Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1015e190-15b2-4716-b5c7-ad8b44e39a46.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1015e190-15b2-4716-b5c7-ad8b44e39a46.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\40f21b95-51e8-4ff3-be33-9bb1eaeaa26e
(copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\40f21b95-51e8-4ff3-be33-9bb1eaeaa26e.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 27 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2248
-prefMapHandle 2240 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {0e7b3aae-bb56-4284-a807-6c1b23098845} 6940 "\\.\pipe\gecko-crash-server-pipe.6940" 1a3d5270310 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4040 -parentBuildID 20230927232528 -prefsHandle 3952
-prefMapHandle 3860 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7189440-4594-4ad1-9e14-9f55c229bd4f}
6940 "\\.\pipe\gecko-crash-server-pipe.6940" 1a3e7452b10 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1496 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 4888 -prefMapHandle 4872 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {966cd51a-fee3-4338-b9d0-f8655f97fe69} 6940 "\\.\pipe\gecko-crash-server-pipe.6940" 1a3f108fd10 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema.
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2020-12/schema/=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://www.instagram.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://truecolors.firefox.com/
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://gpuweb.github.io/gpuweb/
|
unknown
|
||
https://relay.firefox.com/api/v1/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.251.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.65
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.129.91
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.185.206
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
142.250.186.78
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.193.140
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.185.206
|
youtube.com
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
151.101.129.91
|
services.addons.mozilla.org
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A3DC066000
|
heap
|
page read and write
|
||
8FE03D8000
|
stack
|
page read and write
|
||
1A3ED3EA000
|
trusted library allocation
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFF2000
|
heap
|
page read and write
|
||
1A3ED13D000
|
trusted library allocation
|
page read and write
|
||
1E58EFA0000
|
heap
|
page read and write
|
||
1A3E742B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3DBFD9000
|
heap
|
page read and write
|
||
1A3ED198000
|
trusted library allocation
|
page read and write
|
||
1A3E5E13000
|
trusted library allocation
|
page read and write
|
||
1D906761000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E6969000
|
trusted library allocation
|
page read and write
|
||
1A3E5EA8000
|
trusted library allocation
|
page read and write
|
||
1A3EE136000
|
trusted library allocation
|
page read and write
|
||
1A3EE0B3000
|
trusted library allocation
|
page read and write
|
||
1A3E6B1D000
|
trusted library allocation
|
page read and write
|
||
1A3ED577000
|
trusted library allocation
|
page read and write
|
||
1A3E6256000
|
trusted library allocation
|
page read and write
|
||
1A3E53B9000
|
trusted library allocation
|
page read and write
|
||
1A3ED6CF000
|
trusted library allocation
|
page read and write
|
||
1A3ED3EA000
|
trusted library allocation
|
page read and write
|
||
1A3EE0F5000
|
trusted library allocation
|
page read and write
|
||
1A3E224D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3ED576000
|
trusted library allocation
|
page read and write
|
||
1A3E4F55000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE4000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DC049000
|
heap
|
page read and write
|
||
1A3E89ED000
|
trusted library allocation
|
page read and write
|
||
1A3E50BE000
|
trusted library allocation
|
page read and write
|
||
1A3E6A5D000
|
trusted library allocation
|
page read and write
|
||
1A3F1605000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E6AFD000
|
trusted library allocation
|
page read and write
|
||
1D90672B000
|
heap
|
page read and write
|
||
1A3E6653000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E6ACD000
|
trusted library allocation
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1A3ED39A000
|
trusted library allocation
|
page read and write
|
||
1A3E20E4000
|
trusted library allocation
|
page read and write
|
||
1CA8DB94000
|
trusted library allocation
|
page read and write
|
||
1A3E7A1E000
|
trusted library allocation
|
page read and write
|
||
1A3ED696000
|
trusted library allocation
|
page read and write
|
||
1A3E88A3000
|
trusted library allocation
|
page read and write
|
||
1A3ED1EE000
|
trusted library allocation
|
page read and write
|
||
1A3E6586000
|
trusted library allocation
|
page read and write
|
||
1A3E28D1000
|
heap
|
page read and write
|
||
1A3ED53B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3EE113000
|
trusted library allocation
|
page read and write
|
||
1A3EE04C000
|
trusted library allocation
|
page read and write
|
||
1A3E6BAE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1E58D3D0000
|
heap
|
page read and write
|
||
1A3ED149000
|
trusted library allocation
|
page read and write
|
||
1D90677B000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3EE2F5000
|
trusted library allocation
|
page read and write
|
||
1A3E7A3C000
|
trusted library allocation
|
page read and write
|
||
A0B7F2B000
|
stack
|
page read and write
|
||
1A3E74B6000
|
trusted library allocation
|
page read and write
|
||
1A3E6BF8000
|
trusted library allocation
|
page read and write
|
||
1A3E6A23000
|
trusted library allocation
|
page read and write
|
||
1A3E68EB000
|
trusted library allocation
|
page read and write
|
||
1D9067B7000
|
heap
|
page read and write
|
||
1A3ED5A0000
|
trusted library allocation
|
page read and write
|
||
1A3E67FB000
|
trusted library allocation
|
page read and write
|
||
1A3E6B29000
|
trusted library allocation
|
page read and write
|
||
1A3ED0AC000
|
trusted library allocation
|
page read and write
|
||
1A3E62A3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E6A90000
|
trusted library allocation
|
page read and write
|
||
1A3E619B000
|
trusted library allocation
|
page read and write
|
||
1D905900000
|
trusted library allocation
|
page read and write
|
||
1A3E6B06000
|
trusted library allocation
|
page read and write
|
||
1A3E7C9A000
|
trusted library allocation
|
page read and write
|
||
1D9067B7000
|
heap
|
page read and write
|
||
1A3E6BE2000
|
trusted library allocation
|
page read and write
|
||
1A3EE143000
|
trusted library allocation
|
page read and write
|
||
1A3E65B2000
|
trusted library allocation
|
page read and write
|
||
1D906784000
|
heap
|
page read and write
|
||
1A3E65A1000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1CA8D9C0000
|
heap
|
page read and write
|
||
1A3ED5BA000
|
trusted library allocation
|
page read and write
|
||
64379FF000
|
stack
|
page read and write
|
||
1A3E8667000
|
trusted library allocation
|
page read and write
|
||
1A3E6A13000
|
trusted library allocation
|
page read and write
|
||
1A3F1596000
|
trusted library allocation
|
page read and write
|
||
1A3F1570000
|
trusted library allocation
|
page read and write
|
||
1A3E6AF6000
|
trusted library allocation
|
page read and write
|
||
1A3EE148000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3ED4FB000
|
trusted library allocation
|
page read and write
|
||
1A3E4F45000
|
trusted library allocation
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1A3EE0F5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E61B6000
|
trusted library allocation
|
page read and write
|
||
1A3E668C000
|
trusted library allocation
|
page read and write
|
||
1A3E76C8000
|
trusted library allocation
|
page read and write
|
||
1A3E92F9000
|
trusted library allocation
|
page read and write
|
||
1A3ED0C4000
|
trusted library allocation
|
page read and write
|
||
1A3E6A71000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3E6A45000
|
trusted library allocation
|
page read and write
|
||
1E58EFBE000
|
heap
|
page read and write
|
||
1A3EE124000
|
trusted library allocation
|
page read and write
|
||
1A3E503B000
|
trusted library allocation
|
page read and write
|
||
1D9067AC000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3E664E000
|
trusted library allocation
|
page read and write
|
||
1A3ED13B000
|
trusted library allocation
|
page read and write
|
||
1A3F11DF000
|
trusted library allocation
|
page read and write
|
||
1A3F0A97000
|
trusted library allocation
|
page read and write
|
||
1A3E9304000
|
trusted library allocation
|
page read and write
|
||
1A3ED5E8000
|
trusted library allocation
|
page read and write
|
||
1A3E6A33000
|
trusted library allocation
|
page read and write
|
||
1A3E86F8000
|
trusted library allocation
|
page read and write
|
||
1A3F1605000
|
heap
|
page read and write
|
||
1CA8DD05000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE5000
|
heap
|
page read and write
|
||
1C22AE09000
|
heap
|
page read and write
|
||
1A3E50C4000
|
trusted library allocation
|
page read and write
|
||
1A3ED0B6000
|
trusted library allocation
|
page read and write
|
||
1A3E652B000
|
trusted library allocation
|
page read and write
|
||
1A3E8BDE000
|
trusted library allocation
|
page read and write
|
||
1A3E669B000
|
trusted library allocation
|
page read and write
|
||
1A3F0628000
|
trusted library allocation
|
page read and write
|
||
8FE25FE000
|
stack
|
page read and write
|
||
1A3E6AC4000
|
trusted library allocation
|
page read and write
|
||
1A3DC038000
|
heap
|
page read and write
|
||
1A3F14EC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E5BB2000
|
trusted library allocation
|
page read and write
|
||
1A3E22F0000
|
trusted library allocation
|
page read and write
|
||
1A3F0A3A000
|
trusted library allocation
|
page read and write
|
||
1A3E690A000
|
trusted library allocation
|
page read and write
|
||
1A3E5067000
|
trusted library allocation
|
page read and write
|
||
1A3E4B77000
|
trusted library allocation
|
page read and write
|
||
1A3E7578000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3E62AE000
|
trusted library allocation
|
page read and write
|
||
20AA3F00000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1A3F16C5000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E6AB5000
|
trusted library allocation
|
page read and write
|
||
1A3E2669000
|
trusted library allocation
|
page read and write
|
||
1A3EDB2A000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3F1661000
|
heap
|
page read and write
|
||
1A3E5E61000
|
trusted library allocation
|
page read and write
|
||
1A3E09F8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E6A43000
|
trusted library allocation
|
page read and write
|
||
1A3E69B4000
|
trusted library allocation
|
page read and write
|
||
1A3ED3C3000
|
trusted library allocation
|
page read and write
|
||
1A3EE0B6000
|
trusted library allocation
|
page read and write
|
||
20AA39EA000
|
heap
|
page read and write
|
||
1A3EDBEF000
|
trusted library allocation
|
page read and write
|
||
20AA3880000
|
heap
|
page read and write
|
||
1B0000
|
unkown
|
page write copy
|
||
20AA3C76000
|
trusted library allocation
|
page read and write
|
||
1D905A0A000
|
trusted library allocation
|
page read and write
|
||
1A3E91B1000
|
trusted library allocation
|
page read and write
|
||
1A3E1075000
|
trusted library allocation
|
page read and write
|
||
1A3F16EB000
|
heap
|
page read and write
|
||
1A3E69C1000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3ED1F8000
|
trusted library allocation
|
page read and write
|
||
1A3E6567000
|
trusted library allocation
|
page read and write
|
||
1A3E6B48000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3E6A67000
|
trusted library allocation
|
page read and write
|
||
1A3DBFFA000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED6B4000
|
trusted library allocation
|
page read and write
|
||
1A3E5E60000
|
trusted library allocation
|
page read and write
|
||
1A3E5E38000
|
trusted library allocation
|
page read and write
|
||
1A3E69D1000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
13B6000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E26F4000
|
trusted library allocation
|
page read and write
|
||
1D9066AC000
|
heap
|
page read and write
|
||
1A3E6B27000
|
trusted library allocation
|
page read and write
|
||
1A3EE2D8000
|
trusted library allocation
|
page read and write
|
||
1A3EE19B000
|
trusted library allocation
|
page read and write
|
||
1A3E8B53000
|
trusted library allocation
|
page read and write
|
||
1A3EF7CF000
|
trusted library allocation
|
page read and write
|
||
1A3ED12B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E6694000
|
trusted library allocation
|
page read and write
|
||
1D9066AC000
|
heap
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3E6BC6000
|
trusted library allocation
|
page read and write
|
||
1A3E20F8000
|
trusted library allocation
|
page read and write
|
||
FDB000
|
stack
|
page read and write
|
||
1A3F139B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFD8000
|
heap
|
page read and write
|
||
1A3ED0E3000
|
trusted library allocation
|
page read and write
|
||
1A3E69DF000
|
trusted library allocation
|
page read and write
|
||
1A3F10FE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3E6AB2000
|
trusted library allocation
|
page read and write
|
||
1D9066BD000
|
heap
|
page read and write
|
||
1A3E7AAC000
|
trusted library allocation
|
page read and write
|
||
1A3F11A8000
|
trusted library allocation
|
page read and write
|
||
1A3EE042000
|
trusted library allocation
|
page read and write
|
||
1A3E20E8000
|
trusted library allocation
|
page read and write
|
||
1A3F06B4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3ED4F0000
|
trusted library allocation
|
page read and write
|
||
1A3E4BFE000
|
trusted library allocation
|
page read and write
|
||
1A3EFE02000
|
trusted library allocation
|
page read and write
|
||
1A3E6292000
|
trusted library allocation
|
page read and write
|
||
1A3EEBFC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3DC002000
|
heap
|
page read and write
|
||
1A3ED29C000
|
trusted library allocation
|
page read and write
|
||
1A3E6A7F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E5E55000
|
trusted library allocation
|
page read and write
|
||
1A3E8BD5000
|
trusted library allocation
|
page read and write
|
||
1A3E67B2000
|
trusted library allocation
|
page read and write
|
||
1A3F0AC0000
|
trusted library allocation
|
page read and write
|
||
1D906798000
|
heap
|
page read and write
|
||
1A3E69E4000
|
trusted library allocation
|
page read and write
|
||
1D9067B7000
|
heap
|
page read and write
|
||
1A3E6AE0000
|
trusted library allocation
|
page read and write
|
||
1A3ED12D000
|
trusted library allocation
|
page read and write
|
||
1A3DC039000
|
heap
|
page read and write
|
||
456BFF000
|
stack
|
page read and write
|
||
1A3EE03D000
|
trusted library allocation
|
page read and write
|
||
1A3EEBB1000
|
trusted library allocation
|
page read and write
|
||
1A3F0631000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E203F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1D905A12000
|
trusted library allocation
|
page read and write
|
||
1A3E6BD8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFB4000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3ED6BA000
|
trusted library allocation
|
page read and write
|
||
1A3E5190000
|
trusted library allocation
|
page read and write
|
||
1A3E109C000
|
trusted library allocation
|
page read and write
|
||
20AA3C13000
|
trusted library allocation
|
page read and write
|
||
1A3E6955000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3F10FE000
|
trusted library allocation
|
page read and write
|
||
1A3ED1CD000
|
trusted library allocation
|
page read and write
|
||
1D905AC5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3ED693000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E5EAB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E69B4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3EE2F4000
|
trusted library allocation
|
page read and write
|
||
1A3ED4F7000
|
trusted library allocation
|
page read and write
|
||
1A3ED3FD000
|
trusted library allocation
|
page read and write
|
||
1A3ED66F000
|
trusted library allocation
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
1A3EE06F000
|
trusted library allocation
|
page read and write
|
||
1D905A10000
|
trusted library allocation
|
page read and write
|
||
1A3E657D000
|
trusted library allocation
|
page read and write
|
||
1A3EE0CC000
|
trusted library allocation
|
page read and write
|
||
1A3E6A30000
|
trusted library allocation
|
page read and write
|
||
1A3E6B1F000
|
trusted library allocation
|
page read and write
|
||
1A3E668C000
|
trusted library allocation
|
page read and write
|
||
1A3EE13A000
|
trusted library allocation
|
page read and write
|
||
1A3E7C5A000
|
trusted library allocation
|
page read and write
|
||
1A3ED417000
|
trusted library allocation
|
page read and write
|
||
1A3F135B000
|
trusted library allocation
|
page read and write
|
||
1A3EEBF9000
|
trusted library allocation
|
page read and write
|
||
1A3EDBE6000
|
trusted library allocation
|
page read and write
|
||
1B4000
|
unkown
|
page readonly
|
||
1A3E6720000
|
trusted library allocation
|
page read and write
|
||
20AA3C49000
|
trusted library allocation
|
page read and write
|
||
1A3E5EA6000
|
trusted library allocation
|
page read and write
|
||
13B6000
|
heap
|
page read and write
|
||
1A3F0631000
|
trusted library allocation
|
page read and write
|
||
1A3F06C6000
|
trusted library allocation
|
page read and write
|
||
1A3ED67C000
|
trusted library allocation
|
page read and write
|
||
1A3E7C7A000
|
trusted library allocation
|
page read and write
|
||
1A3EDB48000
|
trusted library allocation
|
page read and write
|
||
1A3EE148000
|
trusted library allocation
|
page read and write
|
||
1A3E20EA000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3E664C000
|
trusted library allocation
|
page read and write
|
||
1A3E6AE0000
|
trusted library allocation
|
page read and write
|
||
1A3E658A000
|
trusted library allocation
|
page read and write
|
||
1A3F16C0000
|
heap
|
page read and write
|
||
1A3E7CF0000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3DBFC1000
|
heap
|
page read and write
|
||
1A3E65F1000
|
trusted library allocation
|
page read and write
|
||
1A3F0A38000
|
trusted library allocation
|
page read and write
|
||
1A3E099E000
|
trusted library allocation
|
page read and write
|
||
1A3E684F000
|
trusted library allocation
|
page read and write
|
||
1D9067B7000
|
heap
|
page read and write
|
||
1A3E2659000
|
trusted library allocation
|
page read and write
|
||
1A3F11A8000
|
trusted library allocation
|
page read and write
|
||
1A3EDB97000
|
trusted library allocation
|
page read and write
|
||
1A3E617B000
|
trusted library allocation
|
page read and write
|
||
1A3ED016000
|
trusted library allocation
|
page read and write
|
||
1A3E5B69000
|
trusted library allocation
|
page read and write
|
||
1D905A5C000
|
trusted library allocation
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3F0657000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE4000
|
trusted library allocation
|
page read and write
|
||
1A3E75A3000
|
trusted library allocation
|
page read and write
|
||
20AA3C73000
|
trusted library allocation
|
page read and write
|
||
1A3E5E25000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED02C000
|
trusted library allocation
|
page read and write
|
||
1A3E744F000
|
trusted library allocation
|
page read and write
|
||
1A3E6650000
|
trusted library allocation
|
page read and write
|
||
1D90673C000
|
heap
|
page read and write
|
||
1A3DBFB7000
|
heap
|
page read and write
|
||
1A3E2659000
|
trusted library allocation
|
page read and write
|
||
1A3E7CF8000
|
trusted library allocation
|
page read and write
|
||
1A3ED19B000
|
trusted library allocation
|
page read and write
|
||
1A3EE1F9000
|
trusted library allocation
|
page read and write
|
||
1A3E8B4D000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3E6134000
|
trusted library allocation
|
page read and write
|
||
1A3ED0F5000
|
trusted library allocation
|
page read and write
|
||
1A3E69BC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE3000
|
heap
|
page read and write
|
||
1A3EE03C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3EE167000
|
trusted library allocation
|
page read and write
|
||
1A3E665F000
|
trusted library allocation
|
page read and write
|
||
1A3E8990000
|
trusted library allocation
|
page read and write
|
||
FAD91AE000
|
stack
|
page read and write
|
||
1A3E6A75000
|
trusted library allocation
|
page read and write
|
||
1A3EE033000
|
trusted library allocation
|
page read and write
|
||
1A3ED4F0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3E885B000
|
trusted library allocation
|
page read and write
|
||
1D905A78000
|
trusted library allocation
|
page read and write
|
||
A0BB27E000
|
stack
|
page read and write
|
||
20AA3CC4000
|
trusted library allocation
|
page read and write
|
||
1A3ED5B2000
|
trusted library allocation
|
page read and write
|
||
1A3ED3A5000
|
trusted library allocation
|
page read and write
|
||
1A3EE195000
|
trusted library allocation
|
page read and write
|
||
1A3E6A8E000
|
trusted library allocation
|
page read and write
|
||
1A3EDBA1000
|
trusted library allocation
|
page read and write
|
||
1A3E68E8000
|
trusted library allocation
|
page read and write
|
||
1A3EE068000
|
trusted library allocation
|
page read and write
|
||
1A3EE067000
|
trusted library allocation
|
page read and write
|
||
1A3E20EF000
|
trusted library allocation
|
page read and write
|
||
1A3EEBCA000
|
trusted library allocation
|
page read and write
|
||
1A3F0617000
|
trusted library allocation
|
page read and write
|
||
1A3F0A97000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E5EA6000
|
trusted library allocation
|
page read and write
|
||
1A3E61AA000
|
trusted library allocation
|
page read and write
|
||
1A3E6B21000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
8FE2DFE000
|
unkown
|
page readonly
|
||
1A3E6BEE000
|
trusted library allocation
|
page read and write
|
||
1A3E6293000
|
trusted library allocation
|
page read and write
|
||
1CA8D970000
|
heap
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3E5E5B000
|
trusted library allocation
|
page read and write
|
||
1A3E657D000
|
trusted library allocation
|
page read and write
|
||
1A3E5095000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E551E000
|
trusted library allocation
|
page read and write
|
||
1A3E615C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E22EB000
|
trusted library allocation
|
page read and write
|
||
1A3EE048000
|
trusted library allocation
|
page read and write
|
||
1A3ED3F4000
|
trusted library allocation
|
page read and write
|
||
1A3E51B3000
|
trusted library allocation
|
page read and write
|
||
1A3E0F76000
|
trusted library allocation
|
page read and write
|
||
1A3E6943000
|
trusted library allocation
|
page read and write
|
||
1A3E5E05000
|
trusted library allocation
|
page read and write
|
||
1A3E0981000
|
trusted library allocation
|
page read and write
|
||
1A3E669D000
|
trusted library allocation
|
page read and write
|
||
1A3F16A8000
|
heap
|
page read and write
|
||
1A3ED1CD000
|
trusted library allocation
|
page read and write
|
||
1A3E6B04000
|
trusted library allocation
|
page read and write
|
||
1A3EDB0C000
|
trusted library allocation
|
page read and write
|
||
1A3E8651000
|
trusted library allocation
|
page read and write
|
||
1A3F169D000
|
heap
|
page read and write
|
||
1A3E6AB5000
|
trusted library allocation
|
page read and write
|
||
1A3ED6AA000
|
trusted library allocation
|
page read and write
|
||
1A3E6ACA000
|
trusted library allocation
|
page read and write
|
||
1CA8DB97000
|
trusted library allocation
|
page read and write
|
||
1A3E7AB6000
|
trusted library allocation
|
page read and write
|
||
1A3EDCD5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E699F000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE4000
|
trusted library allocation
|
page read and write
|
||
1A3F1574000
|
trusted library allocation
|
page read and write
|
||
1A3F15CE000
|
trusted library allocation
|
page read and write
|
||
1A3EE16C000
|
trusted library allocation
|
page read and write
|
||
1A3E518F000
|
trusted library allocation
|
page read and write
|
||
1A3ED6AD000
|
trusted library allocation
|
page read and write
|
||
1A3E75B2000
|
trusted library allocation
|
page read and write
|
||
1A3E615C000
|
trusted library allocation
|
page read and write
|
||
1A3F1720000
|
heap
|
page read and write
|
||
1A3ED6F7000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1D9066A0000
|
heap
|
page read and write
|
||
1A3EDB0F000
|
trusted library allocation
|
page read and write
|
||
1A3ED1F8000
|
trusted library allocation
|
page read and write
|
||
1A3E4B7A000
|
trusted library allocation
|
page read and write
|
||
1D9067B7000
|
heap
|
page read and write
|
||
1A3EDB95000
|
trusted library allocation
|
page read and write
|
||
1A3E1017000
|
trusted library allocation
|
page read and write
|
||
1A3E5178000
|
trusted library allocation
|
page read and write
|
||
20AA3C11000
|
trusted library allocation
|
page read and write
|
||
1A3EE2E1000
|
trusted library allocation
|
page read and write
|
||
1CA8DD14000
|
trusted library allocation
|
page read and write
|
||
1A3E20E4000
|
trusted library allocation
|
page read and write
|
||
1A3F0FBB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1D9058C0000
|
heap
|
page read and write
|
||
1A3ED4FB000
|
trusted library allocation
|
page read and write
|
||
1A3F1076000
|
trusted library allocation
|
page read and write
|
||
1A3E6172000
|
trusted library allocation
|
page read and write
|
||
1A3E895C000
|
trusted library allocation
|
page read and write
|
||
1A3EEB85000
|
trusted library allocation
|
page read and write
|
||
1A3E9259000
|
trusted library allocation
|
page read and write
|
||
1A3E74BD000
|
trusted library allocation
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
1A3EE0A3000
|
trusted library allocation
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3ED1D0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1D906732000
|
heap
|
page read and write
|
||
1A3EDB48000
|
trusted library allocation
|
page read and write
|
||
1A3DBFFC000
|
heap
|
page read and write
|
||
1A3E50CC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3DC066000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3ED3BF000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1D9066A0000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E8BDC000
|
trusted library allocation
|
page read and write
|
||
1A3EE033000
|
trusted library allocation
|
page read and write
|
||
1A3E7511000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3ED69C000
|
trusted library allocation
|
page read and write
|
||
1A3E7AE9000
|
trusted library allocation
|
page read and write
|
||
1A3E5B47000
|
trusted library allocation
|
page read and write
|
||
1A3E2899000
|
heap
|
page read and write
|
||
1A3ED1F8000
|
trusted library allocation
|
page read and write
|
||
1A3E62C0000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3E53BD000
|
trusted library allocation
|
page read and write
|
||
1A3E7A2B000
|
trusted library allocation
|
page read and write
|
||
1A3F16A8000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3E2098000
|
trusted library allocation
|
page read and write
|
||
1A3ED0FD000
|
trusted library allocation
|
page read and write
|
||
1A3E7570000
|
trusted library allocation
|
page read and write
|
||
1A3E62C3000
|
trusted library allocation
|
page read and write
|
||
1A3ED4F6000
|
trusted library allocation
|
page read and write
|
||
1A3F16A4000
|
heap
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3DBFDE000
|
heap
|
page read and write
|
||
1A3E656C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3F1395000
|
trusted library allocation
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
1A3EEF00000
|
trusted library allocation
|
page read and write
|
||
1A3F15C4000
|
trusted library allocation
|
page read and write
|
||
1D9058A0000
|
heap
|
page read and write
|
||
1A3E69DF000
|
trusted library allocation
|
page read and write
|
||
1A3DC023000
|
heap
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
20AA39E0000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3EE1F9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFFA000
|
heap
|
page read and write
|
||
1A3EF650000
|
trusted library allocation
|
page read and write
|
||
1A3E20E8000
|
trusted library allocation
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
1A3ED13A000
|
trusted library allocation
|
page read and write
|
||
1A3ED4FB000
|
trusted library allocation
|
page read and write
|
||
1D9061A0000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3EE700000
|
trusted library allocation
|
page read and write
|
||
1A3F117E000
|
trusted library allocation
|
page read and write
|
||
1D9067AC000
|
heap
|
page read and write
|
||
1A3E503D000
|
trusted library allocation
|
page read and write
|
||
1A3ED1C8000
|
trusted library allocation
|
page read and write
|
||
1A3E7AE9000
|
trusted library allocation
|
page read and write
|
||
1A3ED543000
|
trusted library allocation
|
page read and write
|
||
1A3E6BF8000
|
trusted library allocation
|
page read and write
|
||
1A3EE0CC000
|
trusted library allocation
|
page read and write
|
||
1A3ED427000
|
trusted library allocation
|
page read and write
|
||
1C22AE50000
|
heap
|
page read and write
|
||
1A3ED6F9000
|
trusted library allocation
|
page read and write
|
||
1A3ED142000
|
trusted library allocation
|
page read and write
|
||
1A3EE133000
|
trusted library allocation
|
page read and write
|
||
1D906641000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3EE0B3000
|
trusted library allocation
|
page read and write
|
||
1A3F117E000
|
trusted library allocation
|
page read and write
|
||
1A3ED3FC000
|
trusted library allocation
|
page read and write
|
||
20AA3980000
|
heap
|
page read and write
|
||
1A3ED527000
|
trusted library allocation
|
page read and write
|
||
1A3F109E000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DD000
|
trusted library allocation
|
page read and write
|
||
1A3ED0A9000
|
trusted library allocation
|
page read and write
|
||
1A3F0628000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3E6A45000
|
trusted library allocation
|
page read and write
|
||
1A3ED3A5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3F14AF000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
20AA3C0C000
|
trusted library allocation
|
page read and write
|
||
1A3E6A25000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E7570000
|
trusted library allocation
|
page read and write
|
||
1A3F16BE000
|
heap
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E6ACC000
|
trusted library allocation
|
page read and write
|
||
1A3E6A5F000
|
trusted library allocation
|
page read and write
|
||
1A3EE067000
|
trusted library allocation
|
page read and write
|
||
1A3EE0CD000
|
trusted library allocation
|
page read and write
|
||
1A3E6637000
|
trusted library allocation
|
page read and write
|
||
1A3E09A6000
|
trusted library allocation
|
page read and write
|
||
1A3E6BD7000
|
trusted library allocation
|
page read and write
|
||
1A3E5B8E000
|
trusted library allocation
|
page read and write
|
||
1A3E74CF000
|
trusted library allocation
|
page read and write
|
||
A0BB23E000
|
unkown
|
page readonly
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3ED3F4000
|
trusted library allocation
|
page read and write
|
||
1A3E6145000
|
trusted library allocation
|
page read and write
|
||
1A3F16A8000
|
heap
|
page read and write
|
||
1CA8DB6E000
|
trusted library allocation
|
page read and write
|
||
1A3EDB77000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD5000
|
heap
|
page read and write
|
||
1A3E10D2000
|
trusted library allocation
|
page read and write
|
||
1A3EE500000
|
trusted library allocation
|
page read and write
|
||
1A3F1582000
|
trusted library allocation
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3DBFFB000
|
heap
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3DBFFB000
|
heap
|
page read and write
|
||
1A3EE013000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3E690D000
|
trusted library allocation
|
page read and write
|
||
1A3E9285000
|
trusted library allocation
|
page read and write
|
||
FADC3FE000
|
unkown
|
page readonly
|
||
1A3E8BF9000
|
trusted library allocation
|
page read and write
|
||
1A3E7C6A000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3F10D8000
|
trusted library allocation
|
page read and write
|
||
1A3ED585000
|
trusted library allocation
|
page read and write
|
||
1A3E62E9000
|
trusted library allocation
|
page read and write
|
||
1A3E5BF4000
|
trusted library allocation
|
page read and write
|
||
1A3ED64A000
|
trusted library allocation
|
page read and write
|
||
1D905B32000
|
unclassified section
|
page read and write
|
||
1A3E2069000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3DBFCD000
|
heap
|
page read and write
|
||
1D90669C000
|
heap
|
page read and write
|
||
1A3E4B34000
|
trusted library allocation
|
page read and write
|
||
1A3E6B39000
|
trusted library allocation
|
page read and write
|
||
1A3E89F7000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE7000
|
trusted library allocation
|
page read and write
|
||
1A3E74DA000
|
trusted library allocation
|
page read and write
|
||
1A3E6988000
|
trusted library allocation
|
page read and write
|
||
1A3ED1DE000
|
trusted library allocation
|
page read and write
|
||
1A3E0F23000
|
trusted library allocation
|
page read and write
|
||
1A3ECFDD000
|
trusted library allocation
|
page read and write
|
||
1A3ED685000
|
trusted library allocation
|
page read and write
|
||
1A3E1F8B000
|
trusted library allocation
|
page read and write
|
||
1D9066A9000
|
heap
|
page read and write
|
||
1A3E7A1E000
|
trusted library allocation
|
page read and write
|
||
1A3ED3E9000
|
trusted library allocation
|
page read and write
|
||
1A3E69E4000
|
trusted library allocation
|
page read and write
|
||
1A3E69DA000
|
trusted library allocation
|
page read and write
|
||
1A3E62E9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3ED026000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3E7AC8000
|
trusted library allocation
|
page read and write
|
||
1A3E6A38000
|
trusted library allocation
|
page read and write
|
||
FADABFE000
|
stack
|
page read and write
|
||
1A3E6BFD000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E4B2B000
|
trusted library allocation
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3F1576000
|
trusted library allocation
|
page read and write
|
||
1A3ED195000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3F1576000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3ED3A8000
|
trusted library allocation
|
page read and write
|
||
1A3E4F8A000
|
trusted library allocation
|
page read and write
|
||
1A3E86F0000
|
trusted library allocation
|
page read and write
|
||
1A3E687E000
|
trusted library allocation
|
page read and write
|
||
1A3EDB40000
|
trusted library allocation
|
page read and write
|
||
1D905A00000
|
trusted library allocation
|
page read and write
|
||
1A3E6AA6000
|
trusted library allocation
|
page read and write
|
||
1A3E658A000
|
trusted library allocation
|
page read and write
|
||
1A3E648C000
|
trusted library allocation
|
page read and write
|
||
1A3EE067000
|
trusted library allocation
|
page read and write
|
||
1A3EEBB4000
|
trusted library allocation
|
page read and write
|
||
1A3EE13C000
|
trusted library allocation
|
page read and write
|
||
1A3F1D04000
|
trusted library allocation
|
page read and write
|
||
1A3E92FC000
|
trusted library allocation
|
page read and write
|
||
1A3F0FA7000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3F0A38000
|
trusted library allocation
|
page read and write
|
||
1D905FF0000
|
heap
|
page read and write
|
||
1A3E62C3000
|
trusted library allocation
|
page read and write
|
||
1A3F16C0000
|
heap
|
page read and write
|
||
1A3E6650000
|
trusted library allocation
|
page read and write
|
||
1A3E6146000
|
trusted library allocation
|
page read and write
|
||
1A3F11C1000
|
trusted library allocation
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1E58D48A000
|
heap
|
page read and write
|
||
1A3EE0AD000
|
trusted library allocation
|
page read and write
|
||
1A3EDCD2000
|
trusted library allocation
|
page read and write
|
||
1A3F107E000
|
trusted library allocation
|
page read and write
|
||
1A3E68AE000
|
trusted library allocation
|
page read and write
|
||
1A3E617B000
|
trusted library allocation
|
page read and write
|
||
1A3E1100000
|
trusted library allocation
|
page read and write
|
||
1A3E7A51000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDD000
|
heap
|
page read and write
|
||
1A3E61AA000
|
trusted library allocation
|
page read and write
|
||
1A3EDBA3000
|
trusted library allocation
|
page read and write
|
||
1D906729000
|
heap
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1D906011000
|
heap
|
page read and write
|
||
1A3EE2E5000
|
trusted library allocation
|
page read and write
|
||
1A3E615C000
|
trusted library allocation
|
page read and write
|
||
1A3E62AC000
|
trusted library allocation
|
page read and write
|
||
1A3ED12D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E6653000
|
trusted library allocation
|
page read and write
|
||
1A3DC036000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFD0000
|
heap
|
page read and write
|
||
1A3E6699000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1CA8DB0D000
|
trusted library allocation
|
page read and write
|
||
1D9067AC000
|
heap
|
page read and write
|
||
1A3EE300000
|
trusted library allocation
|
page read and write
|
||
1A3E91D9000
|
trusted library allocation
|
page read and write
|
||
1A3E66BF000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E698F000
|
trusted library allocation
|
page read and write
|
||
1A3E74A5000
|
trusted library allocation
|
page read and write
|
||
1A3ED195000
|
trusted library allocation
|
page read and write
|
||
1A3E7CCD000
|
trusted library allocation
|
page read and write
|
||
1A3ED687000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3F11C9000
|
trusted library allocation
|
page read and write
|
||
1A3E6A25000
|
trusted library allocation
|
page read and write
|
||
A0BB2BE000
|
unkown
|
page readonly
|
||
1A3E6648000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3E62EE000
|
trusted library allocation
|
page read and write
|
||
1A3DC00D000
|
heap
|
page read and write
|
||
1A3E925C000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E5E51000
|
trusted library allocation
|
page read and write
|
||
FAD916E000
|
unkown
|
page readonly
|
||
1A3E5093000
|
trusted library allocation
|
page read and write
|
||
1A3E4F1F000
|
trusted library allocation
|
page read and write
|
||
1D90676A000
|
heap
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3E663E000
|
trusted library allocation
|
page read and write
|
||
1A3F1D6A000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E67CC000
|
trusted library allocation
|
page read and write
|
||
1A3ED032000
|
trusted library allocation
|
page read and write
|
||
1A3ED39B000
|
trusted library allocation
|
page read and write
|
||
1A3F0ABB000
|
trusted library allocation
|
page read and write
|
||
1D906728000
|
heap
|
page read and write
|
||
1A3DBFD7000
|
heap
|
page read and write
|
||
1A3ED149000
|
trusted library allocation
|
page read and write
|
||
1A3E7517000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E107D000
|
trusted library allocation
|
page read and write
|
||
1A3F13F5000
|
trusted library allocation
|
page read and write
|
||
1A3E109C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDD000
|
heap
|
page read and write
|
||
1A3F0AC2000
|
trusted library allocation
|
page read and write
|
||
1A3E6172000
|
trusted library allocation
|
page read and write
|
||
1A3E755E000
|
trusted library allocation
|
page read and write
|
||
1CA8DB5B000
|
trusted library allocation
|
page read and write
|
||
1A3E6BD7000
|
trusted library allocation
|
page read and write
|
||
1A3E509E000
|
trusted library allocation
|
page read and write
|
||
1A3EE06F000
|
trusted library allocation
|
page read and write
|
||
1A3E7AE5000
|
trusted library allocation
|
page read and write
|
||
1A3F1596000
|
trusted library allocation
|
page read and write
|
||
1A3EE14E000
|
trusted library allocation
|
page read and write
|
||
1A3E22DD000
|
trusted library allocation
|
page read and write
|
||
1A3ED254000
|
trusted library allocation
|
page read and write
|
||
1D9060F0000
|
trusted library section
|
page readonly
|
||
1A3F0615000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3ED250000
|
trusted library allocation
|
page read and write
|
||
1A3ED3B5000
|
trusted library allocation
|
page read and write
|
||
1A3F2124000
|
trusted library allocation
|
page read and write
|
||
1A3E7A51000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E4BC4000
|
trusted library allocation
|
page read and write
|
||
1A3EE2DF000
|
trusted library allocation
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3EE0B3000
|
trusted library allocation
|
page read and write
|
||
1A3ED6C4000
|
trusted library allocation
|
page read and write
|
||
1A3EDCD2000
|
trusted library allocation
|
page read and write
|
||
1A3E5171000
|
trusted library allocation
|
page read and write
|
||
1A3E6169000
|
trusted library allocation
|
page read and write
|
||
1A3F0A75000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1D906720000
|
heap
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
1A3EE0F2000
|
trusted library allocation
|
page read and write
|
||
1A3F11AE000
|
trusted library allocation
|
page read and write
|
||
1A3E8610000
|
trusted library allocation
|
page read and write
|
||
1A3E619B000
|
trusted library allocation
|
page read and write
|
||
1A3F11DF000
|
trusted library allocation
|
page read and write
|
||
1A3DC02C000
|
heap
|
page read and write
|
||
1A3ED3E9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DC041000
|
heap
|
page read and write
|
||
13C2000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1CA8DD10000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEB000
|
heap
|
page read and write
|
||
1A3E8B4B000
|
trusted library allocation
|
page read and write
|
||
1A3E6121000
|
trusted library allocation
|
page read and write
|
||
1D905B30000
|
unclassified section
|
page read and write
|
||
1A3E679F000
|
trusted library allocation
|
page read and write
|
||
1A3DC038000
|
heap
|
page read and write
|
||
1A3E50B0000
|
trusted library allocation
|
page read and write
|
||
1A3E6680000
|
trusted library allocation
|
page read and write
|
||
1A3E61AA000
|
trusted library allocation
|
page read and write
|
||
1A3E09DF000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3DC033000
|
heap
|
page read and write
|
||
1A3E6902000
|
trusted library allocation
|
page read and write
|
||
1A3EDB81000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3ED6DA000
|
trusted library allocation
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1E58D481000
|
heap
|
page read and write
|
||
1A3EE0A3000
|
trusted library allocation
|
page read and write
|
||
1CA8D820000
|
heap
|
page read and write
|
||
1A3EE0DB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E7AAF000
|
trusted library allocation
|
page read and write
|
||
1A3F11B8000
|
trusted library allocation
|
page read and write
|
||
1A3E621F000
|
trusted library allocation
|
page read and write
|
||
1A3E6297000
|
trusted library allocation
|
page read and write
|
||
1A3E2899000
|
heap
|
page read and write
|
||
1A3F0A75000
|
trusted library allocation
|
page read and write
|
||
1A3E62A7000
|
trusted library allocation
|
page read and write
|
||
1A3ED1A3000
|
trusted library allocation
|
page read and write
|
||
1A3E62A3000
|
trusted library allocation
|
page read and write
|
||
1A3F1382000
|
trusted library allocation
|
page read and write
|
||
1A3E86F0000
|
trusted library allocation
|
page read and write
|
||
1A3EE069000
|
trusted library allocation
|
page read and write
|
||
1A3EE0C7000
|
trusted library allocation
|
page read and write
|
||
1A3E7CBF000
|
trusted library allocation
|
page read and write
|
||
1A3E6586000
|
trusted library allocation
|
page read and write
|
||
1A3E09B3000
|
trusted library allocation
|
page read and write
|
||
C7DF1000
|
trusted library allocation
|
page execute read
|
||
1D906144000
|
unkown
|
page execute read
|
||
1A3F14EA000
|
trusted library allocation
|
page read and write
|
||
1A3EEB18000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3E89D4000
|
trusted library allocation
|
page read and write
|
||
13BA000
|
heap
|
page read and write
|
||
1A3E614F000
|
trusted library allocation
|
page read and write
|
||
1A3E6282000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3DBFFC000
|
heap
|
page read and write
|
||
1A3E50D8000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3E75DF000
|
trusted library allocation
|
page read and write
|
||
1D906731000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3EE091000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A2000
|
unkown
|
page readonly
|
||
1A3F0AE6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCD000
|
heap
|
page read and write
|
||
1A3E7A30000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED5E4000
|
trusted library allocation
|
page read and write
|
||
1A3ECFF7000
|
trusted library allocation
|
page read and write
|
||
1A3ED579000
|
trusted library allocation
|
page read and write
|
||
1CA8D9D0000
|
heap
|
page readonly
|
||
1A3F0668000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E6994000
|
trusted library allocation
|
page read and write
|
||
1A3DC066000
|
heap
|
page read and write
|
||
1A3E86FB000
|
trusted library allocation
|
page read and write
|
||
1A3EEC24000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE6000
|
heap
|
page read and write
|
||
1A3ED678000
|
trusted library allocation
|
page read and write
|
||
1A3F0A32000
|
trusted library allocation
|
page read and write
|
||
1A3ED5E9000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3EFEA8000
|
trusted library allocation
|
page read and write
|
||
1A3E6BF4000
|
trusted library allocation
|
page read and write
|
||
1A3EE0C7000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
1CA8D93A000
|
heap
|
page read and write
|
||
1D905A75000
|
trusted library allocation
|
page read and write
|
||
1A3ED1E9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3ED1F8000
|
trusted library allocation
|
page read and write
|
||
1A3E2899000
|
heap
|
page read and write
|
||
1A3E5B98000
|
trusted library allocation
|
page read and write
|
||
1D905AEF000
|
trusted library allocation
|
page read and write
|
||
1A3ED1D5000
|
trusted library allocation
|
page read and write
|
||
1A3EE041000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E6132000
|
trusted library allocation
|
page read and write
|
||
1A3ED195000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3E107D000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DB000
|
trusted library allocation
|
page read and write
|
||
1A3F1651000
|
heap
|
page read and write
|
||
1A3ED195000
|
trusted library allocation
|
page read and write
|
||
1A3E749B000
|
trusted library allocation
|
page read and write
|
||
1A3EE19B000
|
trusted library allocation
|
page read and write
|
||
1A3F16A0000
|
heap
|
page read and write
|
||
1A3EE048000
|
trusted library allocation
|
page read and write
|
||
1A3E89FB000
|
trusted library allocation
|
page read and write
|
||
1CA8DB92000
|
trusted library allocation
|
page read and write
|
||
1A3EE08B000
|
trusted library allocation
|
page read and write
|
||
1A3E6964000
|
trusted library allocation
|
page read and write
|
||
1A3E66F3000
|
trusted library allocation
|
page read and write
|
||
1D906798000
|
heap
|
page read and write
|
||
1A3E4F87000
|
trusted library allocation
|
page read and write
|
||
1A3E6B82000
|
trusted library allocation
|
page read and write
|
||
1A3E8BDE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3F107E000
|
trusted library allocation
|
page read and write
|
||
1A3ECFD8000
|
trusted library allocation
|
page read and write
|
||
1A3F0A8F000
|
trusted library allocation
|
page read and write
|
||
1A3E8BFD000
|
trusted library allocation
|
page read and write
|
||
1A3E699E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3ED512000
|
trusted library allocation
|
page read and write
|
||
1A3E755E000
|
trusted library allocation
|
page read and write
|
||
1A3E6A5D000
|
trusted library allocation
|
page read and write
|
||
1A3E22F6000
|
trusted library allocation
|
page read and write
|
||
1A3E7AED000
|
trusted library allocation
|
page read and write
|
||
1A3EDCD2000
|
trusted library allocation
|
page read and write
|
||
1A3E4F4E000
|
trusted library allocation
|
page read and write
|
||
1A3F16C0000
|
heap
|
page read and write
|
||
1A3F1582000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D2000
|
trusted library allocation
|
page read and write
|
||
20AA3C65000
|
trusted library allocation
|
page read and write
|
||
1A3E10F0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3ED0BA000
|
trusted library allocation
|
page read and write
|
||
1A3EE14E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1D905A65000
|
trusted library allocation
|
page read and write
|
||
1A3E6660000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3F10D8000
|
trusted library allocation
|
page read and write
|
||
1A3F10D8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E6A75000
|
trusted library allocation
|
page read and write
|
||
1A3ED261000
|
trusted library allocation
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
1A3ED12F000
|
trusted library allocation
|
page read and write
|
||
1A3E6907000
|
trusted library allocation
|
page read and write
|
||
20AA3C70000
|
trusted library allocation
|
page read and write
|
||
1A3F11D6000
|
trusted library allocation
|
page read and write
|
||
1A3E6911000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E106A000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3E5E85000
|
trusted library allocation
|
page read and write
|
||
1A3E223D000
|
trusted library allocation
|
page read and write
|
||
1A3EE0AD000
|
trusted library allocation
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
1A3EE19B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF2000
|
heap
|
page read and write
|
||
1A3E4F55000
|
trusted library allocation
|
page read and write
|
||
1A3E506D000
|
trusted library allocation
|
page read and write
|
||
1A3E5B95000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3EDCF3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD3000
|
heap
|
page read and write
|
||
1A3E6A3F000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3F11B8000
|
trusted library allocation
|
page read and write
|
||
1A3E6ACC000
|
trusted library allocation
|
page read and write
|
||
1A3F13E7000
|
trusted library allocation
|
page read and write
|
||
20AA3CB2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1CA8DB69000
|
trusted library allocation
|
page read and write
|
||
1A3E62AE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFFA000
|
heap
|
page read and write
|
||
1A3E649D000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3ED6E8000
|
trusted library allocation
|
page read and write
|
||
1A3F11C9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E6988000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED6C7000
|
trusted library allocation
|
page read and write
|
||
1A3E657A000
|
trusted library allocation
|
page read and write
|
||
1A3EEC01000
|
trusted library allocation
|
page read and write
|
||
1A3E619F000
|
trusted library allocation
|
page read and write
|
||
1A3E755E000
|
trusted library allocation
|
page read and write
|
||
1A3F1393000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1D9066CD000
|
heap
|
page read and write
|
||
1A3EE095000
|
trusted library allocation
|
page read and write
|
||
1A3ED4CF000
|
trusted library allocation
|
page read and write
|
||
1A3F16AC000
|
heap
|
page read and write
|
||
1A3E7BAA000
|
trusted library allocation
|
page read and write
|
||
1A3EE0C4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E7A2D000
|
trusted library allocation
|
page read and write
|
||
1A3EDCF9000
|
trusted library allocation
|
page read and write
|
||
1A3E68F0000
|
trusted library allocation
|
page read and write
|
||
1A3E68EB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFC5000
|
heap
|
page read and write
|
||
1A3E5B8C000
|
trusted library allocation
|
page read and write
|
||
1A3E7AAC000
|
trusted library allocation
|
page read and write
|
||
1A3E8BF9000
|
trusted library allocation
|
page read and write
|
||
1A3E28DA000
|
heap
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3DBFE9000
|
heap
|
page read and write
|
||
1D9066A0000
|
heap
|
page read and write
|
||
1A3ED14B000
|
trusted library allocation
|
page read and write
|
||
1A3ED2E8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3ED1A3000
|
trusted library allocation
|
page read and write
|
||
1A3E65B2000
|
trusted library allocation
|
page read and write
|
||
1A3DC060000
|
heap
|
page read and write
|
||
1A3F10FE000
|
trusted library allocation
|
page read and write
|
||
1A3E7A24000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3F1399000
|
trusted library allocation
|
page read and write
|
||
1A3E9289000
|
trusted library allocation
|
page read and write
|
||
1D906150000
|
trusted library allocation
|
page read and write
|
||
1A3E665B000
|
trusted library allocation
|
page read and write
|
||
1A3F10F7000
|
trusted library allocation
|
page read and write
|
||
1A3EF7DE000
|
trusted library allocation
|
page read and write
|
||
1A3E62AC000
|
trusted library allocation
|
page read and write
|
||
1A3EE2DF000
|
trusted library allocation
|
page read and write
|
||
1A3E62E9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE4000
|
heap
|
page read and write
|
||
1A3DBFDE000
|
heap
|
page read and write
|
||
1A3E51F3000
|
trusted library allocation
|
page read and write
|
||
1A3F0A32000
|
trusted library allocation
|
page read and write
|
||
1A3E50B0000
|
trusted library allocation
|
page read and write
|
||
1A3E7ACD000
|
trusted library allocation
|
page read and write
|
||
1A3F13E5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3E6BCD000
|
trusted library allocation
|
page read and write
|
||
1A3ED18C000
|
trusted library allocation
|
page read and write
|
||
1A3E6F00000
|
trusted library allocation
|
page read and write
|
||
1A3ED383000
|
trusted library allocation
|
page read and write
|
||
1D905ACE000
|
trusted library allocation
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
20AA3C24000
|
trusted library allocation
|
page read and write
|
||
1A3EE0E0000
|
trusted library allocation
|
page read and write
|
||
1A3E69F9000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3ED1EB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E863D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3ED3AF000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1D9066DC000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E10B3000
|
trusted library allocation
|
page read and write
|
||
1A3E6A67000
|
trusted library allocation
|
page read and write
|
||
1A3E69DC000
|
trusted library allocation
|
page read and write
|
||
1A3ED6DF000
|
trusted library allocation
|
page read and write
|
||
1A3F0695000
|
trusted library allocation
|
page read and write
|
||
1E58F180000
|
heap
|
page read and write
|
||
1D905A23000
|
trusted library allocation
|
page read and write
|
||
1A3ED147000
|
trusted library allocation
|
page read and write
|
||
1A3DC03E000
|
heap
|
page read and write
|
||
1A3E91B6000
|
trusted library allocation
|
page read and write
|
||
1A3E7AB4000
|
trusted library allocation
|
page read and write
|
||
1A3F15A7000
|
trusted library allocation
|
page read and write
|
||
1A3E53F6000
|
trusted library allocation
|
page read and write
|
||
1A3ED5E6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD0000
|
heap
|
page read and write
|
||
1D906798000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1D905AC0000
|
trusted library allocation
|
page read and write
|
||
1CA8D770000
|
heap
|
page read and write
|
||
1A3EDB0C000
|
trusted library allocation
|
page read and write
|
||
1A3E5E4D000
|
trusted library allocation
|
page read and write
|
||
1A3E69FB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3ED5E6000
|
trusted library allocation
|
page read and write
|
||
1A3F14EE000
|
trusted library allocation
|
page read and write
|
||
1A3F0AC0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3F16C5000
|
heap
|
page read and write
|
||
1A3E5E27000
|
trusted library allocation
|
page read and write
|
||
A0B7F28000
|
stack
|
page read and write
|
||
1D906726000
|
heap
|
page read and write
|
||
1A3ED142000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3ED5E4000
|
trusted library allocation
|
page read and write
|
||
1A3ED545000
|
trusted library allocation
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3F1391000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E66D0000
|
trusted library allocation
|
page read and write
|
||
1A3DC035000
|
heap
|
page read and write
|
||
1A3ED393000
|
trusted library allocation
|
page read and write
|
||
1A3E67CC000
|
trusted library allocation
|
page read and write
|
||
1A3DC033000
|
heap
|
page read and write
|
||
1A3E86BE000
|
trusted library allocation
|
page read and write
|
||
1A3E6289000
|
trusted library allocation
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3ED3AF000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E4BBA000
|
trusted library allocation
|
page read and write
|
||
1D90676A000
|
heap
|
page read and write
|
||
1A3ED6FE000
|
trusted library allocation
|
page read and write
|
||
1D905750000
|
unclassified section
|
page readonly
|
||
3A21000
|
heap
|
page read and write
|
||
1A3E61B6000
|
trusted library allocation
|
page read and write
|
||
1A3E6A66000
|
trusted library allocation
|
page read and write
|
||
A0BA1FE000
|
unkown
|
page readonly
|
||
1A3DBFE8000
|
heap
|
page read and write
|
||
1A3DBFE3000
|
heap
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E6853000
|
trusted library allocation
|
page read and write
|
||
1A3E1F31000
|
trusted library allocation
|
page read and write
|
||
1A3E6687000
|
trusted library allocation
|
page read and write
|
||
1A3E5E5A000
|
trusted library allocation
|
page read and write
|
||
20AA3C68000
|
trusted library allocation
|
page read and write
|
||
1A3E62EB000
|
trusted library allocation
|
page read and write
|
||
1A3E6132000
|
trusted library allocation
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3E6924000
|
trusted library allocation
|
page read and write
|
||
1A3EE2EA000
|
trusted library allocation
|
page read and write
|
||
1A3E69B2000
|
trusted library allocation
|
page read and write
|
||
1A3E20E4000
|
trusted library allocation
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3E1082000
|
trusted library allocation
|
page read and write
|
||
1A3ED677000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD2000
|
heap
|
page read and write
|
||
1A3DC040000
|
heap
|
page read and write
|
||
1A3EE0AD000
|
trusted library allocation
|
page read and write
|
||
1A3E6948000
|
trusted library allocation
|
page read and write
|
||
1A3E5EB8000
|
trusted library allocation
|
page read and write
|
||
1A3EE2DF000
|
trusted library allocation
|
page read and write
|
||
1A3E88D6000
|
trusted library allocation
|
page read and write
|
||
1A3E62AC000
|
trusted library allocation
|
page read and write
|
||
1A3E7AD2000
|
trusted library allocation
|
page read and write
|
||
1A3E6A87000
|
trusted library allocation
|
page read and write
|
||
1A3EE2C7000
|
trusted library allocation
|
page read and write
|
||
1A3E6690000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3F1710000
|
heap
|
page read and write
|
||
1A3E617B000
|
trusted library allocation
|
page read and write
|
||
1A3ED1F8000
|
trusted library allocation
|
page read and write
|
||
1A3E6574000
|
trusted library allocation
|
page read and write
|
||
1A3E679F000
|
trusted library allocation
|
page read and write
|
||
1A3F210E000
|
trusted library allocation
|
page read and write
|
||
1A3ED142000
|
trusted library allocation
|
page read and write
|
||
1A3EF791000
|
trusted library allocation
|
page read and write
|
||
1A3E74EA000
|
trusted library allocation
|
page read and write
|
||
1A3ED25C000
|
trusted library allocation
|
page read and write
|
||
1A3E558A000
|
trusted library allocation
|
page read and write
|
||
1A3EE13C000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DF000
|
trusted library allocation
|
page read and write
|
||
1A3E2074000
|
trusted library allocation
|
page read and write
|
||
1A3F10FE000
|
trusted library allocation
|
page read and write
|
||
1A3E538D000
|
trusted library allocation
|
page read and write
|
||
1A3E75A3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3ED69E000
|
trusted library allocation
|
page read and write
|
||
1A3E6981000
|
trusted library allocation
|
page read and write
|
||
1A3EE0B6000
|
trusted library allocation
|
page read and write
|
||
1A3E69A1000
|
trusted library allocation
|
page read and write
|
||
1CA8D9EF000
|
unclassified section
|
page read and write
|
||
1A3E6A75000
|
trusted library allocation
|
page read and write
|
||
1A3E22DD000
|
trusted library allocation
|
page read and write
|
||
1A3DC060000
|
heap
|
page read and write
|
||
1CA8D910000
|
heap
|
page read and write
|
||
1D90673C000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DC033000
|
heap
|
page read and write
|
||
1A3E92B1000
|
trusted library allocation
|
page read and write
|
||
1A3F16A8000
|
heap
|
page read and write
|
||
1A3E7AE5000
|
trusted library allocation
|
page read and write
|
||
1D90677B000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED5E8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEA000
|
heap
|
page read and write
|
||
1E58D700000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3E6892000
|
trusted library allocation
|
page read and write
|
||
1A3F0ABB000
|
trusted library allocation
|
page read and write
|
||
1A3EE157000
|
trusted library allocation
|
page read and write
|
||
1E58D5A0000
|
heap
|
page read and write
|
||
1A3E68C7000
|
trusted library allocation
|
page read and write
|
||
1A3E2035000
|
trusted library allocation
|
page read and write
|
||
1AC000
|
unkown
|
page write copy
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3ED4F6000
|
trusted library allocation
|
page read and write
|
||
1A3E91AE000
|
trusted library allocation
|
page read and write
|
||
64381FE000
|
stack
|
page read and write
|
||
1A3ED29A000
|
trusted library allocation
|
page read and write
|
||
1A3F106B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3ED3BF000
|
trusted library allocation
|
page read and write
|
||
1A3E5BCA000
|
trusted library allocation
|
page read and write
|
||
1A3E233A000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3ECFF1000
|
trusted library allocation
|
page read and write
|
||
1A3E6B24000
|
trusted library allocation
|
page read and write
|
||
1A3E6553000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
20AA3C30000
|
trusted library allocation
|
page read and write
|
||
1A3E74BD000
|
trusted library allocation
|
page read and write
|
||
1A3E8662000
|
trusted library allocation
|
page read and write
|
||
1A3F0AC9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1CA8DA00000
|
trusted library allocation
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
1A3E8814000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E6BF8000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
1A3E6BD1000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3ED56E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3ED1EE000
|
trusted library allocation
|
page read and write
|
||
1A3E5079000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E8949000
|
trusted library allocation
|
page read and write
|
||
1A3E5EB5000
|
trusted library allocation
|
page read and write
|
||
20AA3A42000
|
unclassified section
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3EDCA5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E6AF4000
|
trusted library allocation
|
page read and write
|
||
20AA3860000
|
unclassified section
|
page readonly
|
||
FAD912E000
|
stack
|
page read and write
|
||
1A3E53FC000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3E6154000
|
trusted library allocation
|
page read and write
|
||
1A3F1593000
|
trusted library allocation
|
page read and write
|
||
1A3DC002000
|
heap
|
page read and write
|
||
1A3ED3CD000
|
trusted library allocation
|
page read and write
|
||
1A3E62BA000
|
trusted library allocation
|
page read and write
|
||
1A3EF7CB000
|
trusted library allocation
|
page read and write
|
||
1A3E26CF000
|
trusted library allocation
|
page read and write
|
||
1A3E0990000
|
trusted library allocation
|
page read and write
|
||
1A3EE0B6000
|
trusted library allocation
|
page read and write
|
||
1A3E6BCC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3E6943000
|
trusted library allocation
|
page read and write
|
||
1A3E1F31000
|
trusted library allocation
|
page read and write
|
||
1A3F108B000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3E7440000
|
trusted library allocation
|
page read and write
|
||
C7D71000
|
trusted library allocation
|
page execute read
|
||
1A3E62EB000
|
trusted library allocation
|
page read and write
|
||
1A3E50D2000
|
trusted library allocation
|
page read and write
|
||
1A3F1603000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3E6658000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E6624000
|
trusted library allocation
|
page read and write
|
||
1A3E6BD4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD3000
|
heap
|
page read and write
|
||
1A3EDB28000
|
trusted library allocation
|
page read and write
|
||
1A3EE0CD000
|
trusted library allocation
|
page read and write
|
||
1A3E09EF000
|
trusted library allocation
|
page read and write
|
||
1A3E69F9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E4B60000
|
trusted library allocation
|
page read and write
|
||
1CA8D9C4000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3EEAC1000
|
trusted library allocation
|
page read and write
|
||
20AA3C8F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3EE045000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E5079000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3E75C2000
|
trusted library allocation
|
page read and write
|
||
1A3ED5F0000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3F1399000
|
trusted library allocation
|
page read and write
|
||
1A3E6743000
|
trusted library allocation
|
page read and write
|
||
1A3E4F77000
|
trusted library allocation
|
page read and write
|
||
1A3EF7D7000
|
trusted library allocation
|
page read and write
|
||
1A3F1076000
|
trusted library allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
1D906731000
|
heap
|
page read and write
|
||
1A3E6ACE000
|
trusted library allocation
|
page read and write
|
||
13B2000
|
heap
|
page read and write
|
||
1A3EEC04000
|
trusted library allocation
|
page read and write
|
||
1A3E50CE000
|
trusted library allocation
|
page read and write
|
||
1A3E75D5000
|
trusted library allocation
|
page read and write
|
||
1A3E7A76000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1D905780000
|
heap
|
page read and write
|
||
1A3ED045000
|
trusted library allocation
|
page read and write
|
||
1A3E1F58000
|
trusted library allocation
|
page read and write
|
||
1A3F16A0000
|
heap
|
page read and write
|
||
1A3EDB43000
|
trusted library allocation
|
page read and write
|
||
1A3F10AA000
|
trusted library allocation
|
page read and write
|
||
1A3ED39C000
|
trusted library allocation
|
page read and write
|
||
1A3E6A75000
|
trusted library allocation
|
page read and write
|
||
1A3E6A5D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF3000
|
heap
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3E509D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED3BF000
|
trusted library allocation
|
page read and write
|
||
1A3ED5E8000
|
trusted library allocation
|
page read and write
|
||
64389FF000
|
stack
|
page read and write
|
||
1A3F169D000
|
heap
|
page read and write
|
||
1A3E6712000
|
trusted library allocation
|
page read and write
|
||
64369FE000
|
stack
|
page read and write
|
||
1A3F109E000
|
trusted library allocation
|
page read and write
|
||
1A3E6BD7000
|
trusted library allocation
|
page read and write
|
||
1A3F169C000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E4F8A000
|
trusted library allocation
|
page read and write
|
||
1A3F1397000
|
trusted library allocation
|
page read and write
|
||
1A3E6BEE000
|
trusted library allocation
|
page read and write
|
||
1A3E4BD8000
|
trusted library allocation
|
page read and write
|
||
1A3E6AE0000
|
trusted library allocation
|
page read and write
|
||
1A3E5067000
|
trusted library allocation
|
page read and write
|
||
1A3ED5E9000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3ED1EB000
|
trusted library allocation
|
page read and write
|
||
FAD90AE000
|
stack
|
page read and write
|
||
1A3ED4E3000
|
trusted library allocation
|
page read and write
|
||
1A3E6143000
|
trusted library allocation
|
page read and write
|
||
1A3E6B1F000
|
trusted library allocation
|
page read and write
|
||
1A3E5375000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DC03C000
|
heap
|
page read and write
|
||
1A3DC023000
|
heap
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
1D9066EA000
|
heap
|
page read and write
|
||
1A3EDB68000
|
trusted library allocation
|
page read and write
|
||
1A3E6690000
|
trusted library allocation
|
page read and write
|
||
20AA3CF4000
|
trusted library allocation
|
page read and write
|
||
1A3E5E1E000
|
trusted library allocation
|
page read and write
|
||
1A3ED5B2000
|
trusted library allocation
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
1A3DBFE6000
|
heap
|
page read and write
|
||
1A3E6A5D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3E6BD7000
|
trusted library allocation
|
page read and write
|
||
1E58EFAC000
|
heap
|
page read and write
|
||
1A3DC049000
|
heap
|
page read and write
|
||
13C1000
|
heap
|
page read and write
|
||
8FE3DFE000
|
unkown
|
page readonly
|
||
1A3E6AF4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3ED149000
|
trusted library allocation
|
page read and write
|
||
1A3E2290000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE7000
|
trusted library allocation
|
page read and write
|
||
1A3EE16C000
|
trusted library allocation
|
page read and write
|
||
1A3E09C8000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3E7AD2000
|
trusted library allocation
|
page read and write
|
||
1D905AC7000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E6BE7000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DBFD9000
|
heap
|
page read and write
|
||
1A3E89D2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFC5000
|
heap
|
page read and write
|
||
1A3F11D6000
|
trusted library allocation
|
page read and write
|
||
1A3F2137000
|
trusted library allocation
|
page read and write
|
||
1A3E22EB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3EE067000
|
trusted library allocation
|
page read and write
|
||
1A3E618D000
|
trusted library allocation
|
page read and write
|
||
1A3DC066000
|
heap
|
page read and write
|
||
1A3F13BF000
|
trusted library allocation
|
page read and write
|
||
1A3E4F55000
|
trusted library allocation
|
page read and write
|
||
1A3ED2A0000
|
trusted library allocation
|
page read and write
|
||
1A3F169C000
|
heap
|
page read and write
|
||
1A3EEB89000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1CA8DD1E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3EE124000
|
trusted library allocation
|
page read and write
|
||
8FE1C7E000
|
unkown
|
page readonly
|
||
1A3E6BC1000
|
trusted library allocation
|
page read and write
|
||
20AA3CF6000
|
trusted library allocation
|
page read and write
|
||
1A3EE19B000
|
trusted library allocation
|
page read and write
|
||
1A3F16B1000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3ED53B000
|
trusted library allocation
|
page read and write
|
||
1A3E664A000
|
trusted library allocation
|
page read and write
|
||
1A3E6A7F000
|
trusted library allocation
|
page read and write
|
||
1A3F0A38000
|
trusted library allocation
|
page read and write
|
||
1A3E5E64000
|
trusted library allocation
|
page read and write
|
||
1A3E6A30000
|
trusted library allocation
|
page read and write
|
||
1A3E62B1000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE4000
|
trusted library allocation
|
page read and write
|
||
1A3E7CC1000
|
trusted library allocation
|
page read and write
|
||
1A3ED06F000
|
trusted library allocation
|
page read and write
|
||
1A3ED5E2000
|
trusted library allocation
|
page read and write
|
||
1A3E515B000
|
trusted library allocation
|
page read and write
|
||
1A3E6789000
|
trusted library allocation
|
page read and write
|
||
1A3EEC24000
|
trusted library allocation
|
page read and write
|
||
1D905B40000
|
heap
|
page read and write
|
||
1A3E69B2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3F14E4000
|
trusted library allocation
|
page read and write
|
||
1A3F16A2000
|
heap
|
page read and write
|
||
1A3F10E8000
|
trusted library allocation
|
page read and write
|
||
1A3EDB6C000
|
trusted library allocation
|
page read and write
|
||
1A3DC05E000
|
heap
|
page read and write
|
||
1C22B100000
|
trusted library allocation
|
page read and write
|
||
1A3E5069000
|
trusted library allocation
|
page read and write
|
||
1A3ED543000
|
trusted library allocation
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3DC002000
|
heap
|
page read and write
|
||
1A3E69A1000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3ED53D000
|
trusted library allocation
|
page read and write
|
||
1A3E4F8E000
|
trusted library allocation
|
page read and write
|
||
1A3ED028000
|
trusted library allocation
|
page read and write
|
||
1A3F16BE000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E755C000
|
trusted library allocation
|
page read and write
|
||
1A3EE093000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E67A9000
|
trusted library allocation
|
page read and write
|
||
1A3E8980000
|
trusted library allocation
|
page read and write
|
||
1A3EE13A000
|
trusted library allocation
|
page read and write
|
||
1A3E5067000
|
trusted library allocation
|
page read and write
|
||
C7DE1000
|
trusted library allocation
|
page execute read
|
||
1A3EDCF9000
|
trusted library allocation
|
page read and write
|
||
1A3ED523000
|
trusted library allocation
|
page read and write
|
||
1A3E4F4B000
|
trusted library allocation
|
page read and write
|
||
1D90578A000
|
heap
|
page read and write
|
||
1A3EDB50000
|
trusted library allocation
|
page read and write
|
||
1A3E6B4E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
456BFC000
|
stack
|
page read and write
|
||
1A3ED6FE000
|
trusted library allocation
|
page read and write
|
||
1A3ED0CD000
|
trusted library allocation
|
page read and write
|
||
1A3E2899000
|
heap
|
page read and write
|
||
1A3ED0A9000
|
trusted library allocation
|
page read and write
|
||
1A3E618B000
|
trusted library allocation
|
page read and write
|
||
1A3EE132000
|
trusted library allocation
|
page read and write
|
||
1D906720000
|
heap
|
page read and write
|
||
1A3E107E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
20AA3893000
|
heap
|
page read and write
|
||
1A3E656A000
|
trusted library allocation
|
page read and write
|
||
1A3ED680000
|
trusted library allocation
|
page read and write
|
||
1CA8DE04000
|
heap
|
page read and write
|
||
1A3E8B43000
|
trusted library allocation
|
page read and write
|
||
1A3ED4EB000
|
trusted library allocation
|
page read and write
|
||
1A3E89ED000
|
trusted library allocation
|
page read and write
|
||
1A3ED0EF000
|
trusted library allocation
|
page read and write
|
||
1A3F1596000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3E68C4000
|
trusted library allocation
|
page read and write
|
||
1A3E5BA2000
|
trusted library allocation
|
page read and write
|
||
1D90672B000
|
heap
|
page read and write
|
||
1D9066A0000
|
heap
|
page read and write
|
||
1A3ED0BA000
|
trusted library allocation
|
page read and write
|
||
1A3F1605000
|
heap
|
page read and write
|
||
1A3E2899000
|
heap
|
page read and write
|
||
13C2000
|
heap
|
page read and write
|
||
1A3E6BF8000
|
trusted library allocation
|
page read and write
|
||
1A3EE16C000
|
trusted library allocation
|
page read and write
|
||
1D9066A3000
|
heap
|
page read and write
|
||
1A3EE2D9000
|
trusted library allocation
|
page read and write
|
||
1A3E8BFD000
|
trusted library allocation
|
page read and write
|
||
1A3EE021000
|
trusted library allocation
|
page read and write
|
||
1A3E6A6D000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E50D3000
|
trusted library allocation
|
page read and write
|
||
13B2000
|
heap
|
page read and write
|
||
1A3E6650000
|
trusted library allocation
|
page read and write
|
||
1A3F13BF000
|
trusted library allocation
|
page read and write
|
||
1A3E91FC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3E4F8C000
|
trusted library allocation
|
page read and write
|
||
1A3ED3AF000
|
trusted library allocation
|
page read and write
|
||
1A3DC03E000
|
heap
|
page read and write
|
||
1A3E8B48000
|
trusted library allocation
|
page read and write
|
||
1A3E4F8A000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3ED11C000
|
trusted library allocation
|
page read and write
|
||
8FE1CFE000
|
unkown
|
page readonly
|
||
1A3E205B000
|
trusted library allocation
|
page read and write
|
||
1A3E5E36000
|
trusted library allocation
|
page read and write
|
||
1A3E74DA000
|
trusted library allocation
|
page read and write
|
||
1A3E6493000
|
trusted library allocation
|
page read and write
|
||
1A3E20E4000
|
trusted library allocation
|
page read and write
|
||
1A3ED3CD000
|
trusted library allocation
|
page read and write
|
||
1A3DC033000
|
heap
|
page read and write
|
||
1A3E6BC1000
|
trusted library allocation
|
page read and write
|
||
1A3E4BF7000
|
trusted library allocation
|
page read and write
|
||
1A3E62A6000
|
trusted library allocation
|
page read and write
|
||
1A3E6293000
|
trusted library allocation
|
page read and write
|
||
1A3E6657000
|
trusted library allocation
|
page read and write
|
||
1A3E6BF5000
|
trusted library allocation
|
page read and write
|
||
1A3E7AAC000
|
trusted library allocation
|
page read and write
|
||
20AA3DC0000
|
heap
|
page read and write
|
||
1A3E699E000
|
trusted library allocation
|
page read and write
|
||
1A3DC045000
|
heap
|
page read and write
|
||
1A3F11A8000
|
trusted library allocation
|
page read and write
|
||
1A3E663B000
|
trusted library allocation
|
page read and write
|
||
1A3E8BC1000
|
trusted library allocation
|
page read and write
|
||
1A3E6BEE000
|
trusted library allocation
|
page read and write
|
||
1D90676D000
|
heap
|
page read and write
|
||
1A3E268E000
|
trusted library allocation
|
page read and write
|
||
1A3EE08B000
|
trusted library allocation
|
page read and write
|
||
1A3E6AA0000
|
trusted library allocation
|
page read and write
|
||
1A3E7548000
|
trusted library allocation
|
page read and write
|
||
1CA8DB60000
|
trusted library allocation
|
page read and write
|
||
1A3E6AEC000
|
trusted library allocation
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
1CA8DBA7000
|
trusted library allocation
|
page read and write
|
||
1A3E5BA2000
|
trusted library allocation
|
page read and write
|
||
1A3F10E8000
|
trusted library allocation
|
page read and write
|
||
1A3ED56C000
|
trusted library allocation
|
page read and write
|
||
1A3F10AA000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
1A3ED6F9000
|
trusted library allocation
|
page read and write
|
||
1A3DC04E000
|
heap
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3E62A6000
|
trusted library allocation
|
page read and write
|
||
1A3ED405000
|
trusted library allocation
|
page read and write
|
||
1A3E5089000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED3A5000
|
trusted library allocation
|
page read and write
|
||
1A3ED1FD000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3ED585000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E4F5A000
|
trusted library allocation
|
page read and write
|
||
1A3ED3F5000
|
trusted library allocation
|
page read and write
|
||
1A3E4BFE000
|
trusted library allocation
|
page read and write
|
||
1A3E615C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E6BF4000
|
trusted library allocation
|
page read and write
|
||
1A3E618D000
|
trusted library allocation
|
page read and write
|
||
20AA3C00000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD9000
|
heap
|
page read and write
|
||
1A3F16A7000
|
heap
|
page read and write
|
||
1D905A5F000
|
trusted library allocation
|
page read and write
|
||
1A3ED424000
|
trusted library allocation
|
page read and write
|
||
20AA3C78000
|
trusted library allocation
|
page read and write
|
||
1A3E26F4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1CA8DC20000
|
unclassified section
|
page readonly
|
||
1A3DC002000
|
heap
|
page read and write
|
||
1A3E6B15000
|
trusted library allocation
|
page read and write
|
||
1A3ECFE1000
|
trusted library allocation
|
page read and write
|
||
1A3EEBB4000
|
trusted library allocation
|
page read and write
|
||
1A3E508E000
|
trusted library allocation
|
page read and write
|
||
1A3E5120000
|
trusted library allocation
|
page read and write
|
||
3A21000
|
heap
|
page read and write
|
||
1A3DBFF3000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3EDB81000
|
trusted library allocation
|
page read and write
|
||
1A3ED0BA000
|
trusted library allocation
|
page read and write
|
||
1A3E62C3000
|
trusted library allocation
|
page read and write
|
||
1A3E7CCB000
|
trusted library allocation
|
page read and write
|
||
1A3E6AA0000
|
trusted library allocation
|
page read and write
|
||
1A3E6BEB000
|
trusted library allocation
|
page read and write
|
||
1A3ED5F8000
|
trusted library allocation
|
page read and write
|
||
1A3F10E8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E5E18000
|
trusted library allocation
|
page read and write
|
||
1A3E6AA5000
|
trusted library allocation
|
page read and write
|
||
1A3E2656000
|
trusted library allocation
|
page read and write
|
||
1A3F0A75000
|
trusted library allocation
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D2000
|
trusted library allocation
|
page read and write
|
||
1A3DC039000
|
heap
|
page read and write
|
||
1A3F1605000
|
heap
|
page read and write
|
||
1A3E61AA000
|
trusted library allocation
|
page read and write
|
||
1D90622A000
|
trusted library allocation
|
page read and write
|
||
1A3E2240000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3E65FC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3ED3DB000
|
trusted library allocation
|
page read and write
|
||
1A3E6760000
|
trusted library allocation
|
page read and write
|
||
1A3ED125000
|
trusted library allocation
|
page read and write
|
||
1A3ED5E6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3ED112000
|
trusted library allocation
|
page read and write
|
||
1A2000
|
unkown
|
page readonly
|
||
1E58D600000
|
trusted library allocation
|
page read and write
|
||
1D906209000
|
trusted library allocation
|
page read and write
|
||
1A3DC03E000
|
heap
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3F06AC000
|
trusted library allocation
|
page read and write
|
||
1A3E2887000
|
heap
|
page read and write
|
||
1A3DBFDC000
|
heap
|
page read and write
|
||
1A3E62C3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3EF78A000
|
trusted library allocation
|
page read and write
|
||
1A3E8BDC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD3000
|
heap
|
page read and write
|
||
1A3ED65D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3F0A97000
|
trusted library allocation
|
page read and write
|
||
1A3EE2F2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E6ACA000
|
trusted library allocation
|
page read and write
|
||
1A3E5095000
|
trusted library allocation
|
page read and write
|
||
1A3DC033000
|
heap
|
page read and write
|
||
1A3ED066000
|
trusted library allocation
|
page read and write
|
||
1A3E894C000
|
trusted library allocation
|
page read and write
|
||
1A3E7CA2000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D9000
|
trusted library allocation
|
page read and write
|
||
17C000
|
unkown
|
page readonly
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E5BA7000
|
trusted library allocation
|
page read and write
|
||
1A3ED261000
|
trusted library allocation
|
page read and write
|
||
1A3E75D5000
|
trusted library allocation
|
page read and write
|
||
1A3E516A000
|
trusted library allocation
|
page read and write
|
||
1A3EE095000
|
trusted library allocation
|
page read and write
|
||
1D905AB5000
|
trusted library allocation
|
page read and write
|
||
1A3F138F000
|
trusted library allocation
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3ED668000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3EDB14000
|
trusted library allocation
|
page read and write
|
||
1A3ED3FC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E61ED000
|
trusted library allocation
|
page read and write
|
||
1A3E693B000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1A3EE039000
|
trusted library allocation
|
page read and write
|
||
1A3E8B45000
|
trusted library allocation
|
page read and write
|
||
1A3E7A34000
|
trusted library allocation
|
page read and write
|
||
1D905770000
|
heap
|
page read and write
|
||
1A3E6966000
|
trusted library allocation
|
page read and write
|
||
1A3E6B2B000
|
trusted library allocation
|
page read and write
|
||
1A3E6BF4000
|
trusted library allocation
|
page read and write
|
||
1A3E0998000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3ED6F4000
|
trusted library allocation
|
page read and write
|
||
1A3E5BF4000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E6A6F000
|
trusted library allocation
|
page read and write
|
||
1A3F1062000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3EF7E5000
|
trusted library allocation
|
page read and write
|
||
1A3EE0BB000
|
trusted library allocation
|
page read and write
|
||
1A3E68C2000
|
trusted library allocation
|
page read and write
|
||
1A3E7C64000
|
trusted library allocation
|
page read and write
|
||
1A3DC045000
|
heap
|
page read and write
|
||
1A3E511D000
|
trusted library allocation
|
page read and write
|
||
1A3E68CE000
|
trusted library allocation
|
page read and write
|
||
1A3E50FC000
|
trusted library allocation
|
page read and write
|
||
1D906723000
|
heap
|
page read and write
|
||
1A3E2663000
|
trusted library allocation
|
page read and write
|
||
13BB000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
1A3ED2D5000
|
trusted library allocation
|
page read and write
|
||
1A3F1605000
|
heap
|
page read and write
|
||
1CA8DB00000
|
trusted library allocation
|
page read and write
|
||
1A3ED1D7000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3ED578000
|
trusted library allocation
|
page read and write
|
||
1A3ED545000
|
trusted library allocation
|
page read and write
|
||
1A3DC05F000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3EEB59000
|
trusted library allocation
|
page read and write
|
||
1A3ED4C4000
|
trusted library allocation
|
page read and write
|
||
1A3ECFFD000
|
trusted library allocation
|
page read and write
|
||
1A3EE143000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DC02C000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3E5EBA000
|
trusted library allocation
|
page read and write
|
||
1D906141000
|
unkown
|
page execute read
|
||
1A3EDCE8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E2239000
|
trusted library allocation
|
page read and write
|
||
1D906200000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD8000
|
heap
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3E6A87000
|
trusted library allocation
|
page read and write
|
||
1A3EE095000
|
trusted library allocation
|
page read and write
|
||
1A3E6589000
|
trusted library allocation
|
page read and write
|
||
A0BC2BE000
|
unkown
|
page readonly
|
||
1A3E9301000
|
trusted library allocation
|
page read and write
|
||
1A3E75DF000
|
trusted library allocation
|
page read and write
|
||
1A3F13FE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E89CE000
|
trusted library allocation
|
page read and write
|
||
20AA37D0000
|
unclassified section
|
page readonly
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E6994000
|
trusted library allocation
|
page read and write
|
||
1A3F11B8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3E7AC8000
|
trusted library allocation
|
page read and write
|
||
1A3EE136000
|
trusted library allocation
|
page read and write
|
||
1CA8DD32000
|
trusted library allocation
|
page read and write
|
||
1A3E516A000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DF000
|
trusted library allocation
|
page read and write
|
||
1A3ED343000
|
trusted library allocation
|
page read and write
|
||
1A3E666E000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
1A3E8E96000
|
trusted library allocation
|
page read and write
|
||
1A3F1605000
|
heap
|
page read and write
|
||
1D9066E1000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3ED3FC000
|
trusted library allocation
|
page read and write
|
||
1A3E6BAE000
|
trusted library allocation
|
page read and write
|
||
1A3E5E0C000
|
trusted library allocation
|
page read and write
|
||
1A3ED4BF000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF2000
|
heap
|
page read and write
|
||
1A3ED192000
|
trusted library allocation
|
page read and write
|
||
1A3ED10C000
|
trusted library allocation
|
page read and write
|
||
1A3EE143000
|
trusted library allocation
|
page read and write
|
||
1A3E5079000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3F1395000
|
trusted library allocation
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3F11C1000
|
trusted library allocation
|
page read and write
|
||
1A3E9266000
|
trusted library allocation
|
page read and write
|
||
1A3EE02B000
|
trusted library allocation
|
page read and write
|
||
1A3E2335000
|
trusted library allocation
|
page read and write
|
||
1A3E7AE1000
|
trusted library allocation
|
page read and write
|
||
1A3DC04E000
|
heap
|
page read and write
|
||
1A3E69D8000
|
trusted library allocation
|
page read and write
|
||
1A3E6B34000
|
trusted library allocation
|
page read and write
|
||
1A3E758F000
|
trusted library allocation
|
page read and write
|
||
1A3E6B4A000
|
trusted library allocation
|
page read and write
|
||
1D9067B7000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3ED1C6000
|
trusted library allocation
|
page read and write
|
||
1A3E6189000
|
trusted library allocation
|
page read and write
|
||
1A3E6BF8000
|
trusted library allocation
|
page read and write
|
||
1CA8DC00000
|
heap
|
page read and write
|
||
1A3DBFF7000
|
heap
|
page read and write
|
||
20AA3A50000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E6BF4000
|
trusted library allocation
|
page read and write
|
||
1A3F169D000
|
heap
|
page read and write
|
||
1A3E6789000
|
trusted library allocation
|
page read and write
|
||
C7D3D000
|
trusted library allocation
|
page execute read
|
||
1A3ED049000
|
trusted library allocation
|
page read and write
|
||
1A3E2033000
|
trusted library allocation
|
page read and write
|
||
1A3E628F000
|
trusted library allocation
|
page read and write
|
||
1A3EE0CE000
|
trusted library allocation
|
page read and write
|
||
1A3E74A0000
|
trusted library allocation
|
page read and write
|
||
1A3E6197000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3F1088000
|
trusted library allocation
|
page read and write
|
||
1A3E6157000
|
trusted library allocation
|
page read and write
|
||
1A3EEAFC000
|
trusted library allocation
|
page read and write
|
||
1A3E0FFB000
|
trusted library allocation
|
page read and write
|
||
1A3E6BB2000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1CA8DB47000
|
trusted library allocation
|
page read and write
|
||
8FE1D3E000
|
stack
|
page read and write
|
||
1A3E4F72000
|
trusted library allocation
|
page read and write
|
||
1A3EE0F5000
|
trusted library allocation
|
page read and write
|
||
1A3EEB89000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E5EC6000
|
trusted library allocation
|
page read and write
|
||
1A3EE154000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFDE000
|
heap
|
page read and write
|
||
1A3F1586000
|
trusted library allocation
|
page read and write
|
||
1A3ED69C000
|
trusted library allocation
|
page read and write
|
||
1A3ED3B5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
20AA3B00000
|
trusted library allocation
|
page read and write
|
||
1A3E69E7000
|
trusted library allocation
|
page read and write
|
||
1A3ED341000
|
trusted library allocation
|
page read and write
|
||
1A3E6BEE000
|
trusted library allocation
|
page read and write
|
||
1D906649000
|
heap
|
page read and write
|
||
1A3DC024000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E5E38000
|
trusted library allocation
|
page read and write
|
||
1A3E6961000
|
trusted library allocation
|
page read and write
|
||
1A3E669D000
|
trusted library allocation
|
page read and write
|
||
1CA8DBC9000
|
trusted library allocation
|
page read and write
|
||
1A3E5047000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD3000
|
heap
|
page read and write
|
||
1A3F0A8F000
|
trusted library allocation
|
page read and write
|
||
1A3E75D5000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E69E4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE3000
|
heap
|
page read and write
|
||
1A3E69DC000
|
trusted library allocation
|
page read and write
|
||
1A3EE2F2000
|
trusted library allocation
|
page read and write
|
||
1A3E68E3000
|
trusted library allocation
|
page read and write
|
||
1A3E6B27000
|
trusted library allocation
|
page read and write
|
||
1A3E6B27000
|
trusted library allocation
|
page read and write
|
||
1A3E1075000
|
trusted library allocation
|
page read and write
|
||
1A3ED03C000
|
trusted library allocation
|
page read and write
|
||
1A3E09C4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E5163000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E8639000
|
trusted library allocation
|
page read and write
|
||
1A3E662F000
|
trusted library allocation
|
page read and write
|
||
1A3E67A9000
|
trusted library allocation
|
page read and write
|
||
1A3ED573000
|
trusted library allocation
|
page read and write
|
||
1A3F11A8000
|
trusted library allocation
|
page read and write
|
||
1A3E628D000
|
trusted library allocation
|
page read and write
|
||
1A3E62A8000
|
trusted library allocation
|
page read and write
|
||
1A3F1656000
|
heap
|
page read and write
|
||
1A3ED29C000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E5BA2000
|
trusted library allocation
|
page read and write
|
||
1A3E5B9E000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1D90672B000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E616C000
|
trusted library allocation
|
page read and write
|
||
1A3E6B08000
|
trusted library allocation
|
page read and write
|
||
1CA8DB64000
|
trusted library allocation
|
page read and write
|
||
1A3EE148000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3EDCA3000
|
trusted library allocation
|
page read and write
|
||
1A3ED331000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3F2128000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3F0A97000
|
trusted library allocation
|
page read and write
|
||
1D906784000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E2050000
|
trusted library allocation
|
page read and write
|
||
1A3E86F8000
|
trusted library allocation
|
page read and write
|
||
1A3E51AC000
|
trusted library allocation
|
page read and write
|
||
1E58EFC0000
|
heap
|
page read and write
|
||
1A3E6BAE000
|
trusted library allocation
|
page read and write
|
||
1A3EE2F3000
|
trusted library allocation
|
page read and write
|
||
1A3E8BC1000
|
trusted library allocation
|
page read and write
|
||
1A3E507B000
|
trusted library allocation
|
page read and write
|
||
1A3E69BC000
|
trusted library allocation
|
page read and write
|
||
1A3E6660000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E6BE0000
|
trusted library allocation
|
page read and write
|
||
1A3EE1F9000
|
trusted library allocation
|
page read and write
|
||
1A3E86D5000
|
trusted library allocation
|
page read and write
|
||
1A3E7CCF000
|
trusted library allocation
|
page read and write
|
||
1A3EE065000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3E61AA000
|
trusted library allocation
|
page read and write
|
||
1A3EF7F5000
|
trusted library allocation
|
page read and write
|
||
1A3ED0BF000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3ED322000
|
trusted library allocation
|
page read and write
|
||
1A3E2290000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEB000
|
heap
|
page read and write
|
||
1A3E662F000
|
trusted library allocation
|
page read and write
|
||
1A3E69DF000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDE000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1A3E221C000
|
trusted library allocation
|
page read and write
|
||
1A3E4B33000
|
trusted library allocation
|
page read and write
|
||
1A3ED1D4000
|
trusted library allocation
|
page read and write
|
||
1A3E2653000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E625B000
|
trusted library allocation
|
page read and write
|
||
1A3E7CD1000
|
trusted library allocation
|
page read and write
|
||
1A3E2044000
|
trusted library allocation
|
page read and write
|
||
1A3E89F0000
|
trusted library allocation
|
page read and write
|
||
1A3F1195000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFE4000
|
heap
|
page read and write
|
||
1A3EE1F9000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D7000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
1CA8DE08000
|
heap
|
page read and write
|
||
1A3F138F000
|
trusted library allocation
|
page read and write
|
||
1A3F11A3000
|
trusted library allocation
|
page read and write
|
||
1A3E1FC1000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED3C3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
E1000
|
unkown
|
page execute read
|
||
1A3EE085000
|
trusted library allocation
|
page read and write
|
||
1A3E6A73000
|
trusted library allocation
|
page read and write
|
||
1A3E5EB8000
|
trusted library allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
1A3E6BCF000
|
trusted library allocation
|
page read and write
|
||
1A3E225F000
|
trusted library allocation
|
page read and write
|
||
1A3E9324000
|
trusted library allocation
|
page read and write
|
||
1D906798000
|
heap
|
page read and write
|
||
1A3E89FB000
|
trusted library allocation
|
page read and write
|
||
1A3F06DA000
|
trusted library allocation
|
page read and write
|
||
1D906164000
|
unkown
|
page execute read
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3EE0D2000
|
trusted library allocation
|
page read and write
|
||
1A3E7AB4000
|
trusted library allocation
|
page read and write
|
||
1A3EEBCA000
|
trusted library allocation
|
page read and write
|
||
1A3E7A26000
|
trusted library allocation
|
page read and write
|
||
1A3E6A5D000
|
trusted library allocation
|
page read and write
|
||
1A3ED359000
|
trusted library allocation
|
page read and write
|
||
1D905A6F000
|
trusted library allocation
|
page read and write
|
||
1A3E75AA000
|
trusted library allocation
|
page read and write
|
||
1A3E89C9000
|
trusted library allocation
|
page read and write
|
||
1A3E6BC9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFB8000
|
heap
|
page read and write
|
||
20AA3DC4000
|
heap
|
page read and write
|
||
1A3ED198000
|
trusted library allocation
|
page read and write
|
||
1A3F1603000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3E663F000
|
trusted library allocation
|
page read and write
|
||
1CA8DB2E000
|
trusted library allocation
|
page read and write
|
||
1A3E6869000
|
trusted library allocation
|
page read and write
|
||
1A3E7A24000
|
trusted library allocation
|
page read and write
|
||
1A3EE093000
|
trusted library allocation
|
page read and write
|
||
1A3ED53E000
|
trusted library allocation
|
page read and write
|
||
1A3E4F61000
|
trusted library allocation
|
page read and write
|
||
1A3EE1F3000
|
trusted library allocation
|
page read and write
|
||
1A3E2686000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3F169D000
|
heap
|
page read and write
|
||
1A3F16B0000
|
heap
|
page read and write
|
||
1A3F0622000
|
trusted library allocation
|
page read and write
|
||
1A3E26F4000
|
trusted library allocation
|
page read and write
|
||
1A3EE13C000
|
trusted library allocation
|
page read and write
|
||
1A3E629F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E508E000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
20AA3DC6000
|
heap
|
page read and write
|
||
1A3ED3C8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3ED137000
|
trusted library allocation
|
page read and write
|
||
1E58D48A000
|
heap
|
page read and write
|
||
1A3E6BEB000
|
trusted library allocation
|
page read and write
|
||
1A3E664A000
|
trusted library allocation
|
page read and write
|
||
1D9066CA000
|
heap
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3ED1F8000
|
trusted library allocation
|
page read and write
|
||
1A3E2078000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3E1013000
|
trusted library allocation
|
page read and write
|
||
1CA8DBBA000
|
trusted library allocation
|
page read and write
|
||
1E58D470000
|
heap
|
page read and write
|
||
1A3EE04C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3EE167000
|
trusted library allocation
|
page read and write
|
||
1A3F061E000
|
trusted library allocation
|
page read and write
|
||
1A3ED53E000
|
trusted library allocation
|
page read and write
|
||
1A3ED0B6000
|
trusted library allocation
|
page read and write
|
||
1A3F0A38000
|
trusted library allocation
|
page read and write
|
||
1CA8DB66000
|
trusted library allocation
|
page read and write
|
||
1A3E6953000
|
trusted library allocation
|
page read and write
|
||
1A3E67A9000
|
trusted library allocation
|
page read and write
|
||
1A3E6B2B000
|
trusted library allocation
|
page read and write
|
||
1A3E88D9000
|
trusted library allocation
|
page read and write
|
||
A0BD2BE000
|
unkown
|
page readonly
|
||
1A3ED1D4000
|
trusted library allocation
|
page read and write
|
||
1A3E53D9000
|
trusted library allocation
|
page read and write
|
||
1A3F10F7000
|
trusted library allocation
|
page read and write
|
||
1A3ED6DA000
|
trusted library allocation
|
page read and write
|
||
1A3E0FF6000
|
trusted library allocation
|
page read and write
|
||
1A3E69D1000
|
trusted library allocation
|
page read and write
|
||
1A3ED1F2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3EDB08000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3ED521000
|
trusted library allocation
|
page read and write
|
||
1A3E4B60000
|
trusted library allocation
|
page read and write
|
||
1A3E5B95000
|
trusted library allocation
|
page read and write
|
||
1A3EE2F2000
|
trusted library allocation
|
page read and write
|
||
1A3E6AB1000
|
trusted library allocation
|
page read and write
|
||
1A3ED5F0000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DF000
|
trusted library allocation
|
page read and write
|
||
1D9067B7000
|
heap
|
page read and write
|
||
1A3ED3D6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFF3000
|
heap
|
page read and write
|
||
1A3E92CA000
|
trusted library allocation
|
page read and write
|
||
1A3F14E6000
|
trusted library allocation
|
page read and write
|
||
1A3E10EE000
|
trusted library allocation
|
page read and write
|
||
1A3E1061000
|
trusted library allocation
|
page read and write
|
||
1A3E66A3000
|
trusted library allocation
|
page read and write
|
||
1A3EDBC4000
|
trusted library allocation
|
page read and write
|
||
1A3ED40F000
|
trusted library allocation
|
page read and write
|
||
1CA8DD12000
|
trusted library allocation
|
page read and write
|
||
1A3ED4F4000
|
trusted library allocation
|
page read and write
|
||
1A3E8EE1000
|
trusted library allocation
|
page read and write
|
||
A0BBABE000
|
stack
|
page read and write
|
||
1A3EE2ED000
|
trusted library allocation
|
page read and write
|
||
1A3F1586000
|
trusted library allocation
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3E61B6000
|
trusted library allocation
|
page read and write
|
||
1A3DC024000
|
heap
|
page read and write
|
||
1A3E5E51000
|
trusted library allocation
|
page read and write
|
||
1A3ED527000
|
trusted library allocation
|
page read and write
|
||
1A3E625B000
|
trusted library allocation
|
page read and write
|
||
1A3EE14E000
|
trusted library allocation
|
page read and write
|
||
1A3E61D1000
|
trusted library allocation
|
page read and write
|
||
1A3E101E000
|
trusted library allocation
|
page read and write
|
||
1A3EE0B3000
|
trusted library allocation
|
page read and write
|
||
1A3E69D8000
|
trusted library allocation
|
page read and write
|
||
1A3EEBFC000
|
trusted library allocation
|
page read and write
|
||
1A3F138D000
|
trusted library allocation
|
page read and write
|
||
1A3E4F4E000
|
trusted library allocation
|
page read and write
|
||
1A3ED65F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3EDB9A000
|
trusted library allocation
|
page read and write
|
||
1A3EE0E0000
|
trusted library allocation
|
page read and write
|
||
1A3ED671000
|
trusted library allocation
|
page read and write
|
||
1A3E6572000
|
trusted library allocation
|
page read and write
|
||
1A3E75AA000
|
trusted library allocation
|
page read and write
|
||
1A3E4BFE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3F2073000
|
trusted library allocation
|
page read and write
|
||
1A3EDB48000
|
trusted library allocation
|
page read and write
|
||
1A3ED2DE000
|
trusted library allocation
|
page read and write
|
||
1A3E099A000
|
trusted library allocation
|
page read and write
|
||
20AA3C19000
|
trusted library allocation
|
page read and write
|
||
1A3E4B61000
|
trusted library allocation
|
page read and write
|
||
1A3E6A3F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1D9056E0000
|
unclassified section
|
page readonly
|
||
13CE000
|
heap
|
page read and write
|
||
1A3E204D000
|
trusted library allocation
|
page read and write
|
||
1A3ED3FD000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1CA8DD00000
|
trusted library allocation
|
page read and write
|
||
1A3ED315000
|
trusted library allocation
|
page read and write
|
||
1A3E7A30000
|
trusted library allocation
|
page read and write
|
||
1CA8D7D0000
|
remote allocation
|
page read and write
|
||
1A3E8984000
|
trusted library allocation
|
page read and write
|
||
3A21000
|
heap
|
page read and write
|
||
1CA8D7F0000
|
unclassified section
|
page readonly
|
||
1A3E5129000
|
trusted library allocation
|
page read and write
|
||
1A3E4F8A000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3EE0FC000
|
trusted library allocation
|
page read and write
|
||
1D906146000
|
unkown
|
page execute read
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1D906731000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3E0F2F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3F11AE000
|
trusted library allocation
|
page read and write
|
||
1A3F212A000
|
trusted library allocation
|
page read and write
|
||
1A3E8EAD000
|
trusted library allocation
|
page read and write
|
||
1A3DC03B000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3EE09D000
|
trusted library allocation
|
page read and write
|
||
1A3ED19B000
|
trusted library allocation
|
page read and write
|
||
1A3ED5A0000
|
trusted library allocation
|
page read and write
|
||
1A3ED65B000
|
trusted library allocation
|
page read and write
|
||
1CA8D7E6000
|
remote allocation
|
page execute read
|
||
1D90676A000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E8667000
|
trusted library allocation
|
page read and write
|
||
1A3ED577000
|
trusted library allocation
|
page read and write
|
||
1A3DC066000
|
heap
|
page read and write
|
||
1A3DC035000
|
heap
|
page read and write
|
||
1A3E5EB5000
|
trusted library allocation
|
page read and write
|
||
1A3EDB68000
|
trusted library allocation
|
page read and write
|
||
1E58D482000
|
heap
|
page read and write
|
||
13BC000
|
heap
|
page read and write
|
||
1A3E518A000
|
trusted library allocation
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
1A3E5BB2000
|
trusted library allocation
|
page read and write
|
||
1A3EE09D000
|
trusted library allocation
|
page read and write
|
||
1A3E6A90000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
1CA8D9E0000
|
unclassified section
|
page read and write
|
||
1A3ED147000
|
trusted library allocation
|
page read and write
|
||
1A3E519C000
|
trusted library allocation
|
page read and write
|
||
20AA3C5D000
|
trusted library allocation
|
page read and write
|
||
1A3ED539000
|
trusted library allocation
|
page read and write
|
||
1A3EDB4A000
|
trusted library allocation
|
page read and write
|
||
1A3EE0BB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1CA8DB81000
|
trusted library allocation
|
page read and write
|
||
1A3ED0FD000
|
trusted library allocation
|
page read and write
|
||
1A3E519A000
|
trusted library allocation
|
page read and write
|
||
1A3E6A81000
|
trusted library allocation
|
page read and write
|
||
1A3E53CD000
|
trusted library allocation
|
page read and write
|
||
1A3EF6AA000
|
trusted library allocation
|
page read and write
|
||
1CA8D800000
|
unclassified section
|
page readonly
|
||
1A3EE136000
|
trusted library allocation
|
page read and write
|
||
1A3E65B2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
FAD91EE000
|
unkown
|
page readonly
|
||
1A3DC038000
|
heap
|
page read and write
|
||
1A3ED4F4000
|
trusted library allocation
|
page read and write
|
||
1A3EDCD5000
|
trusted library allocation
|
page read and write
|
||
1A3EE093000
|
trusted library allocation
|
page read and write
|
||
1D9067AC000
|
heap
|
page read and write
|
||
1A3E69D9000
|
trusted library allocation
|
page read and write
|
||
1A3E698C000
|
trusted library allocation
|
page read and write
|
||
1A3F119D000
|
trusted library allocation
|
page read and write
|
||
1A3E5E48000
|
trusted library allocation
|
page read and write
|
||
1A3EE0BB000
|
trusted library allocation
|
page read and write
|
||
1A3EDB04000
|
trusted library allocation
|
page read and write
|
||
1A3F15AC000
|
trusted library allocation
|
page read and write
|
||
1A3E61C3000
|
trusted library allocation
|
page read and write
|
||
1A3E62EE000
|
trusted library allocation
|
page read and write
|
||
1A3ED29C000
|
trusted library allocation
|
page read and write
|
||
1A3ED4DB000
|
trusted library allocation
|
page read and write
|
||
1C22AF60000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3E1026000
|
trusted library allocation
|
page read and write
|
||
1A3E5E9B000
|
trusted library allocation
|
page read and write
|
||
1A3E8980000
|
trusted library allocation
|
page read and write
|
||
1A3ED0B6000
|
trusted library allocation
|
page read and write
|
||
1A3ED4C7000
|
trusted library allocation
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3DC045000
|
heap
|
page read and write
|
||
1A3E6AEB000
|
trusted library allocation
|
page read and write
|
||
1A3ED18B000
|
trusted library allocation
|
page read and write
|
||
1A3F135B000
|
trusted library allocation
|
page read and write
|
||
1A3E6A40000
|
trusted library allocation
|
page read and write
|
||
1C22B10A000
|
trusted library allocation
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3EE065000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3E6653000
|
trusted library allocation
|
page read and write
|
||
1A3E6753000
|
trusted library allocation
|
page read and write
|
||
1A3ED36C000
|
trusted library allocation
|
page read and write
|
||
1A3E09BF000
|
trusted library allocation
|
page read and write
|
||
1A3E679F000
|
trusted library allocation
|
page read and write
|
||
1A3ED2F0000
|
trusted library allocation
|
page read and write
|
||
1A3E6773000
|
trusted library allocation
|
page read and write
|
||
1A3E5B69000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3F1603000
|
heap
|
page read and write
|
||
1A3DBFD3000
|
heap
|
page read and write
|
||
1A3E62AE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E755C000
|
trusted library allocation
|
page read and write
|
||
1A3E53FC000
|
trusted library allocation
|
page read and write
|
||
1A3E50BB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E53F6000
|
trusted library allocation
|
page read and write
|
||
1A3F06A8000
|
trusted library allocation
|
page read and write
|
||
1A3E8628000
|
trusted library allocation
|
page read and write
|
||
1A3ED689000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E76B0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E62B1000
|
trusted library allocation
|
page read and write
|
||
1A3E651F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED2A0000
|
trusted library allocation
|
page read and write
|
||
1A3EEB61000
|
trusted library allocation
|
page read and write
|
||
1A3EE132000
|
trusted library allocation
|
page read and write
|
||
1A3E4D00000
|
trusted library allocation
|
page read and write
|
||
1A3E8BD9000
|
trusted library allocation
|
page read and write
|
||
1A3E615C000
|
trusted library allocation
|
page read and write
|
||
1D9066AC000
|
heap
|
page read and write
|
||
1A3ED680000
|
trusted library allocation
|
page read and write
|
||
20AA3C82000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3F0A97000
|
trusted library allocation
|
page read and write
|
||
1A3DC035000
|
heap
|
page read and write
|
||
20AA3F07000
|
trusted library allocation
|
page read and write
|
||
1A3EEAD6000
|
trusted library allocation
|
page read and write
|
||
1A3ECFCD000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3F107E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1D906130000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3F1639000
|
heap
|
page read and write
|
||
1A3E7AE5000
|
trusted library allocation
|
page read and write
|
||
1A3F15A1000
|
trusted library allocation
|
page read and write
|
||
1A3E5BB7000
|
trusted library allocation
|
page read and write
|
||
1A3EDCAB000
|
trusted library allocation
|
page read and write
|
||
1A3EDC43000
|
trusted library allocation
|
page read and write
|
||
1A3E1F88000
|
trusted library allocation
|
page read and write
|
||
1A3E0FFE000
|
trusted library allocation
|
page read and write
|
||
1A3E67C2000
|
trusted library allocation
|
page read and write
|
||
1D906726000
|
heap
|
page read and write
|
||
1A3E6B4E000
|
trusted library allocation
|
page read and write
|
||
1A3ED41B000
|
trusted library allocation
|
page read and write
|
||
1A3E665B000
|
trusted library allocation
|
page read and write
|
||
1A3E69BE000
|
trusted library allocation
|
page read and write
|
||
1A3E677E000
|
trusted library allocation
|
page read and write
|
||
1A3F212E000
|
trusted library allocation
|
page read and write
|
||
1A3EE030000
|
trusted library allocation
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3F16B0000
|
heap
|
page read and write
|
||
1A3E61EB000
|
trusted library allocation
|
page read and write
|
||
1A3E6589000
|
trusted library allocation
|
page read and write
|
||
1A3E61DB000
|
trusted library allocation
|
page read and write
|
||
1A3EE2DF000
|
trusted library allocation
|
page read and write
|
||
1A3EE163000
|
trusted library allocation
|
page read and write
|
||
1A3E89D6000
|
trusted library allocation
|
page read and write
|
||
1A3F1576000
|
trusted library allocation
|
page read and write
|
||
1A3ED539000
|
trusted library allocation
|
page read and write
|
||
1A3E7423000
|
trusted library allocation
|
page read and write
|
||
1A3ED6F4000
|
trusted library allocation
|
page read and write
|
||
1A3F06B0000
|
trusted library allocation
|
page read and write
|
||
1A3E6985000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3DC00C000
|
heap
|
page read and write
|
||
1A3F14E2000
|
trusted library allocation
|
page read and write
|
||
1A3E75CD000
|
trusted library allocation
|
page read and write
|
||
1A3ED29A000
|
trusted library allocation
|
page read and write
|
||
1A3E22F8000
|
trusted library allocation
|
page read and write
|
||
1A3E4BDB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE5000
|
heap
|
page read and write
|
||
1A3EE12B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E22F4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E5184000
|
trusted library allocation
|
page read and write
|
||
1C22AF70000
|
heap
|
page read and write
|
||
1A3E6AA5000
|
trusted library allocation
|
page read and write
|
||
1A3DC000000
|
heap
|
page read and write
|
||
1A3E8E58000
|
trusted library allocation
|
page read and write
|
||
1A3F1603000
|
heap
|
page read and write
|
||
1A3E6A45000
|
trusted library allocation
|
page read and write
|
||
1A3ED19B000
|
trusted library allocation
|
page read and write
|
||
1A3ED6A2000
|
trusted library allocation
|
page read and write
|
||
1A3E6683000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3DBFEB000
|
heap
|
page read and write
|
||
1A3ED545000
|
trusted library allocation
|
page read and write
|
||
1CA8DB23000
|
trusted library allocation
|
page read and write
|
||
1A3F1710000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E66BB000
|
trusted library allocation
|
page read and write
|
||
1D9066A4000
|
heap
|
page read and write
|
||
1A3E6AF4000
|
trusted library allocation
|
page read and write
|
||
1A3F1195000
|
trusted library allocation
|
page read and write
|
||
1A3E614F000
|
trusted library allocation
|
page read and write
|
||
1A3F1598000
|
trusted library allocation
|
page read and write
|
||
1A3EDCAB000
|
trusted library allocation
|
page read and write
|
||
1A3E10B9000
|
trusted library allocation
|
page read and write
|
||
1A3E76E3000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DF000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3ED5F0000
|
trusted library allocation
|
page read and write
|
||
1A3E861E000
|
trusted library allocation
|
page read and write
|
||
1A3EE084000
|
trusted library allocation
|
page read and write
|
||
1E58D475000
|
heap
|
page read and write
|
||
1A3F1710000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E6AB1000
|
trusted library allocation
|
page read and write
|
||
1A3E7A3C000
|
trusted library allocation
|
page read and write
|
||
1D905A81000
|
trusted library allocation
|
page read and write
|
||
1A3E68FB000
|
trusted library allocation
|
page read and write
|
||
1A3ED1EB000
|
trusted library allocation
|
page read and write
|
||
1A3ED372000
|
trusted library allocation
|
page read and write
|
||
1A3E7AC8000
|
trusted library allocation
|
page read and write
|
||
1A3E61B6000
|
trusted library allocation
|
page read and write
|
||
1A3ED3DB000
|
trusted library allocation
|
page read and write
|
||
1A3E6A5D000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3ED585000
|
trusted library allocation
|
page read and write
|
||
1A3F0AE6000
|
trusted library allocation
|
page read and write
|
||
1A3EDCAB000
|
trusted library allocation
|
page read and write
|
||
13BC000
|
heap
|
page read and write
|
||
1A3F14E0000
|
trusted library allocation
|
page read and write
|
||
1A3E5BB5000
|
trusted library allocation
|
page read and write
|
||
1A3EDCB1000
|
trusted library allocation
|
page read and write
|
||
1A3E09EF000
|
trusted library allocation
|
page read and write
|
||
1A3E7A83000
|
trusted library allocation
|
page read and write
|
||
1A3E864F000
|
trusted library allocation
|
page read and write
|
||
1A3EE030000
|
trusted library allocation
|
page read and write
|
||
1A3E616D000
|
trusted library allocation
|
page read and write
|
||
1A3E2039000
|
trusted library allocation
|
page read and write
|
||
A0B7FAE000
|
unkown
|
page readonly
|
||
1ED4D1024000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
A0B99FE000
|
stack
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3E2624000
|
trusted library allocation
|
page read and write
|
||
1A3ED58A000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E69D8000
|
trusted library allocation
|
page read and write
|
||
1D90673C000
|
heap
|
page read and write
|
||
1A3E5EBA000
|
trusted library allocation
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFC5000
|
heap
|
page read and write
|
||
1A3E09C0000
|
trusted library allocation
|
page read and write
|
||
1A3EDCA5000
|
trusted library allocation
|
page read and write
|
||
1A3E20EA000
|
trusted library allocation
|
page read and write
|
||
1A3E618F000
|
trusted library allocation
|
page read and write
|
||
1A3DC046000
|
heap
|
page read and write
|
||
1A3DC00A000
|
heap
|
page read and write
|
||
1A3EE0B3000
|
trusted library allocation
|
page read and write
|
||
1A3E7AE1000
|
trusted library allocation
|
page read and write
|
||
1A3F11C9000
|
trusted library allocation
|
page read and write
|
||
1A3E50B9000
|
trusted library allocation
|
page read and write
|
||
1A3E7A2B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF2000
|
heap
|
page read and write
|
||
1A3F0AA0000
|
trusted library allocation
|
page read and write
|
||
1ED4D101E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3F16C5000
|
heap
|
page read and write
|
||
1A3DC060000
|
heap
|
page read and write
|
||
1A3DBFDC000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E62A3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3F0A38000
|
trusted library allocation
|
page read and write
|
||
1CA8D9E2000
|
unclassified section
|
page read and write
|
||
1A3ED1FD000
|
trusted library allocation
|
page read and write
|
||
1A3F14FE000
|
trusted library allocation
|
page read and write
|
||
1A3E4BDC000
|
trusted library allocation
|
page read and write
|
||
1A3F0AA0000
|
trusted library allocation
|
page read and write
|
||
1A3ED1A1000
|
trusted library allocation
|
page read and write
|
||
1CA8DBE7000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3EDBE9000
|
trusted library allocation
|
page read and write
|
||
1A3F16A0000
|
heap
|
page read and write
|
||
1A3EE033000
|
trusted library allocation
|
page read and write
|
||
1A3E530F000
|
trusted library allocation
|
page read and write
|
||
1A3EDBD8000
|
trusted library allocation
|
page read and write
|
||
1A3E1F25000
|
trusted library allocation
|
page read and write
|
||
1A3E6A15000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
20AA3CDB000
|
trusted library allocation
|
page read and write
|
||
1A3DC003000
|
heap
|
page read and write
|
||
1A3EE045000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D7000
|
trusted library allocation
|
page read and write
|
||
1A3ED3D6000
|
trusted library allocation
|
page read and write
|
||
1A3E6558000
|
trusted library allocation
|
page read and write
|
||
1D90669C000
|
heap
|
page read and write
|
||
1A3E699E000
|
trusted library allocation
|
page read and write
|
||
1A3E7ACD000
|
trusted library allocation
|
page read and write
|
||
1A3E5E33000
|
trusted library allocation
|
page read and write
|
||
1A3DC04E000
|
heap
|
page read and write
|
||
1A3E5194000
|
trusted library allocation
|
page read and write
|
||
1A3E68DD000
|
trusted library allocation
|
page read and write
|
||
1A3EDB50000
|
trusted library allocation
|
page read and write
|
||
1D905A6A000
|
trusted library allocation
|
page read and write
|
||
1C22AF40000
|
heap
|
page read and write
|
||
1A3ED4E8000
|
trusted library allocation
|
page read and write
|
||
1A3E5171000
|
trusted library allocation
|
page read and write
|
||
1A3E6948000
|
trusted library allocation
|
page read and write
|
||
1A3E6AF6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E20EF000
|
trusted library allocation
|
page read and write
|
||
1A3EE13C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3ED1BE000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1D906723000
|
heap
|
page read and write
|
||
1A3E2669000
|
trusted library allocation
|
page read and write
|
||
1A3E5E25000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3F210B000
|
trusted library allocation
|
page read and write
|
||
A0B89D8000
|
stack
|
page read and write
|
||
1A3ED3F4000
|
trusted library allocation
|
page read and write
|
||
1A3E2227000
|
trusted library allocation
|
page read and write
|
||
1A3E6AF6000
|
trusted library allocation
|
page read and write
|
||
1A3F0665000
|
trusted library allocation
|
page read and write
|
||
1D905A48000
|
trusted library allocation
|
page read and write
|
||
1A3ED39F000
|
trusted library allocation
|
page read and write
|
||
1CA8DB03000
|
trusted library allocation
|
page read and write
|
||
1A3F060F000
|
trusted library allocation
|
page read and write
|
||
1A3E1075000
|
trusted library allocation
|
page read and write
|
||
1A3ED3A5000
|
trusted library allocation
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3E7A51000
|
trusted library allocation
|
page read and write
|
||
1A3E6B4A000
|
trusted library allocation
|
page read and write
|
||
1A3ED579000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D2000
|
trusted library allocation
|
page read and write
|
||
1A3E7AED000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE4000
|
trusted library allocation
|
page read and write
|
||
1A3E50FC000
|
trusted library allocation
|
page read and write
|
||
1A3E6290000
|
trusted library allocation
|
page read and write
|
||
1A3E28CF000
|
heap
|
page read and write
|
||
1A3E7AAF000
|
trusted library allocation
|
page read and write
|
||
20AA3A4F000
|
unclassified section
|
page read and write
|
||
1A3E1F4B000
|
trusted library allocation
|
page read and write
|
||
1A3E4F8A000
|
trusted library allocation
|
page read and write
|
||
1A3EE065000
|
trusted library allocation
|
page read and write
|
||
1E58EFAD000
|
heap
|
page read and write
|
||
1A3F1088000
|
trusted library allocation
|
page read and write
|
||
1A3E6558000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF3000
|
heap
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3EE033000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DB000
|
trusted library allocation
|
page read and write
|
||
1A3DC000000
|
heap
|
page read and write
|
||
1A3F13FE000
|
trusted library allocation
|
page read and write
|
||
1A3EE0C5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1D90669C000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E6B25000
|
trusted library allocation
|
page read and write
|
||
1A3E6650000
|
trusted library allocation
|
page read and write
|
||
A0B7EAE000
|
unkown
|
page readonly
|
||
1A3E6BEE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3F16C5000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E2261000
|
trusted library allocation
|
page read and write
|
||
1A3EE041000
|
trusted library allocation
|
page read and write
|
||
1A3E22F6000
|
trusted library allocation
|
page read and write
|
||
1A3E552B000
|
trusted library allocation
|
page read and write
|
||
1A3DC02C000
|
heap
|
page read and write
|
||
1A3E2047000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDE000
|
heap
|
page read and write
|
||
1A3E7A32000
|
trusted library allocation
|
page read and write
|
||
1E58EFBA000
|
heap
|
page read and write
|
||
1A3F134A000
|
trusted library allocation
|
page read and write
|
||
1A3F109E000
|
trusted library allocation
|
page read and write
|
||
1A3E6484000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED03F000
|
trusted library allocation
|
page read and write
|
||
1A3E6AF4000
|
trusted library allocation
|
page read and write
|
||
1A3E4F61000
|
trusted library allocation
|
page read and write
|
||
1A3E8662000
|
trusted library allocation
|
page read and write
|
||
1A3F16A0000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1D906720000
|
heap
|
page read and write
|
||
1A3E65FC000
|
trusted library allocation
|
page read and write
|
||
1E58D450000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
24FD8E03000
|
trusted library allocation
|
page read and write
|
||
1A3EE1AC000
|
trusted library allocation
|
page read and write
|
||
1A3E1F58000
|
trusted library allocation
|
page read and write
|
||
1A3F10E6000
|
trusted library allocation
|
page read and write
|
||
1A3E2899000
|
heap
|
page read and write
|
||
1A3EE08B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E89CE000
|
trusted library allocation
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3E2282000
|
trusted library allocation
|
page read and write
|
||
1CA8D760000
|
unclassified section
|
page readonly
|
||
1A3E6BD1000
|
trusted library allocation
|
page read and write
|
||
1A3E669B000
|
trusted library allocation
|
page read and write
|
||
1A3F11DF000
|
trusted library allocation
|
page read and write
|
||
1A3E65FC000
|
trusted library allocation
|
page read and write
|
||
1A3F1593000
|
trusted library allocation
|
page read and write
|
||
1A3EE243000
|
trusted library allocation
|
page read and write
|
||
1A3E2899000
|
heap
|
page read and write
|
||
1A3E7C8B000
|
trusted library allocation
|
page read and write
|
||
1A3E6A81000
|
trusted library allocation
|
page read and write
|
||
1A3E4F3C000
|
trusted library allocation
|
page read and write
|
||
1A3ED4B8000
|
trusted library allocation
|
page read and write
|
||
1D9066A0000
|
heap
|
page read and write
|
||
1A3E6A71000
|
trusted library allocation
|
page read and write
|
||
1A3E4F8D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
457BFF000
|
stack
|
page read and write
|
||
1A3E512B000
|
trusted library allocation
|
page read and write
|
||
1A3E5E2D000
|
trusted library allocation
|
page read and write
|
||
1A3EF7F9000
|
trusted library allocation
|
page read and write
|
||
1A3E6A5F000
|
trusted library allocation
|
page read and write
|
||
1A3E4B33000
|
trusted library allocation
|
page read and write
|
||
1E58EFC1000
|
heap
|
page read and write
|
||
FADD3FE000
|
unkown
|
page readonly
|
||
1A3E6741000
|
trusted library allocation
|
page read and write
|
||
1A3EF798000
|
trusted library allocation
|
page read and write
|
||
1A3E6AF6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3F155E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E5191000
|
trusted library allocation
|
page read and write
|
||
1A3F0A75000
|
trusted library allocation
|
page read and write
|
||
1A3E664C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E665A000
|
trusted library allocation
|
page read and write
|
||
1D905A86000
|
trusted library allocation
|
page read and write
|
||
1A3DC002000
|
heap
|
page read and write
|
||
1A3ED024000
|
trusted library allocation
|
page read and write
|
||
1A3F1598000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1D9066A0000
|
heap
|
page read and write
|
||
1A3E6BAE000
|
trusted library allocation
|
page read and write
|
||
1A3E868A000
|
trusted library allocation
|
page read and write
|
||
1A3E50BE000
|
trusted library allocation
|
page read and write
|
||
1A3E7A73000
|
trusted library allocation
|
page read and write
|
||
1A3DC03C000
|
heap
|
page read and write
|
||
1A3EDCF9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E7AD7000
|
trusted library allocation
|
page read and write
|
||
1A3E5E19000
|
trusted library allocation
|
page read and write
|
||
1A3DC03E000
|
heap
|
page read and write
|
||
1A3ED198000
|
trusted library allocation
|
page read and write
|
||
1D905AC2000
|
trusted library allocation
|
page read and write
|
||
1A3EEABA000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E621F000
|
trusted library allocation
|
page read and write
|
||
1A3F169D000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
1A3F0AA0000
|
trusted library allocation
|
page read and write
|
||
1A3E6293000
|
trusted library allocation
|
page read and write
|
||
1A3ED01D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3F13E5000
|
trusted library allocation
|
page read and write
|
||
1A3E6637000
|
trusted library allocation
|
page read and write
|
||
1A3E7A26000
|
trusted library allocation
|
page read and write
|
||
1A3E698F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED08E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E6AEC000
|
trusted library allocation
|
page read and write
|
||
1D906728000
|
heap
|
page read and write
|
||
1E58D48A000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1D9066CA000
|
heap
|
page read and write
|
||
1A3E226E000
|
trusted library allocation
|
page read and write
|
||
20AA3CA2000
|
trusted library allocation
|
page read and write
|
||
1A3E8BD0000
|
trusted library allocation
|
page read and write
|
||
1A3E2249000
|
trusted library allocation
|
page read and write
|
||
1A3E62C0000
|
trusted library allocation
|
page read and write
|
||
1A3E509E000
|
trusted library allocation
|
page read and write
|
||
1A3E10B9000
|
trusted library allocation
|
page read and write
|
||
1A3E67FB000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE0000
|
trusted library allocation
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3E69F9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
FADCBFE000
|
stack
|
page read and write
|
||
1A3E864B000
|
trusted library allocation
|
page read and write
|
||
1A3E668C000
|
trusted library allocation
|
page read and write
|
||
1A3F169C000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E7429000
|
trusted library allocation
|
page read and write
|
||
1A3E68D3000
|
trusted library allocation
|
page read and write
|
||
1A3F1598000
|
trusted library allocation
|
page read and write
|
||
1A3ED417000
|
trusted library allocation
|
page read and write
|
||
1D906728000
|
heap
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3E6981000
|
trusted library allocation
|
page read and write
|
||
1D906761000
|
heap
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3E5184000
|
trusted library allocation
|
page read and write
|
||
1A3ED0AC000
|
trusted library allocation
|
page read and write
|
||
1A3E8618000
|
trusted library allocation
|
page read and write
|
||
1A3E20E8000
|
trusted library allocation
|
page read and write
|
||
1A3E6BEB000
|
trusted library allocation
|
page read and write
|
||
1CA8DB7B000
|
trusted library allocation
|
page read and write
|
||
1A3E5BCA000
|
trusted library allocation
|
page read and write
|
||
1A3E61DB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E7AB6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFFB000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E1F9B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3EF794000
|
trusted library allocation
|
page read and write
|
||
1A3E6A81000
|
trusted library allocation
|
page read and write
|
||
1A3E6145000
|
trusted library allocation
|
page read and write
|
||
1D9067B9000
|
heap
|
page read and write
|
||
1A3DBFD8000
|
heap
|
page read and write
|
||
8FE1BFE000
|
unkown
|
page readonly
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFE4000
|
heap
|
page read and write
|
||
1A3ED525000
|
trusted library allocation
|
page read and write
|
||
1A3E656A000
|
trusted library allocation
|
page read and write
|
||
1A3DC033000
|
heap
|
page read and write
|
||
1A3DC060000
|
heap
|
page read and write
|
||
1A3DC002000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3E7BB1000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1D9066A9000
|
heap
|
page read and write
|
||
1A3E5EB8000
|
trusted library allocation
|
page read and write
|
||
1A3EDC83000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E866F000
|
trusted library allocation
|
page read and write
|
||
1A3F10E6000
|
trusted library allocation
|
page read and write
|
||
1A3E69DC000
|
trusted library allocation
|
page read and write
|
||
1A3E2244000
|
trusted library allocation
|
page read and write
|
||
1CA8DB12000
|
trusted library allocation
|
page read and write
|
||
1A3E6697000
|
trusted library allocation
|
page read and write
|
||
1A3F16A2000
|
heap
|
page read and write
|
||
1A3F16A0000
|
heap
|
page read and write
|
||
1A3E618D000
|
trusted library allocation
|
page read and write
|
||
1D906731000
|
heap
|
page read and write
|
||
1A3ED3D6000
|
trusted library allocation
|
page read and write
|
||
A0B7E6D000
|
stack
|
page read and write
|
||
1A3E76DA000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3E6A8E000
|
trusted library allocation
|
page read and write
|
||
1A3E6689000
|
trusted library allocation
|
page read and write
|
||
1A3DC002000
|
heap
|
page read and write
|
||
1A3E2062000
|
trusted library allocation
|
page read and write
|
||
1A3E50CD000
|
trusted library allocation
|
page read and write
|
||
1A3EE1F5000
|
trusted library allocation
|
page read and write
|
||
1A3E69D6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E8624000
|
trusted library allocation
|
page read and write
|
||
1A3ED13D000
|
trusted library allocation
|
page read and write
|
||
1A3DC003000
|
heap
|
page read and write
|
||
1A3E7AED000
|
trusted library allocation
|
page read and write
|
||
1A3E6B2B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1D906729000
|
heap
|
page read and write
|
||
1A3F11B8000
|
trusted library allocation
|
page read and write
|
||
1A3F212E000
|
trusted library allocation
|
page read and write
|
||
1A3E6126000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3E625B000
|
trusted library allocation
|
page read and write
|
||
1A3EE093000
|
trusted library allocation
|
page read and write
|
||
1A3EDB77000
|
trusted library allocation
|
page read and write
|
||
1A3E664A000
|
trusted library allocation
|
page read and write
|
||
1A3F138D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
20AA3CB6000
|
trusted library allocation
|
page read and write
|
||
1A3EE16C000
|
trusted library allocation
|
page read and write
|
||
1A3E53BB000
|
trusted library allocation
|
page read and write
|
||
1A3E9218000
|
trusted library allocation
|
page read and write
|
||
20AA3F03000
|
trusted library allocation
|
page read and write
|
||
1A3E758F000
|
trusted library allocation
|
page read and write
|
||
1A3E7BD8000
|
trusted library allocation
|
page read and write
|
||
1A3E6AE0000
|
trusted library allocation
|
page read and write
|
||
1A3ED4FB000
|
trusted library allocation
|
page read and write
|
||
1A3E2098000
|
trusted library allocation
|
page read and write
|
||
1A3E517E000
|
trusted library allocation
|
page read and write
|
||
1A3E619B000
|
trusted library allocation
|
page read and write
|
||
1A3ED1BC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD0000
|
heap
|
page read and write
|
||
1A3E68E8000
|
trusted library allocation
|
page read and write
|
||
1A3E6AEC000
|
trusted library allocation
|
page read and write
|
||
1A3F16A0000
|
heap
|
page read and write
|
||
1D9067AC000
|
heap
|
page read and write
|
||
1A3ED26E000
|
trusted library allocation
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
1A3E2261000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3E2282000
|
trusted library allocation
|
page read and write
|
||
1A3E6256000
|
trusted library allocation
|
page read and write
|
||
1A3EDBFE000
|
trusted library allocation
|
page read and write
|
||
1A3ED655000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3ED57A000
|
trusted library allocation
|
page read and write
|
||
1A3EE1C3000
|
trusted library allocation
|
page read and write
|
||
1A3ED0CD000
|
trusted library allocation
|
page read and write
|
||
1A3E5576000
|
trusted library allocation
|
page read and write
|
||
1A3F0100000
|
trusted library allocation
|
page read and write
|
||
1A3ED142000
|
trusted library allocation
|
page read and write
|
||
1A3E618D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
1A3E6AB4000
|
trusted library allocation
|
page read and write
|
||
1A3E7CF2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E6A73000
|
trusted library allocation
|
page read and write
|
||
1D905743000
|
remote allocation
|
page execute read
|
||
1A3E6648000
|
trusted library allocation
|
page read and write
|
||
1A3E5082000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3E6ACE000
|
trusted library allocation
|
page read and write
|
||
1A3DC05E000
|
heap
|
page read and write
|
||
1A3E50A0000
|
trusted library allocation
|
page read and write
|
||
1A3EDCF3000
|
trusted library allocation
|
page read and write
|
||
1A3F156F000
|
trusted library allocation
|
page read and write
|
||
1A3E6ABA000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3EE16F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E7570000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3E10AA000
|
trusted library allocation
|
page read and write
|
||
1A3E66FE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3F16A9000
|
heap
|
page read and write
|
||
1A3E5BB7000
|
trusted library allocation
|
page read and write
|
||
1A3F0FDE000
|
trusted library allocation
|
page read and write
|
||
1A3EDB1B000
|
trusted library allocation
|
page read and write
|
||
1A3E2656000
|
trusted library allocation
|
page read and write
|
||
1A3E10E4000
|
trusted library allocation
|
page read and write
|
||
1A3E5BF4000
|
trusted library allocation
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3ED68F000
|
trusted library allocation
|
page read and write
|
||
1A3EF7FB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3F1603000
|
heap
|
page read and write
|
||
1A3EE0B3000
|
trusted library allocation
|
page read and write
|
||
1A3F0628000
|
trusted library allocation
|
page read and write
|
||
1A3E6172000
|
trusted library allocation
|
page read and write
|
||
1A3E6A38000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
8FE1D7E000
|
unkown
|
page readonly
|
||
1A3E519A000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1D9066BD000
|
heap
|
page read and write
|
||
1A3F16A8000
|
heap
|
page read and write
|
||
1D905B3F000
|
unclassified section
|
page read and write
|
||
1A3ED049000
|
trusted library allocation
|
page read and write
|
||
1A3F0AC2000
|
trusted library allocation
|
page read and write
|
||
1A3E6116000
|
trusted library allocation
|
page read and write
|
||
1A3EE048000
|
trusted library allocation
|
page read and write
|
||
1A3F13F5000
|
trusted library allocation
|
page read and write
|
||
1A3E6154000
|
trusted library allocation
|
page read and write
|
||
1D9066F9000
|
heap
|
page read and write
|
||
1A3EE14E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E76D4000
|
trusted library allocation
|
page read and write
|
||
1A3E7AE9000
|
trusted library allocation
|
page read and write
|
||
1A3F0AE6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3F11A8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3EE0BD000
|
trusted library allocation
|
page read and write
|
||
1A3E6AFA000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3EDB1B000
|
trusted library allocation
|
page read and write
|
||
1A3EE12B000
|
trusted library allocation
|
page read and write
|
||
1A3F16A8000
|
heap
|
page read and write
|
||
1A3E8631000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
17C000
|
unkown
|
page readonly
|
||
4573FE000
|
stack
|
page read and write
|
||
1A3F0A8F000
|
trusted library allocation
|
page read and write
|
||
1A3E6567000
|
trusted library allocation
|
page read and write
|
||
20AA3A70000
|
unclassified section
|
page readonly
|
||
1A3ED6A7000
|
trusted library allocation
|
page read and write
|
||
1A3E5097000
|
trusted library allocation
|
page read and write
|
||
1A3E91D4000
|
trusted library allocation
|
page read and write
|
||
1C22AE00000
|
heap
|
page read and write
|
||
1A3F106B000
|
trusted library allocation
|
page read and write
|
||
1A3E6A87000
|
trusted library allocation
|
page read and write
|
||
1D905B80000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3ED521000
|
trusted library allocation
|
page read and write
|
||
1A3E6256000
|
trusted library allocation
|
page read and write
|
||
1A3E69C1000
|
trusted library allocation
|
page read and write
|
||
1A3EE0B6000
|
trusted library allocation
|
page read and write
|
||
1D906731000
|
heap
|
page read and write
|
||
1A3E9261000
|
trusted library allocation
|
page read and write
|
||
1A3F067C000
|
trusted library allocation
|
page read and write
|
||
1A3F0A32000
|
trusted library allocation
|
page read and write
|
||
1A3F0672000
|
trusted library allocation
|
page read and write
|
||
20AA3840000
|
remote allocation
|
page read and write
|
||
1CA8D773000
|
heap
|
page read and write
|
||
1A3EE0DF000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3ED53B000
|
trusted library allocation
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1A3E62AE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3F16A2000
|
heap
|
page read and write
|
||
1A3F117E000
|
trusted library allocation
|
page read and write
|
||
1A3E4F6F000
|
trusted library allocation
|
page read and write
|
||
1A3E67CC000
|
trusted library allocation
|
page read and write
|
||
1A3ED0E3000
|
trusted library allocation
|
page read and write
|
||
1A3ECFE9000
|
trusted library allocation
|
page read and write
|
||
1A3ED149000
|
trusted library allocation
|
page read and write
|
||
20AA3A30000
|
heap
|
page readonly
|
||
1A3E518F000
|
trusted library allocation
|
page read and write
|
||
1D905B10000
|
heap
|
page readonly
|
||
1A3F11A4000
|
trusted library allocation
|
page read and write
|
||
1A3ED4EF000
|
trusted library allocation
|
page read and write
|
||
13C1000
|
heap
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3E663F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3ED1EB000
|
trusted library allocation
|
page read and write
|
||
1A3E5E48000
|
trusted library allocation
|
page read and write
|
||
1A3ED67E000
|
trusted library allocation
|
page read and write
|
||
1A3ED4F9000
|
trusted library allocation
|
page read and write
|
||
1A3E7A76000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3EE0F5000
|
trusted library allocation
|
page read and write
|
||
1A3ED37A000
|
trusted library allocation
|
page read and write
|
||
1A3E6694000
|
trusted library allocation
|
page read and write
|
||
1A3E657A000
|
trusted library allocation
|
page read and write
|
||
1A3EE0F5000
|
trusted library allocation
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E7AB4000
|
trusted library allocation
|
page read and write
|
||
1A3EE09D000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D7000
|
trusted library allocation
|
page read and write
|
||
1A3E2075000
|
trusted library allocation
|
page read and write
|
||
1A3ED527000
|
trusted library allocation
|
page read and write
|
||
1A3ED5B7000
|
trusted library allocation
|
page read and write
|
||
1A3ED405000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3EE16C000
|
trusted library allocation
|
page read and write
|
||
1A3F0ABB000
|
trusted library allocation
|
page read and write
|
||
1A3E28DD000
|
heap
|
page read and write
|
||
1A3E61ED000
|
trusted library allocation
|
page read and write
|
||
1A3ED2A0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3ED40F000
|
trusted library allocation
|
page read and write
|
||
1A3EDBA6000
|
trusted library allocation
|
page read and write
|
||
1A3E89D6000
|
trusted library allocation
|
page read and write
|
||
1A3E6AA5000
|
trusted library allocation
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E65F1000
|
trusted library allocation
|
page read and write
|
||
1A3ED2E0000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E67C2000
|
trusted library allocation
|
page read and write
|
||
1CA8DD0D000
|
trusted library allocation
|
page read and write
|
||
1A3F155E000
|
trusted library allocation
|
page read and write
|
||
1A3F0AE6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E6172000
|
trusted library allocation
|
page read and write
|
||
1A3E4F8E000
|
trusted library allocation
|
page read and write
|
||
1A3E6789000
|
trusted library allocation
|
page read and write
|
||
1A3EE163000
|
trusted library allocation
|
page read and write
|
||
1A3ED3BF000
|
trusted library allocation
|
page read and write
|
||
1A3E2322000
|
trusted library allocation
|
page read and write
|
||
1A3E6890000
|
trusted library allocation
|
page read and write
|
||
1D906798000
|
heap
|
page read and write
|
||
1A3E69B7000
|
trusted library allocation
|
page read and write
|
||
A0BCABE000
|
stack
|
page read and write
|
||
1A3ED3EA000
|
trusted library allocation
|
page read and write
|
||
13D7000
|
heap
|
page read and write
|
||
1A3E6B4E000
|
trusted library allocation
|
page read and write
|
||
1A3E7A32000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1D906799000
|
heap
|
page read and write
|
||
1A3E75DF000
|
trusted library allocation
|
page read and write
|
||
1A3E4F8A000
|
trusted library allocation
|
page read and write
|
||
1A3E4FA5000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3ECFE5000
|
trusted library allocation
|
page read and write
|
||
1A3DC041000
|
heap
|
page read and write
|
||
1A3E5B8E000
|
trusted library allocation
|
page read and write
|
||
1A3EE065000
|
trusted library allocation
|
page read and write
|
||
1A3EE04C000
|
trusted library allocation
|
page read and write
|
||
1A3ED3BC000
|
trusted library allocation
|
page read and write
|
||
1A3ED4F2000
|
trusted library allocation
|
page read and write
|
||
1A3E50DC000
|
trusted library allocation
|
page read and write
|
||
1A3E506E000
|
trusted library allocation
|
page read and write
|
||
1A3EE2F2000
|
trusted library allocation
|
page read and write
|
||
1A3E5BAC000
|
trusted library allocation
|
page read and write
|
||
1A3E5E85000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E74EA000
|
trusted library allocation
|
page read and write
|
||
1A3E4F47000
|
trusted library allocation
|
page read and write
|
||
1A3E86EB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFC5000
|
heap
|
page read and write
|
||
1A3E1F33000
|
trusted library allocation
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1A3DC045000
|
heap
|
page read and write
|
||
1CA8DB5D000
|
trusted library allocation
|
page read and write
|
||
1A3E6BDA000
|
trusted library allocation
|
page read and write
|
||
1A3ED18C000
|
trusted library allocation
|
page read and write
|
||
1A3F16AB000
|
heap
|
page read and write
|
||
1A3E22DE000
|
trusted library allocation
|
page read and write
|
||
1A3E8942000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3EE0A3000
|
trusted library allocation
|
page read and write
|
||
1A3E4F68000
|
trusted library allocation
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1A3ED5A0000
|
trusted library allocation
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1CA8DB72000
|
trusted library allocation
|
page read and write
|
||
1A3ED1C8000
|
trusted library allocation
|
page read and write
|
||
1A3ED1F2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE6000
|
heap
|
page read and write
|
||
1A3EDB6E000
|
trusted library allocation
|
page read and write
|
||
1A3E666E000
|
trusted library allocation
|
page read and write
|
||
1A3E86D8000
|
trusted library allocation
|
page read and write
|
||
1A3ED198000
|
trusted library allocation
|
page read and write
|
||
1A3E76BC000
|
trusted library allocation
|
page read and write
|
||
1A3EE0BB000
|
trusted library allocation
|
page read and write
|
||
1A3ED6E8000
|
trusted library allocation
|
page read and write
|
||
1A3E69EF000
|
trusted library allocation
|
page read and write
|
||
1A3E5EAB000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1D905B84000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3ED237000
|
trusted library allocation
|
page read and write
|
||
1A3F1710000
|
heap
|
page read and write
|
||
1A3E5594000
|
trusted library allocation
|
page read and write
|
||
1A3EDCB1000
|
trusted library allocation
|
page read and write
|
||
1A3E5378000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E86C6000
|
trusted library allocation
|
page read and write
|
||
1D905AE9000
|
trusted library allocation
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E4B60000
|
trusted library allocation
|
page read and write
|
||
1A3E7A83000
|
trusted library allocation
|
page read and write
|
||
1A3E75CD000
|
trusted library allocation
|
page read and write
|
||
1A3DC003000
|
heap
|
page read and write
|
||
1A3ECFD4000
|
trusted library allocation
|
page read and write
|
||
1A3DC046000
|
heap
|
page read and write
|
||
1A3DC02C000
|
heap
|
page read and write
|
||
1A3E69E5000
|
trusted library allocation
|
page read and write
|
||
1A3ED6DA000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3E4BC0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3DC03B000
|
heap
|
page read and write
|
||
1A3F0631000
|
trusted library allocation
|
page read and write
|
||
1A3ED539000
|
trusted library allocation
|
page read and write
|
||
1A3E50D5000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3EE03C000
|
trusted library allocation
|
page read and write
|
||
1A3E5140000
|
trusted library allocation
|
page read and write
|
||
1A3ED254000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3F1D27000
|
trusted library allocation
|
page read and write
|
||
1A3F2128000
|
trusted library allocation
|
page read and write
|
||
1A3F14A4000
|
trusted library allocation
|
page read and write
|
||
1A3E50FC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFD3000
|
heap
|
page read and write
|
||
A0BA9FE000
|
stack
|
page read and write
|
||
1A3E509C000
|
trusted library allocation
|
page read and write
|
||
1A3EE0BD000
|
trusted library allocation
|
page read and write
|
||
1A3ED6BC000
|
trusted library allocation
|
page read and write
|
||
1A3ED3B5000
|
trusted library allocation
|
page read and write
|
||
1A3ED4EB000
|
trusted library allocation
|
page read and write
|
||
1CA8DD3D000
|
trusted library allocation
|
page read and write
|
||
8FE35FE000
|
stack
|
page read and write
|
||
1A3E2239000
|
trusted library allocation
|
page read and write
|
||
1A3EEB85000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3E6166000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3F119D000
|
trusted library allocation
|
page read and write
|
||
1A3E2064000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF5000
|
heap
|
page read and write
|
||
1A3ED424000
|
trusted library allocation
|
page read and write
|
||
1A3F10E6000
|
trusted library allocation
|
page read and write
|
||
1A3ED5F5000
|
trusted library allocation
|
page read and write
|
||
1A3ED3C9000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E6635000
|
trusted library allocation
|
page read and write
|
||
1A3F134A000
|
trusted library allocation
|
page read and write
|
||
1A3E6168000
|
trusted library allocation
|
page read and write
|
||
1A3ED6E1000
|
trusted library allocation
|
page read and write
|
||
1A3E101A000
|
trusted library allocation
|
page read and write
|
||
1D905A2F000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E53D9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1D9066A0000
|
heap
|
page read and write
|
||
1A3E6A5F000
|
trusted library allocation
|
page read and write
|
||
1A3E86FC000
|
trusted library allocation
|
page read and write
|
||
1A3F15CE000
|
trusted library allocation
|
page read and write
|
||
1A3E5E33000
|
trusted library allocation
|
page read and write
|
||
1A3E65FC000
|
trusted library allocation
|
page read and write
|
||
64359FF000
|
stack
|
page read and write
|
||
13BC000
|
heap
|
page read and write
|
||
1A3EE0DF000
|
trusted library allocation
|
page read and write
|
||
1A3ED668000
|
trusted library allocation
|
page read and write
|
||
1A3E74CF000
|
trusted library allocation
|
page read and write
|
||
1A3E616C000
|
trusted library allocation
|
page read and write
|
||
1A3E65F1000
|
trusted library allocation
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3ED3FC000
|
trusted library allocation
|
page read and write
|
||
1A3E20F8000
|
trusted library allocation
|
page read and write
|
||
1A3E6278000
|
trusted library allocation
|
page read and write
|
||
1A3DBFFB000
|
heap
|
page read and write
|
||
20AA3C0E000
|
trusted library allocation
|
page read and write
|
||
1A3E616C000
|
trusted library allocation
|
page read and write
|
||
1A3E28D8000
|
heap
|
page read and write
|
||
1A3DBFB4000
|
heap
|
page read and write
|
||
1A3EE0D2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3F1582000
|
trusted library allocation
|
page read and write
|
||
13BD000
|
heap
|
page read and write
|
||
1A3E7C52000
|
trusted library allocation
|
page read and write
|
||
1A3E2099000
|
trusted library allocation
|
page read and write
|
||
1AC000
|
unkown
|
page read and write
|
||
1A3ED650000
|
trusted library allocation
|
page read and write
|
||
1A3ED3FC000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DF000
|
trusted library allocation
|
page read and write
|
||
1D905B86000
|
heap
|
page read and write
|
||
1A3ED3FC000
|
trusted library allocation
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3F14E8000
|
trusted library allocation
|
page read and write
|
||
1A3E7700000
|
trusted library allocation
|
page read and write
|
||
1A3E6B3E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3EDB5F000
|
trusted library allocation
|
page read and write
|
||
1A3ED298000
|
trusted library allocation
|
page read and write
|
||
1A3E69C7000
|
trusted library allocation
|
page read and write
|
||
1A3ED6C4000
|
trusted library allocation
|
page read and write
|
||
1A3E7AE1000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E6693000
|
trusted library allocation
|
page read and write
|
||
1A3E6AD7000
|
trusted library allocation
|
page read and write
|
||
1A3ED5DC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DC024000
|
heap
|
page read and write
|
||
1A3E6AFD000
|
trusted library allocation
|
page read and write
|
||
1A3E6A6D000
|
trusted library allocation
|
page read and write
|
||
1A3E618D000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3E69B7000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
FAD90EE000
|
unkown
|
page readonly
|
||
1E58D3E0000
|
heap
|
page read and write
|
||
1A3E6A89000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E6969000
|
trusted library allocation
|
page read and write
|
||
1A3ED02A000
|
trusted library allocation
|
page read and write
|
||
1A3E6BCC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3EEB66000
|
trusted library allocation
|
page read and write
|
||
1A3F1382000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E6B56000
|
trusted library allocation
|
page read and write
|
||
1A3F109F000
|
trusted library allocation
|
page read and write
|
||
1A3ED4F2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E53CD000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E8B4D000
|
trusted library allocation
|
page read and write
|
||
1A3F1646000
|
heap
|
page read and write
|
||
1A3EDB13000
|
trusted library allocation
|
page read and write
|
||
1A3E61B6000
|
trusted library allocation
|
page read and write
|
||
1A3E64F4000
|
trusted library allocation
|
page read and write
|
||
1A3F1593000
|
trusted library allocation
|
page read and write
|
||
1A3E6270000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3ED0F3000
|
trusted library allocation
|
page read and write
|
||
8FE1C3B000
|
stack
|
page read and write
|
||
1A3F10F7000
|
trusted library allocation
|
page read and write
|
||
1A3EE12C000
|
trusted library allocation
|
page read and write
|
||
1A3E6A67000
|
trusted library allocation
|
page read and write
|
||
E1000
|
unkown
|
page execute read
|
||
1A3EEB18000
|
trusted library allocation
|
page read and write
|
||
1A3E5B4B000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1A3DC041000
|
heap
|
page read and write
|
||
1A3EE08B000
|
trusted library allocation
|
page read and write
|
||
1A3E6AF4000
|
trusted library allocation
|
page read and write
|
||
1A3EE093000
|
trusted library allocation
|
page read and write
|
||
1A3EE033000
|
trusted library allocation
|
page read and write
|
||
1E58D5A5000
|
heap
|
page read and write
|
||
1A3E89D4000
|
trusted library allocation
|
page read and write
|
||
1A3F0653000
|
trusted library allocation
|
page read and write
|
||
1A3E5524000
|
trusted library allocation
|
page read and write
|
||
1A3E20F8000
|
trusted library allocation
|
page read and write
|
||
1D906731000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1D9066E8000
|
heap
|
page read and write
|
||
1A3ED261000
|
trusted library allocation
|
page read and write
|
||
1A3E75B2000
|
trusted library allocation
|
page read and write
|
||
1A3F1555000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3ED1C6000
|
trusted library allocation
|
page read and write
|
||
1A3F1555000
|
trusted library allocation
|
page read and write
|
||
1A3F1076000
|
trusted library allocation
|
page read and write
|
||
1A3ED6E8000
|
trusted library allocation
|
page read and write
|
||
1A3ED251000
|
trusted library allocation
|
page read and write
|
||
20AA3DD0000
|
heap
|
page read and write
|
||
1A3ED4F7000
|
trusted library allocation
|
page read and write
|
||
1A3E6BEF000
|
trusted library allocation
|
page read and write
|
||
1A3DC040000
|
heap
|
page read and write
|
||
1A3E6A75000
|
trusted library allocation
|
page read and write
|
||
1A3E7578000
|
trusted library allocation
|
page read and write
|
||
1A3EE167000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1D906762000
|
heap
|
page read and write
|
||
1A3E6888000
|
trusted library allocation
|
page read and write
|
||
1A3EEC04000
|
trusted library allocation
|
page read and write
|
||
1A3F16AF000
|
heap
|
page read and write
|
||
1A3F1088000
|
trusted library allocation
|
page read and write
|
||
1A3DBFB4000
|
heap
|
page read and write
|
||
64361FE000
|
stack
|
page read and write
|
||
1A3ED543000
|
trusted library allocation
|
page read and write
|
||
1A3E65B4000
|
trusted library allocation
|
page read and write
|
||
1A3E89F0000
|
trusted library allocation
|
page read and write
|
||
1A3F16AD000
|
heap
|
page read and write
|
||
1A3E9D02000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD9000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3EE048000
|
trusted library allocation
|
page read and write
|
||
1A3EE030000
|
trusted library allocation
|
page read and write
|
||
1A3ED68E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E617B000
|
trusted library allocation
|
page read and write
|
||
1A3E1061000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
20AA39A0000
|
heap
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
1A3F1574000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E2686000
|
trusted library allocation
|
page read and write
|
||
1A3DC060000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3ED19B000
|
trusted library allocation
|
page read and write
|
||
1A3F16A0000
|
heap
|
page read and write
|
||
1A3E5087000
|
trusted library allocation
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1D906784000
|
heap
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3E6260000
|
trusted library allocation
|
page read and write
|
||
1A3E1FCF000
|
trusted library allocation
|
page read and write
|
||
1A3EEB61000
|
trusted library allocation
|
page read and write
|
||
1A3E89D0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3F0A75000
|
trusted library allocation
|
page read and write
|
||
1A3E6B1F000
|
trusted library allocation
|
page read and write
|
||
1A3E69BE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3EE023000
|
trusted library allocation
|
page read and write
|
||
1A3E6A87000
|
trusted library allocation
|
page read and write
|
||
1A3E615C000
|
trusted library allocation
|
page read and write
|
||
1A3ED045000
|
trusted library allocation
|
page read and write
|
||
1A3ED18C000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DF000
|
trusted library allocation
|
page read and write
|
||
1A3E20EF000
|
trusted library allocation
|
page read and write
|
||
1A3F15A1000
|
trusted library allocation
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E62E9000
|
trusted library allocation
|
page read and write
|
||
1A3DC03D000
|
heap
|
page read and write
|
||
1A3DC066000
|
heap
|
page read and write
|
||
1A3E6699000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3E50BB000
|
trusted library allocation
|
page read and write
|
||
1A3F10F7000
|
trusted library allocation
|
page read and write
|
||
1A3E6B82000
|
trusted library allocation
|
page read and write
|
||
1A3E2078000
|
trusted library allocation
|
page read and write
|
||
1A3E1066000
|
trusted library allocation
|
page read and write
|
||
64371FE000
|
stack
|
page read and write
|
||
20AA3A40000
|
unclassified section
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3ED230000
|
trusted library allocation
|
page read and write
|
||
1D906640000
|
heap
|
page read and write
|
||
1A3E8BD0000
|
trusted library allocation
|
page read and write
|
||
1A3E6AA0000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E6561000
|
trusted library allocation
|
page read and write
|
||
1A3F2118000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3E698C000
|
trusted library allocation
|
page read and write
|
||
1A3DC024000
|
heap
|
page read and write
|
||
1A3E61B6000
|
trusted library allocation
|
page read and write
|
||
1A3E6ADA000
|
trusted library allocation
|
page read and write
|
||
1A3E50AF000
|
trusted library allocation
|
page read and write
|
||
1A3E685C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1B8E000
|
stack
|
page read and write
|
||
1A3F16BD000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E6A6D000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3E6BE7000
|
trusted library allocation
|
page read and write
|
||
1A3E6653000
|
trusted library allocation
|
page read and write
|
||
1A3E2621000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DB000
|
trusted library allocation
|
page read and write
|
||
1A3E6AA0000
|
trusted library allocation
|
page read and write
|
||
1A3EDB40000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E6A64000
|
trusted library allocation
|
page read and write
|
||
1A3E74A9000
|
trusted library allocation
|
page read and write
|
||
1A3DC00A000
|
heap
|
page read and write
|
||
1A3E69B9000
|
trusted library allocation
|
page read and write
|
||
1A3EE1A4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
A0BB1FE000
|
unkown
|
page readonly
|
||
1A3E7513000
|
trusted library allocation
|
page read and write
|
||
1A3EDCB1000
|
trusted library allocation
|
page read and write
|
||
1A3E8BF9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E5E09000
|
trusted library allocation
|
page read and write
|
||
1A3F1397000
|
trusted library allocation
|
page read and write
|
||
1A3E7446000
|
trusted library allocation
|
page read and write
|
||
1A3EE0BD000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D7000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDE000
|
heap
|
page read and write
|
||
1A3DC002000
|
heap
|
page read and write
|
||
1A3ED6F4000
|
trusted library allocation
|
page read and write
|
||
1A3E6658000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E89D2000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3ED147000
|
trusted library allocation
|
page read and write
|
||
1A3DC049000
|
heap
|
page read and write
|
||
1A3DBFF2000
|
heap
|
page read and write
|
||
1A3ED375000
|
trusted library allocation
|
page read and write
|
||
1A3ED03F000
|
trusted library allocation
|
page read and write
|
||
1A3DC039000
|
heap
|
page read and write
|
||
1A3E2238000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
20AA3C03000
|
trusted library allocation
|
page read and write
|
||
1A3F0880000
|
trusted library allocation
|
page read and write
|
||
1A3E5E1D000
|
trusted library allocation
|
page read and write
|
||
1A3DC035000
|
heap
|
page read and write
|
||
1A3E53B0000
|
trusted library allocation
|
page read and write
|
||
1A3E6B82000
|
trusted library allocation
|
page read and write
|
||
1A3EE2C7000
|
trusted library allocation
|
page read and write
|
||
1A3DC03E000
|
heap
|
page read and write
|
||
1A3EDCD5000
|
trusted library allocation
|
page read and write
|
||
1A3E4BFE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3F16A4000
|
heap
|
page read and write
|
||
1D9066A0000
|
heap
|
page read and write
|
||
1A3F106B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
1A3E8984000
|
trusted library allocation
|
page read and write
|
||
1A3E6513000
|
trusted library allocation
|
page read and write
|
||
1A3E6586000
|
trusted library allocation
|
page read and write
|
||
1A3E657D000
|
trusted library allocation
|
page read and write
|
||
1A3ED3EA000
|
trusted library allocation
|
page read and write
|
||
1A3F212A000
|
trusted library allocation
|
page read and write
|
||
1A3DC002000
|
heap
|
page read and write
|
||
1A3EF7F5000
|
trusted library allocation
|
page read and write
|
||
1A3E6BF8000
|
trusted library allocation
|
page read and write
|
||
1A3E69DC000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3ED39B000
|
trusted library allocation
|
page read and write
|
||
1A3E6BCD000
|
trusted library allocation
|
page read and write
|
||
1A3E86E9000
|
trusted library allocation
|
page read and write
|
||
1A3DC033000
|
heap
|
page read and write
|
||
1A3EE0AD000
|
trusted library allocation
|
page read and write
|
||
1A3E6AF6000
|
trusted library allocation
|
page read and write
|
||
1A3E4B72000
|
trusted library allocation
|
page read and write
|
||
1A3E67C2000
|
trusted library allocation
|
page read and write
|
||
1A3ED512000
|
trusted library allocation
|
page read and write
|
||
1A3EE14A000
|
trusted library allocation
|
page read and write
|
||
1A3F13E7000
|
trusted library allocation
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1A3ED2DE000
|
trusted library allocation
|
page read and write
|
||
1A3E6287000
|
trusted library allocation
|
page read and write
|
||
1A3E4B22000
|
trusted library allocation
|
page read and write
|
||
1A3ED6E8000
|
trusted library allocation
|
page read and write
|
||
1A3DC03B000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3E7AD7000
|
trusted library allocation
|
page read and write
|
||
1A3E6812000
|
trusted library allocation
|
page read and write
|
||
1A3F10AA000
|
trusted library allocation
|
page read and write
|
||
1A3F15B2000
|
trusted library allocation
|
page read and write
|
||
1A3E6BCC000
|
trusted library allocation
|
page read and write
|
||
1A3DC00A000
|
heap
|
page read and write
|
||
1A3E6B34000
|
trusted library allocation
|
page read and write
|
||
1A3E8616000
|
trusted library allocation
|
page read and write
|
||
20AA3856000
|
remote allocation
|
page execute read
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3EE19B000
|
trusted library allocation
|
page read and write
|
||
1A3E222F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEB000
|
heap
|
page read and write
|
||
1A3E68C7000
|
trusted library allocation
|
page read and write
|
||
1A3EEBF9000
|
trusted library allocation
|
page read and write
|
||
1A3ED653000
|
trusted library allocation
|
page read and write
|
||
1A3F13CA000
|
trusted library allocation
|
page read and write
|
||
1A3E69DA000
|
trusted library allocation
|
page read and write
|
||
1A3ED424000
|
trusted library allocation
|
page read and write
|
||
1A3E7AAF000
|
trusted library allocation
|
page read and write
|
||
1A3E62EB000
|
trusted library allocation
|
page read and write
|
||
FEF000
|
stack
|
page read and write
|
||
1A3DBFE6000
|
heap
|
page read and write
|
||
1A3E69F9000
|
trusted library allocation
|
page read and write
|
||
1A3E6A75000
|
trusted library allocation
|
page read and write
|
||
1A3E2887000
|
heap
|
page read and write
|
||
1A3EF671000
|
trusted library allocation
|
page read and write
|
||
1A3ED6D9000
|
trusted library allocation
|
page read and write
|
||
1A3EEB5C000
|
trusted library allocation
|
page read and write
|
||
1A3E5B72000
|
trusted library allocation
|
page read and write
|
||
1A3ED19B000
|
trusted library allocation
|
page read and write
|
||
1A3EE0AD000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
1A3E6278000
|
trusted library allocation
|
page read and write
|
||
1A3E1FEA000
|
trusted library allocation
|
page read and write
|
||
1A3E6218000
|
trusted library allocation
|
page read and write
|
||
1A3EE154000
|
trusted library allocation
|
page read and write
|
||
FADB3FE000
|
unkown
|
page readonly
|
||
1CA8D930000
|
heap
|
page read and write
|
||
1A3F1D83000
|
trusted library allocation
|
page read and write
|
||
1A3EE045000
|
trusted library allocation
|
page read and write
|
||
1A3E6AB5000
|
trusted library allocation
|
page read and write
|
||
1A3E615A000
|
trusted library allocation
|
page read and write
|
||
1CA8DB79000
|
trusted library allocation
|
page read and write
|
||
20AA37E0000
|
unclassified section
|
page readonly
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E664C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DC045000
|
heap
|
page read and write
|
||
1A3E5079000
|
trusted library allocation
|
page read and write
|
||
1A3E64F2000
|
trusted library allocation
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3E5E8B000
|
trusted library allocation
|
page read and write
|
||
1A3DC03E000
|
heap
|
page read and write
|
||
1A3F11A3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFE5000
|
heap
|
page read and write
|
||
1A3ED26E000
|
trusted library allocation
|
page read and write
|
||
1A3ED5B2000
|
trusted library allocation
|
page read and write
|
||
1A3E741E000
|
trusted library allocation
|
page read and write
|
||
1A3E62EB000
|
trusted library allocation
|
page read and write
|
||
1A3E6A7F000
|
trusted library allocation
|
page read and write
|
||
1A3E6183000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3ED298000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3E68F1000
|
trusted library allocation
|
page read and write
|
||
1A3F11AE000
|
trusted library allocation
|
page read and write
|
||
1A3EE0B6000
|
trusted library allocation
|
page read and write
|
||
1A3E75AA000
|
trusted library allocation
|
page read and write
|
||
1A3EE2D8000
|
trusted library allocation
|
page read and write
|
||
1A3DC024000
|
heap
|
page read and write
|
||
1A3ED3E9000
|
trusted library allocation
|
page read and write
|
||
1A3F169D000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E69B9000
|
trusted library allocation
|
page read and write
|
||
1A3E518A000
|
trusted library allocation
|
page read and write
|
||
1A3EEBB1000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D2000
|
trusted library allocation
|
page read and write
|
||
1A3F068E000
|
trusted library allocation
|
page read and write
|
||
1A3E618F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E6132000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3F212A000
|
trusted library allocation
|
page read and write
|
||
1A3F16C3000
|
heap
|
page read and write
|
||
1A3E6AB1000
|
trusted library allocation
|
page read and write
|
||
1A3E6BE0000
|
trusted library allocation
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
1A3E66A3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED32E000
|
trusted library allocation
|
page read and write
|
||
1A3E6687000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDF000
|
heap
|
page read and write
|
||
1A3E4BBC000
|
trusted library allocation
|
page read and write
|
||
1A3ED3CD000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3E7578000
|
trusted library allocation
|
page read and write
|
||
1A3E6658000
|
trusted library allocation
|
page read and write
|
||
1A3E68CE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3F169D000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3E89D0000
|
trusted library allocation
|
page read and write
|
||
1A3E264E000
|
trusted library allocation
|
page read and write
|
||
1CA8DB10000
|
trusted library allocation
|
page read and write
|
||
1A3E508E000
|
trusted library allocation
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3EF78C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3E5B76000
|
trusted library allocation
|
page read and write
|
||
1E58D707000
|
trusted library allocation
|
page read and write
|
||
1A3F0AC0000
|
trusted library allocation
|
page read and write
|
||
1A3E6A45000
|
trusted library allocation
|
page read and write
|
||
1A3EEB5C000
|
trusted library allocation
|
page read and write
|
||
1A3ED33C000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3EE1C3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E6AE0000
|
trusted library allocation
|
page read and write
|
||
FAD9BD8000
|
stack
|
page read and write
|
||
8CA000
|
stack
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1CA8DD16000
|
trusted library allocation
|
page read and write
|
||
1A3ED0BF000
|
trusted library allocation
|
page read and write
|
||
1A3E6BBB000
|
trusted library allocation
|
page read and write
|
||
1A3E8934000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E20EA000
|
trusted library allocation
|
page read and write
|
||
1A3EDCE8000
|
trusted library allocation
|
page read and write
|
||
1A3E92B4000
|
trusted library allocation
|
page read and write
|
||
1A3EE034000
|
trusted library allocation
|
page read and write
|
||
1A3E61E2000
|
trusted library allocation
|
page read and write
|
||
1A3E662A000
|
trusted library allocation
|
page read and write
|
||
1A3EE14E000
|
trusted library allocation
|
page read and write
|
||
1A3E6269000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3F15A1000
|
trusted library allocation
|
page read and write
|
||
1A3E5B89000
|
trusted library allocation
|
page read and write
|
||
1A3E4F68000
|
trusted library allocation
|
page read and write
|
||
1A3E8BDF000
|
trusted library allocation
|
page read and write
|
||
1A3ED3ED000
|
trusted library allocation
|
page read and write
|
||
1A3ED147000
|
trusted library allocation
|
page read and write
|
||
1A3ED1FD000
|
trusted library allocation
|
page read and write
|
||
1A3F11C1000
|
trusted library allocation
|
page read and write
|
||
1A3EE095000
|
trusted library allocation
|
page read and write
|
||
1A3ED4CA000
|
trusted library allocation
|
page read and write
|
||
1A3E8BFD000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1A3ED3B5000
|
trusted library allocation
|
page read and write
|
||
1A3ED6A2000
|
trusted library allocation
|
page read and write
|
||
1D906784000
|
heap
|
page read and write
|
||
1A3E88F6000
|
trusted library allocation
|
page read and write
|
||
1A3F0A8F000
|
trusted library allocation
|
page read and write
|
||
1A3EDB08000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3F212E000
|
trusted library allocation
|
page read and write
|
||
1A3E7CF4000
|
trusted library allocation
|
page read and write
|
||
1A3ED655000
|
trusted library allocation
|
page read and write
|
||
1A3ED523000
|
trusted library allocation
|
page read and write
|
||
1A3EE2EA000
|
trusted library allocation
|
page read and write
|
||
1A3EE0C5000
|
trusted library allocation
|
page read and write
|
||
1D90672B000
|
heap
|
page read and write
|
||
1A3ED3DB000
|
trusted library allocation
|
page read and write
|
||
1A3EE0DB000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1A3EEC01000
|
trusted library allocation
|
page read and write
|
||
1A3E5E49000
|
trusted library allocation
|
page read and write
|
||
1E58D457000
|
heap
|
page read and write
|
||
1CA8D9C6000
|
heap
|
page read and write
|
||
1A3E76B2000
|
trusted library allocation
|
page read and write
|
||
1A3EE093000
|
trusted library allocation
|
page read and write
|
||
1A3E664C000
|
trusted library allocation
|
page read and write
|
||
1A3EEAFC000
|
trusted library allocation
|
page read and write
|
||
1A3EDCE8000
|
trusted library allocation
|
page read and write
|
||
1A3E66C9000
|
trusted library allocation
|
page read and write
|
||
1D90677B000
|
heap
|
page read and write
|
||
1A3E6A63000
|
trusted library allocation
|
page read and write
|
||
1D90672B000
|
heap
|
page read and write
|
||
1A3ED5F0000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1E58D410000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3EDB28000
|
trusted library allocation
|
page read and write
|
||
1A3E6AB1000
|
trusted library allocation
|
page read and write
|
||
1A3ED525000
|
trusted library allocation
|
page read and write
|
||
1D9066BF000
|
heap
|
page read and write
|
||
1A3E6AC0000
|
trusted library allocation
|
page read and write
|
||
1A3E6A39000
|
trusted library allocation
|
page read and write
|
||
1D90672B000
|
heap
|
page read and write
|
||
1A3F1391000
|
trusted library allocation
|
page read and write
|
||
1A3E6648000
|
trusted library allocation
|
page read and write
|
||
1A3ED6BA000
|
trusted library allocation
|
page read and write
|
||
1A3E7A2D000
|
trusted library allocation
|
page read and write
|
||
1A3ED1F4000
|
trusted library allocation
|
page read and write
|
||
1A3E7A4C000
|
trusted library allocation
|
page read and write
|
||
1A3E68E3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE4000
|
heap
|
page read and write
|
||
1A3E6BC6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
20AA4000000
|
trusted library allocation
|
page read and write
|
||
1A3E6B2B000
|
trusted library allocation
|
page read and write
|
||
1D906740000
|
heap
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3E508E000
|
trusted library allocation
|
page read and write
|
||
1A3DC005000
|
heap
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3DBFD4000
|
heap
|
page read and write
|
||
1A3ED6A2000
|
trusted library allocation
|
page read and write
|
||
1A3E7AB6000
|
trusted library allocation
|
page read and write
|
||
20AA3C5F000
|
trusted library allocation
|
page read and write
|
||
1A3E5073000
|
trusted library allocation
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
1A3E226E000
|
trusted library allocation
|
page read and write
|
||
1D906798000
|
heap
|
page read and write
|
||
1A3DC023000
|
heap
|
page read and write
|
||
1A3F11D6000
|
trusted library allocation
|
page read and write
|
||
1A3E531D000
|
trusted library allocation
|
page read and write
|
||
1A3DC034000
|
heap
|
page read and write
|
||
1C22B000000
|
trusted library allocation
|
page read and write
|
||
1A3F0300000
|
trusted library allocation
|
page read and write
|
||
1A3F1D3B000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3F1710000
|
heap
|
page read and write
|
||
1A3EE01B000
|
trusted library allocation
|
page read and write
|
||
1A3E4BFE000
|
trusted library allocation
|
page read and write
|
||
1A3ED0A9000
|
trusted library allocation
|
page read and write
|
||
1A3ED5B7000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEB000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E5BB1000
|
trusted library allocation
|
page read and write
|
||
1A3E6282000
|
trusted library allocation
|
page read and write
|
||
1A3E5155000
|
trusted library allocation
|
page read and write
|
||
1A3F139B000
|
trusted library allocation
|
page read and write
|
||
1A3E69A1000
|
trusted library allocation
|
page read and write
|
||
1A3DC03E000
|
heap
|
page read and write
|
||
1D906728000
|
heap
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3E22EB000
|
trusted library allocation
|
page read and write
|
||
1A3E6905000
|
trusted library allocation
|
page read and write
|
||
1A3E7548000
|
trusted library allocation
|
page read and write
|
||
1A3F160F000
|
heap
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3F1603000
|
heap
|
page read and write
|
||
1A3EE0A3000
|
trusted library allocation
|
page read and write
|
||
1A3E75C2000
|
trusted library allocation
|
page read and write
|
||
1A3ED3AF000
|
trusted library allocation
|
page read and write
|
||
1A3DC035000
|
heap
|
page read and write
|
||
1A3EE2ED000
|
trusted library allocation
|
page read and write
|
||
1A3ED4E3000
|
trusted library allocation
|
page read and write
|
||
1A3E20EA000
|
trusted library allocation
|
page read and write
|
||
1A3E6BD1000
|
trusted library allocation
|
page read and write
|
||
1A3E7CDA000
|
trusted library allocation
|
page read and write
|
||
1A3F10D8000
|
trusted library allocation
|
page read and write
|
||
1A3EE165000
|
trusted library allocation
|
page read and write
|
||
1A3E6B34000
|
trusted library allocation
|
page read and write
|
||
1A3E69D6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF3000
|
heap
|
page read and write
|
||
1A3F16A0000
|
heap
|
page read and write
|
||
1A3EDCA3000
|
trusted library allocation
|
page read and write
|
||
1A3E6A5F000
|
trusted library allocation
|
page read and write
|
||
1A3E68A6000
|
trusted library allocation
|
page read and write
|
||
1A3E6B25000
|
trusted library allocation
|
page read and write
|
||
1A3E6166000
|
trusted library allocation
|
page read and write
|
||
1A3E6A73000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3E7AD2000
|
trusted library allocation
|
page read and write
|
||
1A3EDB43000
|
trusted library allocation
|
page read and write
|
||
1A3E61A5000
|
trusted library allocation
|
page read and write
|
||
1A3ED5DC000
|
trusted library allocation
|
page read and write
|
||
1A3E7ACD000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3EE09D000
|
trusted library allocation
|
page read and write
|
||
1A3F06DE000
|
trusted library allocation
|
page read and write
|
||
1A3DC02E000
|
heap
|
page read and write
|
||
1A3ED3F5000
|
trusted library allocation
|
page read and write
|
||
1A3F1640000
|
heap
|
page read and write
|
||
1A3E6690000
|
trusted library allocation
|
page read and write
|
||
1A3E7BA6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD6000
|
heap
|
page read and write
|
||
1CA8DBB7000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDB000
|
heap
|
page read and write
|
||
1A3F16BB000
|
heap
|
page read and write
|
||
64359FA000
|
stack
|
page read and write
|
||
1A3DBFD7000
|
heap
|
page read and write
|
||
1A3E68B3000
|
trusted library allocation
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
A0B7FEE000
|
stack
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3E6BEB000
|
trusted library allocation
|
page read and write
|
||
1A3E4F61000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF9000
|
heap
|
page read and write
|
||
1A3E75A3000
|
trusted library allocation
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E1FED000
|
trusted library allocation
|
page read and write
|
||
1A3E6166000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E2899000
|
heap
|
page read and write
|
||
1A3E51B3000
|
trusted library allocation
|
page read and write
|
||
1A3ED682000
|
trusted library allocation
|
page read and write
|
||
1A3E6A71000
|
trusted library allocation
|
page read and write
|
||
1D9066A9000
|
heap
|
page read and write
|
||
1A3E64F4000
|
trusted library allocation
|
page read and write
|
||
1A3E6297000
|
trusted library allocation
|
page read and write
|
||
1A3EE02B000
|
trusted library allocation
|
page read and write
|
||
8FE1CBD000
|
stack
|
page read and write
|
||
1A3ED1EE000
|
trusted library allocation
|
page read and write
|
||
1A3ED3B9000
|
trusted library allocation
|
page read and write
|
||
1A3E69D8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E750E000
|
trusted library allocation
|
page read and write
|
||
1A3F16AE000
|
heap
|
page read and write
|
||
1A3DC038000
|
heap
|
page read and write
|
||
1A3E6BC6000
|
trusted library allocation
|
page read and write
|
||
1A3E50C4000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3DBFFC000
|
heap
|
page read and write
|
||
1A3E6168000
|
trusted library allocation
|
page read and write
|
||
1A3ED6FE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE1000
|
heap
|
page read and write
|
||
1A3ED3FC000
|
trusted library allocation
|
page read and write
|
||
1A3DC003000
|
heap
|
page read and write
|
||
1A3E5178000
|
trusted library allocation
|
page read and write
|
||
1A3ED3EA000
|
trusted library allocation
|
page read and write
|
||
1A3ED0C2000
|
trusted library allocation
|
page read and write
|
||
1A3E86D0000
|
trusted library allocation
|
page read and write
|
||
1D9066A9000
|
heap
|
page read and write
|
||
1A3E6860000
|
trusted library allocation
|
page read and write
|
||
1A3EE0D7000
|
trusted library allocation
|
page read and write
|
||
1A3DC00A000
|
heap
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3EE041000
|
trusted library allocation
|
page read and write
|
||
1A3EE0F5000
|
trusted library allocation
|
page read and write
|
||
1D905A03000
|
trusted library allocation
|
page read and write
|
||
1A3E629F000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE5000
|
heap
|
page read and write
|
||
1A3E6689000
|
trusted library allocation
|
page read and write
|
||
1A3F1586000
|
trusted library allocation
|
page read and write
|
||
1A3E2890000
|
heap
|
page read and write
|
||
1A3ED08E000
|
trusted library allocation
|
page read and write
|
||
1A3E5EA8000
|
trusted library allocation
|
page read and write
|
||
1A3DBFD8000
|
heap
|
page read and write
|
||
1A3F16C5000
|
heap
|
page read and write
|
||
1A3E65F1000
|
trusted library allocation
|
page read and write
|
||
1A3EE13A000
|
trusted library allocation
|
page read and write
|
||
1A3ED000000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3E5E1A000
|
trusted library allocation
|
page read and write
|
||
1F8F000
|
stack
|
page read and write
|
||
1A3E5E25000
|
trusted library allocation
|
page read and write
|
||
1A3F10E8000
|
trusted library allocation
|
page read and write
|
||
1A3E865A000
|
trusted library allocation
|
page read and write
|
||
1D9067AC000
|
heap
|
page read and write
|
||
1A3E6B25000
|
trusted library allocation
|
page read and write
|
||
20AA400C000
|
trusted library allocation
|
page read and write
|
||
1B4000
|
unkown
|
page readonly
|
||
1A3E4F68000
|
trusted library allocation
|
page read and write
|
||
1D90668D000
|
heap
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
1A3EE0B6000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3E6B82000
|
trusted library allocation
|
page read and write
|
||
1A3F10E6000
|
trusted library allocation
|
page read and write
|
||
1A3E1026000
|
trusted library allocation
|
page read and write
|
||
1A3ED5BA000
|
trusted library allocation
|
page read and write
|
||
1A3E51CB000
|
trusted library allocation
|
page read and write
|
||
1A3E89C9000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3EEABA000
|
trusted library allocation
|
page read and write
|
||
36D4000
|
heap
|
page read and write
|
||
1A3EEB59000
|
trusted library allocation
|
page read and write
|
||
1A3E7AD7000
|
trusted library allocation
|
page read and write
|
||
1A3DBFDA000
|
heap
|
page read and write
|
||
1A3F0AE6000
|
trusted library allocation
|
page read and write
|
||
1A3EE168000
|
trusted library allocation
|
page read and write
|
||
1A3DC038000
|
heap
|
page read and write
|
||
1A3E6297000
|
trusted library allocation
|
page read and write
|
||
1A3EE073000
|
trusted library allocation
|
page read and write
|
||
1A3F1734000
|
heap
|
page read and write
|
||
1A3E8BD7000
|
trusted library allocation
|
page read and write
|
||
20AA3890000
|
heap
|
page read and write
|
||
FADBBFE000
|
stack
|
page read and write
|
||
1A3EE08B000
|
trusted library allocation
|
page read and write
|
||
1A3DC042000
|
heap
|
page read and write
|
||
1A3DBFC5000
|
heap
|
page read and write
|
||
1A3F0A8F000
|
trusted library allocation
|
page read and write
|
||
1A3ED536000
|
trusted library allocation
|
page read and write
|
||
1A3E7A4C000
|
trusted library allocation
|
page read and write
|
||
1A3DC00F000
|
heap
|
page read and write
|
||
1A3DC037000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3E2899000
|
heap
|
page read and write
|
||
1A3E664A000
|
trusted library allocation
|
page read and write
|
||
1A3E28DF000
|
heap
|
page read and write
|
||
1A3E4F7D000
|
trusted library allocation
|
page read and write
|
||
1A3ED0AC000
|
trusted library allocation
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3DBFFA000
|
heap
|
page read and write
|
||
1A3EE0F5000
|
trusted library allocation
|
page read and write
|
||
1A3E89F7000
|
trusted library allocation
|
page read and write
|
||
1A3F1734000
|
heap
|
page read and write
|
||
1A3F13CA000
|
trusted library allocation
|
page read and write
|
||
13C2000
|
heap
|
page read and write
|
||
1A3E50C7000
|
trusted library allocation
|
page read and write
|
||
1A3E6AEB000
|
trusted library allocation
|
page read and write
|
||
1D905B50000
|
trusted library allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
1A3E75C2000
|
trusted library allocation
|
page read and write
|
||
1A3E62A9000
|
trusted library allocation
|
page read and write
|
||
1A3EEB66000
|
trusted library allocation
|
page read and write
|
||
1A3E5E27000
|
trusted library allocation
|
page read and write
|
||
1A3F065A000
|
trusted library allocation
|
page read and write
|
||
1A3EDCF3000
|
trusted library allocation
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DBFED000
|
heap
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
8FE13FE000
|
stack
|
page read and write
|
||
1A3ED26E000
|
trusted library allocation
|
page read and write
|
||
1A3E6A30000
|
trusted library allocation
|
page read and write
|
||
1A3F10AA000
|
trusted library allocation
|
page read and write
|
||
1D906721000
|
heap
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3E69F9000
|
trusted library allocation
|
page read and write
|
||
1A3F2106000
|
trusted library allocation
|
page read and write
|
||
1A3ED414000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3ED393000
|
trusted library allocation
|
page read and write
|
||
1A3DC025000
|
heap
|
page read and write
|
||
1A3DC02B000
|
heap
|
page read and write
|
||
1A3F1D61000
|
trusted library allocation
|
page read and write
|
||
1CA8DE00000
|
heap
|
page read and write
|
||
1A3E6A85000
|
trusted library allocation
|
page read and write
|
||
1A3ED1D5000
|
trusted library allocation
|
page read and write
|
||
1A3E5BAC000
|
trusted library allocation
|
page read and write
|
||
1C22B107000
|
trusted library allocation
|
page read and write
|
||
1A3E4FCE000
|
trusted library allocation
|
page read and write
|
||
1A3E5BC3000
|
trusted library allocation
|
page read and write
|
||
1A3ED659000
|
trusted library allocation
|
page read and write
|
||
1A3DBFCE000
|
heap
|
page read and write
|
||
1A3EE143000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE2000
|
heap
|
page read and write
|
||
1A3E4F9E000
|
trusted library allocation
|
page read and write
|
||
1A3EE2DF000
|
trusted library allocation
|
page read and write
|
||
1A3ED414000
|
trusted library allocation
|
page read and write
|
||
1A3DBFE7000
|
heap
|
page read and write
|
||
1A3DBFEC000
|
heap
|
page read and write
|
||
1A3DC03E000
|
heap
|
page read and write
|
||
1A3EE0AD000
|
trusted library allocation
|
page read and write
|
||
1A3E75B2000
|
trusted library allocation
|
page read and write
|
||
1A3E6B34000
|
trusted library allocation
|
page read and write
|
||
1E58D70A000
|
trusted library allocation
|
page read and write
|
||
1D9056D0000
|
unclassified section
|
page readonly
|
||
1A3E69DF000
|
trusted library allocation
|
page read and write
|
||
1A3E758F000
|
trusted library allocation
|
page read and write
|
||
1A3F1393000
|
trusted library allocation
|
page read and write
|
||
1A3E0F71000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3EE065000
|
trusted library allocation
|
page read and write
|
||
1A3F15A7000
|
trusted library allocation
|
page read and write
|
||
1A3E232A000
|
trusted library allocation
|
page read and write
|
||
1A3DBFF0000
|
heap
|
page read and write
|
||
1A3ED5E4000
|
trusted library allocation
|
page read and write
|
There are 3741 hidden memdumps, click here to show them.