Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_5cffa8e0-c4b8-43a1-a99b-4e8629d16813.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_5cffa8e0-c4b8-43a1-a99b-4e8629d16813.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\activity-stream.discovery_stream.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\activity-stream.discovery_stream.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
|
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
|
modified
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\049WQ4LLFXXS4GTV4K68.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CWUQSG414WCN0956IB82.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 9, database pages 7, cookie
0x5, schema 4, UTF-8, version-valid-for 9
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\f86596a7-7ed7-4758-b8c4-9b7d1a6b9710
(copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\f86596a7-7ed7-4758-b8c4-9b7d1a6b9710.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 36 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224
-prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {0d8a1b39-e660-4dac-b240-ef4997528783} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e06dd10 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -parentBuildID 20230927232528 -prefsHandle 4132
-prefMapHandle 4228 -prefsLen 26208 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {682e83fa-bff4-48c5-9ba5-30aa68b48bf0}
7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e083610 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 5100 -prefMapHandle 5096 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {c5983122-0af4-4d78-a131-0565779d2050} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e58f22910 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema.
|
unknown
|
||
https://spocs.getpocket.com/user2
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
http://mozilla.o
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warning
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
http://r10.i.lencr.org/0$
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2020-12/schema/=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
http://i.pki.goog/r1.crt0
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
|
unknown
|
||
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://r10.o.lencr.org0#
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
http://crl3.digiRq
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
http://crl.pki.goog/gsr1/gsr1.crl0;
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.0/
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
http://o.pki.goog/s/wr3/yvU0%
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.1/
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
http://c.pki.goog/r/r1.crl0
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
http://i.pki.goog/wr3.crt0
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.253.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.193
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.65.91
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
pki-goog.l.google.com
|
142.250.186.99
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.185.206
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
142.250.186.110
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.193.140
|
||
ipv4only.arpa
|
192.0.0.170
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
r10.o.lencr.org
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
o.pki.goog
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 24 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.185.206
|
youtube.com
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
151.101.65.91
|
services.addons.mozilla.org
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
142.250.186.99
|
pki-goog.l.google.com
|
United States
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 3 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
20E4F6F9000
|
trusted library allocation
|
page read and write
|
||
20E4EDFB000
|
trusted library allocation
|
page read and write
|
||
1DAFD52E000
|
trusted library allocation
|
page read and write
|
||
20E44DDB000
|
heap
|
page read and write
|
||
20E58EB5000
|
trusted library allocation
|
page read and write
|
||
20E4F7DF000
|
trusted library allocation
|
page read and write
|
||
B15D7D8000
|
stack
|
page read and write
|
||
20E59075000
|
trusted library allocation
|
page read and write
|
||
20E590C5000
|
trusted library allocation
|
page read and write
|
||
23EFEC19000
|
heap
|
page read and write
|
||
20E55EA2000
|
trusted library allocation
|
page read and write
|
||
22EE9B61000
|
heap
|
page read and write
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E44E0E000
|
heap
|
page read and write
|
||
20E44DF4000
|
heap
|
page read and write
|
||
20E502F5000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
unkown
|
page readonly
|
||
20E4E9BB000
|
trusted library allocation
|
page read and write
|
||
20E4F7CA000
|
trusted library allocation
|
page read and write
|
||
20E44DB5000
|
heap
|
page read and write
|
||
20E58C00000
|
trusted library allocation
|
page read and write
|
||
20E4F99F000
|
trusted library allocation
|
page read and write
|
||
20E595DB000
|
trusted library allocation
|
page read and write
|
||
20E55F74000
|
trusted library allocation
|
page read and write
|
||
20E571C2000
|
trusted library allocation
|
page read and write
|
||
20E513E4000
|
trusted library allocation
|
page read and write
|
||
20E4B573000
|
heap
|
page read and write
|
||
20E503A1000
|
trusted library allocation
|
page read and write
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E44DF2000
|
heap
|
page read and write
|
||
20E595EB000
|
trusted library allocation
|
page read and write
|
||
20E507CE000
|
trusted library allocation
|
page read and write
|
||
20E4F84B000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E597C4000
|
heap
|
page read and write
|
||
20E5768C000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4DEA6000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E5008C000
|
trusted library allocation
|
page read and write
|
||
20E59029000
|
trusted library allocation
|
page read and write
|
||
20E5062B000
|
trusted library allocation
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E59EB3000
|
trusted library allocation
|
page read and write
|
||
20E4FF2B000
|
trusted library allocation
|
page read and write
|
||
20E56082000
|
trusted library allocation
|
page read and write
|
||
20E50091000
|
trusted library allocation
|
page read and write
|
||
20E4E6A5000
|
trusted library allocation
|
page read and write
|
||
20E4F102000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E55FEF000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E4B138000
|
trusted library allocation
|
page read and write
|
||
20E4F6ED000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E5719F000
|
trusted library allocation
|
page read and write
|
||
20E500B7000
|
trusted library allocation
|
page read and write
|
||
1DAFD230000
|
heap
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E57887000
|
trusted library allocation
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E4DECF000
|
trusted library allocation
|
page read and write
|
||
20E4EEA3000
|
trusted library allocation
|
page read and write
|
||
20E5168F000
|
trusted library allocation
|
page read and write
|
||
20E56166000
|
trusted library allocation
|
page read and write
|
||
1481000
|
heap
|
page read and write
|
||
20E57A06000
|
trusted library allocation
|
page read and write
|
||
20E561FD000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E516BE000
|
trusted library allocation
|
page read and write
|
||
20E4E94A000
|
trusted library allocation
|
page read and write
|
||
20E44DDF000
|
heap
|
page read and write
|
||
1DAFD1C0000
|
unclassified section
|
page readonly
|
||
20E4B79E000
|
trusted library allocation
|
page read and write
|
||
22EE95F0000
|
heap
|
page read and write
|
||
20E56184000
|
trusted library allocation
|
page read and write
|
||
20E4F7FB000
|
trusted library allocation
|
page read and write
|
||
20E5046C000
|
trusted library allocation
|
page read and write
|
||
20E508B5000
|
trusted library allocation
|
page read and write
|
||
20E50093000
|
trusted library allocation
|
page read and write
|
||
20E561AD000
|
trusted library allocation
|
page read and write
|
||
20E51380000
|
trusted library allocation
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E55F55000
|
trusted library allocation
|
page read and write
|
||
20E59289000
|
trusted library allocation
|
page read and write
|
||
20E4F6F0000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E5047F000
|
trusted library allocation
|
page read and write
|
||
20E590C3000
|
trusted library allocation
|
page read and write
|
||
20E4B56F000
|
heap
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E4E45C000
|
trusted library allocation
|
page read and write
|
||
20E4FBEC000
|
trusted library allocation
|
page read and write
|
||
20E44DD4000
|
heap
|
page read and write
|
||
250907C1000
|
trusted library allocation
|
page execute read
|
||
20E4EF88000
|
trusted library allocation
|
page read and write
|
||
20E4E9AB000
|
trusted library allocation
|
page read and write
|
||
20E516E8000
|
trusted library allocation
|
page read and write
|
||
20E59445000
|
trusted library allocation
|
page read and write
|
||
20E44DBC000
|
heap
|
page read and write
|
||
20E584FD000
|
trusted library allocation
|
page read and write
|
||
20E51DD8000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
22EE961A000
|
heap
|
page read and write
|
||
20E4FE3C000
|
trusted library allocation
|
page read and write
|
||
20E4E687000
|
trusted library allocation
|
page read and write
|
||
1C5F2D40000
|
heap
|
page read and write
|
||
20E516DC000
|
trusted library allocation
|
page read and write
|
||
20E59625000
|
trusted library allocation
|
page read and write
|
||
20E55E81000
|
trusted library allocation
|
page read and write
|
||
20E4F1BE000
|
trusted library allocation
|
page read and write
|
||
20E5009D000
|
trusted library allocation
|
page read and write
|
||
20E4F8AD000
|
trusted library allocation
|
page read and write
|
||
20E59075000
|
trusted library allocation
|
page read and write
|
||
20E49EB3000
|
trusted library allocation
|
page read and write
|
||
20E4E6DB000
|
trusted library allocation
|
page read and write
|
||
20E5095C000
|
trusted library allocation
|
page read and write
|
||
20E4FB7B000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4F355000
|
trusted library allocation
|
page read and write
|
||
20E5974D000
|
heap
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4B7CE000
|
trusted library allocation
|
page read and write
|
||
20E4F9A9000
|
trusted library allocation
|
page read and write
|
||
20E5004B000
|
trusted library allocation
|
page read and write
|
||
20E516D7000
|
trusted library allocation
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E4F30F000
|
trusted library allocation
|
page read and write
|
||
20E5132D000
|
trusted library allocation
|
page read and write
|
||
20E4AE76000
|
trusted library allocation
|
page read and write
|
||
101BFE000
|
stack
|
page read and write
|
||
20E4F9C8000
|
trusted library allocation
|
page read and write
|
||
20E4FF74000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E4AE78000
|
trusted library allocation
|
page read and write
|
||
20E4EE2E000
|
trusted library allocation
|
page read and write
|
||
20E513B2000
|
trusted library allocation
|
page read and write
|
||
20E5002D000
|
trusted library allocation
|
page read and write
|
||
20E49E26000
|
trusted library allocation
|
page read and write
|
||
20E5902B000
|
trusted library allocation
|
page read and write
|
||
20E594B9000
|
trusted library allocation
|
page read and write
|
||
16B21F80000
|
heap
|
page read and write
|
||
20E4FBB2000
|
trusted library allocation
|
page read and write
|
||
20E4B7CE000
|
trusted library allocation
|
page read and write
|
||
20E4B765000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E513AF000
|
trusted library allocation
|
page read and write
|
||
20E4EE68000
|
trusted library allocation
|
page read and write
|
||
20E59031000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DB6000
|
heap
|
page read and write
|
||
20E50499000
|
trusted library allocation
|
page read and write
|
||
20E4F438000
|
trusted library allocation
|
page read and write
|
||
20E4E031000
|
trusted library allocation
|
page read and write
|
||
20E4FD78000
|
trusted library allocation
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E4DE5E000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E516BC000
|
trusted library allocation
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
20E508DB000
|
trusted library allocation
|
page read and write
|
||
20E4B135000
|
trusted library allocation
|
page read and write
|
||
20E59445000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E44DFA000
|
heap
|
page read and write
|
||
20E4EDF7000
|
trusted library allocation
|
page read and write
|
||
20E44DE5000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E5844C000
|
trusted library allocation
|
page read and write
|
||
20E4DE8F000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4F32D000
|
trusted library allocation
|
page read and write
|
||
20E4DEDC000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4F9AA000
|
trusted library allocation
|
page read and write
|
||
20E55F55000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
20E55ECF000
|
trusted library allocation
|
page read and write
|
||
20E4B7A5000
|
trusted library allocation
|
page read and write
|
||
20E4FF8B000
|
trusted library allocation
|
page read and write
|
||
20E4E4F4000
|
trusted library allocation
|
page read and write
|
||
20E590B2000
|
trusted library allocation
|
page read and write
|
||
20E50653000
|
trusted library allocation
|
page read and write
|
||
20E58FC9000
|
trusted library allocation
|
page read and write
|
||
22EE8F6A000
|
trusted library allocation
|
page read and write
|
||
20E4B767000
|
trusted library allocation
|
page read and write
|
||
20E4F780000
|
trusted library allocation
|
page read and write
|
||
1DAFD61B000
|
trusted library allocation
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
22EE9681000
|
heap
|
page read and write
|
||
20E4FEEA000
|
trusted library allocation
|
page read and write
|
||
20E594C1000
|
trusted library allocation
|
page read and write
|
||
20E44E1F000
|
heap
|
page read and write
|
||
20E4F7F2000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E5606F000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4F7CA000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
16B22175000
|
heap
|
page read and write
|
||
20E4C729000
|
trusted library allocation
|
page read and write
|
||
20E51DAA000
|
trusted library allocation
|
page read and write
|
||
1C5F305D000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4ED74000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4F0CE000
|
trusted library allocation
|
page read and write
|
||
20E59038000
|
trusted library allocation
|
page read and write
|
||
22EE8E00000
|
trusted library allocation
|
page read and write
|
||
20E44DEA000
|
heap
|
page read and write
|
||
16B22200000
|
trusted library allocation
|
page read and write
|
||
20E55E57000
|
trusted library allocation
|
page read and write
|
||
20E4EF53000
|
trusted library allocation
|
page read and write
|
||
20E4B7CE000
|
trusted library allocation
|
page read and write
|
||
20E44DB1000
|
heap
|
page read and write
|
||
20E594D2000
|
trusted library allocation
|
page read and write
|
||
20E51FC3000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E506EA000
|
trusted library allocation
|
page read and write
|
||
20E4E6C6000
|
trusted library allocation
|
page read and write
|
||
20E5844C000
|
trusted library allocation
|
page read and write
|
||
20E4ED27000
|
trusted library allocation
|
page read and write
|
||
20E55FC0000
|
trusted library allocation
|
page read and write
|
||
20E4F967000
|
trusted library allocation
|
page read and write
|
||
20E4F3F4000
|
trusted library allocation
|
page read and write
|
||
20E44DBC000
|
heap
|
page read and write
|
||
22EE960F000
|
heap
|
page read and write
|
||
20E59098000
|
trusted library allocation
|
page read and write
|
||
22EE9B7B000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
20E4F0C1000
|
trusted library allocation
|
page read and write
|
||
20E4F945000
|
trusted library allocation
|
page read and write
|
||
20E55F9E000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E58FF6000
|
trusted library allocation
|
page read and write
|
||
20E571E9000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4FBB4000
|
trusted library allocation
|
page read and write
|
||
20E4F1AC000
|
trusted library allocation
|
page read and write
|
||
20E594F3000
|
trusted library allocation
|
page read and write
|
||
20E4B0AA000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E590C5000
|
trusted library allocation
|
page read and write
|
||
16B22000000
|
trusted library allocation
|
page read and write
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E4F724000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4DEC2000
|
trusted library allocation
|
page read and write
|
||
20E500A1000
|
trusted library allocation
|
page read and write
|
||
20E5976A000
|
heap
|
page read and write
|
||
20E44DD8000
|
heap
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E4F8F3000
|
trusted library allocation
|
page read and write
|
||
20E5082F000
|
trusted library allocation
|
page read and write
|
||
20E500BF000
|
trusted library allocation
|
page read and write
|
||
20E4E69C000
|
trusted library allocation
|
page read and write
|
||
20E44D77000
|
heap
|
page read and write
|
||
20E4F79A000
|
trusted library allocation
|
page read and write
|
||
20E4F9E6000
|
trusted library allocation
|
page read and write
|
||
20E500B7000
|
trusted library allocation
|
page read and write
|
||
1DAFD607000
|
trusted library allocation
|
page read and write
|
||
1DAFD0F0000
|
heap
|
page read and write
|
||
20E4E46A000
|
trusted library allocation
|
page read and write
|
||
20E59098000
|
trusted library allocation
|
page read and write
|
||
20E4E687000
|
trusted library allocation
|
page read and write
|
||
20E59746000
|
heap
|
page read and write
|
||
147B000
|
heap
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
20E4F9FE000
|
trusted library allocation
|
page read and write
|
||
20E4ED67000
|
trusted library allocation
|
page read and write
|
||
20E5973D000
|
heap
|
page read and write
|
||
20E4F447000
|
trusted library allocation
|
page read and write
|
||
20E571C2000
|
trusted library allocation
|
page read and write
|
||
20E4F99C000
|
trusted library allocation
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
20E4F7BA000
|
trusted library allocation
|
page read and write
|
||
20E513B9000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E4F7D3000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4E4D1000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4F9D9000
|
trusted library allocation
|
page read and write
|
||
20E4C74E000
|
trusted library allocation
|
page read and write
|
||
20E4F7F9000
|
trusted library allocation
|
page read and write
|
||
20E5954E000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E59071000
|
trusted library allocation
|
page read and write
|
||
20E590C7000
|
trusted library allocation
|
page read and write
|
||
20E4F7FB000
|
trusted library allocation
|
page read and write
|
||
20E4B56A000
|
heap
|
page read and write
|
||
20E44DA4000
|
heap
|
page read and write
|
||
20E4E4A5000
|
trusted library allocation
|
page read and write
|
||
20E44DB5000
|
heap
|
page read and write
|
||
20E49EA3000
|
trusted library allocation
|
page read and write
|
||
20E57948000
|
trusted library allocation
|
page read and write
|
||
20E59469000
|
trusted library allocation
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E4F9AA000
|
trusted library allocation
|
page read and write
|
||
20E5859D000
|
trusted library allocation
|
page read and write
|
||
20E4B575000
|
heap
|
page read and write
|
||
20E4F34C000
|
trusted library allocation
|
page read and write
|
||
20E5076A000
|
trusted library allocation
|
page read and write
|
||
20E4F0BE000
|
trusted library allocation
|
page read and write
|
||
20E59099000
|
trusted library allocation
|
page read and write
|
||
20E4FB51000
|
trusted library allocation
|
page read and write
|
||
20E501A3000
|
trusted library allocation
|
page read and write
|
||
20E4DD93000
|
trusted library allocation
|
page read and write
|
||
20E4E079000
|
trusted library allocation
|
page read and write
|
||
20E55F94000
|
trusted library allocation
|
page read and write
|
||
B15CDBE000
|
unkown
|
page readonly
|
||
20E50565000
|
trusted library allocation
|
page read and write
|
||
1DAFD193000
|
heap
|
page read and write
|
||
20E44DE8000
|
heap
|
page read and write
|
||
20E50622000
|
trusted library allocation
|
page read and write
|
||
20E594E9000
|
trusted library allocation
|
page read and write
|
||
20E4F077000
|
trusted library allocation
|
page read and write
|
||
20E590F6000
|
trusted library allocation
|
page read and write
|
||
20E3F96A000
|
heap
|
page read and write
|
||
20E49EF0000
|
trusted library allocation
|
page read and write
|
||
20E592B9000
|
trusted library allocation
|
page read and write
|
||
22EE9BA7000
|
heap
|
page read and write
|
||
20E560E9000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E501C8000
|
trusted library allocation
|
page read and write
|
||
20E561BD000
|
trusted library allocation
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E513B2000
|
trusted library allocation
|
page read and write
|
||
22EE95F9000
|
heap
|
page read and write
|
||
20E55F3E000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
20E55FC2000
|
trusted library allocation
|
page read and write
|
||
20E516C7000
|
trusted library allocation
|
page read and write
|
||
20E58426000
|
trusted library allocation
|
page read and write
|
||
20E500D1000
|
trusted library allocation
|
page read and write
|
||
20E4B7A5000
|
trusted library allocation
|
page read and write
|
||
20E4F7B5000
|
trusted library allocation
|
page read and write
|
||
20E518AA000
|
trusted library allocation
|
page read and write
|
||
20E5A16D000
|
trusted library allocation
|
page read and write
|
||
20E55E0C000
|
trusted library allocation
|
page read and write
|
||
20E497CB000
|
trusted library allocation
|
page read and write
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E592BC000
|
trusted library allocation
|
page read and write
|
||
20E44DB5000
|
heap
|
page read and write
|
||
873FABE000
|
unkown
|
page readonly
|
||
20E497C2000
|
trusted library allocation
|
page read and write
|
||
20E51F02000
|
trusted library allocation
|
page read and write
|
||
20E4FF87000
|
trusted library allocation
|
page read and write
|
||
20E50643000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E50972000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E5844E000
|
trusted library allocation
|
page read and write
|
||
20E55EC3000
|
trusted library allocation
|
page read and write
|
||
20E516E4000
|
trusted library allocation
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E5077E000
|
trusted library allocation
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E59085000
|
trusted library allocation
|
page read and write
|
||
20E4FBCC000
|
trusted library allocation
|
page read and write
|
||
1C5F2D20000
|
heap
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E4B125000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
22EE8F0A000
|
trusted library allocation
|
page read and write
|
||
20E592FA000
|
trusted library allocation
|
page read and write
|
||
22EE9678000
|
heap
|
page read and write
|
||
20E44D96000
|
heap
|
page read and write
|
||
20E4FB44000
|
trusted library allocation
|
page read and write
|
||
20E56065000
|
trusted library allocation
|
page read and write
|
||
20E5006A000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E5006A000
|
trusted library allocation
|
page read and write
|
||
20E5909B000
|
trusted library allocation
|
page read and write
|
||
20E4F7BA000
|
trusted library allocation
|
page read and write
|
||
20E4EFD4000
|
trusted library allocation
|
page read and write
|
||
20E5035C000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DAE000
|
heap
|
page read and write
|
||
6AE2DFF000
|
stack
|
page read and write
|
||
20E56166000
|
trusted library allocation
|
page read and write
|
||
20E4DB63000
|
trusted library allocation
|
page read and write
|
||
20E4E449000
|
trusted library allocation
|
page read and write
|
||
20E56069000
|
trusted library allocation
|
page read and write
|
||
1DAFD503000
|
trusted library allocation
|
page read and write
|
||
20E4F77E000
|
trusted library allocation
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E44DF4000
|
heap
|
page read and write
|
||
20E51DAF000
|
trusted library allocation
|
page read and write
|
||
20E44E17000
|
heap
|
page read and write
|
||
20E4B79E000
|
trusted library allocation
|
page read and write
|
||
20E4DDAF000
|
trusted library allocation
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E44D9F000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
20E5928F000
|
trusted library allocation
|
page read and write
|
||
20E594D2000
|
trusted library allocation
|
page read and write
|
||
20E500D1000
|
trusted library allocation
|
page read and write
|
||
20E59024000
|
trusted library allocation
|
page read and write
|
||
20E4EDEF000
|
trusted library allocation
|
page read and write
|
||
CDC000
|
unkown
|
page write copy
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E590DB000
|
trusted library allocation
|
page read and write
|
||
20E4DD74000
|
trusted library allocation
|
page read and write
|
||
20E58E77000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E4F9C9000
|
trusted library allocation
|
page read and write
|
||
20E58FF6000
|
trusted library allocation
|
page read and write
|
||
20E59E33000
|
trusted library allocation
|
page read and write
|
||
20E4F343000
|
trusted library allocation
|
page read and write
|
||
20E44E13000
|
heap
|
page read and write
|
||
20E4F9F6000
|
trusted library allocation
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
20E44E0C000
|
heap
|
page read and write
|
||
20E4FF87000
|
trusted library allocation
|
page read and write
|
||
20E4DEDA000
|
trusted library allocation
|
page read and write
|
||
20E51DD0000
|
trusted library allocation
|
page read and write
|
||
20E4EEAD000
|
trusted library allocation
|
page read and write
|
||
20E5064C000
|
trusted library allocation
|
page read and write
|
||
20E4FB93000
|
trusted library allocation
|
page read and write
|
||
20E4F98F000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E59432000
|
trusted library allocation
|
page read and write
|
||
B15CC7E000
|
stack
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E55F9E000
|
trusted library allocation
|
page read and write
|
||
22EE95DD000
|
heap
|
page read and write
|
||
20E4E474000
|
trusted library allocation
|
page read and write
|
||
20E4F107000
|
trusted library allocation
|
page read and write
|
||
20E51515000
|
trusted library allocation
|
page read and write
|
||
20E4F1A5000
|
trusted library allocation
|
page read and write
|
||
20E5096B000
|
trusted library allocation
|
page read and write
|
||
20E4E0D8000
|
trusted library allocation
|
page read and write
|
||
20E4F37C000
|
trusted library allocation
|
page read and write
|
||
20E4F391000
|
trusted library allocation
|
page read and write
|
||
20E4F094000
|
trusted library allocation
|
page read and write
|
||
20E4EE40000
|
trusted library allocation
|
page read and write
|
||
22EE95EC000
|
heap
|
page read and write
|
||
20E5903A000
|
trusted library allocation
|
page read and write
|
||
20E4F32F000
|
trusted library allocation
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E4E6DB000
|
trusted library allocation
|
page read and write
|
||
20E590B2000
|
trusted library allocation
|
page read and write
|
||
20E4F70F000
|
trusted library allocation
|
page read and write
|
||
20E55F9C000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E4FF65000
|
trusted library allocation
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E590AD000
|
trusted library allocation
|
page read and write
|
||
16B23AB9000
|
heap
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E4EF9F000
|
trusted library allocation
|
page read and write
|
||
1DAFD55D000
|
trusted library allocation
|
page read and write
|
||
20E4C729000
|
trusted library allocation
|
page read and write
|
||
20E4FEA3000
|
trusted library allocation
|
page read and write
|
||
20E51329000
|
trusted library allocation
|
page read and write
|
||
20E501B1000
|
trusted library allocation
|
page read and write
|
||
20E59473000
|
trusted library allocation
|
page read and write
|
||
20E5158F000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4F315000
|
trusted library allocation
|
page read and write
|
||
20E51DE4000
|
trusted library allocation
|
page read and write
|
||
20E4B56E000
|
heap
|
page read and write
|
||
20E51D87000
|
trusted library allocation
|
page read and write
|
||
20E594D8000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E5926D000
|
trusted library allocation
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E59480000
|
trusted library allocation
|
page read and write
|
||
20E4FBA3000
|
trusted library allocation
|
page read and write
|
||
20E509E8000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E4F0D0000
|
trusted library allocation
|
page read and write
|
||
20E44D85000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44DFA000
|
heap
|
page read and write
|
||
20E595EB000
|
trusted library allocation
|
page read and write
|
||
20E4F9B8000
|
trusted library allocation
|
page read and write
|
||
20E4AE91000
|
trusted library allocation
|
page read and write
|
||
20E516DC000
|
trusted library allocation
|
page read and write
|
||
1C5F3003000
|
trusted library allocation
|
page read and write
|
||
20E4FBA0000
|
trusted library allocation
|
page read and write
|
||
20E4FF4A000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E594CC000
|
trusted library allocation
|
page read and write
|
||
20E4F333000
|
trusted library allocation
|
page read and write
|
||
20E561EB000
|
trusted library allocation
|
page read and write
|
||
20E44DE6000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E584ED000
|
trusted library allocation
|
page read and write
|
||
20E5130E000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4E4F4000
|
trusted library allocation
|
page read and write
|
||
20E5006A000
|
trusted library allocation
|
page read and write
|
||
20E560B1000
|
trusted library allocation
|
page read and write
|
||
20E59584000
|
trusted library allocation
|
page read and write
|
||
22EE972B000
|
trusted library allocation
|
page read and write
|
||
20E500BB000
|
trusted library allocation
|
page read and write
|
||
20E594CA000
|
trusted library allocation
|
page read and write
|
||
20E501D3000
|
trusted library allocation
|
page read and write
|
||
20E5A1F1000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E50788000
|
trusted library allocation
|
page read and write
|
||
B15CD7E000
|
stack
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E56184000
|
trusted library allocation
|
page read and write
|
||
20E44D98000
|
heap
|
page read and write
|
||
20E4B122000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4E48C000
|
trusted library allocation
|
page read and write
|
||
20E560C8000
|
trusted library allocation
|
page read and write
|
||
20E501C6000
|
trusted library allocation
|
page read and write
|
||
20E4B7A5000
|
trusted library allocation
|
page read and write
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E500D1000
|
trusted library allocation
|
page read and write
|
||
20E571E9000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E516C0000
|
trusted library allocation
|
page read and write
|
||
20E51F43000
|
trusted library allocation
|
page read and write
|
||
20E4F754000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E4F7EB000
|
trusted library allocation
|
page read and write
|
||
20E4F41E000
|
trusted library allocation
|
page read and write
|
||
20E59771000
|
heap
|
page read and write
|
||
20E4F3F4000
|
trusted library allocation
|
page read and write
|
||
20E497DF000
|
trusted library allocation
|
page read and write
|
||
20E4EF49000
|
trusted library allocation
|
page read and write
|
||
20E4ED20000
|
trusted library allocation
|
page read and write
|
||
CDC000
|
unkown
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4F099000
|
trusted library allocation
|
page read and write
|
||
20E508A8000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E4F8FB000
|
trusted library allocation
|
page read and write
|
||
20E500A3000
|
trusted library allocation
|
page read and write
|
||
20E505DC000
|
trusted library allocation
|
page read and write
|
||
20E4F32F000
|
trusted library allocation
|
page read and write
|
||
20E56184000
|
trusted library allocation
|
page read and write
|
||
20E507C4000
|
trusted library allocation
|
page read and write
|
||
20E4FC09000
|
trusted library allocation
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
16B23ABB000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E560BB000
|
trusted library allocation
|
page read and write
|
||
20E4FF3C000
|
trusted library allocation
|
page read and write
|
||
20E595BA000
|
trusted library allocation
|
page read and write
|
||
20E50093000
|
trusted library allocation
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E4F881000
|
trusted library allocation
|
page read and write
|
||
20E4EFAC000
|
trusted library allocation
|
page read and write
|
||
20E4EDD7000
|
trusted library allocation
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
20E507ED000
|
trusted library allocation
|
page read and write
|
||
20E4EFC1000
|
trusted library allocation
|
page read and write
|
||
20E501BB000
|
trusted library allocation
|
page read and write
|
||
20E56056000
|
trusted library allocation
|
page read and write
|
||
20E59283000
|
trusted library allocation
|
page read and write
|
||
20E44DFA000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4F851000
|
trusted library allocation
|
page read and write
|
||
20E55F99000
|
trusted library allocation
|
page read and write
|
||
20E516F3000
|
trusted library allocation
|
page read and write
|
||
20E4F0E0000
|
trusted library allocation
|
page read and write
|
||
20E5613D000
|
trusted library allocation
|
page read and write
|
||
20E4DED0000
|
trusted library allocation
|
page read and write
|
||
20E4F99A000
|
trusted library allocation
|
page read and write
|
||
20E500BB000
|
trusted library allocation
|
page read and write
|
||
20E55F99000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1C5F3180000
|
heap
|
page read and write
|
||
20E44D96000
|
heap
|
page read and write
|
||
20E44DD8000
|
heap
|
page read and write
|
||
20E4F77B000
|
trusted library allocation
|
page read and write
|
||
20E55F3D000
|
trusted library allocation
|
page read and write
|
||
20E44DB8000
|
heap
|
page read and write
|
||
20E4ED89000
|
trusted library allocation
|
page read and write
|
||
20E3F927000
|
heap
|
page read and write
|
||
20E5952F000
|
trusted library allocation
|
page read and write
|
||
20E597E1000
|
heap
|
page read and write
|
||
22EE95F3000
|
heap
|
page read and write
|
||
20E516E8000
|
trusted library allocation
|
page read and write
|
||
20E509D9000
|
trusted library allocation
|
page read and write
|
||
20E516F3000
|
trusted library allocation
|
page read and write
|
||
20E4F9EF000
|
trusted library allocation
|
page read and write
|
||
20E44DB5000
|
heap
|
page read and write
|
||
16B2220A000
|
trusted library allocation
|
page read and write
|
||
20E4EF83000
|
trusted library allocation
|
page read and write
|
||
1DAFD5A4000
|
trusted library allocation
|
page read and write
|
||
20E5004D000
|
trusted library allocation
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E585CF000
|
trusted library allocation
|
page read and write
|
||
1DAFD619000
|
trusted library allocation
|
page read and write
|
||
20E55F7B000
|
trusted library allocation
|
page read and write
|
||
20E4F7F2000
|
trusted library allocation
|
page read and write
|
||
20E4F9FE000
|
trusted library allocation
|
page read and write
|
||
20E4FBF4000
|
trusted library allocation
|
page read and write
|
||
1DAFD615000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E4F0B4000
|
trusted library allocation
|
page read and write
|
||
20E44E16000
|
heap
|
page read and write
|
||
20E44D9C000
|
heap
|
page read and write
|
||
22EE8B6C000
|
remote allocation
|
page execute read
|
||
20E4ED3D000
|
trusted library allocation
|
page read and write
|
||
20E513DA000
|
trusted library allocation
|
page read and write
|
||
20E5907E000
|
trusted library allocation
|
page read and write
|
||
20E4FF7F000
|
trusted library allocation
|
page read and write
|
||
22EE8FC1000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E56092000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4EF51000
|
trusted library allocation
|
page read and write
|
||
20E507FA000
|
trusted library allocation
|
page read and write
|
||
20E4F7B2000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E516D7000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E4FC46000
|
trusted library allocation
|
page read and write
|
||
20E590F6000
|
trusted library allocation
|
page read and write
|
||
20E5842D000
|
trusted library allocation
|
page read and write
|
||
20E4F3EE000
|
trusted library allocation
|
page read and write
|
||
20E5973E000
|
heap
|
page read and write
|
||
20E44E10000
|
heap
|
page read and write
|
||
1C5F3176000
|
heap
|
page read and write
|
||
20E4AEAC000
|
trusted library allocation
|
page read and write
|
||
20E594ED000
|
trusted library allocation
|
page read and write
|
||
20E44DA0000
|
heap
|
page read and write
|
||
20E4F758000
|
trusted library allocation
|
page read and write
|
||
22EE9679000
|
heap
|
page read and write
|
||
20E4E440000
|
trusted library allocation
|
page read and write
|
||
20E44E1F000
|
heap
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4ED48000
|
trusted library allocation
|
page read and write
|
||
1DAFD030000
|
unclassified section
|
page readonly
|
||
20E44DA7000
|
heap
|
page read and write
|
||
16B21EA0000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E501EC000
|
trusted library allocation
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
22EE8D5F000
|
unclassified section
|
page read and write
|
||
20E4E4FB000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
22EE9642000
|
heap
|
page read and write
|
||
22EE95F0000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
1DAFD1A0000
|
heap
|
page read and write
|
||
20E4E4D1000
|
trusted library allocation
|
page read and write
|
||
20E44DD5000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E5955F000
|
trusted library allocation
|
page read and write
|
||
20E4E9F2000
|
trusted library allocation
|
page read and write
|
||
20E4F7D6000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
20E595FA000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E513DA000
|
trusted library allocation
|
page read and write
|
||
20E58F94000
|
trusted library allocation
|
page read and write
|
||
20E55ECF000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E4E6C4000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
1DAFD184000
|
heap
|
page read and write
|
||
20E50050000
|
trusted library allocation
|
page read and write
|
||
20E4FBCC000
|
trusted library allocation
|
page read and write
|
||
20E5945C000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
1C5F30DB000
|
trusted library allocation
|
page read and write
|
||
20E4F0D5000
|
trusted library allocation
|
page read and write
|
||
20E49E17000
|
trusted library allocation
|
page read and write
|
||
20E4F36D000
|
trusted library allocation
|
page read and write
|
||
20E4FFEF000
|
trusted library allocation
|
page read and write
|
||
20E4F4E6000
|
trusted library allocation
|
page read and write
|
||
20E4EDD7000
|
trusted library allocation
|
page read and write
|
||
20E51687000
|
trusted library allocation
|
page read and write
|
||
1DAFD5B7000
|
trusted library allocation
|
page read and write
|
||
20E4B0BE000
|
trusted library allocation
|
page read and write
|
||
20E49F00000
|
trusted library allocation
|
page read and write
|
||
22EE967D000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
20E4E6F4000
|
trusted library allocation
|
page read and write
|
||
20E55FEC000
|
trusted library allocation
|
page read and write
|
||
873FB3E000
|
unkown
|
page readonly
|
||
20E5908A000
|
trusted library allocation
|
page read and write
|
||
20E51D8F000
|
trusted library allocation
|
page read and write
|
||
20E5928D000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E59098000
|
trusted library allocation
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
22EE9631000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E59477000
|
trusted library allocation
|
page read and write
|
||
20E58EBD000
|
trusted library allocation
|
page read and write
|
||
20E4F445000
|
trusted library allocation
|
page read and write
|
||
20E55E40000
|
trusted library allocation
|
page read and write
|
||
20E51DAF000
|
trusted library allocation
|
page read and write
|
||
20E4E090000
|
trusted library allocation
|
page read and write
|
||
20E5617D000
|
trusted library allocation
|
page read and write
|
||
20E4DE9C000
|
trusted library allocation
|
page read and write
|
||
20E576D5000
|
trusted library allocation
|
page read and write
|
||
20E59083000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E55FF7000
|
trusted library allocation
|
page read and write
|
||
20E5903A000
|
trusted library allocation
|
page read and write
|
||
20E49E82000
|
trusted library allocation
|
page read and write
|
||
20E44DBE000
|
heap
|
page read and write
|
||
20E55FEE000
|
trusted library allocation
|
page read and write
|
||
20E44E07000
|
heap
|
page read and write
|
||
20E4ADE0000
|
trusted library allocation
|
page read and write
|
||
22EE8D76000
|
heap
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E4E4C3000
|
trusted library allocation
|
page read and write
|
||
20E59075000
|
trusted library allocation
|
page read and write
|
||
20E4B565000
|
heap
|
page read and write
|
||
20E4C7AE000
|
trusted library allocation
|
page read and write
|
||
20E44DB6000
|
heap
|
page read and write
|
||
20E59071000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E51685000
|
trusted library allocation
|
page read and write
|
||
20E5614A000
|
trusted library allocation
|
page read and write
|
||
20E4F665000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
1DAFD500000
|
trusted library allocation
|
page read and write
|
||
20E500B7000
|
trusted library allocation
|
page read and write
|
||
20E51DE4000
|
trusted library allocation
|
page read and write
|
||
20E561EB000
|
trusted library allocation
|
page read and write
|
||
22EE8C1A000
|
heap
|
page read and write
|
||
20E4E4FC000
|
trusted library allocation
|
page read and write
|
||
20E50756000
|
trusted library allocation
|
page read and write
|
||
20E44DBC000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E49D2F000
|
trusted library allocation
|
page read and write
|
||
20E4B096000
|
trusted library allocation
|
page read and write
|
||
20E4F95E000
|
trusted library allocation
|
page read and write
|
||
20E4F3C2000
|
trusted library allocation
|
page read and write
|
||
20E56400000
|
trusted library allocation
|
page read and write
|
||
20E501B4000
|
trusted library allocation
|
page read and write
|
||
20E4F088000
|
trusted library allocation
|
page read and write
|
||
20E5973D000
|
heap
|
page read and write
|
||
20E516A2000
|
trusted library allocation
|
page read and write
|
||
20E509B7000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44D9C000
|
heap
|
page read and write
|
||
1DAFD0D0000
|
heap
|
page read and write
|
||
20E516B8000
|
trusted library allocation
|
page read and write
|
||
20E502F3000
|
trusted library allocation
|
page read and write
|
||
20E4DB69000
|
trusted library allocation
|
page read and write
|
||
20E4F98F000
|
trusted library allocation
|
page read and write
|
||
20E4ED86000
|
trusted library allocation
|
page read and write
|
||
20E502C9000
|
trusted library allocation
|
page read and write
|
||
20E44E05000
|
heap
|
page read and write
|
||
20E4C74E000
|
trusted library allocation
|
page read and write
|
||
20E4C733000
|
trusted library allocation
|
page read and write
|
||
20E4FFF2000
|
trusted library allocation
|
page read and write
|
||
20E4E0FE000
|
trusted library allocation
|
page read and write
|
||
CD2000
|
unkown
|
page readonly
|
||
20E590C7000
|
trusted library allocation
|
page read and write
|
||
20E4EDF1000
|
trusted library allocation
|
page read and write
|
||
20E4FD78000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E4ED64000
|
trusted library allocation
|
page read and write
|
||
20E44DDD000
|
heap
|
page read and write
|
||
20E4EDF7000
|
trusted library allocation
|
page read and write
|
||
20E44D96000
|
heap
|
page read and write
|
||
22EE967D000
|
heap
|
page read and write
|
||
20E5928D000
|
trusted library allocation
|
page read and write
|
||
20E561AD000
|
trusted library allocation
|
page read and write
|
||
20E4DBF4000
|
trusted library allocation
|
page read and write
|
||
20E5099C000
|
trusted library allocation
|
page read and write
|
||
20E5606D000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4ED33000
|
trusted library allocation
|
page read and write
|
||
20E58EA6000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E500B7000
|
trusted library allocation
|
page read and write
|
||
20E597C6000
|
heap
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E4AD91000
|
trusted library allocation
|
page read and write
|
||
23EFEB70000
|
heap
|
page read and write
|
||
20E590F8000
|
trusted library allocation
|
page read and write
|
||
22EE95FC000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E44D9E000
|
heap
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E500A3000
|
trusted library allocation
|
page read and write
|
||
20E516E8000
|
trusted library allocation
|
page read and write
|
||
20E500B7000
|
trusted library allocation
|
page read and write
|
||
20E4E0D8000
|
trusted library allocation
|
page read and write
|
||
20E594B6000
|
trusted library allocation
|
page read and write
|
||
20E55E7A000
|
trusted library allocation
|
page read and write
|
||
20E5909B000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
1C5F3076000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E57943000
|
trusted library allocation
|
page read and write
|
||
20E4E484000
|
trusted library allocation
|
page read and write
|
||
20E506E0000
|
trusted library allocation
|
page read and write
|
||
22EE8FBA000
|
trusted library allocation
|
page read and write
|
||
20E505E2000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E500A3000
|
trusted library allocation
|
page read and write
|
||
20E560BB000
|
trusted library allocation
|
page read and write
|
||
20E518DE000
|
trusted library allocation
|
page read and write
|
||
20E55FA1000
|
trusted library allocation
|
page read and write
|
||
22EE9599000
|
heap
|
page read and write
|
||
20E58590000
|
trusted library allocation
|
page read and write
|
||
20E4FBA9000
|
trusted library allocation
|
page read and write
|
||
20E4F7C2000
|
trusted library allocation
|
page read and write
|
||
20E55E63000
|
trusted library allocation
|
page read and write
|
||
20E509EA000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E561F8000
|
trusted library allocation
|
page read and write
|
||
20E44D9E000
|
heap
|
page read and write
|
||
20E44E17000
|
heap
|
page read and write
|
||
20E44DF2000
|
heap
|
page read and write
|
||
20E4DE8B000
|
trusted library allocation
|
page read and write
|
||
20E4FBC3000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E4E9EB000
|
trusted library allocation
|
page read and write
|
||
20E5906F000
|
trusted library allocation
|
page read and write
|
||
20E4EDF1000
|
trusted library allocation
|
page read and write
|
||
20E58EDD000
|
trusted library allocation
|
page read and write
|
||
20E44DAE000
|
heap
|
page read and write
|
||
1DAFD60E000
|
trusted library allocation
|
page read and write
|
||
20E5908F000
|
trusted library allocation
|
page read and write
|
||
20E51370000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E5922E000
|
trusted library allocation
|
page read and write
|
||
20E5613C000
|
trusted library allocation
|
page read and write
|
||
20E4B767000
|
trusted library allocation
|
page read and write
|
||
20E4F73C000
|
trusted library allocation
|
page read and write
|
||
20E49D76000
|
trusted library allocation
|
page read and write
|
||
20E4EDEA000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4F933000
|
trusted library allocation
|
page read and write
|
||
22EE9591000
|
heap
|
page read and write
|
||
22EE9B84000
|
heap
|
page read and write
|
||
20E509E6000
|
trusted library allocation
|
page read and write
|
||
20E4FD8B000
|
trusted library allocation
|
page read and write
|
||
20E56082000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E516A2000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
1001FE000
|
unkown
|
page readonly
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E4FBA7000
|
trusted library allocation
|
page read and write
|
||
20E501C6000
|
trusted library allocation
|
page read and write
|
||
20E4EF73000
|
trusted library allocation
|
page read and write
|
||
20E4DC00000
|
trusted library allocation
|
page read and write
|
||
20E4DEB5000
|
trusted library allocation
|
page read and write
|
||
22EE9681000
|
heap
|
page read and write
|
||
20E59083000
|
trusted library allocation
|
page read and write
|
||
20E4F745000
|
trusted library allocation
|
page read and write
|
||
20E4F34C000
|
trusted library allocation
|
page read and write
|
||
20E4E6A5000
|
trusted library allocation
|
page read and write
|
||
20E4AEA5000
|
trusted library allocation
|
page read and write
|
||
20E44DFA000
|
heap
|
page read and write
|
||
22EE95F0000
|
heap
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E5132F000
|
trusted library allocation
|
page read and write
|
||
20E4F9EA000
|
trusted library allocation
|
page read and write
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E4FFF2000
|
trusted library allocation
|
page read and write
|
||
20E590A7000
|
trusted library allocation
|
page read and write
|
||
20E4E64A000
|
trusted library allocation
|
page read and write
|
||
20E55F77000
|
trusted library allocation
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
22EE8F64000
|
trusted library allocation
|
page read and write
|
||
20E51899000
|
trusted library allocation
|
page read and write
|
||
20E5007E000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E55EC0000
|
trusted library allocation
|
page read and write
|
||
20E4EE96000
|
trusted library allocation
|
page read and write
|
||
20E50587000
|
trusted library allocation
|
page read and write
|
||
20E4EEFD000
|
trusted library allocation
|
page read and write
|
||
20E4FB9B000
|
trusted library allocation
|
page read and write
|
||
20E4FC55000
|
trusted library allocation
|
page read and write
|
||
20E597C4000
|
heap
|
page read and write
|
||
20E585E6000
|
trusted library allocation
|
page read and write
|
||
20E4F412000
|
trusted library allocation
|
page read and write
|
||
20E5185F000
|
trusted library allocation
|
page read and write
|
||
20E5908D000
|
trusted library allocation
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E4FFFA000
|
trusted library allocation
|
page read and write
|
||
20E513E4000
|
trusted library allocation
|
page read and write
|
||
20E576D2000
|
trusted library allocation
|
page read and write
|
||
20E4F4DF000
|
trusted library allocation
|
page read and write
|
||
20E4F94A000
|
trusted library allocation
|
page read and write
|
||
20E55F9C000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
20E5616B000
|
trusted library allocation
|
page read and write
|
||
22EE961A000
|
heap
|
page read and write
|
||
20E55EDB000
|
trusted library allocation
|
page read and write
|
||
20E44DDB000
|
heap
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E4F894000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
1C5F3030000
|
trusted library allocation
|
page read and write
|
||
20E51334000
|
trusted library allocation
|
page read and write
|
||
20E561F8000
|
trusted library allocation
|
page read and write
|
||
23EFEE00000
|
trusted library allocation
|
page read and write
|
||
20E4F9FC000
|
trusted library allocation
|
page read and write
|
||
20E4F739000
|
trusted library allocation
|
page read and write
|
||
20E4E651000
|
trusted library allocation
|
page read and write
|
||
20E55F55000
|
trusted library allocation
|
page read and write
|
||
20E513AB000
|
trusted library allocation
|
page read and write
|
||
20E44DB1000
|
heap
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E51DD0000
|
trusted library allocation
|
page read and write
|
||
20E516F3000
|
trusted library allocation
|
page read and write
|
||
20E5009D000
|
trusted library allocation
|
page read and write
|
||
20E4EDEB000
|
trusted library allocation
|
page read and write
|
||
20E59028000
|
trusted library allocation
|
page read and write
|
||
20E597C6000
|
heap
|
page read and write
|
||
20E4F7DF000
|
trusted library allocation
|
page read and write
|
||
20E4F9D9000
|
trusted library allocation
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E5946B000
|
trusted library allocation
|
page read and write
|
||
20E4B783000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E500B7000
|
trusted library allocation
|
page read and write
|
||
20E4F7F2000
|
trusted library allocation
|
page read and write
|
||
20E55EBD000
|
trusted library allocation
|
page read and write
|
||
20E5614A000
|
trusted library allocation
|
page read and write
|
||
20E49790000
|
trusted library allocation
|
page read and write
|
||
20E44DA0000
|
heap
|
page read and write
|
||
20E44DE6000
|
heap
|
page read and write
|
||
20E4DE86000
|
trusted library allocation
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E507C9000
|
trusted library allocation
|
page read and write
|
||
20E4F88A000
|
trusted library allocation
|
page read and write
|
||
20E4B765000
|
trusted library allocation
|
page read and write
|
||
22EE9573000
|
unkown
|
page execute read
|
||
20E44DFB000
|
heap
|
page read and write
|
||
250907B9000
|
trusted library allocation
|
page execute read
|
||
20E4DD5F000
|
trusted library allocation
|
page read and write
|
||
20E58E74000
|
trusted library allocation
|
page read and write
|
||
1DAFD510000
|
trusted library allocation
|
page read and write
|
||
20E44DEE000
|
heap
|
page read and write
|
||
20E49781000
|
trusted library allocation
|
page read and write
|
||
20E59281000
|
trusted library allocation
|
page read and write
|
||
20E513DA000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4F4F7000
|
trusted library allocation
|
page read and write
|
||
20E4F475000
|
trusted library allocation
|
page read and write
|
||
20E50044000
|
trusted library allocation
|
page read and write
|
||
23EFEF0A000
|
trusted library allocation
|
page read and write
|
||
20E4E4C3000
|
trusted library allocation
|
page read and write
|
||
20E502D6000
|
trusted library allocation
|
page read and write
|
||
3E21000
|
heap
|
page read and write
|
||
20E44DE6000
|
heap
|
page read and write
|
||
20E4FA7A000
|
trusted library allocation
|
page read and write
|
||
20E57138000
|
trusted library allocation
|
page read and write
|
||
B15CCFD000
|
stack
|
page read and write
|
||
20E4F94F000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
20E4F894000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E51DCC000
|
trusted library allocation
|
page read and write
|
||
211E000
|
stack
|
page read and write
|
||
20E5168E000
|
trusted library allocation
|
page read and write
|
||
20E4F9FE000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E51DB7000
|
trusted library allocation
|
page read and write
|
||
20E561CB000
|
trusted library allocation
|
page read and write
|
||
20E4F9A8000
|
trusted library allocation
|
page read and write
|
||
20E59471000
|
trusted library allocation
|
page read and write
|
||
20E595E7000
|
trusted library allocation
|
page read and write
|
||
20E50087000
|
trusted library allocation
|
page read and write
|
||
20E44DE6000
|
heap
|
page read and write
|
||
20E560B3000
|
trusted library allocation
|
page read and write
|
||
20E5002B000
|
trusted library allocation
|
page read and write
|
||
20E4F9D1000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E516B8000
|
trusted library allocation
|
page read and write
|
||
20E5095C000
|
trusted library allocation
|
page read and write
|
||
20E51340000
|
trusted library allocation
|
page read and write
|
||
1C5F3024000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E560BD000
|
trusted library allocation
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E4E9F6000
|
trusted library allocation
|
page read and write
|
||
20E4FF5B000
|
trusted library allocation
|
page read and write
|
||
20E4EFCB000
|
trusted library allocation
|
page read and write
|
||
20E4F7B5000
|
trusted library allocation
|
page read and write
|
||
20E500CF000
|
trusted library allocation
|
page read and write
|
||
20E55F53000
|
trusted library allocation
|
page read and write
|
||
20E4FFB9000
|
trusted library allocation
|
page read and write
|
||
20E5007E000
|
trusted library allocation
|
page read and write
|
||
20E44DA0000
|
heap
|
page read and write
|
||
20E503CA000
|
trusted library allocation
|
page read and write
|
||
20E4B565000
|
heap
|
page read and write
|
||
20E4FFC5000
|
trusted library allocation
|
page read and write
|
||
20E571E0000
|
trusted library allocation
|
page read and write
|
||
20E590B2000
|
trusted library allocation
|
page read and write
|
||
20E590C5000
|
trusted library allocation
|
page read and write
|
||
20E44D99000
|
heap
|
page read and write
|
||
1C5F340C000
|
trusted library allocation
|
page read and write
|
||
22EE9678000
|
heap
|
page read and write
|
||
20E592FE000
|
trusted library allocation
|
page read and write
|
||
20E516A2000
|
trusted library allocation
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E44DD8000
|
heap
|
page read and write
|
||
20E4EDF8000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E58FD5000
|
trusted library allocation
|
page read and write
|
||
20E516C7000
|
trusted library allocation
|
page read and write
|
||
20E4F9F6000
|
trusted library allocation
|
page read and write
|
||
20E500CF000
|
trusted library allocation
|
page read and write
|
||
20E4F867000
|
trusted library allocation
|
page read and write
|
||
20E4FF7D000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4B56F000
|
heap
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E59075000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44DAE000
|
heap
|
page read and write
|
||
20E501B9000
|
trusted library allocation
|
page read and write
|
||
20E503FC000
|
trusted library allocation
|
page read and write
|
||
20E592A9000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
22EE8F77000
|
trusted library allocation
|
page read and write
|
||
20E4DD6D000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E50065000
|
trusted library allocation
|
page read and write
|
||
20E58E55000
|
trusted library allocation
|
page read and write
|
||
1C5F2D0B000
|
remote allocation
|
page execute read
|
||
20E5047F000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E516B5000
|
trusted library allocation
|
page read and write
|
||
20E5908A000
|
trusted library allocation
|
page read and write
|
||
20E4FAD6000
|
trusted library allocation
|
page read and write
|
||
20E4EF1D000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E503C6000
|
trusted library allocation
|
page read and write
|
||
20E50360000
|
trusted library allocation
|
page read and write
|
||
22EE9B62000
|
heap
|
page read and write
|
||
20E592F4000
|
trusted library allocation
|
page read and write
|
||
20E4F95F000
|
trusted library allocation
|
page read and write
|
||
20E4C7EE000
|
trusted library allocation
|
page read and write
|
||
20E501C8000
|
trusted library allocation
|
page read and write
|
||
1C5F2EF2000
|
unclassified section
|
page read and write
|
||
1023FE000
|
unkown
|
page readonly
|
||
20E44E0D000
|
heap
|
page read and write
|
||
148F000
|
heap
|
page read and write
|
||
20E44DBA000
|
heap
|
page read and write
|
||
20E4F013000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E51DD4000
|
trusted library allocation
|
page read and write
|
||
20E4EF79000
|
trusted library allocation
|
page read and write
|
||
20E4DEB5000
|
trusted library allocation
|
page read and write
|
||
20E4F96C000
|
trusted library allocation
|
page read and write
|
||
20E4EDC0000
|
trusted library allocation
|
page read and write
|
||
20E4F1A0000
|
trusted library allocation
|
page read and write
|
||
20E5131F000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4B565000
|
heap
|
page read and write
|
||
20E504C8000
|
trusted library allocation
|
page read and write
|
||
20E4EDFB000
|
trusted library allocation
|
page read and write
|
||
20E50091000
|
trusted library allocation
|
page read and write
|
||
20E4F7E2000
|
trusted library allocation
|
page read and write
|
||
20E4B565000
|
heap
|
page read and write
|
||
20E44DA3000
|
heap
|
page read and write
|
||
20E500CF000
|
trusted library allocation
|
page read and write
|
||
20E4F7FD000
|
trusted library allocation
|
page read and write
|
||
20E4B548000
|
heap
|
page read and write
|
||
20E585D2000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E505CE000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E503D1000
|
trusted library allocation
|
page read and write
|
||
20E5613C000
|
trusted library allocation
|
page read and write
|
||
20E4DE7B000
|
trusted library allocation
|
page read and write
|
||
20E4F968000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E4EEA3000
|
trusted library allocation
|
page read and write
|
||
22EE9560000
|
trusted library allocation
|
page read and write
|
||
20E4EF7C000
|
trusted library allocation
|
page read and write
|
||
20E4EEE7000
|
trusted library allocation
|
page read and write
|
||
873FAFE000
|
stack
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E4FB75000
|
trusted library allocation
|
page read and write
|
||
20E4B0C7000
|
trusted library allocation
|
page read and write
|
||
20E4F7EA000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E590BA000
|
trusted library allocation
|
page read and write
|
||
20E513B6000
|
trusted library allocation
|
page read and write
|
||
20E4F339000
|
trusted library allocation
|
page read and write
|
||
20E3F97A000
|
heap
|
page read and write
|
||
20E4F829000
|
trusted library allocation
|
page read and write
|
||
20E4EFFC000
|
trusted library allocation
|
page read and write
|
||
20E50373000
|
trusted library allocation
|
page read and write
|
||
20E5076C000
|
trusted library allocation
|
page read and write
|
||
20E4E64C000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E516C7000
|
trusted library allocation
|
page read and write
|
||
20E55F94000
|
trusted library allocation
|
page read and write
|
||
20E5002B000
|
trusted library allocation
|
page read and write
|
||
22EE9B98000
|
heap
|
page read and write
|
||
20E55F0A000
|
trusted library allocation
|
page read and write
|
||
20E58FCD000
|
trusted library allocation
|
page read and write
|
||
20E59580000
|
trusted library allocation
|
page read and write
|
||
20E4E9BB000
|
trusted library allocation
|
page read and write
|
||
20E590B0000
|
trusted library allocation
|
page read and write
|
||
22EE8D74000
|
heap
|
page read and write
|
||
22EE95F9000
|
heap
|
page read and write
|
||
1DAFD617000
|
trusted library allocation
|
page read and write
|
||
20E5768C000
|
trusted library allocation
|
page read and write
|
||
20E5906B000
|
trusted library allocation
|
page read and write
|
||
20E59556000
|
trusted library allocation
|
page read and write
|
||
20E4F085000
|
trusted library allocation
|
page read and write
|
||
20E4DE7B000
|
trusted library allocation
|
page read and write
|
||
20E4F1D1000
|
trusted library allocation
|
page read and write
|
||
20E4FB87000
|
trusted library allocation
|
page read and write
|
||
20E4F1B4000
|
trusted library allocation
|
page read and write
|
||
1DAFD55B000
|
trusted library allocation
|
page read and write
|
||
20E55F70000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E513BD000
|
trusted library allocation
|
page read and write
|
||
20E4EFFE000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4FEFC000
|
trusted library allocation
|
page read and write
|
||
20E55EC3000
|
trusted library allocation
|
page read and write
|
||
20E4FC0F000
|
trusted library allocation
|
page read and write
|
||
20E4FAE8000
|
trusted library allocation
|
page read and write
|
||
20E4FE61000
|
trusted library allocation
|
page read and write
|
||
20E49DF6000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E59072000
|
trusted library allocation
|
page read and write
|
||
20E4F0D1000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E55E62000
|
trusted library allocation
|
page read and write
|
||
20E4FAF2000
|
trusted library allocation
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E597C7000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E560BB000
|
trusted library allocation
|
page read and write
|
||
20E4FADE000
|
trusted library allocation
|
page read and write
|
||
20E4F091000
|
trusted library allocation
|
page read and write
|
||
20E5907D000
|
trusted library allocation
|
page read and write
|
||
20E58ED1000
|
trusted library allocation
|
page read and write
|
||
20E4FF21000
|
trusted library allocation
|
page read and write
|
||
20E4F8C4000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E4E6BA000
|
trusted library allocation
|
page read and write
|
||
20E513B9000
|
trusted library allocation
|
page read and write
|
||
20E4EF6F000
|
trusted library allocation
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
1DAFD598000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E4FBAC000
|
trusted library allocation
|
page read and write
|
||
20E5842B000
|
trusted library allocation
|
page read and write
|
||
22EE9649000
|
heap
|
page read and write
|
||
20E5964B000
|
trusted library allocation
|
page read and write
|
||
20E4F8B3000
|
trusted library allocation
|
page read and write
|
||
20E44DDE000
|
heap
|
page read and write
|
||
20E44D85000
|
heap
|
page read and write
|
||
20E4E983000
|
trusted library allocation
|
page read and write
|
||
20E5973D000
|
heap
|
page read and write
|
||
20E4FF70000
|
trusted library allocation
|
page read and write
|
||
1DAFD090000
|
remote allocation
|
page read and write
|
||
1C5F3120000
|
unclassified section
|
page readonly
|
||
20E513BD000
|
trusted library allocation
|
page read and write
|
||
20E55F74000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E515BC000
|
trusted library allocation
|
page read and write
|
||
20E4F42B000
|
trusted library allocation
|
page read and write
|
||
20E5008C000
|
trusted library allocation
|
page read and write
|
||
20E4EE6D000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E59471000
|
trusted library allocation
|
page read and write
|
||
20E4F728000
|
trusted library allocation
|
page read and write
|
||
20E4F381000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E4F9C8000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E59098000
|
trusted library allocation
|
page read and write
|
||
20E44E1B000
|
heap
|
page read and write
|
||
20E4B7CE000
|
trusted library allocation
|
page read and write
|
||
20E55FF2000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4FB96000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
1C5F2EE0000
|
heap
|
page readonly
|
||
20E4B0C7000
|
trusted library allocation
|
page read and write
|
||
20E518B2000
|
trusted library allocation
|
page read and write
|
||
20E500D1000
|
trusted library allocation
|
page read and write
|
||
20E4DD97000
|
trusted library allocation
|
page read and write
|
||
20E44D9F000
|
heap
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E4E081000
|
trusted library allocation
|
page read and write
|
||
20E55FF7000
|
trusted library allocation
|
page read and write
|
||
20E4F32C000
|
trusted library allocation
|
page read and write
|
||
20E50059000
|
trusted library allocation
|
page read and write
|
||
20E4C78D000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E59285000
|
trusted library allocation
|
page read and write
|
||
20E4F9AC000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E4F7E2000
|
trusted library allocation
|
page read and write
|
||
20E5005C000
|
trusted library allocation
|
page read and write
|
||
20E506EE000
|
trusted library allocation
|
page read and write
|
||
20E4B56F000
|
heap
|
page read and write
|
||
20E4AD21000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E55F9B000
|
trusted library allocation
|
page read and write
|
||
20E4F9B0000
|
trusted library allocation
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
20E56071000
|
trusted library allocation
|
page read and write
|
||
20E4F315000
|
trusted library allocation
|
page read and write
|
||
20E4F7AA000
|
trusted library allocation
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E4C760000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E4F37C000
|
trusted library allocation
|
page read and write
|
||
20E500D5000
|
trusted library allocation
|
page read and write
|
||
20E59469000
|
trusted library allocation
|
page read and write
|
||
20E5002B000
|
trusted library allocation
|
page read and write
|
||
20E4FB51000
|
trusted library allocation
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E44E23000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E59735000
|
heap
|
page read and write
|
||
16B22170000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E4FB8B000
|
trusted library allocation
|
page read and write
|
||
20E44E0C000
|
heap
|
page read and write
|
||
20E44E0E000
|
heap
|
page read and write
|
||
20E4F378000
|
trusted library allocation
|
page read and write
|
||
22EE9B98000
|
heap
|
page read and write
|
||
20E44D9C000
|
heap
|
page read and write
|
||
20E4F782000
|
trusted library allocation
|
page read and write
|
||
20E57196000
|
trusted library allocation
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
20E57696000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4F98F000
|
trusted library allocation
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E55EFC000
|
trusted library allocation
|
page read and write
|
||
20E4EFB7000
|
trusted library allocation
|
page read and write
|
||
20E55E20000
|
trusted library allocation
|
page read and write
|
||
20E500A1000
|
trusted library allocation
|
page read and write
|
||
20E44DAA000
|
heap
|
page read and write
|
||
20E4FBF4000
|
trusted library allocation
|
page read and write
|
||
20E44E21000
|
heap
|
page read and write
|
||
20E4F69C000
|
trusted library allocation
|
page read and write
|
||
20E58EFA000
|
trusted library allocation
|
page read and write
|
||
20E55E00000
|
trusted library allocation
|
page read and write
|
||
20E504AF000
|
trusted library allocation
|
page read and write
|
||
20E4FB6A000
|
trusted library allocation
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E516B5000
|
trusted library allocation
|
page read and write
|
||
1C5F3078000
|
trusted library allocation
|
page read and write
|
||
20E44E0E000
|
heap
|
page read and write
|
||
20E56200000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E4DDF6000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
1C5F30F6000
|
trusted library allocation
|
page read and write
|
||
20E4E97B000
|
trusted library allocation
|
page read and write
|
||
20E571AD000
|
trusted library allocation
|
page read and write
|
||
20E595CC000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E5906F000
|
trusted library allocation
|
page read and write
|
||
20E44DF2000
|
heap
|
page read and write
|
||
20E44DEE000
|
heap
|
page read and write
|
||
20E5905A000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4B71F000
|
trusted library allocation
|
page read and write
|
||
20E513AF000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E507ED000
|
trusted library allocation
|
page read and write
|
||
20E59075000
|
trusted library allocation
|
page read and write
|
||
20E585DE000
|
trusted library allocation
|
page read and write
|
||
20E4F9C8000
|
trusted library allocation
|
page read and write
|
||
20E500B9000
|
trusted library allocation
|
page read and write
|
||
20E49E26000
|
trusted library allocation
|
page read and write
|
||
20E4F7F9000
|
trusted library allocation
|
page read and write
|
||
20E59426000
|
trusted library allocation
|
page read and write
|
||
22EE9B98000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44DBC000
|
heap
|
page read and write
|
||
20E5945C000
|
trusted library allocation
|
page read and write
|
||
20E4DE5E000
|
trusted library allocation
|
page read and write
|
||
20E516EC000
|
trusted library allocation
|
page read and write
|
||
20E4F9EA000
|
trusted library allocation
|
page read and write
|
||
20E4B78C000
|
trusted library allocation
|
page read and write
|
||
20E4ADE7000
|
trusted library allocation
|
page read and write
|
||
20E4B553000
|
heap
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
20E507C9000
|
trusted library allocation
|
page read and write
|
||
20E4F7F9000
|
trusted library allocation
|
page read and write
|
||
20E4F9DF000
|
trusted library allocation
|
page read and write
|
||
20E4B575000
|
heap
|
page read and write
|
||
20E4DEC6000
|
trusted library allocation
|
page read and write
|
||
20E57905000
|
trusted library allocation
|
page read and write
|
||
20E5983C000
|
heap
|
page read and write
|
||
20E4E484000
|
trusted library allocation
|
page read and write
|
||
20E592E2000
|
trusted library allocation
|
page read and write
|
||
20E4B78A000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E59584000
|
trusted library allocation
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
20E4E484000
|
trusted library allocation
|
page read and write
|
||
20E5901A000
|
trusted library allocation
|
page read and write
|
||
20E58EA6000
|
trusted library allocation
|
page read and write
|
||
20E4F0F9000
|
trusted library allocation
|
page read and write
|
||
20E500D7000
|
trusted library allocation
|
page read and write
|
||
20E56069000
|
trusted library allocation
|
page read and write
|
||
20E59071000
|
trusted library allocation
|
page read and write
|
||
20E4F0AB000
|
trusted library allocation
|
page read and write
|
||
20E571B4000
|
trusted library allocation
|
page read and write
|
||
20E497A7000
|
trusted library allocation
|
page read and write
|
||
1C5F2E90000
|
heap
|
page read and write
|
||
20E55E14000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E594A3000
|
trusted library allocation
|
page read and write
|
||
20E4FFC5000
|
trusted library allocation
|
page read and write
|
||
20E500BD000
|
trusted library allocation
|
page read and write
|
||
20E590D4000
|
trusted library allocation
|
page read and write
|
||
20E4F95E000
|
trusted library allocation
|
page read and write
|
||
20E4EDCB000
|
trusted library allocation
|
page read and write
|
||
20E4EEF5000
|
trusted library allocation
|
page read and write
|
||
22EE8F23000
|
trusted library allocation
|
page read and write
|
||
20E5036F000
|
trusted library allocation
|
page read and write
|
||
20E4EF23000
|
trusted library allocation
|
page read and write
|
||
1DAFD600000
|
trusted library allocation
|
page read and write
|
||
20E58437000
|
trusted library allocation
|
page read and write
|
||
20E594F5000
|
trusted library allocation
|
page read and write
|
||
20E4B554000
|
heap
|
page read and write
|
||
20E59228000
|
trusted library allocation
|
page read and write
|
||
22EE8F2F000
|
trusted library allocation
|
page read and write
|
||
20E59620000
|
trusted library allocation
|
page read and write
|
||
20E4DB69000
|
trusted library allocation
|
page read and write
|
||
20E505D6000
|
trusted library allocation
|
page read and write
|
||
20E4EE89000
|
trusted library allocation
|
page read and write
|
||
20E4EFFA000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E4F4F5000
|
trusted library allocation
|
page read and write
|
||
1C5F3174000
|
heap
|
page read and write
|
||
20E4EEED000
|
trusted library allocation
|
page read and write
|
||
22EE9679000
|
heap
|
page read and write
|
||
22EE95FC000
|
heap
|
page read and write
|
||
20E50087000
|
trusted library allocation
|
page read and write
|
||
16B21FB8000
|
heap
|
page read and write
|
||
20E50562000
|
trusted library allocation
|
page read and write
|
||
22EE967D000
|
heap
|
page read and write
|
||
22EE9B6D000
|
heap
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E4EDF9000
|
trusted library allocation
|
page read and write
|
||
20E44DD8000
|
heap
|
page read and write
|
||
20E4FFFA000
|
trusted library allocation
|
page read and write
|
||
20E5168F000
|
trusted library allocation
|
page read and write
|
||
20E4FEFC000
|
trusted library allocation
|
page read and write
|
||
22EE8B00000
|
unclassified section
|
page readonly
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E4EFC3000
|
trusted library allocation
|
page read and write
|
||
20E500D5000
|
trusted library allocation
|
page read and write
|
||
20E4DE99000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E4FF81000
|
trusted library allocation
|
page read and write
|
||
20E4F84B000
|
trusted library allocation
|
page read and write
|
||
20E4DEA6000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E4EE1A000
|
trusted library allocation
|
page read and write
|
||
20E4FBA3000
|
trusted library allocation
|
page read and write
|
||
20E4E987000
|
trusted library allocation
|
page read and write
|
||
22EE8F5C000
|
trusted library allocation
|
page read and write
|
||
20E4FD84000
|
trusted library allocation
|
page read and write
|
||
22EE8D50000
|
unclassified section
|
page read and write
|
||
20E516BE000
|
trusted library allocation
|
page read and write
|
||
20E585EF000
|
trusted library allocation
|
page read and write
|
||
20E4F93B000
|
trusted library allocation
|
page read and write
|
||
20E585E1000
|
trusted library allocation
|
page read and write
|
||
20E518F6000
|
trusted library allocation
|
page read and write
|
||
20E4E60E000
|
trusted library allocation
|
page read and write
|
||
1C5F3069000
|
trusted library allocation
|
page read and write
|
||
20E4F771000
|
trusted library allocation
|
page read and write
|
||
20E4FD8B000
|
trusted library allocation
|
page read and write
|
||
20E501D5000
|
trusted library allocation
|
page read and write
|
||
20E4E41C000
|
trusted library allocation
|
page read and write
|
||
20E44D9F000
|
heap
|
page read and write
|
||
1C5F3000000
|
trusted library allocation
|
page read and write
|
||
20E44DE9000
|
heap
|
page read and write
|
||
20E59077000
|
trusted library allocation
|
page read and write
|
||
20E4F7B2000
|
trusted library allocation
|
page read and write
|
||
20E595D5000
|
trusted library allocation
|
page read and write
|
||
20E4EDFD000
|
trusted library allocation
|
page read and write
|
||
20E4B0EB000
|
trusted library allocation
|
page read and write
|
||
20E55F34000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E4E461000
|
trusted library allocation
|
page read and write
|
||
20E513F3000
|
trusted library allocation
|
page read and write
|
||
20E5844E000
|
trusted library allocation
|
page read and write
|
||
20E5166B000
|
trusted library allocation
|
page read and write
|
||
20E515CC000
|
trusted library allocation
|
page read and write
|
||
20E4F878000
|
trusted library allocation
|
page read and write
|
||
20E4DEA1000
|
trusted library allocation
|
page read and write
|
||
20E504BD000
|
trusted library allocation
|
page read and write
|
||
20E5168F000
|
trusted library allocation
|
page read and write
|
||
20E5908A000
|
trusted library allocation
|
page read and write
|
||
20E4EE51000
|
trusted library allocation
|
page read and write
|
||
20E44DDE000
|
heap
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E500A1000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E4B7CE000
|
trusted library allocation
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
20E4F367000
|
trusted library allocation
|
page read and write
|
||
20E4E453000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E55F0F000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E4F42F000
|
trusted library allocation
|
page read and write
|
||
20E4F9A8000
|
trusted library allocation
|
page read and write
|
||
20E59493000
|
trusted library allocation
|
page read and write
|
||
20E51DCC000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E49EFC000
|
trusted library allocation
|
page read and write
|
||
20E5713A000
|
trusted library allocation
|
page read and write
|
||
20E4EFFE000
|
trusted library allocation
|
page read and write
|
||
20E4F9EA000
|
trusted library allocation
|
page read and write
|
||
20E518B8000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E5908A000
|
trusted library allocation
|
page read and write
|
||
25090831000
|
trusted library allocation
|
page execute read
|
||
20E59473000
|
trusted library allocation
|
page read and write
|
||
20E4FC55000
|
trusted library allocation
|
page read and write
|
||
20E4F42D000
|
trusted library allocation
|
page read and write
|
||
20E504BD000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E571CE000
|
trusted library allocation
|
page read and write
|
||
20E57A2C000
|
trusted library allocation
|
page read and write
|
||
20E59015000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E50637000
|
trusted library allocation
|
page read and write
|
||
20E4FF27000
|
trusted library allocation
|
page read and write
|
||
D39000
|
stack
|
page read and write
|
||
22EE9B98000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
20E5081C000
|
trusted library allocation
|
page read and write
|
||
20E4F79A000
|
trusted library allocation
|
page read and write
|
||
20E4F95B000
|
trusted library allocation
|
page read and write
|
||
20E4F9ED000
|
trusted library allocation
|
page read and write
|
||
20E3F99E000
|
heap
|
page read and write
|
||
1C5F3082000
|
trusted library allocation
|
page read and write
|
||
16B21FB0000
|
heap
|
page read and write
|
||
20E55F83000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E4FF98000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1DAFD160000
|
heap
|
page readonly
|
||
22EE967D000
|
heap
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
20E44DEC000
|
heap
|
page read and write
|
||
20E44DB7000
|
heap
|
page read and write
|
||
20E571F5000
|
trusted library allocation
|
page read and write
|
||
20E509F3000
|
trusted library allocation
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
20E4F95B000
|
trusted library allocation
|
page read and write
|
||
20E5094C000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E5035A000
|
trusted library allocation
|
page read and write
|
||
1C5F2D23000
|
heap
|
page read and write
|
||
20E4E464000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E55F2C000
|
trusted library allocation
|
page read and write
|
||
20E4F7F2000
|
trusted library allocation
|
page read and write
|
||
20E516B5000
|
trusted library allocation
|
page read and write
|
||
20E4C761000
|
trusted library allocation
|
page read and write
|
||
20E44DA5000
|
heap
|
page read and write
|
||
20E55FF7000
|
trusted library allocation
|
page read and write
|
||
20E4F082000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E4C74E000
|
trusted library allocation
|
page read and write
|
||
20E4FBB4000
|
trusted library allocation
|
page read and write
|
||
20E4B79E000
|
trusted library allocation
|
page read and write
|
||
20E503AD000
|
trusted library allocation
|
page read and write
|
||
20E4E4D1000
|
trusted library allocation
|
page read and write
|
||
20E4F4C0000
|
trusted library allocation
|
page read and write
|
||
20E4F8BF000
|
trusted library allocation
|
page read and write
|
||
20E5712C000
|
trusted library allocation
|
page read and write
|
||
20E590BA000
|
trusted library allocation
|
page read and write
|
||
20E4FF4F000
|
trusted library allocation
|
page read and write
|
||
20E3F97A000
|
heap
|
page read and write
|
||
20E5081F000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E51687000
|
trusted library allocation
|
page read and write
|
||
20E4F9E6000
|
trusted library allocation
|
page read and write
|
||
20E4FE4A000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E59263000
|
trusted library allocation
|
page read and write
|
||
20E50748000
|
trusted library allocation
|
page read and write
|
||
147C000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E58F74000
|
trusted library allocation
|
page read and write
|
||
20E59473000
|
trusted library allocation
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
1C5F2D10000
|
unclassified section
|
page readonly
|
||
20E4F189000
|
trusted library allocation
|
page read and write
|
||
20E4AEBA000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
20E4F7AA000
|
trusted library allocation
|
page read and write
|
||
20E500A3000
|
trusted library allocation
|
page read and write
|
||
20E4EED7000
|
trusted library allocation
|
page read and write
|
||
20E506FE000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E4DEBA000
|
trusted library allocation
|
page read and write
|
||
20E57199000
|
trusted library allocation
|
page read and write
|
||
20E4F9ED000
|
trusted library allocation
|
page read and write
|
||
20E50037000
|
trusted library allocation
|
page read and write
|
||
20E513F3000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E44DA3000
|
heap
|
page read and write
|
||
20E44D9C000
|
heap
|
page read and write
|
||
20E5186B000
|
trusted library allocation
|
page read and write
|
||
20E44D9F000
|
heap
|
page read and write
|
||
20E49E13000
|
trusted library allocation
|
page read and write
|
||
20E585C6000
|
trusted library allocation
|
page read and write
|
||
22EE9682000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
22EE8C10000
|
heap
|
page read and write
|
||
20E4FF04000
|
trusted library allocation
|
page read and write
|
||
20E49EF8000
|
trusted library allocation
|
page read and write
|
||
20E51662000
|
trusted library allocation
|
page read and write
|
||
20E4EE64000
|
trusted library allocation
|
page read and write
|
||
20E4F635000
|
trusted library allocation
|
page read and write
|
||
20E4E055000
|
trusted library allocation
|
page read and write
|
||
20E4F99A000
|
trusted library allocation
|
page read and write
|
||
20E5906F000
|
trusted library allocation
|
page read and write
|
||
20E590F6000
|
trusted library allocation
|
page read and write
|
||
1C5F2EF0000
|
unclassified section
|
page read and write
|
||
20E59024000
|
trusted library allocation
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E4F1BE000
|
trusted library allocation
|
page read and write
|
||
22EE9671000
|
heap
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
20E5619B000
|
trusted library allocation
|
page read and write
|
||
20E4DED7000
|
trusted library allocation
|
page read and write
|
||
20E513BD000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
873F9FE000
|
unkown
|
page readonly
|
||
20E4F410000
|
trusted library allocation
|
page read and write
|
||
20E4E923000
|
trusted library allocation
|
page read and write
|
||
20E4E087000
|
trusted library allocation
|
page read and write
|
||
20E51DB0000
|
trusted library allocation
|
page read and write
|
||
20E55F24000
|
trusted library allocation
|
page read and write
|
||
20E513CD000
|
trusted library allocation
|
page read and write
|
||
20E44E07000
|
heap
|
page read and write
|
||
20E55FB2000
|
trusted library allocation
|
page read and write
|
||
20E4F99F000
|
trusted library allocation
|
page read and write
|
||
20E51DAD000
|
trusted library allocation
|
page read and write
|
||
20E4EE7C000
|
trusted library allocation
|
page read and write
|
||
20E4F1AC000
|
trusted library allocation
|
page read and write
|
||
20E4EEAB000
|
trusted library allocation
|
page read and write
|
||
22EE9B98000
|
heap
|
page read and write
|
||
20E509C0000
|
trusted library allocation
|
page read and write
|
||
20E59075000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
6AE35FE000
|
stack
|
page read and write
|
||
20E5002B000
|
trusted library allocation
|
page read and write
|
||
20E4F87F000
|
trusted library allocation
|
page read and write
|
||
20E59495000
|
trusted library allocation
|
page read and write
|
||
20E5165B000
|
trusted library allocation
|
page read and write
|
||
3E21000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E51DE8000
|
trusted library allocation
|
page read and write
|
||
20E55E16000
|
trusted library allocation
|
page read and write
|
||
20E4F7F6000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E59077000
|
trusted library allocation
|
page read and write
|
||
20E509AA000
|
trusted library allocation
|
page read and write
|
||
20E44DAA000
|
heap
|
page read and write
|
||
20E4FBEC000
|
trusted library allocation
|
page read and write
|
||
20E59570000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E502BC000
|
trusted library allocation
|
page read and write
|
||
20E4DBF4000
|
trusted library allocation
|
page read and write
|
||
1DAFD572000
|
trusted library allocation
|
page read and write
|
||
22EE95EC000
|
heap
|
page read and write
|
||
20E4F7F6000
|
trusted library allocation
|
page read and write
|
||
20E516BE000
|
trusted library allocation
|
page read and write
|
||
20E5617D000
|
trusted library allocation
|
page read and write
|
||
20E590FD000
|
trusted library allocation
|
page read and write
|
||
20E4EEAD000
|
trusted library allocation
|
page read and write
|
||
20E4DD9F000
|
trusted library allocation
|
page read and write
|
||
1DAFD110000
|
heap
|
page read and write
|
||
20E44DBC000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E4F7F2000
|
trusted library allocation
|
page read and write
|
||
20E4EF1F000
|
trusted library allocation
|
page read and write
|
||
20E4F615000
|
trusted library allocation
|
page read and write
|
||
20E5908D000
|
trusted library allocation
|
page read and write
|
||
20E59469000
|
trusted library allocation
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
1DAFD63D000
|
trusted library allocation
|
page read and write
|
||
20E594D8000
|
trusted library allocation
|
page read and write
|
||
20E4FFD2000
|
trusted library allocation
|
page read and write
|
||
6AE4DFF000
|
stack
|
page read and write
|
||
20E513B2000
|
trusted library allocation
|
page read and write
|
||
20E4FF7A000
|
trusted library allocation
|
page read and write
|
||
20E55FEC000
|
trusted library allocation
|
page read and write
|
||
20E4F1C1000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4EF77000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E508AD000
|
trusted library allocation
|
page read and write
|
||
20E4B5BA000
|
heap
|
page read and write
|
||
1C5F30A2000
|
trusted library allocation
|
page read and write
|
||
20E590A0000
|
trusted library allocation
|
page read and write
|
||
20E4DBF4000
|
trusted library allocation
|
page read and write
|
||
20E503CA000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E4E906000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E59072000
|
trusted library allocation
|
page read and write
|
||
23EFEBB0000
|
heap
|
page read and write
|
||
20E4F463000
|
trusted library allocation
|
page read and write
|
||
20E4F023000
|
trusted library allocation
|
page read and write
|
||
20E5945C000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4E4F4000
|
trusted library allocation
|
page read and write
|
||
20E4E0DA000
|
trusted library allocation
|
page read and write
|
||
20E4E6BA000
|
trusted library allocation
|
page read and write
|
||
20E584DB000
|
trusted library allocation
|
page read and write
|
||
20E4F752000
|
trusted library allocation
|
page read and write
|
||
20E4F9D9000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E44D9F000
|
heap
|
page read and write
|
||
20E504DC000
|
trusted library allocation
|
page read and write
|
||
20E4F3DF000
|
trusted library allocation
|
page read and write
|
||
20E590EC000
|
trusted library allocation
|
page read and write
|
||
20E578E5000
|
trusted library allocation
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
20E57A57000
|
trusted library allocation
|
page read and write
|
||
20E4F0A4000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
20E4E055000
|
trusted library allocation
|
page read and write
|
||
20E571F5000
|
trusted library allocation
|
page read and write
|
||
20E55F69000
|
trusted library allocation
|
page read and write
|
||
20E4F7C2000
|
trusted library allocation
|
page read and write
|
||
20E592CD000
|
trusted library allocation
|
page read and write
|
||
20E59532000
|
trusted library allocation
|
page read and write
|
||
1C5F308F000
|
trusted library allocation
|
page read and write
|
||
20E4F8A3000
|
trusted library allocation
|
page read and write
|
||
20E44DB6000
|
heap
|
page read and write
|
||
20E502CD000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4DEA1000
|
trusted library allocation
|
page read and write
|
||
20E44D9D000
|
heap
|
page read and write
|
||
20E58E00000
|
trusted library allocation
|
page read and write
|
||
20E592F6000
|
trusted library allocation
|
page read and write
|
||
20E44E10000
|
heap
|
page read and write
|
||
20E50499000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E5185F000
|
trusted library allocation
|
page read and write
|
||
20E44DF5000
|
heap
|
page read and write
|
||
20E4EE5B000
|
trusted library allocation
|
page read and write
|
||
20E501B1000
|
trusted library allocation
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
20E51342000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E59071000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E4DEC6000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4EF1B000
|
trusted library allocation
|
page read and write
|
||
20E4E012000
|
trusted library allocation
|
page read and write
|
||
1DAFD020000
|
unclassified section
|
page readonly
|
||
20E44E0B000
|
heap
|
page read and write
|
||
CE4000
|
unkown
|
page readonly
|
||
20E4DEC2000
|
trusted library allocation
|
page read and write
|
||
20E4ED72000
|
trusted library allocation
|
page read and write
|
||
20E56089000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E4FB64000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E5159C000
|
trusted library allocation
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
20E516D7000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
22EE9480000
|
heap
|
page read and write
|
||
20E4E4F4000
|
trusted library allocation
|
page read and write
|
||
20E501BB000
|
trusted library allocation
|
page read and write
|
||
240DABD1E000
|
trusted library allocation
|
page read and write
|
||
20E561EB000
|
trusted library allocation
|
page read and write
|
||
1DAFD180000
|
heap
|
page read and write
|
||
20E57196000
|
trusted library allocation
|
page read and write
|
||
20E513AF000
|
trusted library allocation
|
page read and write
|
||
20E4EEF3000
|
trusted library allocation
|
page read and write
|
||
20E59580000
|
trusted library allocation
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
20E4F681000
|
trusted library allocation
|
page read and write
|
||
22EE9B6A000
|
heap
|
page read and write
|
||
20E4FF88000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E4FF1F000
|
trusted library allocation
|
page read and write
|
||
20E4B78A000
|
trusted library allocation
|
page read and write
|
||
20E44DA5000
|
heap
|
page read and write
|
||
20E4F337000
|
trusted library allocation
|
page read and write
|
||
20E4F95E000
|
trusted library allocation
|
page read and write
|
||
20E51DE8000
|
trusted library allocation
|
page read and write
|
||
20E59038000
|
trusted library allocation
|
page read and write
|
||
22EE8BD0000
|
heap
|
page read and write
|
||
20E4F1A7000
|
trusted library allocation
|
page read and write
|
||
20E59236000
|
trusted library allocation
|
page read and write
|
||
20E4DE47000
|
trusted library allocation
|
page read and write
|
||
20E44DB7000
|
heap
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E500D1000
|
trusted library allocation
|
page read and write
|
||
20E5069D000
|
trusted library allocation
|
page read and write
|
||
23EFEC1F000
|
heap
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E4B79E000
|
trusted library allocation
|
page read and write
|
||
20E4E9D4000
|
trusted library allocation
|
page read and write
|
||
20E590EC000
|
trusted library allocation
|
page read and write
|
||
20E4DD63000
|
trusted library allocation
|
page read and write
|
||
20E594FC000
|
trusted library allocation
|
page read and write
|
||
20E4EDB2000
|
trusted library allocation
|
page read and write
|
||
20E4E08A000
|
trusted library allocation
|
page read and write
|
||
1C5F3013000
|
trusted library allocation
|
page read and write
|
||
20E4FB86000
|
trusted library allocation
|
page read and write
|
||
20E44E1D000
|
heap
|
page read and write
|
||
6AE2DFB000
|
stack
|
page read and write
|
||
20E4FC62000
|
trusted library allocation
|
page read and write
|
||
20E59471000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4ED82000
|
trusted library allocation
|
page read and write
|
||
20E44D99000
|
heap
|
page read and write
|
||
16B21F8A000
|
heap
|
page read and write
|
||
20E4FF24000
|
trusted library allocation
|
page read and write
|
||
20E44E1D000
|
heap
|
page read and write
|
||
20E4F9A8000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E513CD000
|
trusted library allocation
|
page read and write
|
||
22EE9BA9000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E513F3000
|
trusted library allocation
|
page read and write
|
||
20E4FF6D000
|
trusted library allocation
|
page read and write
|
||
20E4E443000
|
trusted library allocation
|
page read and write
|
||
22EE9673000
|
heap
|
page read and write
|
||
20E4F32F000
|
trusted library allocation
|
page read and write
|
||
20E4DEC6000
|
trusted library allocation
|
page read and write
|
||
20E4E48C000
|
trusted library allocation
|
page read and write
|
||
20E516B8000
|
trusted library allocation
|
page read and write
|
||
20E55F40000
|
trusted library allocation
|
page read and write
|
||
20E50517000
|
trusted library allocation
|
page read and write
|
||
20E4FFE4000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E58EE5000
|
trusted library allocation
|
page read and write
|
||
20E4F85F000
|
trusted library allocation
|
page read and write
|
||
20E44DE6000
|
heap
|
page read and write
|
||
22EE95F0000
|
heap
|
page read and write
|
||
20E4F9E6000
|
trusted library allocation
|
page read and write
|
||
20E50392000
|
trusted library allocation
|
page read and write
|
||
20E44DD5000
|
heap
|
page read and write
|
||
20E571F5000
|
trusted library allocation
|
page read and write
|
||
20E55FF2000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E5159C000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44D9E000
|
heap
|
page read and write
|
||
20E594F5000
|
trusted library allocation
|
page read and write
|
||
20E5903E000
|
trusted library allocation
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E5089B000
|
trusted library allocation
|
page read and write
|
||
1DAFD172000
|
unclassified section
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
22EE96C0000
|
heap
|
page read and write
|
||
20E590FD000
|
trusted library allocation
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E592F8000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E506EC000
|
trusted library allocation
|
page read and write
|
||
20E51672000
|
trusted library allocation
|
page read and write
|
||
20E59592000
|
trusted library allocation
|
page read and write
|
||
20E4E4D1000
|
trusted library allocation
|
page read and write
|
||
22EE9BA7000
|
heap
|
page read and write
|
||
20E4FCB7000
|
trusted library allocation
|
page read and write
|
||
20E4ADE5000
|
trusted library allocation
|
page read and write
|
||
20E4FD8B000
|
trusted library allocation
|
page read and write
|
||
20E4F48B000
|
trusted library allocation
|
page read and write
|
||
20E3F967000
|
heap
|
page read and write
|
||
20E4FF83000
|
trusted library allocation
|
page read and write
|
||
20E4F3F7000
|
trusted library allocation
|
page read and write
|
||
20E56044000
|
trusted library allocation
|
page read and write
|
||
20E59285000
|
trusted library allocation
|
page read and write
|
||
20E51662000
|
trusted library allocation
|
page read and write
|
||
20E5908A000
|
trusted library allocation
|
page read and write
|
||
3F20000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E590F1000
|
trusted library allocation
|
page read and write
|
||
20E55E1D000
|
trusted library allocation
|
page read and write
|
||
20E55FBE000
|
trusted library allocation
|
page read and write
|
||
20E506E8000
|
trusted library allocation
|
page read and write
|
||
20E5973D000
|
heap
|
page read and write
|
||
20E571E9000
|
trusted library allocation
|
page read and write
|
||
148F000
|
heap
|
page read and write
|
||
20E4DEAC000
|
trusted library allocation
|
page read and write
|
||
20E4F1B7000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E5008C000
|
trusted library allocation
|
page read and write
|
||
20E59049000
|
trusted library allocation
|
page read and write
|
||
20E4F9B8000
|
trusted library allocation
|
page read and write
|
||
22EE8BB0000
|
heap
|
page read and write
|
||
20E4EFBD000
|
trusted library allocation
|
page read and write
|
||
20E4F75B000
|
trusted library allocation
|
page read and write
|
||
20E4F98F000
|
trusted library allocation
|
page read and write
|
||
20E57696000
|
trusted library allocation
|
page read and write
|
||
20E55F53000
|
trusted library allocation
|
page read and write
|
||
20E59429000
|
trusted library allocation
|
page read and write
|
||
10447E000
|
unkown
|
page readonly
|
||
1C5F30C4000
|
trusted library allocation
|
page read and write
|
||
20E576D7000
|
trusted library allocation
|
page read and write
|
||
1C5F3016000
|
trusted library allocation
|
page read and write
|
||
20E4E914000
|
trusted library allocation
|
page read and write
|
||
20E51DE0000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
20E44DFA000
|
heap
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
20E5942E000
|
trusted library allocation
|
page read and write
|
||
20E44E1D000
|
heap
|
page read and write
|
||
22EE968D000
|
heap
|
page read and write
|
||
20E51630000
|
trusted library allocation
|
page read and write
|
||
20E4F4FC000
|
trusted library allocation
|
page read and write
|
||
20E4E48C000
|
trusted library allocation
|
page read and write
|
||
250908E1000
|
trusted library allocation
|
page execute read
|
||
20E56092000
|
trusted library allocation
|
page read and write
|
||
1C5F3400000
|
trusted library allocation
|
page read and write
|
||
20E4F371000
|
trusted library allocation
|
page read and write
|
||
20E4DE4E000
|
trusted library allocation
|
page read and write
|
||
20E58437000
|
trusted library allocation
|
page read and write
|
||
20E592B6000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E594FC000
|
trusted library allocation
|
page read and write
|
||
20E508AD000
|
trusted library allocation
|
page read and write
|
||
22EE8FC3000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
20E44E0C000
|
heap
|
page read and write
|
||
20E513B6000
|
trusted library allocation
|
page read and write
|
||
20E516EC000
|
trusted library allocation
|
page read and write
|
||
20E50057000
|
trusted library allocation
|
page read and write
|
||
22EE9681000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E590A5000
|
trusted library allocation
|
page read and write
|
||
20E5046C000
|
trusted library allocation
|
page read and write
|
||
20E4B561000
|
heap
|
page read and write
|
||
20E518B2000
|
trusted library allocation
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E49EF8000
|
trusted library allocation
|
page read and write
|
||
22EE8DF2000
|
unkown
|
page execute read
|
||
20E4FCB7000
|
trusted library allocation
|
page read and write
|
||
20E5079B000
|
trusted library allocation
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E507B8000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E4B76A000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E4B09A000
|
trusted library allocation
|
page read and write
|
||
20E518B7000
|
trusted library allocation
|
page read and write
|
||
1C5F2EFF000
|
unclassified section
|
page read and write
|
||
20E4F9DF000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E5182F000
|
trusted library allocation
|
page read and write
|
||
20E5A184000
|
trusted library allocation
|
page read and write
|
||
20E4EF8D000
|
trusted library allocation
|
page read and write
|
||
20E4B7A5000
|
trusted library allocation
|
page read and write
|
||
20E50087000
|
trusted library allocation
|
page read and write
|
||
20E57DA8000
|
trusted library allocation
|
page read and write
|
||
20E509FC000
|
trusted library allocation
|
page read and write
|
||
20E50967000
|
trusted library allocation
|
page read and write
|
||
20E55FF7000
|
trusted library allocation
|
page read and write
|
||
20E4F07C000
|
trusted library allocation
|
page read and write
|
||
20E51685000
|
trusted library allocation
|
page read and write
|
||
20E4E48C000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E50993000
|
trusted library allocation
|
page read and write
|
||
20E594B9000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E5905A000
|
trusted library allocation
|
page read and write
|
||
20E4F9F6000
|
trusted library allocation
|
page read and write
|
||
20E5077B000
|
trusted library allocation
|
page read and write
|
||
20E4F0F7000
|
trusted library allocation
|
page read and write
|
||
20E4EE6C000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E50091000
|
trusted library allocation
|
page read and write
|
||
20E4EFFA000
|
trusted library allocation
|
page read and write
|
||
20E4F6EA000
|
trusted library allocation
|
page read and write
|
||
20E58E16000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E5926D000
|
trusted library allocation
|
page read and write
|
||
20E44DEF000
|
heap
|
page read and write
|
||
22EE8F03000
|
trusted library allocation
|
page read and write
|
||
20E590C0000
|
trusted library allocation
|
page read and write
|
||
20E55F70000
|
trusted library allocation
|
page read and write
|
||
22EE8F48000
|
trusted library allocation
|
page read and write
|
||
20E44E05000
|
heap
|
page read and write
|
||
20E4E97B000
|
trusted library allocation
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E44D9E000
|
heap
|
page read and write
|
||
20E5908D000
|
trusted library allocation
|
page read and write
|
||
20E592B6000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
6AE3DFE000
|
stack
|
page read and write
|
||
20E4EE5F000
|
trusted library allocation
|
page read and write
|
||
20E516EE000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E505D6000
|
trusted library allocation
|
page read and write
|
||
22EE9B7B000
|
heap
|
page read and write
|
||
20E4E653000
|
trusted library allocation
|
page read and write
|
||
20E51DE0000
|
trusted library allocation
|
page read and write
|
||
20E4E459000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E595B5000
|
trusted library allocation
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
20E4B0F6000
|
trusted library allocation
|
page read and write
|
||
20E59077000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E571D3000
|
trusted library allocation
|
page read and write
|
||
20E4E440000
|
trusted library allocation
|
page read and write
|
||
20E4E03B000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44E1D000
|
heap
|
page read and write
|
||
20E4DEA3000
|
trusted library allocation
|
page read and write
|
||
20E4EE56000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E5904A000
|
trusted library allocation
|
page read and write
|
||
20E4F6A6000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E5618A000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E4F7D2000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E44D9F000
|
heap
|
page read and write
|
||
20E4F7F6000
|
trusted library allocation
|
page read and write
|
||
20E506E6000
|
trusted library allocation
|
page read and write
|
||
20E59088000
|
trusted library allocation
|
page read and write
|
||
20E4FBA0000
|
trusted library allocation
|
page read and write
|
||
20E506E4000
|
trusted library allocation
|
page read and write
|
||
20E508B1000
|
trusted library allocation
|
page read and write
|
||
22EE9700000
|
trusted library allocation
|
page read and write
|
||
20E4E03D000
|
trusted library allocation
|
page read and write
|
||
20E59782000
|
heap
|
page read and write
|
||
20E4F766000
|
trusted library allocation
|
page read and write
|
||
1C5F3303000
|
trusted library allocation
|
page read and write
|
||
20E4FF49000
|
trusted library allocation
|
page read and write
|
||
20E4B7A5000
|
trusted library allocation
|
page read and write
|
||
22EE9B40000
|
heap
|
page read and write
|
||
20E55FC2000
|
trusted library allocation
|
page read and write
|
||
20E4E4EE000
|
trusted library allocation
|
page read and write
|
||
20E4E5AF000
|
trusted library allocation
|
page read and write
|
||
1001BE000
|
stack
|
page read and write
|
||
20E4E0EA000
|
trusted library allocation
|
page read and write
|
||
20E509BA000
|
trusted library allocation
|
page read and write
|
||
C11000
|
unkown
|
page execute read
|
||
20E3F967000
|
heap
|
page read and write
|
||
20E5009D000
|
trusted library allocation
|
page read and write
|
||
20E509D9000
|
trusted library allocation
|
page read and write
|
||
20E4E090000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E516EC000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E56112000
|
trusted library allocation
|
page read and write
|
||
20E51DCC000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E576CC000
|
trusted library allocation
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
20E4F4D2000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E4E62E000
|
trusted library allocation
|
page read and write
|
||
20E58EB5000
|
trusted library allocation
|
page read and write
|
||
20E4E467000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E516E4000
|
trusted library allocation
|
page read and write
|
||
20E4B79E000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E4FF4D000
|
trusted library allocation
|
page read and write
|
||
20E516B8000
|
trusted library allocation
|
page read and write
|
||
22EE8F86000
|
trusted library allocation
|
page read and write
|
||
20E595C4000
|
trusted library allocation
|
page read and write
|
||
20E4DE51000
|
trusted library allocation
|
page read and write
|
||
20E59017000
|
trusted library allocation
|
page read and write
|
||
20E4F7E4000
|
trusted library allocation
|
page read and write
|
||
20E4E45F000
|
trusted library allocation
|
page read and write
|
||
20E4DB86000
|
trusted library allocation
|
page read and write
|
||
20E4DDB6000
|
trusted library allocation
|
page read and write
|
||
20E5955F000
|
trusted library allocation
|
page read and write
|
||
20E59417000
|
trusted library allocation
|
page read and write
|
||
20E4C772000
|
trusted library allocation
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
20E4DE58000
|
trusted library allocation
|
page read and write
|
||
102BFE000
|
stack
|
page read and write
|
||
20E590B0000
|
trusted library allocation
|
page read and write
|
||
20E4FBEF000
|
trusted library allocation
|
page read and write
|
||
20E56056000
|
trusted library allocation
|
page read and write
|
||
20E505DC000
|
trusted library allocation
|
page read and write
|
||
20E44DE8000
|
heap
|
page read and write
|
||
20E4E0D8000
|
trusted library allocation
|
page read and write
|
||
20E5906F000
|
trusted library allocation
|
page read and write
|
||
20E4FF83000
|
trusted library allocation
|
page read and write
|
||
20E44DE8000
|
heap
|
page read and write
|
||
20E4FB72000
|
trusted library allocation
|
page read and write
|
||
20E4F79A000
|
trusted library allocation
|
page read and write
|
||
20E4ED67000
|
trusted library allocation
|
page read and write
|
||
20E503FC000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E59089000
|
trusted library allocation
|
page read and write
|
||
20E44DD4000
|
heap
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
22EE9B84000
|
heap
|
page read and write
|
||
20E507C4000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E5616B000
|
trusted library allocation
|
page read and write
|
||
20E50072000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E516C0000
|
trusted library allocation
|
page read and write
|
||
20E5039A000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
unkown
|
page readonly
|
||
20E4DECE000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E59089000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
22EE968D000
|
heap
|
page read and write
|
||
20E4F76B000
|
trusted library allocation
|
page read and write
|
||
20E51DB0000
|
trusted library allocation
|
page read and write
|
||
20E55FEC000
|
trusted library allocation
|
page read and write
|
||
20E4F96C000
|
trusted library allocation
|
page read and write
|
||
20E4EFC5000
|
trusted library allocation
|
page read and write
|
||
20E4F7B6000
|
trusted library allocation
|
page read and write
|
||
20E4F3EB000
|
trusted library allocation
|
page read and write
|
||
20E4B768000
|
trusted library allocation
|
page read and write
|
||
1C5F3073000
|
trusted library allocation
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
20E571F5000
|
trusted library allocation
|
page read and write
|
||
20E44D81000
|
heap
|
page read and write
|
||
148F000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E590DB000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E4DECC000
|
trusted library allocation
|
page read and write
|
||
20E571BD000
|
trusted library allocation
|
page read and write
|
||
20E515D4000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E55EFC000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4F337000
|
trusted library allocation
|
page read and write
|
||
20E597B0000
|
heap
|
page read and write
|
||
20E4F9F6000
|
trusted library allocation
|
page read and write
|
||
20E59473000
|
trusted library allocation
|
page read and write
|
||
20E4B56F000
|
heap
|
page read and write
|
||
20E4F7F2000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E4F7D3000
|
trusted library allocation
|
page read and write
|
||
20E576D9000
|
trusted library allocation
|
page read and write
|
||
20E4E4D1000
|
trusted library allocation
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
20E44DF2000
|
heap
|
page read and write
|
||
20E500CF000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E59432000
|
trusted library allocation
|
page read and write
|
||
20E4DD7F000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E4B570000
|
heap
|
page read and write
|
||
20E5973E000
|
heap
|
page read and write
|
||
20E5908D000
|
trusted library allocation
|
page read and write
|
||
20E51DB7000
|
trusted library allocation
|
page read and write
|
||
20E4F33B000
|
trusted library allocation
|
page read and write
|
||
20E59090000
|
trusted library allocation
|
page read and write
|
||
20E4B573000
|
heap
|
page read and write
|
||
20E513D0000
|
trusted library allocation
|
page read and write
|
||
20E4E647000
|
trusted library allocation
|
page read and write
|
||
20E4F49C000
|
trusted library allocation
|
page read and write
|
||
20E4F99A000
|
trusted library allocation
|
page read and write
|
||
22EE95FC000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4B759000
|
trusted library allocation
|
page read and write
|
||
20E4B573000
|
heap
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E500CF000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
20E5008C000
|
trusted library allocation
|
page read and write
|
||
20E44DEE000
|
heap
|
page read and write
|
||
1C5F2F00000
|
trusted library allocation
|
page read and write
|
||
20E4B7CE000
|
trusted library allocation
|
page read and write
|
||
20E5608F000
|
trusted library allocation
|
page read and write
|
||
23EFEC10000
|
heap
|
page read and write
|
||
20E590BA000
|
trusted library allocation
|
page read and write
|
||
20E50723000
|
trusted library allocation
|
page read and write
|
||
20E44E17000
|
heap
|
page read and write
|
||
20E4FDA5000
|
trusted library allocation
|
page read and write
|
||
20E590AC000
|
trusted library allocation
|
page read and write
|
||
20E51853000
|
trusted library allocation
|
page read and write
|
||
20E513DA000
|
trusted library allocation
|
page read and write
|
||
20E4FACA000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E4B04E000
|
trusted library allocation
|
page read and write
|
||
20E4F96C000
|
trusted library allocation
|
page read and write
|
||
20E4F348000
|
trusted library allocation
|
page read and write
|
||
20E585DE000
|
trusted library allocation
|
page read and write
|
||
20E4F326000
|
trusted library allocation
|
page read and write
|
||
20E5009D000
|
trusted library allocation
|
page read and write
|
||
20E4E4EE000
|
trusted library allocation
|
page read and write
|
||
20E44E07000
|
heap
|
page read and write
|
||
20E57624000
|
trusted library allocation
|
page read and write
|
||
20E59469000
|
trusted library allocation
|
page read and write
|
||
20E500C2000
|
trusted library allocation
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
1C5F3049000
|
trusted library allocation
|
page read and write
|
||
20E59426000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E44E1D000
|
heap
|
page read and write
|
||
20E4E459000
|
trusted library allocation
|
page read and write
|
||
22EE9590000
|
heap
|
page read and write
|
||
20E4F7B2000
|
trusted library allocation
|
page read and write
|
||
20E49E1E000
|
trusted library allocation
|
page read and write
|
||
20E5189C000
|
trusted library allocation
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
22EE8FEF000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E4C733000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E4B09D000
|
trusted library allocation
|
page read and write
|
||
20E44E10000
|
heap
|
page read and write
|
||
20E44E1D000
|
heap
|
page read and write
|
||
20E58E98000
|
trusted library allocation
|
page read and write
|
||
20E44DE3000
|
heap
|
page read and write
|
||
20E4E987000
|
trusted library allocation
|
page read and write
|
||
20E58F78000
|
trusted library allocation
|
page read and write
|
||
20E5612E000
|
trusted library allocation
|
page read and write
|
||
1DAFD400000
|
trusted library allocation
|
page read and write
|
||
20E51555000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E579AC000
|
trusted library allocation
|
page read and write
|
||
20E507FA000
|
trusted library allocation
|
page read and write
|
||
20E4E921000
|
trusted library allocation
|
page read and write
|
||
20E4F9F1000
|
trusted library allocation
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4F1A9000
|
trusted library allocation
|
page read and write
|
||
1DAFD0B0000
|
unclassified section
|
page readonly
|
||
16B23BF0000
|
heap
|
page read and write
|
||
20E4DD9D000
|
trusted library allocation
|
page read and write
|
||
20E44DB6000
|
heap
|
page read and write
|
||
20E5790C000
|
trusted library allocation
|
page read and write
|
||
20E4F772000
|
trusted library allocation
|
page read and write
|
||
22EE8B90000
|
heap
|
page read and write
|
||
1C5F300C000
|
trusted library allocation
|
page read and write
|
||
20E516D7000
|
trusted library allocation
|
page read and write
|
||
20E4FDA5000
|
trusted library allocation
|
page read and write
|
||
20E58E0D000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E4B7CE000
|
trusted library allocation
|
page read and write
|
||
20E4E05A000
|
trusted library allocation
|
page read and write
|
||
20E55FC1000
|
trusted library allocation
|
page read and write
|
||
22EE8FC7000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E50765000
|
trusted library allocation
|
page read and write
|
||
20E594E9000
|
trusted library allocation
|
page read and write
|
||
20E59584000
|
trusted library allocation
|
page read and write
|
||
20E500CF000
|
trusted library allocation
|
page read and write
|
||
20E4E0C8000
|
trusted library allocation
|
page read and write
|
||
20E44DE6000
|
heap
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E44D98000
|
heap
|
page read and write
|
||
20E4FBA3000
|
trusted library allocation
|
page read and write
|
||
20E504DC000
|
trusted library allocation
|
page read and write
|
||
20E4DBCF000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E51899000
|
trusted library allocation
|
page read and write
|
||
20E4B56D000
|
heap
|
page read and write
|
||
20E44E10000
|
heap
|
page read and write
|
||
20E44E0E000
|
heap
|
page read and write
|
||
20E5617D000
|
trusted library allocation
|
page read and write
|
||
20E58E15000
|
trusted library allocation
|
page read and write
|
||
20E597C4000
|
heap
|
page read and write
|
||
20E5928F000
|
trusted library allocation
|
page read and write
|
||
20E3F953000
|
heap
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E55F94000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4DBFC000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
20E56082000
|
trusted library allocation
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
20E4EDEE000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E4B0DC000
|
trusted library allocation
|
page read and write
|
||
20E513E4000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
22EE95F4000
|
heap
|
page read and write
|
||
20E56000000
|
trusted library allocation
|
page read and write
|
||
20E57661000
|
trusted library allocation
|
page read and write
|
||
20E4EEE1000
|
trusted library allocation
|
page read and write
|
||
20E44DD4000
|
heap
|
page read and write
|
||
20E4B575000
|
heap
|
page read and write
|
||
20E4F0B1000
|
trusted library allocation
|
page read and write
|
||
20E4FF53000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E497EF000
|
trusted library allocation
|
page read and write
|
||
20E4E6E2000
|
trusted library allocation
|
page read and write
|
||
20E590B2000
|
trusted library allocation
|
page read and write
|
||
20E4FBA7000
|
trusted library allocation
|
page read and write
|
||
20E4EE96000
|
trusted library allocation
|
page read and write
|
||
20E4E0F3000
|
trusted library allocation
|
page read and write
|
||
20E501D5000
|
trusted library allocation
|
page read and write
|
||
20E4F766000
|
trusted library allocation
|
page read and write
|
||
20E4E9BB000
|
trusted library allocation
|
page read and write
|
||
20E4B7CE000
|
trusted library allocation
|
page read and write
|
||
20E4F7CA000
|
trusted library allocation
|
page read and write
|
||
20E4ED62000
|
trusted library allocation
|
page read and write
|
||
20E51DE8000
|
trusted library allocation
|
page read and write
|
||
20E59764000
|
heap
|
page read and write
|
||
20E57941000
|
trusted library allocation
|
page read and write
|
||
20E4EF8B000
|
trusted library allocation
|
page read and write
|
||
20E4F95E000
|
trusted library allocation
|
page read and write
|
||
20E59031000
|
trusted library allocation
|
page read and write
|
||
20E55FF0000
|
trusted library allocation
|
page read and write
|
||
20E513E4000
|
trusted library allocation
|
page read and write
|
||
100BD8000
|
stack
|
page read and write
|
||
20E55F53000
|
trusted library allocation
|
page read and write
|
||
20E4F79A000
|
trusted library allocation
|
page read and write
|
||
20E513B9000
|
trusted library allocation
|
page read and write
|
||
20E4ED79000
|
trusted library allocation
|
page read and write
|
||
20E4DEC2000
|
trusted library allocation
|
page read and write
|
||
20E4EDD7000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
20E55EE3000
|
trusted library allocation
|
page read and write
|
||
20E44D74000
|
heap
|
page read and write
|
||
20E44D92000
|
heap
|
page read and write
|
||
20E55F70000
|
trusted library allocation
|
page read and write
|
||
20E513CE000
|
trusted library allocation
|
page read and write
|
||
20E44DD4000
|
heap
|
page read and write
|
||
20E4F1BC000
|
trusted library allocation
|
page read and write
|
||
20E513FB000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E58F4A000
|
trusted library allocation
|
page read and write
|
||
148F000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
1C5F2C80000
|
unclassified section
|
page readonly
|
||
20E51DD4000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E49E78000
|
trusted library allocation
|
page read and write
|
||
20E500BF000
|
trusted library allocation
|
page read and write
|
||
20E4B762000
|
trusted library allocation
|
page read and write
|
||
20E4FF7D000
|
trusted library allocation
|
page read and write
|
||
20E44DDF000
|
heap
|
page read and write
|
||
20E59049000
|
trusted library allocation
|
page read and write
|
||
20E516B5000
|
trusted library allocation
|
page read and write
|
||
20E4E0F3000
|
trusted library allocation
|
page read and write
|
||
20E4FA99000
|
trusted library allocation
|
page read and write
|
||
20E51359000
|
trusted library allocation
|
page read and write
|
||
20E5605C000
|
trusted library allocation
|
page read and write
|
||
20E58E69000
|
trusted library allocation
|
page read and write
|
||
20E4FB8C000
|
trusted library allocation
|
page read and write
|
||
20E4AD25000
|
trusted library allocation
|
page read and write
|
||
20E4F9DF000
|
trusted library allocation
|
page read and write
|
||
F2501FC000
|
stack
|
page read and write
|
||
20E4F9DF000
|
trusted library allocation
|
page read and write
|
||
20E55FBE000
|
trusted library allocation
|
page read and write
|
||
20E571B9000
|
trusted library allocation
|
page read and write
|
||
16B21FD0000
|
heap
|
page read and write
|
||
20E44E07000
|
heap
|
page read and write
|
||
20E59532000
|
trusted library allocation
|
page read and write
|
||
20E59028000
|
trusted library allocation
|
page read and write
|
||
20E4EE24000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4FEA3000
|
trusted library allocation
|
page read and write
|
||
20E4DE8B000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E44E05000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E49E1B000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E44DEE000
|
heap
|
page read and write
|
||
10347E000
|
unkown
|
page readonly
|
||
22EE967D000
|
heap
|
page read and write
|
||
20E4F9E6000
|
trusted library allocation
|
page read and write
|
||
20E500C2000
|
trusted library allocation
|
page read and write
|
||
20E578A3000
|
trusted library allocation
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E5008D000
|
trusted library allocation
|
page read and write
|
||
20E4F0E0000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E585D3000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
23EFEB90000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E4F0F3000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E55FF7000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E4E4C1000
|
trusted library allocation
|
page read and write
|
||
20E4E66C000
|
trusted library allocation
|
page read and write
|
||
20E55FB2000
|
trusted library allocation
|
page read and write
|
||
10007E000
|
unkown
|
page readonly
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E4AEF9000
|
trusted library allocation
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4FF6E000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E4F333000
|
trusted library allocation
|
page read and write
|
||
20E513E4000
|
trusted library allocation
|
page read and write
|
||
20E44E1F000
|
heap
|
page read and write
|
||
20E4F649000
|
trusted library allocation
|
page read and write
|
||
20E5619B000
|
trusted library allocation
|
page read and write
|
||
20E4F94F000
|
trusted library allocation
|
page read and write
|
||
20E501B7000
|
trusted library allocation
|
page read and write
|
||
20E4F0D7000
|
trusted library allocation
|
page read and write
|
||
20E4979E000
|
trusted library allocation
|
page read and write
|
||
20E59552000
|
trusted library allocation
|
page read and write
|
||
20E4F68B000
|
trusted library allocation
|
page read and write
|
||
20E55F82000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E4FC42000
|
trusted library allocation
|
page read and write
|
||
20E507FA000
|
trusted library allocation
|
page read and write
|
||
20E509AE000
|
trusted library allocation
|
page read and write
|
||
20E4F105000
|
trusted library allocation
|
page read and write
|
||
22EE95F9000
|
heap
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E4F32C000
|
trusted library allocation
|
page read and write
|
||
20E4EF53000
|
trusted library allocation
|
page read and write
|
||
20E500BF000
|
trusted library allocation
|
page read and write
|
||
20E44DA4000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E44DF5000
|
heap
|
page read and write
|
||
20E59083000
|
trusted library allocation
|
page read and write
|
||
20E4E0EF000
|
trusted library allocation
|
page read and write
|
||
20E4F7F9000
|
trusted library allocation
|
page read and write
|
||
20E4F063000
|
trusted library allocation
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E58E86000
|
trusted library allocation
|
page read and write
|
||
20E576CC000
|
trusted library allocation
|
page read and write
|
||
20E59088000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
1C5F3307000
|
trusted library allocation
|
page read and write
|
||
20E44DD8000
|
heap
|
page read and write
|
||
20E4F947000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4F9E6000
|
trusted library allocation
|
page read and write
|
||
28FC48703000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E500B7000
|
trusted library allocation
|
page read and write
|
||
20E504C8000
|
trusted library allocation
|
page read and write
|
||
20E44E0E000
|
heap
|
page read and write
|
||
20E5166C000
|
trusted library allocation
|
page read and write
|
||
20E5943B000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E594CC000
|
trusted library allocation
|
page read and write
|
||
20E4E6DD000
|
trusted library allocation
|
page read and write
|
||
20E4FB62000
|
trusted library allocation
|
page read and write
|
||
20E5617D000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E579E4000
|
trusted library allocation
|
page read and write
|
||
20E507B2000
|
trusted library allocation
|
page read and write
|
||
20E4E619000
|
trusted library allocation
|
page read and write
|
||
20E560B1000
|
trusted library allocation
|
page read and write
|
||
20E4F9F6000
|
trusted library allocation
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E50397000
|
trusted library allocation
|
page read and write
|
||
20E4F9ED000
|
trusted library allocation
|
page read and write
|
||
20E51325000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E44DD4000
|
heap
|
page read and write
|
||
22EE9B6A000
|
heap
|
page read and write
|
||
20E55FEC000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
22EE9670000
|
heap
|
page read and write
|
||
22EE8FF5000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E4E051000
|
trusted library allocation
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E4DB43000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E595CC000
|
trusted library allocation
|
page read and write
|
||
20E4E5B5000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E50072000
|
trusted library allocation
|
page read and write
|
||
20E59073000
|
trusted library allocation
|
page read and write
|
||
20E50585000
|
trusted library allocation
|
page read and write
|
||
20E4DB31000
|
trusted library allocation
|
page read and write
|
||
20E4E9D0000
|
trusted library allocation
|
page read and write
|
||
22EE9681000
|
heap
|
page read and write
|
||
20E44E12000
|
heap
|
page read and write
|
||
20E51DD8000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DFA000
|
heap
|
page read and write
|
||
22EE8FEB000
|
trusted library allocation
|
page read and write
|
||
22EE8F79000
|
trusted library allocation
|
page read and write
|
||
20E4ED79000
|
trusted library allocation
|
page read and write
|
||
20E4DEC3000
|
trusted library allocation
|
page read and write
|
||
20E4F9B0000
|
trusted library allocation
|
page read and write
|
||
20E4EF25000
|
trusted library allocation
|
page read and write
|
||
20E5903E000
|
trusted library allocation
|
page read and write
|
||
20E508DB000
|
trusted library allocation
|
page read and write
|
||
20E4F7E4000
|
trusted library allocation
|
page read and write
|
||
20E59079000
|
trusted library allocation
|
page read and write
|
||
20E58ED1000
|
trusted library allocation
|
page read and write
|
||
20E44DEE000
|
heap
|
page read and write
|
||
20E590AC000
|
trusted library allocation
|
page read and write
|
||
20E5949E000
|
trusted library allocation
|
page read and write
|
||
20E4B7CE000
|
trusted library allocation
|
page read and write
|
||
20E4E9C4000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
20E4EFD4000
|
trusted library allocation
|
page read and write
|
||
1C5F3100000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4F9AA000
|
trusted library allocation
|
page read and write
|
||
20E4DEB5000
|
trusted library allocation
|
page read and write
|
||
B15CD3E000
|
unkown
|
page readonly
|
||
20E4DECE000
|
trusted library allocation
|
page read and write
|
||
20E4F8B3000
|
trusted library allocation
|
page read and write
|
||
20E509AB000
|
trusted library allocation
|
page read and write
|
||
20E5905A000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E59073000
|
trusted library allocation
|
page read and write
|
||
20E501EC000
|
trusted library allocation
|
page read and write
|
||
20E44E10000
|
heap
|
page read and write
|
||
20E44DA0000
|
heap
|
page read and write
|
||
20E4FF61000
|
trusted library allocation
|
page read and write
|
||
20E44DC4000
|
heap
|
page read and write
|
||
20E4EF95000
|
trusted library allocation
|
page read and write
|
||
20E4FF7D000
|
trusted library allocation
|
page read and write
|
||
20E590FD000
|
trusted library allocation
|
page read and write
|
||
20E5165D000
|
trusted library allocation
|
page read and write
|
||
20E44DD9000
|
heap
|
page read and write
|
||
20E4F0A7000
|
trusted library allocation
|
page read and write
|
||
20E4F1D1000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E55FB5000
|
trusted library allocation
|
page read and write
|
||
20E59069000
|
trusted library allocation
|
page read and write
|
||
20E504C3000
|
trusted library allocation
|
page read and write
|
||
20E51DD8000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4FFB9000
|
trusted library allocation
|
page read and write
|
||
20E560B1000
|
trusted library allocation
|
page read and write
|
||
20E4EF4D000
|
trusted library allocation
|
page read and write
|
||
20E4B573000
|
heap
|
page read and write
|
||
20E57D02000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E4E0EA000
|
trusted library allocation
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E51687000
|
trusted library allocation
|
page read and write
|
||
20E50698000
|
trusted library allocation
|
page read and write
|
||
20E4ED97000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
1DAFD565000
|
trusted library allocation
|
page read and write
|
||
20E4F7F6000
|
trusted library allocation
|
page read and write
|
||
20E55EFC000
|
trusted library allocation
|
page read and write
|
||
20E4F10A000
|
trusted library allocation
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
20E4F742000
|
trusted library allocation
|
page read and write
|
||
20E594A8000
|
trusted library allocation
|
page read and write
|
||
20E4FB49000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
22EE967D000
|
heap
|
page read and write
|
||
20E4EEAB000
|
trusted library allocation
|
page read and write
|
||
20E4FB79000
|
trusted library allocation
|
page read and write
|
||
20E4E99F000
|
trusted library allocation
|
page read and write
|
||
20E58EC7000
|
trusted library allocation
|
page read and write
|
||
20E4FC3E000
|
trusted library allocation
|
page read and write
|
||
20E44DBE000
|
heap
|
page read and write
|
||
20E504AF000
|
trusted library allocation
|
page read and write
|
||
20E4FF3E000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
22EE95F9000
|
heap
|
page read and write
|
||
20E59077000
|
trusted library allocation
|
page read and write
|
||
20E584FA000
|
trusted library allocation
|
page read and write
|
||
20E58EBD000
|
trusted library allocation
|
page read and write
|
||
20E4E051000
|
trusted library allocation
|
page read and write
|
||
20E51DCC000
|
trusted library allocation
|
page read and write
|
||
20E4EE62000
|
trusted library allocation
|
page read and write
|
||
20E5003B000
|
trusted library allocation
|
page read and write
|
||
20E4B7A5000
|
trusted library allocation
|
page read and write
|
||
20E4B78A000
|
trusted library allocation
|
page read and write
|
||
16B21FB2000
|
heap
|
page read and write
|
||
20E44DD5000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
22EE9670000
|
heap
|
page read and write
|
||
20E590CA000
|
trusted library allocation
|
page read and write
|
||
20E585E8000
|
trusted library allocation
|
page read and write
|
||
20E4E42D000
|
trusted library allocation
|
page read and write
|
||
20E50031000
|
trusted library allocation
|
page read and write
|
||
20E57627000
|
trusted library allocation
|
page read and write
|
||
20E44DF3000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E5794D000
|
trusted library allocation
|
page read and write
|
||
20E4FA8B000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E5181F000
|
trusted library allocation
|
page read and write
|
||
20E590C0000
|
trusted library allocation
|
page read and write
|
||
20E51685000
|
trusted library allocation
|
page read and write
|
||
20E4F6F9000
|
trusted library allocation
|
page read and write
|
||
20E44E23000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E4EE5F000
|
trusted library allocation
|
page read and write
|
||
20E59028000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
22EE8D30000
|
heap
|
page readonly
|
||
20E4F1E0000
|
trusted library allocation
|
page read and write
|
||
22EE9676000
|
heap
|
page read and write
|
||
20E44E17000
|
heap
|
page read and write
|
||
20E55FB5000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E5608F000
|
trusted library allocation
|
page read and write
|
||
20E4E6CA000
|
trusted library allocation
|
page read and write
|
||
20E44DA1000
|
heap
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
20E4F7E4000
|
trusted library allocation
|
page read and write
|
||
20E504ED000
|
trusted library allocation
|
page read and write
|
||
20E590C7000
|
trusted library allocation
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
20E59493000
|
trusted library allocation
|
page read and write
|
||
20E4B569000
|
heap
|
page read and write
|
||
20E4E947000
|
trusted library allocation
|
page read and write
|
||
20E518B7000
|
trusted library allocation
|
page read and write
|
||
20E57A33000
|
trusted library allocation
|
page read and write
|
||
20E500D7000
|
trusted library allocation
|
page read and write
|
||
20E51DE4000
|
trusted library allocation
|
page read and write
|
||
20E502EF000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E516EC000
|
trusted library allocation
|
page read and write
|
||
20E4EE96000
|
trusted library allocation
|
page read and write
|
||
20E571C2000
|
trusted library allocation
|
page read and write
|
||
20E4F967000
|
trusted library allocation
|
page read and write
|
||
20E4F8C6000
|
trusted library allocation
|
page read and write
|
||
240DABD24000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
22EE960D000
|
heap
|
page read and write
|
||
20E4DE60000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E51DE0000
|
trusted library allocation
|
page read and write
|
||
20E59090000
|
trusted library allocation
|
page read and write
|
||
20E4F9AC000
|
trusted library allocation
|
page read and write
|
||
20E5952F000
|
trusted library allocation
|
page read and write
|
||
20E44DDB000
|
heap
|
page read and write
|
||
20E5003E000
|
trusted library allocation
|
page read and write
|
||
20E571E9000
|
trusted library allocation
|
page read and write
|
||
2204000
|
heap
|
page read and write
|
||
20E4E4FB000
|
trusted library allocation
|
page read and write
|
||
20E4FF61000
|
trusted library allocation
|
page read and write
|
||
20E5907E000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E497C7000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E4E5A9000
|
trusted library allocation
|
page read and write
|
||
20E57A2E000
|
trusted library allocation
|
page read and write
|
||
20E44D9E000
|
heap
|
page read and write
|
||
20E4EF7C000
|
trusted library allocation
|
page read and write
|
||
20E59429000
|
trusted library allocation
|
page read and write
|
||
20E56069000
|
trusted library allocation
|
page read and write
|
||
6AE55FE000
|
stack
|
page read and write
|
||
22EE9B61000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4EE4F000
|
trusted library allocation
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E5048A000
|
trusted library allocation
|
page read and write
|
||
20E59735000
|
heap
|
page read and write
|
||
20E4F757000
|
trusted library allocation
|
page read and write
|
||
20E4F9ED000
|
trusted library allocation
|
page read and write
|
||
20E59281000
|
trusted library allocation
|
page read and write
|
||
20E4DEB8000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4EDF7000
|
trusted library allocation
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E57192000
|
trusted library allocation
|
page read and write
|
||
20E59085000
|
trusted library allocation
|
page read and write
|
||
20E59440000
|
trusted library allocation
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E4F0FE000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E59083000
|
trusted library allocation
|
page read and write
|
||
20E4EDFB000
|
trusted library allocation
|
page read and write
|
||
20E4FEC1000
|
trusted library allocation
|
page read and write
|
||
20E592B9000
|
trusted library allocation
|
page read and write
|
||
20E59615000
|
trusted library allocation
|
page read and write
|
||
20E3F96A000
|
heap
|
page read and write
|
||
20E4FAAC000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E59090000
|
trusted library allocation
|
page read and write
|
||
20E4F45B000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E4FBCC000
|
trusted library allocation
|
page read and write
|
||
20E44D9C000
|
heap
|
page read and write
|
||
20E4EF8F000
|
trusted library allocation
|
page read and write
|
||
20E4F1A3000
|
trusted library allocation
|
page read and write
|
||
20E4B74B000
|
trusted library allocation
|
page read and write
|
||
20E4EF93000
|
trusted library allocation
|
page read and write
|
||
20E4F671000
|
trusted library allocation
|
page read and write
|
||
20E4C760000
|
trusted library allocation
|
page read and write
|
||
20E59073000
|
trusted library allocation
|
page read and write
|
||
20E4E46E000
|
trusted library allocation
|
page read and write
|
||
20E4F9E6000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E4F9B9000
|
trusted library allocation
|
page read and write
|
||
20E59552000
|
trusted library allocation
|
page read and write
|
||
20E4EFA4000
|
trusted library allocation
|
page read and write
|
||
20E4B54D000
|
heap
|
page read and write
|
||
20E59480000
|
trusted library allocation
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
20E4E40F000
|
trusted library allocation
|
page read and write
|
||
20E590C0000
|
trusted library allocation
|
page read and write
|
||
20E4F7E4000
|
trusted library allocation
|
page read and write
|
||
20E4DB8F000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E59077000
|
trusted library allocation
|
page read and write
|
||
20E50046000
|
trusted library allocation
|
page read and write
|
||
22EE95EC000
|
heap
|
page read and write
|
||
20E4FE24000
|
trusted library allocation
|
page read and write
|
||
20E44DA1000
|
heap
|
page read and write
|
||
20E4F7BA000
|
trusted library allocation
|
page read and write
|
||
20E504BD000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E590C0000
|
trusted library allocation
|
page read and write
|
||
1000F8000
|
stack
|
page read and write
|
||
20E4F9A8000
|
trusted library allocation
|
page read and write
|
||
20E4B78A000
|
trusted library allocation
|
page read and write
|
||
20E4E93D000
|
trusted library allocation
|
page read and write
|
||
20E504C3000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E590DB000
|
trusted library allocation
|
page read and write
|
||
20E500BB000
|
trusted library allocation
|
page read and write
|
||
20E4C717000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E5A12F000
|
trusted library allocation
|
page read and write
|
||
20E59049000
|
trusted library allocation
|
page read and write
|
||
20E4F94F000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E44DFA000
|
heap
|
page read and write
|
||
20E59417000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E4FBA0000
|
trusted library allocation
|
page read and write
|
||
20E4F18D000
|
trusted library allocation
|
page read and write
|
||
20E51DD4000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
22EE8F61000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4B79E000
|
trusted library allocation
|
page read and write
|
||
20E4ED8E000
|
trusted library allocation
|
page read and write
|
||
20E4F4A6000
|
trusted library allocation
|
page read and write
|
||
20E5924E000
|
trusted library allocation
|
page read and write
|
||
20E4F8C8000
|
trusted library allocation
|
page read and write
|
||
20E58EDD000
|
trusted library allocation
|
page read and write
|
||
20E4F3BF000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E4DB36000
|
trusted library allocation
|
page read and write
|
||
16B23AA6000
|
heap
|
page read and write
|
||
20E590FD000
|
trusted library allocation
|
page read and write
|
||
20E4DD94000
|
trusted library allocation
|
page read and write
|
||
22EE8D52000
|
unclassified section
|
page read and write
|
||
20E4F98F000
|
trusted library allocation
|
page read and write
|
||
20E59ED3000
|
trusted library allocation
|
page read and write
|
||
20E590E6000
|
trusted library allocation
|
page read and write
|
||
20E4B56F000
|
heap
|
page read and write
|
||
20E58E54000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E560C8000
|
trusted library allocation
|
page read and write
|
||
20E500D1000
|
trusted library allocation
|
page read and write
|
||
20E4EE7C000
|
trusted library allocation
|
page read and write
|
||
20E513F3000
|
trusted library allocation
|
page read and write
|
||
20E55FC1000
|
trusted library allocation
|
page read and write
|
||
20E44DE6000
|
heap
|
page read and write
|
||
20E513FB000
|
trusted library allocation
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E58F63000
|
trusted library allocation
|
page read and write
|
||
20E4E6E2000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E504F9000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E4F7BA000
|
trusted library allocation
|
page read and write
|
||
20E4E66C000
|
trusted library allocation
|
page read and write
|
||
20E4F3BB000
|
trusted library allocation
|
page read and write
|
||
20E59083000
|
trusted library allocation
|
page read and write
|
||
147F000
|
heap
|
page read and write
|
||
20E4F77B000
|
trusted library allocation
|
page read and write
|
||
20E507ED000
|
trusted library allocation
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E44DDB000
|
heap
|
page read and write
|
||
1C5F30B2000
|
trusted library allocation
|
page read and write
|
||
20E4DEC6000
|
trusted library allocation
|
page read and write
|
||
20E4F428000
|
trusted library allocation
|
page read and write
|
||
20E4C70B000
|
trusted library allocation
|
page read and write
|
||
20E59098000
|
trusted library allocation
|
page read and write
|
||
20E4FFEF000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E59445000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E51DAD000
|
trusted library allocation
|
page read and write
|
||
20E4F9B8000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44E0E000
|
heap
|
page read and write
|
||
20E5095C000
|
trusted library allocation
|
page read and write
|
||
20E4F9B8000
|
trusted library allocation
|
page read and write
|
||
20E4DD63000
|
trusted library allocation
|
page read and write
|
||
20E4E035000
|
trusted library allocation
|
page read and write
|
||
20E44DA3000
|
heap
|
page read and write
|
||
20E58FF6000
|
trusted library allocation
|
page read and write
|
||
20E5844E000
|
trusted library allocation
|
page read and write
|
||
20E4E0CE000
|
trusted library allocation
|
page read and write
|
||
20E50365000
|
trusted library allocation
|
page read and write
|
||
20E4FAF6000
|
trusted library allocation
|
page read and write
|
||
20E4F47E000
|
trusted library allocation
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E51DD8000
|
trusted library allocation
|
page read and write
|
||
22EE9678000
|
heap
|
page read and write
|
||
20E55F7A000
|
trusted library allocation
|
page read and write
|
||
20E507C4000
|
trusted library allocation
|
page read and write
|
||
20E55F3C000
|
trusted library allocation
|
page read and write
|
||
20E4F7AF000
|
trusted library allocation
|
page read and write
|
||
20E4FF8E000
|
trusted library allocation
|
page read and write
|
||
20E50864000
|
trusted library allocation
|
page read and write
|
||
20E4F913000
|
trusted library allocation
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
20E4E443000
|
trusted library allocation
|
page read and write
|
||
20E515E4000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E57480000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E4FF59000
|
trusted library allocation
|
page read and write
|
||
20E4DD65000
|
trusted library allocation
|
page read and write
|
||
20E55F34000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
20E4EDD8000
|
trusted library allocation
|
page read and write
|
||
20E4FE9A000
|
trusted library allocation
|
page read and write
|
||
20E4EDF1000
|
trusted library allocation
|
page read and write
|
||
20E5908A000
|
trusted library allocation
|
page read and write
|
||
20E505D4000
|
trusted library allocation
|
page read and write
|
||
20E55F13000
|
trusted library allocation
|
page read and write
|
||
20E509E6000
|
trusted library allocation
|
page read and write
|
||
20E57692000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page write copy
|
||
20E4B759000
|
trusted library allocation
|
page read and write
|
||
20E500C2000
|
trusted library allocation
|
page read and write
|
||
20E4F98F000
|
trusted library allocation
|
page read and write
|
||
20E4F09E000
|
trusted library allocation
|
page read and write
|
||
22EE9649000
|
heap
|
page read and write
|
||
1DAFD596000
|
trusted library allocation
|
page read and write
|
||
20E590B0000
|
trusted library allocation
|
page read and write
|
||
20E4DEDD000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E5009D000
|
trusted library allocation
|
page read and write
|
||
20E4E446000
|
trusted library allocation
|
page read and write
|
||
20E4FABD000
|
trusted library allocation
|
page read and write
|
||
1DAFD5A8000
|
trusted library allocation
|
page read and write
|
||
22EE9676000
|
heap
|
page read and write
|
||
20E4DB4B000
|
trusted library allocation
|
page read and write
|
||
20E59088000
|
trusted library allocation
|
page read and write
|
||
1C5F3300000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E497BF000
|
trusted library allocation
|
page read and write
|
||
22EE9681000
|
heap
|
page read and write
|
||
20E51DB7000
|
trusted library allocation
|
page read and write
|
||
20E5611B000
|
trusted library allocation
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E56166000
|
trusted library allocation
|
page read and write
|
||
20E561CB000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E55F53000
|
trusted library allocation
|
page read and write
|
||
20E4ED1D000
|
trusted library allocation
|
page read and write
|
||
20E5008C000
|
trusted library allocation
|
page read and write
|
||
F2511FF000
|
stack
|
page read and write
|
||
20E5903A000
|
trusted library allocation
|
page read and write
|
||
20E58EE5000
|
trusted library allocation
|
page read and write
|
||
20E59429000
|
trusted library allocation
|
page read and write
|
||
20E4F9C8000
|
trusted library allocation
|
page read and write
|
||
20E59735000
|
heap
|
page read and write
|
||
20E5907E000
|
trusted library allocation
|
page read and write
|
||
22EE9670000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4E99E000
|
trusted library allocation
|
page read and write
|
||
20E5949E000
|
trusted library allocation
|
page read and write
|
||
20E4AE8E000
|
trusted library allocation
|
page read and write
|
||
20E44DD4000
|
heap
|
page read and write
|
||
20E59578000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E4DEBD000
|
trusted library allocation
|
page read and write
|
||
20E44E23000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E44E10000
|
heap
|
page read and write
|
||
20E4F9F6000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
20E57131000
|
trusted library allocation
|
page read and write
|
||
20E4F75B000
|
trusted library allocation
|
page read and write
|
||
20E4F871000
|
trusted library allocation
|
page read and write
|
||
20E500B9000
|
trusted library allocation
|
page read and write
|
||
20E44E0E000
|
heap
|
page read and write
|
||
20E50499000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E58E83000
|
trusted library allocation
|
page read and write
|
||
20E5608F000
|
trusted library allocation
|
page read and write
|
||
20E4E9A8000
|
trusted library allocation
|
page read and write
|
||
20E5003E000
|
trusted library allocation
|
page read and write
|
||
20E4FF8E000
|
trusted library allocation
|
page read and write
|
||
3E20000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E55F74000
|
trusted library allocation
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E4EFD8000
|
trusted library allocation
|
page read and write
|
||
20E516BA000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E513EE000
|
trusted library allocation
|
page read and write
|
||
20E4E6C0000
|
trusted library allocation
|
page read and write
|
||
20E4F1AE000
|
trusted library allocation
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
20E4F1E9000
|
trusted library allocation
|
page read and write
|
||
20E4B0EB000
|
trusted library allocation
|
page read and write
|
||
20E594A8000
|
trusted library allocation
|
page read and write
|
||
20E4DEAB000
|
trusted library allocation
|
page read and write
|
||
20E4FBF4000
|
trusted library allocation
|
page read and write
|
||
20E579C5000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4F33B000
|
trusted library allocation
|
page read and write
|
||
22EE8FB3000
|
trusted library allocation
|
page read and write
|
||
20E4EE68000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E44DB0000
|
heap
|
page read and write
|
||
1DAFD632000
|
trusted library allocation
|
page read and write
|
||
20E560D1000
|
trusted library allocation
|
page read and write
|
||
20E4ED8C000
|
trusted library allocation
|
page read and write
|
||
20E500D1000
|
trusted library allocation
|
page read and write
|
||
20E51660000
|
trusted library allocation
|
page read and write
|
||
20E4F7F6000
|
trusted library allocation
|
page read and write
|
||
20E5048A000
|
trusted library allocation
|
page read and write
|
||
20E5166E000
|
trusted library allocation
|
page read and write
|
||
20E49DFE000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4FBC3000
|
trusted library allocation
|
page read and write
|
||
20E4E6DD000
|
trusted library allocation
|
page read and write
|
||
20E5908A000
|
trusted library allocation
|
page read and write
|
||
20E59592000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E4FF78000
|
trusted library allocation
|
page read and write
|
||
20E55FF3000
|
trusted library allocation
|
page read and write
|
||
20E51656000
|
trusted library allocation
|
page read and write
|
||
20E584F4000
|
trusted library allocation
|
page read and write
|
||
20E500A1000
|
trusted library allocation
|
page read and write
|
||
20E55F34000
|
trusted library allocation
|
page read and write
|
||
20E590C9000
|
trusted library allocation
|
page read and write
|
||
20E4B565000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E59493000
|
trusted library allocation
|
page read and write
|
||
20E44DF3000
|
heap
|
page read and write
|
||
20E55FF7000
|
trusted library allocation
|
page read and write
|
||
22EE9580000
|
heap
|
page read and write
|
||
20E4F780000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E49EFC000
|
trusted library allocation
|
page read and write
|
||
20E44D98000
|
heap
|
page read and write
|
||
20E59471000
|
trusted library allocation
|
page read and write
|
||
20E501A4000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E56077000
|
trusted library allocation
|
page read and write
|
||
20E44DA1000
|
heap
|
page read and write
|
||
20E4FD84000
|
trusted library allocation
|
page read and write
|
||
20E4F763000
|
trusted library allocation
|
page read and write
|
||
20E49798000
|
trusted library allocation
|
page read and write
|
||
20E4FB91000
|
trusted library allocation
|
page read and write
|
||
20E58EA9000
|
trusted library allocation
|
page read and write
|
||
20E560B3000
|
trusted library allocation
|
page read and write
|
||
20E513FB000
|
trusted library allocation
|
page read and write
|
||
20E59445000
|
trusted library allocation
|
page read and write
|
||
20E4DD81000
|
trusted library allocation
|
page read and write
|
||
C11000
|
unkown
|
page execute read
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E4F0E8000
|
trusted library allocation
|
page read and write
|
||
20E4B7A5000
|
trusted library allocation
|
page read and write
|
||
20E5610B000
|
trusted library allocation
|
page read and write
|
||
20E4DD87000
|
trusted library allocation
|
page read and write
|
||
20E4F7E4000
|
trusted library allocation
|
page read and write
|
||
20E4E42C000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E503F6000
|
trusted library allocation
|
page read and write
|
||
20E515B5000
|
trusted library allocation
|
page read and write
|
||
20E5909B000
|
trusted library allocation
|
page read and write
|
||
20E4F7C2000
|
trusted library allocation
|
page read and write
|
||
20E4F1B1000
|
trusted library allocation
|
page read and write
|
||
20E44D78000
|
heap
|
page read and write
|
||
20E4B0A6000
|
trusted library allocation
|
page read and write
|
||
20E561FD000
|
trusted library allocation
|
page read and write
|
||
20E44DE3000
|
heap
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
873FA7C000
|
stack
|
page read and write
|
||
20E4DEC0000
|
trusted library allocation
|
page read and write
|
||
22EE8F7F000
|
trusted library allocation
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
20E5186B000
|
trusted library allocation
|
page read and write
|
||
20E4F9AA000
|
trusted library allocation
|
page read and write
|
||
22EE963A000
|
heap
|
page read and write
|
||
20E590FE000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E59592000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E500A1000
|
trusted library allocation
|
page read and write
|
||
20E4E040000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E4C729000
|
trusted library allocation
|
page read and write
|
||
20E5A1CE000
|
trusted library allocation
|
page read and write
|
||
20E4E499000
|
trusted library allocation
|
page read and write
|
||
20E5008C000
|
trusted library allocation
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E5908D000
|
trusted library allocation
|
page read and write
|
||
20E44DD8000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4E4C5000
|
trusted library allocation
|
page read and write
|
||
20E56166000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E516F3000
|
trusted library allocation
|
page read and write
|
||
20E44E0C000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44DBC000
|
heap
|
page read and write
|
||
147F000
|
heap
|
page read and write
|
||
20E55FF2000
|
trusted library allocation
|
page read and write
|
||
20E560D1000
|
trusted library allocation
|
page read and write
|
||
20E4ED3F000
|
trusted library allocation
|
page read and write
|
||
20E4F1D3000
|
trusted library allocation
|
page read and write
|
||
20E51F00000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E516C0000
|
trusted library allocation
|
page read and write
|
||
20E4F341000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4E5B7000
|
trusted library allocation
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
22EE8D70000
|
heap
|
page read and write
|
||
20E5182B000
|
trusted library allocation
|
page read and write
|
||
20E5973E000
|
heap
|
page read and write
|
||
20E4E6C4000
|
trusted library allocation
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E497EF000
|
trusted library allocation
|
page read and write
|
||
20E508F4000
|
trusted library allocation
|
page read and write
|
||
20E5613C000
|
trusted library allocation
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4DEB5000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E44DA3000
|
heap
|
page read and write
|
||
20E507CE000
|
trusted library allocation
|
page read and write
|
||
20E4F0D2000
|
trusted library allocation
|
page read and write
|
||
20E4EF19000
|
trusted library allocation
|
page read and write
|
||
20E59578000
|
trusted library allocation
|
page read and write
|
||
20E4B579000
|
heap
|
page read and write
|
||
20E4AED8000
|
trusted library allocation
|
page read and write
|
||
20E44DAE000
|
heap
|
page read and write
|
||
20E4EFA4000
|
trusted library allocation
|
page read and write
|
||
20E507B3000
|
trusted library allocation
|
page read and write
|
||
20E5004D000
|
trusted library allocation
|
page read and write
|
||
20E55E2E000
|
trusted library allocation
|
page read and write
|
||
20E5189C000
|
trusted library allocation
|
page read and write
|
||
20E4B575000
|
heap
|
page read and write
|
||
20E4F95B000
|
trusted library allocation
|
page read and write
|
||
1C5F3065000
|
trusted library allocation
|
page read and write
|
||
20E4ED84000
|
trusted library allocation
|
page read and write
|
||
20E5964B000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44DAA000
|
heap
|
page read and write
|
||
1D1E000
|
stack
|
page read and write
|
||
20E502D5000
|
trusted library allocation
|
page read and write
|
||
20E51662000
|
trusted library allocation
|
page read and write
|
||
20E4EF21000
|
trusted library allocation
|
page read and write
|
||
20E59090000
|
trusted library allocation
|
page read and write
|
||
20E55F77000
|
trusted library allocation
|
page read and write
|
||
20E44DB5000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
22EE8F10000
|
trusted library allocation
|
page read and write
|
||
20E4AE7D000
|
trusted library allocation
|
page read and write
|
||
20E4F7E4000
|
trusted library allocation
|
page read and write
|
||
20E55F92000
|
trusted library allocation
|
page read and write
|
||
1DAFD612000
|
trusted library allocation
|
page read and write
|
||
20E5134B000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E4E0C5000
|
trusted library allocation
|
page read and write
|
||
20E4EFA2000
|
trusted library allocation
|
page read and write
|
||
20E59085000
|
trusted library allocation
|
page read and write
|
||
20E49E6A000
|
trusted library allocation
|
page read and write
|
||
16B23AA5000
|
heap
|
page read and write
|
||
20E590BA000
|
trusted library allocation
|
page read and write
|
||
20E59088000
|
trusted library allocation
|
page read and write
|
||
20E513B6000
|
trusted library allocation
|
page read and write
|
||
20E509A1000
|
trusted library allocation
|
page read and write
|
||
20E500C2000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4F7E6000
|
trusted library allocation
|
page read and write
|
||
20E4E073000
|
trusted library allocation
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
20E4FEEA000
|
trusted library allocation
|
page read and write
|
||
20E59071000
|
trusted library allocation
|
page read and write
|
||
20E4DE7B000
|
trusted library allocation
|
page read and write
|
||
20E4FC62000
|
trusted library allocation
|
page read and write
|
||
20E50307000
|
trusted library allocation
|
page read and write
|
||
B15F7FE000
|
stack
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E5712C000
|
trusted library allocation
|
page read and write
|
||
20E5942E000
|
trusted library allocation
|
page read and write
|
||
20E59077000
|
trusted library allocation
|
page read and write
|
||
20E4E4EE000
|
trusted library allocation
|
page read and write
|
||
20E44E1E000
|
heap
|
page read and write
|
||
20E4EFD8000
|
trusted library allocation
|
page read and write
|
||
20E4EFD8000
|
trusted library allocation
|
page read and write
|
||
20E515E4000
|
trusted library allocation
|
page read and write
|
||
20E59586000
|
trusted library allocation
|
page read and write
|
||
20E59477000
|
trusted library allocation
|
page read and write
|
||
20E44DAE000
|
heap
|
page read and write
|
||
22EE9638000
|
heap
|
page read and write
|
||
20E59421000
|
trusted library allocation
|
page read and write
|
||
20E4F7F2000
|
trusted library allocation
|
page read and write
|
||
20E56092000
|
trusted library allocation
|
page read and write
|
||
20E5963E000
|
trusted library allocation
|
page read and write
|
||
20E4B56E000
|
heap
|
page read and write
|
||
20E509B1000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44E05000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E594B4000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
3E21000
|
heap
|
page read and write
|
||
20E50072000
|
trusted library allocation
|
page read and write
|
||
20E5900F000
|
trusted library allocation
|
page read and write
|
||
20E4DB84000
|
trusted library allocation
|
page read and write
|
||
20E59761000
|
heap
|
page read and write
|
||
20E516B8000
|
trusted library allocation
|
page read and write
|
||
1DAFD581000
|
trusted library allocation
|
page read and write
|
||
16B21FB8000
|
heap
|
page read and write
|
||
20E4B740000
|
trusted library allocation
|
page read and write
|
||
250908E1000
|
trusted library allocation
|
page execute read
|
||
20E4F963000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
1DAFD547000
|
trusted library allocation
|
page read and write
|
||
20E59782000
|
heap
|
page read and write
|
||
20E516E8000
|
trusted library allocation
|
page read and write
|
||
10003D000
|
stack
|
page read and write
|
||
20E595F8000
|
trusted library allocation
|
page read and write
|
||
20E5943B000
|
trusted library allocation
|
page read and write
|
||
20E4F30F000
|
trusted library allocation
|
page read and write
|
||
20E4B755000
|
trusted library allocation
|
page read and write
|
||
20E5907B000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E55FA5000
|
trusted library allocation
|
page read and write
|
||
20E5048A000
|
trusted library allocation
|
page read and write
|
||
20E5959C000
|
trusted library allocation
|
page read and write
|
||
20E50726000
|
trusted library allocation
|
page read and write
|
||
20E44DF2000
|
heap
|
page read and write
|
||
20E4F0F9000
|
trusted library allocation
|
page read and write
|
||
20E595FA000
|
trusted library allocation
|
page read and write
|
||
20E4EE64000
|
trusted library allocation
|
page read and write
|
||
20E571B8000
|
trusted library allocation
|
page read and write
|
||
20E560F6000
|
trusted library allocation
|
page read and write
|
||
20E4FEC1000
|
trusted library allocation
|
page read and write
|
||
20E5055E000
|
trusted library allocation
|
page read and write
|
||
20E515CC000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E4F193000
|
trusted library allocation
|
page read and write
|
||
1DAFD594000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4EF27000
|
trusted library allocation
|
page read and write
|
||
20E51901000
|
trusted library allocation
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E44D9C000
|
heap
|
page read and write
|
||
20E44E17000
|
heap
|
page read and write
|
||
20E59073000
|
trusted library allocation
|
page read and write
|
||
20E594BB000
|
trusted library allocation
|
page read and write
|
||
20E44DAE000
|
heap
|
page read and write
|
||
20E4E01E000
|
trusted library allocation
|
page read and write
|
||
20E44DEE000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E516C0000
|
trusted library allocation
|
page read and write
|
||
20E4F951000
|
trusted library allocation
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E4F1BA000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E57688000
|
trusted library allocation
|
page read and write
|
||
20E5166E000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E5906F000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E560CF000
|
trusted library allocation
|
page read and write
|
||
20E576D1000
|
trusted library allocation
|
page read and write
|
||
20E4B0DC000
|
trusted library allocation
|
page read and write
|
||
1C5F2CF0000
|
remote allocation
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E51687000
|
trusted library allocation
|
page read and write
|
||
20E50950000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E4EF79000
|
trusted library allocation
|
page read and write
|
||
20E5763A000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E516E4000
|
trusted library allocation
|
page read and write
|
||
20E5002B000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E58E0A000
|
trusted library allocation
|
page read and write
|
||
20E4F824000
|
trusted library allocation
|
page read and write
|
||
20E5903E000
|
trusted library allocation
|
page read and write
|
||
20E4F092000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E3F953000
|
heap
|
page read and write
|
||
20E44E05000
|
heap
|
page read and write
|
||
20E5858E000
|
trusted library allocation
|
page read and write
|
||
20E5078C000
|
trusted library allocation
|
page read and write
|
||
20E44D74000
|
heap
|
page read and write
|
||
20E44DEE000
|
heap
|
page read and write
|
||
20E5907A000
|
trusted library allocation
|
page read and write
|
||
20E44DA3000
|
heap
|
page read and write
|
||
20E5056C000
|
trusted library allocation
|
page read and write
|
||
20E56038000
|
trusted library allocation
|
page read and write
|
||
20E44DBB000
|
heap
|
page read and write
|
||
22EE9681000
|
heap
|
page read and write
|
||
20E4ED97000
|
trusted library allocation
|
page read and write
|
||
20E59025000
|
trusted library allocation
|
page read and write
|
||
20E571F5000
|
trusted library allocation
|
page read and write
|
||
20E4E993000
|
trusted library allocation
|
page read and write
|
||
20E44DDF000
|
heap
|
page read and write
|
||
20E516BE000
|
trusted library allocation
|
page read and write
|
||
20E516A2000
|
trusted library allocation
|
page read and write
|
||
20E4F7E4000
|
trusted library allocation
|
page read and write
|
||
20E571AD000
|
trusted library allocation
|
page read and write
|
||
20E4F7C2000
|
trusted library allocation
|
page read and write
|
||
20E5009D000
|
trusted library allocation
|
page read and write
|
||
20E516C0000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
1DAFD592000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4FF33000
|
trusted library allocation
|
page read and write
|
||
20E57692000
|
trusted library allocation
|
page read and write
|
||
20E5945C000
|
trusted library allocation
|
page read and write
|
||
20E44DA1000
|
heap
|
page read and write
|
||
20E506E2000
|
trusted library allocation
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E4B7A5000
|
trusted library allocation
|
page read and write
|
||
20E44DE3000
|
heap
|
page read and write
|
||
20E44DDB000
|
heap
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E4F48F000
|
trusted library allocation
|
page read and write
|
||
20E507CE000
|
trusted library allocation
|
page read and write
|
||
20E4FB4B000
|
trusted library allocation
|
page read and write
|
||
20E4EDFD000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E516F3000
|
trusted library allocation
|
page read and write
|
||
20E4F0FE000
|
trusted library allocation
|
page read and write
|
||
20E50720000
|
trusted library allocation
|
page read and write
|
||
20E508B1000
|
trusted library allocation
|
page read and write
|
||
22EE95F0000
|
heap
|
page read and write
|
||
20E44DBF000
|
heap
|
page read and write
|
||
20E59471000
|
trusted library allocation
|
page read and write
|
||
20E51DE0000
|
trusted library allocation
|
page read and write
|
||
20E44DAA000
|
heap
|
page read and write
|
||
20E516E4000
|
trusted library allocation
|
page read and write
|
||
20E4B565000
|
heap
|
page read and write
|
||
20E44DA5000
|
heap
|
page read and write
|
||
20E5166B000
|
trusted library allocation
|
page read and write
|
||
20E4B561000
|
heap
|
page read and write
|
||
20E4EDF0000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4F438000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
CE4000
|
unkown
|
page readonly
|
||
1DAFD57B000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E5612C000
|
trusted library allocation
|
page read and write
|
||
20E513B9000
|
trusted library allocation
|
page read and write
|
||
20E513FB000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E57A01000
|
trusted library allocation
|
page read and write
|
||
20E4F95B000
|
trusted library allocation
|
page read and write
|
||
20E44DAA000
|
heap
|
page read and write
|
||
20E44E10000
|
heap
|
page read and write
|
||
20E4E416000
|
trusted library allocation
|
page read and write
|
||
20E5094C000
|
trusted library allocation
|
page read and write
|
||
20E501BD000
|
trusted library allocation
|
page read and write
|
||
22EE968D000
|
heap
|
page read and write
|
||
20E4EDDA000
|
trusted library allocation
|
page read and write
|
||
22EE8F1A000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E516BA000
|
trusted library allocation
|
page read and write
|
||
20E571EF000
|
trusted library allocation
|
page read and write
|
||
20E4FBA9000
|
trusted library allocation
|
page read and write
|
||
20E579A3000
|
trusted library allocation
|
page read and write
|
||
23EFEDC0000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
1C5F2E5A000
|
heap
|
page read and write
|
||
20E500A3000
|
trusted library allocation
|
page read and write
|
||
20E504C3000
|
trusted library allocation
|
page read and write
|
||
20E513BD000
|
trusted library allocation
|
page read and write
|
||
20E50570000
|
trusted library allocation
|
page read and write
|
||
20E5955F000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E49DFB000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
16B22207000
|
trusted library allocation
|
page read and write
|
||
20E59098000
|
trusted library allocation
|
page read and write
|
||
20E4F4B5000
|
trusted library allocation
|
page read and write
|
||
20E4F3EE000
|
trusted library allocation
|
page read and write
|
||
20E4EFD6000
|
trusted library allocation
|
page read and write
|
||
20E59236000
|
trusted library allocation
|
page read and write
|
||
10343E000
|
stack
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44DF5000
|
heap
|
page read and write
|
||
20E4FE7C000
|
trusted library allocation
|
page read and write
|
||
22EE8F6F000
|
trusted library allocation
|
page read and write
|
||
20E44DFA000
|
heap
|
page read and write
|
||
20E55F69000
|
trusted library allocation
|
page read and write
|
||
20E5002E000
|
trusted library allocation
|
page read and write
|
||
20E513B2000
|
trusted library allocation
|
page read and write
|
||
20E4F8A3000
|
trusted library allocation
|
page read and write
|
||
20E4DB41000
|
trusted library allocation
|
page read and write
|
||
20E51DE8000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
20E59073000
|
trusted library allocation
|
page read and write
|
||
20E4F968000
|
trusted library allocation
|
page read and write
|
||
20E4DEB5000
|
trusted library allocation
|
page read and write
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E4E90A000
|
trusted library allocation
|
page read and write
|
||
20E4F305000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44DD4000
|
heap
|
page read and write
|
||
20E58E29000
|
trusted library allocation
|
page read and write
|
||
20E502D8000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E5611E000
|
trusted library allocation
|
page read and write
|
||
20E4C72C000
|
trusted library allocation
|
page read and write
|
||
20E5616B000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44D85000
|
heap
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4ADAD000
|
trusted library allocation
|
page read and write
|
||
20E5009D000
|
trusted library allocation
|
page read and write
|
||
20E59031000
|
trusted library allocation
|
page read and write
|
||
20E4E6F4000
|
trusted library allocation
|
page read and write
|
||
20E4F8EE000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4DED7000
|
trusted library allocation
|
page read and write
|
||
20E44DFA000
|
heap
|
page read and write
|
||
20E516DC000
|
trusted library allocation
|
page read and write
|
||
20E4DE53000
|
trusted library allocation
|
page read and write
|
||
20E506B5000
|
trusted library allocation
|
page read and write
|
||
20E5137E000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4E4EE000
|
trusted library allocation
|
page read and write
|
||
20E501EC000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
20E516E4000
|
trusted library allocation
|
page read and write
|
||
20E500CF000
|
trusted library allocation
|
page read and write
|
||
20E55E4A000
|
trusted library allocation
|
page read and write
|
||
20E585EE000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E5928B000
|
trusted library allocation
|
page read and write
|
||
B15E7FE000
|
stack
|
page read and write
|
||
20E513FB000
|
trusted library allocation
|
page read and write
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E4DD8D000
|
trusted library allocation
|
page read and write
|
||
20E579A7000
|
trusted library allocation
|
page read and write
|
||
20E509EA000
|
trusted library allocation
|
page read and write
|
||
20E4F0D7000
|
trusted library allocation
|
page read and write
|
||
20E4C7D0000
|
trusted library allocation
|
page read and write
|
||
20E4E6B7000
|
trusted library allocation
|
page read and write
|
||
20E4E9C3000
|
trusted library allocation
|
page read and write
|
||
103C7E000
|
stack
|
page read and write
|
||
20E4DE84000
|
trusted library allocation
|
page read and write
|
||
1DAFD512000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E513B6000
|
trusted library allocation
|
page read and write
|
||
20E4B0A1000
|
trusted library allocation
|
page read and write
|
||
20E59098000
|
trusted library allocation
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E4F1E7000
|
trusted library allocation
|
page read and write
|
||
20E4F3C9000
|
trusted library allocation
|
page read and write
|
||
20E56092000
|
trusted library allocation
|
page read and write
|
||
20E58FB7000
|
trusted library allocation
|
page read and write
|
||
20E44E0D000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E4C77A000
|
trusted library allocation
|
page read and write
|
||
20E576D9000
|
trusted library allocation
|
page read and write
|
||
20E4E4F4000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44E18000
|
heap
|
page read and write
|
||
1DAFD56E000
|
trusted library allocation
|
page read and write
|
||
20E4F1A9000
|
trusted library allocation
|
page read and write
|
||
22EE8D60000
|
trusted library allocation
|
page read and write
|
||
1C5F30AF000
|
trusted library allocation
|
page read and write
|
||
20E58FA5000
|
trusted library allocation
|
page read and write
|
||
20E5762E000
|
trusted library allocation
|
page read and write
|
||
873E1D8000
|
stack
|
page read and write
|
||
20E4F321000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E4F95B000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E4F348000
|
trusted library allocation
|
page read and write
|
||
20E44DF2000
|
heap
|
page read and write
|
||
20E4DECE000
|
trusted library allocation
|
page read and write
|
||
20E4DEB8000
|
trusted library allocation
|
page read and write
|
||
20E51660000
|
trusted library allocation
|
page read and write
|
||
20E4EF9C000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DD9000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E4E92A000
|
trusted library allocation
|
page read and write
|
||
20E4B79E000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
20E4E6B7000
|
trusted library allocation
|
page read and write
|
||
20E516DC000
|
trusted library allocation
|
page read and write
|
||
1473000
|
heap
|
page read and write
|
||
20E5908A000
|
trusted library allocation
|
page read and write
|
||
20E4B768000
|
trusted library allocation
|
page read and write
|
||
20E4E94A000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4E0F9000
|
trusted library allocation
|
page read and write
|
||
20E5718C000
|
trusted library allocation
|
page read and write
|
||
20E4B56F000
|
heap
|
page read and write
|
||
20E5952C000
|
trusted library allocation
|
page read and write
|
||
16B21FB8000
|
heap
|
page read and write
|
||
20E55F99000
|
trusted library allocation
|
page read and write
|
||
20E4F9C9000
|
trusted library allocation
|
page read and write
|
||
20E4C7EB000
|
trusted library allocation
|
page read and write
|
||
22EE8F00000
|
trusted library allocation
|
page read and write
|
||
20E59289000
|
trusted library allocation
|
page read and write
|
||
20E44DDE000
|
heap
|
page read and write
|
||
20E4F42F000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
1DAFD700000
|
heap
|
page read and write
|
||
20E4F1A5000
|
trusted library allocation
|
page read and write
|
||
20E4F763000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E5046C000
|
trusted library allocation
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E49E9E000
|
trusted library allocation
|
page read and write
|
||
20E55FBE000
|
trusted library allocation
|
page read and write
|
||
20E505F3000
|
trusted library allocation
|
page read and write
|
||
20E4DDCF000
|
trusted library allocation
|
page read and write
|
||
20E5612C000
|
trusted library allocation
|
page read and write
|
||
F2501FF000
|
stack
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E55EAA000
|
trusted library allocation
|
page read and write
|
||
20E4F7D6000
|
trusted library allocation
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E5007C000
|
trusted library allocation
|
page read and write
|
||
20E4F923000
|
trusted library allocation
|
page read and write
|
||
20E4EE49000
|
trusted library allocation
|
page read and write
|
||
20E4B5BA000
|
heap
|
page read and write
|
||
16B23AA0000
|
heap
|
page read and write
|
||
20E4DD9A000
|
trusted library allocation
|
page read and write
|
||
20E4F078000
|
trusted library allocation
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E4E979000
|
trusted library allocation
|
page read and write
|
||
2110003F000
|
trusted library allocation
|
page read and write
|
||
20E50065000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E590FA000
|
trusted library allocation
|
page read and write
|
||
20E44DB8000
|
heap
|
page read and write
|
||
20E518AA000
|
trusted library allocation
|
page read and write
|
||
20E4F385000
|
trusted library allocation
|
page read and write
|
||
20E516E8000
|
trusted library allocation
|
page read and write
|
||
20E4E6C0000
|
trusted library allocation
|
page read and write
|
||
20E5166D000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4B7A5000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E509C0000
|
trusted library allocation
|
page read and write
|
||
22EE95F0000
|
heap
|
page read and write
|
||
20E44E0E000
|
heap
|
page read and write
|
||
20E500A3000
|
trusted library allocation
|
page read and write
|
||
20E500B7000
|
trusted library allocation
|
page read and write
|
||
20E5097F000
|
trusted library allocation
|
page read and write
|
||
20E4F343000
|
trusted library allocation
|
page read and write
|
||
20E595CC000
|
trusted library allocation
|
page read and write
|
||
20E4F700000
|
trusted library allocation
|
page read and write
|
||
6AE45FE000
|
stack
|
page read and write
|
||
20E44DE3000
|
heap
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E58FC3000
|
trusted library allocation
|
page read and write
|
||
20E4F7D3000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4EDD7000
|
trusted library allocation
|
page read and write
|
||
20E4E9AB000
|
trusted library allocation
|
page read and write
|
||
20E44DB8000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
1C5F2C90000
|
unclassified section
|
page readonly
|
||
20E4EFBB000
|
trusted library allocation
|
page read and write
|
||
20E4DEB5000
|
trusted library allocation
|
page read and write
|
||
20E4E0FC000
|
trusted library allocation
|
page read and write
|
||
20E5796D000
|
trusted library allocation
|
page read and write
|
||
20E518A5000
|
trusted library allocation
|
page read and write
|
||
20E501D3000
|
trusted library allocation
|
page read and write
|
||
20E59083000
|
trusted library allocation
|
page read and write
|
||
20E595AD000
|
trusted library allocation
|
page read and write
|
||
20E4F329000
|
trusted library allocation
|
page read and write
|
||
20E5005A000
|
trusted library allocation
|
page read and write
|
||
20E51659000
|
trusted library allocation
|
page read and write
|
||
20E55E38000
|
trusted library allocation
|
page read and write
|
||
20E56107000
|
trusted library allocation
|
page read and write
|
||
20E58F87000
|
trusted library allocation
|
page read and write
|
||
20E4F348000
|
trusted library allocation
|
page read and write
|
||
20E55FC0000
|
trusted library allocation
|
page read and write
|
||
20E5908D000
|
trusted library allocation
|
page read and write
|
||
20E4C723000
|
trusted library allocation
|
page read and write
|
||
20E44E17000
|
heap
|
page read and write
|
||
20E4EF73000
|
trusted library allocation
|
page read and write
|
||
20E59089000
|
trusted library allocation
|
page read and write
|
||
20E51DD0000
|
trusted library allocation
|
page read and write
|
||
20E571CE000
|
trusted library allocation
|
page read and write
|
||
1C5F305F000
|
trusted library allocation
|
page read and write
|
||
20E51DE4000
|
trusted library allocation
|
page read and write
|
||
20E507C9000
|
trusted library allocation
|
page read and write
|
||
20E4F7DD000
|
trusted library allocation
|
page read and write
|
||
20E44DD8000
|
heap
|
page read and write
|
||
20E44D90000
|
heap
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E50063000
|
trusted library allocation
|
page read and write
|
||
20E513F3000
|
trusted library allocation
|
page read and write
|
||
20E4DED4000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
20E50087000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
8740B3E000
|
unkown
|
page readonly
|
||
20E59633000
|
trusted library allocation
|
page read and write
|
||
20E4EFD2000
|
trusted library allocation
|
page read and write
|
||
20E55F69000
|
trusted library allocation
|
page read and write
|
||
20E59736000
|
heap
|
page read and write
|
||
20E44E1D000
|
heap
|
page read and write
|
||
20E4E69C000
|
trusted library allocation
|
page read and write
|
||
20E5606D000
|
trusted library allocation
|
page read and write
|
||
1C5F3011000
|
trusted library allocation
|
page read and write
|
||
20E4E040000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E44D91000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E55FBC000
|
trusted library allocation
|
page read and write
|
||
20E4F1AC000
|
trusted library allocation
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
20E500CF000
|
trusted library allocation
|
page read and write
|
||
20E4F858000
|
trusted library allocation
|
page read and write
|
||
20E4FF00000
|
trusted library allocation
|
page read and write
|
||
20E509E8000
|
trusted library allocation
|
page read and write
|
||
20E4C7DC000
|
trusted library allocation
|
page read and write
|
||
20E55FEC000
|
trusted library allocation
|
page read and write
|
||
20E4FDA5000
|
trusted library allocation
|
page read and write
|
||
20E4F7F6000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E500C0000
|
trusted library allocation
|
page read and write
|
||
20E4DE3D000
|
trusted library allocation
|
page read and write
|
||
20E4EF95000
|
trusted library allocation
|
page read and write
|
||
20E4B761000
|
trusted library allocation
|
page read and write
|
||
20E4F7B2000
|
trusted library allocation
|
page read and write
|
||
20E44DBF000
|
heap
|
page read and write
|
||
20E58E29000
|
trusted library allocation
|
page read and write
|
||
20E55F99000
|
trusted library allocation
|
page read and write
|
||
20E500D1000
|
trusted library allocation
|
page read and write
|
||
20E4EE68000
|
trusted library allocation
|
page read and write
|
||
20E4FF53000
|
trusted library allocation
|
page read and write
|
||
20E4F77E000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E4DE94000
|
trusted library allocation
|
page read and write
|
||
20E59473000
|
trusted library allocation
|
page read and write
|
||
1485000
|
heap
|
page read and write
|
||
20E4F3F7000
|
trusted library allocation
|
page read and write
|
||
20E4F98F000
|
trusted library allocation
|
page read and write
|
||
20E4F7D3000
|
trusted library allocation
|
page read and write
|
||
20E4FF4F000
|
trusted library allocation
|
page read and write
|
||
20E44DEC000
|
heap
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E59480000
|
trusted library allocation
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
20E5A19E000
|
trusted library allocation
|
page read and write
|
||
20E4F85D000
|
trusted library allocation
|
page read and write
|
||
20E55EC3000
|
trusted library allocation
|
page read and write
|
||
20E50550000
|
trusted library allocation
|
page read and write
|
||
20E500C2000
|
trusted library allocation
|
page read and write
|
||
20E58598000
|
trusted library allocation
|
page read and write
|
||
20E4F0C4000
|
trusted library allocation
|
page read and write
|
||
20E59432000
|
trusted library allocation
|
page read and write
|
||
20E44D9C000
|
heap
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E44D85000
|
heap
|
page read and write
|
||
20E4EE2B000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
20E5943B000
|
trusted library allocation
|
page read and write
|
||
20E55E38000
|
trusted library allocation
|
page read and write
|
||
20E4E4F4000
|
trusted library allocation
|
page read and write
|
||
20E58E90000
|
trusted library allocation
|
page read and write
|
||
20E518AF000
|
trusted library allocation
|
page read and write
|
||
20E4F1AE000
|
trusted library allocation
|
page read and write
|
||
20E4E4EE000
|
trusted library allocation
|
page read and write
|
||
20E59799000
|
heap
|
page read and write
|
||
20E4E484000
|
trusted library allocation
|
page read and write
|
||
22EE9B98000
|
heap
|
page read and write
|
||
20E59421000
|
trusted library allocation
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E55E59000
|
trusted library allocation
|
page read and write
|
||
20E4E448000
|
trusted library allocation
|
page read and write
|
||
20E4F7D6000
|
trusted library allocation
|
page read and write
|
||
20E4FD78000
|
trusted library allocation
|
page read and write
|
||
20E4F9C8000
|
trusted library allocation
|
page read and write
|
||
20E4B563000
|
heap
|
page read and write
|
||
1DAFD523000
|
trusted library allocation
|
page read and write
|
||
20E504ED000
|
trusted library allocation
|
page read and write
|
||
20E4F9EA000
|
trusted library allocation
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
16B21FA2000
|
heap
|
page read and write
|
||
20E4FB6A000
|
trusted library allocation
|
page read and write
|
||
20E59083000
|
trusted library allocation
|
page read and write
|
||
20E58437000
|
trusted library allocation
|
page read and write
|
||
20E4FF55000
|
trusted library allocation
|
page read and write
|
||
20E44E1D000
|
heap
|
page read and write
|
||
20E516B5000
|
trusted library allocation
|
page read and write
|
||
20E44DF4000
|
heap
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E4F991000
|
trusted library allocation
|
page read and write
|
||
20E5903A000
|
trusted library allocation
|
page read and write
|
||
20E5004B000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E55FB2000
|
trusted library allocation
|
page read and write
|
||
20E4E448000
|
trusted library allocation
|
page read and write
|
||
20E4DE7F000
|
trusted library allocation
|
page read and write
|
||
22EE9BA7000
|
heap
|
page read and write
|
||
20E500D7000
|
trusted library allocation
|
page read and write
|
||
22EE8DFE000
|
unkown
|
page execute read
|
||
20E51648000
|
trusted library allocation
|
page read and write
|
||
20E594CA000
|
trusted library allocation
|
page read and write
|
||
20E4F933000
|
trusted library allocation
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E4B565000
|
heap
|
page read and write
|
||
20E518A5000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E5608F000
|
trusted library allocation
|
page read and write
|
||
20E44D85000
|
heap
|
page read and write
|
||
20E44E04000
|
heap
|
page read and write
|
||
20E4DEAE000
|
trusted library allocation
|
page read and write
|
||
20E44D74000
|
heap
|
page read and write
|
||
20E4F381000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E58EC7000
|
trusted library allocation
|
page read and write
|
||
20E55FF2000
|
trusted library allocation
|
page read and write
|
||
20E49E7F000
|
trusted library allocation
|
page read and write
|
||
20E44DF2000
|
heap
|
page read and write
|
||
20E55F55000
|
trusted library allocation
|
page read and write
|
||
20E4E4EE000
|
trusted library allocation
|
page read and write
|
||
20E4F9C0000
|
trusted library allocation
|
page read and write
|
||
20E44E21000
|
heap
|
page read and write
|
||
20E500D5000
|
trusted library allocation
|
page read and write
|
||
20E4E0F3000
|
trusted library allocation
|
page read and write
|
||
20E4F9A9000
|
trusted library allocation
|
page read and write
|
||
20E4DE86000
|
trusted library allocation
|
page read and write
|
||
148F000
|
heap
|
page read and write
|
||
20E561F8000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E4F326000
|
trusted library allocation
|
page read and write
|
||
20E504C8000
|
trusted library allocation
|
page read and write
|
||
20E44DA3000
|
heap
|
page read and write
|
||
20E4EDD7000
|
trusted library allocation
|
page read and write
|
||
20E4DE3B000
|
trusted library allocation
|
page read and write
|
||
20E58EDD000
|
trusted library allocation
|
page read and write
|
||
20E50997000
|
trusted library allocation
|
page read and write
|
||
20E56044000
|
trusted library allocation
|
page read and write
|
||
20E4F92A000
|
trusted library allocation
|
page read and write
|
||
20E4DB89000
|
trusted library allocation
|
page read and write
|
||
20E49D23000
|
trusted library allocation
|
page read and write
|
||
1DAFD0AE000
|
remote allocation
|
page execute read
|
||
20E4F7BA000
|
trusted library allocation
|
page read and write
|
||
20E4F7ED000
|
trusted library allocation
|
page read and write
|
||
20E4EFD6000
|
trusted library allocation
|
page read and write
|
||
22EE8AF0000
|
unclassified section
|
page readonly
|
||
20E5928B000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E497B3000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E594F3000
|
trusted library allocation
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
873F1FE000
|
stack
|
page read and write
|
||
1C5F3070000
|
trusted library allocation
|
page read and write
|
||
22EE9BA7000
|
heap
|
page read and write
|
||
20E5924E000
|
trusted library allocation
|
page read and write
|
||
20E4F348000
|
trusted library allocation
|
page read and write
|
||
20E500C2000
|
trusted library allocation
|
page read and write
|
||
20E4FF74000
|
trusted library allocation
|
page read and write
|
||
20E44DB6000
|
heap
|
page read and write
|
||
20E5952C000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E4DD7B000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E51DD4000
|
trusted library allocation
|
page read and write
|
||
20E590AC000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44DBC000
|
heap
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
20E4E0F9000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E44E21000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E4F9B0000
|
trusted library allocation
|
page read and write
|
||
1DAFD562000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E578C8000
|
trusted library allocation
|
page read and write
|
||
148F000
|
heap
|
page read and write
|
||
20E4B0BC000
|
trusted library allocation
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
20E4DB4B000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E44DD4000
|
heap
|
page read and write
|
||
20E4E9CD000
|
trusted library allocation
|
page read and write
|
||
20E51DB7000
|
trusted library allocation
|
page read and write
|
||
20E5909B000
|
trusted library allocation
|
page read and write
|
||
20E4E9D0000
|
trusted library allocation
|
page read and write
|
||
20E4F651000
|
trusted library allocation
|
page read and write
|
||
20E504AF000
|
trusted library allocation
|
page read and write
|
||
20E4ED86000
|
trusted library allocation
|
page read and write
|
||
20E4F9DF000
|
trusted library allocation
|
page read and write
|
||
20E5003B000
|
trusted library allocation
|
page read and write
|
||
20E595FA000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E4FB62000
|
trusted library allocation
|
page read and write
|
||
20E58E83000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E5973E000
|
heap
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E4E0DA000
|
trusted library allocation
|
page read and write
|
||
20E4B56F000
|
heap
|
page read and write
|
||
20E4B761000
|
trusted library allocation
|
page read and write
|
||
20E4AE97000
|
trusted library allocation
|
page read and write
|
||
20E516BA000
|
trusted library allocation
|
page read and write
|
||
20E4E6C6000
|
trusted library allocation
|
page read and write
|
||
20E44DE6000
|
heap
|
page read and write
|
||
20E4F905000
|
trusted library allocation
|
page read and write
|
||
20E44DEC000
|
heap
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E59423000
|
trusted library allocation
|
page read and write
|
||
20E4F9EA000
|
trusted library allocation
|
page read and write
|
||
20E56184000
|
trusted library allocation
|
page read and write
|
||
20E500B7000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E501BD000
|
trusted library allocation
|
page read and write
|
||
20E4DE7E000
|
trusted library allocation
|
page read and write
|
||
20E4E92C000
|
trusted library allocation
|
page read and write
|
||
20E4B575000
|
heap
|
page read and write
|
||
20E4FAB7000
|
trusted library allocation
|
page read and write
|
||
20E584EA000
|
trusted library allocation
|
page read and write
|
||
20E5844C000
|
trusted library allocation
|
page read and write
|
||
20E4F0FE000
|
trusted library allocation
|
page read and write
|
||
22EE9460000
|
heap
|
page read and write
|
||
20E4E64E000
|
trusted library allocation
|
page read and write
|
||
20E4AEF8000
|
trusted library allocation
|
page read and write
|
||
20E590B2000
|
trusted library allocation
|
page read and write
|
||
20E44D9A000
|
heap
|
page read and write
|
||
20E44E16000
|
heap
|
page read and write
|
||
20E44DF4000
|
heap
|
page read and write
|
||
B15EFFE000
|
unkown
|
page readonly
|
||
20E44E14000
|
heap
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E44E20000
|
heap
|
page read and write
|
||
20E4DEDA000
|
trusted library allocation
|
page read and write
|
||
20E55F53000
|
trusted library allocation
|
page read and write
|
||
20E4F023000
|
trusted library allocation
|
page read and write
|
||
20E4F7D3000
|
trusted library allocation
|
page read and write
|
||
10017E000
|
unkown
|
page readonly
|
||
20E4C7D7000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E5007E000
|
trusted library allocation
|
page read and write
|
||
20E58E72000
|
trusted library allocation
|
page read and write
|
||
20E4F7B5000
|
trusted library allocation
|
page read and write
|
||
22EE9BA7000
|
heap
|
page read and write
|
||
20E4FFE4000
|
trusted library allocation
|
page read and write
|
||
20E44DE6000
|
heap
|
page read and write
|
||
20E44E0C000
|
heap
|
page read and write
|
||
20E59706000
|
heap
|
page read and write
|
||
22EE968D000
|
heap
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4FF46000
|
trusted library allocation
|
page read and write
|
||
22EE9678000
|
heap
|
page read and write
|
||
20E58E98000
|
trusted library allocation
|
page read and write
|
||
20E59083000
|
trusted library allocation
|
page read and write
|
||
20E51DD0000
|
trusted library allocation
|
page read and write
|
||
20E518B2000
|
trusted library allocation
|
page read and write
|
||
20E44E06000
|
heap
|
page read and write
|
||
20E4FC12000
|
trusted library allocation
|
page read and write
|
||
20E4FBA7000
|
trusted library allocation
|
page read and write
|
||
20E4F337000
|
trusted library allocation
|
page read and write
|
||
20E516C7000
|
trusted library allocation
|
page read and write
|
||
20E5927F000
|
trusted library allocation
|
page read and write
|
||
22EE8F5F000
|
trusted library allocation
|
page read and write
|
||
1DAFD170000
|
unclassified section
|
page read and write
|
||
20E4EEF0000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E5963D000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E4F7AA000
|
trusted library allocation
|
page read and write
|
||
20E4F9ED000
|
trusted library allocation
|
page read and write
|
||
20E500D5000
|
trusted library allocation
|
page read and write
|
||
20E44DA3000
|
heap
|
page read and write
|
||
20E58595000
|
trusted library allocation
|
page read and write
|
||
1000FB000
|
stack
|
page read and write
|
||
20E571C2000
|
trusted library allocation
|
page read and write
|
||
1483000
|
heap
|
page read and write
|
||
20E4F1FB000
|
trusted library allocation
|
page read and write
|
||
20E5047F000
|
trusted library allocation
|
page read and write
|
||
20E4B569000
|
heap
|
page read and write
|
||
20E4B79E000
|
trusted library allocation
|
page read and write
|
||
20E44E23000
|
heap
|
page read and write
|
||
20E4B0F6000
|
trusted library allocation
|
page read and write
|
||
1DAFD23A000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E516C7000
|
trusted library allocation
|
page read and write
|
||
20E516D7000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4F96C000
|
trusted library allocation
|
page read and write
|
||
20E44DB5000
|
heap
|
page read and write
|
||
20E5976A000
|
heap
|
page read and write
|
||
20E4DEB5000
|
trusted library allocation
|
page read and write
|
||
22EE960D000
|
heap
|
page read and write
|
||
20E44E1A000
|
heap
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E4E03B000
|
trusted library allocation
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
1DAFD17F000
|
unclassified section
|
page read and write
|
||
1C5F301B000
|
trusted library allocation
|
page read and write
|
||
1C5F2E30000
|
heap
|
page read and write
|
||
20E571CE000
|
trusted library allocation
|
page read and write
|
||
20E57688000
|
trusted library allocation
|
page read and write
|
||
20E590C5000
|
trusted library allocation
|
page read and write
|
||
CD2000
|
unkown
|
page readonly
|
||
20E4F183000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E55F55000
|
trusted library allocation
|
page read and write
|
||
22EE9B7B000
|
heap
|
page read and write
|
||
20E500C2000
|
trusted library allocation
|
page read and write
|
||
20E4DEDC000
|
trusted library allocation
|
page read and write
|
||
20E4E6CA000
|
trusted library allocation
|
page read and write
|
||
20E516BE000
|
trusted library allocation
|
page read and write
|
||
20E44DFB000
|
heap
|
page read and write
|
||
20E4F8AD000
|
trusted library allocation
|
page read and write
|
||
20E515F7000
|
trusted library allocation
|
page read and write
|
||
20E50763000
|
trusted library allocation
|
page read and write
|
||
20E4DBFC000
|
trusted library allocation
|
page read and write
|
||
20E4EE62000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
22EE95F0000
|
heap
|
page read and write
|
||
20E516BC000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E55F83000
|
trusted library allocation
|
page read and write
|
||
20E4F1A0000
|
trusted library allocation
|
page read and write
|
||
20E5927F000
|
trusted library allocation
|
page read and write
|
||
20E4F98F000
|
trusted library allocation
|
page read and write
|
||
20E5614A000
|
trusted library allocation
|
page read and write
|
||
20E59263000
|
trusted library allocation
|
page read and write
|
||
20E4FBC2000
|
trusted library allocation
|
page read and write
|
||
20E4EFD2000
|
trusted library allocation
|
page read and write
|
||
20E55FF0000
|
trusted library allocation
|
page read and write
|
||
20E4FBB9000
|
trusted library allocation
|
page read and write
|
||
20E4F9B9000
|
trusted library allocation
|
page read and write
|
||
20E4F1F8000
|
trusted library allocation
|
page read and write
|
||
20E44DBE000
|
heap
|
page read and write
|
||
22EE8B70000
|
unclassified section
|
page readonly
|
||
20E59077000
|
trusted library allocation
|
page read and write
|
||
1DAFD190000
|
heap
|
page read and write
|
||
20E55E32000
|
trusted library allocation
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
23EFEF00000
|
trusted library allocation
|
page read and write
|
||
20E44DA8000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E59098000
|
trusted library allocation
|
page read and write
|
||
20E516BC000
|
trusted library allocation
|
page read and write
|
||
20E4EEE1000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E50065000
|
trusted library allocation
|
page read and write
|
||
20E44D94000
|
heap
|
page read and write
|
||
20E4B749000
|
trusted library allocation
|
page read and write
|
||
20E504DC000
|
trusted library allocation
|
page read and write
|
||
20E44DCE000
|
heap
|
page read and write
|
||
20E4EE1D000
|
trusted library allocation
|
page read and write
|
||
20E4EE30000
|
trusted library allocation
|
page read and write
|
||
874033E000
|
unkown
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4F9AC000
|
trusted library allocation
|
page read and write
|
||
22EE9B6A000
|
heap
|
page read and write
|
||
20E4EEAD000
|
trusted library allocation
|
page read and write
|
||
20E4B79E000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4B0C1000
|
trusted library allocation
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
22EE9B84000
|
heap
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E4F9EA000
|
trusted library allocation
|
page read and write
|
||
20E590F6000
|
trusted library allocation
|
page read and write
|
||
20E59283000
|
trusted library allocation
|
page read and write
|
||
20E4EEAB000
|
trusted library allocation
|
page read and write
|
||
20E4B0BE000
|
trusted library allocation
|
page read and write
|
||
20E50987000
|
trusted library allocation
|
page read and write
|
||
20E4F7F9000
|
trusted library allocation
|
page read and write
|
||
20E518B7000
|
trusted library allocation
|
page read and write
|
||
20E4F9ED000
|
trusted library allocation
|
page read and write
|
||
20E59578000
|
trusted library allocation
|
page read and write
|
||
20E4F191000
|
trusted library allocation
|
page read and write
|
||
20E594ED000
|
trusted library allocation
|
page read and write
|
||
20E4C760000
|
trusted library allocation
|
page read and write
|
||
20E4FF40000
|
trusted library allocation
|
page read and write
|
||
20E4B54F000
|
heap
|
page read and write
|
||
20E4FF1F000
|
trusted library allocation
|
page read and write
|
||
20E59580000
|
trusted library allocation
|
page read and write
|
||
20E3F99E000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E59071000
|
trusted library allocation
|
page read and write
|
||
20E4F923000
|
trusted library allocation
|
page read and write
|
||
20E44DDB000
|
heap
|
page read and write
|
||
20E4F090000
|
trusted library allocation
|
page read and write
|
||
1C5F3170000
|
heap
|
page read and write
|
||
20E59083000
|
trusted library allocation
|
page read and write
|
||
20E3F917000
|
heap
|
page read and write
|
||
22EE9BA7000
|
heap
|
page read and write
|
||
22EE8D80000
|
trusted library section
|
page readonly
|
||
873FA3E000
|
unkown
|
page readonly
|
||
20E57618000
|
trusted library allocation
|
page read and write
|
||
20E3F917000
|
heap
|
page read and write
|
||
20E5906F000
|
trusted library allocation
|
page read and write
|
||
20E51D97000
|
trusted library allocation
|
page read and write
|
||
20E4FF59000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E44DD3000
|
heap
|
page read and write
|
||
20E500A1000
|
trusted library allocation
|
page read and write
|
||
22EE95F0000
|
heap
|
page read and write
|
||
20E44DDA000
|
heap
|
page read and write
|
||
20E4F951000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E4F9B0000
|
trusted library allocation
|
page read and write
|
||
20E5942E000
|
trusted library allocation
|
page read and write
|
||
20E4AE9A000
|
trusted library allocation
|
page read and write
|
||
22EE8DE0000
|
trusted library allocation
|
page read and write
|
||
20E590EC000
|
trusted library allocation
|
page read and write
|
||
20E516BA000
|
trusted library allocation
|
page read and write
|
||
20E4E42D000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E44D95000
|
heap
|
page read and write
|
||
20E4B561000
|
heap
|
page read and write
|
||
20E4F1A5000
|
trusted library allocation
|
page read and write
|
||
1C5F2E50000
|
heap
|
page read and write
|
||
20E55EBD000
|
trusted library allocation
|
page read and write
|
||
20E44D97000
|
heap
|
page read and write
|
||
22EE8F12000
|
trusted library allocation
|
page read and write
|
||
20E4E927000
|
trusted library allocation
|
page read and write
|
||
22EE9673000
|
heap
|
page read and write
|
||
20E4C7EE000
|
trusted library allocation
|
page read and write
|
||
20E4B5BB000
|
heap
|
page read and write
|
||
20E55E55000
|
trusted library allocation
|
page read and write
|
||
20E5007E000
|
trusted library allocation
|
page read and write
|
||
20E4F94A000
|
trusted library allocation
|
page read and write
|
||
20E4FF6D000
|
trusted library allocation
|
page read and write
|
||
20E504F9000
|
trusted library allocation
|
page read and write
|
||
20E50093000
|
trusted library allocation
|
page read and write
|
||
20E49E66000
|
trusted library allocation
|
page read and write
|
||
B15CCBE000
|
unkown
|
page readonly
|
||
20E44DA4000
|
heap
|
page read and write
|
||
20E4FA9F000
|
trusted library allocation
|
page read and write
|
||
20E590FD000
|
trusted library allocation
|
page read and write
|
||
20E4F329000
|
trusted library allocation
|
page read and write
|
||
20E4EFCE000
|
trusted library allocation
|
page read and write
|
||
20E4F01E000
|
trusted library allocation
|
page read and write
|
||
20E5903A000
|
trusted library allocation
|
page read and write
|
||
20E57907000
|
trusted library allocation
|
page read and write
|
||
20E592A9000
|
trusted library allocation
|
page read and write
|
||
20E4DE5E000
|
trusted library allocation
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
16B21F9D000
|
heap
|
page read and write
|
||
20E59735000
|
heap
|
page read and write
|
||
22EE9B99000
|
heap
|
page read and write
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E44D9C000
|
heap
|
page read and write
|
||
20E58E86000
|
trusted library allocation
|
page read and write
|
||
1DAFD186000
|
heap
|
page read and write
|
||
20E5166D000
|
trusted library allocation
|
page read and write
|
||
20E51685000
|
trusted library allocation
|
page read and write
|
||
16B22100000
|
heap
|
page read and write
|
||
20E4FF7A000
|
trusted library allocation
|
page read and write
|
||
20E4979B000
|
trusted library allocation
|
page read and write
|
||
20E516BC000
|
trusted library allocation
|
page read and write
|
||
20E44D9B000
|
heap
|
page read and write
|
||
20E44DD4000
|
heap
|
page read and write
|
||
20E4EEA5000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E56600000
|
trusted library allocation
|
page read and write
|
||
873D7EB000
|
stack
|
page read and write
|
||
20E4FBEC000
|
trusted library allocation
|
page read and write
|
||
20E560B1000
|
trusted library allocation
|
page read and write
|
||
20E4E63D000
|
trusted library allocation
|
page read and write
|
||
20E5616B000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E4F1E9000
|
trusted library allocation
|
page read and write
|
||
20E4F333000
|
trusted library allocation
|
page read and write
|
||
F2509FF000
|
stack
|
page read and write
|
||
20E59075000
|
trusted library allocation
|
page read and write
|
||
20E58EE6000
|
trusted library allocation
|
page read and write
|
||
20E4B565000
|
heap
|
page read and write
|
||
20E590C2000
|
trusted library allocation
|
page read and write
|
||
20E4F7B5000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E4C027000
|
trusted library allocation
|
page read and write
|
||
20E59701000
|
heap
|
page read and write
|
||
20E56038000
|
trusted library allocation
|
page read and write
|
||
20E597C4000
|
heap
|
page read and write
|
||
1DAFD5E7000
|
trusted library allocation
|
page read and write
|
||
20E44DA2000
|
heap
|
page read and write
|
||
20E58E92000
|
trusted library allocation
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
20E4DE9E000
|
trusted library allocation
|
page read and write
|
||
20E571B8000
|
trusted library allocation
|
page read and write
|
||
20E4FE96000
|
trusted library allocation
|
page read and write
|
||
20E44D9E000
|
heap
|
page read and write
|
||
20E4E467000
|
trusted library allocation
|
page read and write
|
||
20E44D9A000
|
heap
|
page read and write
|
||
20E5766A000
|
trusted library allocation
|
page read and write
|
||
20E44D8D000
|
heap
|
page read and write
|
||
20E4FD84000
|
trusted library allocation
|
page read and write
|
||
20E4F37A000
|
trusted library allocation
|
page read and write
|
||
23EFEF07000
|
trusted library allocation
|
page read and write
|
||
20E4EDC3000
|
trusted library allocation
|
page read and write
|
||
20E4F428000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E55F26000
|
trusted library allocation
|
page read and write
|
||
20E44E02000
|
heap
|
page read and write
|
||
22EE8FCE000
|
trusted library allocation
|
page read and write
|
||
20E55FF2000
|
trusted library allocation
|
page read and write
|
||
20E44E24000
|
heap
|
page read and write
|
||
20E4FF8E000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E560C8000
|
trusted library allocation
|
page read and write
|
||
20E5766A000
|
trusted library allocation
|
page read and write
|
||
20E44DA7000
|
heap
|
page read and write
|
||
20E58FC9000
|
trusted library allocation
|
page read and write
|
||
20E516DC000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E44E1D000
|
heap
|
page read and write
|
||
20E4DB10000
|
trusted library allocation
|
page read and write
|
||
20E3F927000
|
heap
|
page read and write
|
||
20E5061B000
|
trusted library allocation
|
page read and write
|
||
20E44E0B000
|
heap
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
20E4B579000
|
heap
|
page read and write
|
||
20E57986000
|
trusted library allocation
|
page read and write
|
||
20E4F95E000
|
trusted library allocation
|
page read and write
|
||
20E4EEFD000
|
trusted library allocation
|
page read and write
|
||
20E51342000
|
trusted library allocation
|
page read and write
|
||
1458000
|
heap
|
page read and write
|
||
20E4F0DA000
|
trusted library allocation
|
page read and write
|
||
20E50780000
|
trusted library allocation
|
page read and write
|
||
20E44D9F000
|
heap
|
page read and write
|
||
20E4DEB0000
|
trusted library allocation
|
page read and write
|
||
20E44D8E000
|
heap
|
page read and write
|
||
20E4F7DF000
|
trusted library allocation
|
page read and write
|
||
20E44DFE000
|
heap
|
page read and write
|
||
20E4E4D1000
|
trusted library allocation
|
page read and write
|
||
3F20000
|
trusted library allocation
|
page read and write
|
||
20E44E0F000
|
heap
|
page read and write
|
||
20E4DEC2000
|
trusted library allocation
|
page read and write
|
||
1DAFD579000
|
trusted library allocation
|
page read and write
|
||
20E58EE7000
|
trusted library allocation
|
page read and write
|
||
20E49D71000
|
trusted library allocation
|
page read and write
|
||
20E44DAD000
|
heap
|
page read and write
|
||
20E44E08000
|
heap
|
page read and write
|
||
20E4F9DF000
|
trusted library allocation
|
page read and write
|
||
20E44DF5000
|
heap
|
page read and write
|
||
20E44E15000
|
heap
|
page read and write
|
||
20E516BA000
|
trusted library allocation
|
page read and write
|
||
22EE9B84000
|
heap
|
page read and write
|
||
20E4F64B000
|
trusted library allocation
|
page read and write
|
||
B15FFFE000
|
unkown
|
page readonly
|
||
20E44DA6000
|
heap
|
page read and write
|
||
20E5614A000
|
trusted library allocation
|
page read and write
|
||
22EE9706000
|
trusted library allocation
|
page read and write
|
||
20E4EDE1000
|
trusted library allocation
|
page read and write
|
There are 4100 hidden memdumps, click here to show them.