Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_033fe187-7343-4f61-9672-73623c6f30c3.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_033fe187-7343-4f61-9672-73623c6f30c3.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2232
-prefMapHandle 2228 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {6ae33e5d-6f66-4269-9aad-bb5beef63bd6} 7740 "\\.\pipe\gecko-crash-server-pipe.7740" 19fd896ef10 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4108 -parentBuildID 20230927232528 -prefsHandle 4152
-prefMapHandle 4204 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a678e984-104c-431b-8a00-cf9919c7d1e3}
7740 "\\.\pipe\gecko-crash-server-pipe.7740" 19fe8b54c10 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5052 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 5048 -prefMapHandle 5044 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {96dff99a-b4b2-4052-8a9a-312eb0d9a788} 7740 "\\.\pipe\gecko-crash-server-pipe.7740" 19ff1e6c310 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://youtube.come
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema.
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warning
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2020-12/schema/=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://ok.ru/
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.0/
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.1/
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
|
unknown
|
||
https://duckduckgo.com/?t=ffab&q=
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.251.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.65
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.129.91
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
172.217.16.206
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
142.250.185.110
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.1.140
|
||
ipv4only.arpa
|
192.0.0.170
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.217.16.206
|
youtube.com
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
151.101.129.91
|
services.addons.mozilla.org
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19FDF742000
|
heap
|
page read and write
|
||
19FE9CF3000
|
trusted library allocation
|
page read and write
|
||
19FEA69B000
|
trusted library allocation
|
page read and write
|
||
19FEBFD1000
|
trusted library allocation
|
page read and write
|
||
19FF0CFE000
|
trusted library allocation
|
page read and write
|
||
19FEBF97000
|
trusted library allocation
|
page read and write
|
||
19FE867D000
|
trusted library allocation
|
page read and write
|
||
19FF5327000
|
trusted library allocation
|
page read and write
|
||
19FE856D000
|
trusted library allocation
|
page read and write
|
||
19FE9E09000
|
trusted library allocation
|
page read and write
|
||
84D08BE000
|
stack
|
page read and write
|
||
19FEA333000
|
trusted library allocation
|
page read and write
|
||
19FEA4F4000
|
trusted library allocation
|
page read and write
|
||
19FF1C62000
|
trusted library allocation
|
page read and write
|
||
19FE9BBD000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
2753F3FD000
|
heap
|
page read and write
|
||
19FE909B000
|
trusted library allocation
|
page read and write
|
||
19FE59B0000
|
trusted library allocation
|
page read and write
|
||
2753F37D000
|
heap
|
page read and write
|
||
19FF0662000
|
trusted library allocation
|
page read and write
|
||
221FEEF2000
|
heap
|
page read and write
|
||
19FF0C9E000
|
trusted library allocation
|
page read and write
|
||
19FF3600000
|
trusted library allocation
|
page read and write
|
||
19FF0ECD000
|
trusted library allocation
|
page read and write
|
||
19FE9B29000
|
trusted library allocation
|
page read and write
|
||
84CE5EE000
|
unkown
|
page readonly
|
||
2753F458000
|
heap
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FE8675000
|
trusted library allocation
|
page read and write
|
||
19FEA3C2000
|
trusted library allocation
|
page read and write
|
||
19FEA3A2000
|
trusted library allocation
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FE9BB0000
|
trusted library allocation
|
page read and write
|
||
19FEA212000
|
trusted library allocation
|
page read and write
|
||
19FEA500000
|
trusted library allocation
|
page read and write
|
||
19FEA3E7000
|
trusted library allocation
|
page read and write
|
||
C7F41FE000
|
stack
|
page read and write
|
||
19FF0A90000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FE9CDF000
|
trusted library allocation
|
page read and write
|
||
19FE9291000
|
trusted library allocation
|
page read and write
|
||
19FEA3F3000
|
trusted library allocation
|
page read and write
|
||
19FDF730000
|
heap
|
page read and write
|
||
19FF4F37000
|
trusted library allocation
|
page read and write
|
||
19FE89E8000
|
trusted library allocation
|
page read and write
|
||
2753F369000
|
heap
|
page read and write
|
||
19FE9826000
|
trusted library allocation
|
page read and write
|
||
19FEA3BB000
|
trusted library allocation
|
page read and write
|
||
19FDF749000
|
heap
|
page read and write
|
||
19FF0C7B000
|
trusted library allocation
|
page read and write
|
||
221FF200000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FF61B1000
|
trusted library allocation
|
page read and write
|
||
19FF088E000
|
trusted library allocation
|
page read and write
|
||
19FF1E20000
|
trusted library allocation
|
page read and write
|
||
2753E7C2000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FEBC6A000
|
trusted library allocation
|
page read and write
|
||
2753F3F1000
|
heap
|
page read and write
|
||
19FF1CC8000
|
trusted library allocation
|
page read and write
|
||
19FEB031000
|
trusted library allocation
|
page read and write
|
||
19FF07E0000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEA2F6000
|
trusted library allocation
|
page read and write
|
||
221FEEF7000
|
heap
|
page read and write
|
||
19FF05DE000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FEBF92000
|
trusted library allocation
|
page read and write
|
||
19FDF75C000
|
heap
|
page read and write
|
||
19FE9CC6000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FEA3CC000
|
trusted library allocation
|
page read and write
|
||
19FEA21A000
|
trusted library allocation
|
page read and write
|
||
19FF0CF0000
|
trusted library allocation
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
C7F278D000
|
stack
|
page read and write
|
||
19FE6CDE000
|
trusted library allocation
|
page read and write
|
||
19FEA379000
|
trusted library allocation
|
page read and write
|
||
19FEA27F000
|
trusted library allocation
|
page read and write
|
||
2753F421000
|
heap
|
page read and write
|
||
19FEA3FC000
|
trusted library allocation
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FE59B0000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FF46C6000
|
trusted library allocation
|
page read and write
|
||
C7F62FE000
|
stack
|
page read and write
|
||
19FF50E3000
|
trusted library allocation
|
page read and write
|
||
19FE9A75000
|
trusted library allocation
|
page read and write
|
||
19FEB1F2000
|
trusted library allocation
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FE46FB000
|
trusted library allocation
|
page read and write
|
||
19FE9013000
|
trusted library allocation
|
page read and write
|
||
19FF0CE9000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FF07B4000
|
trusted library allocation
|
page read and write
|
||
19FF1E63000
|
trusted library allocation
|
page read and write
|
||
19FDF765000
|
heap
|
page read and write
|
||
19FF05E2000
|
trusted library allocation
|
page read and write
|
||
19FE9C9D000
|
trusted library allocation
|
page read and write
|
||
61CADFE000
|
stack
|
page read and write
|
||
19FF5351000
|
trusted library allocation
|
page read and write
|
||
19FE59C7000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF1E65000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF50F2000
|
trusted library allocation
|
page read and write
|
||
19FF0A35000
|
trusted library allocation
|
page read and write
|
||
19FE5648000
|
trusted library allocation
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FE6C33000
|
trusted library allocation
|
page read and write
|
||
19FE99FC000
|
trusted library allocation
|
page read and write
|
||
19FF0C9D000
|
trusted library allocation
|
page read and write
|
||
1DB6D320000
|
unclassified section
|
page readonly
|
||
19FF0C25000
|
trusted library allocation
|
page read and write
|
||
19FF0AE0000
|
trusted library allocation
|
page read and write
|
||
19FEA283000
|
trusted library allocation
|
page read and write
|
||
19FEA39D000
|
trusted library allocation
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FEA715000
|
trusted library allocation
|
page read and write
|
||
19FDF75C000
|
heap
|
page read and write
|
||
19FE9B9C000
|
trusted library allocation
|
page read and write
|
||
19FEA757000
|
trusted library allocation
|
page read and write
|
||
2753E766000
|
trusted library allocation
|
page read and write
|
||
19FF4F3C000
|
trusted library allocation
|
page read and write
|
||
19FF4AC1000
|
trusted library allocation
|
page read and write
|
||
19FE56FE000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
2753F3E8000
|
heap
|
page read and write
|
||
19FE980B000
|
trusted library allocation
|
page read and write
|
||
19FEA3A6000
|
trusted library allocation
|
page read and write
|
||
22C75600000
|
heap
|
page read and write
|
||
19FE90FA000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
221FEE50000
|
heap
|
page read and write
|
||
2753E7E9000
|
trusted library allocation
|
page read and write
|
||
2753F458000
|
heap
|
page read and write
|
||
19FF4BE1000
|
heap
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FF20C1000
|
trusted library allocation
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FDF7D5000
|
heap
|
page read and write
|
||
19FF0CC2000
|
trusted library allocation
|
page read and write
|
||
19FE856A000
|
trusted library allocation
|
page read and write
|
||
19FF50CE000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF07BA000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FDF746000
|
heap
|
page read and write
|
||
19FF09FA000
|
trusted library allocation
|
page read and write
|
||
19FDF74C000
|
heap
|
page read and write
|
||
19FF09AB000
|
trusted library allocation
|
page read and write
|
||
502000
|
unkown
|
page readonly
|
||
19FE4A0E000
|
trusted library allocation
|
page read and write
|
||
19FE8684000
|
trusted library allocation
|
page read and write
|
||
19FE90FC000
|
trusted library allocation
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FF4B6B000
|
heap
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FDF765000
|
heap
|
page read and write
|
||
19FE9CB3000
|
trusted library allocation
|
page read and write
|
||
19FEA4C2000
|
trusted library allocation
|
page read and write
|
||
19FE902C000
|
trusted library allocation
|
page read and write
|
||
19FE8C28000
|
trusted library allocation
|
page read and write
|
||
19FF05FC000
|
trusted library allocation
|
page read and write
|
||
19FEAAF5000
|
trusted library allocation
|
page read and write
|
||
19FF0CA0000
|
trusted library allocation
|
page read and write
|
||
19FEA4E9000
|
trusted library allocation
|
page read and write
|
||
19FEBEF1000
|
trusted library allocation
|
page read and write
|
||
19FF3880000
|
trusted library allocation
|
page read and write
|
||
19FF07BC000
|
trusted library allocation
|
page read and write
|
||
19FEA279000
|
trusted library allocation
|
page read and write
|
||
19FF5088000
|
trusted library allocation
|
page read and write
|
||
19FF0C6F000
|
trusted library allocation
|
page read and write
|
||
19FF067F000
|
trusted library allocation
|
page read and write
|
||
19FEA443000
|
trusted library allocation
|
page read and write
|
||
19FDF746000
|
heap
|
page read and write
|
||
19FEBFF5000
|
trusted library allocation
|
page read and write
|
||
19FE9CFD000
|
trusted library allocation
|
page read and write
|
||
19FE996F000
|
trusted library allocation
|
page read and write
|
||
19FEA746000
|
trusted library allocation
|
page read and write
|
||
19FEA3BF000
|
trusted library allocation
|
page read and write
|
||
19FEA6F0000
|
trusted library allocation
|
page read and write
|
||
19FF09D9000
|
trusted library allocation
|
page read and write
|
||
19FF1E29000
|
trusted library allocation
|
page read and write
|
||
19FE9023000
|
trusted library allocation
|
page read and write
|
||
19FE462F000
|
trusted library allocation
|
page read and write
|
||
19FF6201000
|
trusted library allocation
|
page read and write
|
||
2753F301000
|
heap
|
page read and write
|
||
19FF4AB0000
|
trusted library allocation
|
page read and write
|
||
19FE9957000
|
trusted library allocation
|
page read and write
|
||
19FE9CF9000
|
trusted library allocation
|
page read and write
|
||
19FE86DD000
|
trusted library allocation
|
page read and write
|
||
19FE8695000
|
trusted library allocation
|
page read and write
|
||
19FDF76B000
|
heap
|
page read and write
|
||
19FF05F8000
|
trusted library allocation
|
page read and write
|
||
19FF6166000
|
trusted library allocation
|
page read and write
|
||
1DB6D70D000
|
trusted library allocation
|
page read and write
|
||
19FDF735000
|
heap
|
page read and write
|
||
19FEA25A000
|
trusted library allocation
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
19FE9D61000
|
trusted library allocation
|
page read and write
|
||
19FE80AA000
|
heap
|
page read and write
|
||
19FE5978000
|
trusted library allocation
|
page read and write
|
||
19FEBFE6000
|
trusted library allocation
|
page read and write
|
||
19FE6068000
|
trusted library allocation
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
19FF07CB000
|
trusted library allocation
|
page read and write
|
||
19FE9CD8000
|
trusted library allocation
|
page read and write
|
||
19FEA7DA000
|
trusted library allocation
|
page read and write
|
||
19FF12CE000
|
trusted library allocation
|
page read and write
|
||
19FE9B99000
|
trusted library allocation
|
page read and write
|
||
19FEBFD6000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE9B61000
|
trusted library allocation
|
page read and write
|
||
19FF06A8000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
86E6BE000
|
unkown
|
page readonly
|
||
19FEA3FC000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FF0CA6000
|
trusted library allocation
|
page read and write
|
||
19FDF75E000
|
heap
|
page read and write
|
||
2753E777000
|
trusted library allocation
|
page read and write
|
||
19FF0740000
|
trusted library allocation
|
page read and write
|
||
1DB6D75B000
|
trusted library allocation
|
page read and write
|
||
19FE89D0000
|
trusted library allocation
|
page read and write
|
||
19FF09EC000
|
trusted library allocation
|
page read and write
|
||
19FE59F6000
|
trusted library allocation
|
page read and write
|
||
19FEA65C000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FE597C000
|
trusted library allocation
|
page read and write
|
||
19FEBC66000
|
trusted library allocation
|
page read and write
|
||
19FE904D000
|
trusted library allocation
|
page read and write
|
||
2753F468000
|
heap
|
page read and write
|
||
221FF20A000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF3CA8000
|
trusted library allocation
|
page read and write
|
||
19FEA5BA000
|
trusted library allocation
|
page read and write
|
||
2753E70A000
|
trusted library allocation
|
page read and write
|
||
19FE866F000
|
trusted library allocation
|
page read and write
|
||
2753F3F1000
|
heap
|
page read and write
|
||
2753E723000
|
trusted library allocation
|
page read and write
|
||
2753E710000
|
trusted library allocation
|
page read and write
|
||
19FF07E7000
|
trusted library allocation
|
page read and write
|
||
19FF0CED000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FE8562000
|
trusted library allocation
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
19FEB0C5000
|
trusted library allocation
|
page read and write
|
||
19FEA7DA000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE9AD0000
|
trusted library allocation
|
page read and write
|
||
19FEA691000
|
trusted library allocation
|
page read and write
|
||
19FE9086000
|
trusted library allocation
|
page read and write
|
||
19FF0EF4000
|
trusted library allocation
|
page read and write
|
||
19FF0E82000
|
trusted library allocation
|
page read and write
|
||
19FF2204000
|
trusted library allocation
|
page read and write
|
||
19FE9CCE000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE807E000
|
heap
|
page read and write
|
||
19FEA2D4000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE9896000
|
trusted library allocation
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FF07E0000
|
trusted library allocation
|
page read and write
|
||
19FDF7C4000
|
heap
|
page read and write
|
||
19FDF74C000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
221FEEDD000
|
heap
|
page read and write
|
||
19FE8453000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FF0C57000
|
trusted library allocation
|
page read and write
|
||
19FEA272000
|
trusted library allocation
|
page read and write
|
||
19FE9A47000
|
trusted library allocation
|
page read and write
|
||
19FE8067000
|
heap
|
page read and write
|
||
19FE8084000
|
heap
|
page read and write
|
||
19FEBF90000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
2753F38D000
|
heap
|
page read and write
|
||
19FF09E5000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE92E9000
|
trusted library allocation
|
page read and write
|
||
19FE5981000
|
trusted library allocation
|
page read and write
|
||
19FEA4F4000
|
trusted library allocation
|
page read and write
|
||
19FF1DF7000
|
trusted library allocation
|
page read and write
|
||
19FE9C8D000
|
trusted library allocation
|
page read and write
|
||
19FF4F2B000
|
trusted library allocation
|
page read and write
|
||
19FF0E8C000
|
trusted library allocation
|
page read and write
|
||
2753F3AA000
|
heap
|
page read and write
|
||
19FEBF97000
|
trusted library allocation
|
page read and write
|
||
19FE9E69000
|
trusted library allocation
|
page read and write
|
||
19FE982A000
|
trusted library allocation
|
page read and write
|
||
19FEA3F3000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FE804F000
|
heap
|
page read and write
|
||
2753E370000
|
heap
|
page read and write
|
||
19FE9824000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF731000
|
heap
|
page read and write
|
||
19FEAAAC000
|
trusted library allocation
|
page read and write
|
||
19FE5884000
|
trusted library allocation
|
page read and write
|
||
19FE998D000
|
trusted library allocation
|
page read and write
|
||
19FE9C9D000
|
trusted library allocation
|
page read and write
|
||
19FF0679000
|
trusted library allocation
|
page read and write
|
||
19FEA3CF000
|
trusted library allocation
|
page read and write
|
||
19FE6CF9000
|
trusted library allocation
|
page read and write
|
||
19FEA4EB000
|
trusted library allocation
|
page read and write
|
||
19FE56D2000
|
trusted library allocation
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
19FE80B6000
|
heap
|
page read and write
|
||
19FE56E4000
|
trusted library allocation
|
page read and write
|
||
19FF1EF6000
|
trusted library allocation
|
page read and write
|
||
19FF07CB000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEA5A4000
|
trusted library allocation
|
page read and write
|
||
A6B01FE000
|
stack
|
page read and write
|
||
19FE6C62000
|
trusted library allocation
|
page read and write
|
||
19FE8080000
|
heap
|
page read and write
|
||
19FEA4F9000
|
trusted library allocation
|
page read and write
|
||
19FEB1C6000
|
trusted library allocation
|
page read and write
|
||
19FF0C78000
|
trusted library allocation
|
page read and write
|
||
19FF09C4000
|
trusted library allocation
|
page read and write
|
||
19FF0C89000
|
trusted library allocation
|
page read and write
|
||
19FEA20C000
|
trusted library allocation
|
page read and write
|
||
19FF0C2F000
|
trusted library allocation
|
page read and write
|
||
19FE59DC000
|
trusted library allocation
|
page read and write
|
||
19FF073E000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FF0991000
|
trusted library allocation
|
page read and write
|
||
19FE86FA000
|
trusted library allocation
|
page read and write
|
||
19FE9CDC000
|
trusted library allocation
|
page read and write
|
||
19FEBFF3000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
2753E6C2000
|
unkown
|
page execute read
|
||
19FE99FC000
|
trusted library allocation
|
page read and write
|
||
19FE5693000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FEA4F9000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FEA259000
|
trusted library allocation
|
page read and write
|
||
19FEA4F9000
|
trusted library allocation
|
page read and write
|
||
19FEA720000
|
trusted library allocation
|
page read and write
|
||
19FE80C3000
|
heap
|
page read and write
|
||
19FDF76D000
|
heap
|
page read and write
|
||
22C755F4000
|
trusted library allocation
|
page read and write
|
||
86A317000
|
stack
|
page read and write
|
||
19FE847B000
|
trusted library allocation
|
page read and write
|
||
19FDF7AF000
|
heap
|
page read and write
|
||
19FF12CA000
|
trusted library allocation
|
page read and write
|
||
19FF12DE000
|
trusted library allocation
|
page read and write
|
||
19FEA37D000
|
trusted library allocation
|
page read and write
|
||
2753E640000
|
trusted library section
|
page readonly
|
||
19FF0808000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE86E5000
|
trusted library allocation
|
page read and write
|
||
19FEA4CF000
|
trusted library allocation
|
page read and write
|
||
19FF1E93000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FEA370000
|
trusted library allocation
|
page read and write
|
||
19FE9014000
|
trusted library allocation
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FF097E000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FEABE1000
|
trusted library allocation
|
page read and write
|
||
19FEA4A6000
|
trusted library allocation
|
page read and write
|
||
19FEA34A000
|
trusted library allocation
|
page read and write
|
||
19FDF75C000
|
heap
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE8465000
|
trusted library allocation
|
page read and write
|
||
2753F3FD000
|
heap
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
86A39E000
|
unkown
|
page readonly
|
||
19FDF750000
|
heap
|
page read and write
|
||
19FEA2A4000
|
trusted library allocation
|
page read and write
|
||
19FEA7F9000
|
trusted library allocation
|
page read and write
|
||
19FE59EB000
|
trusted library allocation
|
page read and write
|
||
19FE851F000
|
trusted library allocation
|
page read and write
|
||
C7F6AFE000
|
unkown
|
page readonly
|
||
19FEA3E8000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FE99B5000
|
trusted library allocation
|
page read and write
|
||
1B788E67000
|
heap
|
page read and write
|
||
19FF5095000
|
trusted library allocation
|
page read and write
|
||
19FE6CF7000
|
trusted library allocation
|
page read and write
|
||
19FF07B7000
|
trusted library allocation
|
page read and write
|
||
19FEA4A4000
|
trusted library allocation
|
page read and write
|
||
19FE8678000
|
trusted library allocation
|
page read and write
|
||
19FEA29E000
|
trusted library allocation
|
page read and write
|
||
19FE995E000
|
trusted library allocation
|
page read and write
|
||
2753E680000
|
trusted library allocation
|
page read and write
|
||
19FF0C31000
|
trusted library allocation
|
page read and write
|
||
19FEA3FC000
|
trusted library allocation
|
page read and write
|
||
19FEA270000
|
trusted library allocation
|
page read and write
|
||
19FDF759000
|
heap
|
page read and write
|
||
19FE99B2000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FE9851000
|
trusted library allocation
|
page read and write
|
||
19FF05F0000
|
trusted library allocation
|
page read and write
|
||
19FE8583000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF0983000
|
trusted library allocation
|
page read and write
|
||
19FE857C000
|
trusted library allocation
|
page read and write
|
||
19FDF765000
|
heap
|
page read and write
|
||
19FE56FB000
|
trusted library allocation
|
page read and write
|
||
19FF0994000
|
trusted library allocation
|
page read and write
|
||
19FEA343000
|
trusted library allocation
|
page read and write
|
||
19FDF75C000
|
heap
|
page read and write
|
||
19FEA3A2000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE9B82000
|
trusted library allocation
|
page read and write
|
||
19FF08EC000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE9B35000
|
trusted library allocation
|
page read and write
|
||
19FE86C1000
|
trusted library allocation
|
page read and write
|
||
19FF0806000
|
trusted library allocation
|
page read and write
|
||
19FF0619000
|
trusted library allocation
|
page read and write
|
||
19FE5908000
|
trusted library allocation
|
page read and write
|
||
19FEB157000
|
trusted library allocation
|
page read and write
|
||
19FE47EE000
|
trusted library allocation
|
page read and write
|
||
19FEA2AB000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FF09AD000
|
trusted library allocation
|
page read and write
|
||
19FF0ADA000
|
trusted library allocation
|
page read and write
|
||
19FF5339000
|
trusted library allocation
|
page read and write
|
||
19FE47D2000
|
trusted library allocation
|
page read and write
|
||
19FF0C9A000
|
trusted library allocation
|
page read and write
|
||
19FEB041000
|
trusted library allocation
|
page read and write
|
||
19FEA24D000
|
trusted library allocation
|
page read and write
|
||
19FDF771000
|
heap
|
page read and write
|
||
19FF50F8000
|
trusted library allocation
|
page read and write
|
||
2753E6D4000
|
heap
|
page read and write
|
||
19FEA6FE000
|
trusted library allocation
|
page read and write
|
||
19FE4AEA000
|
trusted library allocation
|
page read and write
|
||
19FEA3C8000
|
trusted library allocation
|
page read and write
|
||
19FE80C6000
|
heap
|
page read and write
|
||
19FDF78E000
|
heap
|
page read and write
|
||
19FEA4BF000
|
trusted library allocation
|
page read and write
|
||
19FF067F000
|
trusted library allocation
|
page read and write
|
||
19FE4780000
|
trusted library allocation
|
page read and write
|
||
86DEBE000
|
stack
|
page read and write
|
||
19FF05FC000
|
trusted library allocation
|
page read and write
|
||
19FEBFD1000
|
trusted library allocation
|
page read and write
|
||
19FEBC77000
|
trusted library allocation
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FE8573000
|
trusted library allocation
|
page read and write
|
||
19FE863D000
|
trusted library allocation
|
page read and write
|
||
19FF4F64000
|
trusted library allocation
|
page read and write
|
||
19FE6C63000
|
trusted library allocation
|
page read and write
|
||
19FE925C000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
2753E2D0000
|
unclassified section
|
page readonly
|
||
19FE998F000
|
trusted library allocation
|
page read and write
|
||
19FE5974000
|
trusted library allocation
|
page read and write
|
||
19FE8095000
|
heap
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FE5996000
|
trusted library allocation
|
page read and write
|
||
19FEA763000
|
trusted library allocation
|
page read and write
|
||
19FEA3E3000
|
trusted library allocation
|
page read and write
|
||
19FF1D93000
|
trusted library allocation
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF1DB4000
|
trusted library allocation
|
page read and write
|
||
19FEA3A0000
|
trusted library allocation
|
page read and write
|
||
19FEA2FC000
|
trusted library allocation
|
page read and write
|
||
19FEB14A000
|
trusted library allocation
|
page read and write
|
||
19FF0C60000
|
trusted library allocation
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
2753F3E8000
|
heap
|
page read and write
|
||
19FF4200000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
221FEEE8000
|
heap
|
page read and write
|
||
19FDF75A000
|
heap
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FEB026000
|
trusted library allocation
|
page read and write
|
||
19FF0C7D000
|
trusted library allocation
|
page read and write
|
||
19FE858A000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FE4AB3000
|
trusted library allocation
|
page read and write
|
||
221FEECA000
|
heap
|
page read and write
|
||
19FE8562000
|
trusted library allocation
|
page read and write
|
||
19FEA67B000
|
trusted library allocation
|
page read and write
|
||
19FE80A1000
|
heap
|
page read and write
|
||
221FF6AB000
|
heap
|
page read and write
|
||
19FEBF5A000
|
trusted library allocation
|
page read and write
|
||
19FF09C4000
|
trusted library allocation
|
page read and write
|
||
221FF6AE000
|
heap
|
page read and write
|
||
C7F49FE000
|
unkown
|
page readonly
|
||
19FE9E3F000
|
trusted library allocation
|
page read and write
|
||
19FE86D8000
|
trusted library allocation
|
page read and write
|
||
19FDF752000
|
heap
|
page read and write
|
||
19FE90B6000
|
trusted library allocation
|
page read and write
|
||
19FE9847000
|
trusted library allocation
|
page read and write
|
||
19FE5925000
|
trusted library allocation
|
page read and write
|
||
19FE981C000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE9B24000
|
trusted library allocation
|
page read and write
|
||
19FEA3A0000
|
trusted library allocation
|
page read and write
|
||
19FEB0C5000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
A6AE9FA000
|
stack
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FEA3D2000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FEABB9000
|
trusted library allocation
|
page read and write
|
||
22C75280000
|
heap
|
page read and write
|
||
2753F444000
|
heap
|
page read and write
|
||
19FF09AD000
|
trusted library allocation
|
page read and write
|
||
19FE8080000
|
heap
|
page read and write
|
||
19FE99FC000
|
trusted library allocation
|
page read and write
|
||
19FE477E000
|
trusted library allocation
|
page read and write
|
||
84D07FE000
|
unkown
|
page readonly
|
||
19FE8081000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF21F9000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF0848000
|
trusted library allocation
|
page read and write
|
||
19FE9052000
|
trusted library allocation
|
page read and write
|
||
19FE9977000
|
trusted library allocation
|
page read and write
|
||
19FE80D7000
|
heap
|
page read and write
|
||
19FDF78C000
|
heap
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FE9E6D000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEAA4D000
|
trusted library allocation
|
page read and write
|
||
19FEBC1A000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FEA283000
|
trusted library allocation
|
page read and write
|
||
19FDF746000
|
heap
|
page read and write
|
||
19FF098C000
|
trusted library allocation
|
page read and write
|
||
19FE99C1000
|
trusted library allocation
|
page read and write
|
||
19FE56A5000
|
trusted library allocation
|
page read and write
|
||
19FE9BE4000
|
trusted library allocation
|
page read and write
|
||
19FE9EA7000
|
trusted library allocation
|
page read and write
|
||
19FDF737000
|
heap
|
page read and write
|
||
19FF50EA000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FE847B000
|
trusted library allocation
|
page read and write
|
||
19FDF730000
|
heap
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE9D6B000
|
trusted library allocation
|
page read and write
|
||
19FF5079000
|
trusted library allocation
|
page read and write
|
||
19FF4B99000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FE8CAC000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEA37D000
|
trusted library allocation
|
page read and write
|
||
19FF0C57000
|
trusted library allocation
|
page read and write
|
||
19FEBCD5000
|
trusted library allocation
|
page read and write
|
||
19FE9830000
|
trusted library allocation
|
page read and write
|
||
19FEA49C000
|
trusted library allocation
|
page read and write
|
||
19FEA3C8000
|
trusted library allocation
|
page read and write
|
||
19FDF714000
|
heap
|
page read and write
|
||
19FF0AA3000
|
trusted library allocation
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FE9CFB000
|
trusted library allocation
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FE5934000
|
trusted library allocation
|
page read and write
|
||
19FEA4A4000
|
trusted library allocation
|
page read and write
|
||
19FEA398000
|
trusted library allocation
|
page read and write
|
||
19FE864A000
|
trusted library allocation
|
page read and write
|
||
61CA5FF000
|
stack
|
page read and write
|
||
19FF215C000
|
trusted library allocation
|
page read and write
|
||
19FEBFE6000
|
trusted library allocation
|
page read and write
|
||
19FDF738000
|
heap
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FEA3C1000
|
trusted library allocation
|
page read and write
|
||
19FE857C000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FF09FA000
|
trusted library allocation
|
page read and write
|
||
19FE9CB6000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF09FA000
|
trusted library allocation
|
page read and write
|
||
19FEA3B5000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FE867D000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
19FF4B52000
|
heap
|
page read and write
|
||
19FDF76B000
|
heap
|
page read and write
|
||
19FE80A1000
|
heap
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FE89D7000
|
trusted library allocation
|
page read and write
|
||
22C755B6000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FEA34A000
|
trusted library allocation
|
page read and write
|
||
19FF09FA000
|
trusted library allocation
|
page read and write
|
||
19FE868C000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE6C33000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE8067000
|
heap
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
2753F477000
|
heap
|
page read and write
|
||
19FEA467000
|
trusted library allocation
|
page read and write
|
||
19FE9824000
|
trusted library allocation
|
page read and write
|
||
19FF099A000
|
trusted library allocation
|
page read and write
|
||
19FF0C60000
|
trusted library allocation
|
page read and write
|
||
19FE8912000
|
trusted library allocation
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FE9B99000
|
trusted library allocation
|
page read and write
|
||
19FE80C6000
|
heap
|
page read and write
|
||
19FEBFD1000
|
trusted library allocation
|
page read and write
|
||
19FE9BF2000
|
trusted library allocation
|
page read and write
|
||
19FE9CAE000
|
trusted library allocation
|
page read and write
|
||
19FE89D0000
|
trusted library allocation
|
page read and write
|
||
19FE594C000
|
trusted library allocation
|
page read and write
|
||
19FF09EC000
|
trusted library allocation
|
page read and write
|
||
19FE985A000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
2753E3DA000
|
heap
|
page read and write
|
||
19FE7E4B000
|
trusted library allocation
|
page read and write
|
||
19FF0C62000
|
trusted library allocation
|
page read and write
|
||
19FF05EA000
|
trusted library allocation
|
page read and write
|
||
84D18FE000
|
unkown
|
page readonly
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
19FF4AC1000
|
trusted library allocation
|
page read and write
|
||
2753F3E3000
|
heap
|
page read and write
|
||
22C752C0000
|
unclassified section
|
page readonly
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FEBC12000
|
trusted library allocation
|
page read and write
|
||
19FEA2D4000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE59F4000
|
trusted library allocation
|
page read and write
|
||
19FF46C4000
|
trusted library allocation
|
page read and write
|
||
19FDF7A4000
|
heap
|
page read and write
|
||
1DB6D490000
|
heap
|
page read and write
|
||
19FE9996000
|
trusted library allocation
|
page read and write
|
||
19FDF748000
|
heap
|
page read and write
|
||
2753F37F000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FEBF42000
|
trusted library allocation
|
page read and write
|
||
19FE8085000
|
heap
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FE8092000
|
heap
|
page read and write
|
||
19FE9095000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FEA3A0000
|
trusted library allocation
|
page read and write
|
||
19FEA2E9000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FE4A47000
|
trusted library allocation
|
page read and write
|
||
24DD000
|
stack
|
page read and write
|
||
19FE9D69000
|
trusted library allocation
|
page read and write
|
||
1DB6D460000
|
heap
|
page read and write
|
||
19FEA60F000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
2753F360000
|
heap
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF4F52000
|
trusted library allocation
|
page read and write
|
||
19FEBCED000
|
trusted library allocation
|
page read and write
|
||
19FF508C000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF0C4C000
|
trusted library allocation
|
page read and write
|
||
19FEBFF3000
|
trusted library allocation
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FEA3F6000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEA2BF000
|
trusted library allocation
|
page read and write
|
||
2753E6B0000
|
trusted library allocation
|
page read and write
|
||
19FE849D000
|
trusted library allocation
|
page read and write
|
||
19FE5681000
|
trusted library allocation
|
page read and write
|
||
19FF0AE0000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FF0ADE000
|
trusted library allocation
|
page read and write
|
||
19FEA4A2000
|
trusted library allocation
|
page read and write
|
||
19FE590E000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FE8095000
|
heap
|
page read and write
|
||
19FEA2A4000
|
trusted library allocation
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
19FE4A55000
|
trusted library allocation
|
page read and write
|
||
19FF4F32000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FE9826000
|
trusted library allocation
|
page read and write
|
||
19FF094A000
|
trusted library allocation
|
page read and write
|
||
19FEA7FC000
|
trusted library allocation
|
page read and write
|
||
19FF0BD9000
|
trusted library allocation
|
page read and write
|
||
19FE8678000
|
trusted library allocation
|
page read and write
|
||
19FEB14E000
|
trusted library allocation
|
page read and write
|
||
19FEBF94000
|
trusted library allocation
|
page read and write
|
||
19FEA5D3000
|
trusted library allocation
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
19FEB023000
|
trusted library allocation
|
page read and write
|
||
19FE9EED000
|
trusted library allocation
|
page read and write
|
||
19FEA256000
|
trusted library allocation
|
page read and write
|
||
19FEB1EE000
|
trusted library allocation
|
page read and write
|
||
19FE857F000
|
trusted library allocation
|
page read and write
|
||
19FE8062000
|
heap
|
page read and write
|
||
19FEBF97000
|
trusted library allocation
|
page read and write
|
||
19FE5967000
|
trusted library allocation
|
page read and write
|
||
19FE9B87000
|
trusted library allocation
|
page read and write
|
||
19FF0AD6000
|
trusted library allocation
|
page read and write
|
||
1DB6D712000
|
trusted library allocation
|
page read and write
|
||
19FF2D9E000
|
trusted library allocation
|
page read and write
|
||
19FF09A5000
|
trusted library allocation
|
page read and write
|
||
1DB6D747000
|
trusted library allocation
|
page read and write
|
||
19FF078C000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FEA20E000
|
trusted library allocation
|
page read and write
|
||
19FE904D000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEBC5D000
|
trusted library allocation
|
page read and write
|
||
22C75549000
|
trusted library allocation
|
page read and write
|
||
19FE8BCF000
|
trusted library allocation
|
page read and write
|
||
19FEA6E0000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
22C75516000
|
trusted library allocation
|
page read and write
|
||
19FF0ADE000
|
trusted library allocation
|
page read and write
|
||
19FDF74A000
|
heap
|
page read and write
|
||
19FEA29E000
|
trusted library allocation
|
page read and write
|
||
2753E75F000
|
trusted library allocation
|
page read and write
|
||
19FE80AA000
|
heap
|
page read and write
|
||
19FE9E69000
|
trusted library allocation
|
page read and write
|
||
19FF2118000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
2753F3A8000
|
heap
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FF0C40000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FF09CF000
|
trusted library allocation
|
page read and write
|
||
19FDF79C000
|
heap
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FE867D000
|
trusted library allocation
|
page read and write
|
||
19FE4A8D000
|
trusted library allocation
|
page read and write
|
||
19FF1DF7000
|
trusted library allocation
|
page read and write
|
||
19FEA483000
|
trusted library allocation
|
page read and write
|
||
19FEBF92000
|
trusted library allocation
|
page read and write
|
||
19FE587C000
|
trusted library allocation
|
page read and write
|
||
221FEEF0000
|
heap
|
page read and write
|
||
19FE86C4000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FF05F4000
|
trusted library allocation
|
page read and write
|
||
19FEA3A6000
|
trusted library allocation
|
page read and write
|
||
19FF0679000
|
trusted library allocation
|
page read and write
|
||
2753F3EA000
|
heap
|
page read and write
|
||
19FF2204000
|
trusted library allocation
|
page read and write
|
||
19FE809C000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE8080000
|
heap
|
page read and write
|
||
19FEA4C3000
|
trusted library allocation
|
page read and write
|
||
19FF078A000
|
trusted library allocation
|
page read and write
|
||
19FF0C0F000
|
trusted library allocation
|
page read and write
|
||
19FEA4F4000
|
trusted library allocation
|
page read and write
|
||
19FF05E2000
|
trusted library allocation
|
page read and write
|
||
19FE9CB6000
|
trusted library allocation
|
page read and write
|
||
19FEB03D000
|
trusted library allocation
|
page read and write
|
||
221FF6AA000
|
heap
|
page read and write
|
||
2753E3B0000
|
heap
|
page read and write
|
||
19FF060A000
|
trusted library allocation
|
page read and write
|
||
19FEA3BA000
|
trusted library allocation
|
page read and write
|
||
19FF0C33000
|
trusted library allocation
|
page read and write
|
||
221FEEE2000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE98F3000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FEA4CA000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE5931000
|
trusted library allocation
|
page read and write
|
||
19FEA64F000
|
trusted library allocation
|
page read and write
|
||
19FF0C4A000
|
trusted library allocation
|
page read and write
|
||
86CDFE000
|
stack
|
page read and write
|
||
1DB6D48F000
|
unclassified section
|
page read and write
|
||
19FE868B000
|
trusted library allocation
|
page read and write
|
||
19FEA3AA000
|
trusted library allocation
|
page read and write
|
||
2753F35C000
|
heap
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
2753E6C6000
|
unkown
|
page execute read
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
19FE9E78000
|
trusted library allocation
|
page read and write
|
||
19FF21FC000
|
trusted library allocation
|
page read and write
|
||
1DB6D482000
|
unclassified section
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FE90C2000
|
trusted library allocation
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FF4A9F000
|
trusted library allocation
|
page read and write
|
||
19FF0989000
|
trusted library allocation
|
page read and write
|
||
19FEAB80000
|
trusted library allocation
|
page read and write
|
||
1DB6D77B000
|
trusted library allocation
|
page read and write
|
||
19FE906E000
|
trusted library allocation
|
page read and write
|
||
19FEA2F6000
|
trusted library allocation
|
page read and write
|
||
19FF09F2000
|
trusted library allocation
|
page read and write
|
||
18E8000
|
heap
|
page read and write
|
||
19FE91E5000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE998B000
|
trusted library allocation
|
page read and write
|
||
19FE90C2000
|
trusted library allocation
|
page read and write
|
||
19FF07E7000
|
trusted library allocation
|
page read and write
|
||
19FEBF2C000
|
trusted library allocation
|
page read and write
|
||
19FF61B4000
|
trusted library allocation
|
page read and write
|
||
19FF0C55000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
19FE8CBC000
|
trusted library allocation
|
page read and write
|
||
19FE99F6000
|
trusted library allocation
|
page read and write
|
||
19FEA4CA000
|
trusted library allocation
|
page read and write
|
||
19FE8BE0000
|
trusted library allocation
|
page read and write
|
||
19FF0BDF000
|
trusted library allocation
|
page read and write
|
||
19FE58BB000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FF0C25000
|
trusted library allocation
|
page read and write
|
||
19FDF737000
|
heap
|
page read and write
|
||
19FF0826000
|
trusted library allocation
|
page read and write
|
||
19FE80B6000
|
heap
|
page read and write
|
||
19FE9CBC000
|
trusted library allocation
|
page read and write
|
||
19FEA2E4000
|
trusted library allocation
|
page read and write
|
||
19FDF737000
|
heap
|
page read and write
|
||
19FE4A69000
|
trusted library allocation
|
page read and write
|
||
86F6BE000
|
unkown
|
page readonly
|
||
19FF0A37000
|
trusted library allocation
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
19FF099A000
|
trusted library allocation
|
page read and write
|
||
19FE56C2000
|
trusted library allocation
|
page read and write
|
||
19FE9093000
|
trusted library allocation
|
page read and write
|
||
1DB6D3F0000
|
heap
|
page read and write
|
||
19FEA398000
|
trusted library allocation
|
page read and write
|
||
2753E72F000
|
trusted library allocation
|
page read and write
|
||
19FF0AE0000
|
trusted library allocation
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FF6224000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF0672000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FF0E9C000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE980B000
|
trusted library allocation
|
page read and write
|
||
19FEC1F8000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEA2AB000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF0BDF000
|
trusted library allocation
|
page read and write
|
||
19FEA291000
|
trusted library allocation
|
page read and write
|
||
19FDF7A4000
|
heap
|
page read and write
|
||
19FE8085000
|
heap
|
page read and write
|
||
19FE86E5000
|
trusted library allocation
|
page read and write
|
||
19FEBCBE000
|
trusted library allocation
|
page read and write
|
||
19FF5099000
|
trusted library allocation
|
page read and write
|
||
19FE80BA000
|
heap
|
page read and write
|
||
19FEA2FD000
|
trusted library allocation
|
page read and write
|
||
19FF0C62000
|
trusted library allocation
|
page read and write
|
||
19FEB188000
|
trusted library allocation
|
page read and write
|
||
1B789100000
|
trusted library allocation
|
page read and write
|
||
19FE9095000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FE58A5000
|
trusted library allocation
|
page read and write
|
||
19FDF7AF000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE59DC000
|
trusted library allocation
|
page read and write
|
||
19FEA5A9000
|
trusted library allocation
|
page read and write
|
||
19FEA3DD000
|
trusted library allocation
|
page read and write
|
||
19FF21B4000
|
trusted library allocation
|
page read and write
|
||
19FF05C8000
|
trusted library allocation
|
page read and write
|
||
19FEA4F4000
|
trusted library allocation
|
page read and write
|
||
19FF0B22000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FEA5CE000
|
trusted library allocation
|
page read and write
|
||
19FE47EE000
|
trusted library allocation
|
page read and write
|
||
19FE9CFD000
|
trusted library allocation
|
page read and write
|
||
1B788E60000
|
heap
|
page read and write
|
||
19FE6056000
|
trusted library allocation
|
page read and write
|
||
19FF1DEF000
|
trusted library allocation
|
page read and write
|
||
19FEA4E3000
|
trusted library allocation
|
page read and write
|
||
19FF05CA000
|
trusted library allocation
|
page read and write
|
||
19FE56D2000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
22C7528A000
|
heap
|
page read and write
|
||
19FF0CFE000
|
trusted library allocation
|
page read and write
|
||
19FF3A00000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF1DF7000
|
trusted library allocation
|
page read and write
|
||
19FE86A4000
|
trusted library allocation
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
19FEBCC8000
|
trusted library allocation
|
page read and write
|
||
19FEA2F8000
|
trusted library allocation
|
page read and write
|
||
19FF1DE8000
|
trusted library allocation
|
page read and write
|
||
19FEBF9F000
|
trusted library allocation
|
page read and write
|
||
19FF07CB000
|
trusted library allocation
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
19FEB0CD000
|
trusted library allocation
|
page read and write
|
||
19FF0572000
|
trusted library allocation
|
page read and write
|
||
19FE9BB6000
|
trusted library allocation
|
page read and write
|
||
19FDF7A6000
|
heap
|
page read and write
|
||
19FEA5D1000
|
trusted library allocation
|
page read and write
|
||
19FE98D4000
|
trusted library allocation
|
page read and write
|
||
192B000
|
heap
|
page read and write
|
||
19FEA47B000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FF09C7000
|
trusted library allocation
|
page read and write
|
||
19FE866E000
|
trusted library allocation
|
page read and write
|
||
19FF09A8000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FF0BAB000
|
trusted library allocation
|
page read and write
|
||
19FE80C6000
|
heap
|
page read and write
|
||
19FF06DF000
|
trusted library allocation
|
page read and write
|
||
19FEA4F9000
|
trusted library allocation
|
page read and write
|
||
19FEBE29000
|
trusted library allocation
|
page read and write
|
||
19FEA4B1000
|
trusted library allocation
|
page read and write
|
||
19FE9041000
|
trusted library allocation
|
page read and write
|
||
19FEBC45000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FEA744000
|
trusted library allocation
|
page read and write
|
||
22C75010000
|
unclassified section
|
page readonly
|
||
19FE58AC000
|
trusted library allocation
|
page read and write
|
||
19FF4B71000
|
heap
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FE80C2000
|
heap
|
page read and write
|
||
19FEA3A1000
|
trusted library allocation
|
page read and write
|
||
19FEBF80000
|
trusted library allocation
|
page read and write
|
||
19FF0CF0000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF753000
|
heap
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FF07DB000
|
trusted library allocation
|
page read and write
|
||
19FE6C7B000
|
trusted library allocation
|
page read and write
|
||
19FF09E1000
|
trusted library allocation
|
page read and write
|
||
1DB6D932000
|
trusted library allocation
|
page read and write
|
||
19FEA483000
|
trusted library allocation
|
page read and write
|
||
19FE7E33000
|
trusted library allocation
|
page read and write
|
||
19FF0728000
|
trusted library allocation
|
page read and write
|
||
19FE858B000
|
trusted library allocation
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
19FF09A5000
|
trusted library allocation
|
page read and write
|
||
19FE868B000
|
trusted library allocation
|
page read and write
|
||
19FE80B4000
|
heap
|
page read and write
|
||
502000
|
unkown
|
page readonly
|
||
19FF07B2000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
86D63E000
|
unkown
|
page readonly
|
||
19FEA37E000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
190C000
|
heap
|
page read and write
|
||
84D28FE000
|
unkown
|
page readonly
|
||
19FE906A000
|
trusted library allocation
|
page read and write
|
||
19FF0CBC000
|
trusted library allocation
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FEA399000
|
trusted library allocation
|
page read and write
|
||
19FF50EA000
|
trusted library allocation
|
page read and write
|
||
19FDF7AA000
|
heap
|
page read and write
|
||
19FDF7D5000
|
heap
|
page read and write
|
||
19FE807E000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEA744000
|
trusted library allocation
|
page read and write
|
||
19FE9B80000
|
trusted library allocation
|
page read and write
|
||
19FEBF46000
|
trusted library allocation
|
page read and write
|
||
19FEA4D9000
|
trusted library allocation
|
page read and write
|
||
19FDF746000
|
heap
|
page read and write
|
||
19FEA698000
|
trusted library allocation
|
page read and write
|
||
19FF0C43000
|
trusted library allocation
|
page read and write
|
||
2753ED50000
|
heap
|
page read and write
|
||
19FE9CB6000
|
trusted library allocation
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FE8C50000
|
trusted library allocation
|
page read and write
|
||
19FE9CC4000
|
trusted library allocation
|
page read and write
|
||
19FF0BA5000
|
trusted library allocation
|
page read and write
|
||
19FE89FB000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FF0C4A000
|
trusted library allocation
|
page read and write
|
||
19FEA5A9000
|
trusted library allocation
|
page read and write
|
||
19FEA3EF000
|
trusted library allocation
|
page read and write
|
||
19FE9CEA000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FE40BF000
|
trusted library allocation
|
page read and write
|
||
19FE9D8D000
|
trusted library allocation
|
page read and write
|
||
19FEA2E4000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF4F5B000
|
trusted library allocation
|
page read and write
|
||
19FE80D7000
|
heap
|
page read and write
|
||
19FF50C6000
|
trusted library allocation
|
page read and write
|
||
19FE9CB6000
|
trusted library allocation
|
page read and write
|
||
19FEA4AD000
|
trusted library allocation
|
page read and write
|
||
19FE9CAB000
|
trusted library allocation
|
page read and write
|
||
221FF69E000
|
heap
|
page read and write
|
||
19FE9CB6000
|
trusted library allocation
|
page read and write
|
||
2753F34D000
|
heap
|
page read and write
|
||
19FF0C98000
|
trusted library allocation
|
page read and write
|
||
19FE9806000
|
trusted library allocation
|
page read and write
|
||
19FE9AA9000
|
trusted library allocation
|
page read and write
|
||
19FEA4C3000
|
trusted library allocation
|
page read and write
|
||
2753F444000
|
heap
|
page read and write
|
||
19FE9246000
|
trusted library allocation
|
page read and write
|
||
19FF4F44000
|
trusted library allocation
|
page read and write
|
||
19FEA3D2000
|
trusted library allocation
|
page read and write
|
||
19FF0C68000
|
trusted library allocation
|
page read and write
|
||
19FDF74A000
|
heap
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
19FE90FA000
|
trusted library allocation
|
page read and write
|
||
19FEBF38000
|
trusted library allocation
|
page read and write
|
||
19FDF7A6000
|
heap
|
page read and write
|
||
19FDF789000
|
heap
|
page read and write
|
||
19FEA72C000
|
trusted library allocation
|
page read and write
|
||
22C75570000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
221FF69C000
|
heap
|
page read and write
|
||
19FF50F6000
|
trusted library allocation
|
page read and write
|
||
C7F270B000
|
stack
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE99E8000
|
trusted library allocation
|
page read and write
|
||
19FE40BF000
|
trusted library allocation
|
page read and write
|
||
19FEBE71000
|
trusted library allocation
|
page read and write
|
||
19FE8CFA000
|
trusted library allocation
|
page read and write
|
||
50C000
|
unkown
|
page read and write
|
||
19FDF762000
|
heap
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
19FEA2D4000
|
trusted library allocation
|
page read and write
|
||
19FEA4C3000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FF0600000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FE805F000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
22C75524000
|
trusted library allocation
|
page read and write
|
||
19FF07CB000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FF1DEF000
|
trusted library allocation
|
page read and write
|
||
19FF0A90000
|
trusted library allocation
|
page read and write
|
||
19FE9824000
|
trusted library allocation
|
page read and write
|
||
19FE6CDB000
|
trusted library allocation
|
page read and write
|
||
19FE92DA000
|
trusted library allocation
|
page read and write
|
||
19FE908B000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FE99C3000
|
trusted library allocation
|
page read and write
|
||
19FE91DF000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
1900000
|
heap
|
page read and write
|
||
19FE5653000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FF0749000
|
trusted library allocation
|
page read and write
|
||
19FE7E22000
|
trusted library allocation
|
page read and write
|
||
19FEA236000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FF0AD8000
|
trusted library allocation
|
page read and write
|
||
19FE4AD7000
|
trusted library allocation
|
page read and write
|
||
19FEBC68000
|
trusted library allocation
|
page read and write
|
||
1DB6D7A0000
|
trusted library allocation
|
page read and write
|
||
19FEB0D7000
|
trusted library allocation
|
page read and write
|
||
C7F52FE000
|
stack
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE928D000
|
trusted library allocation
|
page read and write
|
||
19FF098D000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF0A31000
|
trusted library allocation
|
page read and write
|
||
19FEA68F000
|
trusted library allocation
|
page read and write
|
||
19FF60FC000
|
trusted library allocation
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
19FEA3F9000
|
trusted library allocation
|
page read and write
|
||
19FEA3B8000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE9BF2000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FE99C3000
|
trusted library allocation
|
page read and write
|
||
19FEBCED000
|
trusted library allocation
|
page read and write
|
||
19FE9E05000
|
trusted library allocation
|
page read and write
|
||
19FF09E3000
|
trusted library allocation
|
page read and write
|
||
19FF1CBE000
|
trusted library allocation
|
page read and write
|
||
2753E748000
|
trusted library allocation
|
page read and write
|
||
19FEACF2000
|
trusted library allocation
|
page read and write
|
||
19FEA3D2000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FE853C000
|
trusted library allocation
|
page read and write
|
||
2753F3F1000
|
heap
|
page read and write
|
||
19FF12D7000
|
trusted library allocation
|
page read and write
|
||
19FF1E51000
|
trusted library allocation
|
page read and write
|
||
19FEA630000
|
trusted library allocation
|
page read and write
|
||
19FF0ADC000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FDF799000
|
heap
|
page read and write
|
||
1912000
|
heap
|
page read and write
|
||
19FE804F000
|
heap
|
page read and write
|
||
19FF07C8000
|
trusted library allocation
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FF0B24000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FEA2F7000
|
trusted library allocation
|
page read and write
|
||
19FF20FC000
|
trusted library allocation
|
page read and write
|
||
19FE8062000
|
heap
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FEBCDE000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FE9088000
|
trusted library allocation
|
page read and write
|
||
19FF2161000
|
trusted library allocation
|
page read and write
|
||
19FF2DA0000
|
trusted library allocation
|
page read and write
|
||
19FEA49C000
|
trusted library allocation
|
page read and write
|
||
19FE987B000
|
trusted library allocation
|
page read and write
|
||
19FE9E3C000
|
trusted library allocation
|
page read and write
|
||
19FEA660000
|
trusted library allocation
|
page read and write
|
||
19FDF750000
|
heap
|
page read and write
|
||
19FE9CA5000
|
trusted library allocation
|
page read and write
|
||
C7F4A3E000
|
stack
|
page read and write
|
||
22C7550C000
|
trusted library allocation
|
page read and write
|
||
19FDF738000
|
heap
|
page read and write
|
||
19FE5A22000
|
trusted library allocation
|
page read and write
|
||
19FF0A29000
|
trusted library allocation
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FEAADB000
|
trusted library allocation
|
page read and write
|
||
19FF06CD000
|
trusted library allocation
|
page read and write
|
||
19FE9031000
|
trusted library allocation
|
page read and write
|
||
19FE47D2000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FF0C7D000
|
trusted library allocation
|
page read and write
|
||
19FE92EE000
|
trusted library allocation
|
page read and write
|
||
19FE8081000
|
heap
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
1DB6D798000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FE80B4000
|
heap
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FE9888000
|
trusted library allocation
|
page read and write
|
||
19FDF78C000
|
heap
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FEA4AE000
|
trusted library allocation
|
page read and write
|
||
19FDF78E000
|
heap
|
page read and write
|
||
19FEB0BE000
|
trusted library allocation
|
page read and write
|
||
2753F3E6000
|
heap
|
page read and write
|
||
19FE8067000
|
heap
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
2753F468000
|
heap
|
page read and write
|
||
19FE5895000
|
trusted library allocation
|
page read and write
|
||
19FF05F0000
|
trusted library allocation
|
page read and write
|
||
19FEBF46000
|
trusted library allocation
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FDF73D000
|
heap
|
page read and write
|
||
19FE9BF2000
|
trusted library allocation
|
page read and write
|
||
19FEAAB4000
|
trusted library allocation
|
page read and write
|
||
19FE9954000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FDF78C000
|
heap
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
1DB6D918000
|
trusted library allocation
|
page read and write
|
||
19FEA4E2000
|
trusted library allocation
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
2753F3A1000
|
heap
|
page read and write
|
||
19FF07C4000
|
trusted library allocation
|
page read and write
|
||
1DB6D470000
|
heap
|
page readonly
|
||
19FEBCC5000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEC138000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF07DB000
|
trusted library allocation
|
page read and write
|
||
19FEA4B1000
|
trusted library allocation
|
page read and write
|
||
19FF0C8B000
|
trusted library allocation
|
page read and write
|
||
19FE91F2000
|
trusted library allocation
|
page read and write
|
||
19FEA620000
|
trusted library allocation
|
page read and write
|
||
19FDF73D000
|
heap
|
page read and write
|
||
19FEA3CC000
|
trusted library allocation
|
page read and write
|
||
19FF2185000
|
trusted library allocation
|
page read and write
|
||
19FE40F9000
|
trusted library allocation
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
86EEBE000
|
stack
|
page read and write
|
||
19FDF78C000
|
heap
|
page read and write
|
||
19FEBC22000
|
trusted library allocation
|
page read and write
|
||
19FDF730000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FEA6C5000
|
trusted library allocation
|
page read and write
|
||
19FF0593000
|
trusted library allocation
|
page read and write
|
||
19FEA3A6000
|
trusted library allocation
|
page read and write
|
||
19FF09EE000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FF4ADE000
|
trusted library allocation
|
page read and write
|
||
19FE99F6000
|
trusted library allocation
|
page read and write
|
||
19FE6CF9000
|
trusted library allocation
|
page read and write
|
||
221FEEEB000
|
heap
|
page read and write
|
||
19FEA379000
|
trusted library allocation
|
page read and write
|
||
19FEA67B000
|
trusted library allocation
|
page read and write
|
||
19FF5351000
|
trusted library allocation
|
page read and write
|
||
19FDF799000
|
heap
|
page read and write
|
||
19FE995A000
|
trusted library allocation
|
page read and write
|
||
19FE8487000
|
trusted library allocation
|
page read and write
|
||
19FE849D000
|
trusted library allocation
|
page read and write
|
||
19FF1DB4000
|
trusted library allocation
|
page read and write
|
||
19FF1EF1000
|
trusted library allocation
|
page read and write
|
||
19FE8B81000
|
trusted library allocation
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
19FE9097000
|
trusted library allocation
|
page read and write
|
||
19FE6CE2000
|
trusted library allocation
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FF088C000
|
trusted library allocation
|
page read and write
|
||
19FE980B000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FF1DEC000
|
trusted library allocation
|
page read and write
|
||
1914000
|
heap
|
page read and write
|
||
19FE868B000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE9E50000
|
trusted library allocation
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FE9CC6000
|
trusted library allocation
|
page read and write
|
||
19FF073E000
|
trusted library allocation
|
page read and write
|
||
19FF082B000
|
trusted library allocation
|
page read and write
|
||
19FF0CF4000
|
trusted library allocation
|
page read and write
|
||
19FE9CDF000
|
trusted library allocation
|
page read and write
|
||
19FF4B71000
|
heap
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
2753E772000
|
trusted library allocation
|
page read and write
|
||
19FE9084000
|
trusted library allocation
|
page read and write
|
||
2753F468000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEA4A6000
|
trusted library allocation
|
page read and write
|
||
19FF4A84000
|
trusted library allocation
|
page read and write
|
||
19FE9D55000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FE807E000
|
heap
|
page read and write
|
||
19FF2224000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
2753F3E1000
|
heap
|
page read and write
|
||
2753F36C000
|
heap
|
page read and write
|
||
19FE80A8000
|
heap
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FEBCE2000
|
trusted library allocation
|
page read and write
|
||
19FEBFD6000
|
trusted library allocation
|
page read and write
|
||
19FF09DF000
|
trusted library allocation
|
page read and write
|
||
19FF12CE000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE9285000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FE6C39000
|
trusted library allocation
|
page read and write
|
||
19FF4B0B000
|
heap
|
page read and write
|
||
19FE9AEF000
|
trusted library allocation
|
page read and write
|
||
19FF46DD000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FF05B7000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
22C75573000
|
trusted library allocation
|
page read and write
|
||
19FE98BE000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FE9CDF000
|
trusted library allocation
|
page read and write
|
||
86D5FE000
|
unkown
|
page readonly
|
||
19FE86D8000
|
trusted library allocation
|
page read and write
|
||
19FEA76A000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FE90D8000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE7E84000
|
trusted library allocation
|
page read and write
|
||
19FF0639000
|
trusted library allocation
|
page read and write
|
||
19FEC163000
|
trusted library allocation
|
page read and write
|
||
22C7555F000
|
trusted library allocation
|
page read and write
|
||
1DB6DA00000
|
heap
|
page read and write
|
||
1903000
|
heap
|
page read and write
|
||
19FEA281000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FF0CC2000
|
trusted library allocation
|
page read and write
|
||
19FE86BB000
|
trusted library allocation
|
page read and write
|
||
19FF4AF0000
|
trusted library allocation
|
page read and write
|
||
19FF07CB000
|
trusted library allocation
|
page read and write
|
||
19FEA27D000
|
trusted library allocation
|
page read and write
|
||
19FE86D1000
|
trusted library allocation
|
page read and write
|
||
19FDF78C000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE40C9000
|
trusted library allocation
|
page read and write
|
||
19FE9CD8000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FEA3A0000
|
trusted library allocation
|
page read and write
|
||
19FEA4AB000
|
trusted library allocation
|
page read and write
|
||
19FF0BF3000
|
trusted library allocation
|
page read and write
|
||
C7F27CE000
|
unkown
|
page readonly
|
||
19FF09D9000
|
trusted library allocation
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FEB179000
|
trusted library allocation
|
page read and write
|
||
19FF067B000
|
trusted library allocation
|
page read and write
|
||
19FEABFE000
|
trusted library allocation
|
page read and write
|
||
19FF0BD9000
|
trusted library allocation
|
page read and write
|
||
19FE86A1000
|
trusted library allocation
|
page read and write
|
||
19FF5C3B000
|
trusted library allocation
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FE90B2000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FEA2B5000
|
trusted library allocation
|
page read and write
|
||
19FEB0A8000
|
trusted library allocation
|
page read and write
|
||
19FDF737000
|
heap
|
page read and write
|
||
19FF4BBC000
|
heap
|
page read and write
|
||
19FEA2FD000
|
trusted library allocation
|
page read and write
|
||
19FEA4A0000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
1913000
|
heap
|
page read and write
|
||
19FE8066000
|
heap
|
page read and write
|
||
19FEA2D4000
|
trusted library allocation
|
page read and write
|
||
C7F4A7E000
|
unkown
|
page readonly
|
||
19FEA3FD000
|
trusted library allocation
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FE86BF000
|
trusted library allocation
|
page read and write
|
||
19FEABD0000
|
trusted library allocation
|
page read and write
|
||
19FEA4C3000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEC200000
|
trusted library allocation
|
page read and write
|
||
19FF5C61000
|
trusted library allocation
|
page read and write
|
||
19FDF7A6000
|
heap
|
page read and write
|
||
19FE5906000
|
trusted library allocation
|
page read and write
|
||
19FE4776000
|
trusted library allocation
|
page read and write
|
||
19FEA6F2000
|
trusted library allocation
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
19FDF762000
|
heap
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FEA4A0000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FF0ECD000
|
trusted library allocation
|
page read and write
|
||
19FE4AB5000
|
trusted library allocation
|
page read and write
|
||
2753E34F000
|
remote allocation
|
page execute read
|
||
19FEA2A4000
|
trusted library allocation
|
page read and write
|
||
19FE9EF8000
|
trusted library allocation
|
page read and write
|
||
19FF2201000
|
trusted library allocation
|
page read and write
|
||
19FDF7B1000
|
heap
|
page read and write
|
||
19FDF7A6000
|
heap
|
page read and write
|
||
1DB6D800000
|
unclassified section
|
page readonly
|
||
19FF0CA6000
|
trusted library allocation
|
page read and write
|
||
19FE865A000
|
trusted library allocation
|
page read and write
|
||
22C75703000
|
trusted library allocation
|
page read and write
|
||
19FEA3F4000
|
trusted library allocation
|
page read and write
|
||
19FE58B4000
|
trusted library allocation
|
page read and write
|
||
19FE8B6B000
|
trusted library allocation
|
page read and write
|
||
19FDF737000
|
heap
|
page read and write
|
||
19FE80BA000
|
heap
|
page read and write
|
||
19FE599D000
|
trusted library allocation
|
page read and write
|
||
19FEA5E2000
|
trusted library allocation
|
page read and write
|
||
19FE86BB000
|
trusted library allocation
|
page read and write
|
||
19FE9DFC000
|
trusted library allocation
|
page read and write
|
||
19FE9964000
|
trusted library allocation
|
page read and write
|
||
19FE8093000
|
heap
|
page read and write
|
||
19FF0A97000
|
trusted library allocation
|
page read and write
|
||
19FE9CDF000
|
trusted library allocation
|
page read and write
|
||
19FF0991000
|
trusted library allocation
|
page read and write
|
||
19FF1DEC000
|
trusted library allocation
|
page read and write
|
||
19FE9CDF000
|
trusted library allocation
|
page read and write
|
||
19FEA3D2000
|
trusted library allocation
|
page read and write
|
||
19FE9CCE000
|
trusted library allocation
|
page read and write
|
||
19FE9CC6000
|
trusted library allocation
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
22C755C4000
|
trusted library allocation
|
page read and write
|
||
41C1000
|
heap
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FE581E000
|
trusted library allocation
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
19FF4B7E000
|
heap
|
page read and write
|
||
19FF078C000
|
trusted library allocation
|
page read and write
|
||
19FE6C51000
|
trusted library allocation
|
page read and write
|
||
19FEA2D1000
|
trusted library allocation
|
page read and write
|
||
19FE9CC4000
|
trusted library allocation
|
page read and write
|
||
19FF099F000
|
trusted library allocation
|
page read and write
|
||
19FF50C8000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF534B000
|
trusted library allocation
|
page read and write
|
||
19FE80A1000
|
heap
|
page read and write
|
||
19FEBF46000
|
trusted library allocation
|
page read and write
|
||
1DB6D330000
|
unclassified section
|
page readonly
|
||
19FF0C73000
|
trusted library allocation
|
page read and write
|
||
19FE8090000
|
heap
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FDF789000
|
heap
|
page read and write
|
||
19FDF737000
|
heap
|
page read and write
|
||
19FEABDA000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
221FEEC0000
|
heap
|
page read and write
|
||
19FDF79C000
|
heap
|
page read and write
|
||
19FF09A2000
|
trusted library allocation
|
page read and write
|
||
19FEB1AA000
|
trusted library allocation
|
page read and write
|
||
19FDF74D000
|
heap
|
page read and write
|
||
2753F3F2000
|
heap
|
page read and write
|
||
22C7558F000
|
trusted library allocation
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
19FF0AD2000
|
trusted library allocation
|
page read and write
|
||
19FEA3EB000
|
trusted library allocation
|
page read and write
|
||
19FDF7AF000
|
heap
|
page read and write
|
||
19FF4B36000
|
heap
|
page read and write
|
||
19FE91DF000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FEBF5D000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FE9818000
|
trusted library allocation
|
page read and write
|
||
19FDF752000
|
heap
|
page read and write
|
||
19FDF764000
|
heap
|
page read and write
|
||
19FE89E9000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEA741000
|
trusted library allocation
|
page read and write
|
||
19FF0CF7000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FEA3D9000
|
trusted library allocation
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
19FE9093000
|
trusted library allocation
|
page read and write
|
||
19FEA716000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FE8095000
|
heap
|
page read and write
|
||
19FE9252000
|
trusted library allocation
|
page read and write
|
||
19FE868B000
|
trusted library allocation
|
page read and write
|
||
2753F3F1000
|
heap
|
page read and write
|
||
19FF0CFE000
|
trusted library allocation
|
page read and write
|
||
19FEB092000
|
trusted library allocation
|
page read and write
|
||
19FEBBF2000
|
trusted library allocation
|
page read and write
|
||
19FDF7A6000
|
heap
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FF0994000
|
trusted library allocation
|
page read and write
|
||
161B000
|
stack
|
page read and write
|
||
19FF0BFA000
|
trusted library allocation
|
page read and write
|
||
19FE98C3000
|
trusted library allocation
|
page read and write
|
||
2753E7C7000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF21CA000
|
trusted library allocation
|
page read and write
|
||
19FF50B8000
|
trusted library allocation
|
page read and write
|
||
19FE84CC000
|
trusted library allocation
|
page read and write
|
||
19FE863D000
|
trusted library allocation
|
page read and write
|
||
19FF21B1000
|
trusted library allocation
|
page read and write
|
||
22C75090000
|
unclassified section
|
page readonly
|
||
1B789270000
|
heap
|
page read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
19FE8BC5000
|
trusted library allocation
|
page read and write
|
||
19FF0AD2000
|
trusted library allocation
|
page read and write
|
||
2753E745000
|
trusted library allocation
|
page read and write
|
||
19FF4AB0000
|
trusted library allocation
|
page read and write
|
||
19FF0CF2000
|
trusted library allocation
|
page read and write
|
||
19FF20BA000
|
trusted library allocation
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FF2DED000
|
trusted library allocation
|
page read and write
|
||
19FE8683000
|
trusted library allocation
|
page read and write
|
||
19FE9093000
|
trusted library allocation
|
page read and write
|
||
19FF098E000
|
trusted library allocation
|
page read and write
|
||
19FE9B64000
|
trusted library allocation
|
page read and write
|
||
19FE40CB000
|
trusted library allocation
|
page read and write
|
||
19FEA7C8000
|
trusted library allocation
|
page read and write
|
||
19FF2189000
|
trusted library allocation
|
page read and write
|
||
19FE99F6000
|
trusted library allocation
|
page read and write
|
||
19FF0C68000
|
trusted library allocation
|
page read and write
|
||
19FE92E9000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
19FE8066000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FEA76A000
|
trusted library allocation
|
page read and write
|
||
C7F31D8000
|
stack
|
page read and write
|
||
19FF07E0000
|
trusted library allocation
|
page read and write
|
||
19FEB0C0000
|
trusted library allocation
|
page read and write
|
||
19FE9E3C000
|
trusted library allocation
|
page read and write
|
||
19FE9A60000
|
trusted library allocation
|
page read and write
|
||
19FE5996000
|
trusted library allocation
|
page read and write
|
||
2753F3EA000
|
heap
|
page read and write
|
||
86A3DE000
|
stack
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE8064000
|
heap
|
page read and write
|
||
19FF096F000
|
trusted library allocation
|
page read and write
|
||
19FE987B000
|
trusted library allocation
|
page read and write
|
||
19FE9E3C000
|
trusted library allocation
|
page read and write
|
||
19FEB03B000
|
trusted library allocation
|
page read and write
|
||
2753F37D000
|
heap
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE891E000
|
trusted library allocation
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
19FE9EDB000
|
trusted library allocation
|
page read and write
|
||
19FF06BF000
|
trusted library allocation
|
page read and write
|
||
19FF1DF7000
|
trusted library allocation
|
page read and write
|
||
19FF50EE000
|
trusted library allocation
|
page read and write
|
||
19FEB0B6000
|
trusted library allocation
|
page read and write
|
||
19FE561E000
|
trusted library allocation
|
page read and write
|
||
19FE9986000
|
trusted library allocation
|
page read and write
|
||
19FF61F9000
|
trusted library allocation
|
page read and write
|
||
19FE98D9000
|
trusted library allocation
|
page read and write
|
||
19FE5A35000
|
trusted library allocation
|
page read and write
|
||
19FF1DEA000
|
trusted library allocation
|
page read and write
|
||
19FE91EF000
|
trusted library allocation
|
page read and write
|
||
19FDF730000
|
heap
|
page read and write
|
||
19FE9B27000
|
trusted library allocation
|
page read and write
|
||
19FDF789000
|
heap
|
page read and write
|
||
19FEBEBC000
|
trusted library allocation
|
page read and write
|
||
19FF05DA000
|
trusted library allocation
|
page read and write
|
||
19FF0C4C000
|
trusted library allocation
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
1DB6D70B000
|
trusted library allocation
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FE563F000
|
trusted library allocation
|
page read and write
|
||
19FDF75C000
|
heap
|
page read and write
|
||
19FF57AD000
|
trusted library allocation
|
page read and write
|
||
19FEA339000
|
trusted library allocation
|
page read and write
|
||
19FDF759000
|
heap
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FE6C33000
|
trusted library allocation
|
page read and write
|
||
19FE900C000
|
trusted library allocation
|
page read and write
|
||
2753F458000
|
heap
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FEACF8000
|
trusted library allocation
|
page read and write
|
||
19FE9041000
|
trusted library allocation
|
page read and write
|
||
19FEA794000
|
trusted library allocation
|
page read and write
|
||
19FEBC57000
|
trusted library allocation
|
page read and write
|
||
19FEA315000
|
trusted library allocation
|
page read and write
|
||
19FE9BB0000
|
trusted library allocation
|
page read and write
|
||
19FF50F6000
|
trusted library allocation
|
page read and write
|
||
2753F3FD000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE80AA000
|
heap
|
page read and write
|
||
19FEA2F7000
|
trusted library allocation
|
page read and write
|
||
19FE868B000
|
trusted library allocation
|
page read and write
|
||
19FEB184000
|
trusted library allocation
|
page read and write
|
||
19FE9B95000
|
trusted library allocation
|
page read and write
|
||
19FE4AD0000
|
trusted library allocation
|
page read and write
|
||
19FF0ADA000
|
trusted library allocation
|
page read and write
|
||
19FEA4D0000
|
trusted library allocation
|
page read and write
|
||
19FF0B20000
|
trusted library allocation
|
page read and write
|
||
19FE86A4000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FE9E43000
|
trusted library allocation
|
page read and write
|
||
19FE9285000
|
trusted library allocation
|
page read and write
|
||
22C755D7000
|
trusted library allocation
|
page read and write
|
||
19FE588C000
|
trusted library allocation
|
page read and write
|
||
19FDF751000
|
heap
|
page read and write
|
||
19FEA4F9000
|
trusted library allocation
|
page read and write
|
||
19FE6CDD000
|
trusted library allocation
|
page read and write
|
||
19FE58B8000
|
trusted library allocation
|
page read and write
|
||
19FDF752000
|
heap
|
page read and write
|
||
19FF0879000
|
trusted library allocation
|
page read and write
|
||
19FE9B43000
|
trusted library allocation
|
page read and write
|
||
19FF07DB000
|
trusted library allocation
|
page read and write
|
||
19FF46C4000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF6161000
|
trusted library allocation
|
page read and write
|
||
19FF1DEC000
|
trusted library allocation
|
page read and write
|
||
19FEA620000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
1DB6D7A3000
|
trusted library allocation
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
19FE9A11000
|
trusted library allocation
|
page read and write
|
||
19FF0C31000
|
trusted library allocation
|
page read and write
|
||
19FE8085000
|
heap
|
page read and write
|
||
19FF1E82000
|
trusted library allocation
|
page read and write
|
||
19FDF78E000
|
heap
|
page read and write
|
||
19FEA5E8000
|
trusted library allocation
|
page read and write
|
||
19FE9B4A000
|
trusted library allocation
|
page read and write
|
||
19FF09E3000
|
trusted library allocation
|
page read and write
|
||
19FEAA3E000
|
trusted library allocation
|
page read and write
|
||
19FE857F000
|
trusted library allocation
|
page read and write
|
||
19FF0AA3000
|
trusted library allocation
|
page read and write
|
||
19FE996B000
|
trusted library allocation
|
page read and write
|
||
19FE9BBA000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE89FB000
|
trusted library allocation
|
page read and write
|
||
19FEA20B000
|
trusted library allocation
|
page read and write
|
||
19FE986E000
|
trusted library allocation
|
page read and write
|
||
19FF06C7000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FF09FA000
|
trusted library allocation
|
page read and write
|
||
19FEA4D9000
|
trusted library allocation
|
page read and write
|
||
19FE7E25000
|
trusted library allocation
|
page read and write
|
||
19FF0976000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
3CB0000
|
heap
|
page read and write
|
||
19FF46CF000
|
trusted library allocation
|
page read and write
|
||
19FF07DB000
|
trusted library allocation
|
page read and write
|
||
19FDF753000
|
heap
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
19FE58DC000
|
trusted library allocation
|
page read and write
|
||
19FE4A95000
|
trusted library allocation
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
19FF0C89000
|
trusted library allocation
|
page read and write
|
||
19FF0BF7000
|
trusted library allocation
|
page read and write
|
||
19FF0893000
|
trusted library allocation
|
page read and write
|
||
19FE84AF000
|
trusted library allocation
|
page read and write
|
||
19FF5311000
|
trusted library allocation
|
page read and write
|
||
19FE80AA000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FEBCE2000
|
trusted library allocation
|
page read and write
|
||
19FE8BE9000
|
trusted library allocation
|
page read and write
|
||
19FE9EA7000
|
trusted library allocation
|
page read and write
|
||
19FEB1B9000
|
trusted library allocation
|
page read and write
|
||
19FF1E4D000
|
trusted library allocation
|
page read and write
|
||
19FEBC40000
|
trusted library allocation
|
page read and write
|
||
19FE9BF7000
|
trusted library allocation
|
page read and write
|
||
19FF0CA6000
|
trusted library allocation
|
page read and write
|
||
19FE5889000
|
trusted library allocation
|
page read and write
|
||
19FDF761000
|
heap
|
page read and write
|
||
19FF46FC000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FE849A000
|
trusted library allocation
|
page read and write
|
||
19FF46C6000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF07ED000
|
trusted library allocation
|
page read and write
|
||
19FF0C6F000
|
trusted library allocation
|
page read and write
|
||
19FF2224000
|
trusted library allocation
|
page read and write
|
||
1DB6D723000
|
trusted library allocation
|
page read and write
|
||
19FE6CBD000
|
trusted library allocation
|
page read and write
|
||
19FF0BAB000
|
trusted library allocation
|
page read and write
|
||
19FE80C3000
|
heap
|
page read and write
|
||
19FE98DE000
|
trusted library allocation
|
page read and write
|
||
19FF0723000
|
trusted library allocation
|
page read and write
|
||
2753F42A000
|
heap
|
page read and write
|
||
19FE5969000
|
trusted library allocation
|
page read and write
|
||
19FF0BB0000
|
trusted library allocation
|
page read and write
|
||
A6B11FF000
|
stack
|
page read and write
|
||
221FF207000
|
trusted library allocation
|
page read and write
|
||
19FE4A24000
|
trusted library allocation
|
page read and write
|
||
19FE9027000
|
trusted library allocation
|
page read and write
|
||
1DB6D3D0000
|
heap
|
page read and write
|
||
19FE7E69000
|
trusted library allocation
|
page read and write
|
||
19FF4ADE000
|
trusted library allocation
|
page read and write
|
||
19FF5323000
|
trusted library allocation
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FF12EC000
|
trusted library allocation
|
page read and write
|
||
19FE9B87000
|
trusted library allocation
|
page read and write
|
||
19FE995E000
|
trusted library allocation
|
page read and write
|
||
19FE80A1000
|
heap
|
page read and write
|
||
19FE9C8D000
|
trusted library allocation
|
page read and write
|
||
19FE8434000
|
trusted library allocation
|
page read and write
|
||
19FF46EA000
|
trusted library allocation
|
page read and write
|
||
19FEA2A5000
|
trusted library allocation
|
page read and write
|
||
2753F300000
|
heap
|
page read and write
|
||
19FE9E69000
|
trusted library allocation
|
page read and write
|
||
19FEA4C3000
|
trusted library allocation
|
page read and write
|
||
19FE9CDF000
|
trusted library allocation
|
page read and write
|
||
19FE9E02000
|
trusted library allocation
|
page read and write
|
||
19FEA9E5000
|
trusted library allocation
|
page read and write
|
||
19FE4A63000
|
trusted library allocation
|
page read and write
|
||
19FEA205000
|
trusted library allocation
|
page read and write
|
||
19FE9CB1000
|
trusted library allocation
|
page read and write
|
||
19FF2DE0000
|
trusted library allocation
|
page read and write
|
||
19FE9AF6000
|
trusted library allocation
|
page read and write
|
||
514000
|
unkown
|
page readonly
|
||
19FEA4A0000
|
trusted library allocation
|
page read and write
|
||
19FEA23A000
|
trusted library allocation
|
page read and write
|
||
19FE92AA000
|
trusted library allocation
|
page read and write
|
||
19FE8E66000
|
trusted library allocation
|
page read and write
|
||
19FF4F19000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF4AF0000
|
trusted library allocation
|
page read and write
|
||
2753E781000
|
trusted library allocation
|
page read and write
|
||
19FF12CE000
|
trusted library allocation
|
page read and write
|
||
19FF05E2000
|
trusted library allocation
|
page read and write
|
||
1DB6D710000
|
trusted library allocation
|
page read and write
|
||
19FF0CF4000
|
trusted library allocation
|
page read and write
|
||
19FE8573000
|
trusted library allocation
|
page read and write
|
||
19FE6CE5000
|
trusted library allocation
|
page read and write
|
||
19FE8491000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FEBC57000
|
trusted library allocation
|
page read and write
|
||
2753F35C000
|
heap
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FF085E000
|
trusted library allocation
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
2753F36C000
|
heap
|
page read and write
|
||
2753F477000
|
heap
|
page read and write
|
||
19FEBF9F000
|
trusted library allocation
|
page read and write
|
||
19FEBF58000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEBCFB000
|
trusted library allocation
|
page read and write
|
||
19FF05DE000
|
trusted library allocation
|
page read and write
|
||
19FE8080000
|
heap
|
page read and write
|
||
19FE471E000
|
trusted library allocation
|
page read and write
|
||
19FE59C7000
|
trusted library allocation
|
page read and write
|
||
19FF0611000
|
trusted library allocation
|
page read and write
|
||
19FEB0D1000
|
trusted library allocation
|
page read and write
|
||
19FE8474000
|
trusted library allocation
|
page read and write
|
||
19FE9A83000
|
trusted library allocation
|
page read and write
|
||
19FE86B8000
|
trusted library allocation
|
page read and write
|
||
19FF0851000
|
trusted library allocation
|
page read and write
|
||
19FED301000
|
trusted library allocation
|
page read and write
|
||
19FEB03B000
|
trusted library allocation
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FEBC42000
|
trusted library allocation
|
page read and write
|
||
19FF064D000
|
trusted library allocation
|
page read and write
|
||
19FF0CF0000
|
trusted library allocation
|
page read and write
|
||
19FE9EE2000
|
trusted library allocation
|
page read and write
|
||
19FE7ECF000
|
trusted library allocation
|
page read and write
|
||
19FF067F000
|
trusted library allocation
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE91F6000
|
trusted library allocation
|
page read and write
|
||
19FEBF5D000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
22C75707000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FE8999000
|
trusted library allocation
|
page read and write
|
||
19FDF76A000
|
heap
|
page read and write
|
||
19FEA34C000
|
trusted library allocation
|
page read and write
|
||
19FE9AE7000
|
trusted library allocation
|
page read and write
|
||
19FE9B23000
|
trusted library allocation
|
page read and write
|
||
19FEA359000
|
trusted library allocation
|
page read and write
|
||
19FEA3BF000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FEC16C000
|
trusted library allocation
|
page read and write
|
||
19FEA2C2000
|
trusted library allocation
|
page read and write
|
||
19FEA3FC000
|
trusted library allocation
|
page read and write
|
||
19FEA2AB000
|
trusted library allocation
|
page read and write
|
||
19FDF7A6000
|
heap
|
page read and write
|
||
19FE86CC000
|
trusted library allocation
|
page read and write
|
||
19FF0C66000
|
trusted library allocation
|
page read and write
|
||
19FEA4E0000
|
trusted library allocation
|
page read and write
|
||
19FE857C000
|
trusted library allocation
|
page read and write
|
||
19FE9023000
|
trusted library allocation
|
page read and write
|
||
19FE6CD1000
|
trusted library allocation
|
page read and write
|
||
19FF07BC000
|
trusted library allocation
|
page read and write
|
||
22C75070000
|
remote allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF0EF4000
|
trusted library allocation
|
page read and write
|
||
19FE9065000
|
trusted library allocation
|
page read and write
|
||
19FF1DF1000
|
trusted library allocation
|
page read and write
|
||
19FF07FE000
|
trusted library allocation
|
page read and write
|
||
19FF4F48000
|
trusted library allocation
|
page read and write
|
||
19FEA720000
|
trusted library allocation
|
page read and write
|
||
19FF4F37000
|
trusted library allocation
|
page read and write
|
||
19FF61FC000
|
trusted library allocation
|
page read and write
|
||
19FF0C85000
|
trusted library allocation
|
page read and write
|
||
19FF05A5000
|
trusted library allocation
|
page read and write
|
||
2753F3EA000
|
heap
|
page read and write
|
||
19FF0EE1000
|
trusted library allocation
|
page read and write
|
||
441000
|
unkown
|
page execute read
|
||
19FEA281000
|
trusted library allocation
|
page read and write
|
||
19FEBF46000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
1DB6D921000
|
trusted library allocation
|
page read and write
|
||
19FE9CF4000
|
trusted library allocation
|
page read and write
|
||
19FE898E000
|
trusted library allocation
|
page read and write
|
||
19FF2DA8000
|
trusted library allocation
|
page read and write
|
||
19FE4098000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
1926000
|
heap
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FF4A9F000
|
trusted library allocation
|
page read and write
|
||
19FE46F6000
|
trusted library allocation
|
page read and write
|
||
C7F274E000
|
unkown
|
page readonly
|
||
19FE409E000
|
trusted library allocation
|
page read and write
|
||
19FE5954000
|
trusted library allocation
|
page read and write
|
||
1DB6D463000
|
heap
|
page read and write
|
||
19FE9084000
|
trusted library allocation
|
page read and write
|
||
19FE9CD3000
|
trusted library allocation
|
page read and write
|
||
19FDF76D000
|
heap
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FDF746000
|
heap
|
page read and write
|
||
19FE56DA000
|
trusted library allocation
|
page read and write
|
||
2753F477000
|
heap
|
page read and write
|
||
19FE86C1000
|
trusted library allocation
|
page read and write
|
||
19FEB094000
|
trusted library allocation
|
page read and write
|
||
19FE994A000
|
trusted library allocation
|
page read and write
|
||
19FE9258000
|
trusted library allocation
|
page read and write
|
||
19FF2159000
|
trusted library allocation
|
page read and write
|
||
19FDF759000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE995A000
|
trusted library allocation
|
page read and write
|
||
2753F479000
|
heap
|
page read and write
|
||
19FE8474000
|
trusted library allocation
|
page read and write
|
||
19FF0C73000
|
trusted library allocation
|
page read and write
|
||
19FE9ACA000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
84D20FE000
|
stack
|
page read and write
|
||
19FF50AB000
|
trusted library allocation
|
page read and write
|
||
19FE8692000
|
trusted library allocation
|
page read and write
|
||
19FEAAA5000
|
trusted library allocation
|
page read and write
|
||
22C7555D000
|
trusted library allocation
|
page read and write
|
||
19FEA3DC000
|
trusted library allocation
|
page read and write
|
||
2753F43B000
|
heap
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FEA741000
|
trusted library allocation
|
page read and write
|
||
19FE9818000
|
trusted library allocation
|
page read and write
|
||
19FE9DAE000
|
trusted library allocation
|
page read and write
|
||
19FE925A000
|
trusted library allocation
|
page read and write
|
||
19FE9CB6000
|
trusted library allocation
|
page read and write
|
||
19FE984B000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FE56E1000
|
trusted library allocation
|
page read and write
|
||
19FEA3B5000
|
trusted library allocation
|
page read and write
|
||
19FEA3A2000
|
trusted library allocation
|
page read and write
|
||
19FE80B6000
|
heap
|
page read and write
|
||
19FEA5E8000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FE59EB000
|
trusted library allocation
|
page read and write
|
||
86A31B000
|
stack
|
page read and write
|
||
1DB6D8E0000
|
heap
|
page read and write
|
||
19FE9CDC000
|
trusted library allocation
|
page read and write
|
||
19FF4B36000
|
heap
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
190B000
|
heap
|
page read and write
|
||
19FF07DF000
|
trusted library allocation
|
page read and write
|
||
19FE9D95000
|
trusted library allocation
|
page read and write
|
||
19FF0ED5000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE9CD8000
|
trusted library allocation
|
page read and write
|
||
19FF09E3000
|
trusted library allocation
|
page read and write
|
||
19FEA2E4000
|
trusted library allocation
|
page read and write
|
||
19FEA46D000
|
trusted library allocation
|
page read and write
|
||
19FE8583000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FE9A35000
|
trusted library allocation
|
page read and write
|
||
19FE9AB1000
|
trusted library allocation
|
page read and write
|
||
19FE9254000
|
trusted library allocation
|
page read and write
|
||
19FE80B4000
|
heap
|
page read and write
|
||
1B7CFD61000
|
trusted library allocation
|
page execute read
|
||
19FEA45B000
|
trusted library allocation
|
page read and write
|
||
19FDF764000
|
heap
|
page read and write
|
||
19FE9A4A000
|
trusted library allocation
|
page read and write
|
||
19FE9E10000
|
trusted library allocation
|
page read and write
|
||
19FEA5CA000
|
trusted library allocation
|
page read and write
|
||
19FEC169000
|
trusted library allocation
|
page read and write
|
||
19FEBCC8000
|
trusted library allocation
|
page read and write
|
||
19FE9BB3000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FEA3BE000
|
trusted library allocation
|
page read and write
|
||
19FEC155000
|
trusted library allocation
|
page read and write
|
||
19FEBFCA000
|
trusted library allocation
|
page read and write
|
||
19FE908E000
|
trusted library allocation
|
page read and write
|
||
1DB6D913000
|
trusted library allocation
|
page read and write
|
||
19FF12CA000
|
trusted library allocation
|
page read and write
|
||
19FF0C76000
|
trusted library allocation
|
page read and write
|
||
19FF5C04000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FEA69E000
|
trusted library allocation
|
page read and write
|
||
19FF092C000
|
trusted library allocation
|
page read and write
|
||
19FE9B2C000
|
trusted library allocation
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FEA3F3000
|
trusted library allocation
|
page read and write
|
||
19FEA2CC000
|
trusted library allocation
|
page read and write
|
||
19FEA499000
|
trusted library allocation
|
page read and write
|
||
19FF0CC2000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE4717000
|
trusted library allocation
|
page read and write
|
||
19FE8664000
|
trusted library allocation
|
page read and write
|
||
19FF2118000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FF06A4000
|
trusted library allocation
|
page read and write
|
||
19FF46FC000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE80A1000
|
heap
|
page read and write
|
||
19FE9D87000
|
trusted library allocation
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
19FF5C83000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
19FE9D67000
|
trusted library allocation
|
page read and write
|
||
2753F217000
|
trusted library allocation
|
page read and write
|
||
19FE9EFC000
|
trusted library allocation
|
page read and write
|
||
190E000
|
heap
|
page read and write
|
||
19FEBFF3000
|
trusted library allocation
|
page read and write
|
||
2753E703000
|
trusted library allocation
|
page read and write
|
||
19FE849F000
|
trusted library allocation
|
page read and write
|
||
19FF05DA000
|
trusted library allocation
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FEA261000
|
trusted library allocation
|
page read and write
|
||
2753F364000
|
heap
|
page read and write
|
||
19FF0AFE000
|
trusted library allocation
|
page read and write
|
||
19FE98C2000
|
trusted library allocation
|
page read and write
|
||
19FF0B17000
|
trusted library allocation
|
page read and write
|
||
19FE8081000
|
heap
|
page read and write
|
||
19FE9D7F000
|
trusted library allocation
|
page read and write
|
||
19FE4671000
|
trusted library allocation
|
page read and write
|
||
19FEBC33000
|
trusted library allocation
|
page read and write
|
||
19FF4F37000
|
trusted library allocation
|
page read and write
|
||
19FE8587000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FDF759000
|
heap
|
page read and write
|
||
19FEA3B8000
|
trusted library allocation
|
page read and write
|
||
19FEA3C8000
|
trusted library allocation
|
page read and write
|
||
19FF0C39000
|
trusted library allocation
|
page read and write
|
||
19FE9A73000
|
trusted library allocation
|
page read and write
|
||
19FE9EFC000
|
trusted library allocation
|
page read and write
|
||
19FE92AA000
|
trusted library allocation
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FEA37D000
|
trusted library allocation
|
page read and write
|
||
19FE80D7000
|
heap
|
page read and write
|
||
19FEA4EB000
|
trusted library allocation
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
19FEA6C5000
|
trusted library allocation
|
page read and write
|
||
19FF2166000
|
trusted library allocation
|
page read and write
|
||
19FF0BE2000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FEA3CF000
|
trusted library allocation
|
page read and write
|
||
22C75240000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FEA3C1000
|
trusted library allocation
|
page read and write
|
||
19FEA3F3000
|
trusted library allocation
|
page read and write
|
||
2753F42A000
|
heap
|
page read and write
|
||
19FE5A2A000
|
trusted library allocation
|
page read and write
|
||
19FE9B29000
|
trusted library allocation
|
page read and write
|
||
19FE9DB9000
|
trusted library allocation
|
page read and write
|
||
19FF0726000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FE8095000
|
heap
|
page read and write
|
||
22C75513000
|
trusted library allocation
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE8497000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE89D9000
|
trusted library allocation
|
page read and write
|
||
19FEA72F000
|
trusted library allocation
|
page read and write
|
||
19FDF714000
|
heap
|
page read and write
|
||
2753E6F7000
|
unkown
|
page execute read
|
||
19FEA3C4000
|
trusted library allocation
|
page read and write
|
||
19FF0ADC000
|
trusted library allocation
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FF07E6000
|
trusted library allocation
|
page read and write
|
||
19FEA660000
|
trusted library allocation
|
page read and write
|
||
19FEBF5A000
|
trusted library allocation
|
page read and write
|
||
19FF09A5000
|
trusted library allocation
|
page read and write
|
||
19FF09E5000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FF60BA000
|
trusted library allocation
|
page read and write
|
||
19FF1DA6000
|
trusted library allocation
|
page read and write
|
||
1DB6D75D000
|
trusted library allocation
|
page read and write
|
||
2753F360000
|
heap
|
page read and write
|
||
19FE4AD4000
|
trusted library allocation
|
page read and write
|
||
19FEC18F000
|
trusted library allocation
|
page read and write
|
||
19FE99A4000
|
trusted library allocation
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FE596D000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FEA3C2000
|
trusted library allocation
|
page read and write
|
||
1DB6D703000
|
trusted library allocation
|
page read and write
|
||
19FF078C000
|
trusted library allocation
|
page read and write
|
||
19FE9DDE000
|
trusted library allocation
|
page read and write
|
||
19FEA283000
|
trusted library allocation
|
page read and write
|
||
19FDF748000
|
heap
|
page read and write
|
||
19FDF765000
|
heap
|
page read and write
|
||
19FE91DB000
|
trusted library allocation
|
page read and write
|
||
19FEA3CC000
|
trusted library allocation
|
page read and write
|
||
2753F3B9000
|
heap
|
page read and write
|
||
19FF091B000
|
trusted library allocation
|
page read and write
|
||
19FF3C02000
|
trusted library allocation
|
page read and write
|
||
19FEA2D1000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF07E0000
|
trusted library allocation
|
page read and write
|
||
19FE86DB000
|
trusted library allocation
|
page read and write
|
||
19FEBFF8000
|
trusted library allocation
|
page read and write
|
||
19FEA763000
|
trusted library allocation
|
page read and write
|
||
19FE9BF3000
|
trusted library allocation
|
page read and write
|
||
19FE90AA000
|
trusted library allocation
|
page read and write
|
||
19FEA3A0000
|
trusted library allocation
|
page read and write
|
||
19FE4A13000
|
trusted library allocation
|
page read and write
|
||
19FDF78A000
|
heap
|
page read and write
|
||
19FEA3B8000
|
trusted library allocation
|
page read and write
|
||
19FF1DB4000
|
trusted library allocation
|
page read and write
|
||
19FEA4B1000
|
trusted library allocation
|
page read and write
|
||
19FE9CDB000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FEA296000
|
trusted library allocation
|
page read and write
|
||
19FEA398000
|
trusted library allocation
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF4F46000
|
trusted library allocation
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FEACDB000
|
trusted library allocation
|
page read and write
|
||
19FEA5CA000
|
trusted library allocation
|
page read and write
|
||
19FF4BE1000
|
heap
|
page read and write
|
||
19FF0A39000
|
trusted library allocation
|
page read and write
|
||
19FE5897000
|
trusted library allocation
|
page read and write
|
||
19FEAA99000
|
trusted library allocation
|
page read and write
|
||
19FF05DE000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FF50F0000
|
trusted library allocation
|
page read and write
|
||
19FE9B20000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE56EF000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE92EF000
|
trusted library allocation
|
page read and write
|
||
19FE86FD000
|
trusted library allocation
|
page read and write
|
||
2753E390000
|
heap
|
page read and write
|
||
19FEA463000
|
trusted library allocation
|
page read and write
|
||
19FEA379000
|
trusted library allocation
|
page read and write
|
||
19FF46EA000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEA2D1000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF751000
|
heap
|
page read and write
|
||
19FEA47B000
|
trusted library allocation
|
page read and write
|
||
19FE8BF9000
|
trusted library allocation
|
page read and write
|
||
19FEA4B1000
|
trusted library allocation
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
19FE86E8000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF0C4C000
|
trusted library allocation
|
page read and write
|
||
19FE9E0A000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FE9845000
|
trusted library allocation
|
page read and write
|
||
19FF1DEF000
|
trusted library allocation
|
page read and write
|
||
19FF533D000
|
trusted library allocation
|
page read and write
|
||
19FEA4F9000
|
trusted library allocation
|
page read and write
|
||
19FF0ADA000
|
trusted library allocation
|
page read and write
|
||
19FF06D9000
|
trusted library allocation
|
page read and write
|
||
19FF0895000
|
trusted library allocation
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FF4A7F000
|
trusted library allocation
|
page read and write
|
||
19FEC1D6000
|
trusted library allocation
|
page read and write
|
||
19FEB1F9000
|
trusted library allocation
|
page read and write
|
||
19FEA47B000
|
trusted library allocation
|
page read and write
|
||
19FF0851000
|
trusted library allocation
|
page read and write
|
||
19FEA7C8000
|
trusted library allocation
|
page read and write
|
||
19FEA2CC000
|
trusted library allocation
|
page read and write
|
||
19FE6C13000
|
trusted library allocation
|
page read and write
|
||
19FE4A51000
|
trusted library allocation
|
page read and write
|
||
19FE98DE000
|
trusted library allocation
|
page read and write
|
||
19FDF7B5000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEA4F4000
|
trusted library allocation
|
page read and write
|
||
19FEA3BD000
|
trusted library allocation
|
page read and write
|
||
19FE59E5000
|
trusted library allocation
|
page read and write
|
||
19FF09F2000
|
trusted library allocation
|
page read and write
|
||
19FF09A8000
|
trusted library allocation
|
page read and write
|
||
19FE901C000
|
trusted library allocation
|
page read and write
|
||
19FDF721000
|
heap
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FE92A6000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE9C8D000
|
trusted library allocation
|
page read and write
|
||
19FF0655000
|
trusted library allocation
|
page read and write
|
||
19FEA35D000
|
trusted library allocation
|
page read and write
|
||
19FF09EC000
|
trusted library allocation
|
page read and write
|
||
19FE9DCA000
|
trusted library allocation
|
page read and write
|
||
19FF0ECF000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
22C750D0000
|
heap
|
page read and write
|
||
19FEB172000
|
trusted library allocation
|
page read and write
|
||
19FF1DA7000
|
trusted library allocation
|
page read and write
|
||
19FF4AAD000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FF07C4000
|
trusted library allocation
|
page read and write
|
||
19FE8065000
|
heap
|
page read and write
|
||
19FE996B000
|
trusted library allocation
|
page read and write
|
||
19FE4A98000
|
trusted library allocation
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
C7F5AFE000
|
unkown
|
page readonly
|
||
19FF093E000
|
trusted library allocation
|
page read and write
|
||
19FF09F2000
|
trusted library allocation
|
page read and write
|
||
19FF0976000
|
trusted library allocation
|
page read and write
|
||
19FE86D8000
|
trusted library allocation
|
page read and write
|
||
19FE58A5000
|
trusted library allocation
|
page read and write
|
||
19FF099A000
|
trusted library allocation
|
page read and write
|
||
19FF21B4000
|
trusted library allocation
|
page read and write
|
||
19FEB031000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FF0BE7000
|
trusted library allocation
|
page read and write
|
||
19FE9230000
|
trusted library allocation
|
page read and write
|
||
19FE9EB1000
|
trusted library allocation
|
page read and write
|
||
19FDF78E000
|
heap
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FE98D9000
|
trusted library allocation
|
page read and write
|
||
19FDF7B5000
|
heap
|
page read and write
|
||
19FE804F000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF79C000
|
heap
|
page read and write
|
||
19FDF746000
|
heap
|
page read and write
|
||
19FF057B000
|
trusted library allocation
|
page read and write
|
||
19FE8582000
|
trusted library allocation
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
19FF0C3F000
|
trusted library allocation
|
page read and write
|
||
19FF4BB8000
|
heap
|
page read and write
|
||
19FE91DB000
|
trusted library allocation
|
page read and write
|
||
19FE924A000
|
trusted library allocation
|
page read and write
|
||
19FF5339000
|
trusted library allocation
|
page read and write
|
||
19FE56C2000
|
trusted library allocation
|
page read and write
|
||
19FE998F000
|
trusted library allocation
|
page read and write
|
||
19FE8300000
|
trusted library allocation
|
page read and write
|
||
19FE4726000
|
trusted library allocation
|
page read and write
|
||
19FF5778000
|
trusted library allocation
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEA4CA000
|
trusted library allocation
|
page read and write
|
||
19FF12F9000
|
trusted library allocation
|
page read and write
|
||
19FF0CC2000
|
trusted library allocation
|
page read and write
|
||
19FF099A000
|
trusted library allocation
|
page read and write
|
||
19FF09EC000
|
trusted library allocation
|
page read and write
|
||
19FEA3AD000
|
trusted library allocation
|
page read and write
|
||
19FEBFF8000
|
trusted library allocation
|
page read and write
|
||
19FE9B48000
|
trusted library allocation
|
page read and write
|
||
19FEBF06000
|
trusted library allocation
|
page read and write
|
||
19FE9A7E000
|
trusted library allocation
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
19FEA69B000
|
trusted library allocation
|
page read and write
|
||
22C75130000
|
heap
|
page read and write
|
||
19FF0ADE000
|
trusted library allocation
|
page read and write
|
||
19FE99BF000
|
trusted library allocation
|
page read and write
|
||
19FE986A000
|
trusted library allocation
|
page read and write
|
||
1DB6D4D0000
|
heap
|
page read and write
|
||
19FF09AD000
|
trusted library allocation
|
page read and write
|
||
19FE9068000
|
trusted library allocation
|
page read and write
|
||
221FEEEB000
|
heap
|
page read and write
|
||
19FEA2A4000
|
trusted library allocation
|
page read and write
|
||
19FF09DF000
|
trusted library allocation
|
page read and write
|
||
19FEBC6D000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FEBC77000
|
trusted library allocation
|
page read and write
|
||
19FDF7B0000
|
heap
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
1DB6D7B7000
|
trusted library allocation
|
page read and write
|
||
19FE86BB000
|
trusted library allocation
|
page read and write
|
||
19FDF738000
|
heap
|
page read and write
|
||
19FE9D59000
|
trusted library allocation
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
19FE863B000
|
trusted library allocation
|
page read and write
|
||
19FE994F000
|
trusted library allocation
|
page read and write
|
||
3D84000
|
heap
|
page read and write
|
||
19FF5075000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FEA299000
|
trusted library allocation
|
page read and write
|
||
19FE86B2000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FE91C3000
|
trusted library allocation
|
page read and write
|
||
19FEA379000
|
trusted library allocation
|
page read and write
|
||
19FF4B5C000
|
heap
|
page read and write
|
||
22C754F4000
|
heap
|
page read and write
|
||
1DB6D779000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FE9C9D000
|
trusted library allocation
|
page read and write
|
||
19FE99A7000
|
trusted library allocation
|
page read and write
|
||
19FE9285000
|
trusted library allocation
|
page read and write
|
||
2753F360000
|
heap
|
page read and write
|
||
19FF1E63000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FEA6FE000
|
trusted library allocation
|
page read and write
|
||
19FE8664000
|
trusted library allocation
|
page read and write
|
||
19FDF75F000
|
heap
|
page read and write
|
||
19FE868B000
|
trusted library allocation
|
page read and write
|
||
19FE9DCC000
|
trusted library allocation
|
page read and write
|
||
19FE56A5000
|
trusted library allocation
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
19FEA3F6000
|
trusted library allocation
|
page read and write
|
||
1DB6D93D000
|
trusted library allocation
|
page read and write
|
||
19FEA4A0000
|
trusted library allocation
|
page read and write
|
||
19FEA3A0000
|
trusted library allocation
|
page read and write
|
||
19FEA27D000
|
trusted library allocation
|
page read and write
|
||
19FF0CF2000
|
trusted library allocation
|
page read and write
|
||
19FE86C1000
|
trusted library allocation
|
page read and write
|
||
19FEBCDE000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF0CAF000
|
trusted library allocation
|
page read and write
|
||
19FF0746000
|
trusted library allocation
|
page read and write
|
||
19FDF782000
|
heap
|
page read and write
|
||
19FE9093000
|
trusted library allocation
|
page read and write
|
||
19FF1E67000
|
trusted library allocation
|
page read and write
|
||
19FEA720000
|
trusted library allocation
|
page read and write
|
||
19FF0BA5000
|
trusted library allocation
|
page read and write
|
||
2753E350000
|
unclassified section
|
page readonly
|
||
19FEBC37000
|
trusted library allocation
|
page read and write
|
||
19FE7EFE000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE908B000
|
trusted library allocation
|
page read and write
|
||
19FEA6DE000
|
trusted library allocation
|
page read and write
|
||
19FF0C9D000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
19FE8BDB000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE9845000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE9068000
|
trusted library allocation
|
page read and write
|
||
A6B09FE000
|
stack
|
page read and write
|
||
19FF0943000
|
trusted library allocation
|
page read and write
|
||
19FE86D8000
|
trusted library allocation
|
page read and write
|
||
19FEA37A000
|
trusted library allocation
|
page read and write
|
||
19FF2C51000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FF50F4000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FEA69E000
|
trusted library allocation
|
page read and write
|
||
19FF0C95000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FF1C37000
|
trusted library allocation
|
page read and write
|
||
19FF1DEF000
|
trusted library allocation
|
page read and write
|
||
19FF085E000
|
trusted library allocation
|
page read and write
|
||
19FEA26E000
|
trusted library allocation
|
page read and write
|
||
19FF5796000
|
trusted library allocation
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FEA6C9000
|
trusted library allocation
|
page read and write
|
||
19FE9ABE000
|
trusted library allocation
|
page read and write
|
||
19FEA37D000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FF4AA2000
|
trusted library allocation
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
19FEA398000
|
trusted library allocation
|
page read and write
|
||
19FDF749000
|
heap
|
page read and write
|
||
19FEA3F3000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
2753F369000
|
heap
|
page read and write
|
||
19FF4AC1000
|
trusted library allocation
|
page read and write
|
||
19FEA474000
|
trusted library allocation
|
page read and write
|
||
19FE9818000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF75A000
|
heap
|
page read and write
|
||
19FEA274000
|
trusted library allocation
|
page read and write
|
||
19FF0CBC000
|
trusted library allocation
|
page read and write
|
||
19FDF7B5000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
2753E500000
|
trusted library allocation
|
page read and write
|
||
19FF0994000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF4F52000
|
trusted library allocation
|
page read and write
|
||
19FF50A0000
|
trusted library allocation
|
page read and write
|
||
19FF2159000
|
trusted library allocation
|
page read and write
|
||
19FF50FC000
|
trusted library allocation
|
page read and write
|
||
19FEBFCA000
|
trusted library allocation
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
19FEA291000
|
trusted library allocation
|
page read and write
|
||
19FE9020000
|
trusted library allocation
|
page read and write
|
||
19FE590E000
|
trusted library allocation
|
page read and write
|
||
19FF09E7000
|
trusted library allocation
|
page read and write
|
||
19FE90A5000
|
trusted library allocation
|
page read and write
|
||
19FE59DD000
|
trusted library allocation
|
page read and write
|
||
19FE92A4000
|
trusted library allocation
|
page read and write
|
||
1B789000000
|
trusted library allocation
|
page read and write
|
||
19FE9024000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE9231000
|
trusted library allocation
|
page read and write
|
||
19FDF718000
|
heap
|
page read and write
|
||
19FEA4CF000
|
trusted library allocation
|
page read and write
|
||
19FE92E4000
|
trusted library allocation
|
page read and write
|
||
1DB6D90C000
|
trusted library allocation
|
page read and write
|
||
19FE7E6B000
|
trusted library allocation
|
page read and write
|
||
19FE47F9000
|
trusted library allocation
|
page read and write
|
||
19FE90C8000
|
trusted library allocation
|
page read and write
|
||
19FEC1F8000
|
trusted library allocation
|
page read and write
|
||
2753F458000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
19FEA47F000
|
trusted library allocation
|
page read and write
|
||
19FEB09B000
|
trusted library allocation
|
page read and write
|
||
19FEA7F9000
|
trusted library allocation
|
page read and write
|
||
19FEA76A000
|
trusted library allocation
|
page read and write
|
||
19FEA491000
|
trusted library allocation
|
page read and write
|
||
19FE9D5E000
|
trusted library allocation
|
page read and write
|
||
19FEBB51000
|
trusted library allocation
|
page read and write
|
||
19FF0BB5000
|
trusted library allocation
|
page read and write
|
||
19FEA3FC000
|
trusted library allocation
|
page read and write
|
||
19FF4AAD000
|
trusted library allocation
|
page read and write
|
||
19FF0C89000
|
trusted library allocation
|
page read and write
|
||
19FE8491000
|
trusted library allocation
|
page read and write
|
||
19FF4F26000
|
trusted library allocation
|
page read and write
|
||
19FE89FB000
|
trusted library allocation
|
page read and write
|
||
19FF0C2F000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
1DB6D76E000
|
trusted library allocation
|
page read and write
|
||
19FEA563000
|
trusted library allocation
|
page read and write
|
||
19FEA7E6000
|
trusted library allocation
|
page read and write
|
||
19FF05EA000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE7E5A000
|
trusted library allocation
|
page read and write
|
||
19FE7E31000
|
trusted library allocation
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
19FE4AAE000
|
trusted library allocation
|
page read and write
|
||
2753F477000
|
heap
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FF0C76000
|
trusted library allocation
|
page read and write
|
||
19FE90FA000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
1DB6D3B0000
|
unclassified section
|
page readonly
|
||
19FE807E000
|
heap
|
page read and write
|
||
19FEA654000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FEBFCA000
|
trusted library allocation
|
page read and write
|
||
19FE9CDC000
|
trusted library allocation
|
page read and write
|
||
19FE596B000
|
trusted library allocation
|
page read and write
|
||
19FE4623000
|
trusted library allocation
|
page read and write
|
||
19FE847B000
|
trusted library allocation
|
page read and write
|
||
19FEA6E0000
|
trusted library allocation
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
19FE6CF9000
|
trusted library allocation
|
page read and write
|
||
19FF06F7000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
2753F444000
|
heap
|
page read and write
|
||
19FE905E000
|
trusted library allocation
|
page read and write
|
||
19FF0587000
|
trusted library allocation
|
page read and write
|
||
19FE8084000
|
heap
|
page read and write
|
||
19FE80D5000
|
heap
|
page read and write
|
||
19FE847F000
|
trusted library allocation
|
page read and write
|
||
19FE8065000
|
heap
|
page read and write
|
||
19FEA20E000
|
trusted library allocation
|
page read and write
|
||
19FEA4E9000
|
trusted library allocation
|
page read and write
|
||
19FF096F000
|
trusted library allocation
|
page read and write
|
||
19FEA2E5000
|
trusted library allocation
|
page read and write
|
||
19FEA4CB000
|
trusted library allocation
|
page read and write
|
||
19FF1DC1000
|
trusted library allocation
|
page read and write
|
||
19FE4ACD000
|
trusted library allocation
|
page read and write
|
||
19FDF714000
|
heap
|
page read and write
|
||
19FDF761000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
1B789107000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE8647000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE9E24000
|
trusted library allocation
|
page read and write
|
||
19FF06E9000
|
trusted library allocation
|
page read and write
|
||
19FEA7CC000
|
trusted library allocation
|
page read and write
|
||
19FEBC26000
|
trusted library allocation
|
page read and write
|
||
19FE9CDF000
|
trusted library allocation
|
page read and write
|
||
19FE9D5B000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE983B000
|
trusted library allocation
|
page read and write
|
||
19FF57E1000
|
trusted library allocation
|
page read and write
|
||
19FEA28F000
|
trusted library allocation
|
page read and write
|
||
19FE9E19000
|
trusted library allocation
|
page read and write
|
||
19FE8577000
|
trusted library allocation
|
page read and write
|
||
19FE86D8000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FE9E22000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
2753E2E0000
|
unclassified section
|
page readonly
|
||
221FF000000
|
trusted library allocation
|
page read and write
|
||
19FEA285000
|
trusted library allocation
|
page read and write
|
||
19FF4B3F000
|
heap
|
page read and write
|
||
19FE9CCE000
|
trusted library allocation
|
page read and write
|
||
19FE902C000
|
trusted library allocation
|
page read and write
|
||
2753F468000
|
heap
|
page read and write
|
||
19FDF789000
|
heap
|
page read and write
|
||
19FEA312000
|
trusted library allocation
|
page read and write
|
||
19FEA25A000
|
trusted library allocation
|
page read and write
|
||
19FF2201000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FE996D000
|
trusted library allocation
|
page read and write
|
||
19FE9EDB000
|
trusted library allocation
|
page read and write
|
||
19FEB0CD000
|
trusted library allocation
|
page read and write
|
||
19FEB1C1000
|
trusted library allocation
|
page read and write
|
||
19FEACF4000
|
trusted library allocation
|
page read and write
|
||
2753F421000
|
heap
|
page read and write
|
||
19FF0BEA000
|
trusted library allocation
|
page read and write
|
||
19FDF749000
|
heap
|
page read and write
|
||
19FE857F000
|
trusted library allocation
|
page read and write
|
||
19FEA239000
|
trusted library allocation
|
page read and write
|
||
19FE9BCC000
|
trusted library allocation
|
page read and write
|
||
19FE927E000
|
trusted library allocation
|
page read and write
|
||
2753F43B000
|
heap
|
page read and write
|
||
19FF0911000
|
trusted library allocation
|
page read and write
|
||
19FF092E000
|
trusted library allocation
|
page read and write
|
||
19FE86B9000
|
trusted library allocation
|
page read and write
|
||
19FEA2E4000
|
trusted library allocation
|
page read and write
|
||
19FE80A1000
|
heap
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
19FF0746000
|
trusted library allocation
|
page read and write
|
||
19FE9C6B000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FE5648000
|
trusted library allocation
|
page read and write
|
||
2753EE90000
|
heap
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
1B78910A000
|
trusted library allocation
|
page read and write
|
||
19FE7EF4000
|
trusted library allocation
|
page read and write
|
||
19FE863B000
|
trusted library allocation
|
page read and write
|
||
2753F369000
|
heap
|
page read and write
|
||
19FE9B1C000
|
trusted library allocation
|
page read and write
|
||
2753E75C000
|
trusted library allocation
|
page read and write
|
||
19FF50CE000
|
trusted library allocation
|
page read and write
|
||
19FE900E000
|
trusted library allocation
|
page read and write
|
||
19FE89E8000
|
trusted library allocation
|
page read and write
|
||
19FF0A94000
|
trusted library allocation
|
page read and write
|
||
19FDF765000
|
heap
|
page read and write
|
||
19FEBFE6000
|
trusted library allocation
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF7B5000
|
heap
|
page read and write
|
||
19FE9CD8000
|
trusted library allocation
|
page read and write
|
||
19FF072C000
|
trusted library allocation
|
page read and write
|
||
19FEA379000
|
trusted library allocation
|
page read and write
|
||
221FEEF7000
|
heap
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
19FE9084000
|
trusted library allocation
|
page read and write
|
||
221FEE90000
|
heap
|
page read and write
|
||
1DB6D480000
|
unclassified section
|
page read and write
|
||
19FEB1EC000
|
trusted library allocation
|
page read and write
|
||
19FE89D4000
|
trusted library allocation
|
page read and write
|
||
19FF0948000
|
trusted library allocation
|
page read and write
|
||
19FF0C5C000
|
trusted library allocation
|
page read and write
|
||
2753F200000
|
trusted library allocation
|
page read and write
|
||
19FF4F3F000
|
trusted library allocation
|
page read and write
|
||
19FEA3B7000
|
trusted library allocation
|
page read and write
|
||
19FF50A7000
|
trusted library allocation
|
page read and write
|
||
19FE9E6D000
|
trusted library allocation
|
page read and write
|
||
19FEA2D4000
|
trusted library allocation
|
page read and write
|
||
221FEEF7000
|
heap
|
page read and write
|
||
19FF0CF0000
|
trusted library allocation
|
page read and write
|
||
19FDF782000
|
heap
|
page read and write
|
||
19FEA757000
|
trusted library allocation
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FEA656000
|
trusted library allocation
|
page read and write
|
||
19FE9EA7000
|
trusted library allocation
|
page read and write
|
||
19FF61CA000
|
trusted library allocation
|
page read and write
|
||
1DB6D72E000
|
trusted library allocation
|
page read and write
|
||
19FEC1A6000
|
trusted library allocation
|
page read and write
|
||
19FF0C25000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE58B3000
|
trusted library allocation
|
page read and write
|
||
19FEC496000
|
trusted library allocation
|
page read and write
|
||
19FF0C68000
|
trusted library allocation
|
page read and write
|
||
19FE9A79000
|
trusted library allocation
|
page read and write
|
||
19FF6204000
|
trusted library allocation
|
page read and write
|
||
22C750B0000
|
heap
|
page read and write
|
||
22C754F6000
|
heap
|
page read and write
|
||
19FEA3EE000
|
trusted library allocation
|
page read and write
|
||
19FDF725000
|
heap
|
page read and write
|
||
19FE8081000
|
heap
|
page read and write
|
||
1DB6D7E7000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FE863D000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
2753F400000
|
heap
|
page read and write
|
||
162275E1E000
|
trusted library allocation
|
page read and write
|
||
19FEA3A2000
|
trusted library allocation
|
page read and write
|
||
19FE5655000
|
trusted library allocation
|
page read and write
|
||
19FF4F3E000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FEA28F000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
19FF50E3000
|
trusted library allocation
|
page read and write
|
||
19FE5974000
|
trusted library allocation
|
page read and write
|
||
22C7580C000
|
trusted library allocation
|
page read and write
|
||
19FF0C66000
|
trusted library allocation
|
page read and write
|
||
19FE90B6000
|
trusted library allocation
|
page read and write
|
||
19FEA2CE000
|
trusted library allocation
|
page read and write
|
||
19FF05F4000
|
trusted library allocation
|
page read and write
|
||
19FEC4AD000
|
trusted library allocation
|
page read and write
|
||
19FF5335000
|
trusted library allocation
|
page read and write
|
||
19FEA314000
|
trusted library allocation
|
page read and write
|
||
19FEA4AB000
|
trusted library allocation
|
page read and write
|
||
19FE9052000
|
trusted library allocation
|
page read and write
|
||
19FEB0BE000
|
trusted library allocation
|
page read and write
|
||
2753F468000
|
heap
|
page read and write
|
||
19FEA34A000
|
trusted library allocation
|
page read and write
|
||
19FEA3A0000
|
trusted library allocation
|
page read and write
|
||
19FF099C000
|
trusted library allocation
|
page read and write
|
||
84D083D000
|
stack
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
2753E70C000
|
trusted library allocation
|
page read and write
|
||
19FE9EB1000
|
trusted library allocation
|
page read and write
|
||
19FEA3A1000
|
trusted library allocation
|
page read and write
|
||
19FF50B6000
|
trusted library allocation
|
page read and write
|
||
19FF0C62000
|
trusted library allocation
|
page read and write
|
||
19FE99AF000
|
trusted library allocation
|
page read and write
|
||
19FF1DB6000
|
trusted library allocation
|
page read and write
|
||
19FEA314000
|
trusted library allocation
|
page read and write
|
||
2753F3E8000
|
heap
|
page read and write
|
||
19FEA7E6000
|
trusted library allocation
|
page read and write
|
||
19FDF750000
|
heap
|
page read and write
|
||
19FDF79C000
|
heap
|
page read and write
|
||
2753F458000
|
heap
|
page read and write
|
||
19FDF717000
|
heap
|
page read and write
|
||
19FDF79C000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF21FC000
|
trusted library allocation
|
page read and write
|
||
19FEA3DA000
|
trusted library allocation
|
page read and write
|
||
19FE89B6000
|
trusted library allocation
|
page read and write
|
||
19FEA37A000
|
trusted library allocation
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FEA350000
|
trusted library allocation
|
page read and write
|
||
19FF09E5000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
221FF155000
|
heap
|
page read and write
|
||
19FE6C62000
|
trusted library allocation
|
page read and write
|
||
19FDF738000
|
heap
|
page read and write
|
||
19FE891C000
|
trusted library allocation
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
19FF1C50000
|
trusted library allocation
|
page read and write
|
||
19FE86F5000
|
trusted library allocation
|
page read and write
|
||
19FE9BBA000
|
trusted library allocation
|
page read and write
|
||
19FEA28B000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF07BC000
|
trusted library allocation
|
page read and write
|
||
19FEA6CE000
|
trusted library allocation
|
page read and write
|
||
19FE6043000
|
trusted library allocation
|
page read and write
|
||
19FF067B000
|
trusted library allocation
|
page read and write
|
||
221FEE70000
|
heap
|
page read and write
|
||
19FF05DA000
|
trusted library allocation
|
page read and write
|
||
19FEA365000
|
trusted library allocation
|
page read and write
|
||
19FF4AAD000
|
trusted library allocation
|
page read and write
|
||
19FE8080000
|
heap
|
page read and write
|
||
19FE9A4C000
|
trusted library allocation
|
page read and write
|
||
19FF3400000
|
trusted library allocation
|
page read and write
|
||
1916000
|
heap
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
19FE86E5000
|
trusted library allocation
|
page read and write
|
||
19FEAACA000
|
trusted library allocation
|
page read and write
|
||
19FE80AA000
|
heap
|
page read and write
|
||
19FF1EF1000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
2753F444000
|
heap
|
page read and write
|
||
19FE847F000
|
trusted library allocation
|
page read and write
|
||
19FEA3F4000
|
trusted library allocation
|
page read and write
|
||
19FE92E4000
|
trusted library allocation
|
page read and write
|
||
19FE92FE000
|
trusted library allocation
|
page read and write
|
||
19FDF752000
|
heap
|
page read and write
|
||
19FF46DD000
|
trusted library allocation
|
page read and write
|
||
19FE906E000
|
trusted library allocation
|
page read and write
|
||
19FE857C000
|
trusted library allocation
|
page read and write
|
||
19FE866F000
|
trusted library allocation
|
page read and write
|
||
19FE59EB000
|
trusted library allocation
|
page read and write
|
||
19FF07F0000
|
trusted library allocation
|
page read and write
|
||
19FE86BB000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FEBCB2000
|
trusted library allocation
|
page read and write
|
||
19FF0C57000
|
trusted library allocation
|
page read and write
|
||
19FDF74F000
|
heap
|
page read and write
|
||
19FE89D3000
|
trusted library allocation
|
page read and write
|
||
19FE868F000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
2753F458000
|
heap
|
page read and write
|
||
19FE4713000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FF0C0F000
|
trusted library allocation
|
page read and write
|
||
19FE996F000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE86B7000
|
trusted library allocation
|
page read and write
|
||
1DB6D91A000
|
trusted library allocation
|
page read and write
|
||
19FEA5A9000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FF0789000
|
trusted library allocation
|
page read and write
|
||
19FDF725000
|
heap
|
page read and write
|
||
19FE4782000
|
trusted library allocation
|
page read and write
|
||
19FEAB9C000
|
trusted library allocation
|
page read and write
|
||
19FE8637000
|
trusted library allocation
|
page read and write
|
||
19FE9996000
|
trusted library allocation
|
page read and write
|
||
19FEA2F7000
|
trusted library allocation
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FEA5D2000
|
trusted library allocation
|
page read and write
|
||
19FEA3A6000
|
trusted library allocation
|
page read and write
|
||
19FE86A8000
|
trusted library allocation
|
page read and write
|
||
19FEA3CC000
|
trusted library allocation
|
page read and write
|
||
22C75000000
|
unclassified section
|
page readonly
|
||
19FEACFA000
|
trusted library allocation
|
page read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
19FEA3BA000
|
trusted library allocation
|
page read and write
|
||
19FEA3B9000
|
trusted library allocation
|
page read and write
|
||
19FF2DA5000
|
trusted library allocation
|
page read and write
|
||
19FF0839000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FEB0BB000
|
trusted library allocation
|
page read and write
|
||
2753F38A000
|
heap
|
page read and write
|
||
22C755AD000
|
trusted library allocation
|
page read and write
|
||
22C75232000
|
unclassified section
|
page read and write
|
||
19FEB191000
|
trusted library allocation
|
page read and write
|
||
19FEA333000
|
trusted library allocation
|
page read and write
|
||
50C000
|
unkown
|
page write copy
|
||
19FDF751000
|
heap
|
page read and write
|
||
19FE928F000
|
trusted library allocation
|
page read and write
|
||
19FE47D0000
|
trusted library allocation
|
page read and write
|
||
19FE804F000
|
heap
|
page read and write
|
||
19FF4F29000
|
trusted library allocation
|
page read and write
|
||
19FEA21C000
|
trusted library allocation
|
page read and write
|
||
19FE90AE000
|
trusted library allocation
|
page read and write
|
||
19FE98EE000
|
trusted library allocation
|
page read and write
|
||
19FF4B4D000
|
heap
|
page read and write
|
||
86D67E000
|
stack
|
page read and write
|
||
19FEB153000
|
trusted library allocation
|
page read and write
|
||
84CFFFE000
|
stack
|
page read and write
|
||
19FE869C000
|
trusted library allocation
|
page read and write
|
||
19FF0662000
|
trusted library allocation
|
page read and write
|
||
19FEB0D1000
|
trusted library allocation
|
page read and write
|
||
19FF0CEA000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FF5C27000
|
trusted library allocation
|
page read and write
|
||
19FE90FC000
|
trusted library allocation
|
page read and write
|
||
19FE4AE7000
|
trusted library allocation
|
page read and write
|
||
19FEBCFB000
|
trusted library allocation
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
19FF2166000
|
trusted library allocation
|
page read and write
|
||
19FE8481000
|
trusted library allocation
|
page read and write
|
||
19FE89F5000
|
trusted library allocation
|
page read and write
|
||
19FF09A5000
|
trusted library allocation
|
page read and write
|
||
19FEA763000
|
trusted library allocation
|
page read and write
|
||
19FE99F6000
|
trusted library allocation
|
page read and write
|
||
19FEA635000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FF5095000
|
trusted library allocation
|
page read and write
|
||
19FEBF90000
|
trusted library allocation
|
page read and write
|
||
19FEA463000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
2753F3F1000
|
heap
|
page read and write
|
||
19FE897C000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
1DB6D4DA000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FEB041000
|
trusted library allocation
|
page read and write
|
||
19FF0CF2000
|
trusted library allocation
|
page read and write
|
||
19FDF737000
|
heap
|
page read and write
|
||
19FE8684000
|
trusted library allocation
|
page read and write
|
||
19FF0CAF000
|
trusted library allocation
|
page read and write
|
||
19FE86C1000
|
trusted library allocation
|
page read and write
|
||
19FF0BF7000
|
trusted library allocation
|
page read and write
|
||
19FDF74F000
|
heap
|
page read and write
|
||
19FE9EA7000
|
trusted library allocation
|
page read and write
|
||
19FDF7AA000
|
heap
|
page read and write
|
||
2753E610000
|
heap
|
page readonly
|
||
19FEA2E6000
|
trusted library allocation
|
page read and write
|
||
19FF0672000
|
trusted library allocation
|
page read and write
|
||
2753F3E0000
|
heap
|
page read and write
|
||
19FEA4AB000
|
trusted library allocation
|
page read and write
|
||
19FF0CA7000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FF0863000
|
trusted library allocation
|
page read and write
|
||
19FE4676000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FEA2CC000
|
trusted library allocation
|
page read and write
|
||
19FE9E07000
|
trusted library allocation
|
page read and write
|
||
19FF09E3000
|
trusted library allocation
|
page read and write
|
||
19FF5323000
|
trusted library allocation
|
page read and write
|
||
19FEA212000
|
trusted library allocation
|
page read and write
|
||
19FE9CE2000
|
trusted library allocation
|
page read and write
|
||
19FDF782000
|
heap
|
page read and write
|
||
19FE6CF7000
|
trusted library allocation
|
page read and write
|
||
19FE899F000
|
trusted library allocation
|
page read and write
|
||
2753E712000
|
trusted library allocation
|
page read and write
|
||
19FF1EF9000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
1B788E40000
|
heap
|
page read and write
|
||
19FF2DFC000
|
trusted library allocation
|
page read and write
|
||
19FE9D5B000
|
trusted library allocation
|
page read and write
|
||
19FF0CF4000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FEA2DE000
|
trusted library allocation
|
page read and write
|
||
19FDF751000
|
heap
|
page read and write
|
||
2753E7C4000
|
trusted library allocation
|
page read and write
|
||
2753E7BE000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF0C33000
|
trusted library allocation
|
page read and write
|
||
1DB6D794000
|
trusted library allocation
|
page read and write
|
||
19FF0AD4000
|
trusted library allocation
|
page read and write
|
||
19FE5994000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEBC5D000
|
trusted library allocation
|
page read and write
|
||
19FE99BF000
|
trusted library allocation
|
page read and write
|
||
19FF4A90000
|
trusted library allocation
|
page read and write
|
||
19FF20BA000
|
trusted library allocation
|
page read and write
|
||
19FEA4C3000
|
trusted library allocation
|
page read and write
|
||
19FF05F8000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FE91E5000
|
trusted library allocation
|
page read and write
|
||
19FDF7AA000
|
heap
|
page read and write
|
||
19FF0C6E000
|
trusted library allocation
|
page read and write
|
||
19FEC458000
|
trusted library allocation
|
page read and write
|
||
19FF09EC000
|
trusted library allocation
|
page read and write
|
||
19FF0989000
|
trusted library allocation
|
page read and write
|
||
19FE80C0000
|
heap
|
page read and write
|
||
19FF0989000
|
trusted library allocation
|
page read and write
|
||
19FEB092000
|
trusted library allocation
|
page read and write
|
||
19FF07C4000
|
trusted library allocation
|
page read and write
|
||
19FDF74A000
|
heap
|
page read and write
|
||
19FE9CEA000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF1DE8000
|
trusted library allocation
|
page read and write
|
||
19FE80A1000
|
heap
|
page read and write
|
||
2753E6D6000
|
heap
|
page read and write
|
||
19FE5994000
|
trusted library allocation
|
page read and write
|
||
19FF4B4E000
|
heap
|
page read and write
|
||
19FF09AD000
|
trusted library allocation
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FE9D6B000
|
trusted library allocation
|
page read and write
|
||
19FE6CF7000
|
trusted library allocation
|
page read and write
|
||
19FDF74E000
|
heap
|
page read and write
|
||
19FEA4A6000
|
trusted library allocation
|
page read and write
|
||
19FF1DFE000
|
trusted library allocation
|
page read and write
|
||
19FF09D9000
|
trusted library allocation
|
page read and write
|
||
1DB6D7A9000
|
trusted library allocation
|
page read and write
|
||
19FF0730000
|
trusted library allocation
|
page read and write
|
||
19FE9996000
|
trusted library allocation
|
page read and write
|
||
19FEB02B000
|
trusted library allocation
|
page read and write
|
||
2753F43B000
|
heap
|
page read and write
|
||
19FEC1A6000
|
trusted library allocation
|
page read and write
|
||
19FE6CE2000
|
trusted library allocation
|
page read and write
|
||
86C5FE000
|
unkown
|
page readonly
|
||
2753E79F000
|
trusted library allocation
|
page read and write
|
||
2753F39C000
|
heap
|
page read and write
|
||
41C1000
|
heap
|
page read and write
|
||
19FE9E6D000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FE9CD3000
|
trusted library allocation
|
page read and write
|
||
19FF0890000
|
trusted library allocation
|
page read and write
|
||
19FE89C0000
|
trusted library allocation
|
page read and write
|
||
19FF5C6A000
|
trusted library allocation
|
page read and write
|
||
19FDF759000
|
heap
|
page read and write
|
||
19FDF748000
|
heap
|
page read and write
|
||
19FF0AD4000
|
trusted library allocation
|
page read and write
|
||
19FF1E65000
|
trusted library allocation
|
page read and write
|
||
19FE9CAB000
|
trusted library allocation
|
page read and write
|
||
19FE8481000
|
trusted library allocation
|
page read and write
|
||
19FEBF80000
|
trusted library allocation
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FEBCB2000
|
trusted library allocation
|
page read and write
|
||
19FF0CBC000
|
trusted library allocation
|
page read and write
|
||
19FEABC7000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FEBFF8000
|
trusted library allocation
|
page read and write
|
||
19FF4F44000
|
trusted library allocation
|
page read and write
|
||
19FF067B000
|
trusted library allocation
|
page read and write
|
||
19FF0AD6000
|
trusted library allocation
|
page read and write
|
||
86ADD8000
|
stack
|
page read and write
|
||
19FF1D93000
|
trusted library allocation
|
page read and write
|
||
19FEA3C8000
|
trusted library allocation
|
page read and write
|
||
19FE9E23000
|
trusted library allocation
|
page read and write
|
||
441000
|
unkown
|
page execute read
|
||
19FF07B2000
|
trusted library allocation
|
page read and write
|
||
19FEA70E000
|
trusted library allocation
|
page read and write
|
||
19FEA583000
|
trusted library allocation
|
page read and write
|
||
19FEB164000
|
trusted library allocation
|
page read and write
|
||
19FEBF9F000
|
trusted library allocation
|
page read and write
|
||
19FE8080000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE40EF000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FE56D2000
|
trusted library allocation
|
page read and write
|
||
19FF0659000
|
trusted library allocation
|
page read and write
|
||
19FEA39B000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE9C9D000
|
trusted library allocation
|
page read and write
|
||
19FE6C74000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FE86BB000
|
trusted library allocation
|
page read and write
|
||
19FE5996000
|
trusted library allocation
|
page read and write
|
||
19FDF765000
|
heap
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FE597D000
|
trusted library allocation
|
page read and write
|
||
19FEAD00000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FF4B89000
|
heap
|
page read and write
|
||
19FF5315000
|
trusted library allocation
|
page read and write
|
||
19FEA281000
|
trusted library allocation
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
19FF078C000
|
trusted library allocation
|
page read and write
|
||
2753E700000
|
trusted library allocation
|
page read and write
|
||
19FE856D000
|
trusted library allocation
|
page read and write
|
||
19FEA474000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
2753ED71000
|
heap
|
page read and write
|
||
19FF0BF3000
|
trusted library allocation
|
page read and write
|
||
19FE86E5000
|
trusted library allocation
|
page read and write
|
||
19FE86CC000
|
trusted library allocation
|
page read and write
|
||
19FDF78C000
|
heap
|
page read and write
|
||
19FE90D8000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FE998F000
|
trusted library allocation
|
page read and write
|
||
19FE9CDC000
|
trusted library allocation
|
page read and write
|
||
19FEBC6D000
|
trusted library allocation
|
page read and write
|
||
19FF0AD4000
|
trusted library allocation
|
page read and write
|
||
19FF072F000
|
trusted library allocation
|
page read and write
|
||
19FE40EF000
|
trusted library allocation
|
page read and write
|
||
19FE90B7000
|
trusted library allocation
|
page read and write
|
||
19FDF732000
|
heap
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FF0AD2000
|
trusted library allocation
|
page read and write
|
||
19FEA4A4000
|
trusted library allocation
|
page read and write
|
||
19FEBF7E000
|
trusted library allocation
|
page read and write
|
||
19FE9CD8000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FF533D000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FEA3C2000
|
trusted library allocation
|
page read and write
|
||
19FF09E3000
|
trusted library allocation
|
page read and write
|
||
19FEBCC5000
|
trusted library allocation
|
page read and write
|
||
19FE8410000
|
trusted library allocation
|
page read and write
|
||
19FE86D8000
|
trusted library allocation
|
page read and write
|
||
2753F3E3000
|
heap
|
page read and write
|
||
1B7CFD3C000
|
trusted library allocation
|
page execute read
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF1E82000
|
trusted library allocation
|
page read and write
|
||
19FE9EF8000
|
trusted library allocation
|
page read and write
|
||
19FE9A63000
|
trusted library allocation
|
page read and write
|
||
22C75564000
|
trusted library allocation
|
page read and write
|
||
1B788E10000
|
heap
|
page read and write
|
||
19FF0C47000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
22C75577000
|
trusted library allocation
|
page read and write
|
||
19FDF768000
|
heap
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE8555000
|
trusted library allocation
|
page read and write
|
||
19FE59C7000
|
trusted library allocation
|
page read and write
|
||
19FEB094000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF0C95000
|
trusted library allocation
|
page read and write
|
||
19FF1E20000
|
trusted library allocation
|
page read and write
|
||
19FE58DA000
|
trusted library allocation
|
page read and write
|
||
2753E717000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
2753F3EA000
|
heap
|
page read and write
|
||
19FF2DF5000
|
trusted library allocation
|
page read and write
|
||
19FE8570000
|
trusted library allocation
|
page read and write
|
||
19FEBBD0000
|
trusted library allocation
|
page read and write
|
||
19FF50D1000
|
trusted library allocation
|
page read and write
|
||
19FEBF65000
|
trusted library allocation
|
page read and write
|
||
162F000
|
stack
|
page read and write
|
||
19FF05EA000
|
trusted library allocation
|
page read and write
|
||
19FF1DB4000
|
trusted library allocation
|
page read and write
|
||
19FF0CBC000
|
trusted library allocation
|
page read and write
|
||
19FEA27D000
|
trusted library allocation
|
page read and write
|
||
19FEA2FC000
|
trusted library allocation
|
page read and write
|
||
19FDF725000
|
heap
|
page read and write
|
||
19FDF7C4000
|
heap
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FDF789000
|
heap
|
page read and write
|
||
19FEA3D4000
|
trusted library allocation
|
page read and write
|
||
19FE7EF4000
|
trusted library allocation
|
page read and write
|
||
19FF1C86000
|
trusted library allocation
|
page read and write
|
||
19FEBC1C000
|
trusted library allocation
|
page read and write
|
||
19FF09AD000
|
trusted library allocation
|
page read and write
|
||
19FEBF35000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FE843A000
|
trusted library allocation
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FF0C31000
|
trusted library allocation
|
page read and write
|
||
19FF20D6000
|
trusted library allocation
|
page read and write
|
||
19FEA413000
|
trusted library allocation
|
page read and write
|
||
19FF0CEA000
|
trusted library allocation
|
page read and write
|
||
19FE927D000
|
trusted library allocation
|
page read and write
|
||
19FE9E0C000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FF05F8000
|
trusted library allocation
|
page read and write
|
||
86A25C000
|
stack
|
page read and write
|
||
19FDF765000
|
heap
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FEA3A7000
|
trusted library allocation
|
page read and write
|
||
19FF0C64000
|
trusted library allocation
|
page read and write
|
||
19FE7E1F000
|
trusted library allocation
|
page read and write
|
||
19FF0EAE000
|
trusted library allocation
|
page read and write
|
||
19FF078A000
|
trusted library allocation
|
page read and write
|
||
19FF1EF6000
|
trusted library allocation
|
page read and write
|
||
19FEA5E8000
|
trusted library allocation
|
page read and write
|
||
19FF09E1000
|
trusted library allocation
|
page read and write
|
||
19FEA37D000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FE9DC2000
|
trusted library allocation
|
page read and write
|
||
19FEA3F8000
|
trusted library allocation
|
page read and write
|
||
19FE984B000
|
trusted library allocation
|
page read and write
|
||
19FE9C51000
|
trusted library allocation
|
page read and write
|
||
19FEA5CE000
|
trusted library allocation
|
page read and write
|
||
19FEA9E1000
|
trusted library allocation
|
page read and write
|
||
19FF07D4000
|
trusted library allocation
|
page read and write
|
||
19FE9CDC000
|
trusted library allocation
|
page read and write
|
||
20DE000
|
stack
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FEA4DD000
|
trusted library allocation
|
page read and write
|
||
19FF07C4000
|
trusted library allocation
|
page read and write
|
||
19FE8562000
|
trusted library allocation
|
page read and write
|
||
19FEB1F0000
|
trusted library allocation
|
page read and write
|
||
19FE40DF000
|
trusted library allocation
|
page read and write
|
||
19FEA399000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FE863B000
|
trusted library allocation
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
19FF07E6000
|
trusted library allocation
|
page read and write
|
||
19FE5665000
|
trusted library allocation
|
page read and write
|
||
19FE9C8D000
|
trusted library allocation
|
page read and write
|
||
41C1000
|
heap
|
page read and write
|
||
19FDF79C000
|
heap
|
page read and write
|
||
86D6BE000
|
unkown
|
page readonly
|
||
19FE9027000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
2753E779000
|
trusted library allocation
|
page read and write
|
||
19FF6159000
|
trusted library allocation
|
page read and write
|
||
19FF09A8000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FE564A000
|
trusted library allocation
|
page read and write
|
||
19FF0ADC000
|
trusted library allocation
|
page read and write
|
||
19FE981C000
|
trusted library allocation
|
page read and write
|
||
19FE855A000
|
trusted library allocation
|
page read and write
|
||
19FE9DDA000
|
trusted library allocation
|
page read and write
|
||
19FE9CB1000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FEA4CA000
|
trusted library allocation
|
page read and write
|
||
19FE8497000
|
trusted library allocation
|
page read and write
|
||
19FF07C4000
|
trusted library allocation
|
page read and write
|
||
19FEBC6A000
|
trusted library allocation
|
page read and write
|
||
19FEA4D0000
|
trusted library allocation
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
19FDF737000
|
heap
|
page read and write
|
||
19FEA4AD000
|
trusted library allocation
|
page read and write
|
||
22C755B1000
|
trusted library allocation
|
page read and write
|
||
19FEA3B0000
|
trusted library allocation
|
page read and write
|
||
19FE4081000
|
trusted library allocation
|
page read and write
|
||
22C7523F000
|
unclassified section
|
page read and write
|
||
19FE80B3000
|
heap
|
page read and write
|
||
19FF07BC000
|
trusted library allocation
|
page read and write
|
||
19FE8084000
|
heap
|
page read and write
|
||
19FE90A3000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FEA4BF000
|
trusted library allocation
|
page read and write
|
||
19FEA3D2000
|
trusted library allocation
|
page read and write
|
||
19FF0746000
|
trusted library allocation
|
page read and write
|
||
2753F468000
|
heap
|
page read and write
|
||
2753F360000
|
heap
|
page read and write
|
||
2753E630000
|
unclassified section
|
page read and write
|
||
19FDF749000
|
heap
|
page read and write
|
||
1DB6D700000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FDF7AF000
|
heap
|
page read and write
|
||
19FEA6CB000
|
trusted library allocation
|
page read and write
|
||
19FF4000000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FE92A3000
|
trusted library allocation
|
page read and write
|
||
19FE9824000
|
trusted library allocation
|
page read and write
|
||
1908000
|
heap
|
page read and write
|
||
19FF0AD6000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF0C48000
|
trusted library allocation
|
page read and write
|
||
19FE86EB000
|
trusted library allocation
|
page read and write
|
||
19FEA4D1000
|
trusted library allocation
|
page read and write
|
||
19FE905E000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FEA4E2000
|
trusted library allocation
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FE9239000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FEA254000
|
trusted library allocation
|
page read and write
|
||
19FF2DEF000
|
trusted library allocation
|
page read and write
|
||
19FDF759000
|
heap
|
page read and write
|
||
19FF07BA000
|
trusted library allocation
|
page read and write
|
||
19FF078A000
|
trusted library allocation
|
page read and write
|
||
19FE84F6000
|
trusted library allocation
|
page read and write
|
||
19FE983E000
|
trusted library allocation
|
page read and write
|
||
2753F369000
|
heap
|
page read and write
|
||
19FE59F1000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FEBFF8000
|
trusted library allocation
|
page read and write
|
||
19FF0C85000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FE99B5000
|
trusted library allocation
|
page read and write
|
||
19FEA4B3000
|
trusted library allocation
|
page read and write
|
||
19FE89E8000
|
trusted library allocation
|
page read and write
|
||
2753E7F3000
|
trusted library allocation
|
page read and write
|
||
19FF0BE7000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
19FF0ED2000
|
trusted library allocation
|
page read and write
|
||
19FE9289000
|
trusted library allocation
|
page read and write
|
||
19FF07CB000
|
trusted library allocation
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FEA7DA000
|
trusted library allocation
|
page read and write
|
||
19FDF799000
|
heap
|
page read and write
|
||
19FF50D4000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FE5693000
|
trusted library allocation
|
page read and write
|
||
19FF50EA000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE9B31000
|
trusted library allocation
|
page read and write
|
||
2753F360000
|
heap
|
page read and write
|
||
19FDF755000
|
heap
|
page read and write
|
||
19FF1E20000
|
trusted library allocation
|
page read and write
|
||
19FE9D7B000
|
trusted library allocation
|
page read and write
|
||
19FEC1A6000
|
trusted library allocation
|
page read and write
|
||
19FE4766000
|
trusted library allocation
|
page read and write
|
||
19FE89D7000
|
trusted library allocation
|
page read and write
|
||
19FF0ED5000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FE56FD000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEA72F000
|
trusted library allocation
|
page read and write
|
||
19FE9BE8000
|
trusted library allocation
|
page read and write
|
||
19FE9004000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
2753F3E0000
|
heap
|
page read and write
|
||
A6AF9FE000
|
stack
|
page read and write
|
||
19FEBCE7000
|
trusted library allocation
|
page read and write
|
||
19FF05F4000
|
trusted library allocation
|
page read and write
|
||
19FEA288000
|
trusted library allocation
|
page read and write
|
||
19FF0CEA000
|
trusted library allocation
|
page read and write
|
||
19FE9BBD000
|
trusted library allocation
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FE9B9D000
|
trusted library allocation
|
page read and write
|
||
19FEA3C4000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FEA637000
|
trusted library allocation
|
page read and write
|
||
19FE999C000
|
trusted library allocation
|
page read and write
|
||
19FE90C2000
|
trusted library allocation
|
page read and write
|
||
2753F360000
|
heap
|
page read and write
|
||
19FE92BA000
|
trusted library allocation
|
page read and write
|
||
19FEC12F000
|
trusted library allocation
|
page read and write
|
||
86BDFE000
|
stack
|
page read and write
|
||
19FEBF80000
|
trusted library allocation
|
page read and write
|
||
19FEBCE4000
|
trusted library allocation
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF07BA000
|
trusted library allocation
|
page read and write
|
||
19FF0A97000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FF09F2000
|
trusted library allocation
|
page read and write
|
||
19FE9250000
|
trusted library allocation
|
page read and write
|
||
1DB6D763000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FF1DFE000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FF4B45000
|
heap
|
page read and write
|
||
19FE9C8A000
|
trusted library allocation
|
page read and write
|
||
19FF0BF2000
|
trusted library allocation
|
page read and write
|
||
19FF0963000
|
trusted library allocation
|
page read and write
|
||
19FF2185000
|
trusted library allocation
|
page read and write
|
||
84CEFD8000
|
stack
|
page read and write
|
||
22C75530000
|
trusted library allocation
|
page read and write
|
||
19FEA5BA000
|
trusted library allocation
|
page read and write
|
||
19FE99FC000
|
trusted library allocation
|
page read and write
|
||
19FE99B5000
|
trusted library allocation
|
page read and write
|
||
19FE9EFC000
|
trusted library allocation
|
page read and write
|
||
19FF0A77000
|
trusted library allocation
|
page read and write
|
||
3D80000
|
heap
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
221FF6AD000
|
heap
|
page read and write
|
||
19FF0ED5000
|
trusted library allocation
|
page read and write
|
||
19FE593B000
|
trusted library allocation
|
page read and write
|
||
1B788E00000
|
heap
|
page read and write
|
||
19FF087E000
|
trusted library allocation
|
page read and write
|
||
19FEC202000
|
trusted library allocation
|
page read and write
|
||
19FE9BB3000
|
trusted library allocation
|
page read and write
|
||
2753E3D0000
|
heap
|
page read and write
|
||
19FEA34A000
|
trusted library allocation
|
page read and write
|
||
19FF078A000
|
trusted library allocation
|
page read and write
|
||
19FE8B34000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FEBF1A000
|
trusted library allocation
|
page read and write
|
||
19FE846D000
|
trusted library allocation
|
page read and write
|
||
19FE91F4000
|
trusted library allocation
|
page read and write
|
||
19FDF799000
|
heap
|
page read and write
|
||
19FF0CAF000
|
trusted library allocation
|
page read and write
|
||
19FE8095000
|
heap
|
page read and write
|
||
19FF0972000
|
trusted library allocation
|
page read and write
|
||
19FDF75C000
|
heap
|
page read and write
|
||
19FEA3C8000
|
trusted library allocation
|
page read and write
|
||
19FEA267000
|
trusted library allocation
|
page read and write
|
||
19FE7E63000
|
trusted library allocation
|
page read and write
|
||
2753E6E0000
|
trusted library allocation
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
19FEA2B8000
|
trusted library allocation
|
page read and write
|
||
7C9E1C03000
|
trusted library allocation
|
page read and write
|
||
19FF50DA000
|
trusted library allocation
|
page read and write
|
||
19FEA716000
|
trusted library allocation
|
page read and write
|
||
19FEA4AB000
|
trusted library allocation
|
page read and write
|
||
19FE9C44000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FF071F000
|
trusted library allocation
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FDF746000
|
heap
|
page read and write
|
||
190F000
|
heap
|
page read and write
|
||
19FF07E2000
|
trusted library allocation
|
page read and write
|
||
19FEBCBE000
|
trusted library allocation
|
page read and write
|
||
19FE9849000
|
trusted library allocation
|
page read and write
|
||
19FE9B3C000
|
trusted library allocation
|
page read and write
|
||
19FF0AA3000
|
trusted library allocation
|
page read and write
|
||
86A29E000
|
unkown
|
page readonly
|
||
19FDF72D000
|
heap
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FF0632000
|
trusted library allocation
|
page read and write
|
||
19FF0BFE000
|
trusted library allocation
|
page read and write
|
||
19FE6CCC000
|
trusted library allocation
|
page read and write
|
||
19FEA212000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE9964000
|
trusted library allocation
|
page read and write
|
||
19FDF751000
|
heap
|
page read and write
|
||
19FF21CA000
|
trusted library allocation
|
page read and write
|
||
19FDF759000
|
heap
|
page read and write
|
||
19FE86E6000
|
trusted library allocation
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FDF737000
|
heap
|
page read and write
|
||
19FF21B1000
|
trusted library allocation
|
page read and write
|
||
19FE8463000
|
trusted library allocation
|
page read and write
|
||
19FF615C000
|
trusted library allocation
|
page read and write
|
||
19FF07DB000
|
trusted library allocation
|
page read and write
|
||
19FE86D4000
|
trusted library allocation
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
2753F477000
|
heap
|
page read and write
|
||
19FDF79C000
|
heap
|
page read and write
|
||
19FE86E5000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
19FEBF92000
|
trusted library allocation
|
page read and write
|
||
19FF07D7000
|
trusted library allocation
|
page read and write
|
||
19FE89DC000
|
trusted library allocation
|
page read and write
|
||
19FE9280000
|
trusted library allocation
|
page read and write
|
||
19FDF75C000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF12CA000
|
trusted library allocation
|
page read and write
|
||
19FEA47F000
|
trusted library allocation
|
page read and write
|
||
19FEA4B1000
|
trusted library allocation
|
page read and write
|
||
84CE5AE000
|
stack
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE8487000
|
trusted library allocation
|
page read and write
|
||
19FE848D000
|
trusted library allocation
|
page read and write
|
||
2753F3F1000
|
heap
|
page read and write
|
||
162275E24000
|
trusted library allocation
|
page read and write
|
||
19FEABA3000
|
trusted library allocation
|
page read and write
|
||
19FF0C48000
|
trusted library allocation
|
page read and write
|
||
19FEA499000
|
trusted library allocation
|
page read and write
|
||
19FE9CFE000
|
trusted library allocation
|
page read and write
|
||
19FEB0B6000
|
trusted library allocation
|
page read and write
|
||
19FF09A5000
|
trusted library allocation
|
page read and write
|
||
19FF05B5000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FEA4FA000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF2500000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
22C75503000
|
trusted library allocation
|
page read and write
|
||
19FEA630000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FE59F6000
|
trusted library allocation
|
page read and write
|
||
19FF4AF0000
|
trusted library allocation
|
page read and write
|
||
123A000
|
stack
|
page read and write
|
||
19FE9286000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FF4F2D000
|
trusted library allocation
|
page read and write
|
||
19FEBB63000
|
trusted library allocation
|
page read and write
|
||
19FEBF4C000
|
trusted library allocation
|
page read and write
|
||
19FDF789000
|
heap
|
page read and write
|
||
19FE9CDC000
|
trusted library allocation
|
page read and write
|
||
19FEA4A2000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
1DB6D900000
|
trusted library allocation
|
page read and write
|
||
19FE98F0000
|
trusted library allocation
|
page read and write
|
||
19FF09F4000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
2753E6D0000
|
heap
|
page read and write
|
||
19FE9027000
|
trusted library allocation
|
page read and write
|
||
19FEA244000
|
trusted library allocation
|
page read and write
|
||
19FEBF8E000
|
trusted library allocation
|
page read and write
|
||
2753F477000
|
heap
|
page read and write
|
||
19FEA241000
|
trusted library allocation
|
page read and write
|
||
1DB6D600000
|
trusted library allocation
|
page read and write
|
||
19FE9CD3000
|
trusted library allocation
|
page read and write
|
||
19FDF75A000
|
heap
|
page read and write
|
||
19FE9BB6000
|
trusted library allocation
|
page read and write
|
||
19FE9ADD000
|
trusted library allocation
|
page read and write
|
||
19FE90FC000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FF0C81000
|
trusted library allocation
|
page read and write
|
||
19FEA2F3000
|
trusted library allocation
|
page read and write
|
||
19FEA2A0000
|
trusted library allocation
|
page read and write
|
||
19FEA3C4000
|
trusted library allocation
|
page read and write
|
||
19FF46C6000
|
trusted library allocation
|
page read and write
|
||
19FDF771000
|
heap
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FDF765000
|
heap
|
page read and write
|
||
22C75300000
|
trusted library allocation
|
page read and write
|
||
19FF0C9D000
|
trusted library allocation
|
page read and write
|
||
19FEA3DA000
|
trusted library allocation
|
page read and write
|
||
19FF0C2F000
|
trusted library allocation
|
page read and write
|
||
22C75220000
|
heap
|
page readonly
|
||
19FE857C000
|
trusted library allocation
|
page read and write
|
||
19FEA60F000
|
trusted library allocation
|
page read and write
|
||
19FEBC2B000
|
trusted library allocation
|
page read and write
|
||
19FF1DA3000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF0972000
|
trusted library allocation
|
page read and write
|
||
19FE59DD000
|
trusted library allocation
|
page read and write
|
||
19FDF789000
|
heap
|
page read and write
|
||
19FEC4E1000
|
trusted library allocation
|
page read and write
|
||
1DB6D3AA000
|
remote allocation
|
page execute read
|
||
19FE9B20000
|
trusted library allocation
|
page read and write
|
||
19FE9A27000
|
trusted library allocation
|
page read and write
|
||
19FE9C67000
|
trusted library allocation
|
page read and write
|
||
19FEA3A2000
|
trusted library allocation
|
page read and write
|
||
19FE5884000
|
trusted library allocation
|
page read and write
|
||
19FF09C4000
|
trusted library allocation
|
page read and write
|
||
190E000
|
heap
|
page read and write
|
||
19FEA4C3000
|
trusted library allocation
|
page read and write
|
||
19FE80B4000
|
heap
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FE5655000
|
trusted library allocation
|
page read and write
|
||
19FEA291000
|
trusted library allocation
|
page read and write
|
||
19FF0639000
|
trusted library allocation
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FE56C9000
|
trusted library allocation
|
page read and write
|
||
2753F3E6000
|
heap
|
page read and write
|
||
19FE4800000
|
trusted library allocation
|
page read and write
|
||
19FEA3C3000
|
trusted library allocation
|
page read and write
|
||
1DB6D410000
|
heap
|
page read and write
|
||
19FE9D87000
|
trusted library allocation
|
page read and write
|
||
19FEA3C2000
|
trusted library allocation
|
page read and write
|
||
19FF0CBF000
|
trusted library allocation
|
page read and write
|
||
19FE58BB000
|
trusted library allocation
|
page read and write
|
||
61CA5FC000
|
stack
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FF098D000
|
trusted library allocation
|
page read and write
|
||
19FEBFD6000
|
trusted library allocation
|
page read and write
|
||
19FE8095000
|
heap
|
page read and write
|
||
19FF07E6000
|
trusted library allocation
|
page read and write
|
||
2753F42D000
|
heap
|
page read and write
|
||
2753F36C000
|
heap
|
page read and write
|
||
2753F42A000
|
heap
|
page read and write
|
||
19FF0EF4000
|
trusted library allocation
|
page read and write
|
||
19FEA4AD000
|
trusted library allocation
|
page read and write
|
||
19FE9975000
|
trusted library allocation
|
page read and write
|
||
19FEACD2000
|
trusted library allocation
|
page read and write
|
||
19FE982A000
|
trusted library allocation
|
page read and write
|
||
19FF1E93000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FF4ADE000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FEA2D4000
|
trusted library allocation
|
page read and write
|
||
19FF2DEB000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FEA370000
|
trusted library allocation
|
page read and write
|
||
19FE86B9000
|
trusted library allocation
|
page read and write
|
||
19FE564A000
|
trusted library allocation
|
page read and write
|
||
19FEA3FC000
|
trusted library allocation
|
page read and write
|
||
22C75582000
|
trusted library allocation
|
page read and write
|
||
19FE80A2000
|
heap
|
page read and write
|
||
19FE86A4000
|
trusted library allocation
|
page read and write
|
||
19FE9027000
|
trusted library allocation
|
page read and write
|
||
19FE80D7000
|
heap
|
page read and write
|
||
19FF0EA4000
|
trusted library allocation
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FEB0A8000
|
trusted library allocation
|
page read and write
|
||
19FE4726000
|
trusted library allocation
|
page read and write
|
||
19FF4AB0000
|
trusted library allocation
|
page read and write
|
||
19FEA339000
|
trusted library allocation
|
page read and write
|
||
19FE7E88000
|
trusted library allocation
|
page read and write
|
||
2753F422000
|
heap
|
page read and write
|
||
19FE90C2000
|
trusted library allocation
|
page read and write
|
||
19FE98C3000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
1DB6D91D000
|
trusted library allocation
|
page read and write
|
||
19FEA6DA000
|
trusted library allocation
|
page read and write
|
||
19FE597F000
|
trusted library allocation
|
page read and write
|
||
19FEA4AE000
|
trusted library allocation
|
page read and write
|
||
19FEBF92000
|
trusted library allocation
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF0983000
|
trusted library allocation
|
page read and write
|
||
19FF4F35000
|
trusted library allocation
|
page read and write
|
||
19FEA4B1000
|
trusted library allocation
|
page read and write
|
||
19FE9826000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF72D000
|
heap
|
page read and write
|
||
22C750F0000
|
heap
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FDF746000
|
heap
|
page read and write
|
||
19FEB0C0000
|
trusted library allocation
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FF1EF9000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE98A5000
|
trusted library allocation
|
page read and write
|
||
19FE864A000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FE56E0000
|
trusted library allocation
|
page read and write
|
||
19FEBF8E000
|
trusted library allocation
|
page read and write
|
||
1DB6D903000
|
trusted library allocation
|
page read and write
|
||
19FE8678000
|
trusted library allocation
|
page read and write
|
||
1DB6D760000
|
trusted library allocation
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
19FDF725000
|
heap
|
page read and write
|
||
2753F309000
|
heap
|
page read and write
|
||
19FDF75C000
|
heap
|
page read and write
|
||
19FE92AA000
|
trusted library allocation
|
page read and write
|
||
19FDF75E000
|
heap
|
page read and write
|
||
19FEA7CC000
|
trusted library allocation
|
page read and write
|
||
19FDF762000
|
heap
|
page read and write
|
||
19FF0BD8000
|
trusted library allocation
|
page read and write
|
||
514000
|
unkown
|
page readonly
|
||
19FE98BE000
|
trusted library allocation
|
page read and write
|
||
19FE804F000
|
heap
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FE99E8000
|
trusted library allocation
|
page read and write
|
||
19FF0BE4000
|
trusted library allocation
|
page read and write
|
||
19FE9CDB000
|
trusted library allocation
|
page read and write
|
||
19FF1C4C000
|
trusted library allocation
|
page read and write
|
||
19FF0C79000
|
trusted library allocation
|
page read and write
|
||
19FEA351000
|
trusted library allocation
|
page read and write
|
||
19FE6CFA000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FF0C64000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
1DB6D772000
|
trusted library allocation
|
page read and write
|
||
19FF0983000
|
trusted library allocation
|
page read and write
|
||
19FE9A98000
|
trusted library allocation
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
19FE90FA000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FE56A5000
|
trusted library allocation
|
page read and write
|
||
19FF0895000
|
trusted library allocation
|
page read and write
|
||
19FF09A4000
|
trusted library allocation
|
page read and write
|
||
19FF4A90000
|
trusted library allocation
|
page read and write
|
||
19FF08EC000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE603F000
|
trusted library allocation
|
page read and write
|
||
19FEA4F9000
|
trusted library allocation
|
page read and write
|
||
19FE86E5000
|
trusted library allocation
|
page read and write
|
||
19FF09C4000
|
trusted library allocation
|
page read and write
|
||
19FDF751000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
2753E76F000
|
trusted library allocation
|
page read and write
|
||
19FF09A8000
|
trusted library allocation
|
page read and write
|
||
22C7556B000
|
trusted library allocation
|
page read and write
|
||
19FF0C75000
|
trusted library allocation
|
page read and write
|
||
19FE59F6000
|
trusted library allocation
|
page read and write
|
||
19FE8BAA000
|
trusted library allocation
|
page read and write
|
||
19FE9CD8000
|
trusted library allocation
|
page read and write
|
||
19FF50F6000
|
trusted library allocation
|
page read and write
|
||
19FF0C5C000
|
trusted library allocation
|
page read and write
|
||
19FF1DFE000
|
trusted library allocation
|
page read and write
|
||
19FE8582000
|
trusted library allocation
|
page read and write
|
||
19FE858D000
|
trusted library allocation
|
page read and write
|
||
19FEA2DE000
|
trusted library allocation
|
page read and write
|
||
19FE8CFD000
|
trusted library allocation
|
page read and write
|
||
19FEBCD5000
|
trusted library allocation
|
page read and write
|
||
19FDF74B000
|
heap
|
page read and write
|
||
19FF0C46000
|
trusted library allocation
|
page read and write
|
||
19FF0EC0000
|
trusted library allocation
|
page read and write
|
||
19FE902C000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE89FB000
|
trusted library allocation
|
page read and write
|
||
19FE471B000
|
trusted library allocation
|
page read and write
|
||
19FE8080000
|
heap
|
page read and write
|
||
19FF0616000
|
trusted library allocation
|
page read and write
|
||
19FEB08E000
|
trusted library allocation
|
page read and write
|
||
19FE84B6000
|
trusted library allocation
|
page read and write
|
||
19FE927D000
|
trusted library allocation
|
page read and write
|
||
19FF099A000
|
trusted library allocation
|
page read and write
|
||
19FE8674000
|
trusted library allocation
|
page read and write
|
||
19FE6CE9000
|
trusted library allocation
|
page read and write
|
||
19FF4F5B000
|
trusted library allocation
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
2753E786000
|
trusted library allocation
|
page read and write
|
||
84D087E000
|
unkown
|
page readonly
|
||
19FEA208000
|
trusted library allocation
|
page read and write
|
||
19FDF7A6000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF730000
|
heap
|
page read and write
|
||
2753ED60000
|
heap
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FDF745000
|
heap
|
page read and write
|
||
19FE9CF4000
|
trusted library allocation
|
page read and write
|
||
19FF215C000
|
trusted library allocation
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
19FEA5BE000
|
trusted library allocation
|
page read and write
|
||
19FE47D0000
|
trusted library allocation
|
page read and write
|
||
19FE80D7000
|
heap
|
page read and write
|
||
19FE86C1000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE8487000
|
trusted library allocation
|
page read and write
|
||
19FE91EF000
|
trusted library allocation
|
page read and write
|
||
19FE4A2C000
|
trusted library allocation
|
page read and write
|
||
19FE9CF6000
|
trusted library allocation
|
page read and write
|
||
19FE984D000
|
trusted library allocation
|
page read and write
|
||
19FE5880000
|
trusted library allocation
|
page read and write
|
||
19FE9CDF000
|
trusted library allocation
|
page read and write
|
||
2753F360000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
84D10FE000
|
stack
|
page read and write
|
||
19FDF7A6000
|
heap
|
page read and write
|
||
19FEA4EB000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
61CB5FF000
|
stack
|
page read and write
|
||
19FE807F000
|
heap
|
page read and write
|
||
19FE58DA000
|
trusted library allocation
|
page read and write
|
||
19FEB09B000
|
trusted library allocation
|
page read and write
|
||
19FEA7BD000
|
trusted library allocation
|
page read and write
|
||
19FEA6ED000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FDF79B000
|
heap
|
page read and write
|
||
19FF0CAF000
|
trusted library allocation
|
page read and write
|
||
19FF50A4000
|
trusted library allocation
|
page read and write
|
||
19FDF7B5000
|
heap
|
page read and write
|
||
19FE8080000
|
heap
|
page read and write
|
||
19FE90C4000
|
trusted library allocation
|
page read and write
|
||
19FEA3C2000
|
trusted library allocation
|
page read and write
|
||
19FF07C8000
|
trusted library allocation
|
page read and write
|
||
19FF4B6B000
|
heap
|
page read and write
|
||
19FEB0BB000
|
trusted library allocation
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
221FF150000
|
heap
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FF6185000
|
trusted library allocation
|
page read and write
|
||
19FEBC66000
|
trusted library allocation
|
page read and write
|
||
19FE9847000
|
trusted library allocation
|
page read and write
|
||
19FE9B1C000
|
trusted library allocation
|
page read and write
|
||
19FF0638000
|
trusted library allocation
|
page read and write
|
||
19FE8465000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FF07C4000
|
trusted library allocation
|
page read and write
|
||
19FF09D9000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF751000
|
heap
|
page read and write
|
||
19FE859E000
|
trusted library allocation
|
page read and write
|
||
19FDF771000
|
heap
|
page read and write
|
||
19FDF763000
|
heap
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FE90C8000
|
trusted library allocation
|
page read and write
|
||
19FE9068000
|
trusted library allocation
|
page read and write
|
||
19FE8675000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FE8685000
|
trusted library allocation
|
page read and write
|
||
19FE4090000
|
trusted library allocation
|
page read and write
|
||
19FE8474000
|
trusted library allocation
|
page read and write
|
||
19FEA3CF000
|
trusted library allocation
|
page read and write
|
||
19FEA72C000
|
trusted library allocation
|
page read and write
|
||
19FE9C54000
|
trusted library allocation
|
page read and write
|
||
19FF4B01000
|
heap
|
page read and write
|
||
22C75133000
|
heap
|
page read and write
|
||
19FEA4E6000
|
trusted library allocation
|
page read and write
|
||
19FF096A000
|
trusted library allocation
|
page read and write
|
||
19FF4A98000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FDF738000
|
heap
|
page read and write
|
||
19FEA3CC000
|
trusted library allocation
|
page read and write
|
||
19FF06F1000
|
trusted library allocation
|
page read and write
|
||
19FE9CD6000
|
trusted library allocation
|
page read and write
|
||
19FE805F000
|
heap
|
page read and write
|
||
19FF20FC000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FEA3A2000
|
trusted library allocation
|
page read and write
|
||
19FE90A5000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FF05FC000
|
trusted library allocation
|
page read and write
|
||
19FDF74D000
|
heap
|
page read and write
|
||
19FE8060000
|
heap
|
page read and write
|
||
19FE85CE000
|
trusted library allocation
|
page read and write
|
||
19FEA674000
|
trusted library allocation
|
page read and write
|
||
19FEA319000
|
trusted library allocation
|
page read and write
|
||
19FF2161000
|
trusted library allocation
|
page read and write
|
||
19FEBF90000
|
trusted library allocation
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
||
19FE80B4000
|
heap
|
page read and write
|
||
84D08FE000
|
unkown
|
page readonly
|
||
19FEA674000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FF09E1000
|
trusted library allocation
|
page read and write
|
||
19FE6C62000
|
trusted library allocation
|
page read and write
|
||
19FE46FE000
|
trusted library allocation
|
page read and write
|
||
19FF0879000
|
trusted library allocation
|
page read and write
|
||
19FE9868000
|
trusted library allocation
|
page read and write
|
||
19FEA3E1000
|
trusted library allocation
|
page read and write
|
||
19FF0739000
|
trusted library allocation
|
page read and write
|
||
19FEB08E000
|
trusted library allocation
|
page read and write
|
||
19FE8583000
|
trusted library allocation
|
page read and write
|
||
19FE8095000
|
heap
|
page read and write
|
||
19FF60D6000
|
trusted library allocation
|
page read and write
|
||
19FEA3B9000
|
trusted library allocation
|
page read and write
|
||
19FDF739000
|
heap
|
page read and write
|
||
19FEBF7E000
|
trusted library allocation
|
page read and write
|
||
19FE595D000
|
trusted library allocation
|
page read and write
|
||
19FF0C33000
|
trusted library allocation
|
page read and write
|
||
19FEA20E000
|
trusted library allocation
|
page read and write
|
||
19FEBC68000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FE40A1000
|
trusted library allocation
|
page read and write
|
||
1DB6D7C9000
|
trusted library allocation
|
page read and write
|
||
19FF0983000
|
trusted library allocation
|
page read and write
|
||
19FEA698000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE90B7000
|
trusted library allocation
|
page read and write
|
||
22C75700000
|
trusted library allocation
|
page read and write
|
||
1DB6D781000
|
trusted library allocation
|
page read and write
|
||
22C75230000
|
unclassified section
|
page read and write
|
||
19FDF725000
|
heap
|
page read and write
|
||
221FF690000
|
heap
|
page read and write
|
||
19FEA3F3000
|
trusted library allocation
|
page read and write
|
||
22C754F0000
|
heap
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FF0C16000
|
trusted library allocation
|
page read and write
|
||
19FF1E27000
|
trusted library allocation
|
page read and write
|
||
19FF0997000
|
trusted library allocation
|
page read and write
|
||
19FE40B3000
|
trusted library allocation
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
19FDF749000
|
heap
|
page read and write
|
||
19FF07C4000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FE86C1000
|
trusted library allocation
|
page read and write
|
||
19FF097E000
|
trusted library allocation
|
page read and write
|
||
19FEACF6000
|
trusted library allocation
|
page read and write
|
||
19FE9CFD000
|
trusted library allocation
|
page read and write
|
||
19FF0719000
|
trusted library allocation
|
page read and write
|
||
19FF08F7000
|
trusted library allocation
|
page read and write
|
||
19FF5762000
|
trusted library allocation
|
page read and write
|
||
19FF0C16000
|
trusted library allocation
|
page read and write
|
||
1DB6D8E6000
|
heap
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FEA2B8000
|
trusted library allocation
|
page read and write
|
||
19FEA4B1000
|
trusted library allocation
|
page read and write
|
||
19FF0746000
|
trusted library allocation
|
page read and write
|
||
19FE9CB3000
|
trusted library allocation
|
page read and write
|
||
19FE8568000
|
trusted library allocation
|
page read and write
|
||
19FE99E4000
|
trusted library allocation
|
page read and write
|
||
19FE8064000
|
heap
|
page read and write
|
||
19FE9235000
|
trusted library allocation
|
page read and write
|
||
22C7508B000
|
remote allocation
|
page execute read
|
||
19FDF789000
|
heap
|
page read and write
|
||
1DB6D8E4000
|
heap
|
page read and write
|
||
19FE9DCE000
|
trusted library allocation
|
page read and write
|
||
19FEA4A2000
|
trusted library allocation
|
page read and write
|
||
19FF0B14000
|
trusted library allocation
|
page read and write
|
||
19FE6CFC000
|
trusted library allocation
|
page read and write
|
||
19FDF79A000
|
heap
|
page read and write
|
||
19FF0679000
|
trusted library allocation
|
page read and write
|
||
19FF0C60000
|
trusted library allocation
|
page read and write
|
||
2753F360000
|
heap
|
page read and write
|
||
19FE999B000
|
trusted library allocation
|
page read and write
|
||
19FEA7BD000
|
trusted library allocation
|
page read and write
|
||
19FEA4A6000
|
trusted library allocation
|
page read and write
|
||
19FEB0EF000
|
trusted library allocation
|
page read and write
|
||
19FEA2AB000
|
trusted library allocation
|
page read and write
|
||
221FF6A9000
|
heap
|
page read and write
|
||
19FDF767000
|
heap
|
page read and write
|
||
19FF0EB5000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FF05C6000
|
trusted library allocation
|
page read and write
|
||
19FE929A000
|
trusted library allocation
|
page read and write
|
||
19FDF754000
|
heap
|
page read and write
|
||
19FDF7A6000
|
heap
|
page read and write
|
||
19FE981C000
|
trusted library allocation
|
page read and write
|
||
19FE9C5C000
|
trusted library allocation
|
page read and write
|
||
19FF0AD8000
|
trusted library allocation
|
page read and write
|
||
19FF07E0000
|
trusted library allocation
|
page read and write
|
||
19FE7E1A000
|
trusted library allocation
|
page read and write
|
||
19FE98F0000
|
trusted library allocation
|
page read and write
|
||
19FDF742000
|
heap
|
page read and write
|
||
19FE9A9C000
|
trusted library allocation
|
page read and write
|
||
19FF099A000
|
trusted library allocation
|
page read and write
|
||
19FEA3F6000
|
trusted library allocation
|
page read and write
|
||
221FF7B0000
|
heap
|
page read and write
|
||
19FDF799000
|
heap
|
page read and write
|
||
19FE9DE4000
|
trusted library allocation
|
page read and write
|
||
19FF08F7000
|
trusted library allocation
|
page read and write
|
||
1DB6D792000
|
trusted library allocation
|
page read and write
|
||
19FF0619000
|
trusted library allocation
|
page read and write
|
||
19FE9DB7000
|
trusted library allocation
|
page read and write
|
||
19FEA4A7000
|
trusted library allocation
|
page read and write
|
||
19FEAAEA000
|
trusted library allocation
|
page read and write
|
||
19FE9041000
|
trusted library allocation
|
page read and write
|
||
19FE9CFB000
|
trusted library allocation
|
page read and write
|
||
19FE9CEB000
|
trusted library allocation
|
page read and write
|
||
19FEA28F000
|
trusted library allocation
|
page read and write
|
||
19FF4F35000
|
trusted library allocation
|
page read and write
|
||
19FE4A3E000
|
trusted library allocation
|
page read and write
|
||
19FF21F9000
|
trusted library allocation
|
page read and write
|
||
19FEA333000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FE9EFC000
|
trusted library allocation
|
page read and write
|
||
19FE848D000
|
trusted library allocation
|
page read and write
|
||
19FE8470000
|
trusted library allocation
|
page read and write
|
||
19FF1D83000
|
trusted library allocation
|
page read and write
|
||
19FF4F2B000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FE92E1000
|
trusted library allocation
|
page read and write
|
||
19FF0AD8000
|
trusted library allocation
|
page read and write
|
||
2753E632000
|
unclassified section
|
page read and write
|
||
19FF0EE1000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FEB03B000
|
trusted library allocation
|
page read and write
|
||
19FEA3BA000
|
trusted library allocation
|
page read and write
|
||
2753F3E8000
|
heap
|
page read and write
|
||
19FEA4C8000
|
trusted library allocation
|
page read and write
|
||
19FF0C78000
|
trusted library allocation
|
page read and write
|
||
19FE906E000
|
trusted library allocation
|
page read and write
|
||
A6AF1FE000
|
stack
|
page read and write
|
||
19FEA4CA000
|
trusted library allocation
|
page read and write
|
||
2753E63F000
|
unclassified section
|
page read and write
|
||
19FE9A5C000
|
trusted library allocation
|
page read and write
|
||
19FE9C75000
|
trusted library allocation
|
page read and write
|
||
2753F477000
|
heap
|
page read and write
|
||
19FDF78E000
|
heap
|
page read and write
|
||
19FE7E69000
|
trusted library allocation
|
page read and write
|
||
19FEA6CE000
|
trusted library allocation
|
page read and write
|
||
19FE858E000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FEA4C6000
|
trusted library allocation
|
page read and write
|
||
19FEA4D0000
|
trusted library allocation
|
page read and write
|
||
19FEA398000
|
trusted library allocation
|
page read and write
|
||
19FE9A54000
|
trusted library allocation
|
page read and write
|
||
19FF094F000
|
trusted library allocation
|
page read and write
|
||
19FEC1D6000
|
trusted library allocation
|
page read and write
|
||
19FE927E000
|
trusted library allocation
|
page read and write
|
||
2753E761000
|
trusted library allocation
|
page read and write
|
||
19FEA25F000
|
trusted library allocation
|
page read and write
|
||
19FDF72E000
|
heap
|
page read and write
|
||
19FE89E8000
|
trusted library allocation
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
19FEA4B1000
|
trusted library allocation
|
page read and write
|
||
19FE868B000
|
trusted library allocation
|
page read and write
|
||
19FE9EF8000
|
trusted library allocation
|
page read and write
|
||
19FE8659000
|
trusted library allocation
|
page read and write
|
||
19FEABAE000
|
trusted library allocation
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE90C4000
|
trusted library allocation
|
page read and write
|
||
19FEA3F4000
|
trusted library allocation
|
page read and write
|
||
19FEBC52000
|
trusted library allocation
|
page read and write
|
||
19FE7ED7000
|
trusted library allocation
|
page read and write
|
||
19FEA423000
|
trusted library allocation
|
page read and write
|
||
1DB6D390000
|
remote allocation
|
page read and write
|
||
19FE869F000
|
trusted library allocation
|
page read and write
|
||
19FE80B6000
|
heap
|
page read and write
|
||
19FF097D000
|
trusted library allocation
|
page read and write
|
||
19FEA5A4000
|
trusted library allocation
|
page read and write
|
||
19FEAB5A000
|
trusted library allocation
|
page read and write
|
||
19FDF750000
|
heap
|
page read and write
|
||
19FF1E67000
|
trusted library allocation
|
page read and write
|
||
19FE91F2000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FEA3BA000
|
trusted library allocation
|
page read and write
|
||
19FDF79C000
|
heap
|
page read and write
|
||
19FF6118000
|
trusted library allocation
|
page read and write
|
||
19FF0643000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FEA3C1000
|
trusted library allocation
|
page read and write
|
||
19FF0CEB000
|
trusted library allocation
|
page read and write
|
||
19FF09A8000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
22C75800000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FE7E58000
|
trusted library allocation
|
page read and write
|
||
19FEA2E4000
|
trusted library allocation
|
page read and write
|
||
19FE90FC000
|
trusted library allocation
|
page read and write
|
||
19FE99AF000
|
trusted library allocation
|
page read and write
|
||
19FEA26B000
|
trusted library allocation
|
page read and write
|
||
19FEB0D7000
|
trusted library allocation
|
page read and write
|
||
19FE5889000
|
trusted library allocation
|
page read and write
|
||
2753F35C000
|
heap
|
page read and write
|
||
19FF079A000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FF4AAB000
|
trusted library allocation
|
page read and write
|
||
19FE85A5000
|
trusted library allocation
|
page read and write
|
||
19FF0EE1000
|
trusted library allocation
|
page read and write
|
||
19FF6189000
|
trusted library allocation
|
page read and write
|
||
2753F3E0000
|
heap
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
1B7CFDF1000
|
trusted library allocation
|
page execute read
|
||
19FDF74E000
|
heap
|
page read and write
|
||
19FE9EE8000
|
trusted library allocation
|
page read and write
|
||
19FE84B6000
|
trusted library allocation
|
page read and write
|
||
19FF4F30000
|
trusted library allocation
|
page read and write
|
||
19FEA47B000
|
trusted library allocation
|
page read and write
|
||
19FE80B6000
|
heap
|
page read and write
|
||
19FEA2D4000
|
trusted library allocation
|
page read and write
|
||
19FEBC18000
|
trusted library allocation
|
page read and write
|
||
19FE9EA7000
|
trusted library allocation
|
page read and write
|
||
19FE9CB6000
|
trusted library allocation
|
page read and write
|
||
22C75511000
|
trusted library allocation
|
page read and write
|
||
2753F459000
|
heap
|
page read and write
|
||
19FE9C68000
|
trusted library allocation
|
page read and write
|
||
19FE924C000
|
trusted library allocation
|
page read and write
|
||
19FE849A000
|
trusted library allocation
|
page read and write
|
||
19FDF75B000
|
heap
|
page read and write
|
||
19FDF736000
|
heap
|
page read and write
|
||
19FE846D000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
19FDF735000
|
heap
|
page read and write
|
||
19FF0C46000
|
trusted library allocation
|
page read and write
|
||
19FE9CEA000
|
trusted library allocation
|
page read and write
|
||
19FE9B4D000
|
trusted library allocation
|
page read and write
|
||
19FF0739000
|
trusted library allocation
|
page read and write
|
||
19FEA649000
|
trusted library allocation
|
page read and write
|
||
19FEA4CA000
|
trusted library allocation
|
page read and write
|
||
19FF09FD000
|
trusted library allocation
|
page read and write
|
||
19FDF734000
|
heap
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE9CAE000
|
trusted library allocation
|
page read and write
|
||
19FE80D7000
|
heap
|
page read and write
|
||
19FDF755000
|
heap
|
page read and write
|
||
19FF05F0000
|
trusted library allocation
|
page read and write
|
||
19FF0C49000
|
trusted library allocation
|
page read and write
|
||
19FEA20B000
|
trusted library allocation
|
page read and write
|
||
19FEA375000
|
trusted library allocation
|
page read and write
|
||
19FEA4AC000
|
trusted library allocation
|
page read and write
|
||
19FEC153000
|
trusted library allocation
|
page read and write
|
||
19FEA21C000
|
trusted library allocation
|
page read and write
|
||
19FE9E0A000
|
trusted library allocation
|
page read and write
|
||
19FF0863000
|
trusted library allocation
|
page read and write
|
||
19FE906A000
|
trusted library allocation
|
page read and write
|
||
19FF09FA000
|
trusted library allocation
|
page read and write
|
||
19FF09E5000
|
trusted library allocation
|
page read and write
|
||
19FE9B27000
|
trusted library allocation
|
page read and write
|
||
19FE9A81000
|
trusted library allocation
|
page read and write
|
||
19FE8060000
|
heap
|
page read and write
|
||
19FEA3A0000
|
trusted library allocation
|
page read and write
|
||
19FF06ED000
|
trusted library allocation
|
page read and write
|
||
19FEAB6C000
|
trusted library allocation
|
page read and write
|
||
19FEBF7E000
|
trusted library allocation
|
page read and write
|
||
19FDF73C000
|
heap
|
page read and write
|
||
19FF4F23000
|
trusted library allocation
|
page read and write
|
||
19FEA4CA000
|
trusted library allocation
|
page read and write
|
||
19FEA4D0000
|
trusted library allocation
|
page read and write
|
||
19FF07CB000
|
trusted library allocation
|
page read and write
|
||
19FEA3AD000
|
trusted library allocation
|
page read and write
|
||
19FEA3EE000
|
trusted library allocation
|
page read and write
|
||
19FE99E8000
|
trusted library allocation
|
page read and write
|
||
19FE4B68000
|
trusted library allocation
|
page read and write
|
||
2753F38A000
|
heap
|
page read and write
|
||
19FF09D9000
|
trusted library allocation
|
page read and write
|
||
19FE848D000
|
trusted library allocation
|
page read and write
|
||
19FE9E78000
|
trusted library allocation
|
page read and write
|
||
19FEC151000
|
trusted library allocation
|
page read and write
|
||
19FE9BD4000
|
trusted library allocation
|
page read and write
|
||
19FEB0EF000
|
trusted library allocation
|
page read and write
|
||
22C75500000
|
trusted library allocation
|
page read and write
|
||
19FF2189000
|
trusted library allocation
|
page read and write
|
||
19FF4F46000
|
trusted library allocation
|
page read and write
|
||
19FEA2FE000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FEA5A4000
|
trusted library allocation
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FF0659000
|
trusted library allocation
|
page read and write
|
||
19FDF760000
|
heap
|
page read and write
|
||
19FDF73E000
|
heap
|
page read and write
|
||
19FDF757000
|
heap
|
page read and write
|
||
19FE5883000
|
trusted library allocation
|
page read and write
|
||
1DB6D767000
|
trusted library allocation
|
page read and write
|
||
19FDF744000
|
heap
|
page read and write
|
||
19FE9CBC000
|
trusted library allocation
|
page read and write
|
||
19FF50E3000
|
trusted library allocation
|
page read and write
|
||
19FE86E0000
|
trusted library allocation
|
page read and write
|
||
19FDF7A4000
|
heap
|
page read and write
|
||
19FF0BB0000
|
trusted library allocation
|
page read and write
|
||
19FF0953000
|
trusted library allocation
|
page read and write
|
||
19FDF7A1000
|
heap
|
page read and write
|
||
19FF50A9000
|
trusted library allocation
|
page read and write
|
||
19FF0749000
|
trusted library allocation
|
page read and write
|
||
19FDF7AF000
|
heap
|
page read and write
|
||
19FEA323000
|
trusted library allocation
|
page read and write
|
||
19FF0C81000
|
trusted library allocation
|
page read and write
|
||
19FE8440000
|
trusted library allocation
|
page read and write
|
||
19FE809F000
|
heap
|
page read and write
|
||
2753F363000
|
heap
|
page read and write
|
||
19FE99E8000
|
trusted library allocation
|
page read and write
|
||
19FE9E19000
|
trusted library allocation
|
page read and write
|
||
19FEA49C000
|
trusted library allocation
|
page read and write
|
||
221FF6A7000
|
heap
|
page read and write
|
||
2753F208000
|
trusted library allocation
|
page read and write
|
||
A6AE9FF000
|
stack
|
page read and write
|
||
19FE80D7000
|
heap
|
page read and write
|
||
19FDF73F000
|
heap
|
page read and write
|
||
19FF07E2000
|
trusted library allocation
|
page read and write
|
||
19FEBF8E000
|
trusted library allocation
|
page read and write
|
||
19FDF75D000
|
heap
|
page read and write
|
There are 3785 hidden memdumps, click here to show them.