB57E9B000
|
trusted library allocation
|
page read and write
|
||
1EB58BA5000
|
trusted library allocation
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB58FBC000
|
trusted library allocation
|
page read and write
|
||
1EB634A9000
|
trusted library allocation
|
page read and write
|
||
1EB634F6000
|
trusted library allocation
|
page read and write
|
||
1FA4E937000
|
trusted library allocation
|
page read and write
|
||
1EB586F1000
|
trusted library allocation
|
page read and write
|
||
1EB58BC9000
|
trusted library allocation
|
page read and write
|
||
1EB59C4D000
|
trusted library allocation
|
page read and write
|
||
1EB6011E000
|
trusted library allocation
|
page read and write
|
||
1FA4E85B000
|
trusted library allocation
|
page read and write
|
||
1BE35C72000
|
trusted library allocation
|
page read and write
|
||
1EB64847000
|
trusted library allocation
|
page read and write
|
||
F15B9FE000
|
stack
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
28E8AA22000
|
heap
|
page read and write
|
||
1EB63B54000
|
trusted library allocation
|
page read and write
|
||
1EB6010F000
|
trusted library allocation
|
page read and write
|
||
1EB592C1000
|
trusted library allocation
|
page read and write
|
||
1EB5B7E7000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB4E83A000
|
heap
|
page read and write
|
||
1EB56E72000
|
trusted library allocation
|
page read and write
|
||
1EB587B5000
|
trusted library allocation
|
page read and write
|
||
1EB5B3B9000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB638D4000
|
trusted library allocation
|
page read and write
|
||
139F32D6000
|
heap
|
page read and write
|
||
1EB601E8000
|
trusted library allocation
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB63CCC000
|
trusted library allocation
|
page read and write
|
||
1EB5B5C2000
|
trusted library allocation
|
page read and write
|
||
1EB60069000
|
trusted library allocation
|
page read and write
|
||
204000
|
unkown
|
page readonly
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB5B7C3000
|
trusted library allocation
|
page read and write
|
||
1EB57C44000
|
trusted library allocation
|
page read and write
|
||
1EB57284000
|
heap
|
page read and write
|
||
1EB576A1000
|
trusted library allocation
|
page read and write
|
||
1EB59B93000
|
trusted library allocation
|
page read and write
|
||
1FA4E803000
|
trusted library allocation
|
page read and write
|
||
1EB57663000
|
trusted library allocation
|
page read and write
|
||
1EB58CA1000
|
trusted library allocation
|
page read and write
|
||
1EB58E12000
|
trusted library allocation
|
page read and write
|
||
1EB58A24000
|
trusted library allocation
|
page read and write
|
||
820413E000
|
unkown
|
page readonly
|
||
1FA4E847000
|
trusted library allocation
|
page read and write
|
||
1EB60064000
|
trusted library allocation
|
page read and write
|
||
1EB5AC6B000
|
trusted library allocation
|
page read and write
|
||
1EB58A74000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB538F0000
|
trusted library allocation
|
page read and write
|
||
1EB57AA9000
|
trusted library allocation
|
page read and write
|
||
1EB5B0B8000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
stack
|
page read and write
|
||
1EB56FFB000
|
trusted library allocation
|
page read and write
|
||
28E8A909000
|
heap
|
page read and write
|
||
1EB56E39000
|
trusted library allocation
|
page read and write
|
||
1EB5A2D0000
|
trusted library allocation
|
page read and write
|
||
F159F9E000
|
stack
|
page read and write
|
||
1EB5FC3C000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB576D7000
|
trusted library allocation
|
page read and write
|
||
1EB5B3FE000
|
trusted library allocation
|
page read and write
|
||
1EB592C2000
|
trusted library allocation
|
page read and write
|
||
1EB5925E000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB58BE2000
|
trusted library allocation
|
page read and write
|
||
1EB57C6A000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB5B310000
|
trusted library allocation
|
page read and write
|
||
1EB59775000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5B1AF000
|
trusted library allocation
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1D036A30000
|
heap
|
page read and write
|
||
1EB63CF6000
|
trusted library allocation
|
page read and write
|
||
28E8A9E9000
|
heap
|
page read and write
|
||
1EB63C5A000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB5B130000
|
trusted library allocation
|
page read and write
|
||
1EB648C6000
|
trusted library allocation
|
page read and write
|
||
1EB5389F000
|
trusted library allocation
|
page read and write
|
||
1EB620A3000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB5389F000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB61DE3000
|
trusted library allocation
|
page read and write
|
||
1BE35C5F000
|
trusted library allocation
|
page read and write
|
||
1EB62C00000
|
trusted library allocation
|
page read and write
|
||
1EB57E85000
|
trusted library allocation
|
page read and write
|
||
1EB58D13000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB58A9F000
|
trusted library allocation
|
page read and write
|
||
1EB58A85000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB58B8C000
|
trusted library allocation
|
page read and write
|
||
1EB5922C000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB58DCF000
|
trusted library allocation
|
page read and write
|
||
28E8A9FD000
|
heap
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB54ABE000
|
trusted library allocation
|
page read and write
|
||
1EB5B621000
|
trusted library allocation
|
page read and write
|
||
1EB5B484000
|
trusted library allocation
|
page read and write
|
||
1EB5B73B000
|
trusted library allocation
|
page read and write
|
||
1EB62007000
|
trusted library allocation
|
page read and write
|
||
1EB5B7E1000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E842000
|
heap
|
page read and write
|
||
1EB60188000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
28E8AA2A000
|
heap
|
page read and write
|
||
1EB648CA000
|
trusted library allocation
|
page read and write
|
||
1EB57E67000
|
trusted library allocation
|
page read and write
|
||
1EB5B3FE000
|
trusted library allocation
|
page read and write
|
||
1EB4E86C000
|
heap
|
page read and write
|
||
1D036900000
|
heap
|
page read and write
|
||
1EB58B9F000
|
trusted library allocation
|
page read and write
|
||
1EB57E6F000
|
trusted library allocation
|
page read and write
|
||
1EB5AD29000
|
trusted library allocation
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB6017D000
|
trusted library allocation
|
page read and write
|
||
1EB4E841000
|
heap
|
page read and write
|
||
28E8A9B9000
|
heap
|
page read and write
|
||
1EB5FEAD000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E86D000
|
heap
|
page read and write
|
||
1EB57291000
|
heap
|
page read and write
|
||
1FA4E60A000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB60140000
|
trusted library allocation
|
page read and write
|
||
1EB57E33000
|
trusted library allocation
|
page read and write
|
||
1EB5FED5000
|
trusted library allocation
|
page read and write
|
||
1EB5B7EF000
|
trusted library allocation
|
page read and write
|
||
1EB4E880000
|
heap
|
page read and write
|
||
1EB57EDE000
|
trusted library allocation
|
page read and write
|
||
1EB5B711000
|
trusted library allocation
|
page read and write
|
||
28E8A9E6000
|
heap
|
page read and write
|
||
1EB5B5E2000
|
trusted library allocation
|
page read and write
|
||
1EB5A219000
|
trusted library allocation
|
page read and write
|
||
1EB64812000
|
trusted library allocation
|
page read and write
|
||
1EB58FD8000
|
trusted library allocation
|
page read and write
|
||
1EB58BF5000
|
trusted library allocation
|
page read and write
|
||
1EB4E838000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E866000
|
heap
|
page read and write
|
||
1EB5B146000
|
trusted library allocation
|
page read and write
|
||
1BE35C24000
|
trusted library allocation
|
page read and write
|
||
1EB58BB1000
|
trusted library allocation
|
page read and write
|
||
1EB60129000
|
trusted library allocation
|
page read and write
|
||
1EB5ACD1000
|
trusted library allocation
|
page read and write
|
||
1EB538F0000
|
trusted library allocation
|
page read and write
|
||
28E89D40000
|
trusted library allocation
|
page read and write
|
||
1EB5B3BC000
|
trusted library allocation
|
page read and write
|
||
1EB63BF7000
|
trusted library allocation
|
page read and write
|
||
28E89C00000
|
heap
|
page read and write
|
||
1EB58F9B000
|
trusted library allocation
|
page read and write
|
||
1EB60084000
|
trusted library allocation
|
page read and write
|
||
820293E000
|
stack
|
page read and write
|
||
1EB58AC5000
|
trusted library allocation
|
page read and write
|
||
1EB6212C000
|
trusted library allocation
|
page read and write
|
||
1EB58BC5000
|
trusted library allocation
|
page read and write
|
||
1EB576D7000
|
trusted library allocation
|
page read and write
|
||
F15D27E000
|
unkown
|
page readonly
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB575D2000
|
trusted library allocation
|
page read and write
|
||
1EB4E87D000
|
heap
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB57793000
|
trusted library allocation
|
page read and write
|
||
1EB4E872000
|
heap
|
page read and write
|
||
1EB5B4F6000
|
trusted library allocation
|
page read and write
|
||
1EB59E00000
|
trusted library allocation
|
page read and write
|
||
1EB58755000
|
trusted library allocation
|
page read and write
|
||
1EB58AA9000
|
trusted library allocation
|
page read and write
|
||
28E8A9E1000
|
heap
|
page read and write
|
||
1EB5B707000
|
trusted library allocation
|
page read and write
|
||
1EB592C9000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB5B7A1000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB5B72E000
|
trusted library allocation
|
page read and write
|
||
28E8A964000
|
heap
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5B5F7000
|
trusted library allocation
|
page read and write
|
||
1EB5AD24000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB58ABB000
|
trusted library allocation
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB57A87000
|
trusted library allocation
|
page read and write
|
||
1EB57680000
|
trusted library allocation
|
page read and write
|
||
1EB57205000
|
heap
|
page read and write
|
||
1EB5B5FB000
|
trusted library allocation
|
page read and write
|
||
1EB5B0E1000
|
trusted library allocation
|
page read and write
|
||
1EB59B6D000
|
trusted library allocation
|
page read and write
|
||
1EB61DD7000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57EC8000
|
trusted library allocation
|
page read and write
|
||
1EB5472A000
|
trusted library allocation
|
page read and write
|
||
1EB5B5BF000
|
trusted library allocation
|
page read and write
|
||
28E8A969000
|
heap
|
page read and write
|
||
1EB58B62000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
1EB5B5B8000
|
trusted library allocation
|
page read and write
|
||
1EB5A1AF000
|
trusted library allocation
|
page read and write
|
||
1EB648E0000
|
trusted library allocation
|
page read and write
|
||
1EB57A61000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB587FD000
|
trusted library allocation
|
page read and write
|
||
1EB62043000
|
trusted library allocation
|
page read and write
|
||
1EB531C7000
|
trusted library allocation
|
page read and write
|
||
1EB4E878000
|
heap
|
page read and write
|
||
1EB60092000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1D036C07000
|
trusted library allocation
|
page read and write
|
||
1EB4E83C000
|
heap
|
page read and write
|
||
1EB5FBD3000
|
trusted library allocation
|
page read and write
|
||
28E8A95C000
|
heap
|
page read and write
|
||
1FA4E5F4000
|
heap
|
page read and write
|
||
1EB57222000
|
heap
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB5B7B8000
|
trusted library allocation
|
page read and write
|
||
1EB57277000
|
heap
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB63B88000
|
trusted library allocation
|
page read and write
|
||
1EB57ECE000
|
trusted library allocation
|
page read and write
|
||
1EB5FCF5000
|
trusted library allocation
|
page read and write
|
||
1EB58739000
|
trusted library allocation
|
page read and write
|
||
1EB634F9000
|
trusted library allocation
|
page read and write
|
||
1EB597F7000
|
trusted library allocation
|
page read and write
|
||
1EB63BB4000
|
trusted library allocation
|
page read and write
|
||
1EB58FCC000
|
trusted library allocation
|
page read and write
|
||
1EB5FFB1000
|
trusted library allocation
|
page read and write
|
||
1EB538FE000
|
trusted library allocation
|
page read and write
|
||
1EB58DF9000
|
trusted library allocation
|
page read and write
|
||
1EB531DF000
|
trusted library allocation
|
page read and write
|
||
1EB547B0000
|
trusted library allocation
|
page read and write
|
||
1EB5979E000
|
trusted library allocation
|
page read and write
|
||
1EB57E63000
|
trusted library allocation
|
page read and write
|
||
1EB57CBE000
|
trusted library allocation
|
page read and write
|
||
1EB4E869000
|
heap
|
page read and write
|
||
1EB538E4000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB5B742000
|
trusted library allocation
|
page read and write
|
||
28E89E84000
|
trusted library allocation
|
page read and write
|
||
1EB4E847000
|
heap
|
page read and write
|
||
1EB61F84000
|
trusted library allocation
|
page read and write
|
||
28E8AA58000
|
heap
|
page read and write
|
||
1EB4E835000
|
heap
|
page read and write
|
||
1EB58E48000
|
trusted library allocation
|
page read and write
|
||
1EB5FC4F000
|
trusted library allocation
|
page read and write
|
||
1EB5ADA5000
|
trusted library allocation
|
page read and write
|
||
28E8AA77000
|
heap
|
page read and write
|
||
1EB548AC000
|
trusted library allocation
|
page read and write
|
||
1EB638BF000
|
trusted library allocation
|
page read and write
|
||
1EB59BCD000
|
trusted library allocation
|
page read and write
|
||
28E8AA3B000
|
heap
|
page read and write
|
||
1EB57CC0000
|
trusted library allocation
|
page read and write
|
||
1EB5727C000
|
heap
|
page read and write
|
||
28E8A95F000
|
heap
|
page read and write
|
||
1EB57CBC000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB63B67000
|
trusted library allocation
|
page read and write
|
||
1EB57E4D000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E836000
|
heap
|
page read and write
|
||
1EB6206D000
|
trusted library allocation
|
page read and write
|
||
1EB634B4000
|
trusted library allocation
|
page read and write
|
||
258D0FE000
|
stack
|
page read and write
|
||
1BE35830000
|
heap
|
page read and write
|
||
1EB61749000
|
trusted library allocation
|
page read and write
|
||
1EB5AD63000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB57C13000
|
trusted library allocation
|
page read and write
|
||
1EB57AE6000
|
trusted library allocation
|
page read and write
|
||
1EB5B5AF000
|
trusted library allocation
|
page read and write
|
||
1EB59265000
|
trusted library allocation
|
page read and write
|
||
1EB57C7B000
|
trusted library allocation
|
page read and write
|
||
1EB57ABC000
|
trusted library allocation
|
page read and write
|
||
1EB5A212000
|
trusted library allocation
|
page read and write
|
||
1EB575ED000
|
trusted library allocation
|
page read and write
|
||
28E8AA58000
|
heap
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
1EB57E87000
|
trusted library allocation
|
page read and write
|
||
1EB58BA7000
|
trusted library allocation
|
page read and write
|
||
1EB5A2E8000
|
trusted library allocation
|
page read and write
|
||
1EB60028000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB58BA7000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB58AEA000
|
trusted library allocation
|
page read and write
|
||
1EB548A1000
|
trusted library allocation
|
page read and write
|
||
1EB58C5E000
|
trusted library allocation
|
page read and write
|
||
1EB58BAB000
|
trusted library allocation
|
page read and write
|
||
1EB637F5000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB587C4000
|
trusted library allocation
|
page read and write
|
||
1EB60182000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB5B0E1000
|
trusted library allocation
|
page read and write
|
||
1EB58FCC000
|
trusted library allocation
|
page read and write
|
||
1EB575EF000
|
trusted library allocation
|
page read and write
|
||
1EB601C8000
|
trusted library allocation
|
page read and write
|
||
1EB58AB0000
|
trusted library allocation
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB57E87000
|
trusted library allocation
|
page read and write
|
||
1EB59231000
|
trusted library allocation
|
page read and write
|
||
1EB4E886000
|
heap
|
page read and write
|
||
1EB58A7F000
|
trusted library allocation
|
page read and write
|
||
28E89EF3000
|
trusted library allocation
|
page read and write
|
||
1EB531C3000
|
trusted library allocation
|
page read and write
|
||
1EB56EF6000
|
trusted library allocation
|
page read and write
|
||
11F3000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
28E8AA44000
|
heap
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
1EB638D4000
|
trusted library allocation
|
page read and write
|
||
1EB5B3F7000
|
trusted library allocation
|
page read and write
|
||
1EB57AC8000
|
trusted library allocation
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
1EB57AF0000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB5B5B8000
|
trusted library allocation
|
page read and write
|
||
1EB58CA0000
|
trusted library allocation
|
page read and write
|
||
1EB4E84C000
|
heap
|
page read and write
|
||
1EB597E9000
|
trusted library allocation
|
page read and write
|
||
1EB601EC000
|
trusted library allocation
|
page read and write
|
||
1EB59B8C000
|
trusted library allocation
|
page read and write
|
||
1EB59A85000
|
trusted library allocation
|
page read and write
|
||
1EB5A17E000
|
trusted library allocation
|
page read and write
|
||
1EB54A86000
|
trusted library allocation
|
page read and write
|
||
1EB62005000
|
trusted library allocation
|
page read and write
|
||
1EB538E1000
|
trusted library allocation
|
page read and write
|
||
1BE35CF2000
|
trusted library allocation
|
page read and write
|
||
1EB58E80000
|
trusted library allocation
|
page read and write
|
||
1EB59AD2000
|
trusted library allocation
|
page read and write
|
||
1EB592C9000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB61502000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB58788000
|
trusted library allocation
|
page read and write
|
||
1EB5867B000
|
trusted library allocation
|
page read and write
|
||
28E8AA44000
|
heap
|
page read and write
|
||
1EB4E863000
|
heap
|
page read and write
|
||
1EB58ACA000
|
trusted library allocation
|
page read and write
|
||
1EB54724000
|
trusted library allocation
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB648D0000
|
trusted library allocation
|
page read and write
|
||
1EB5B78C000
|
trusted library allocation
|
page read and write
|
||
1EB5B1DE000
|
trusted library allocation
|
page read and write
|
||
1EB5B7A8000
|
trusted library allocation
|
page read and write
|
||
1EB57E26000
|
trusted library allocation
|
page read and write
|
||
28E89E74000
|
trusted library allocation
|
page read and write
|
||
1EB57A87000
|
trusted library allocation
|
page read and write
|
||
1EB61F87000
|
trusted library allocation
|
page read and write
|
||
1EB5FC80000
|
trusted library allocation
|
page read and write
|
||
1EB592BD000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1FA4E866000
|
trusted library allocation
|
page read and write
|
||
1EB59231000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB5B7CA000
|
trusted library allocation
|
page read and write
|
||
1EB5A1CD000
|
trusted library allocation
|
page read and write
|
||
1EB4E863000
|
heap
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB61DBD000
|
trusted library allocation
|
page read and write
|
||
1EB57AE5000
|
trusted library allocation
|
page read and write
|
||
1EB547EF000
|
trusted library allocation
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
258D8FE000
|
unkown
|
page readonly
|
||
1EB638FD000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB5A187000
|
trusted library allocation
|
page read and write
|
||
1EB57A56000
|
trusted library allocation
|
page read and write
|
||
1EB634D3000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB58BD8000
|
trusted library allocation
|
page read and write
|
||
1EB60088000
|
trusted library allocation
|
page read and write
|
||
1EB63CF6000
|
trusted library allocation
|
page read and write
|
||
1EB5B735000
|
trusted library allocation
|
page read and write
|
||
1EB592F1000
|
trusted library allocation
|
page read and write
|
||
1EB5B438000
|
trusted library allocation
|
page read and write
|
||
1EB5FCFB000
|
trusted library allocation
|
page read and write
|
||
1EB5B740000
|
trusted library allocation
|
page read and write
|
||
1EB577B4000
|
trusted library allocation
|
page read and write
|
||
1EB58DCF000
|
trusted library allocation
|
page read and write
|
||
1EB5B799000
|
trusted library allocation
|
page read and write
|
||
1EB648A5000
|
trusted library allocation
|
page read and write
|
||
1FA4E932000
|
trusted library allocation
|
page read and write
|
||
1EB58E36000
|
trusted library allocation
|
page read and write
|
||
1EB5879C000
|
trusted library allocation
|
page read and write
|
||
1EB57E93000
|
trusted library allocation
|
page read and write
|
||
1EB63C3C000
|
trusted library allocation
|
page read and write
|
||
1BE35810000
|
heap
|
page read and write
|
||
1EB57CE0000
|
trusted library allocation
|
page read and write
|
||
1EB600CC000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
28E8A969000
|
heap
|
page read and write
|
||
1EB58BC9000
|
trusted library allocation
|
page read and write
|
||
1EB54AA5000
|
trusted library allocation
|
page read and write
|
||
1EB56ECA000
|
trusted library allocation
|
page read and write
|
||
1EB577C1000
|
trusted library allocation
|
page read and write
|
||
1EB57AE4000
|
trusted library allocation
|
page read and write
|
||
1EB4E848000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB58E17000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB5B166000
|
trusted library allocation
|
page read and write
|
||
1EB58AE5000
|
trusted library allocation
|
page read and write
|
||
1EB57E95000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AC000
|
heap
|
page read and write
|
||
28E89E6F000
|
trusted library allocation
|
page read and write
|
||
1EB5B1FD000
|
trusted library allocation
|
page read and write
|
||
1EB58BF8000
|
trusted library allocation
|
page read and write
|
||
1EB6014A000
|
trusted library allocation
|
page read and write
|
||
1EB57CE6000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB59770000
|
trusted library allocation
|
page read and write
|
||
1EB59B7F000
|
trusted library allocation
|
page read and write
|
||
1EB63C69000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB5B1D4000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB59A85000
|
trusted library allocation
|
page read and write
|
||
1EB592AB000
|
trusted library allocation
|
page read and write
|
||
1EB5B3ED000
|
trusted library allocation
|
page read and write
|
||
1EB5B3D6000
|
trusted library allocation
|
page read and write
|
||
1EB5A1B3000
|
trusted library allocation
|
page read and write
|
||
1EB5A18B000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB56F61000
|
trusted library allocation
|
page read and write
|
||
28E8AA2D000
|
heap
|
page read and write
|
||
1EB592B7000
|
trusted library allocation
|
page read and write
|
||
1EB576A8000
|
trusted library allocation
|
page read and write
|
||
1EB63C2F000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB634DD000
|
trusted library allocation
|
page read and write
|
||
1EB4E837000
|
heap
|
page read and write
|
||
1EB57AC2000
|
trusted library allocation
|
page read and write
|
||
1EB60195000
|
trusted library allocation
|
page read and write
|
||
1EB58770000
|
trusted library allocation
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB5B0FD000
|
trusted library allocation
|
page read and write
|
||
1EB57740000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
2B3914E6000
|
trusted library allocation
|
page execute read
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB600A4000
|
trusted library allocation
|
page read and write
|
||
1EB575B6000
|
trusted library allocation
|
page read and write
|
||
1EB58E36000
|
trusted library allocation
|
page read and write
|
||
1EB64584000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB5978F000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB5B120000
|
trusted library allocation
|
page read and write
|
||
1EB600C3000
|
trusted library allocation
|
page read and write
|
||
258C87E000
|
unkown
|
page readonly
|
||
1EB597E1000
|
trusted library allocation
|
page read and write
|
||
1EB5B74C000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB6016F000
|
trusted library allocation
|
page read and write
|
||
1EB60084000
|
trusted library allocation
|
page read and write
|
||
1EB5727A000
|
heap
|
page read and write
|
||
1EB57642000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
16EE7FE000
|
stack
|
page read and write
|
||
1EB58AAC000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB57524000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB587C9000
|
trusted library allocation
|
page read and write
|
||
1EB60191000
|
trusted library allocation
|
page read and write
|
||
1EB538FE000
|
trusted library allocation
|
page read and write
|
||
1EB59CEE000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB57CEC000
|
trusted library allocation
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
1EB58BB5000
|
trusted library allocation
|
page read and write
|
||
1EB5FEFD000
|
trusted library allocation
|
page read and write
|
||
1EB61F6D000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB57AA1000
|
trusted library allocation
|
page read and write
|
||
1EB57793000
|
trusted library allocation
|
page read and write
|
||
1EB61D97000
|
trusted library allocation
|
page read and write
|
||
1EB5B1A5000
|
trusted library allocation
|
page read and write
|
||
1EB5AD9C000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB58A7C000
|
trusted library allocation
|
page read and write
|
||
1EB57581000
|
trusted library allocation
|
page read and write
|
||
1EB58DB3000
|
trusted library allocation
|
page read and write
|
||
1EB57A97000
|
trusted library allocation
|
page read and write
|
||
1EB6484A000
|
trusted library allocation
|
page read and write
|
||
1EB4E87C000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB5319E000
|
trusted library allocation
|
page read and write
|
||
1EB592FD000
|
trusted library allocation
|
page read and write
|
||
1EB49378000
|
heap
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB5B5BC000
|
trusted library allocation
|
page read and write
|
||
1EB58DB3000
|
trusted library allocation
|
page read and write
|
||
1EB58E1A000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB58DCC000
|
trusted library allocation
|
page read and write
|
||
1EB4E871000
|
heap
|
page read and write
|
||
1EB5AD2D000
|
trusted library allocation
|
page read and write
|
||
1EB60400000
|
trusted library allocation
|
page read and write
|
||
1EB4E839000
|
heap
|
page read and write
|
||
1EB5921D000
|
trusted library allocation
|
page read and write
|
||
28E8A9F0000
|
heap
|
page read and write
|
||
1EB57587000
|
trusted library allocation
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB60011000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1FA4E87B000
|
trusted library allocation
|
page read and write
|
||
1EB5B7C9000
|
trusted library allocation
|
page read and write
|
||
1EB5B70A000
|
trusted library allocation
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB5B5CB000
|
trusted library allocation
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB648BC000
|
trusted library allocation
|
page read and write
|
||
1EB60195000
|
trusted library allocation
|
page read and write
|
||
1EB59B7F000
|
trusted library allocation
|
page read and write
|
||
1EB56F81000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB54724000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB58A6A000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB59BFC000
|
trusted library allocation
|
page read and write
|
||
1EB5B1B3000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB64845000
|
trusted library allocation
|
page read and write
|
||
1EB592D1000
|
trusted library allocation
|
page read and write
|
||
1EB548C8000
|
trusted library allocation
|
page read and write
|
||
1EB57658000
|
trusted library allocation
|
page read and write
|
||
1EB59DE0000
|
trusted library allocation
|
page read and write
|
||
1EB5B7C5000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB57E3A000
|
trusted library allocation
|
page read and write
|
||
1EB5B3CB000
|
trusted library allocation
|
page read and write
|
||
1EB57AED000
|
trusted library allocation
|
page read and write
|
||
F159E9B000
|
stack
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
28E89E2F000
|
trusted library allocation
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB6017B000
|
trusted library allocation
|
page read and write
|
||
1EB5978A000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB57AC8000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB57E4D000
|
trusted library allocation
|
page read and write
|
||
1EB4E85B000
|
heap
|
page read and write
|
||
28E8A9E6000
|
heap
|
page read and write
|
||
1EB57AC2000
|
trusted library allocation
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
1EB58A8E000
|
trusted library allocation
|
page read and write
|
||
1EB57EFD000
|
trusted library allocation
|
page read and write
|
||
1EB5B581000
|
trusted library allocation
|
page read and write
|
||
1EB5B19F000
|
trusted library allocation
|
page read and write
|
||
1EB57AD6000
|
trusted library allocation
|
page read and write
|
||
1EB60116000
|
trusted library allocation
|
page read and write
|
||
1FA4E450000
|
heap
|
page read and write
|
||
1EB5A2EF000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB5B1B3000
|
trusted library allocation
|
page read and write
|
||
1EB5B5BF000
|
trusted library allocation
|
page read and write
|
||
1EB58A23000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB57E4D000
|
trusted library allocation
|
page read and write
|
||
1EB5B51B000
|
trusted library allocation
|
page read and write
|
||
1EB59265000
|
trusted library allocation
|
page read and write
|
||
1EB5B5C4000
|
trusted library allocation
|
page read and write
|
||
1EB6014A000
|
trusted library allocation
|
page read and write
|
||
1EB57AB4000
|
trusted library allocation
|
page read and write
|
||
139F186D000
|
heap
|
page read and write
|
||
1EB57A56000
|
trusted library allocation
|
page read and write
|
||
1EB576A8000
|
trusted library allocation
|
page read and write
|
||
1EB57265000
|
heap
|
page read and write
|
||
1EB4E8AE000
|
heap
|
page read and write
|
||
1EB4E846000
|
heap
|
page read and write
|
||
1EB58AFE000
|
trusted library allocation
|
page read and write
|
||
1EB58C2E000
|
trusted library allocation
|
page read and write
|
||
1EB58CEE000
|
trusted library allocation
|
page read and write
|
||
1EB4E881000
|
heap
|
page read and write
|
||
1EB59AB1000
|
trusted library allocation
|
page read and write
|
||
1EB58AB0000
|
trusted library allocation
|
page read and write
|
||
1EB58CA0000
|
trusted library allocation
|
page read and write
|
||
1EB57AED000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB4E86C000
|
heap
|
page read and write
|
||
1EB62043000
|
trusted library allocation
|
page read and write
|
||
1EB4E83E000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB4E84E000
|
heap
|
page read and write
|
||
1EB5AD15000
|
trusted library allocation
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB57CBC000
|
trusted library allocation
|
page read and write
|
||
1EB4E86B000
|
heap
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB538B0000
|
trusted library allocation
|
page read and write
|
||
1EB58CDA000
|
trusted library allocation
|
page read and write
|
||
1EB61FE5000
|
trusted library allocation
|
page read and write
|
||
235933B1E000
|
trusted library allocation
|
page read and write
|
||
1EB58A0A000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB58E39000
|
trusted library allocation
|
page read and write
|
||
1EB57E84000
|
trusted library allocation
|
page read and write
|
||
1EB5FE86000
|
trusted library allocation
|
page read and write
|
||
1EB6013E000
|
trusted library allocation
|
page read and write
|
||
1EB6016F000
|
trusted library allocation
|
page read and write
|
||
1EB59AE1000
|
trusted library allocation
|
page read and write
|
||
28E8A969000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1EB64832000
|
trusted library allocation
|
page read and write
|
||
1EB58BF2000
|
trusted library allocation
|
page read and write
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB577B4000
|
trusted library allocation
|
page read and write
|
||
1EB4E842000
|
heap
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB59DF0000
|
trusted library allocation
|
page read and write
|
||
1EB4E877000
|
heap
|
page read and write
|
||
16DEB7B03000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
1EB5AD92000
|
trusted library allocation
|
page read and write
|
||
1EB57ACF000
|
trusted library allocation
|
page read and write
|
||
1EB58BA7000
|
trusted library allocation
|
page read and write
|
||
1EB5979C000
|
trusted library allocation
|
page read and write
|
||
28E89990000
|
heap
|
page read and write
|
||
1EB637E0000
|
trusted library allocation
|
page read and write
|
||
1EB57CF5000
|
trusted library allocation
|
page read and write
|
||
1EB5757E000
|
trusted library allocation
|
page read and write
|
||
1EB58AAC000
|
trusted library allocation
|
page read and write
|
||
1EB615A8000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB4E83F000
|
heap
|
page read and write
|
||
1EB6212C000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB63C3C000
|
trusted library allocation
|
page read and write
|
||
1EB5B310000
|
trusted library allocation
|
page read and write
|
||
1EB4E842000
|
heap
|
page read and write
|
||
1EB57AC2000
|
trusted library allocation
|
page read and write
|
||
1EB5B71C000
|
trusted library allocation
|
page read and write
|
||
1EB634EA000
|
trusted library allocation
|
page read and write
|
||
1FA4E600000
|
heap
|
page read and write
|
||
1EB54A69000
|
trusted library allocation
|
page read and write
|
||
1EB5877D000
|
trusted library allocation
|
page read and write
|
||
1D036C00000
|
trusted library allocation
|
page read and write
|
||
1EB6001B000
|
trusted library allocation
|
page read and write
|
||
1FA4E863000
|
trusted library allocation
|
page read and write
|
||
1EB56E33000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB5FE78000
|
trusted library allocation
|
page read and write
|
||
1EB59C9C000
|
trusted library allocation
|
page read and write
|
||
1EB4E85F000
|
heap
|
page read and write
|
||
1EB571FD000
|
heap
|
page read and write
|
||
1EB58A24000
|
trusted library allocation
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB620E4000
|
trusted library allocation
|
page read and write
|
||
1EB59DF7000
|
trusted library allocation
|
page read and write
|
||
1EB58BEE000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1BE35990000
|
heap
|
page read and write
|
||
820213E000
|
unkown
|
page readonly
|
||
1EB4E86E000
|
heap
|
page read and write
|
||
1EB59AEE000
|
trusted library allocation
|
page read and write
|
||
1FA4E812000
|
trusted library allocation
|
page read and write
|
||
1EB58A98000
|
trusted library allocation
|
page read and write
|
||
1EB57AF7000
|
trusted library allocation
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB6016B000
|
trusted library allocation
|
page read and write
|
||
1EB59BA4000
|
trusted library allocation
|
page read and write
|
||
1EB592D1000
|
trusted library allocation
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB58CF9000
|
trusted library allocation
|
page read and write
|
||
1EB4E879000
|
heap
|
page read and write
|
||
1EB59C6D000
|
trusted library allocation
|
page read and write
|
||
1EB57CBC000
|
trusted library allocation
|
page read and write
|
||
1EB53776000
|
trusted library allocation
|
page read and write
|
||
1EB57CAD000
|
trusted library allocation
|
page read and write
|
||
1EB5977C000
|
trusted library allocation
|
page read and write
|
||
1EB59DE5000
|
trusted library allocation
|
page read and write
|
||
1EB61749000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB576A8000
|
trusted library allocation
|
page read and write
|
||
1EB5FE86000
|
trusted library allocation
|
page read and write
|
||
1EB58AAC000
|
trusted library allocation
|
page read and write
|
||
1EB57CB2000
|
trusted library allocation
|
page read and write
|
||
1EB587F3000
|
trusted library allocation
|
page read and write
|
||
28E8A390000
|
trusted library allocation
|
page read and write
|
||
1EB577B4000
|
trusted library allocation
|
page read and write
|
||
1EB5B0E3000
|
trusted library allocation
|
page read and write
|
||
1EB4E85A000
|
heap
|
page read and write
|
||
1EB61DF0000
|
trusted library allocation
|
page read and write
|
||
2B3915E1000
|
trusted library allocation
|
page execute read
|
||
39A1000
|
heap
|
page read and write
|
||
1EB5FE84000
|
trusted library allocation
|
page read and write
|
||
1EB57E4D000
|
trusted library allocation
|
page read and write
|
||
1D0369EF000
|
heap
|
page read and write
|
||
1EB57AAC000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
201EDFB000
|
stack
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
1EB58AD1000
|
trusted library allocation
|
page read and write
|
||
1EB4E876000
|
heap
|
page read and write
|
||
1EB58FD2000
|
trusted library allocation
|
page read and write
|
||
1EB4E860000
|
heap
|
page read and write
|
||
1EB58E48000
|
trusted library allocation
|
page read and write
|
||
1EB587F8000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB5925E000
|
trusted library allocation
|
page read and write
|
||
28E8AA59000
|
heap
|
page read and write
|
||
1BE35900000
|
unclassified section
|
page readonly
|
||
1EB57A9D000
|
trusted library allocation
|
page read and write
|
||
1EB6483B000
|
trusted library allocation
|
page read and write
|
||
1EB4E84B000
|
heap
|
page read and write
|
||
1EB58BA7000
|
trusted library allocation
|
page read and write
|
||
1EB58B73000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB4E8AB000
|
heap
|
page read and write
|
||
28E8A9E8000
|
heap
|
page read and write
|
||
1EB57A73000
|
trusted library allocation
|
page read and write
|
||
1EB4E852000
|
heap
|
page read and write
|
||
1EB4E874000
|
heap
|
page read and write
|
||
1EB4E873000
|
heap
|
page read and write
|
||
1EB5B7C7000
|
trusted library allocation
|
page read and write
|
||
139F1883000
|
heap
|
page read and write
|
||
1EB57798000
|
trusted library allocation
|
page read and write
|
||
1EB617F6000
|
trusted library allocation
|
page read and write
|
||
1EB59BCD000
|
trusted library allocation
|
page read and write
|
||
1EB58A6D000
|
trusted library allocation
|
page read and write
|
||
1EB4E858000
|
heap
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1FA4E5B0000
|
heap
|
page readonly
|
||
28E89DD3000
|
unkown
|
page execute read
|
||
1EB63BC2000
|
trusted library allocation
|
page read and write
|
||
1EB57686000
|
trusted library allocation
|
page read and write
|
||
1EB5720F000
|
heap
|
page read and write
|
||
1EB587C6000
|
trusted library allocation
|
page read and write
|
||
1EB57583000
|
trusted library allocation
|
page read and write
|
||
1EB4E866000
|
heap
|
page read and write
|
||
1EB58A7C000
|
trusted library allocation
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB57E65000
|
trusted library allocation
|
page read and write
|
||
1EB60195000
|
trusted library allocation
|
page read and write
|
||
1EB5B7E7000
|
trusted library allocation
|
page read and write
|
||
1EB4E82E000
|
heap
|
page read and write
|
||
1EB4E862000
|
heap
|
page read and write
|
||
1FA4E400000
|
remote allocation
|
page read and write
|
||
1EB5773E000
|
trusted library allocation
|
page read and write
|
||
1EB5B6B5000
|
trusted library allocation
|
page read and write
|
||
1EB5FED3000
|
trusted library allocation
|
page read and write
|
||
1EB57CBE000
|
trusted library allocation
|
page read and write
|
||
1EB54742000
|
trusted library allocation
|
page read and write
|
||
1EB61DED000
|
trusted library allocation
|
page read and write
|
||
1EB5B461000
|
trusted library allocation
|
page read and write
|
||
1EB634B4000
|
trusted library allocation
|
page read and write
|
||
1EB4E84A000
|
heap
|
page read and write
|
||
1EB600CC000
|
trusted library allocation
|
page read and write
|
||
1EB62133000
|
trusted library allocation
|
page read and write
|
||
1EB592F0000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB5FFFD000
|
trusted library allocation
|
page read and write
|
||
1EB64B37000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB64820000
|
trusted library allocation
|
page read and write
|
||
1EB4E84F000
|
heap
|
page read and write
|
||
1EB4E830000
|
heap
|
page read and write
|
||
1EB57E9B000
|
trusted library allocation
|
page read and write
|
||
1EB57ACF000
|
trusted library allocation
|
page read and write
|
||
1EB4E87B000
|
heap
|
page read and write
|
||
1EB57AB4000
|
trusted library allocation
|
page read and write
|
||
1EB5B5E8000
|
trusted library allocation
|
page read and write
|
||
1EB5B4C2000
|
trusted library allocation
|
page read and write
|
||
1EB64832000
|
trusted library allocation
|
page read and write
|
||
1EB60200000
|
trusted library allocation
|
page read and write
|
||
1EB57A97000
|
trusted library allocation
|
page read and write
|
||
1EB57E5B000
|
trusted library allocation
|
page read and write
|
||
1EB58BA7000
|
trusted library allocation
|
page read and write
|
||
1EB58CF7000
|
trusted library allocation
|
page read and write
|
||
1EB57A6A000
|
trusted library allocation
|
page read and write
|
||
1EB58E39000
|
trusted library allocation
|
page read and write
|
||
1EB4E8AC000
|
heap
|
page read and write
|
||
1EB597E9000
|
trusted library allocation
|
page read and write
|
||
1EB4E885000
|
heap
|
page read and write
|
||
1EB5FFED000
|
trusted library allocation
|
page read and write
|
||
1EB58A78000
|
trusted library allocation
|
page read and write
|
||
1EB5B6B3000
|
trusted library allocation
|
page read and write
|
||
1BE35F07000
|
trusted library allocation
|
page read and write
|
||
1EB4E845000
|
heap
|
page read and write
|
||
1EB5971D000
|
trusted library allocation
|
page read and write
|
||
1EB4E88A000
|
heap
|
page read and write
|
||
1EB4E892000
|
heap
|
page read and write
|
||
1EB59B92000
|
trusted library allocation
|
page read and write
|
||
1EB5B5CB000
|
trusted library allocation
|
page read and write
|
||
1EB57ABC000
|
trusted library allocation
|
page read and write
|
||
A5A000
|
stack
|
page read and write
|
||
1EB4E865000
|
heap
|
page read and write
|
||
1EB597E9000
|
trusted library allocation
|
page read and write
|
||
1EB5AD35000
|
trusted library allocation
|
page read and write
|
||
1EB60188000
|
trusted library allocation
|
page read and write
|
||
1EB63EA3000
|
heap
|
page read and write
|
||
1EB57CBE000
|
trusted library allocation
|
page read and write
|
||
1EB61DF6000
|
trusted library allocation
|
page read and write
|
||
1EB58A7C000
|
trusted library allocation
|
page read and write
|
||
1D0369E9000
|
heap
|
page read and write
|
||
1EB6206D000
|
trusted library allocation
|
page read and write
|
||
1EB5B445000
|
trusted library allocation
|
page read and write
|
||
1EB5A24F000
|
trusted library allocation
|
page read and write
|
||
1EB5ADEC000
|
trusted library allocation
|
page read and write
|
||
1EB58ABD000
|
trusted library allocation
|
page read and write
|
||
28E8AA77000
|
heap
|
page read and write
|
||
139F32C4000
|
heap
|
page read and write
|
||
1EB57A56000
|
trusted library allocation
|
page read and write
|
There are 3947 hidden memdumps, click here to show them.