Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_583749b1-4fef-47bf-b3b8-0068aafd6966.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_583749b1-4fef-47bf-b3b8-0068aafd6966.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 22422 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 22422 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2196 -parentBuildID 20230927232528 -prefsHandle 2132
-prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {e43e39a0-cc16-484a-9b18-44609e3e176e} 5612 "\\.\pipe\gecko-crash-server-pipe.5612" 224ca56e310 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=948 -parentBuildID 20230927232528 -prefsHandle 4104
-prefMapHandle 4180 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {28e99635-fe3b-45d9-8cee-0516a7b7dc3a}
5612 "\\.\pipe\gecko-crash-server-pipe.5612" 224ca57d810 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3948 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 4532 -prefMapHandle 4540 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {e63adc83-332e-472f-8367-08683521a553} 5612 "\\.\pipe\gecko-crash-server-pipe.5612" 224dc47e510 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema.
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warning
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2020-12/schema/=
|
unknown
|
||
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://youtube.com/account?=https://accounts.google.co
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.0/
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.1/
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://relay.firefox.com/api/v1/
|
unknown
|
||
http://json-schema.org/draft-07/schema#-
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.251.35
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
twitter.com
|
104.244.42.193
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.193.91
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.186.46
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
172.217.18.110
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.193.140
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
151.101.193.91
|
services.addons.mozilla.org
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 1 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
224E24AB000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
224E27D3000
|
trusted library allocation
|
page read and write
|
||
224E3800000
|
trusted library allocation
|
page read and write
|
||
224DC390000
|
trusted library allocation
|
page read and write
|
||
224DBB5D000
|
trusted library allocation
|
page read and write
|
||
224E3ACF000
|
trusted library allocation
|
page read and write
|
||
3B90000
|
heap
|
page read and write
|
||
224E4D54000
|
trusted library allocation
|
page read and write
|
||
224E3746000
|
trusted library allocation
|
page read and write
|
||
20A2405F000
|
unclassified section
|
page read and write
|
||
224E26C8000
|
trusted library allocation
|
page read and write
|
||
224D73C7000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DC5D0000
|
trusted library allocation
|
page read and write
|
||
224DB8BF000
|
trusted library allocation
|
page read and write
|
||
1BA07119000
|
trusted library allocation
|
page read and write
|
||
224DAAF2000
|
trusted library allocation
|
page read and write
|
||
224DA5B4000
|
trusted library allocation
|
page read and write
|
||
2BBC3386000
|
trusted library allocation
|
page read and write
|
||
224DB945000
|
trusted library allocation
|
page read and write
|
||
224DB627000
|
trusted library allocation
|
page read and write
|
||
224E4DDD000
|
trusted library allocation
|
page read and write
|
||
224E2525000
|
trusted library allocation
|
page read and write
|
||
224DBB45000
|
trusted library allocation
|
page read and write
|
||
224DB647000
|
trusted library allocation
|
page read and write
|
||
224DA75B000
|
trusted library allocation
|
page read and write
|
||
224E29A0000
|
trusted library allocation
|
page read and write
|
||
224DB7D4000
|
trusted library allocation
|
page read and write
|
||
224E5B6A000
|
trusted library allocation
|
page read and write
|
||
224DDD87000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224E3AC9000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DA285000
|
heap
|
page read and write
|
||
224E23EC000
|
trusted library allocation
|
page read and write
|
||
224DBA51000
|
trusted library allocation
|
page read and write
|
||
224DAAFA000
|
trusted library allocation
|
page read and write
|
||
1FAB6A90000
|
heap
|
page read and write
|
||
224E24AF000
|
trusted library allocation
|
page read and write
|
||
224DC320000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224E2E6F000
|
trusted library allocation
|
page read and write
|
||
224DA034000
|
trusted library allocation
|
page read and write
|
||
224DC38F000
|
trusted library allocation
|
page read and write
|
||
224DBBFD000
|
trusted library allocation
|
page read and write
|
||
224E26B1000
|
trusted library allocation
|
page read and write
|
||
224E21C8000
|
trusted library allocation
|
page read and write
|
||
224D1302000
|
heap
|
page read and write
|
||
224DB8AC000
|
trusted library allocation
|
page read and write
|
||
224E6B7E000
|
heap
|
page read and write
|
||
224E3A5E000
|
trusted library allocation
|
page read and write
|
||
2BBC3F29000
|
heap
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224E3A34000
|
trusted library allocation
|
page read and write
|
||
224E4DEC000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
14578C00000
|
trusted library allocation
|
page read and write
|
||
224DA58A000
|
trusted library allocation
|
page read and write
|
||
1FAB86B0000
|
heap
|
page read and write
|
||
20A246B7000
|
trusted library allocation
|
page read and write
|
||
224E2989000
|
trusted library allocation
|
page read and write
|
||
224DC943000
|
trusted library allocation
|
page read and write
|
||
224E2644000
|
trusted library allocation
|
page read and write
|
||
5F9DC3E000
|
stack
|
page read and write
|
||
224E2985000
|
trusted library allocation
|
page read and write
|
||
224DA295000
|
heap
|
page read and write
|
||
224E244A000
|
trusted library allocation
|
page read and write
|
||
2BBC3E06000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
224DA2D4000
|
heap
|
page read and write
|
||
224E2631000
|
trusted library allocation
|
page read and write
|
||
20A24050000
|
unclassified section
|
page read and write
|
||
2BBC392C000
|
heap
|
page read and write
|
||
224DBFD4000
|
trusted library allocation
|
page read and write
|
||
224DB6BF000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224E2EE3000
|
trusted library allocation
|
page read and write
|
||
224DC93E000
|
trusted library allocation
|
page read and write
|
||
2BBC39B0000
|
heap
|
page read and write
|
||
224D12D2000
|
heap
|
page read and write
|
||
224E263E000
|
trusted library allocation
|
page read and write
|
||
224DDDB0000
|
trusted library allocation
|
page read and write
|
||
224D73D3000
|
trusted library allocation
|
page read and write
|
||
224E3720000
|
trusted library allocation
|
page read and write
|
||
224DB457000
|
trusted library allocation
|
page read and write
|
||
224DA544000
|
trusted library allocation
|
page read and write
|
||
224D6326000
|
trusted library allocation
|
page read and write
|
||
224D9D5A000
|
trusted library allocation
|
page read and write
|
||
224DBFE4000
|
trusted library allocation
|
page read and write
|
||
224E6478000
|
trusted library allocation
|
page read and write
|
||
1FAB6ADD000
|
heap
|
page read and write
|
||
B61000
|
unkown
|
page execute read
|
||
224DBB56000
|
trusted library allocation
|
page read and write
|
||
224DA2D5000
|
heap
|
page read and write
|
||
224DBFB9000
|
trusted library allocation
|
page read and write
|
||
224DB942000
|
trusted library allocation
|
page read and write
|
||
224E3A97000
|
trusted library allocation
|
page read and write
|
||
224DAA88000
|
trusted library allocation
|
page read and write
|
||
224DB599000
|
trusted library allocation
|
page read and write
|
||
224E2371000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E298B000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
224DB986000
|
trusted library allocation
|
page read and write
|
||
224DC581000
|
trusted library allocation
|
page read and write
|
||
224E3AF6000
|
trusted library allocation
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
224DB31B000
|
trusted library allocation
|
page read and write
|
||
224D12CF000
|
heap
|
page read and write
|
||
224DA015000
|
trusted library allocation
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
224E264A000
|
trusted library allocation
|
page read and write
|
||
1FAB86A0000
|
heap
|
page read and write
|
||
224D7EA0000
|
trusted library allocation
|
page read and write
|
||
224DB96D000
|
trusted library allocation
|
page read and write
|
||
224E5141000
|
trusted library allocation
|
page read and write
|
||
224DA0C3000
|
trusted library allocation
|
page read and write
|
||
224E525D000
|
trusted library allocation
|
page read and write
|
||
224DA0C3000
|
trusted library allocation
|
page read and write
|
||
224DCDAE000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224D7382000
|
trusted library allocation
|
page read and write
|
||
2BBC33BC000
|
trusted library allocation
|
page read and write
|
||
224E2718000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224E290F000
|
trusted library allocation
|
page read and write
|
||
224E3A1A000
|
trusted library allocation
|
page read and write
|
||
224DA0AB000
|
trusted library allocation
|
page read and write
|
||
224DBD41000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
B7FB92E000
|
stack
|
page read and write
|
||
224E524A000
|
trusted library allocation
|
page read and write
|
||
224E6718000
|
trusted library allocation
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
224DCDFE000
|
trusted library allocation
|
page read and write
|
||
224E4E82000
|
trusted library allocation
|
page read and write
|
||
224DD19D000
|
trusted library allocation
|
page read and write
|
||
224E2611000
|
trusted library allocation
|
page read and write
|
||
224DA7BB000
|
trusted library allocation
|
page read and write
|
||
224DC929000
|
trusted library allocation
|
page read and write
|
||
224DC87E000
|
trusted library allocation
|
page read and write
|
||
224DBFE4000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
2BBC3F6A000
|
heap
|
page read and write
|
||
224E66FC000
|
trusted library allocation
|
page read and write
|
||
2BBC392F000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
224DB8D9000
|
trusted library allocation
|
page read and write
|
||
224E26F4000
|
trusted library allocation
|
page read and write
|
||
2BBC3F23000
|
heap
|
page read and write
|
||
224E22E3000
|
trusted library allocation
|
page read and write
|
||
224DB6BF000
|
trusted library allocation
|
page read and write
|
||
224E372C000
|
trusted library allocation
|
page read and write
|
||
224DB934000
|
trusted library allocation
|
page read and write
|
||
224D12C8000
|
heap
|
page read and write
|
||
224E3AF3000
|
trusted library allocation
|
page read and write
|
||
224DA7BE000
|
trusted library allocation
|
page read and write
|
||
224DBBDF000
|
trusted library allocation
|
page read and write
|
||
224E22BB000
|
trusted library allocation
|
page read and write
|
||
224D7EC2000
|
trusted library allocation
|
page read and write
|
||
3C7BFC000
|
stack
|
page read and write
|
||
224DBA87000
|
trusted library allocation
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224E2473000
|
trusted library allocation
|
page read and write
|
||
224DA68C000
|
trusted library allocation
|
page read and write
|
||
224DBDF8000
|
trusted library allocation
|
page read and write
|
||
224DB64A000
|
trusted library allocation
|
page read and write
|
||
224DCD9A000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224E22F5000
|
trusted library allocation
|
page read and write
|
||
224E3A1E000
|
trusted library allocation
|
page read and write
|
||
224DB322000
|
trusted library allocation
|
page read and write
|
||
224D9DF6000
|
trusted library allocation
|
page read and write
|
||
224DC8AC000
|
trusted library allocation
|
page read and write
|
||
224DBDCB000
|
trusted library allocation
|
page read and write
|
||
224E2922000
|
trusted library allocation
|
page read and write
|
||
224DBDE9000
|
trusted library allocation
|
page read and write
|
||
224E2989000
|
trusted library allocation
|
page read and write
|
||
224DA2E4000
|
heap
|
page read and write
|
||
2BBC38B0000
|
unkown
|
page execute read
|
||
224D12A6000
|
heap
|
page read and write
|
||
224DC484000
|
trusted library allocation
|
page read and write
|
||
224DB9AC000
|
trusted library allocation
|
page read and write
|
||
224E2197000
|
trusted library allocation
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
E6D983E000
|
unkown
|
page readonly
|
||
224D12F5000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
2BBC331A000
|
trusted library allocation
|
page read and write
|
||
224DA0FB000
|
trusted library allocation
|
page read and write
|
||
224DB3BB000
|
trusted library allocation
|
page read and write
|
||
224DB844000
|
trusted library allocation
|
page read and write
|
||
B7FE47E000
|
stack
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
2BBC39C1000
|
heap
|
page read and write
|
||
224DB77D000
|
trusted library allocation
|
page read and write
|
||
2BBC3930000
|
heap
|
page read and write
|
||
224E3AF3000
|
trusted library allocation
|
page read and write
|
||
224DD107000
|
trusted library allocation
|
page read and write
|
||
1FAB6A50000
|
heap
|
page read and write
|
||
224DDCF8000
|
trusted library allocation
|
page read and write
|
||
224DCCCC000
|
trusted library allocation
|
page read and write
|
||
20A2406A000
|
heap
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
1FAB6AFA000
|
heap
|
page read and write
|
||
2BBC39B8000
|
heap
|
page read and write
|
||
224DBDF0000
|
trusted library allocation
|
page read and write
|
||
224E525D000
|
trusted library allocation
|
page read and write
|
||
224DBDF8000
|
trusted library allocation
|
page read and write
|
||
224E296F000
|
trusted library allocation
|
page read and write
|
||
224DDCF4000
|
trusted library allocation
|
page read and write
|
||
20A24666000
|
trusted library allocation
|
page read and write
|
||
224E2375000
|
trusted library allocation
|
page read and write
|
||
224DC3E5000
|
trusted library allocation
|
page read and write
|
||
1FAB6AE2000
|
heap
|
page read and write
|
||
224D12C5000
|
heap
|
page read and write
|
||
20A24411000
|
trusted library allocation
|
page read and write
|
||
224E4DCD000
|
trusted library allocation
|
page read and write
|
||
224DA0EB000
|
trusted library allocation
|
page read and write
|
||
224E4C42000
|
trusted library allocation
|
page read and write
|
||
224DA246000
|
heap
|
page read and write
|
||
224DC3F1000
|
trusted library allocation
|
page read and write
|
||
224DB7B8000
|
trusted library allocation
|
page read and write
|
||
224D7EB6000
|
trusted library allocation
|
page read and write
|
||
224DBDE9000
|
trusted library allocation
|
page read and write
|
||
224DB632000
|
trusted library allocation
|
page read and write
|
||
224E5296000
|
trusted library allocation
|
page read and write
|
||
224D12C8000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224DBC75000
|
trusted library allocation
|
page read and write
|
||
224E4ECE000
|
trusted library allocation
|
page read and write
|
||
224E27BF000
|
trusted library allocation
|
page read and write
|
||
20A246A7000
|
trusted library allocation
|
page read and write
|
||
224DBCFC000
|
trusted library allocation
|
page read and write
|
||
224D12B1000
|
heap
|
page read and write
|
||
224D876B000
|
trusted library allocation
|
page read and write
|
||
224D737D000
|
trusted library allocation
|
page read and write
|
||
224DBDA4000
|
trusted library allocation
|
page read and write
|
||
224D7EC7000
|
trusted library allocation
|
page read and write
|
||
224E26E0000
|
trusted library allocation
|
page read and write
|
||
224E2314000
|
trusted library allocation
|
page read and write
|
||
224E3A4E000
|
trusted library allocation
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
224DC862000
|
trusted library allocation
|
page read and write
|
||
224E293F000
|
trusted library allocation
|
page read and write
|
||
224E228D000
|
trusted library allocation
|
page read and write
|
||
224DBD53000
|
trusted library allocation
|
page read and write
|
||
224DB5E7000
|
trusted library allocation
|
page read and write
|
||
224E516D000
|
trusted library allocation
|
page read and write
|
||
224DC564000
|
trusted library allocation
|
page read and write
|
||
20A2466A000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224DBFF0000
|
trusted library allocation
|
page read and write
|
||
224E2565000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224E27EC000
|
trusted library allocation
|
page read and write
|
||
224DBBDF000
|
trusted library allocation
|
page read and write
|
||
224DBD4A000
|
trusted library allocation
|
page read and write
|
||
224DB925000
|
trusted library allocation
|
page read and write
|
||
224DC560000
|
trusted library allocation
|
page read and write
|
||
224E3A28000
|
trusted library allocation
|
page read and write
|
||
224DA2C6000
|
heap
|
page read and write
|
||
224E4102000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DD104000
|
trusted library allocation
|
page read and write
|
||
224DDD0B000
|
trusted library allocation
|
page read and write
|
||
224D7EDE000
|
trusted library allocation
|
page read and write
|
||
224DB787000
|
trusted library allocation
|
page read and write
|
||
224E2231000
|
trusted library allocation
|
page read and write
|
||
224DA27E000
|
heap
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224E25CA000
|
trusted library allocation
|
page read and write
|
||
224E3A23000
|
trusted library allocation
|
page read and write
|
||
224DDDF6000
|
trusted library allocation
|
page read and write
|
||
224DA2E9000
|
heap
|
page read and write
|
||
224DCDE3000
|
trusted library allocation
|
page read and write
|
||
224D1308000
|
heap
|
page read and write
|
||
224DA295000
|
heap
|
page read and write
|
||
224DBBFA000
|
trusted library allocation
|
page read and write
|
||
224DC486000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
224DA282000
|
heap
|
page read and write
|
||
224E2DFA000
|
trusted library allocation
|
page read and write
|
||
224DC456000
|
trusted library allocation
|
page read and write
|
||
FFD06603000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224DDD87000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E22D7000
|
trusted library allocation
|
page read and write
|
||
224DBA7E000
|
trusted library allocation
|
page read and write
|
||
224DB7D8000
|
trusted library allocation
|
page read and write
|
||
224D12C7000
|
heap
|
page read and write
|
||
224E2660000
|
trusted library allocation
|
page read and write
|
||
224DBD4A000
|
trusted library allocation
|
page read and write
|
||
1BA06F6A000
|
heap
|
page read and write
|
||
2BBC3F3B000
|
heap
|
page read and write
|
||
224E23D6000
|
trusted library allocation
|
page read and write
|
||
224E243C000
|
trusted library allocation
|
page read and write
|
||
224E22D7000
|
trusted library allocation
|
page read and write
|
||
224E27EA000
|
trusted library allocation
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
224E265C000
|
trusted library allocation
|
page read and write
|
||
224E264A000
|
trusted library allocation
|
page read and write
|
||
224E2473000
|
trusted library allocation
|
page read and write
|
||
224DBDC6000
|
trusted library allocation
|
page read and write
|
||
224DA65D000
|
trusted library allocation
|
page read and write
|
||
224DB6B4000
|
trusted library allocation
|
page read and write
|
||
224DB77C000
|
trusted library allocation
|
page read and write
|
||
224DC564000
|
trusted library allocation
|
page read and write
|
||
5F9C23E000
|
unkown
|
page readonly
|
||
224DB723000
|
trusted library allocation
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
224DBDCB000
|
trusted library allocation
|
page read and write
|
||
224E3A3A000
|
trusted library allocation
|
page read and write
|
||
224DBF1F000
|
trusted library allocation
|
page read and write
|
||
224DA0A8000
|
trusted library allocation
|
page read and write
|
||
224E67FC000
|
trusted library allocation
|
page read and write
|
||
224D12C6000
|
heap
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224E52CC000
|
trusted library allocation
|
page read and write
|
||
224D87B3000
|
trusted library allocation
|
page read and write
|
||
224DCD8B000
|
trusted library allocation
|
page read and write
|
||
224D1302000
|
heap
|
page read and write
|
||
99A000
|
stack
|
page read and write
|
||
224E45AC000
|
trusted library allocation
|
page read and write
|
||
224E2646000
|
trusted library allocation
|
page read and write
|
||
224DBDCB000
|
trusted library allocation
|
page read and write
|
||
E6D75FE000
|
stack
|
page read and write
|
||
224DA2E9000
|
heap
|
page read and write
|
||
224DB6F9000
|
trusted library allocation
|
page read and write
|
||
224DBDB4000
|
trusted library allocation
|
page read and write
|
||
224E5265000
|
trusted library allocation
|
page read and write
|
||
224DBBF4000
|
trusted library allocation
|
page read and write
|
||
224DC885000
|
trusted library allocation
|
page read and write
|
||
224DB3ED000
|
trusted library allocation
|
page read and write
|
||
224DDC47000
|
trusted library allocation
|
page read and write
|
||
224DB66F000
|
trusted library allocation
|
page read and write
|
||
224E23FB000
|
trusted library allocation
|
page read and write
|
||
1BA06D90000
|
heap
|
page read and write
|
||
224D12B1000
|
heap
|
page read and write
|
||
224DA661000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
224E273D000
|
trusted library allocation
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
1FAB6D75000
|
heap
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224DBBF4000
|
trusted library allocation
|
page read and write
|
||
224DC547000
|
trusted library allocation
|
page read and write
|
||
224DB5C3000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224DBB64000
|
trusted library allocation
|
page read and write
|
||
224D12C7000
|
heap
|
page read and write
|
||
224E4BE7000
|
trusted library allocation
|
page read and write
|
||
224DB684000
|
trusted library allocation
|
page read and write
|
||
224DD19F000
|
trusted library allocation
|
page read and write
|
||
224E4FF9000
|
trusted library allocation
|
page read and write
|
||
224E5296000
|
trusted library allocation
|
page read and write
|
||
224E4528000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224D130D000
|
heap
|
page read and write
|
||
224D6313000
|
trusted library allocation
|
page read and write
|
||
224DCAF1000
|
trusted library allocation
|
page read and write
|
||
224DBFDE000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DC463000
|
trusted library allocation
|
page read and write
|
||
224DB484000
|
trusted library allocation
|
page read and write
|
||
224D12C8000
|
heap
|
page read and write
|
||
224DBFCB000
|
trusted library allocation
|
page read and write
|
||
224E216C000
|
trusted library allocation
|
page read and write
|
||
224DB616000
|
trusted library allocation
|
page read and write
|
||
224E2688000
|
trusted library allocation
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
224DA2E5000
|
heap
|
page read and write
|
||
20A24190000
|
unclassified section
|
page readonly
|
||
224D7396000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224DC80C000
|
trusted library allocation
|
page read and write
|
||
224E4DF5000
|
trusted library allocation
|
page read and write
|
||
224E29E3000
|
trusted library allocation
|
page read and write
|
||
224DB95F000
|
trusted library allocation
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224DBBDB000
|
trusted library allocation
|
page read and write
|
||
224D62FE000
|
trusted library allocation
|
page read and write
|
||
224D7E6F000
|
trusted library allocation
|
page read and write
|
||
224DDDBE000
|
trusted library allocation
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
224DC8D4000
|
trusted library allocation
|
page read and write
|
||
224DAAE0000
|
trusted library allocation
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224DB545000
|
trusted library allocation
|
page read and write
|
||
224E2375000
|
trusted library allocation
|
page read and write
|
||
224DA0A8000
|
trusted library allocation
|
page read and write
|
||
224DBCEE000
|
trusted library allocation
|
page read and write
|
||
224DC9C0000
|
trusted library allocation
|
page read and write
|
||
20A2467E000
|
trusted library allocation
|
page read and write
|
||
224DDCDC000
|
trusted library allocation
|
page read and write
|
||
20A24170000
|
heap
|
page read and write
|
||
224DB9A1000
|
trusted library allocation
|
page read and write
|
||
224E251A000
|
trusted library allocation
|
page read and write
|
||
224E22BB000
|
trusted library allocation
|
page read and write
|
||
224E26CC000
|
trusted library allocation
|
page read and write
|
||
224DC381000
|
trusted library allocation
|
page read and write
|
||
224DC579000
|
trusted library allocation
|
page read and write
|
||
224DD139000
|
trusted library allocation
|
page read and write
|
||
224DA2D5000
|
heap
|
page read and write
|
||
224DB7E6000
|
trusted library allocation
|
page read and write
|
||
224DB86A000
|
trusted library allocation
|
page read and write
|
||
224DBBEE000
|
trusted library allocation
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224DB962000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224E253D000
|
trusted library allocation
|
page read and write
|
||
224E23FB000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224E23CF000
|
trusted library allocation
|
page read and write
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
20A24415000
|
trusted library allocation
|
page read and write
|
||
224D1309000
|
heap
|
page read and write
|
||
224DBD17000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
2BBC39B8000
|
heap
|
page read and write
|
||
224D7366000
|
trusted library allocation
|
page read and write
|
||
224D12A7000
|
heap
|
page read and write
|
||
224E450F000
|
trusted library allocation
|
page read and write
|
||
224DBFD4000
|
trusted library allocation
|
page read and write
|
||
224E293C000
|
trusted library allocation
|
page read and write
|
||
224DBDBB000
|
trusted library allocation
|
page read and write
|
||
224D7EE6000
|
trusted library allocation
|
page read and write
|
||
224D12B0000
|
heap
|
page read and write
|
||
224E4C27000
|
trusted library allocation
|
page read and write
|
||
224D63B7000
|
trusted library allocation
|
page read and write
|
||
224DA282000
|
heap
|
page read and write
|
||
224E4D34000
|
trusted library allocation
|
page read and write
|
||
2BBC3989000
|
heap
|
page read and write
|
||
224DB665000
|
trusted library allocation
|
page read and write
|
||
224D5CB3000
|
trusted library allocation
|
page read and write
|
||
224DAADC000
|
trusted library allocation
|
page read and write
|
||
224DB731000
|
trusted library allocation
|
page read and write
|
||
224DB646000
|
trusted library allocation
|
page read and write
|
||
1BA06DD0000
|
heap
|
page read and write
|
||
224DDDB0000
|
trusted library allocation
|
page read and write
|
||
224DBBA7000
|
trusted library allocation
|
page read and write
|
||
224D6326000
|
trusted library allocation
|
page read and write
|
||
224E4E94000
|
trusted library allocation
|
page read and write
|
||
224DB676000
|
trusted library allocation
|
page read and write
|
||
224E2475000
|
trusted library allocation
|
page read and write
|
||
224DA258000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224E23C4000
|
trusted library allocation
|
page read and write
|
||
224E22E0000
|
trusted library allocation
|
page read and write
|
||
224E2375000
|
trusted library allocation
|
page read and write
|
||
224E3A37000
|
trusted library allocation
|
page read and write
|
||
224DDDA6000
|
trusted library allocation
|
page read and write
|
||
224DB7A5000
|
trusted library allocation
|
page read and write
|
||
224E3A19000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
2BBC38A0000
|
trusted library allocation
|
page read and write
|
||
224D7E1C000
|
trusted library allocation
|
page read and write
|
||
224E3AC9000
|
trusted library allocation
|
page read and write
|
||
224D7EE2000
|
trusted library allocation
|
page read and write
|
||
224DB4BC000
|
trusted library allocation
|
page read and write
|
||
224DCDC0000
|
trusted library allocation
|
page read and write
|
||
224DBF27000
|
trusted library allocation
|
page read and write
|
||
224E6412000
|
trusted library allocation
|
page read and write
|
||
224E4FCA000
|
trusted library allocation
|
page read and write
|
||
224DB780000
|
trusted library allocation
|
page read and write
|
||
224DBFDC000
|
trusted library allocation
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
5F9A9D8000
|
stack
|
page read and write
|
||
224D9D68000
|
trusted library allocation
|
page read and write
|
||
224E22D7000
|
trusted library allocation
|
page read and write
|
||
224E2EE1000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
224DA2F2000
|
heap
|
page read and write
|
||
224DB5C3000
|
trusted library allocation
|
page read and write
|
||
224DB31B000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DBFDE000
|
trusted library allocation
|
page read and write
|
||
224DB49B000
|
trusted library allocation
|
page read and write
|
||
224E2370000
|
trusted library allocation
|
page read and write
|
||
224D7E6F000
|
trusted library allocation
|
page read and write
|
||
1BA07500000
|
trusted library allocation
|
page read and write
|
||
224DDC13000
|
trusted library allocation
|
page read and write
|
||
224E37B6000
|
trusted library allocation
|
page read and write
|
||
224E23B7000
|
trusted library allocation
|
page read and write
|
||
224DB986000
|
trusted library allocation
|
page read and write
|
||
224D7E8D000
|
trusted library allocation
|
page read and write
|
||
224E37CD000
|
trusted library allocation
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224E2443000
|
trusted library allocation
|
page read and write
|
||
224DC8CD000
|
trusted library allocation
|
page read and write
|
||
224E2569000
|
trusted library allocation
|
page read and write
|
||
224E263A000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224E227F000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224DB53D000
|
trusted library allocation
|
page read and write
|
||
224D12F7000
|
heap
|
page read and write
|
||
224E64AA000
|
trusted library allocation
|
page read and write
|
||
224DA2CA000
|
heap
|
page read and write
|
||
2BBC39B8000
|
heap
|
page read and write
|
||
2BBC3F58000
|
heap
|
page read and write
|
||
224DA25F000
|
heap
|
page read and write
|
||
20A2469E000
|
trusted library allocation
|
page read and write
|
||
224DDC37000
|
trusted library allocation
|
page read and write
|
||
224DA681000
|
trusted library allocation
|
page read and write
|
||
224DBDD6000
|
trusted library allocation
|
page read and write
|
||
224DDCFB000
|
trusted library allocation
|
page read and write
|
||
224E4D61000
|
trusted library allocation
|
page read and write
|
||
224D73E2000
|
trusted library allocation
|
page read and write
|
||
2BBC39E9000
|
unkown
|
page execute read
|
||
224DA0A8000
|
trusted library allocation
|
page read and write
|
||
2BBC3939000
|
heap
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
224DBDE4000
|
trusted library allocation
|
page read and write
|
||
224E525B000
|
trusted library allocation
|
page read and write
|
||
224DBC19000
|
trusted library allocation
|
page read and write
|
||
224D7382000
|
trusted library allocation
|
page read and write
|
||
224E26E2000
|
trusted library allocation
|
page read and write
|
||
224DA68A000
|
trusted library allocation
|
page read and write
|
||
1BA07000000
|
trusted library allocation
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
3CBBC6424000
|
trusted library allocation
|
page read and write
|
||
224E4DF5000
|
trusted library allocation
|
page read and write
|
||
224E3A16000
|
trusted library allocation
|
page read and write
|
||
224DC3F3000
|
trusted library allocation
|
page read and write
|
||
331B2DB1000
|
trusted library allocation
|
page execute read
|
||
224DC865000
|
trusted library allocation
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224D12DB000
|
heap
|
page read and write
|
||
224D12EE000
|
heap
|
page read and write
|
||
224DDD30000
|
trusted library allocation
|
page read and write
|
||
224DC862000
|
trusted library allocation
|
page read and write
|
||
2BBC39C1000
|
heap
|
page read and write
|
||
2BBC391D000
|
heap
|
page read and write
|
||
224DCDD6000
|
trusted library allocation
|
page read and write
|
||
224E379F000
|
trusted library allocation
|
page read and write
|
||
224DDDB5000
|
trusted library allocation
|
page read and write
|
||
224DBD27000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DA747000
|
trusted library allocation
|
page read and write
|
||
224DB593000
|
trusted library allocation
|
page read and write
|
||
2BBC392C000
|
heap
|
page read and write
|
||
224DC32C000
|
trusted library allocation
|
page read and write
|
||
224DA28E000
|
heap
|
page read and write
|
||
224DB5ED000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224DD115000
|
trusted library allocation
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
224DC36F000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DC557000
|
trusted library allocation
|
page read and write
|
||
224DA023000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224E64AA000
|
trusted library allocation
|
page read and write
|
||
224E25D7000
|
trusted library allocation
|
page read and write
|
||
224E2981000
|
trusted library allocation
|
page read and write
|
||
224DCDFA000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224DB9AC000
|
trusted library allocation
|
page read and write
|
||
224DC581000
|
trusted library allocation
|
page read and write
|
||
224E27FD000
|
trusted library allocation
|
page read and write
|
||
224D131B000
|
heap
|
page read and write
|
||
224E52AD000
|
trusted library allocation
|
page read and write
|
||
224DC7AC000
|
trusted library allocation
|
page read and write
|
||
224E6824000
|
trusted library allocation
|
page read and write
|
||
224D12F7000
|
heap
|
page read and write
|
||
224DBBDD000
|
trusted library allocation
|
page read and write
|
||
1BA07149000
|
trusted library allocation
|
page read and write
|
||
224DBC07000
|
trusted library allocation
|
page read and write
|
||
224DB8D2000
|
trusted library allocation
|
page read and write
|
||
224E264F000
|
trusted library allocation
|
page read and write
|
||
224DB7B8000
|
trusted library allocation
|
page read and write
|
||
1BA07100000
|
trusted library allocation
|
page read and write
|
||
224D1308000
|
heap
|
page read and write
|
||
224DBC16000
|
trusted library allocation
|
page read and write
|
||
224E23EA000
|
trusted library allocation
|
page read and write
|
||
224DC3F1000
|
trusted library allocation
|
page read and write
|
||
224E2430000
|
trusted library allocation
|
page read and write
|
||
224E4DCD000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
2BBC3930000
|
heap
|
page read and write
|
||
2BBC3F58000
|
heap
|
page read and write
|
||
2BBC395D000
|
heap
|
page read and write
|
||
224DB78F000
|
trusted library allocation
|
page read and write
|
||
224E25FC000
|
trusted library allocation
|
page read and write
|
||
224DB58D000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E6B5B000
|
heap
|
page read and write
|
||
224DC4AE000
|
trusted library allocation
|
page read and write
|
||
224DDCA9000
|
trusted library allocation
|
page read and write
|
||
224D7EDE000
|
trusted library allocation
|
page read and write
|
||
224DC806000
|
trusted library allocation
|
page read and write
|
||
224DCDF0000
|
trusted library allocation
|
page read and write
|
||
224E5024000
|
trusted library allocation
|
page read and write
|
||
224DA686000
|
trusted library allocation
|
page read and write
|
||
224D7EB8000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E2647000
|
trusted library allocation
|
page read and write
|
||
224D12DB000
|
heap
|
page read and write
|
||
224D63D2000
|
trusted library allocation
|
page read and write
|
||
224DBB12000
|
trusted library allocation
|
page read and write
|
||
224E29EC000
|
trusted library allocation
|
page read and write
|
||
224E2322000
|
trusted library allocation
|
page read and write
|
||
331B2D1C000
|
trusted library allocation
|
page execute read
|
||
224DB88B000
|
trusted library allocation
|
page read and write
|
||
224D7EB8000
|
trusted library allocation
|
page read and write
|
||
224D12C4000
|
heap
|
page read and write
|
||
224E262E000
|
trusted library allocation
|
page read and write
|
||
224DA567000
|
trusted library allocation
|
page read and write
|
||
224D7386000
|
trusted library allocation
|
page read and write
|
||
224DCCF0000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224DA275000
|
heap
|
page read and write
|
||
224E3A28000
|
trusted library allocation
|
page read and write
|
||
224DB524000
|
trusted library allocation
|
page read and write
|
||
224DB3A6000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
224DA64C000
|
trusted library allocation
|
page read and write
|
||
224E6B45000
|
heap
|
page read and write
|
||
224E299E000
|
trusted library allocation
|
page read and write
|
||
224DC311000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224D12F8000
|
heap
|
page read and write
|
||
224DBD32000
|
trusted library allocation
|
page read and write
|
||
224E26E0000
|
trusted library allocation
|
page read and write
|
||
224DB659000
|
trusted library allocation
|
page read and write
|
||
224D6393000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224E27EC000
|
trusted library allocation
|
page read and write
|
||
224DDCBA000
|
trusted library allocation
|
page read and write
|
||
224DC3B0000
|
trusted library allocation
|
page read and write
|
||
224E37C4000
|
trusted library allocation
|
page read and write
|
||
224D6400000
|
trusted library allocation
|
page read and write
|
||
224DA739000
|
trusted library allocation
|
page read and write
|
||
224DB917000
|
trusted library allocation
|
page read and write
|
||
224DBFB9000
|
trusted library allocation
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
224E25ED000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224D7EE9000
|
trusted library allocation
|
page read and write
|
||
21183FE000
|
stack
|
page read and write
|
||
224DBBC0000
|
trusted library allocation
|
page read and write
|
||
224E26ED000
|
trusted library allocation
|
page read and write
|
||
224DBC2B000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224D12AC000
|
heap
|
page read and write
|
||
2BBC3A70000
|
heap
|
page read and write
|
||
224E2471000
|
trusted library allocation
|
page read and write
|
||
224DBAA4000
|
trusted library allocation
|
page read and write
|
||
1FAB6D40000
|
heap
|
page read and write
|
||
224E37BE000
|
trusted library allocation
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DBBCA000
|
trusted library allocation
|
page read and write
|
||
224DBFDF000
|
trusted library allocation
|
page read and write
|
||
224DA27F000
|
heap
|
page read and write
|
||
224E27E0000
|
trusted library allocation
|
page read and write
|
||
224DD2B4000
|
trusted library allocation
|
page read and write
|
||
224DA296000
|
heap
|
page read and write
|
||
224E21FB000
|
trusted library allocation
|
page read and write
|
||
224D130D000
|
heap
|
page read and write
|
||
224DA272000
|
heap
|
page read and write
|
||
1BA071B5000
|
trusted library allocation
|
page read and write
|
||
20A23F70000
|
remote allocation
|
page read and write
|
||
224E22EB000
|
trusted library allocation
|
page read and write
|
||
224DB71F000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224DB91B000
|
trusted library allocation
|
page read and write
|
||
224E298F000
|
trusted library allocation
|
page read and write
|
||
2BBC392C000
|
heap
|
page read and write
|
||
224DCCE1000
|
trusted library allocation
|
page read and write
|
||
224DB627000
|
trusted library allocation
|
page read and write
|
||
1BA07168000
|
trusted library allocation
|
page read and write
|
||
224DB653000
|
trusted library allocation
|
page read and write
|
||
224E2229000
|
trusted library allocation
|
page read and write
|
||
224DB510000
|
trusted library allocation
|
page read and write
|
||
224E6B03000
|
heap
|
page read and write
|
||
224DA282000
|
heap
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
5F9C2BB000
|
stack
|
page read and write
|
||
2BBC33AD000
|
trusted library allocation
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
224DBD32000
|
trusted library allocation
|
page read and write
|
||
2BBC39B8000
|
heap
|
page read and write
|
||
2BBC3F21000
|
heap
|
page read and write
|
||
224E3720000
|
trusted library allocation
|
page read and write
|
||
224DB633000
|
trusted library allocation
|
page read and write
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
224DA7FB000
|
trusted library allocation
|
page read and write
|
||
224E2641000
|
trusted library allocation
|
page read and write
|
||
224D876E000
|
trusted library allocation
|
page read and write
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
224DB569000
|
trusted library allocation
|
page read and write
|
||
224DB5A7000
|
trusted library allocation
|
page read and write
|
||
224D631E000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
1BA07124000
|
trusted library allocation
|
page read and write
|
||
B7FDBFE000
|
unkown
|
page readonly
|
||
224E4518000
|
trusted library allocation
|
page read and write
|
||
2319DD03000
|
trusted library allocation
|
page read and write
|
||
224DC84F000
|
trusted library allocation
|
page read and write
|
||
224DA285000
|
heap
|
page read and write
|
||
224E4CAC000
|
trusted library allocation
|
page read and write
|
||
224D7E27000
|
trusted library allocation
|
page read and write
|
||
224DDDAE000
|
trusted library allocation
|
page read and write
|
||
224D7EF1000
|
trusted library allocation
|
page read and write
|
||
224DB983000
|
trusted library allocation
|
page read and write
|
||
224DC4B2000
|
trusted library allocation
|
page read and write
|
||
224DBA72000
|
trusted library allocation
|
page read and write
|
||
2BBC3930000
|
heap
|
page read and write
|
||
224E2631000
|
trusted library allocation
|
page read and write
|
||
224DBC3F000
|
trusted library allocation
|
page read and write
|
||
224D6223000
|
trusted library allocation
|
page read and write
|
||
224E29AE000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
224D7EBE000
|
trusted library allocation
|
page read and write
|
||
224DE658000
|
trusted library allocation
|
page read and write
|
||
224DBDA4000
|
trusted library allocation
|
page read and write
|
||
224DD1BE000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224E643B000
|
trusted library allocation
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
224E4D3E000
|
trusted library allocation
|
page read and write
|
||
224DC3AF000
|
trusted library allocation
|
page read and write
|
||
224DB3A3000
|
trusted library allocation
|
page read and write
|
||
224E37D5000
|
trusted library allocation
|
page read and write
|
||
224E26D5000
|
trusted library allocation
|
page read and write
|
||
224DDD35000
|
trusted library allocation
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
224DA27F000
|
heap
|
page read and write
|
||
224DBD16000
|
trusted library allocation
|
page read and write
|
||
224DBBC0000
|
trusted library allocation
|
page read and write
|
||
224DC3E8000
|
trusted library allocation
|
page read and write
|
||
2BBC3930000
|
heap
|
page read and write
|
||
B7FF47E000
|
stack
|
page read and write
|
||
224DB6B4000
|
trusted library allocation
|
page read and write
|
||
224E223F000
|
trusted library allocation
|
page read and write
|
||
224E2529000
|
trusted library allocation
|
page read and write
|
||
224D12AC000
|
heap
|
page read and write
|
||
224DBCE9000
|
trusted library allocation
|
page read and write
|
||
224DA296000
|
heap
|
page read and write
|
||
224DBAC2000
|
trusted library allocation
|
page read and write
|
||
1FAB6A70000
|
heap
|
page read and write
|
||
224DC30B000
|
trusted library allocation
|
page read and write
|
||
224E21AF000
|
trusted library allocation
|
page read and write
|
||
224DA7DB000
|
trusted library allocation
|
page read and write
|
||
224D7E3B000
|
trusted library allocation
|
page read and write
|
||
2BBC39C1000
|
heap
|
page read and write
|
||
224DB922000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224DC370000
|
trusted library allocation
|
page read and write
|
||
224E222D000
|
trusted library allocation
|
page read and write
|
||
224DB681000
|
trusted library allocation
|
page read and write
|
||
2BBC3F59000
|
heap
|
page read and write
|
||
224E3A20000
|
trusted library allocation
|
page read and write
|
||
224DBABF000
|
trusted library allocation
|
page read and write
|
||
224DC46E000
|
trusted library allocation
|
page read and write
|
||
224DBDC6000
|
trusted library allocation
|
page read and write
|
||
224DBB58000
|
trusted library allocation
|
page read and write
|
||
224DBBEC000
|
trusted library allocation
|
page read and write
|
||
224DB87D000
|
trusted library allocation
|
page read and write
|
||
224D7396000
|
trusted library allocation
|
page read and write
|
||
224DC4CC000
|
trusted library allocation
|
page read and write
|
||
1FAB86B9000
|
heap
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
224E4EC2000
|
trusted library allocation
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
224E29A4000
|
trusted library allocation
|
page read and write
|
||
224DBBBC000
|
trusted library allocation
|
page read and write
|
||
1BA0715F000
|
trusted library allocation
|
page read and write
|
||
224DBC0A000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224E29B6000
|
trusted library allocation
|
page read and write
|
||
224E67B1000
|
trusted library allocation
|
page read and write
|
||
224E2EB2000
|
trusted library allocation
|
page read and write
|
||
224D7ECD000
|
trusted library allocation
|
page read and write
|
||
224DAAEB000
|
trusted library allocation
|
page read and write
|
||
14578AD0000
|
heap
|
page read and write
|
||
224DBFFD000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DAABB000
|
trusted library allocation
|
page read and write
|
||
224DBF23000
|
trusted library allocation
|
page read and write
|
||
224DBFA4000
|
trusted library allocation
|
page read and write
|
||
224DC369000
|
trusted library allocation
|
page read and write
|
||
224DCDAA000
|
trusted library allocation
|
page read and write
|
||
224DBA8B000
|
trusted library allocation
|
page read and write
|
||
224D12A8000
|
heap
|
page read and write
|
||
224E25FC000
|
trusted library allocation
|
page read and write
|
||
2BBC2F30000
|
heap
|
page read and write
|
||
224D7ECD000
|
trusted library allocation
|
page read and write
|
||
224E2D43000
|
trusted library allocation
|
page read and write
|
||
224DBD88000
|
trusted library allocation
|
page read and write
|
||
224E23C7000
|
trusted library allocation
|
page read and write
|
||
224DBDB4000
|
trusted library allocation
|
page read and write
|
||
224DB67E000
|
trusted library allocation
|
page read and write
|
||
224E3A96000
|
trusted library allocation
|
page read and write
|
||
224E4BE3000
|
trusted library allocation
|
page read and write
|
||
224E6449000
|
trusted library allocation
|
page read and write
|
||
224E2E4F000
|
trusted library allocation
|
page read and write
|
||
224DB95B000
|
trusted library allocation
|
page read and write
|
||
224E21BA000
|
trusted library allocation
|
page read and write
|
||
331B2DC1000
|
trusted library allocation
|
page execute read
|
||
224E24CD000
|
trusted library allocation
|
page read and write
|
||
224D130A000
|
heap
|
page read and write
|
||
224DAA1E000
|
trusted library allocation
|
page read and write
|
||
20A2441E000
|
trusted library allocation
|
page read and write
|
||
224DBD3F000
|
trusted library allocation
|
page read and write
|
||
224DA59B000
|
trusted library allocation
|
page read and write
|
||
224E3A26000
|
trusted library allocation
|
page read and write
|
||
224DB96F000
|
trusted library allocation
|
page read and write
|
||
224DB58D000
|
trusted library allocation
|
page read and write
|
||
224D1307000
|
heap
|
page read and write
|
||
224D12B0000
|
heap
|
page read and write
|
||
224DDD25000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
23408B03000
|
trusted library allocation
|
page read and write
|
||
224E23CF000
|
trusted library allocation
|
page read and write
|
||
224E2522000
|
trusted library allocation
|
page read and write
|
||
224DBBDD000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
2BBC3F44000
|
heap
|
page read and write
|
||
224D12C5000
|
heap
|
page read and write
|
||
224DBB64000
|
trusted library allocation
|
page read and write
|
||
224DA27E000
|
heap
|
page read and write
|
||
224E263B000
|
trusted library allocation
|
page read and write
|
||
224E4FB1000
|
trusted library allocation
|
page read and write
|
||
224DA774000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224DCDC3000
|
trusted library allocation
|
page read and write
|
||
224DBFD6000
|
trusted library allocation
|
page read and write
|
||
224E298A000
|
trusted library allocation
|
page read and write
|
||
224DB9A6000
|
trusted library allocation
|
page read and write
|
||
224DBD45000
|
trusted library allocation
|
page read and write
|
||
224DC7D9000
|
trusted library allocation
|
page read and write
|
||
224DB9D3000
|
trusted library allocation
|
page read and write
|
||
224E256D000
|
trusted library allocation
|
page read and write
|
||
224DC865000
|
trusted library allocation
|
page read and write
|
||
224E6476000
|
trusted library allocation
|
page read and write
|
||
224E24D0000
|
trusted library allocation
|
page read and write
|
||
224DBFE7000
|
trusted library allocation
|
page read and write
|
||
224DC89F000
|
trusted library allocation
|
page read and write
|
||
1FAB86BB000
|
heap
|
page read and write
|
||
20A246CB000
|
trusted library allocation
|
page read and write
|
||
224DA661000
|
trusted library allocation
|
page read and write
|
||
224DC5A1000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
2BBC3F3B000
|
heap
|
page read and write
|
||
224D7EA5000
|
trusted library allocation
|
page read and write
|
||
224DDDB5000
|
trusted library allocation
|
page read and write
|
||
224DDDFE000
|
trusted library allocation
|
page read and write
|
||
224DC48D000
|
trusted library allocation
|
page read and write
|
||
20A24432000
|
trusted library allocation
|
page read and write
|
||
224E2985000
|
trusted library allocation
|
page read and write
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
224E643D000
|
trusted library allocation
|
page read and write
|
||
224DD18C000
|
trusted library allocation
|
page read and write
|
||
224E67B4000
|
trusted library allocation
|
page read and write
|
||
224D63C5000
|
trusted library allocation
|
page read and write
|
||
224E2EE1000
|
trusted library allocation
|
page read and write
|
||
224DA285000
|
heap
|
page read and write
|
||
224DB8CA000
|
trusted library allocation
|
page read and write
|
||
224D12CB000
|
heap
|
page read and write
|
||
224E2367000
|
trusted library allocation
|
page read and write
|
||
224D622F000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DBDD6000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224E22D1000
|
trusted library allocation
|
page read and write
|
||
224DB88F000
|
trusted library allocation
|
page read and write
|
||
224E298F000
|
trusted library allocation
|
page read and write
|
||
224E4EA7000
|
trusted library allocation
|
page read and write
|
||
224E2DF0000
|
trusted library allocation
|
page read and write
|
||
224D8724000
|
trusted library allocation
|
page read and write
|
||
224DBBDF000
|
trusted library allocation
|
page read and write
|
||
224E3A20000
|
trusted library allocation
|
page read and write
|
||
224E3AF3000
|
trusted library allocation
|
page read and write
|
||
2BBC3F58000
|
heap
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224E52DB000
|
trusted library allocation
|
page read and write
|
||
224DB80B000
|
trusted library allocation
|
page read and write
|
||
224DB6FE000
|
trusted library allocation
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224DBB16000
|
trusted library allocation
|
page read and write
|
||
224DA2DF000
|
heap
|
page read and write
|
||
224DBF1F000
|
trusted library allocation
|
page read and write
|
||
2BBC397A000
|
heap
|
page read and write
|
||
224DBDA4000
|
trusted library allocation
|
page read and write
|
||
224DD1D2000
|
trusted library allocation
|
page read and write
|
||
224DC3E8000
|
trusted library allocation
|
page read and write
|
||
224E265F000
|
trusted library allocation
|
page read and write
|
||
224DBFA3000
|
trusted library allocation
|
page read and write
|
||
224DA5D2000
|
trusted library allocation
|
page read and write
|
||
1BA07404000
|
trusted library allocation
|
page read and write
|
||
224E64C1000
|
trusted library allocation
|
page read and write
|
||
224E2509000
|
trusted library allocation
|
page read and write
|
||
224E4DB3000
|
trusted library allocation
|
page read and write
|
||
224E2EE1000
|
trusted library allocation
|
page read and write
|
||
224DBD45000
|
trusted library allocation
|
page read and write
|
||
224DBC4A000
|
trusted library allocation
|
page read and write
|
||
224E2938000
|
trusted library allocation
|
page read and write
|
||
224E2375000
|
trusted library allocation
|
page read and write
|
||
224DDDA6000
|
trusted library allocation
|
page read and write
|
||
224DB659000
|
trusted library allocation
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224D63B0000
|
trusted library allocation
|
page read and write
|
||
2BBC3368000
|
trusted library allocation
|
page read and write
|
||
224DB6EE000
|
trusted library allocation
|
page read and write
|
||
224DB961000
|
trusted library allocation
|
page read and write
|
||
224E6761000
|
trusted library allocation
|
page read and write
|
||
224DB9FC000
|
trusted library allocation
|
page read and write
|
||
224E4F85000
|
trusted library allocation
|
page read and write
|
||
1FAB6AD0000
|
heap
|
page read and write
|
||
1FAB6AFA000
|
heap
|
page read and write
|
||
224DCDCB000
|
trusted library allocation
|
page read and write
|
||
224E3A35000
|
trusted library allocation
|
page read and write
|
||
224E24AF000
|
trusted library allocation
|
page read and write
|
||
224DB90F000
|
trusted library allocation
|
page read and write
|
||
224D7356000
|
trusted library allocation
|
page read and write
|
||
224E264D000
|
trusted library allocation
|
page read and write
|
||
224DBAB2000
|
trusted library allocation
|
page read and write
|
||
224E225A000
|
trusted library allocation
|
page read and write
|
||
224D7EE9000
|
trusted library allocation
|
page read and write
|
||
224D7382000
|
trusted library allocation
|
page read and write
|
||
224E24D0000
|
trusted library allocation
|
page read and write
|
||
224DA2D6000
|
heap
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224DBBF4000
|
trusted library allocation
|
page read and write
|
||
224DB5D7000
|
trusted library allocation
|
page read and write
|
||
224DA686000
|
trusted library allocation
|
page read and write
|
||
224D7E26000
|
trusted library allocation
|
page read and write
|
||
224DAAE7000
|
trusted library allocation
|
page read and write
|
||
5F9D3BE000
|
unkown
|
page readonly
|
||
224E4D18000
|
trusted library allocation
|
page read and write
|
||
E6DB0BE000
|
stack
|
page read and write
|
||
2117BFE000
|
stack
|
page read and write
|
||
224DBFDC000
|
trusted library allocation
|
page read and write
|
||
224DC39F000
|
trusted library allocation
|
page read and write
|
||
224E26C8000
|
trusted library allocation
|
page read and write
|
||
224DA59D000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224DB84D000
|
trusted library allocation
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
224E2115000
|
trusted library allocation
|
page read and write
|
||
224DBBC4000
|
trusted library allocation
|
page read and write
|
||
224DA792000
|
trusted library allocation
|
page read and write
|
||
224DB66F000
|
trusted library allocation
|
page read and write
|
||
224E2DDD000
|
trusted library allocation
|
page read and write
|
||
224DA272000
|
heap
|
page read and write
|
||
224E3AA4000
|
trusted library allocation
|
page read and write
|
||
224DB465000
|
trusted library allocation
|
page read and write
|
||
224DBF27000
|
trusted library allocation
|
page read and write
|
||
224DBDFD000
|
trusted library allocation
|
page read and write
|
||
224DBF1F000
|
trusted library allocation
|
page read and write
|
||
B7FDC3E000
|
stack
|
page read and write
|
||
150F000
|
heap
|
page read and write
|
||
224DA5BB000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E27FD000
|
trusted library allocation
|
page read and write
|
||
2BBC38D1000
|
heap
|
page read and write
|
||
224D73A3000
|
trusted library allocation
|
page read and write
|
||
224DA2F1000
|
heap
|
page read and write
|
||
224DA275000
|
heap
|
page read and write
|
||
224D9DDF000
|
trusted library allocation
|
page read and write
|
||
224D7EDE000
|
trusted library allocation
|
page read and write
|
||
224DA7D4000
|
trusted library allocation
|
page read and write
|
||
224DB8AC000
|
trusted library allocation
|
page read and write
|
||
224DBFF8000
|
trusted library allocation
|
page read and write
|
||
224E2479000
|
trusted library allocation
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
224DDDB0000
|
trusted library allocation
|
page read and write
|
||
224E2463000
|
trusted library allocation
|
page read and write
|
||
224DB798000
|
trusted library allocation
|
page read and write
|
||
224DB5F9000
|
trusted library allocation
|
page read and write
|
||
20A24681000
|
trusted library allocation
|
page read and write
|
||
224E3A37000
|
trusted library allocation
|
page read and write
|
||
224DBDF8000
|
trusted library allocation
|
page read and write
|
||
224DE73B000
|
trusted library allocation
|
page read and write
|
||
224DB928000
|
trusted library allocation
|
page read and write
|
||
224DBDB4000
|
trusted library allocation
|
page read and write
|
||
224E2376000
|
trusted library allocation
|
page read and write
|
||
224DB96A000
|
trusted library allocation
|
page read and write
|
||
224D9D2D000
|
trusted library allocation
|
page read and write
|
||
224E4D61000
|
trusted library allocation
|
page read and write
|
||
224DBBD7000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DBD4C000
|
trusted library allocation
|
page read and write
|
||
224D130D000
|
heap
|
page read and write
|
||
224D7EBE000
|
trusted library allocation
|
page read and write
|
||
224E23CF000
|
trusted library allocation
|
page read and write
|
||
224DC370000
|
trusted library allocation
|
page read and write
|
||
224E433C000
|
trusted library allocation
|
page read and write
|
||
224DBDFD000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E27DA000
|
trusted library allocation
|
page read and write
|
||
224E2DFB000
|
trusted library allocation
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
1BA06CE0000
|
unclassified section
|
page readonly
|
||
224DCDCD000
|
trusted library allocation
|
page read and write
|
||
224E67F9000
|
trusted library allocation
|
page read and write
|
||
224DC845000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
224E459A000
|
trusted library allocation
|
page read and write
|
||
224DB5C9000
|
trusted library allocation
|
page read and write
|
||
20A245B4000
|
heap
|
page read and write
|
||
224E4D6F000
|
trusted library allocation
|
page read and write
|
||
224E24D4000
|
trusted library allocation
|
page read and write
|
||
1BA0717A000
|
trusted library allocation
|
page read and write
|
||
224D7EC7000
|
trusted library allocation
|
page read and write
|
||
224DA283000
|
heap
|
page read and write
|
||
224DDE02000
|
trusted library allocation
|
page read and write
|
||
224DC591000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224E4D98000
|
trusted library allocation
|
page read and write
|
||
224DBFF7000
|
trusted library allocation
|
page read and write
|
||
224E37C4000
|
trusted library allocation
|
page read and write
|
||
224E3797000
|
trusted library allocation
|
page read and write
|
||
2BBC3F77000
|
heap
|
page read and write
|
||
224DBDDA000
|
trusted library allocation
|
page read and write
|
||
224DA65D000
|
trusted library allocation
|
page read and write
|
||
224E2ECD000
|
trusted library allocation
|
page read and write
|
||
224DBBFD000
|
trusted library allocation
|
page read and write
|
||
224DBB80000
|
trusted library allocation
|
page read and write
|
||
224DA064000
|
trusted library allocation
|
page read and write
|
||
224DAA99000
|
trusted library allocation
|
page read and write
|
||
224D7EF0000
|
trusted library allocation
|
page read and write
|
||
224DA65D000
|
trusted library allocation
|
page read and write
|
||
224E3765000
|
trusted library allocation
|
page read and write
|
||
224DA023000
|
trusted library allocation
|
page read and write
|
||
224DBDBB000
|
trusted library allocation
|
page read and write
|
||
224DBDC4000
|
trusted library allocation
|
page read and write
|
||
224DBF1F000
|
trusted library allocation
|
page read and write
|
||
224E2200000
|
trusted library allocation
|
page read and write
|
||
224DC339000
|
trusted library allocation
|
page read and write
|
||
224DB31D000
|
trusted library allocation
|
page read and write
|
||
224DDD7C000
|
trusted library allocation
|
page read and write
|
||
224D1310000
|
heap
|
page read and write
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DB4CE000
|
trusted library allocation
|
page read and write
|
||
2BBC3F2D000
|
heap
|
page read and write
|
||
2BBC32D4000
|
heap
|
page read and write
|
||
224E3A37000
|
trusted library allocation
|
page read and write
|
||
224E23B7000
|
trusted library allocation
|
page read and write
|
||
20A24400000
|
trusted library allocation
|
page read and write
|
||
224D12F7000
|
heap
|
page read and write
|
||
224E2981000
|
trusted library allocation
|
page read and write
|
||
224E27C8000
|
trusted library allocation
|
page read and write
|
||
224E2660000
|
trusted library allocation
|
page read and write
|
||
224E251F000
|
trusted library allocation
|
page read and write
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
224D12F7000
|
heap
|
page read and write
|
||
224DBB8B000
|
trusted library allocation
|
page read and write
|
||
224DA78C000
|
trusted library allocation
|
page read and write
|
||
224E2638000
|
trusted library allocation
|
page read and write
|
||
224DB968000
|
trusted library allocation
|
page read and write
|
||
224E29A4000
|
trusted library allocation
|
page read and write
|
||
224DDDBA000
|
trusted library allocation
|
page read and write
|
||
E6DA0BE000
|
stack
|
page read and write
|
||
224E24B2000
|
trusted library allocation
|
page read and write
|
||
2BBC3F29000
|
heap
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
224DB6EB000
|
trusted library allocation
|
page read and write
|
||
224E234A000
|
trusted library allocation
|
page read and write
|
||
224E2644000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E52AD000
|
trusted library allocation
|
page read and write
|
||
224DB6F6000
|
trusted library allocation
|
page read and write
|
||
224DBD80000
|
trusted library allocation
|
page read and write
|
||
224E37C8000
|
trusted library allocation
|
page read and write
|
||
224DBB5A000
|
trusted library allocation
|
page read and write
|
||
224D9D4A000
|
trusted library allocation
|
page read and write
|
||
224E22AF000
|
trusted library allocation
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
224DC957000
|
trusted library allocation
|
page read and write
|
||
224DB695000
|
trusted library allocation
|
page read and write
|
||
224DBBEE000
|
trusted library allocation
|
page read and write
|
||
224D12F8000
|
heap
|
page read and write
|
||
224DBBF5000
|
trusted library allocation
|
page read and write
|
||
224D1308000
|
heap
|
page read and write
|
||
224DC3B8000
|
trusted library allocation
|
page read and write
|
||
224DA556000
|
trusted library allocation
|
page read and write
|
||
224DB90D000
|
trusted library allocation
|
page read and write
|
||
1513000
|
heap
|
page read and write
|
||
224E640E000
|
trusted library allocation
|
page read and write
|
||
224E26FD000
|
trusted library allocation
|
page read and write
|
||
224D12B1000
|
heap
|
page read and write
|
||
224E25B3000
|
trusted library allocation
|
page read and write
|
||
5F9C33E000
|
unkown
|
page readonly
|
||
224DB9FE000
|
trusted library allocation
|
page read and write
|
||
224E264A000
|
trusted library allocation
|
page read and write
|
||
224DC7CA000
|
trusted library allocation
|
page read and write
|
||
224D12F8000
|
heap
|
page read and write
|
||
224DB9A3000
|
trusted library allocation
|
page read and write
|
||
224DC4A8000
|
trusted library allocation
|
page read and write
|
||
224E4BE5000
|
trusted library allocation
|
page read and write
|
||
224DB5C3000
|
trusted library allocation
|
page read and write
|
||
224E22F6000
|
trusted library allocation
|
page read and write
|
||
224E4C18000
|
trusted library allocation
|
page read and write
|
||
224DDD81000
|
trusted library allocation
|
page read and write
|
||
224D5CDF000
|
trusted library allocation
|
page read and write
|
||
224E37C8000
|
trusted library allocation
|
page read and write
|
||
224DB52F000
|
trusted library allocation
|
page read and write
|
||
224E3AF3000
|
trusted library allocation
|
page read and write
|
||
224DB69A000
|
trusted library allocation
|
page read and write
|
||
224E3AF3000
|
trusted library allocation
|
page read and write
|
||
224E293A000
|
trusted library allocation
|
page read and write
|
||
224DDDFE000
|
trusted library allocation
|
page read and write
|
||
224D1301000
|
heap
|
page read and write
|
||
224DA752000
|
trusted library allocation
|
page read and write
|
||
224E21C0000
|
trusted library allocation
|
page read and write
|
||
224DAADD000
|
trusted library allocation
|
page read and write
|
||
224DAA8B000
|
trusted library allocation
|
page read and write
|
||
224E21B3000
|
trusted library allocation
|
page read and write
|
||
224E251C000
|
trusted library allocation
|
page read and write
|
||
224DC804000
|
trusted library allocation
|
page read and write
|
||
224DCDC9000
|
trusted library allocation
|
page read and write
|
||
224DA556000
|
trusted library allocation
|
page read and write
|
||
224E26D8000
|
trusted library allocation
|
page read and write
|
||
224D1308000
|
heap
|
page read and write
|
||
224DB4A6000
|
trusted library allocation
|
page read and write
|
||
2BBC3F6A000
|
heap
|
page read and write
|
||
224D12B1000
|
heap
|
page read and write
|
||
20A23FF0000
|
heap
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224DBD4A000
|
trusted library allocation
|
page read and write
|
||
224DB7A2000
|
trusted library allocation
|
page read and write
|
||
224E3A96000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
224DAAB7000
|
trusted library allocation
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
224DAAFA000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
1513000
|
heap
|
page read and write
|
||
224DB5F9000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DA556000
|
trusted library allocation
|
page read and write
|
||
224E263E000
|
trusted library allocation
|
page read and write
|
||
224DC390000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224DD180000
|
trusted library allocation
|
page read and write
|
||
224D73F3000
|
trusted library allocation
|
page read and write
|
||
224DBD5F000
|
trusted library allocation
|
page read and write
|
||
224D6276000
|
trusted library allocation
|
page read and write
|
||
224DB6BF000
|
trusted library allocation
|
page read and write
|
||
224E263A000
|
trusted library allocation
|
page read and write
|
||
224CA1EF000
|
heap
|
page read and write
|
||
224E4EEB000
|
trusted library allocation
|
page read and write
|
||
224DBDAE000
|
trusted library allocation
|
page read and write
|
||
2BBC38D9000
|
heap
|
page read and write
|
||
224E4DF3000
|
trusted library allocation
|
page read and write
|
||
224D12F6000
|
heap
|
page read and write
|
||
224DA5F4000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224E26B5000
|
trusted library allocation
|
page read and write
|
||
224DB96D000
|
trusted library allocation
|
page read and write
|
||
224DBD32000
|
trusted library allocation
|
page read and write
|
||
224E4EFC000
|
trusted library allocation
|
page read and write
|
||
224E6B8C000
|
heap
|
page read and write
|
||
224E2641000
|
trusted library allocation
|
page read and write
|
||
224DCD87000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
2BBC33BA000
|
trusted library allocation
|
page read and write
|
||
224E263A000
|
trusted library allocation
|
page read and write
|
||
224E23EC000
|
trusted library allocation
|
page read and write
|
||
224E22EB000
|
trusted library allocation
|
page read and write
|
||
224E293C000
|
trusted library allocation
|
page read and write
|
||
224E45CA000
|
trusted library allocation
|
page read and write
|
||
224D12B0000
|
heap
|
page read and write
|
||
14578D0A000
|
trusted library allocation
|
page read and write
|
||
224E26C1000
|
trusted library allocation
|
page read and write
|
||
224DA272000
|
heap
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DBAB9000
|
trusted library allocation
|
page read and write
|
||
2BBC3F44000
|
heap
|
page read and write
|
||
224E4DEC000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DBD0A000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E27EA000
|
trusted library allocation
|
page read and write
|
||
224DB81B000
|
trusted library allocation
|
page read and write
|
||
224DA556000
|
trusted library allocation
|
page read and write
|
||
224E3AD3000
|
trusted library allocation
|
page read and write
|
||
224DA755000
|
trusted library allocation
|
page read and write
|
||
224DA27E000
|
heap
|
page read and write
|
||
224DB91F000
|
trusted library allocation
|
page read and write
|
||
224DD120000
|
trusted library allocation
|
page read and write
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
224DDC28000
|
trusted library allocation
|
page read and write
|
||
224DA0C7000
|
trusted library allocation
|
page read and write
|
||
224E52B7000
|
trusted library allocation
|
page read and write
|
||
224D7EE9000
|
trusted library allocation
|
page read and write
|
||
224DB88F000
|
trusted library allocation
|
page read and write
|
||
224DBC1A000
|
trusted library allocation
|
page read and write
|
||
224E2286000
|
trusted library allocation
|
page read and write
|
||
224DBC29000
|
trusted library allocation
|
page read and write
|
||
224DDC13000
|
trusted library allocation
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
2BBC3F6A000
|
heap
|
page read and write
|
||
224DB5E7000
|
trusted library allocation
|
page read and write
|
||
224DDC42000
|
trusted library allocation
|
page read and write
|
||
2BBC3381000
|
trusted library allocation
|
page read and write
|
||
224E372F000
|
trusted library allocation
|
page read and write
|
||
2BBC39D0000
|
trusted library allocation
|
page read and write
|
||
2BBC39B6000
|
heap
|
page read and write
|
||
224DA0EB000
|
trusted library allocation
|
page read and write
|
||
224E27FA000
|
trusted library allocation
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224DA2CA000
|
heap
|
page read and write
|
||
224DCDB9000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224E3799000
|
trusted library allocation
|
page read and write
|
||
224E22D1000
|
trusted library allocation
|
page read and write
|
||
224E25D1000
|
trusted library allocation
|
page read and write
|
||
224DB569000
|
trusted library allocation
|
page read and write
|
||
224DC55E000
|
trusted library allocation
|
page read and write
|
||
224DB9A8000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224DB5D7000
|
trusted library allocation
|
page read and write
|
||
224DC3F1000
|
trusted library allocation
|
page read and write
|
||
224E26EB000
|
trusted library allocation
|
page read and write
|
||
224DBDD6000
|
trusted library allocation
|
page read and write
|
||
224E2E2F000
|
trusted library allocation
|
page read and write
|
||
224DBDF8000
|
trusted library allocation
|
page read and write
|
||
224DB6ED000
|
trusted library allocation
|
page read and write
|
||
224DAA9F000
|
trusted library allocation
|
page read and write
|
||
224DBA6C000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224E2911000
|
trusted library allocation
|
page read and write
|
||
224DB58D000
|
trusted library allocation
|
page read and write
|
||
13BF000
|
stack
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224E4BF5000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224DB545000
|
trusted library allocation
|
page read and write
|
||
2BBC3978000
|
heap
|
page read and write
|
||
1BA07407000
|
trusted library allocation
|
page read and write
|
||
1BA06D69000
|
remote allocation
|
page execute read
|
||
224E66BA000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224E52DB000
|
trusted library allocation
|
page read and write
|
||
224DCDC3000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224E6426000
|
trusted library allocation
|
page read and write
|
||
224DA75B000
|
trusted library allocation
|
page read and write
|
||
224DCD76000
|
trusted library allocation
|
page read and write
|
||
224D872A000
|
trusted library allocation
|
page read and write
|
||
224E4C1D000
|
trusted library allocation
|
page read and write
|
||
2BBC395A000
|
heap
|
page read and write
|
||
224D737D000
|
trusted library allocation
|
page read and write
|
||
224DB6B4000
|
trusted library allocation
|
page read and write
|
||
20A24623000
|
trusted library allocation
|
page read and write
|
||
224DE543000
|
trusted library allocation
|
page read and write
|
||
224D7EC7000
|
trusted library allocation
|
page read and write
|
||
224E5265000
|
trusted library allocation
|
page read and write
|
||
224DA27F000
|
heap
|
page read and write
|
||
224DC467000
|
trusted library allocation
|
page read and write
|
||
224DBDE4000
|
trusted library allocation
|
page read and write
|
||
224DC5A3000
|
trusted library allocation
|
page read and write
|
||
224DC856000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224DB7AA000
|
trusted library allocation
|
page read and write
|
||
224E2985000
|
trusted library allocation
|
page read and write
|
||
224E2236000
|
trusted library allocation
|
page read and write
|
||
224DA56B000
|
trusted library allocation
|
page read and write
|
||
224DBF65000
|
trusted library allocation
|
page read and write
|
||
224DDC09000
|
trusted library allocation
|
page read and write
|
||
224E5290000
|
trusted library allocation
|
page read and write
|
||
224E2E7F000
|
trusted library allocation
|
page read and write
|
||
224DA0A8000
|
trusted library allocation
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
224E26ED000
|
trusted library allocation
|
page read and write
|
||
224DA28E000
|
heap
|
page read and write
|
||
224E2DFA000
|
trusted library allocation
|
page read and write
|
||
224DDC19000
|
trusted library allocation
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
224E266F000
|
trusted library allocation
|
page read and write
|
||
224E4DEC000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DBBEC000
|
trusted library allocation
|
page read and write
|
||
224DBFDA000
|
trusted library allocation
|
page read and write
|
||
224DA0AB000
|
trusted library allocation
|
page read and write
|
||
224E3759000
|
trusted library allocation
|
page read and write
|
||
20A24600000
|
trusted library allocation
|
page read and write
|
||
224E2276000
|
trusted library allocation
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
224E3A28000
|
trusted library allocation
|
page read and write
|
||
224D63C5000
|
trusted library allocation
|
page read and write
|
||
2BBC396C000
|
heap
|
page read and write
|
||
224DDD4A000
|
trusted library allocation
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224DC5E9000
|
trusted library allocation
|
page read and write
|
||
224D1304000
|
heap
|
page read and write
|
||
224DDDBA000
|
trusted library allocation
|
page read and write
|
||
224D5C90000
|
trusted library allocation
|
page read and write
|
||
224E26C1000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224E4D98000
|
trusted library allocation
|
page read and write
|
||
224E23B7000
|
trusted library allocation
|
page read and write
|
||
224DBC66000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DB91F000
|
trusted library allocation
|
page read and write
|
||
224DB5C3000
|
trusted library allocation
|
page read and write
|
||
224DB60B000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DDD81000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DD1BB000
|
trusted library allocation
|
page read and write
|
||
224DC380000
|
trusted library allocation
|
page read and write
|
||
224D1302000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DBCD8000
|
trusted library allocation
|
page read and write
|
||
224DBFAA000
|
trusted library allocation
|
page read and write
|
||
224DB354000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224E52B7000
|
trusted library allocation
|
page read and write
|
||
224DB668000
|
trusted library allocation
|
page read and write
|
||
224DBBDF000
|
trusted library allocation
|
page read and write
|
||
224DC3E8000
|
trusted library allocation
|
page read and write
|
||
331B2DDB000
|
trusted library allocation
|
page execute read
|
||
2BBC38C0000
|
heap
|
page read and write
|
||
224DDCA3000
|
trusted library allocation
|
page read and write
|
||
2119BFE000
|
stack
|
page read and write
|
||
224DB922000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224E2628000
|
trusted library allocation
|
page read and write
|
||
224D738A000
|
trusted library allocation
|
page read and write
|
||
224DA2E4000
|
heap
|
page read and write
|
||
224DDCAF000
|
trusted library allocation
|
page read and write
|
||
224DCDAE000
|
trusted library allocation
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
2BBC2F80000
|
heap
|
page readonly
|
||
224D12B0000
|
heap
|
page read and write
|
||
224DB924000
|
trusted library allocation
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
20A24673000
|
trusted library allocation
|
page read and write
|
||
224E27E0000
|
trusted library allocation
|
page read and write
|
||
224E451E000
|
trusted library allocation
|
page read and write
|
||
224DDC65000
|
trusted library allocation
|
page read and write
|
||
224D7360000
|
trusted library allocation
|
page read and write
|
||
224DDC20000
|
trusted library allocation
|
page read and write
|
||
224DBCBA000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
224DA282000
|
heap
|
page read and write
|
||
224DBDF8000
|
trusted library allocation
|
page read and write
|
||
224DBFDC000
|
trusted library allocation
|
page read and write
|
||
224DB772000
|
trusted library allocation
|
page read and write
|
||
224E26D5000
|
trusted library allocation
|
page read and write
|
||
224E3A99000
|
trusted library allocation
|
page read and write
|
||
224E29A0000
|
trusted library allocation
|
page read and write
|
||
224DB763000
|
trusted library allocation
|
page read and write
|
||
2BBC3F6A000
|
heap
|
page read and write
|
||
224E3790000
|
trusted library allocation
|
page read and write
|
||
224DBBD7000
|
trusted library allocation
|
page read and write
|
||
224DBBEC000
|
trusted library allocation
|
page read and write
|
||
224DBBAC000
|
trusted library allocation
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224DA5F5000
|
trusted library allocation
|
page read and write
|
||
224D5CCD000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
1BA07111000
|
trusted library allocation
|
page read and write
|
||
224E26ED000
|
trusted library allocation
|
page read and write
|
||
224DB66B000
|
trusted library allocation
|
page read and write
|
||
224DAAF2000
|
trusted library allocation
|
page read and write
|
||
224DBBAC000
|
trusted library allocation
|
page read and write
|
||
224E2985000
|
trusted library allocation
|
page read and write
|
||
224DB75D000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224E23E2000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
1BA07130000
|
trusted library allocation
|
page read and write
|
||
2BBC395A000
|
heap
|
page read and write
|
||
224D8765000
|
trusted library allocation
|
page read and write
|
||
2BBC3934000
|
heap
|
page read and write
|
||
224DC378000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224E6BE1000
|
heap
|
page read and write
|
||
224D637D000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224DA74D000
|
trusted library allocation
|
page read and write
|
||
224E52B0000
|
trusted library allocation
|
page read and write
|
||
150B000
|
heap
|
page read and write
|
||
224DB893000
|
trusted library allocation
|
page read and write
|
||
224DA284000
|
heap
|
page read and write
|
||
224DA556000
|
trusted library allocation
|
page read and write
|
||
224E25DC000
|
trusted library allocation
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
224E5B61000
|
trusted library allocation
|
page read and write
|
||
224DB977000
|
trusted library allocation
|
page read and write
|
||
20A246A3000
|
trusted library allocation
|
page read and write
|
||
224E4D67000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224DA681000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224DC3F1000
|
trusted library allocation
|
page read and write
|
||
224DA7B1000
|
trusted library allocation
|
page read and write
|
||
1512000
|
heap
|
page read and write
|
||
224DA285000
|
heap
|
page read and write
|
||
224DBD5F000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224DBF1F000
|
trusted library allocation
|
page read and write
|
||
1FAB6AFA000
|
heap
|
page read and write
|
||
224DA54D000
|
trusted library allocation
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
224DC32C000
|
trusted library allocation
|
page read and write
|
||
224DE500000
|
trusted library allocation
|
page read and write
|
||
224E3A96000
|
trusted library allocation
|
page read and write
|
||
5F9D33E000
|
unkown
|
page readonly
|
||
224E25ED000
|
trusted library allocation
|
page read and write
|
||
224DBD27000
|
trusted library allocation
|
page read and write
|
||
224DA0C3000
|
trusted library allocation
|
page read and write
|
||
224E6B3F000
|
heap
|
page read and write
|
||
224DCDCD000
|
trusted library allocation
|
page read and write
|
||
224E2DC6000
|
trusted library allocation
|
page read and write
|
||
224E6789000
|
trusted library allocation
|
page read and write
|
||
224D7EAE000
|
trusted library allocation
|
page read and write
|
||
224DB86B000
|
trusted library allocation
|
page read and write
|
||
224E5157000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E2ED8000
|
trusted library allocation
|
page read and write
|
||
224D12C2000
|
heap
|
page read and write
|
||
224E3A3E000
|
trusted library allocation
|
page read and write
|
||
224E24CD000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224DBB9F000
|
trusted library allocation
|
page read and write
|
||
224DDCEB000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E4EC1000
|
trusted library allocation
|
page read and write
|
||
224DB9D3000
|
trusted library allocation
|
page read and write
|
||
224E27C7000
|
trusted library allocation
|
page read and write
|
||
224E2723000
|
trusted library allocation
|
page read and write
|
||
224DBB5C000
|
trusted library allocation
|
page read and write
|
||
224E3A6C000
|
trusted library allocation
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
1BA0718F000
|
trusted library allocation
|
page read and write
|
||
224E26EB000
|
trusted library allocation
|
page read and write
|
||
224E24AF000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224E51A8000
|
trusted library allocation
|
page read and write
|
||
224DC7FB000
|
trusted library allocation
|
page read and write
|
||
224DA58E000
|
trusted library allocation
|
page read and write
|
||
224DA787000
|
trusted library allocation
|
page read and write
|
||
224DDD2A000
|
trusted library allocation
|
page read and write
|
||
224DA284000
|
heap
|
page read and write
|
||
224E2238000
|
trusted library allocation
|
page read and write
|
||
224DBABA000
|
trusted library allocation
|
page read and write
|
||
2BBC3939000
|
heap
|
page read and write
|
||
211A3FE000
|
stack
|
page read and write
|
||
224DB79C000
|
trusted library allocation
|
page read and write
|
||
224DBDDA000
|
trusted library allocation
|
page read and write
|
||
224DB5D7000
|
trusted library allocation
|
page read and write
|
||
224DBBFB000
|
trusted library allocation
|
page read and write
|
||
224E4C20000
|
trusted library allocation
|
page read and write
|
||
224E37BB000
|
trusted library allocation
|
page read and write
|
||
224DBFD6000
|
trusted library allocation
|
page read and write
|
||
224E26E0000
|
trusted library allocation
|
page read and write
|
||
224E262E000
|
trusted library allocation
|
page read and write
|
||
224E5B83000
|
trusted library allocation
|
page read and write
|
||
224E52A4000
|
trusted library allocation
|
page read and write
|
||
224E219F000
|
trusted library allocation
|
page read and write
|
||
224D7EE9000
|
trusted library allocation
|
page read and write
|
||
224E4C91000
|
trusted library allocation
|
page read and write
|
||
224DC443000
|
trusted library allocation
|
page read and write
|
||
224DBD5F000
|
trusted library allocation
|
page read and write
|
||
224DB676000
|
trusted library allocation
|
page read and write
|
||
224DA07C000
|
trusted library allocation
|
page read and write
|
||
224E23EA000
|
trusted library allocation
|
page read and write
|
||
224D7EC7000
|
trusted library allocation
|
page read and write
|
||
224DBCF3000
|
trusted library allocation
|
page read and write
|
||
224DBFFD000
|
trusted library allocation
|
page read and write
|
||
1BA06CF0000
|
unclassified section
|
page readonly
|
||
1BA0710C000
|
trusted library allocation
|
page read and write
|
||
224D12CB000
|
heap
|
page read and write
|
||
20A24679000
|
trusted library allocation
|
page read and write
|
||
224E4DB3000
|
trusted library allocation
|
page read and write
|
||
224E26ED000
|
trusted library allocation
|
page read and write
|
||
224D7EA5000
|
trusted library allocation
|
page read and write
|
||
1BA071C4000
|
trusted library allocation
|
page read and write
|
||
224D8765000
|
trusted library allocation
|
page read and write
|
||
224E296F000
|
trusted library allocation
|
page read and write
|
||
2BBC393C000
|
heap
|
page read and write
|
||
224DBBFB000
|
trusted library allocation
|
page read and write
|
||
224DA653000
|
trusted library allocation
|
page read and write
|
||
224DB5F9000
|
trusted library allocation
|
page read and write
|
||
224DA03C000
|
trusted library allocation
|
page read and write
|
||
224DA03F000
|
trusted library allocation
|
page read and write
|
||
224E25BE000
|
trusted library allocation
|
page read and write
|
||
224DA2D6000
|
heap
|
page read and write
|
||
20A2441B000
|
trusted library allocation
|
page read and write
|
||
224DBDA7000
|
trusted library allocation
|
page read and write
|
||
20A24710000
|
heap
|
page read and write
|
||
224E2665000
|
trusted library allocation
|
page read and write
|
||
224E245B000
|
trusted library allocation
|
page read and write
|
||
224E4D5D000
|
trusted library allocation
|
page read and write
|
||
20A24300000
|
trusted library allocation
|
page read and write
|
||
224DC579000
|
trusted library allocation
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
14578A90000
|
heap
|
page read and write
|
||
2BBC30B0000
|
unclassified section
|
page read and write
|
||
224DC4F9000
|
trusted library allocation
|
page read and write
|
||
224DC7CE000
|
trusted library allocation
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224DA020000
|
trusted library allocation
|
page read and write
|
||
224DBC3C000
|
trusted library allocation
|
page read and write
|
||
1FAB86AC000
|
heap
|
page read and write
|
||
224DA7A3000
|
trusted library allocation
|
page read and write
|
||
224DB653000
|
trusted library allocation
|
page read and write
|
||
224E37BE000
|
trusted library allocation
|
page read and write
|
||
1FAB6E00000
|
trusted library allocation
|
page read and write
|
||
2BBC33F3000
|
trusted library allocation
|
page read and write
|
||
20A246C9000
|
trusted library allocation
|
page read and write
|
||
20A2465D000
|
trusted library allocation
|
page read and write
|
||
224DB6B1000
|
trusted library allocation
|
page read and write
|
||
224D7EBE000
|
trusted library allocation
|
page read and write
|
||
224E26E4000
|
trusted library allocation
|
page read and write
|
||
224DBDFB000
|
trusted library allocation
|
page read and write
|
||
224D73B2000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224D7EA7000
|
trusted library allocation
|
page read and write
|
||
224E2983000
|
trusted library allocation
|
page read and write
|
||
224DDD95000
|
trusted library allocation
|
page read and write
|
||
B7FDC7E000
|
unkown
|
page readonly
|
||
224DBBFE000
|
trusted library allocation
|
page read and write
|
||
224E2473000
|
trusted library allocation
|
page read and write
|
||
224DB81D000
|
trusted library allocation
|
page read and write
|
||
224E29F7000
|
trusted library allocation
|
page read and write
|
||
145789A0000
|
heap
|
page read and write
|
||
224D12C5000
|
heap
|
page read and write
|
||
224DDD7A000
|
trusted library allocation
|
page read and write
|
||
224DB545000
|
trusted library allocation
|
page read and write
|
||
224DBB6F000
|
trusted library allocation
|
page read and write
|
||
224DD1BB000
|
trusted library allocation
|
page read and write
|
||
224E2471000
|
trusted library allocation
|
page read and write
|
||
224DA245000
|
heap
|
page read and write
|
||
224DC89D000
|
trusted library allocation
|
page read and write
|
||
224DDDA6000
|
trusted library allocation
|
page read and write
|
||
224DBABC000
|
trusted library allocation
|
page read and write
|
||
224DC305000
|
trusted library allocation
|
page read and write
|
||
224DB961000
|
trusted library allocation
|
page read and write
|
||
20A23F10000
|
unclassified section
|
page readonly
|
||
224E2631000
|
trusted library allocation
|
page read and write
|
||
224DB6E0000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
224E3790000
|
trusted library allocation
|
page read and write
|
||
2BBC3E14000
|
trusted library allocation
|
page read and write
|
||
2BBC3933000
|
heap
|
page read and write
|
||
224DDC32000
|
trusted library allocation
|
page read and write
|
||
224E3790000
|
trusted library allocation
|
page read and write
|
||
224DB765000
|
trusted library allocation
|
page read and write
|
||
224DBDC3000
|
trusted library allocation
|
page read and write
|
||
224DBB5D000
|
trusted library allocation
|
page read and write
|
||
224D73A8000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224E3A4E000
|
trusted library allocation
|
page read and write
|
||
1BA06FA0000
|
unclassified section
|
page readonly
|
||
224E2367000
|
trusted library allocation
|
page read and write
|
||
224DD13E000
|
trusted library allocation
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
224DBFD7000
|
trusted library allocation
|
page read and write
|
||
224DD1BE000
|
trusted library allocation
|
page read and write
|
||
224DA68B000
|
trusted library allocation
|
page read and write
|
||
224E4C75000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
2BBC3F45000
|
heap
|
page read and write
|
||
224E23EC000
|
trusted library allocation
|
page read and write
|
||
224DBDC6000
|
trusted library allocation
|
page read and write
|
||
224DBC50000
|
trusted library allocation
|
page read and write
|
||
224DB7FB000
|
trusted library allocation
|
page read and write
|
||
224DB6EB000
|
trusted library allocation
|
page read and write
|
||
224E64F8000
|
trusted library allocation
|
page read and write
|
||
224D7E0A000
|
trusted library allocation
|
page read and write
|
||
224DE453000
|
trusted library allocation
|
page read and write
|
||
224DBDDA000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224E6B07000
|
heap
|
page read and write
|
||
224DA2D4000
|
heap
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
224DB73A000
|
trusted library allocation
|
page read and write
|
||
224DC87E000
|
trusted library allocation
|
page read and write
|
||
2BBC3930000
|
heap
|
page read and write
|
||
20A24052000
|
unclassified section
|
page read and write
|
||
224DA2D4000
|
heap
|
page read and write
|
||
224E26E4000
|
trusted library allocation
|
page read and write
|
||
224DBD32000
|
trusted library allocation
|
page read and write
|
||
224DB989000
|
trusted library allocation
|
page read and write
|
||
224DDD1B000
|
trusted library allocation
|
page read and write
|
||
224D12C5000
|
heap
|
page read and write
|
||
224E643B000
|
trusted library allocation
|
page read and write
|
||
224DB9AC000
|
trusted library allocation
|
page read and write
|
||
224DA0FB000
|
trusted library allocation
|
page read and write
|
||
224DB540000
|
trusted library allocation
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224D73D9000
|
trusted library allocation
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224E524A000
|
trusted library allocation
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
224DDC4E000
|
trusted library allocation
|
page read and write
|
||
224E52DB000
|
trusted library allocation
|
page read and write
|
||
224E224A000
|
trusted library allocation
|
page read and write
|
||
224DA2BA000
|
heap
|
page read and write
|
||
224DBF1F000
|
trusted library allocation
|
page read and write
|
||
224E2EF1000
|
trusted library allocation
|
page read and write
|
||
224D1300000
|
heap
|
page read and write
|
||
224E374E000
|
trusted library allocation
|
page read and write
|
||
224D7E77000
|
trusted library allocation
|
page read and write
|
||
224DCCCC000
|
trusted library allocation
|
page read and write
|
||
224DA0A8000
|
trusted library allocation
|
page read and write
|
||
224D129F000
|
heap
|
page read and write
|
||
3CBBC641E000
|
trusted library allocation
|
page read and write
|
||
224DDCFB000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E6B07000
|
heap
|
page read and write
|
||
2BBC33E9000
|
trusted library allocation
|
page read and write
|
||
2BBC3E00000
|
trusted library allocation
|
page read and write
|
||
224DBC8B000
|
trusted library allocation
|
page read and write
|
||
224E2660000
|
trusted library allocation
|
page read and write
|
||
224E4D3E000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224DB3A6000
|
trusted library allocation
|
page read and write
|
||
224DA7D8000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224E6B26000
|
heap
|
page read and write
|
||
2BBC3F77000
|
heap
|
page read and write
|
||
224E24AB000
|
trusted library allocation
|
page read and write
|
||
224E376B000
|
trusted library allocation
|
page read and write
|
||
224DB3ED000
|
trusted library allocation
|
page read and write
|
||
224E4FB4000
|
trusted library allocation
|
page read and write
|
||
224E27BF000
|
trusted library allocation
|
page read and write
|
||
1BA07177000
|
trusted library allocation
|
page read and write
|
||
224DC484000
|
trusted library allocation
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
224DC344000
|
trusted library allocation
|
page read and write
|
||
224DC339000
|
trusted library allocation
|
page read and write
|
||
224D7ECB000
|
trusted library allocation
|
page read and write
|
||
224D7EB8000
|
trusted library allocation
|
page read and write
|
||
224E5289000
|
trusted library allocation
|
page read and write
|
||
224DCCC5000
|
trusted library allocation
|
page read and write
|
||
224E4F61000
|
trusted library allocation
|
page read and write
|
||
224DA567000
|
trusted library allocation
|
page read and write
|
||
224DB9A6000
|
trusted library allocation
|
page read and write
|
||
B7FFC7E000
|
unkown
|
page readonly
|
||
224E5E80000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DCE00000
|
trusted library allocation
|
page read and write
|
||
224DBD45000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224DB5C3000
|
trusted library allocation
|
page read and write
|
||
224DB5E7000
|
trusted library allocation
|
page read and write
|
||
224DB7A5000
|
trusted library allocation
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
224E26E7000
|
trusted library allocation
|
page read and write
|
||
224E22EB000
|
trusted library allocation
|
page read and write
|
||
224DB6A8000
|
trusted library allocation
|
page read and write
|
||
224D12C5000
|
heap
|
page read and write
|
||
224D1330000
|
heap
|
page read and write
|
||
224D12C7000
|
heap
|
page read and write
|
||
224D12CB000
|
heap
|
page read and write
|
||
224D73AD000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DA684000
|
trusted library allocation
|
page read and write
|
||
224E22E0000
|
trusted library allocation
|
page read and write
|
||
224DBBDB000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224D130D000
|
heap
|
page read and write
|
||
224DB95F000
|
trusted library allocation
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
224DA28E000
|
heap
|
page read and write
|
||
224DB668000
|
trusted library allocation
|
page read and write
|
||
224DDCE9000
|
trusted library allocation
|
page read and write
|
||
224DB7BA000
|
trusted library allocation
|
page read and write
|
||
224DA272000
|
heap
|
page read and write
|
||
224DC5CC000
|
trusted library allocation
|
page read and write
|
||
224DA0FB000
|
trusted library allocation
|
page read and write
|
||
224DDDAE000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224D87A9000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224E51FE000
|
trusted library allocation
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
224E2EE6000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DD1F7000
|
trusted library allocation
|
page read and write
|
||
224E2E2F000
|
trusted library allocation
|
page read and write
|
||
224E27FD000
|
trusted library allocation
|
page read and write
|
||
224DB30A000
|
trusted library allocation
|
page read and write
|
||
224DA567000
|
trusted library allocation
|
page read and write
|
||
224E2DF6000
|
trusted library allocation
|
page read and write
|
||
224E2267000
|
trusted library allocation
|
page read and write
|
||
224DBA82000
|
trusted library allocation
|
page read and write
|
||
224DC367000
|
trusted library allocation
|
page read and write
|
||
224E3F00000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
2BBC2ED0000
|
unclassified section
|
page readonly
|
||
224DB859000
|
trusted library allocation
|
page read and write
|
||
224D7EBE000
|
trusted library allocation
|
page read and write
|
||
224DC7F3000
|
trusted library allocation
|
page read and write
|
||
224DA400000
|
trusted library allocation
|
page read and write
|
||
224E4D2C000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
224DCD78000
|
trusted library allocation
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
224E4BF4000
|
trusted library allocation
|
page read and write
|
||
224DB6BF000
|
trusted library allocation
|
page read and write
|
||
224E29AB000
|
trusted library allocation
|
page read and write
|
||
224DCDC5000
|
trusted library allocation
|
page read and write
|
||
224E25F6000
|
trusted library allocation
|
page read and write
|
||
224DBDA4000
|
trusted library allocation
|
page read and write
|
||
20A24603000
|
trusted library allocation
|
page read and write
|
||
224DB91B000
|
trusted library allocation
|
page read and write
|
||
224DCDA2000
|
trusted library allocation
|
page read and write
|
||
224DBC1E000
|
trusted library allocation
|
page read and write
|
||
224DC467000
|
trusted library allocation
|
page read and write
|
||
224E4F18000
|
trusted library allocation
|
page read and write
|
||
224DA794000
|
trusted library allocation
|
page read and write
|
||
224DC55E000
|
trusted library allocation
|
page read and write
|
||
224D63A5000
|
trusted library allocation
|
page read and write
|
||
2BBC394F000
|
heap
|
page read and write
|
||
224DA03C000
|
trusted library allocation
|
page read and write
|
||
224E6B71000
|
heap
|
page read and write
|
||
224DBAE3000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224DC49E000
|
trusted library allocation
|
page read and write
|
||
224E22D7000
|
trusted library allocation
|
page read and write
|
||
224DBB0E000
|
trusted library allocation
|
page read and write
|
||
224DBACC000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
224E52B7000
|
trusted library allocation
|
page read and write
|
||
2BBC39B3000
|
heap
|
page read and write
|
||
224DB397000
|
trusted library allocation
|
page read and write
|
||
224DB6E0000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
3C8BFE000
|
stack
|
page read and write
|
||
224E27D1000
|
trusted library allocation
|
page read and write
|
||
224DA063000
|
trusted library allocation
|
page read and write
|
||
224DC486000
|
trusted library allocation
|
page read and write
|
||
224E2644000
|
trusted library allocation
|
page read and write
|
||
224DA27F000
|
heap
|
page read and write
|
||
224DBCF8000
|
trusted library allocation
|
page read and write
|
||
224E3AF3000
|
trusted library allocation
|
page read and write
|
||
224E24A3000
|
trusted library allocation
|
page read and write
|
||
224E643D000
|
trusted library allocation
|
page read and write
|
||
224E37C4000
|
trusted library allocation
|
page read and write
|
||
224E22ED000
|
trusted library allocation
|
page read and write
|
||
224DA7C9000
|
trusted library allocation
|
page read and write
|
||
B7FEC7E000
|
unkown
|
page readonly
|
||
3A01000
|
heap
|
page read and write
|
||
20A24610000
|
trusted library allocation
|
page read and write
|
||
224DBBC4000
|
trusted library allocation
|
page read and write
|
||
224E647B000
|
trusted library allocation
|
page read and write
|
||
224DB394000
|
trusted library allocation
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
224DA75D000
|
trusted library allocation
|
page read and write
|
||
2BBC3F58000
|
heap
|
page read and write
|
||
224DA28E000
|
heap
|
page read and write
|
||
224DC8A6000
|
trusted library allocation
|
page read and write
|
||
224DA567000
|
trusted library allocation
|
page read and write
|
||
224E37FA000
|
trusted library allocation
|
page read and write
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
224DB5F9000
|
trusted library allocation
|
page read and write
|
||
224DA296000
|
heap
|
page read and write
|
||
224DCDCD000
|
trusted library allocation
|
page read and write
|
||
224E3AF7000
|
trusted library allocation
|
page read and write
|
||
224D12C7000
|
heap
|
page read and write
|
||
224DB8A0000
|
trusted library allocation
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
224E37CD000
|
trusted library allocation
|
page read and write
|
||
224E4D10000
|
trusted library allocation
|
page read and write
|
||
224E4D52000
|
trusted library allocation
|
page read and write
|
||
224DC7C8000
|
trusted library allocation
|
page read and write
|
||
2BBC335C000
|
trusted library allocation
|
page read and write
|
||
224D12C7000
|
heap
|
page read and write
|
||
224E4E6C000
|
trusted library allocation
|
page read and write
|
||
224D7E33000
|
trusted library allocation
|
page read and write
|
||
2BBC3F58000
|
heap
|
page read and write
|
||
224E29BC000
|
trusted library allocation
|
page read and write
|
||
224D73B1000
|
trusted library allocation
|
page read and write
|
||
224E4D2C000
|
trusted library allocation
|
page read and write
|
||
224DBBC5000
|
trusted library allocation
|
page read and write
|
||
224DBDA7000
|
trusted library allocation
|
page read and write
|
||
5F9E43E000
|
unkown
|
page readonly
|
||
2BBC3F58000
|
heap
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
224DA660000
|
trusted library allocation
|
page read and write
|
||
224E235B000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224DC46E000
|
trusted library allocation
|
page read and write
|
||
20DE000
|
stack
|
page read and write
|
||
224DB621000
|
trusted library allocation
|
page read and write
|
||
224E52A4000
|
trusted library allocation
|
page read and write
|
||
224DC7CC000
|
trusted library allocation
|
page read and write
|
||
224DB76A000
|
trusted library allocation
|
page read and write
|
||
224E21CC000
|
trusted library allocation
|
page read and write
|
||
224DB968000
|
trusted library allocation
|
page read and write
|
||
2BBC3F77000
|
heap
|
page read and write
|
||
20A24700000
|
heap
|
page read and write
|
||
224DA787000
|
trusted library allocation
|
page read and write
|
||
224DC5C7000
|
trusted library allocation
|
page read and write
|
||
224E2619000
|
trusted library allocation
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DA0AB000
|
trusted library allocation
|
page read and write
|
||
224DB964000
|
trusted library allocation
|
page read and write
|
||
224E52DB000
|
trusted library allocation
|
page read and write
|
||
224DB95D000
|
trusted library allocation
|
page read and write
|
||
224DBD3E000
|
trusted library allocation
|
page read and write
|
||
224DBD37000
|
trusted library allocation
|
page read and write
|
||
224E37F3000
|
trusted library allocation
|
page read and write
|
||
2BBC32D0000
|
heap
|
page read and write
|
||
224DBBF4000
|
trusted library allocation
|
page read and write
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
224E4D5D000
|
trusted library allocation
|
page read and write
|
||
224DBB54000
|
trusted library allocation
|
page read and write
|
||
224E3797000
|
trusted library allocation
|
page read and write
|
||
20A24060000
|
heap
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224DBF65000
|
trusted library allocation
|
page read and write
|
||
224E3A23000
|
trusted library allocation
|
page read and write
|
||
224DBDAE000
|
trusted library allocation
|
page read and write
|
||
224DBDFD000
|
trusted library allocation
|
page read and write
|
||
224DA283000
|
heap
|
page read and write
|
||
224DB93C000
|
trusted library allocation
|
page read and write
|
||
224DB922000
|
trusted library allocation
|
page read and write
|
||
224DCDAC000
|
trusted library allocation
|
page read and write
|
||
224DC3F1000
|
trusted library allocation
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224E3A28000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224DC339000
|
trusted library allocation
|
page read and write
|
||
5F9D3FE000
|
stack
|
page read and write
|
||
224DB51E000
|
trusted library allocation
|
page read and write
|
||
224E2455000
|
trusted library allocation
|
page read and write
|
||
2BBC39B1000
|
heap
|
page read and write
|
||
224DA5BB000
|
trusted library allocation
|
page read and write
|
||
224E5B27000
|
trusted library allocation
|
page read and write
|
||
224D7EE6000
|
trusted library allocation
|
page read and write
|
||
224DC4CC000
|
trusted library allocation
|
page read and write
|
||
224DB593000
|
trusted library allocation
|
page read and write
|
||
224DB5D7000
|
trusted library allocation
|
page read and write
|
||
224DB3E6000
|
trusted library allocation
|
page read and write
|
||
224D7EA0000
|
trusted library allocation
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
224DA688000
|
trusted library allocation
|
page read and write
|
||
224DB721000
|
trusted library allocation
|
page read and write
|
||
224E372C000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224DA05A000
|
trusted library allocation
|
page read and write
|
||
224D1308000
|
heap
|
page read and write
|
||
5F9F43E000
|
unkown
|
page readonly
|
||
224D12ED000
|
heap
|
page read and write
|
||
224D73D9000
|
trusted library allocation
|
page read and write
|
||
224DCDD6000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224DC4FB000
|
trusted library allocation
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224DBBEE000
|
trusted library allocation
|
page read and write
|
||
224DBFF0000
|
trusted library allocation
|
page read and write
|
||
224D5CC7000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224E26C8000
|
trusted library allocation
|
page read and write
|
||
224DA0A8000
|
trusted library allocation
|
page read and write
|
||
224DBC89000
|
trusted library allocation
|
page read and write
|
||
224DC367000
|
trusted library allocation
|
page read and write
|
||
224DBD3E000
|
trusted library allocation
|
page read and write
|
||
224E211D000
|
trusted library allocation
|
page read and write
|
||
224DA272000
|
heap
|
page read and write
|
||
224E4D47000
|
trusted library allocation
|
page read and write
|
||
2BBC3F29000
|
heap
|
page read and write
|
||
224DB69A000
|
trusted library allocation
|
page read and write
|
||
224DD161000
|
trusted library allocation
|
page read and write
|
||
224E2DF4000
|
trusted library allocation
|
page read and write
|
||
224D132E000
|
heap
|
page read and write
|
||
224E29E3000
|
trusted library allocation
|
page read and write
|
||
224E51F8000
|
trusted library allocation
|
page read and write
|
||
224DB381000
|
trusted library allocation
|
page read and write
|
||
224DA29C000
|
heap
|
page read and write
|
||
224DBDDA000
|
trusted library allocation
|
page read and write
|
||
2BBC3374000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E3A30000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
5F9C1FE000
|
unkown
|
page readonly
|
||
224D1308000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DB61D000
|
trusted library allocation
|
page read and write
|
||
224DBD4A000
|
trusted library allocation
|
page read and write
|
||
224DC7D9000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224DBB5A000
|
trusted library allocation
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224DB79F000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
unkown
|
page readonly
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
224DBCB5000
|
trusted library allocation
|
page read and write
|
||
224DD1DF000
|
trusted library allocation
|
page read and write
|
||
224D7360000
|
trusted library allocation
|
page read and write
|
||
224DBBD7000
|
trusted library allocation
|
page read and write
|
||
224DC5CC000
|
trusted library allocation
|
page read and write
|
||
224E37BE000
|
trusted library allocation
|
page read and write
|
||
224E23E2000
|
trusted library allocation
|
page read and write
|
||
224DA2E4000
|
heap
|
page read and write
|
||
2BBC39B3000
|
heap
|
page read and write
|
||
224DA2D4000
|
heap
|
page read and write
|
||
224DA06D000
|
trusted library allocation
|
page read and write
|
||
224DC7F0000
|
trusted library allocation
|
page read and write
|
||
224D7EA7000
|
trusted library allocation
|
page read and write
|
||
224D8755000
|
trusted library allocation
|
page read and write
|
||
224DC348000
|
trusted library allocation
|
page read and write
|
||
224D1300000
|
heap
|
page read and write
|
||
224D1310000
|
heap
|
page read and write
|
||
224DBDFD000
|
trusted library allocation
|
page read and write
|
||
224DA295000
|
heap
|
page read and write
|
||
224DBF1F000
|
trusted library allocation
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
2BBC3971000
|
heap
|
page read and write
|
||
224DBDD3000
|
trusted library allocation
|
page read and write
|
||
224DBB74000
|
trusted library allocation
|
page read and write
|
||
224D12AE000
|
heap
|
page read and write
|
||
224E2549000
|
trusted library allocation
|
page read and write
|
||
224E3A93000
|
trusted library allocation
|
page read and write
|
||
20A24694000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224E29AE000
|
trusted library allocation
|
page read and write
|
||
224E2477000
|
trusted library allocation
|
page read and write
|
||
224E29B9000
|
trusted library allocation
|
page read and write
|
||
224E2E6F000
|
trusted library allocation
|
page read and write
|
||
224E25D0000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224D130D000
|
heap
|
page read and write
|
||
224DA027000
|
trusted library allocation
|
page read and write
|
||
224E2696000
|
trusted library allocation
|
page read and write
|
||
224E27FD000
|
trusted library allocation
|
page read and write
|
||
224DCDE3000
|
trusted library allocation
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
224DBBCA000
|
trusted library allocation
|
page read and write
|
||
224DBB58000
|
trusted library allocation
|
page read and write
|
||
224E2922000
|
trusted library allocation
|
page read and write
|
||
224DD1A7000
|
trusted library allocation
|
page read and write
|
||
224DA27E000
|
heap
|
page read and write
|
||
224DBB6A000
|
trusted library allocation
|
page read and write
|
||
224E3A92000
|
trusted library allocation
|
page read and write
|
||
224D12F8000
|
heap
|
page read and write
|
||
224DBD5F000
|
trusted library allocation
|
page read and write
|
||
224DA685000
|
trusted library allocation
|
page read and write
|
||
224E4D2C000
|
trusted library allocation
|
page read and write
|
||
224DDDB5000
|
trusted library allocation
|
page read and write
|
||
224DC4D6000
|
trusted library allocation
|
page read and write
|
||
E6D97FE000
|
unkown
|
page readonly
|
||
224DB9A6000
|
trusted library allocation
|
page read and write
|
||
224D7ECE000
|
trusted library allocation
|
page read and write
|
||
224E247B000
|
trusted library allocation
|
page read and write
|
||
224E3A26000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224DA06D000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224E2DFA000
|
trusted library allocation
|
page read and write
|
||
224DB540000
|
trusted library allocation
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
2BBC393C000
|
heap
|
page read and write
|
||
224DA27E000
|
heap
|
page read and write
|
||
224DBFDE000
|
trusted library allocation
|
page read and write
|
||
224DB66F000
|
trusted library allocation
|
page read and write
|
||
224DB674000
|
trusted library allocation
|
page read and write
|
||
224E29A2000
|
trusted library allocation
|
page read and write
|
||
1FAB6AC0000
|
heap
|
page read and write
|
||
224E2EFB000
|
trusted library allocation
|
page read and write
|
||
224DBFC5000
|
trusted library allocation
|
page read and write
|
||
224E5250000
|
trusted library allocation
|
page read and write
|
||
224E2644000
|
trusted library allocation
|
page read and write
|
||
224DB30D000
|
trusted library allocation
|
page read and write
|
||
224DC367000
|
trusted library allocation
|
page read and write
|
||
224D1304000
|
heap
|
page read and write
|
||
224DBDAE000
|
trusted library allocation
|
page read and write
|
||
224DBC8B000
|
trusted library allocation
|
page read and write
|
||
224E4332000
|
trusted library allocation
|
page read and write
|
||
224DB6C3000
|
trusted library allocation
|
page read and write
|
||
224D7E62000
|
trusted library allocation
|
page read and write
|
||
224DB447000
|
trusted library allocation
|
page read and write
|
||
2BBC3F6A000
|
heap
|
page read and write
|
||
1BA071A6000
|
trusted library allocation
|
page read and write
|
||
224DDD6E000
|
trusted library allocation
|
page read and write
|
||
224DC3F1000
|
trusted library allocation
|
page read and write
|
||
224D1335000
|
heap
|
page read and write
|
||
224E2626000
|
trusted library allocation
|
page read and write
|
||
224DB970000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
1BA0750C000
|
trusted library allocation
|
page read and write
|
||
224E26D5000
|
trusted library allocation
|
page read and write
|
||
224DBC3A000
|
trusted library allocation
|
page read and write
|
||
224DD1D7000
|
trusted library allocation
|
page read and write
|
||
B7FB96E000
|
unkown
|
page readonly
|
||
224DDCCB000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
224DDD84000
|
trusted library allocation
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
224DA0A8000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224DB87D000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DA556000
|
trusted library allocation
|
page read and write
|
||
224D7EE2000
|
trusted library allocation
|
page read and write
|
||
2BBC3300000
|
trusted library allocation
|
page read and write
|
||
224E26ED000
|
trusted library allocation
|
page read and write
|
||
224DDCEB000
|
trusted library allocation
|
page read and write
|
||
2BBC39B6000
|
heap
|
page read and write
|
||
224DBA78000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DA584000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
2BBC3930000
|
heap
|
page read and write
|
||
224E6423000
|
trusted library allocation
|
page read and write
|
||
224E4300000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224DB6E0000
|
trusted library allocation
|
page read and write
|
||
224E215E000
|
trusted library allocation
|
page read and write
|
||
224E4316000
|
trusted library allocation
|
page read and write
|
||
224DB58D000
|
trusted library allocation
|
page read and write
|
||
224DA296000
|
heap
|
page read and write
|
||
224DCDCB000
|
trusted library allocation
|
page read and write
|
||
20A24419000
|
trusted library allocation
|
page read and write
|
||
224DB638000
|
trusted library allocation
|
page read and write
|
||
224DBA4C000
|
trusted library allocation
|
page read and write
|
||
1BA06D50000
|
remote allocation
|
page read and write
|
||
224DA54A000
|
trusted library allocation
|
page read and write
|
||
1BA06F1F000
|
unclassified section
|
page read and write
|
||
1BA07172000
|
trusted library allocation
|
page read and write
|
||
224DB5D7000
|
trusted library allocation
|
page read and write
|
||
224DB983000
|
trusted library allocation
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DBAE5000
|
trusted library allocation
|
page read and write
|
||
224DA798000
|
trusted library allocation
|
page read and write
|
||
224DB91F000
|
trusted library allocation
|
page read and write
|
||
224D73CE000
|
trusted library allocation
|
page read and write
|
||
224DC3B8000
|
trusted library allocation
|
page read and write
|
||
224DA285000
|
heap
|
page read and write
|
||
224DB76C000
|
trusted library allocation
|
page read and write
|
||
20A24407000
|
trusted library allocation
|
page read and write
|
||
224DA06F000
|
trusted library allocation
|
page read and write
|
||
224E26C8000
|
trusted library allocation
|
page read and write
|
||
224DBD27000
|
trusted library allocation
|
page read and write
|
||
2BBC335F000
|
trusted library allocation
|
page read and write
|
||
224DA25F000
|
heap
|
page read and write
|
||
224E51FC000
|
trusted library allocation
|
page read and write
|
||
224D7EC7000
|
trusted library allocation
|
page read and write
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
20A24660000
|
trusted library allocation
|
page read and write
|
||
224E4CFD000
|
trusted library allocation
|
page read and write
|
||
224DAAF3000
|
trusted library allocation
|
page read and write
|
||
224E37BB000
|
trusted library allocation
|
page read and write
|
||
224E2505000
|
trusted library allocation
|
page read and write
|
||
224DA0AB000
|
trusted library allocation
|
page read and write
|
||
224DB52F000
|
trusted library allocation
|
page read and write
|
||
224DBFB1000
|
trusted library allocation
|
page read and write
|
||
224DDDBE000
|
trusted library allocation
|
page read and write
|
||
224DBF20000
|
trusted library allocation
|
page read and write
|
||
3C7BFF000
|
stack
|
page read and write
|
||
224DB67E000
|
trusted library allocation
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224D7E64000
|
trusted library allocation
|
page read and write
|
||
224E4FFC000
|
trusted library allocation
|
page read and write
|
||
224E22A7000
|
trusted library allocation
|
page read and write
|
||
224DB8D2000
|
trusted library allocation
|
page read and write
|
||
2BBC332F000
|
trusted library allocation
|
page read and write
|
||
224DBFD9000
|
trusted library allocation
|
page read and write
|
||
224DBDCB000
|
trusted library allocation
|
page read and write
|
||
1BA06D70000
|
unclassified section
|
page readonly
|
||
2BBC33C7000
|
trusted library allocation
|
page read and write
|
||
224E24FD000
|
trusted library allocation
|
page read and write
|
||
224D12A2000
|
heap
|
page read and write
|
||
224D87C4000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
2BBC3F77000
|
heap
|
page read and write
|
||
224E29BD000
|
trusted library allocation
|
page read and write
|
||
224DEF01000
|
trusted library allocation
|
page read and write
|
||
224DAAE2000
|
trusted library allocation
|
page read and write
|
||
224E2668000
|
trusted library allocation
|
page read and write
|
||
224DA7FB000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DD14C000
|
trusted library allocation
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
224E2DE6000
|
trusted library allocation
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
224DC4E1000
|
trusted library allocation
|
page read and write
|
||
224E51FA000
|
trusted library allocation
|
page read and write
|
||
224E298B000
|
trusted library allocation
|
page read and write
|
||
331B2D41000
|
trusted library allocation
|
page execute read
|
||
224DB529000
|
trusted library allocation
|
page read and write
|
||
224DC7F6000
|
trusted library allocation
|
page read and write
|
||
224E4CAC000
|
trusted library allocation
|
page read and write
|
||
224DB917000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DBC3C000
|
trusted library allocation
|
page read and write
|
||
2BBC3F58000
|
heap
|
page read and write
|
||
224DB526000
|
trusted library allocation
|
page read and write
|
||
224E4BEF000
|
trusted library allocation
|
page read and write
|
||
224DA285000
|
heap
|
page read and write
|
||
224DA79A000
|
trusted library allocation
|
page read and write
|
||
20A246E8000
|
trusted library allocation
|
page read and write
|
||
224DA295000
|
heap
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224D7EE2000
|
trusted library allocation
|
page read and write
|
||
224E2989000
|
trusted library allocation
|
page read and write
|
||
224E6478000
|
trusted library allocation
|
page read and write
|
||
224E3797000
|
trusted library allocation
|
page read and write
|
||
1FAB6E0A000
|
trusted library allocation
|
page read and write
|
||
224DCDD8000
|
trusted library allocation
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224E2626000
|
trusted library allocation
|
page read and write
|
||
224D12F7000
|
heap
|
page read and write
|
||
224DB6FA000
|
trusted library allocation
|
page read and write
|
||
224E2233000
|
trusted library allocation
|
page read and write
|
||
2BBC3303000
|
trusted library allocation
|
page read and write
|
||
224E2610000
|
trusted library allocation
|
page read and write
|
||
224E25DE000
|
trusted library allocation
|
page read and write
|
||
224E6470000
|
trusted library allocation
|
page read and write
|
||
224D7EAE000
|
trusted library allocation
|
page read and write
|
||
224E299E000
|
trusted library allocation
|
page read and write
|
||
224E4BFC000
|
trusted library allocation
|
page read and write
|
||
224DBDC6000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
224D9D93000
|
trusted library allocation
|
page read and write
|
||
224DCDAC000
|
trusted library allocation
|
page read and write
|
||
2118BFF000
|
stack
|
page read and write
|
||
224DBC02000
|
trusted library allocation
|
page read and write
|
||
224DA275000
|
heap
|
page read and write
|
||
224DBDDA000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
5F9C2B8000
|
stack
|
page read and write
|
||
224DB819000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224E2739000
|
trusted library allocation
|
page read and write
|
||
14578B41000
|
heap
|
page read and write
|
||
224E5250000
|
trusted library allocation
|
page read and write
|
||
224E26CC000
|
trusted library allocation
|
page read and write
|
||
224DA073000
|
trusted library allocation
|
page read and write
|
||
224D12FF000
|
heap
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
2BBC2F90000
|
heap
|
page read and write
|
||
224DC5C7000
|
trusted library allocation
|
page read and write
|
||
224DB69A000
|
trusted library allocation
|
page read and write
|
||
224E29AD000
|
trusted library allocation
|
page read and write
|
||
224DB6AD000
|
trusted library allocation
|
page read and write
|
||
224E6B8C000
|
heap
|
page read and write
|
||
224DA682000
|
trusted library allocation
|
page read and write
|
||
224DA275000
|
heap
|
page read and write
|
||
224DB8D9000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224D63A0000
|
trusted library allocation
|
page read and write
|
||
224DCCD7000
|
trusted library allocation
|
page read and write
|
||
224DBCCC000
|
trusted library allocation
|
page read and write
|
||
224E2DF1000
|
trusted library allocation
|
page read and write
|
||
224E236B000
|
trusted library allocation
|
page read and write
|
||
224DE761000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
1FAB6D70000
|
heap
|
page read and write
|
||
224E29A5000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DB958000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224DB737000
|
trusted library allocation
|
page read and write
|
||
224E2353000
|
trusted library allocation
|
page read and write
|
||
224DA66F000
|
trusted library allocation
|
page read and write
|
||
224D876E000
|
trusted library allocation
|
page read and write
|
||
224E3A20000
|
trusted library allocation
|
page read and write
|
||
C22000
|
unkown
|
page readonly
|
||
2BBC3348000
|
trusted library allocation
|
page read and write
|
||
224DD1EF000
|
trusted library allocation
|
page read and write
|
||
224E6785000
|
trusted library allocation
|
page read and write
|
||
224E4DDD000
|
trusted library allocation
|
page read and write
|
||
224DB56F000
|
trusted library allocation
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
224E4F5C000
|
trusted library allocation
|
page read and write
|
||
1FAB6AF2000
|
heap
|
page read and write
|
||
224E3AA2000
|
trusted library allocation
|
page read and write
|
||
224DBBD7000
|
trusted library allocation
|
page read and write
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
224DB32B000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224DBF9F000
|
trusted library allocation
|
page read and write
|
||
224E4BA1000
|
trusted library allocation
|
page read and write
|
||
224D12AC000
|
heap
|
page read and write
|
||
224E25F6000
|
trusted library allocation
|
page read and write
|
||
224DC3AF000
|
trusted library allocation
|
page read and write
|
||
224D7E1D000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DC3B0000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224DB5E7000
|
trusted library allocation
|
page read and write
|
||
224E2567000
|
trusted library allocation
|
page read and write
|
||
224DBC13000
|
trusted library allocation
|
page read and write
|
||
224DCDC3000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DB695000
|
trusted library allocation
|
page read and write
|
||
224DA285000
|
heap
|
page read and write
|
||
20A2467B000
|
trusted library allocation
|
page read and write
|
||
224DBCE9000
|
trusted library allocation
|
page read and write
|
||
224DBB58000
|
trusted library allocation
|
page read and write
|
||
224DBF20000
|
trusted library allocation
|
page read and write
|
||
B7FB9AD000
|
stack
|
page read and write
|
||
224E25ED000
|
trusted library allocation
|
page read and write
|
||
224DC385000
|
trusted library allocation
|
page read and write
|
||
224E3797000
|
trusted library allocation
|
page read and write
|
||
E6DB8BE000
|
unkown
|
page readonly
|
||
21A9C5703000
|
trusted library allocation
|
page read and write
|
||
224DC88E000
|
trusted library allocation
|
page read and write
|
||
224E29A4000
|
trusted library allocation
|
page read and write
|
||
224D1314000
|
heap
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224E297B000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224D63C2000
|
trusted library allocation
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224DBC82000
|
trusted library allocation
|
page read and write
|
||
224DA2D4000
|
heap
|
page read and write
|
||
224DDCD8000
|
trusted library allocation
|
page read and write
|
||
1BA07166000
|
trusted library allocation
|
page read and write
|
||
224E23FB000
|
trusted library allocation
|
page read and write
|
||
224DA272000
|
heap
|
page read and write
|
||
224DC560000
|
trusted library allocation
|
page read and write
|
||
224E4D6F000
|
trusted library allocation
|
page read and write
|
||
224DCDAA000
|
trusted library allocation
|
page read and write
|
||
224DB4D0000
|
trusted library allocation
|
page read and write
|
||
224D7EE2000
|
trusted library allocation
|
page read and write
|
||
224D631A000
|
trusted library allocation
|
page read and write
|
||
224E23EA000
|
trusted library allocation
|
page read and write
|
||
224E3B00000
|
trusted library allocation
|
page read and write
|
||
224D5C84000
|
trusted library allocation
|
page read and write
|
||
224E22ED000
|
trusted library allocation
|
page read and write
|
||
2BBC3F44000
|
heap
|
page read and write
|
||
1FAB6AF3000
|
heap
|
page read and write
|
||
224D12F6000
|
heap
|
page read and write
|
||
224DB95F000
|
trusted library allocation
|
page read and write
|
||
224D9DA7000
|
trusted library allocation
|
page read and write
|
||
224D9DF3000
|
trusted library allocation
|
page read and write
|
||
20A24283000
|
heap
|
page read and write
|
||
2BBC38BB000
|
unkown
|
page execute read
|
||
224D12F8000
|
heap
|
page read and write
|
||
2BBC394D000
|
heap
|
page read and write
|
||
224E2EE3000
|
trusted library allocation
|
page read and write
|
||
224E647A000
|
trusted library allocation
|
page read and write
|
||
1BA07117000
|
trusted library allocation
|
page read and write
|
||
224DA73B000
|
trusted library allocation
|
page read and write
|
||
224E22EB000
|
trusted library allocation
|
page read and write
|
||
224DC5D0000
|
trusted library allocation
|
page read and write
|
||
224E29EC000
|
trusted library allocation
|
page read and write
|
||
224DBD7E000
|
trusted library allocation
|
page read and write
|
||
224DA2D6000
|
heap
|
page read and write
|
||
E6D8FFE000
|
stack
|
page read and write
|
||
224E29AF000
|
trusted library allocation
|
page read and write
|
||
2BBC2F9A000
|
heap
|
page read and write
|
||
224DDDF6000
|
trusted library allocation
|
page read and write
|
||
224E2361000
|
trusted library allocation
|
page read and write
|
||
224D9DFB000
|
trusted library allocation
|
page read and write
|
||
21173FF000
|
stack
|
page read and write
|
||
224E64E1000
|
trusted library allocation
|
page read and write
|
||
224E2475000
|
trusted library allocation
|
page read and write
|
||
20A24614000
|
trusted library allocation
|
page read and write
|
||
224CA1EF000
|
heap
|
page read and write
|
||
2BBC3F21000
|
heap
|
page read and write
|
||
224DB53B000
|
trusted library allocation
|
page read and write
|
||
224E6449000
|
trusted library allocation
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
224E5001000
|
trusted library allocation
|
page read and write
|
||
224DB9FC000
|
trusted library allocation
|
page read and write
|
||
224D638D000
|
trusted library allocation
|
page read and write
|
||
224D7EAE000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
20A23F00000
|
unclassified section
|
page readonly
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DBBC5000
|
trusted library allocation
|
page read and write
|
||
224DA660000
|
trusted library allocation
|
page read and write
|
||
224D9D8A000
|
trusted library allocation
|
page read and write
|
||
2BBC2E50000
|
unclassified section
|
page readonly
|
||
224E24A3000
|
trusted library allocation
|
page read and write
|
||
224DA2EB000
|
heap
|
page read and write
|
||
224E23B7000
|
trusted library allocation
|
page read and write
|
||
224E52AD000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
224DB6AD000
|
trusted library allocation
|
page read and write
|
||
224DBDE9000
|
trusted library allocation
|
page read and write
|
||
224D5C9E000
|
trusted library allocation
|
page read and write
|
||
224D7EF1000
|
trusted library allocation
|
page read and write
|
||
224DB99D000
|
trusted library allocation
|
page read and write
|
||
224DAAB7000
|
trusted library allocation
|
page read and write
|
||
224DBFDC000
|
trusted library allocation
|
page read and write
|
||
224E37BB000
|
trusted library allocation
|
page read and write
|
||
224DBBAC000
|
trusted library allocation
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
2BBC3F44000
|
heap
|
page read and write
|
||
224E273B000
|
trusted library allocation
|
page read and write
|
||
2BBC336F000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DBFE5000
|
trusted library allocation
|
page read and write
|
||
1BA06F12000
|
unclassified section
|
page read and write
|
||
224DC4BC000
|
trusted library allocation
|
page read and write
|
||
224DBCEE000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DCD78000
|
trusted library allocation
|
page read and write
|
||
224E52CC000
|
trusted library allocation
|
page read and write
|
||
3B94000
|
heap
|
page read and write
|
||
224E26CC000
|
trusted library allocation
|
page read and write
|
||
224E26F0000
|
trusted library allocation
|
page read and write
|
||
224E21D0000
|
trusted library allocation
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
224DA745000
|
trusted library allocation
|
page read and write
|
||
224DB681000
|
trusted library allocation
|
page read and write
|
||
224DA06B000
|
trusted library allocation
|
page read and write
|
||
224E4513000
|
trusted library allocation
|
page read and write
|
||
224D73A8000
|
trusted library allocation
|
page read and write
|
||
224DBD85000
|
trusted library allocation
|
page read and write
|
||
224E22EB000
|
trusted library allocation
|
page read and write
|
||
224E4C1B000
|
trusted library allocation
|
page read and write
|
||
224DBBDB000
|
trusted library allocation
|
page read and write
|
||
224DB95D000
|
trusted library allocation
|
page read and write
|
||
224DA68C000
|
trusted library allocation
|
page read and write
|
||
224DB6F9000
|
trusted library allocation
|
page read and write
|
||
224E52DB000
|
trusted library allocation
|
page read and write
|
||
224E45EC000
|
trusted library allocation
|
page read and write
|
||
224D12F8000
|
heap
|
page read and write
|
||
224DC8D7000
|
trusted library allocation
|
page read and write
|
||
21193FF000
|
stack
|
page read and write
|
||
224E4C75000
|
trusted library allocation
|
page read and write
|
||
224DBDA4000
|
trusted library allocation
|
page read and write
|
||
224DB925000
|
trusted library allocation
|
page read and write
|
||
224DB856000
|
trusted library allocation
|
page read and write
|
||
224D12B3000
|
heap
|
page read and write
|
||
224DB968000
|
trusted library allocation
|
page read and write
|
||
224E2660000
|
trusted library allocation
|
page read and write
|
||
224E37CD000
|
trusted library allocation
|
page read and write
|
||
224D1302000
|
heap
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
224D1310000
|
heap
|
page read and write
|
||
224E66D6000
|
trusted library allocation
|
page read and write
|
||
224D63AD000
|
trusted library allocation
|
page read and write
|
||
224DC32C000
|
trusted library allocation
|
page read and write
|
||
224E22ED000
|
trusted library allocation
|
page read and write
|
||
224DA59B000
|
trusted library allocation
|
page read and write
|
||
2BBC3323000
|
trusted library allocation
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
224DC806000
|
trusted library allocation
|
page read and write
|
||
224DB593000
|
trusted library allocation
|
page read and write
|
||
224DC463000
|
trusted library allocation
|
page read and write
|
||
1507000
|
heap
|
page read and write
|
||
224DB46F000
|
trusted library allocation
|
page read and write
|
||
224E254D000
|
trusted library allocation
|
page read and write
|
||
14578B30000
|
heap
|
page read and write
|
||
224D12B3000
|
heap
|
page read and write
|
||
224D7EE2000
|
trusted library allocation
|
page read and write
|
||
224E45A3000
|
trusted library allocation
|
page read and write
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
224E21EB000
|
trusted library allocation
|
page read and write
|
||
224DB5F9000
|
trusted library allocation
|
page read and write
|
||
224E224E000
|
trusted library allocation
|
page read and write
|
||
224DA0AB000
|
trusted library allocation
|
page read and write
|
||
224DBD15000
|
trusted library allocation
|
page read and write
|
||
224DB983000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224E2644000
|
trusted library allocation
|
page read and write
|
||
20A2443C000
|
trusted library allocation
|
page read and write
|
||
224E2EFB000
|
trusted library allocation
|
page read and write
|
||
224DB6E0000
|
trusted library allocation
|
page read and write
|
||
E6D74FB000
|
stack
|
page read and write
|
||
224E5B04000
|
trusted library allocation
|
page read and write
|
||
224DC370000
|
trusted library allocation
|
page read and write
|
||
224DC351000
|
trusted library allocation
|
page read and write
|
||
224DB533000
|
trusted library allocation
|
page read and write
|
||
224DCCDA000
|
trusted library allocation
|
page read and write
|
||
20A2466E000
|
trusted library allocation
|
page read and write
|
||
224E517A000
|
trusted library allocation
|
page read and write
|
||
224E52A4000
|
trusted library allocation
|
page read and write
|
||
224E2317000
|
trusted library allocation
|
page read and write
|
||
224DCCC5000
|
trusted library allocation
|
page read and write
|
||
224DDCF8000
|
trusted library allocation
|
page read and write
|
||
224DB856000
|
trusted library allocation
|
page read and write
|
||
224D12AA000
|
heap
|
page read and write
|
||
224D12CB000
|
heap
|
page read and write
|
||
224E25FC000
|
trusted library allocation
|
page read and write
|
||
224DBB64000
|
trusted library allocation
|
page read and write
|
||
224DBAC2000
|
trusted library allocation
|
page read and write
|
||
224DA7DB000
|
trusted library allocation
|
page read and write
|
||
2BBC39C1000
|
heap
|
page read and write
|
||
224E2983000
|
trusted library allocation
|
page read and write
|
||
224E21C4000
|
trusted library allocation
|
page read and write
|
||
224D12C0000
|
heap
|
page read and write
|
||
224E64BC000
|
trusted library allocation
|
page read and write
|
||
224DBD5F000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DB79A000
|
trusted library allocation
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
224E2DED000
|
trusted library allocation
|
page read and write
|
||
224DB490000
|
trusted library allocation
|
page read and write
|
||
2BBC2EF0000
|
heap
|
page read and write
|
||
21173FA000
|
stack
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
224DCCF5000
|
trusted library allocation
|
page read and write
|
||
224DC5A3000
|
trusted library allocation
|
page read and write
|
||
224E2646000
|
trusted library allocation
|
page read and write
|
||
224DB354000
|
trusted library allocation
|
page read and write
|
||
224D9D35000
|
trusted library allocation
|
page read and write
|
||
224DBDD3000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
14578B39000
|
heap
|
page read and write
|
||
224E4D67000
|
trusted library allocation
|
page read and write
|
||
224E2646000
|
trusted library allocation
|
page read and write
|
||
224DC4B8000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224DCAC4000
|
trusted library allocation
|
page read and write
|
||
224DB865000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
224DCDBA000
|
trusted library allocation
|
page read and write
|
||
224E4DDF000
|
trusted library allocation
|
page read and write
|
||
2BBC3F77000
|
heap
|
page read and write
|
||
224DD2A4000
|
trusted library allocation
|
page read and write
|
||
224E262B000
|
trusted library allocation
|
page read and write
|
||
224DA2C9000
|
heap
|
page read and write
|
||
224DBBEE000
|
trusted library allocation
|
page read and write
|
||
224DBAF0000
|
trusted library allocation
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
224D8123000
|
trusted library allocation
|
page read and write
|
||
224DA0F1000
|
trusted library allocation
|
page read and write
|
||
224DC397000
|
trusted library allocation
|
page read and write
|
||
1507000
|
heap
|
page read and write
|
||
224DBBD4000
|
trusted library allocation
|
page read and write
|
||
224D12B0000
|
heap
|
page read and write
|
||
224DCADD000
|
trusted library allocation
|
page read and write
|
||
224D5CCA000
|
trusted library allocation
|
page read and write
|
||
224DBDC4000
|
trusted library allocation
|
page read and write
|
||
224DAAB4000
|
trusted library allocation
|
page read and write
|
||
224DBAA4000
|
trusted library allocation
|
page read and write
|
||
224DB58D000
|
trusted library allocation
|
page read and write
|
||
224E4E82000
|
trusted library allocation
|
page read and write
|
||
224DBC38000
|
trusted library allocation
|
page read and write
|
||
224DBDE9000
|
trusted library allocation
|
page read and write
|
||
224DA0FB000
|
trusted library allocation
|
page read and write
|
||
224DBBCA000
|
trusted library allocation
|
page read and write
|
||
E6D75BE000
|
unkown
|
page readonly
|
||
224E3A35000
|
trusted library allocation
|
page read and write
|
||
224DC4BC000
|
trusted library allocation
|
page read and write
|
||
224E2DC8000
|
trusted library allocation
|
page read and write
|
||
224D63A5000
|
trusted library allocation
|
page read and write
|
||
224DD19F000
|
trusted library allocation
|
page read and write
|
||
224E6431000
|
trusted library allocation
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224DBD3F000
|
trusted library allocation
|
page read and write
|
||
224DB53D000
|
trusted library allocation
|
page read and write
|
||
2BBC3939000
|
heap
|
page read and write
|
||
224DBBF5000
|
trusted library allocation
|
page read and write
|
||
224DBCD8000
|
trusted library allocation
|
page read and write
|
||
224E2EE3000
|
trusted library allocation
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224DA0A8000
|
trusted library allocation
|
page read and write
|
||
224DB849000
|
trusted library allocation
|
page read and write
|
||
224DD122000
|
trusted library allocation
|
page read and write
|
||
224E244A000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
2BBC3F2B000
|
heap
|
page read and write
|
||
224DB67E000
|
trusted library allocation
|
page read and write
|
||
224DC5E9000
|
trusted library allocation
|
page read and write
|
||
224E2981000
|
trusted library allocation
|
page read and write
|
||
224E3A96000
|
trusted library allocation
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224DD1CD000
|
trusted library allocation
|
page read and write
|
||
224DBB78000
|
trusted library allocation
|
page read and write
|
||
224E29A2000
|
trusted library allocation
|
page read and write
|
||
224DBB4D000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
2BBC3F77000
|
heap
|
page read and write
|
||
224D5CEF000
|
trusted library allocation
|
page read and write
|
||
224DBD2F000
|
trusted library allocation
|
page read and write
|
||
5F9D43E000
|
unkown
|
page readonly
|
||
224E6470000
|
trusted library allocation
|
page read and write
|
||
224DB7E5000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224D7EAE000
|
trusted library allocation
|
page read and write
|
||
224DA7DB000
|
trusted library allocation
|
page read and write
|
||
E6D757C000
|
stack
|
page read and write
|
||
224E6801000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224E227A000
|
trusted library allocation
|
page read and write
|
||
2BBC39C2000
|
heap
|
page read and write
|
||
224E3A2E000
|
trusted library allocation
|
page read and write
|
||
224DB58D000
|
trusted library allocation
|
page read and write
|
||
224D7EF0000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
1BA06E23000
|
heap
|
page read and write
|
||
224D12C5000
|
heap
|
page read and write
|
||
224E4557000
|
trusted library allocation
|
page read and write
|
||
224E4D66000
|
trusted library allocation
|
page read and write
|
||
224DA5D5000
|
trusted library allocation
|
page read and write
|
||
20A23FD0000
|
heap
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
224DB6B1000
|
trusted library allocation
|
page read and write
|
||
224DBC7B000
|
trusted library allocation
|
page read and write
|
||
224D1302000
|
heap
|
page read and write
|
||
224E26ED000
|
trusted library allocation
|
page read and write
|
||
224DA5D2000
|
trusted library allocation
|
page read and write
|
||
224DE6AD000
|
trusted library allocation
|
page read and write
|
||
C2C000
|
unkown
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
224DB3AF000
|
trusted library allocation
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224DB559000
|
trusted library allocation
|
page read and write
|
||
224DB569000
|
trusted library allocation
|
page read and write
|
||
224D12AC000
|
heap
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224DBD3D000
|
trusted library allocation
|
page read and write
|
||
224DBDC4000
|
trusted library allocation
|
page read and write
|
||
224E4D47000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E4F66000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DA0AB000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
224D12CB000
|
heap
|
page read and write
|
||
224D12F6000
|
heap
|
page read and write
|
||
224DB66B000
|
trusted library allocation
|
page read and write
|
||
224E23EC000
|
trusted library allocation
|
page read and write
|
||
224D9DAF000
|
trusted library allocation
|
page read and write
|
||
224DBBDF000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
224DB761000
|
trusted library allocation
|
page read and write
|
||
224D12B0000
|
heap
|
page read and write
|
||
224D7382000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
BFC000
|
unkown
|
page readonly
|
||
224DBD2D000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DB92F000
|
trusted library allocation
|
page read and write
|
||
224D12AE000
|
heap
|
page read and write
|
||
224DBFC1000
|
trusted library allocation
|
page read and write
|
||
C34000
|
unkown
|
page readonly
|
||
224D7E69000
|
trusted library allocation
|
page read and write
|
||
224E4D2C000
|
trusted library allocation
|
page read and write
|
||
224E22D1000
|
trusted library allocation
|
page read and write
|
||
224DA567000
|
trusted library allocation
|
page read and write
|
||
224DBF33000
|
trusted library allocation
|
page read and write
|
||
224E2628000
|
trusted library allocation
|
page read and write
|
||
224D12A8000
|
heap
|
page read and write
|
||
224D7EA7000
|
trusted library allocation
|
page read and write
|
||
224DBCB5000
|
trusted library allocation
|
page read and write
|
||
224E51AF000
|
trusted library allocation
|
page read and write
|
||
224D62FB000
|
trusted library allocation
|
page read and write
|
||
224DB668000
|
trusted library allocation
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224DBDA7000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224D12C7000
|
heap
|
page read and write
|
||
2BBC3E17000
|
trusted library allocation
|
page read and write
|
||
224E266C000
|
trusted library allocation
|
page read and write
|
||
1512000
|
heap
|
page read and write
|
||
224DA739000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224DBF33000
|
trusted library allocation
|
page read and write
|
||
224DB7D4000
|
trusted library allocation
|
page read and write
|
||
224DA0D2000
|
trusted library allocation
|
page read and write
|
||
224DA735000
|
trusted library allocation
|
page read and write
|
||
224D12C8000
|
heap
|
page read and write
|
||
224DC7F6000
|
trusted library allocation
|
page read and write
|
||
224E379F000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DC7FB000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DBC05000
|
trusted library allocation
|
page read and write
|
||
224E4BF2000
|
trusted library allocation
|
page read and write
|
||
224E4584000
|
trusted library allocation
|
page read and write
|
||
224DBDBB000
|
trusted library allocation
|
page read and write
|
||
224D738A000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E27D5000
|
trusted library allocation
|
page read and write
|
||
224DA0A8000
|
trusted library allocation
|
page read and write
|
||
224DBDF8000
|
trusted library allocation
|
page read and write
|
||
224D8765000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224DBC55000
|
trusted library allocation
|
page read and write
|
||
224E3A5E000
|
trusted library allocation
|
page read and write
|
||
224DCD8B000
|
trusted library allocation
|
page read and write
|
||
224DC899000
|
trusted library allocation
|
page read and write
|
||
224D5CEF000
|
trusted library allocation
|
page read and write
|
||
224DC885000
|
trusted library allocation
|
page read and write
|
||
224DC390000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224D7EE6000
|
trusted library allocation
|
page read and write
|
||
C2C000
|
unkown
|
page write copy
|
||
224DA09E000
|
trusted library allocation
|
page read and write
|
||
224DC3EA000
|
trusted library allocation
|
page read and write
|
||
2BBC3F58000
|
heap
|
page read and write
|
||
224DC8A2000
|
trusted library allocation
|
page read and write
|
||
224DCDE3000
|
trusted library allocation
|
page read and write
|
||
224DC5A1000
|
trusted library allocation
|
page read and write
|
||
224D7E19000
|
trusted library allocation
|
page read and write
|
||
2BBC3379000
|
trusted library allocation
|
page read and write
|
||
224DC3F1000
|
trusted library allocation
|
page read and write
|
||
224E27C7000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224E67CA000
|
trusted library allocation
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
224DA295000
|
heap
|
page read and write
|
||
224DBBDD000
|
trusted library allocation
|
page read and write
|
||
224DB90D000
|
trusted library allocation
|
page read and write
|
||
224D6318000
|
trusted library allocation
|
page read and write
|
||
224DB75E000
|
trusted library allocation
|
page read and write
|
||
224E2668000
|
trusted library allocation
|
page read and write
|
||
224DA02D000
|
trusted library allocation
|
page read and write
|
||
224DB6A8000
|
trusted library allocation
|
page read and write
|
||
224E525B000
|
trusted library allocation
|
page read and write
|
||
20A24040000
|
heap
|
page readonly
|
||
224DB3C3000
|
trusted library allocation
|
page read and write
|
||
224D7396000
|
trusted library allocation
|
page read and write
|
||
224D12AC000
|
heap
|
page read and write
|
||
2BBC3F00000
|
heap
|
page read and write
|
||
1BA06F60000
|
heap
|
page read and write
|
||
14578D07000
|
trusted library allocation
|
page read and write
|
||
224DCDE9000
|
trusted library allocation
|
page read and write
|
||
224E22F6000
|
trusted library allocation
|
page read and write
|
||
224DD1CD000
|
trusted library allocation
|
page read and write
|
||
2BBC39B9000
|
heap
|
page read and write
|
||
224DD1D2000
|
trusted library allocation
|
page read and write
|
||
224DB6BD000
|
trusted library allocation
|
page read and write
|
||
224DB53D000
|
trusted library allocation
|
page read and write
|
||
5F9CB3E000
|
stack
|
page read and write
|
||
224E4BAC000
|
trusted library allocation
|
page read and write
|
||
224D12F6000
|
heap
|
page read and write
|
||
224D7E12000
|
trusted library allocation
|
page read and write
|
||
224E2557000
|
trusted library allocation
|
page read and write
|
||
224D63C2000
|
trusted library allocation
|
page read and write
|
||
224DA25F000
|
heap
|
page read and write
|
||
224DB961000
|
trusted library allocation
|
page read and write
|
||
224E2216000
|
trusted library allocation
|
page read and write
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
224D12F6000
|
heap
|
page read and write
|
||
224D12A2000
|
heap
|
page read and write
|
||
224DA591000
|
trusted library allocation
|
page read and write
|
||
224DB665000
|
trusted library allocation
|
page read and write
|
||
224DA06A000
|
trusted library allocation
|
page read and write
|
||
224E25DC000
|
trusted library allocation
|
page read and write
|
||
224E5265000
|
trusted library allocation
|
page read and write
|
||
224DB725000
|
trusted library allocation
|
page read and write
|
||
224E26CE000
|
trusted library allocation
|
page read and write
|
||
224DB52A000
|
trusted library allocation
|
page read and write
|
||
224D5C81000
|
trusted library allocation
|
page read and write
|
||
224E2655000
|
trusted library allocation
|
page read and write
|
||
224DA295000
|
heap
|
page read and write
|
||
224DA295000
|
heap
|
page read and write
|
||
224D12CB000
|
heap
|
page read and write
|
||
224E4F89000
|
trusted library allocation
|
page read and write
|
||
224E25DF000
|
trusted library allocation
|
page read and write
|
||
224DBD53000
|
trusted library allocation
|
page read and write
|
||
B61000
|
unkown
|
page execute read
|
||
224DA2EE000
|
heap
|
page read and write
|
||
224E2991000
|
trusted library allocation
|
page read and write
|
||
224E2DFA000
|
trusted library allocation
|
page read and write
|
||
224DA73B000
|
trusted library allocation
|
page read and write
|
||
1BA07103000
|
trusted library allocation
|
page read and write
|
||
224E2668000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DBDFD000
|
trusted library allocation
|
page read and write
|
||
224E2ECD000
|
trusted library allocation
|
page read and write
|
||
224DB37B000
|
trusted library allocation
|
page read and write
|
||
224DC84B000
|
trusted library allocation
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
224DB417000
|
trusted library allocation
|
page read and write
|
||
2BBC3361000
|
trusted library allocation
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
224DB569000
|
trusted library allocation
|
page read and write
|
||
224D638D000
|
trusted library allocation
|
page read and write
|
||
224DB9B5000
|
trusted library allocation
|
page read and write
|
||
224DA5B8000
|
trusted library allocation
|
page read and write
|
||
224DCDC6000
|
trusted library allocation
|
page read and write
|
||
224D7350000
|
trusted library allocation
|
page read and write
|
||
224E2556000
|
trusted library allocation
|
page read and write
|
||
224DC591000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
stack
|
page read and write
|
||
224E2121000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DB8B2000
|
trusted library allocation
|
page read and write
|
||
224D131E000
|
heap
|
page read and write
|
||
224DB989000
|
trusted library allocation
|
page read and write
|
||
2BBC2F10000
|
heap
|
page read and write
|
||
224DBCB3000
|
trusted library allocation
|
page read and write
|
||
224E27E5000
|
trusted library allocation
|
page read and write
|
||
224E2367000
|
trusted library allocation
|
page read and write
|
||
224E2475000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
224DC4F9000
|
trusted library allocation
|
page read and write
|
||
224E264F000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E3AF3000
|
trusted library allocation
|
page read and write
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
224E262B000
|
trusted library allocation
|
page read and write
|
||
224E2187000
|
trusted library allocation
|
page read and write
|
||
224D5CA9000
|
trusted library allocation
|
page read and write
|
||
224DA681000
|
trusted library allocation
|
page read and write
|
||
224E29AE000
|
trusted library allocation
|
page read and write
|
||
1CDF000
|
stack
|
page read and write
|
||
224DA05A000
|
trusted library allocation
|
page read and write
|
||
224E2471000
|
trusted library allocation
|
page read and write
|
||
224E25C2000
|
trusted library allocation
|
page read and write
|
||
224E22ED000
|
trusted library allocation
|
page read and write
|
||
224E525F000
|
trusted library allocation
|
page read and write
|
||
1BA071B1000
|
trusted library allocation
|
page read and write
|
||
224E3AFD000
|
trusted library allocation
|
page read and write
|
||
224DCDD6000
|
trusted library allocation
|
page read and write
|
||
224DA75E000
|
trusted library allocation
|
page read and write
|
||
224DA78D000
|
trusted library allocation
|
page read and write
|
||
224E22ED000
|
trusted library allocation
|
page read and write
|
||
224DDDAE000
|
trusted library allocation
|
page read and write
|
||
224D7EC9000
|
trusted library allocation
|
page read and write
|
||
224DBFFD000
|
trusted library allocation
|
page read and write
|
||
224D7EE6000
|
trusted library allocation
|
page read and write
|
||
224DC4D6000
|
trusted library allocation
|
page read and write
|
||
224DA7FB000
|
trusted library allocation
|
page read and write
|
||
224DB785000
|
trusted library allocation
|
page read and write
|
||
224E529C000
|
trusted library allocation
|
page read and write
|
||
224DA285000
|
heap
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E298F000
|
trusted library allocation
|
page read and write
|
||
2BBC3F3B000
|
heap
|
page read and write
|
||
224DA640000
|
trusted library allocation
|
page read and write
|
||
224D63F6000
|
trusted library allocation
|
page read and write
|
||
224DA088000
|
trusted library allocation
|
page read and write
|
||
224DBC55000
|
trusted library allocation
|
page read and write
|
||
224E4D98000
|
trusted library allocation
|
page read and write
|
||
224E52B7000
|
trusted library allocation
|
page read and write
|
||
224DA05A000
|
trusted library allocation
|
page read and write
|
||
224DBF65000
|
trusted library allocation
|
page read and write
|
||
224D7E1D000
|
trusted library allocation
|
page read and write
|
||
224E2651000
|
trusted library allocation
|
page read and write
|
||
2BBC38BF000
|
unkown
|
page execute read
|
||
224DC3F8000
|
trusted library allocation
|
page read and write
|
||
224DC200000
|
trusted library allocation
|
page read and write
|
||
2BBC3F44000
|
heap
|
page read and write
|
||
224D876B000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DB865000
|
trusted library allocation
|
page read and write
|
||
224D12FE000
|
heap
|
page read and write
|
||
224DD2DD000
|
trusted library allocation
|
page read and write
|
||
224DB88B000
|
trusted library allocation
|
page read and write
|
||
20A2462E000
|
trusted library allocation
|
page read and write
|
||
224DC364000
|
trusted library allocation
|
page read and write
|
||
224DA655000
|
trusted library allocation
|
page read and write
|
||
224E2668000
|
trusted library allocation
|
page read and write
|
||
224D12F7000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DA61D000
|
trusted library allocation
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224DC4FE000
|
trusted library allocation
|
page read and write
|
||
224DBC4A000
|
trusted library allocation
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
224DA7CE000
|
trusted library allocation
|
page read and write
|
||
224E4D26000
|
trusted library allocation
|
page read and write
|
||
224DA638000
|
trusted library allocation
|
page read and write
|
||
224DBB80000
|
trusted library allocation
|
page read and write
|
||
224DC355000
|
trusted library allocation
|
page read and write
|
||
5F9B9FE000
|
stack
|
page read and write
|
||
224E2430000
|
trusted library allocation
|
page read and write
|
||
224E4D52000
|
trusted library allocation
|
page read and write
|
||
224E2631000
|
trusted library allocation
|
page read and write
|
||
3C83FE000
|
stack
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
224DA7FB000
|
trusted library allocation
|
page read and write
|
||
224DBDA7000
|
trusted library allocation
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
2BBC3F44000
|
heap
|
page read and write
|
||
224E3A1E000
|
trusted library allocation
|
page read and write
|
||
224E25BA000
|
trusted library allocation
|
page read and write
|
||
224DA597000
|
trusted library allocation
|
page read and write
|
||
224DBDE4000
|
trusted library allocation
|
page read and write
|
||
224E25FC000
|
trusted library allocation
|
page read and write
|
||
224E2468000
|
trusted library allocation
|
page read and write
|
||
2BBC38D0000
|
heap
|
page read and write
|
||
20A24647000
|
trusted library allocation
|
page read and write
|
||
224E2429000
|
trusted library allocation
|
page read and write
|
||
224DA7BB000
|
trusted library allocation
|
page read and write
|
||
224E26E0000
|
trusted library allocation
|
page read and write
|
||
224E261E000
|
trusted library allocation
|
page read and write
|
||
3A00000
|
heap
|
page read and write
|
||
224D7365000
|
trusted library allocation
|
page read and write
|
||
2BBC3F79000
|
heap
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224E23CF000
|
trusted library allocation
|
page read and write
|
||
2BBC3F6A000
|
heap
|
page read and write
|
||
224DA58A000
|
trusted library allocation
|
page read and write
|
||
224E2638000
|
trusted library allocation
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
224DCD87000
|
trusted library allocation
|
page read and write
|
||
224DBACF000
|
trusted library allocation
|
page read and write
|
||
224DB531000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
224D12CB000
|
heap
|
page read and write
|
||
224DBBBD000
|
trusted library allocation
|
page read and write
|
||
224E6476000
|
trusted library allocation
|
page read and write
|
||
224DA5D5000
|
trusted library allocation
|
page read and write
|
||
224E26F0000
|
trusted library allocation
|
page read and write
|
||
224E293A000
|
trusted library allocation
|
page read and write
|
||
224DCCEB000
|
trusted library allocation
|
page read and write
|
||
224E3792000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DB73C000
|
trusted library allocation
|
page read and write
|
||
224DB859000
|
trusted library allocation
|
page read and write
|
||
224DA283000
|
heap
|
page read and write
|
||
224E2EBA000
|
trusted library allocation
|
page read and write
|
||
224E5135000
|
trusted library allocation
|
page read and write
|
||
224DD178000
|
trusted library allocation
|
page read and write
|
||
224DB47E000
|
trusted library allocation
|
page read and write
|
||
224DB56F000
|
trusted library allocation
|
page read and write
|
||
224D6366000
|
trusted library allocation
|
page read and write
|
||
224DB593000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224D1316000
|
heap
|
page read and write
|
||
224E2518000
|
trusted library allocation
|
page read and write
|
||
224D7EC9000
|
trusted library allocation
|
page read and write
|
||
224E233A000
|
trusted library allocation
|
page read and write
|
||
224DB653000
|
trusted library allocation
|
page read and write
|
||
224E26AA000
|
trusted library allocation
|
page read and write
|
||
20A24706000
|
heap
|
page read and write
|
||
5F9EC3E000
|
stack
|
page read and write
|
||
224D879B000
|
trusted library allocation
|
page read and write
|
||
224E51B2000
|
trusted library allocation
|
page read and write
|
||
224E2641000
|
trusted library allocation
|
page read and write
|
||
224DA685000
|
trusted library allocation
|
page read and write
|
||
224DBBDD000
|
trusted library allocation
|
page read and write
|
||
224E51C6000
|
trusted library allocation
|
page read and write
|
||
2BBC30C0000
|
trusted library section
|
page readonly
|
||
224DBBC5000
|
trusted library allocation
|
page read and write
|
||
2BBC39B0000
|
heap
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
224DB7FB000
|
trusted library allocation
|
page read and write
|
||
224DBB9F000
|
trusted library allocation
|
page read and write
|
||
224DC845000
|
trusted library allocation
|
page read and write
|
||
224DBBEC000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224E4D52000
|
trusted library allocation
|
page read and write
|
||
224DA245000
|
heap
|
page read and write
|
||
224E64BC000
|
trusted library allocation
|
page read and write
|
||
224D6223000
|
trusted library allocation
|
page read and write
|
||
224E64E1000
|
trusted library allocation
|
page read and write
|
||
224DB9FE000
|
trusted library allocation
|
page read and write
|
||
224DB536000
|
trusted library allocation
|
page read and write
|
||
224D63A0000
|
trusted library allocation
|
page read and write
|
||
224E6B01000
|
heap
|
page read and write
|
||
1BA07250000
|
heap
|
page read and write
|
||
224DA246000
|
heap
|
page read and write
|
||
224D7369000
|
trusted library allocation
|
page read and write
|
||
224DBBA2000
|
trusted library allocation
|
page read and write
|
||
224DA03F000
|
trusted library allocation
|
page read and write
|
||
224DE76A000
|
trusted library allocation
|
page read and write
|
||
224DC367000
|
trusted library allocation
|
page read and write
|
||
224DBDAE000
|
trusted library allocation
|
page read and write
|
||
1BA07170000
|
trusted library allocation
|
page read and write
|
||
B7FD3FE000
|
stack
|
page read and write
|
||
224DA567000
|
trusted library allocation
|
page read and write
|
||
224E2983000
|
trusted library allocation
|
page read and write
|
||
224E2638000
|
trusted library allocation
|
page read and write
|
||
224E6B52000
|
heap
|
page read and write
|
||
E6DA8BE000
|
unkown
|
page readonly
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
224D73EA000
|
trusted library allocation
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
224D12C4000
|
heap
|
page read and write
|
||
224D7EB8000
|
trusted library allocation
|
page read and write
|
||
224E23E2000
|
trusted library allocation
|
page read and write
|
||
224D8128000
|
trusted library allocation
|
page read and write
|
||
224DD16F000
|
trusted library allocation
|
page read and write
|
||
14E8000
|
heap
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
2BBC3F2B000
|
heap
|
page read and write
|
||
224E3A34000
|
trusted library allocation
|
page read and write
|
||
224DBD25000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DAA0F000
|
trusted library allocation
|
page read and write
|
||
224DB917000
|
trusted library allocation
|
page read and write
|
||
224DA684000
|
trusted library allocation
|
page read and write
|
||
224E4DF5000
|
trusted library allocation
|
page read and write
|
||
224DDCBF000
|
trusted library allocation
|
page read and write
|
||
224DC8C3000
|
trusted library allocation
|
page read and write
|
||
224DCAC2000
|
trusted library allocation
|
page read and write
|
||
1BA06F10000
|
unclassified section
|
page read and write
|
||
224DB96D000
|
trusted library allocation
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
224E2141000
|
trusted library allocation
|
page read and write
|
||
224DB627000
|
trusted library allocation
|
page read and write
|
||
224E4BA8000
|
trusted library allocation
|
page read and write
|
||
224E243C000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224CA1EF000
|
heap
|
page read and write
|
||
224DBD3C000
|
trusted library allocation
|
page read and write
|
||
224E5004000
|
trusted library allocation
|
page read and write
|
||
224E262E000
|
trusted library allocation
|
page read and write
|
||
224E2361000
|
trusted library allocation
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
1BA06DB0000
|
heap
|
page read and write
|
||
224D73F3000
|
trusted library allocation
|
page read and write
|
||
224E3799000
|
trusted library allocation
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
224DBB8B000
|
trusted library allocation
|
page read and write
|
||
224DE704000
|
trusted library allocation
|
page read and write
|
||
224DA076000
|
trusted library allocation
|
page read and write
|
||
224DB633000
|
trusted library allocation
|
page read and write
|
||
224E263E000
|
trusted library allocation
|
page read and write
|
||
224E2DCE000
|
trusted library allocation
|
page read and write
|
||
224DCD84000
|
trusted library allocation
|
page read and write
|
||
224DC3B8000
|
trusted library allocation
|
page read and write
|
||
224DA033000
|
trusted library allocation
|
page read and write
|
||
224E4300000
|
trusted library allocation
|
page read and write
|
||
224DB6F6000
|
trusted library allocation
|
page read and write
|
||
224E52B0000
|
trusted library allocation
|
page read and write
|
||
224DC85B000
|
trusted library allocation
|
page read and write
|
||
224DBF36000
|
trusted library allocation
|
page read and write
|
||
224DC49E000
|
trusted library allocation
|
page read and write
|
||
224D12BE000
|
heap
|
page read and write
|
||
224DA56D000
|
trusted library allocation
|
page read and write
|
||
2BBC30BF000
|
unclassified section
|
page read and write
|
||
224DC319000
|
trusted library allocation
|
page read and write
|
||
224D12AC000
|
heap
|
page read and write
|
||
224E263A000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E2653000
|
trusted library allocation
|
page read and write
|
||
224DA643000
|
trusted library allocation
|
page read and write
|
||
224DA2DB000
|
heap
|
page read and write
|
||
224DBBBC000
|
trusted library allocation
|
page read and write
|
||
224D12CF000
|
heap
|
page read and write
|
||
1FAB6ACA000
|
heap
|
page read and write
|
||
224E2479000
|
trusted library allocation
|
page read and write
|
||
224DBC21000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DBD27000
|
trusted library allocation
|
page read and write
|
||
224DB95F000
|
trusted library allocation
|
page read and write
|
||
224E52CC000
|
trusted library allocation
|
page read and write
|
||
224E29F7000
|
trusted library allocation
|
page read and write
|
||
224DB593000
|
trusted library allocation
|
page read and write
|
||
224DB6A8000
|
trusted library allocation
|
page read and write
|
||
224DBDBB000
|
trusted library allocation
|
page read and write
|
||
224D7E3B000
|
trusted library allocation
|
page read and write
|
||
224E4C8F000
|
trusted library allocation
|
page read and write
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
224DB95B000
|
trusted library allocation
|
page read and write
|
||
224D6382000
|
trusted library allocation
|
page read and write
|
||
224DBB5E000
|
trusted library allocation
|
page read and write
|
||
224DBAFB000
|
trusted library allocation
|
page read and write
|
||
224E2EC3000
|
trusted library allocation
|
page read and write
|
||
224E24D4000
|
trusted library allocation
|
page read and write
|
||
224DA655000
|
trusted library allocation
|
page read and write
|
||
224DCDC0000
|
trusted library allocation
|
page read and write
|
||
1BA06E20000
|
heap
|
page read and write
|
||
224DB8BF000
|
trusted library allocation
|
page read and write
|
||
224DB557000
|
trusted library allocation
|
page read and write
|
||
224DBDE4000
|
trusted library allocation
|
page read and write
|
||
2BBC39C1000
|
heap
|
page read and write
|
||
224DB96D000
|
trusted library allocation
|
page read and write
|
||
224DA5D0000
|
trusted library allocation
|
page read and write
|
||
224D130D000
|
heap
|
page read and write
|
||
224DBC3F000
|
trusted library allocation
|
page read and write
|
||
224DDD95000
|
trusted library allocation
|
page read and write
|
||
224E26AA000
|
trusted library allocation
|
page read and write
|
||
224DB6E0000
|
trusted library allocation
|
page read and write
|
||
224DBFF0000
|
trusted library allocation
|
page read and write
|
||
224DCDD3000
|
trusted library allocation
|
page read and write
|
||
224DB7A2000
|
trusted library allocation
|
page read and write
|
||
224E37F3000
|
trusted library allocation
|
page read and write
|
||
224DBD5F000
|
trusted library allocation
|
page read and write
|
||
20A24612000
|
trusted library allocation
|
page read and write
|
||
224DC4B8000
|
trusted library allocation
|
page read and write
|
||
224E222F000
|
trusted library allocation
|
page read and write
|
||
224E297F000
|
trusted library allocation
|
page read and write
|
||
224DB772000
|
trusted library allocation
|
page read and write
|
||
224E2620000
|
trusted library allocation
|
page read and write
|
||
224E2647000
|
trusted library allocation
|
page read and write
|
||
5F9D37E000
|
stack
|
page read and write
|
||
224DB579000
|
trusted library allocation
|
page read and write
|
||
224E26C1000
|
trusted library allocation
|
page read and write
|
||
224E23B7000
|
trusted library allocation
|
page read and write
|
||
224D7EB8000
|
trusted library allocation
|
page read and write
|
||
224E2647000
|
trusted library allocation
|
page read and write
|
||
224E52D1000
|
trusted library allocation
|
page read and write
|
||
224E3A2E000
|
trusted library allocation
|
page read and write
|
||
224D9DE4000
|
trusted library allocation
|
page read and write
|
||
224DA036000
|
trusted library allocation
|
page read and write
|
||
224E2565000
|
trusted library allocation
|
page read and write
|
||
224E23FB000
|
trusted library allocation
|
page read and write
|
||
2BBC3F2B000
|
heap
|
page read and write
|
||
224DC31E000
|
trusted library allocation
|
page read and write
|
||
224DDD8C000
|
trusted library allocation
|
page read and write
|
||
224DB9FC000
|
trusted library allocation
|
page read and write
|
||
224DB8CA000
|
trusted library allocation
|
page read and write
|
||
224D12F6000
|
heap
|
page read and write
|
||
224D62F6000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E2988000
|
trusted library allocation
|
page read and write
|
||
224DB6F3000
|
trusted library allocation
|
page read and write
|
||
224DA792000
|
trusted library allocation
|
page read and write
|
||
224DE727000
|
trusted library allocation
|
page read and write
|
||
224E2516000
|
trusted library allocation
|
page read and write
|
||
224DBC13000
|
trusted library allocation
|
page read and write
|
||
224E23F6000
|
trusted library allocation
|
page read and write
|
||
224D12C5000
|
heap
|
page read and write
|
||
224D9D33000
|
trusted library allocation
|
page read and write
|
||
224DBC45000
|
trusted library allocation
|
page read and write
|
||
224E3A15000
|
trusted library allocation
|
page read and write
|
||
224DA282000
|
heap
|
page read and write
|
||
224DB983000
|
trusted library allocation
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
224DC491000
|
trusted library allocation
|
page read and write
|
||
224E298B000
|
trusted library allocation
|
page read and write
|
||
224DDC6D000
|
trusted library allocation
|
page read and write
|
||
224DB859000
|
trusted library allocation
|
page read and write
|
||
224D73D3000
|
trusted library allocation
|
page read and write
|
||
E6D753E000
|
unkown
|
page readonly
|
||
224E299E000
|
trusted library allocation
|
page read and write
|
||
224E24AB000
|
trusted library allocation
|
page read and write
|
||
224D7EA5000
|
trusted library allocation
|
page read and write
|
||
C34000
|
unkown
|
page readonly
|
||
2BBC39C1000
|
heap
|
page read and write
|
||
224D63C2000
|
trusted library allocation
|
page read and write
|
||
224DA556000
|
trusted library allocation
|
page read and write
|
||
224DC814000
|
trusted library allocation
|
page read and write
|
||
224D12AC000
|
heap
|
page read and write
|
||
224D1308000
|
heap
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224E2527000
|
trusted library allocation
|
page read and write
|
||
224E378B000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224DA7BE000
|
trusted library allocation
|
page read and write
|
||
224D12B1000
|
heap
|
page read and write
|
||
224E3799000
|
trusted library allocation
|
page read and write
|
||
224DA07A000
|
trusted library allocation
|
page read and write
|
||
224E6766000
|
trusted library allocation
|
page read and write
|
||
224DB5E7000
|
trusted library allocation
|
page read and write
|
||
224E26E7000
|
trusted library allocation
|
page read and write
|
||
2BBC39CD000
|
heap
|
page read and write
|
||
224DBC0E000
|
trusted library allocation
|
page read and write
|
||
224E247B000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DA0D2000
|
trusted library allocation
|
page read and write
|
||
224D9D5A000
|
trusted library allocation
|
page read and write
|
||
224E3A28000
|
trusted library allocation
|
page read and write
|
||
224DB928000
|
trusted library allocation
|
page read and write
|
||
224DBFE7000
|
trusted library allocation
|
page read and write
|
||
224E52B0000
|
trusted library allocation
|
page read and write
|
||
224DBBFD000
|
trusted library allocation
|
page read and write
|
||
224DB856000
|
trusted library allocation
|
page read and write
|
||
2BBC3310000
|
trusted library allocation
|
page read and write
|
||
224DBF22000
|
trusted library allocation
|
page read and write
|
||
2BBC39B9000
|
heap
|
page read and write
|
||
1FAB86B1000
|
heap
|
page read and write
|
||
224E27C3000
|
trusted library allocation
|
page read and write
|
||
224DD2AF000
|
trusted library allocation
|
page read and write
|
||
2BBC32D6000
|
heap
|
page read and write
|
||
224E5B3B000
|
trusted library allocation
|
page read and write
|
||
224DA02F000
|
trusted library allocation
|
page read and write
|
||
224E2234000
|
trusted library allocation
|
page read and write
|
||
224DDCB3000
|
trusted library allocation
|
page read and write
|
||
224D9D5D000
|
trusted library allocation
|
page read and write
|
||
224E22D7000
|
trusted library allocation
|
page read and write
|
||
224DB998000
|
trusted library allocation
|
page read and write
|
||
224D638D000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
20A24697000
|
trusted library allocation
|
page read and write
|
||
224E4D47000
|
trusted library allocation
|
page read and write
|
||
224D7366000
|
trusted library allocation
|
page read and write
|
||
224DA068000
|
trusted library allocation
|
page read and write
|
||
2BBC3100000
|
trusted library allocation
|
page read and write
|
||
224DA0AB000
|
trusted library allocation
|
page read and write
|
||
224DA034000
|
trusted library allocation
|
page read and write
|
||
224DA6CB000
|
trusted library allocation
|
page read and write
|
||
224E2477000
|
trusted library allocation
|
page read and write
|
||
224E4D3E000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
1BA071DB000
|
trusted library allocation
|
page read and write
|
||
224DBDD6000
|
trusted library allocation
|
page read and write
|
||
224DB6AD000
|
trusted library allocation
|
page read and write
|
||
224DB4C6000
|
trusted library allocation
|
page read and write
|
||
224DBB83000
|
trusted library allocation
|
page read and write
|
||
224E27DA000
|
trusted library allocation
|
page read and write
|
||
224D12F8000
|
heap
|
page read and write
|
||
224DBBFD000
|
trusted library allocation
|
page read and write
|
||
224D12FA000
|
heap
|
page read and write
|
||
224E2641000
|
trusted library allocation
|
page read and write
|
||
224E52CC000
|
trusted library allocation
|
page read and write
|
||
20A23F8E000
|
remote allocation
|
page execute read
|
||
224E26C1000
|
trusted library allocation
|
page read and write
|
||
224DC426000
|
trusted library allocation
|
page read and write
|
||
224E647A000
|
trusted library allocation
|
page read and write
|
||
224DBCBA000
|
trusted library allocation
|
page read and write
|
||
224DA5D5000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224DA0AB000
|
trusted library allocation
|
page read and write
|
||
224E5900000
|
trusted library allocation
|
page read and write
|
||
224DB96F000
|
trusted library allocation
|
page read and write
|
||
1BA07260000
|
heap
|
page read and write
|
||
224E247B000
|
trusted library allocation
|
page read and write
|
||
224DBB38000
|
trusted library allocation
|
page read and write
|
||
224DBBFE000
|
trusted library allocation
|
page read and write
|
||
224DB96F000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
1FAB6E07000
|
trusted library allocation
|
page read and write
|
||
20A2465B000
|
trusted library allocation
|
page read and write
|
||
224DB653000
|
trusted library allocation
|
page read and write
|
||
224DA798000
|
trusted library allocation
|
page read and write
|
||
224DCDB9000
|
trusted library allocation
|
page read and write
|
||
224D1302000
|
heap
|
page read and write
|
||
224DDCE9000
|
trusted library allocation
|
page read and write
|
||
224DDE00000
|
trusted library allocation
|
page read and write
|
||
14578D00000
|
trusted library allocation
|
page read and write
|
||
224DBFF4000
|
trusted library allocation
|
page read and write
|
||
2BBC3F77000
|
heap
|
page read and write
|
||
224DB695000
|
trusted library allocation
|
page read and write
|
||
224DB7DA000
|
trusted library allocation
|
page read and write
|
||
224DDD95000
|
trusted library allocation
|
page read and write
|
||
224E26E4000
|
trusted library allocation
|
page read and write
|
||
224DB816000
|
trusted library allocation
|
page read and write
|
||
224E2DCA000
|
trusted library allocation
|
page read and write
|
||
224DC397000
|
trusted library allocation
|
page read and write
|
||
224E3AE7000
|
trusted library allocation
|
page read and write
|
||
B7FB9EE000
|
unkown
|
page readonly
|
||
224D63E1000
|
trusted library allocation
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224DA7FB000
|
trusted library allocation
|
page read and write
|
||
224DA7B7000
|
trusted library allocation
|
page read and write
|
||
224DB96F000
|
trusted library allocation
|
page read and write
|
||
C22000
|
unkown
|
page readonly
|
||
224DBAFD000
|
trusted library allocation
|
page read and write
|
||
224DBAC2000
|
trusted library allocation
|
page read and write
|
||
224DB945000
|
trusted library allocation
|
page read and write
|
||
224DC7EE000
|
trusted library allocation
|
page read and write
|
||
224E4CFB000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224DB99D000
|
trusted library allocation
|
page read and write
|
||
224DB65D000
|
trusted library allocation
|
page read and write
|
||
224DA286000
|
heap
|
page read and write
|
||
224E26D5000
|
trusted library allocation
|
page read and write
|
||
224DBB36000
|
trusted library allocation
|
page read and write
|
||
224DE696000
|
trusted library allocation
|
page read and write
|
||
224DCAE1000
|
trusted library allocation
|
page read and write
|
||
224E3A2E000
|
trusted library allocation
|
page read and write
|
||
224D12C8000
|
heap
|
page read and write
|
||
224DC31C000
|
trusted library allocation
|
page read and write
|
||
224E3AF3000
|
trusted library allocation
|
page read and write
|
||
224DA295000
|
heap
|
page read and write
|
||
224DBA7C000
|
trusted library allocation
|
page read and write
|
||
224DA2D4000
|
heap
|
page read and write
|
||
224DBB31000
|
trusted library allocation
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
224DA686000
|
trusted library allocation
|
page read and write
|
||
224E2479000
|
trusted library allocation
|
page read and write
|
||
224DC456000
|
trusted library allocation
|
page read and write
|
||
224DBBFD000
|
trusted library allocation
|
page read and write
|
||
224E6BE3000
|
heap
|
page read and write
|
||
224DD1A7000
|
trusted library allocation
|
page read and write
|
||
224E3A92000
|
trusted library allocation
|
page read and write
|
||
224E2178000
|
trusted library allocation
|
page read and write
|
||
224DB56F000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224DBFDA000
|
trusted library allocation
|
page read and write
|
||
1BA07256000
|
heap
|
page read and write
|
||
224E26DD000
|
trusted library allocation
|
page read and write
|
||
224D9D22000
|
trusted library allocation
|
page read and write
|
||
224DB9A3000
|
trusted library allocation
|
page read and write
|
||
224DB9A3000
|
trusted library allocation
|
page read and write
|
||
224DD2AC000
|
trusted library allocation
|
page read and write
|
||
224DC3F1000
|
trusted library allocation
|
page read and write
|
||
2BBC393C000
|
heap
|
page read and write
|
||
224DA2CA000
|
heap
|
page read and write
|
||
224DB6EB000
|
trusted library allocation
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224D12DB000
|
heap
|
page read and write
|
||
224DC8FA000
|
trusted library allocation
|
page read and write
|
||
224DC308000
|
trusted library allocation
|
page read and write
|
||
224E4E9C000
|
trusted library allocation
|
page read and write
|
||
224DC37A000
|
trusted library allocation
|
page read and write
|
||
224E265F000
|
trusted library allocation
|
page read and write
|
||
224DA2E4000
|
heap
|
page read and write
|
||
224E26F4000
|
trusted library allocation
|
page read and write
|
||
20A24280000
|
heap
|
page read and write
|
||
224DBFF0000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E25ED000
|
trusted library allocation
|
page read and write
|
||
224DBB64000
|
trusted library allocation
|
page read and write
|
||
224DB865000
|
trusted library allocation
|
page read and write
|
||
224E29A0000
|
trusted library allocation
|
page read and write
|
||
224E24A3000
|
trusted library allocation
|
page read and write
|
||
224E2DF4000
|
trusted library allocation
|
page read and write
|
||
224E263E000
|
trusted library allocation
|
page read and write
|
||
224D7380000
|
trusted library allocation
|
page read and write
|
||
224E2477000
|
trusted library allocation
|
page read and write
|
||
224DC3EA000
|
trusted library allocation
|
page read and write
|
||
224E6445000
|
trusted library allocation
|
page read and write
|
||
224E37F3000
|
trusted library allocation
|
page read and write
|
||
224E264F000
|
trusted library allocation
|
page read and write
|
||
224DBC0F000
|
trusted library allocation
|
page read and write
|
||
224DA296000
|
heap
|
page read and write
|
||
224DBDE4000
|
trusted library allocation
|
page read and write
|
||
224DDDBE000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DA584000
|
trusted library allocation
|
page read and write
|
||
224DBC91000
|
trusted library allocation
|
page read and write
|
||
224DA69C000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224E3A37000
|
trusted library allocation
|
page read and write
|
||
224DB557000
|
trusted library allocation
|
page read and write
|
||
224DC3F1000
|
trusted library allocation
|
page read and write
|
||
224E23FB000
|
trusted library allocation
|
page read and write
|
||
224DBD15000
|
trusted library allocation
|
page read and write
|
||
224DBAA7000
|
trusted library allocation
|
page read and write
|
||
224E2668000
|
trusted library allocation
|
page read and write
|
||
224DBDB4000
|
trusted library allocation
|
page read and write
|
||
224DB65E000
|
trusted library allocation
|
page read and write
|
||
224DD187000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E64F8000
|
trusted library allocation
|
page read and write
|
||
224DBDE9000
|
trusted library allocation
|
page read and write
|
||
224DBDD3000
|
trusted library allocation
|
page read and write
|
||
224D5C98000
|
trusted library allocation
|
page read and write
|
||
224E3D00000
|
trusted library allocation
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
2BBC37B6000
|
heap
|
page read and write
|
||
224DB7AA000
|
trusted library allocation
|
page read and write
|
||
20A24663000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224D12B1000
|
heap
|
page read and write
|
||
224E240C000
|
trusted library allocation
|
page read and write
|
||
224E244A000
|
trusted library allocation
|
page read and write
|
||
224E5250000
|
trusted library allocation
|
page read and write
|
||
224E3739000
|
trusted library allocation
|
page read and write
|
||
224DC316000
|
trusted library allocation
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224DA74C000
|
trusted library allocation
|
page read and write
|
||
224DBDD3000
|
trusted library allocation
|
page read and write
|
||
224E2971000
|
trusted library allocation
|
page read and write
|
||
224E2963000
|
trusted library allocation
|
page read and write
|
||
224DA0C7000
|
trusted library allocation
|
page read and write
|
||
224E2616000
|
trusted library allocation
|
page read and write
|
||
224E23EA000
|
trusted library allocation
|
page read and write
|
||
224DCDCD000
|
trusted library allocation
|
page read and write
|
||
224DBCB3000
|
trusted library allocation
|
page read and write
|
||
224D7EB8000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
2BBC3312000
|
trusted library allocation
|
page read and write
|
||
224DB52C000
|
trusted library allocation
|
page read and write
|
||
224E372C000
|
trusted library allocation
|
page read and write
|
||
224DBC52000
|
trusted library allocation
|
page read and write
|
||
224DA661000
|
trusted library allocation
|
page read and write
|
||
2BBC32E0000
|
trusted library allocation
|
page read and write
|
||
224DBF13000
|
trusted library allocation
|
page read and write
|
||
224DB684000
|
trusted library allocation
|
page read and write
|
||
224DB40D000
|
trusted library allocation
|
page read and write
|
||
224D7EA7000
|
trusted library allocation
|
page read and write
|
||
224D12F6000
|
heap
|
page read and write
|
||
224E25DC000
|
trusted library allocation
|
page read and write
|
||
224E2129000
|
trusted library allocation
|
page read and write
|
||
224DC3FB000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224DBCCC000
|
trusted library allocation
|
page read and write
|
||
224D631D000
|
trusted library allocation
|
page read and write
|
||
224E3790000
|
trusted library allocation
|
page read and write
|
||
224DDD6E000
|
trusted library allocation
|
page read and write
|
||
224D12C1000
|
heap
|
page read and write
|
||
224DA04E000
|
trusted library allocation
|
page read and write
|
||
224E29A2000
|
trusted library allocation
|
page read and write
|
||
224E4DCD000
|
trusted library allocation
|
page read and write
|
||
2BBC3939000
|
heap
|
page read and write
|
||
224DA567000
|
trusted library allocation
|
page read and write
|
||
224E252D000
|
trusted library allocation
|
page read and write
|
||
224E3765000
|
trusted library allocation
|
page read and write
|
||
224DBDBB000
|
trusted library allocation
|
page read and write
|
||
224E64E1000
|
trusted library allocation
|
page read and write
|
||
224D1335000
|
heap
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E2549000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E2532000
|
trusted library allocation
|
page read and write
|
||
224DCDAE000
|
trusted library allocation
|
page read and write
|
||
224D7EB8000
|
trusted library allocation
|
page read and write
|
||
224DB7AA000
|
trusted library allocation
|
page read and write
|
||
224E4D73000
|
trusted library allocation
|
page read and write
|
||
224E6B71000
|
heap
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
224E6804000
|
trusted library allocation
|
page read and write
|
||
224E4EBA000
|
trusted library allocation
|
page read and write
|
||
224DBB74000
|
trusted library allocation
|
page read and write
|
||
224E2E8F000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224E4E94000
|
trusted library allocation
|
page read and write
|
||
224E2567000
|
trusted library allocation
|
page read and write
|
||
224E64D9000
|
trusted library allocation
|
page read and write
|
||
224DA64C000
|
trusted library allocation
|
page read and write
|
||
224E26CC000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224DA7BB000
|
trusted library allocation
|
page read and write
|
||
224D6375000
|
trusted library allocation
|
page read and write
|
||
224DC557000
|
trusted library allocation
|
page read and write
|
||
224E3A37000
|
trusted library allocation
|
page read and write
|
||
224D7EA5000
|
trusted library allocation
|
page read and write
|
||
224DBC62000
|
trusted library allocation
|
page read and write
|
||
1BA07400000
|
trusted library allocation
|
page read and write
|
||
224DB80E000
|
trusted library allocation
|
page read and write
|
||
224DB99D000
|
trusted library allocation
|
page read and write
|
||
224DA645000
|
trusted library allocation
|
page read and write
|
||
224DBBBD000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224E525B000
|
trusted library allocation
|
page read and write
|
||
224D876B000
|
trusted library allocation
|
page read and write
|
||
224E2712000
|
trusted library allocation
|
page read and write
|
||
224D63F6000
|
trusted library allocation
|
page read and write
|
||
224DBC63000
|
trusted library allocation
|
page read and write
|
||
224E2569000
|
trusted library allocation
|
page read and write
|
||
224E51D1000
|
trusted library allocation
|
page read and write
|
||
5F99FED000
|
stack
|
page read and write
|
||
224DBDE4000
|
trusted library allocation
|
page read and write
|
||
224DBBDF000
|
trusted library allocation
|
page read and write
|
||
224D63AD000
|
trusted library allocation
|
page read and write
|
||
1BA071F6000
|
trusted library allocation
|
page read and write
|
||
224DB665000
|
trusted library allocation
|
page read and write
|
||
224DA686000
|
trusted library allocation
|
page read and write
|
||
224E2E0B000
|
trusted library allocation
|
page read and write
|
||
1BA07182000
|
trusted library allocation
|
page read and write
|
||
224D9DE9000
|
trusted library allocation
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
224E2135000
|
trusted library allocation
|
page read and write
|
||
224D12C4000
|
heap
|
page read and write
|
||
224E2718000
|
trusted library allocation
|
page read and write
|
||
224D63E4000
|
trusted library allocation
|
page read and write
|
||
224DBFFB000
|
trusted library allocation
|
page read and write
|
||
224D73C7000
|
trusted library allocation
|
page read and write
|
||
224DBDCB000
|
trusted library allocation
|
page read and write
|
||
224DBBC1000
|
trusted library allocation
|
page read and write
|
||
224DBF15000
|
trusted library allocation
|
page read and write
|
||
224DB32F000
|
trusted library allocation
|
page read and write
|
||
224E3746000
|
trusted library allocation
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
224DCD93000
|
trusted library allocation
|
page read and write
|
||
224DE6E1000
|
trusted library allocation
|
page read and write
|
||
224DA594000
|
trusted library allocation
|
page read and write
|
||
224DB676000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224D7EA5000
|
trusted library allocation
|
page read and write
|
||
224DB545000
|
trusted library allocation
|
page read and write
|
||
224DBCF5000
|
trusted library allocation
|
page read and write
|
||
224D63B0000
|
trusted library allocation
|
page read and write
|
||
224E2638000
|
trusted library allocation
|
page read and write
|
||
224DB98D000
|
trusted library allocation
|
page read and write
|
||
1BA07113000
|
trusted library allocation
|
page read and write
|
||
224DBDB4000
|
trusted library allocation
|
page read and write
|
||
224DB53D000
|
trusted library allocation
|
page read and write
|
||
224D12A6000
|
heap
|
page read and write
|
||
224D73A8000
|
trusted library allocation
|
page read and write
|
||
224DB968000
|
trusted library allocation
|
page read and write
|
||
224DB7B8000
|
trusted library allocation
|
page read and write
|
||
224E23FB000
|
trusted library allocation
|
page read and write
|
||
224DA681000
|
trusted library allocation
|
page read and write
|
||
224E37C8000
|
trusted library allocation
|
page read and write
|
||
224DB849000
|
trusted library allocation
|
page read and write
|
||
224E265F000
|
trusted library allocation
|
page read and write
|
||
224DC3AF000
|
trusted library allocation
|
page read and write
|
||
224E45EC000
|
trusted library allocation
|
page read and write
|
||
224D7EF1000
|
trusted library allocation
|
page read and write
|
||
224DB8A0000
|
trusted library allocation
|
page read and write
|
||
224E37A3000
|
trusted library allocation
|
page read and write
|
||
224DD143000
|
trusted library allocation
|
page read and write
|
||
1BA06F00000
|
heap
|
page readonly
|
||
224E675C000
|
trusted library allocation
|
page read and write
|
||
224DCCC1000
|
trusted library allocation
|
page read and write
|
||
224DB6F3000
|
trusted library allocation
|
page read and write
|
||
224D12F8000
|
heap
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224D622F000
|
trusted library allocation
|
page read and write
|
||
224DBBCA000
|
trusted library allocation
|
page read and write
|
||
224DB9AC000
|
trusted library allocation
|
page read and write
|
||
2BBC39CD000
|
heap
|
page read and write
|
||
224DC7CE000
|
trusted library allocation
|
page read and write
|
||
224E372C000
|
trusted library allocation
|
page read and write
|
||
E6D7FD8000
|
stack
|
page read and write
|
||
224DA666000
|
trusted library allocation
|
page read and write
|
||
224DBBCA000
|
trusted library allocation
|
page read and write
|
||
224DA563000
|
trusted library allocation
|
page read and write
|
||
224DA276000
|
heap
|
page read and write
|
||
224E3AA8000
|
trusted library allocation
|
page read and write
|
||
224DC547000
|
trusted library allocation
|
page read and write
|
||
224DC4AE000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
224DC48D000
|
trusted library allocation
|
page read and write
|
||
224DBDDA000
|
trusted library allocation
|
page read and write
|
||
224DB5F9000
|
trusted library allocation
|
page read and write
|
||
224E52B7000
|
trusted library allocation
|
page read and write
|
||
224DC7D1000
|
trusted library allocation
|
page read and write
|
||
224DA57B000
|
trusted library allocation
|
page read and write
|
||
C30000
|
unkown
|
page write copy
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E64BC000
|
trusted library allocation
|
page read and write
|
||
224DB90F000
|
trusted library allocation
|
page read and write
|
||
224E2628000
|
trusted library allocation
|
page read and write
|
||
224DC4B2000
|
trusted library allocation
|
page read and write
|
||
224DB646000
|
trusted library allocation
|
page read and write
|
||
224D9DA9000
|
trusted library allocation
|
page read and write
|
||
224E3AF3000
|
trusted library allocation
|
page read and write
|
||
224DCDD6000
|
trusted library allocation
|
page read and write
|
||
224DBDAE000
|
trusted library allocation
|
page read and write
|
||
224D1301000
|
heap
|
page read and write
|
||
224DB893000
|
trusted library allocation
|
page read and write
|
||
224D12F9000
|
heap
|
page read and write
|
||
224DA7D8000
|
trusted library allocation
|
page read and write
|
||
224D1302000
|
heap
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
224DB968000
|
trusted library allocation
|
page read and write
|
||
224E3799000
|
trusted library allocation
|
page read and write
|
||
224E2971000
|
trusted library allocation
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
20A23F90000
|
unclassified section
|
page readonly
|
||
224DC860000
|
trusted library allocation
|
page read and write
|
||
224DDDFE000
|
trusted library allocation
|
page read and write
|
||
224E6759000
|
trusted library allocation
|
page read and write
|
||
224E2DEB000
|
trusted library allocation
|
page read and write
|
||
224E3A26000
|
trusted library allocation
|
page read and write
|
||
14578AC0000
|
heap
|
page read and write
|
||
224D876E000
|
trusted library allocation
|
page read and write
|
||
224E22F6000
|
trusted library allocation
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224DBFC7000
|
trusted library allocation
|
page read and write
|
||
224DB6B4000
|
trusted library allocation
|
page read and write
|
||
224DB7A1000
|
trusted library allocation
|
page read and write
|
||
224DBD4A000
|
trusted library allocation
|
page read and write
|
||
224DA0AF000
|
trusted library allocation
|
page read and write
|
||
224DBDD3000
|
trusted library allocation
|
page read and write
|
||
224E29BA000
|
trusted library allocation
|
page read and write
|
||
224E3A20000
|
trusted library allocation
|
page read and write
|
||
224D73C2000
|
trusted library allocation
|
page read and write
|
||
224DBB2C000
|
trusted library allocation
|
page read and write
|
||
224DB3A1000
|
trusted library allocation
|
page read and write
|
||
224D1302000
|
heap
|
page read and write
|
||
224E4576000
|
trusted library allocation
|
page read and write
|
||
224E23CF000
|
trusted library allocation
|
page read and write
|
||
224E525B000
|
trusted library allocation
|
page read and write
|
||
224E3A2E000
|
trusted library allocation
|
page read and write
|
||
224E3A5E000
|
trusted library allocation
|
page read and write
|
||
224E223F000
|
trusted library allocation
|
page read and write
|
||
224DBB26000
|
trusted library allocation
|
page read and write
|
||
224DBAAB000
|
trusted library allocation
|
page read and write
|
||
224DB96D000
|
trusted library allocation
|
page read and write
|
||
224D9D91000
|
trusted library allocation
|
page read and write
|
||
224DB674000
|
trusted library allocation
|
page read and write
|
||
13CF000
|
stack
|
page read and write
|
||
224DA276000
|
heap
|
page read and write
|
||
224DBB9F000
|
trusted library allocation
|
page read and write
|
||
224DE783000
|
trusted library allocation
|
page read and write
|
||
224DDDBA000
|
trusted library allocation
|
page read and write
|
||
224D7E69000
|
trusted library allocation
|
page read and write
|
||
224E29B3000
|
trusted library allocation
|
page read and write
|
||
224DBBEE000
|
trusted library allocation
|
page read and write
|
||
224D12A0000
|
heap
|
page read and write
|
||
224D7EE6000
|
trusted library allocation
|
page read and write
|
||
224E25F6000
|
trusted library allocation
|
page read and write
|
||
224DD1FD000
|
trusted library allocation
|
page read and write
|
||
224E41A8000
|
trusted library allocation
|
page read and write
|
||
224D7EC9000
|
trusted library allocation
|
page read and write
|
||
224DBB29000
|
trusted library allocation
|
page read and write
|
||
224E26E4000
|
trusted library allocation
|
page read and write
|
||
224E2644000
|
trusted library allocation
|
page read and write
|
||
224E2232000
|
trusted library allocation
|
page read and write
|
||
224E262B000
|
trusted library allocation
|
page read and write
|
||
224E4F59000
|
trusted library allocation
|
page read and write
|
||
1BA0715D000
|
trusted library allocation
|
page read and write
|
||
224DB6B1000
|
trusted library allocation
|
page read and write
|
||
224E2549000
|
trusted library allocation
|
page read and write
|
||
224DBF19000
|
trusted library allocation
|
page read and write
|
||
224DDCF4000
|
trusted library allocation
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
224D7E1F000
|
trusted library allocation
|
page read and write
|
||
224D12B7000
|
heap
|
page read and write
|
||
2BBC3930000
|
heap
|
page read and write
|
||
224D7EC9000
|
trusted library allocation
|
page read and write
|
||
2BBC2EC0000
|
remote allocation
|
page execute read
|
||
224DB8B2000
|
trusted library allocation
|
page read and write
|
||
224DDD68000
|
trusted library allocation
|
page read and write
|
||
224E4573000
|
trusted library allocation
|
page read and write
|
||
2BBC394D000
|
heap
|
page read and write
|
||
2BBC39B0000
|
heap
|
page read and write
|
||
224E64BE000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224E6B89000
|
heap
|
page read and write
|
||
224E26FD000
|
trusted library allocation
|
page read and write
|
||
20A245B0000
|
heap
|
page read and write
|
||
224E3756000
|
trusted library allocation
|
page read and write
|
||
224DB827000
|
trusted library allocation
|
page read and write
|
||
224DB531000
|
trusted library allocation
|
page read and write
|
||
224D129E000
|
heap
|
page read and write
|
||
224DB7A5000
|
trusted library allocation
|
page read and write
|
||
224DBB5A000
|
trusted library allocation
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
1FAB86AD000
|
heap
|
page read and write
|
||
224D7EAE000
|
trusted library allocation
|
page read and write
|
||
224DCDF7000
|
trusted library allocation
|
page read and write
|
||
224DA246000
|
heap
|
page read and write
|
||
224D6271000
|
trusted library allocation
|
page read and write
|
||
224E25F6000
|
trusted library allocation
|
page read and write
|
||
224DA03C000
|
trusted library allocation
|
page read and write
|
||
224DBC94000
|
trusted library allocation
|
page read and write
|
||
1BA07254000
|
heap
|
page read and write
|
||
224DCDFC000
|
trusted library allocation
|
page read and write
|
||
224E3AE2000
|
trusted library allocation
|
page read and write
|
||
224D1314000
|
heap
|
page read and write
|
||
20A23FB0000
|
heap
|
page read and write
|
||
224D9D62000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
224E26E7000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224DAA1A000
|
trusted library allocation
|
page read and write
|
||
224D7EBE000
|
trusted library allocation
|
page read and write
|
||
224DBDC4000
|
trusted library allocation
|
page read and write
|
||
224DAAF0000
|
trusted library allocation
|
page read and write
|
||
224D12F8000
|
heap
|
page read and write
|
||
2BBC3376000
|
trusted library allocation
|
page read and write
|
||
224D9DED000
|
trusted library allocation
|
page read and write
|
||
224DA282000
|
heap
|
page read and write
|
||
224D12F5000
|
heap
|
page read and write
|
||
224DB93C000
|
trusted library allocation
|
page read and write
|
||
224E2183000
|
trusted library allocation
|
page read and write
|
||
224E6B47000
|
heap
|
page read and write
|
||
224D63AC000
|
trusted library allocation
|
page read and write
|
||
224E513C000
|
trusted library allocation
|
page read and write
|
||
224DA567000
|
trusted library allocation
|
page read and write
|
||
224DB6EB000
|
trusted library allocation
|
page read and write
|
||
224DBF1F000
|
trusted library allocation
|
page read and write
|
||
224DA6A2000
|
trusted library allocation
|
page read and write
|
||
224DA2CA000
|
heap
|
page read and write
|
||
224DBDC6000
|
trusted library allocation
|
page read and write
|
||
224D73E2000
|
trusted library allocation
|
page read and write
|
||
224E379F000
|
trusted library allocation
|
page read and write
|
||
224DBBD7000
|
trusted library allocation
|
page read and write
|
||
224DA7B1000
|
trusted library allocation
|
page read and write
|
||
224DBDC4000
|
trusted library allocation
|
page read and write
|
||
224D12C5000
|
heap
|
page read and write
|
||
224DB977000
|
trusted library allocation
|
page read and write
|
||
224DDD84000
|
trusted library allocation
|
page read and write
|
||
224D12ED000
|
heap
|
page read and write
|
||
224DA068000
|
trusted library allocation
|
page read and write
|
||
1FAB6C00000
|
trusted library allocation
|
page read and write
|
||
2BBC2E60000
|
unclassified section
|
page readonly
|
||
224E29B1000
|
trusted library allocation
|
page read and write
|
||
224E272B000
|
trusted library allocation
|
page read and write
|
||
2BBC3365000
|
trusted library allocation
|
page read and write
|
||
2BBC33CE000
|
trusted library allocation
|
page read and write
|
||
224DBA63000
|
trusted library allocation
|
page read and write
|
||
224E21D4000
|
trusted library allocation
|
page read and write
|
||
224DB310000
|
trusted library allocation
|
page read and write
|
||
224DBDA7000
|
trusted library allocation
|
page read and write
|
||
224D12AC000
|
heap
|
page read and write
|
||
2BBC39CD000
|
heap
|
page read and write
|
||
224D1330000
|
heap
|
page read and write
|
||
224E4D5D000
|
trusted library allocation
|
page read and write
|
||
B7FC3D8000
|
stack
|
page read and write
|
||
224DBD5F000
|
trusted library allocation
|
page read and write
|
||
224D5CF5000
|
trusted library allocation
|
page read and write
|
||
224E379F000
|
trusted library allocation
|
page read and write
|
||
1513000
|
heap
|
page read and write
|
||
224DB4A0000
|
trusted library allocation
|
page read and write
|
||
224DB9BB000
|
trusted library allocation
|
page read and write
|
||
1502000
|
heap
|
page read and write
|
||
224E3AF1000
|
trusted library allocation
|
page read and write
|
||
224DC4A8000
|
trusted library allocation
|
page read and write
|
||
224DDD42000
|
trusted library allocation
|
page read and write
|
||
224DBBFA000
|
trusted library allocation
|
page read and write
|
||
224E3734000
|
trusted library allocation
|
page read and write
|
||
224D12B5000
|
heap
|
page read and write
|
||
224E3AC9000
|
trusted library allocation
|
page read and write
|
||
2BBC3790000
|
heap
|
page read and write
|
||
224DDCBC000
|
trusted library allocation
|
page read and write
|
||
331B2DC1000
|
trusted library allocation
|
page execute read
|
||
224D12A6000
|
heap
|
page read and write
|
||
224DA2F2000
|
heap
|
page read and write
|
||
224DB56F000
|
trusted library allocation
|
page read and write
|
||
224DC491000
|
trusted library allocation
|
page read and write
|
||
224E4C26000
|
trusted library allocation
|
page read and write
|
||
224D12AF000
|
heap
|
page read and write
|
||
224DBDD6000
|
trusted library allocation
|
page read and write
|
||
1BA06F20000
|
heap
|
page read and write
|
||
224DC7E6000
|
trusted library allocation
|
page read and write
|
||
224DB830000
|
trusted library allocation
|
page read and write
|
||
20A245B6000
|
heap
|
page read and write
|
||
224E4C42000
|
trusted library allocation
|
page read and write
|
||
224DCDC0000
|
trusted library allocation
|
page read and write
|
||
2BBC30B2000
|
unclassified section
|
page read and write
|
||
224DB9D3000
|
trusted library allocation
|
page read and write
|
||
224DB620000
|
trusted library allocation
|
page read and write
|
||
20A24702000
|
heap
|
page read and write
|
||
224D1335000
|
heap
|
page read and write
|
||
224DA567000
|
trusted library allocation
|
page read and write
|
||
224DB659000
|
trusted library allocation
|
page read and write
|
||
224E4DB3000
|
trusted library allocation
|
page read and write
|
||
224E3A26000
|
trusted library allocation
|
page read and write
|
||
224DA575000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224DDDF6000
|
trusted library allocation
|
page read and write
|
||
224DA0AB000
|
trusted library allocation
|
page read and write
|
||
224DDCC6000
|
trusted library allocation
|
page read and write
|
||
224DBF65000
|
trusted library allocation
|
page read and write
|
||
224D12EF000
|
heap
|
page read and write
|
||
224E26DA000
|
trusted library allocation
|
page read and write
|
||
224D12B6000
|
heap
|
page read and write
|
||
224DBBEC000
|
trusted library allocation
|
page read and write
|
There are 3649 hidden memdumps, click here to show them.