Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dfd86c6c-6021-4862-88af-cc316151702a.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dfd86c6c-6021-4862-88af-cc316151702a.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
|
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
|
modified
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2MYL4839XKGVXI1RNYNT.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZWPUUJFJFQIHM1G01R0T.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2268 -parentBuildID 20230927232528 -prefsHandle 2212
-prefMapHandle 2204 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {0590ddfb-40e1-4d22-93f3-32ecdcb7185d} 6348 "\\.\pipe\gecko-crash-server-pipe.6348" 1a84756f510 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4148 -parentBuildID 20230927232528 -prefsHandle 4204
-prefMapHandle 4196 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {429ab7b8-4f74-4e64-a7bd-da10c280bcea}
6348 "\\.\pipe\gecko-crash-server-pipe.6348" 1a8598a2810 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5148 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 5140 -prefMapHandle 5136 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {8adebb1d-ed68-4c68-8123-8531c6a1a629} 6348 "\\.\pipe\gecko-crash-server-pipe.6348" 1a858849110 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://amazon.com
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://www.amazon.com/Z
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggestabout
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.0/
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.1/
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://relay.firefox.com/api/v1/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
|
unknown
|
||
https://topsites.services.mozilla.com/cid/
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
|
unknown
|
||
https://support.mozilla.org/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.196.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.1
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.129.91
|
||
dyna.wikimedia.org
|
185.15.58.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.181.78
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
142.250.181.110
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.1.140
|
||
ipv4only.arpa
|
192.0.0.170
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
151.101.129.91
|
services.addons.mozilla.org
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
142.250.181.78
|
youtube.com
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A85F591000
|
trusted library allocation
|
page read and write
|
||
1A85F2C2000
|
trusted library allocation
|
page read and write
|
||
1A859D2C000
|
trusted library allocation
|
page read and write
|
||
3A1000
|
unkown
|
page execute read
|
||
1A857E7D000
|
trusted library allocation
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
2359C7C0000
|
unclassified section
|
page readonly
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A854D8E000
|
trusted library allocation
|
page read and write
|
||
1A862B32000
|
trusted library allocation
|
page read and write
|
||
1A8589F0000
|
trusted library allocation
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A85F493000
|
trusted library allocation
|
page read and write
|
||
1A857F59000
|
trusted library allocation
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
1A862BA0000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85AE34000
|
trusted library allocation
|
page read and write
|
||
1A85F2D4000
|
trusted library allocation
|
page read and write
|
||
1A8628F8000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A84E283000
|
heap
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A85F4E0000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85ABC6000
|
trusted library allocation
|
page read and write
|
||
1A858539000
|
trusted library allocation
|
page read and write
|
||
1A84E2E8000
|
heap
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A8597AD000
|
trusted library allocation
|
page read and write
|
||
1A858A05000
|
trusted library allocation
|
page read and write
|
||
1A85F343000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A858DC8000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A858D8F000
|
trusted library allocation
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A85336A000
|
trusted library allocation
|
page read and write
|
||
1A853382000
|
trusted library allocation
|
page read and write
|
||
1A85F5FC000
|
trusted library allocation
|
page read and write
|
||
190CFF07000
|
trusted library allocation
|
page read and write
|
||
20D1A423000
|
trusted library allocation
|
page read and write
|
||
1A862C99000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A859BF2000
|
trusted library allocation
|
page read and write
|
||
1A84E283000
|
heap
|
page read and write
|
||
1A8612E5000
|
trusted library allocation
|
page read and write
|
||
2190F459000
|
heap
|
page read and write
|
||
1A859DC7000
|
trusted library allocation
|
page read and write
|
||
1A85F4D8000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A858A6C000
|
trusted library allocation
|
page read and write
|
||
1A858761000
|
trusted library allocation
|
page read and write
|
||
1A857AF7000
|
trusted library allocation
|
page read and write
|
||
1A858165000
|
trusted library allocation
|
page read and write
|
||
37E000
|
stack
|
page read and write
|
||
1A85ADC2000
|
trusted library allocation
|
page read and write
|
||
1A859000000
|
trusted library allocation
|
page read and write
|
||
1A858A07000
|
trusted library allocation
|
page read and write
|
||
1A858B82000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A8544EB000
|
trusted library allocation
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
1A862CA0000
|
heap
|
page read and write
|
||
1A861282000
|
trusted library allocation
|
page read and write
|
||
1A8581A3000
|
trusted library allocation
|
page read and write
|
||
1A856E33000
|
trusted library allocation
|
page read and write
|
||
20D1A4B7000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A84E28E000
|
heap
|
page read and write
|
||
1A8590D0000
|
trusted library allocation
|
page read and write
|
||
1A858A59000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85F560000
|
trusted library allocation
|
page read and write
|
||
1A857E7D000
|
trusted library allocation
|
page read and write
|
||
1A84E275000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8625C7000
|
trusted library allocation
|
page read and write
|
||
1A857DBA000
|
trusted library allocation
|
page read and write
|
||
1A854D89000
|
trusted library allocation
|
page read and write
|
||
1A854D8C000
|
trusted library allocation
|
page read and write
|
||
1A85872E000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E2AD000
|
heap
|
page read and write
|
||
1A85F332000
|
trusted library allocation
|
page read and write
|
||
1A85F6CE000
|
trusted library allocation
|
page read and write
|
||
1A85AB27000
|
trusted library allocation
|
page read and write
|
||
1A85A869000
|
trusted library allocation
|
page read and write
|
||
1A8532FE000
|
trusted library allocation
|
page read and write
|
||
1A8589DD000
|
trusted library allocation
|
page read and write
|
||
1A857E8F000
|
trusted library allocation
|
page read and write
|
||
1A857EB6000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E2E0000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A85AE7E000
|
trusted library allocation
|
page read and write
|
||
1A854432000
|
trusted library allocation
|
page read and write
|
||
1A85ADFB000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A858DDA000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A86124D000
|
trusted library allocation
|
page read and write
|
||
1A8575FB000
|
trusted library allocation
|
page read and write
|
||
1A857518000
|
trusted library allocation
|
page read and write
|
||
1A857AE1000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
20D1A520000
|
heap
|
page read and write
|
||
1A862D51000
|
heap
|
page read and write
|
||
1A860E61000
|
trusted library allocation
|
page read and write
|
||
1A8549CA000
|
trusted library allocation
|
page read and write
|
||
2190F1B1000
|
unkown
|
page execute read
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A858BCC000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85F605000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A84E291000
|
heap
|
page read and write
|
||
1A858A9E000
|
trusted library allocation
|
page read and write
|
||
1A857FE3000
|
trusted library allocation
|
page read and write
|
||
1A85F376000
|
trusted library allocation
|
page read and write
|
||
1A8544EF000
|
trusted library allocation
|
page read and write
|
||
1A84E2E7000
|
heap
|
page read and write
|
||
2190F477000
|
heap
|
page read and write
|
||
1A862879000
|
trusted library allocation
|
page read and write
|
||
1A857A6A000
|
trusted library allocation
|
page read and write
|
||
1A85F5B6000
|
trusted library allocation
|
page read and write
|
||
2190F42D000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A8613F5000
|
trusted library allocation
|
page read and write
|
||
2190F369000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A85AB27000
|
trusted library allocation
|
page read and write
|
||
1A86134F000
|
trusted library allocation
|
page read and write
|
||
1A8571AC000
|
trusted library allocation
|
page read and write
|
||
1A854CB2000
|
heap
|
page read and write
|
||
1A862C6D000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A8581B3000
|
trusted library allocation
|
page read and write
|
||
1A8628FA000
|
trusted library allocation
|
page read and write
|
||
1A858191000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A84E289000
|
heap
|
page read and write
|
||
1A85F493000
|
trusted library allocation
|
page read and write
|
||
1A859DF5000
|
trusted library allocation
|
page read and write
|
||
1A85716A000
|
trusted library allocation
|
page read and write
|
||
1A857FC0000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A85F2F7000
|
trusted library allocation
|
page read and write
|
||
2190E7C0000
|
trusted library allocation
|
page read and write
|
||
1A858DB4000
|
trusted library allocation
|
page read and write
|
||
1A85873B000
|
trusted library allocation
|
page read and write
|
||
1A85F316000
|
trusted library allocation
|
page read and write
|
||
1A8619DA000
|
trusted library allocation
|
page read and write
|
||
1A85F591000
|
trusted library allocation
|
page read and write
|
||
1A862487000
|
trusted library allocation
|
page read and write
|
||
1A859BF4000
|
trusted library allocation
|
page read and write
|
||
1A857F30000
|
trusted library allocation
|
page read and write
|
||
1A859789000
|
trusted library allocation
|
page read and write
|
||
1A8581A3000
|
trusted library allocation
|
page read and write
|
||
1A862B2A000
|
trusted library allocation
|
page read and write
|
||
1A85729D000
|
trusted library allocation
|
page read and write
|
||
1A857EA8000
|
trusted library allocation
|
page read and write
|
||
1A8575EB000
|
trusted library allocation
|
page read and write
|
||
2190F477000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A85AE47000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A85F591000
|
trusted library allocation
|
page read and write
|
||
1A859B55000
|
trusted library allocation
|
page read and write
|
||
1A85AE31000
|
trusted library allocation
|
page read and write
|
||
1A8544E4000
|
trusted library allocation
|
page read and write
|
||
1A85F6B4000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A85A9DD000
|
trusted library allocation
|
page read and write
|
||
1A854D07000
|
trusted library allocation
|
page read and write
|
||
1A857D93000
|
trusted library allocation
|
page read and write
|
||
1A85786D000
|
trusted library allocation
|
page read and write
|
||
1A85F966000
|
trusted library allocation
|
page read and write
|
||
1A858E7A000
|
trusted library allocation
|
page read and write
|
||
2190F360000
|
heap
|
page read and write
|
||
1A85F740000
|
trusted library allocation
|
page read and write
|
||
1A854CAE000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
20D1A479000
|
trusted library allocation
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A8544D9000
|
trusted library allocation
|
page read and write
|
||
1A857EAD000
|
trusted library allocation
|
page read and write
|
||
1A859DE5000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8587AC000
|
trusted library allocation
|
page read and write
|
||
1A8613D6000
|
trusted library allocation
|
page read and write
|
||
1A85F7EE000
|
trusted library allocation
|
page read and write
|
||
1A858788000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A8545F3000
|
trusted library allocation
|
page read and write
|
||
1A84E2E7000
|
heap
|
page read and write
|
||
1A858DBC000
|
trusted library allocation
|
page read and write
|
||
21590742000
|
heap
|
page read and write
|
||
1A8612FD000
|
trusted library allocation
|
page read and write
|
||
2359CCB2000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A858545000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
299DFFF000
|
stack
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A85ADDF000
|
trusted library allocation
|
page read and write
|
||
1A857E75000
|
trusted library allocation
|
page read and write
|
||
2190E730000
|
heap
|
page readonly
|
||
1A8619E5000
|
trusted library allocation
|
page read and write
|
||
1A85816B000
|
trusted library allocation
|
page read and write
|
||
2190F3E9000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A860E59000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A8571B3000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A85F69A000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85F4B1000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A85AB80000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
20D1A465000
|
trusted library allocation
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A858DB4000
|
trusted library allocation
|
page read and write
|
||
21590865000
|
heap
|
page read and write
|
||
1A8628FA000
|
trusted library allocation
|
page read and write
|
||
1A85ABFA000
|
trusted library allocation
|
page read and write
|
||
2359CC00000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A85896F000
|
trusted library allocation
|
page read and write
|
||
1A84E27C000
|
heap
|
page read and write
|
||
1A86285E000
|
trusted library allocation
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A857D8C000
|
trusted library allocation
|
page read and write
|
||
1A8590A5000
|
trusted library allocation
|
page read and write
|
||
1A858159000
|
trusted library allocation
|
page read and write
|
||
1A857DCA000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A859DEA000
|
trusted library allocation
|
page read and write
|
||
1A8586C2000
|
trusted library allocation
|
page read and write
|
||
1A859B76000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A859D41000
|
trusted library allocation
|
page read and write
|
||
2190E861000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8549B4000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A85449F000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A859DE5000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A85984D000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A85AEED000
|
trusted library allocation
|
page read and write
|
||
1A8587ED000
|
trusted library allocation
|
page read and write
|
||
1A853366000
|
trusted library allocation
|
page read and write
|
||
1A85AB51000
|
trusted library allocation
|
page read and write
|
||
1A85F488000
|
trusted library allocation
|
page read and write
|
||
1A857EB6000
|
trusted library allocation
|
page read and write
|
||
F58000
|
heap
|
page read and write
|
||
1A860ECA000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
1A85AE2F000
|
trusted library allocation
|
page read and write
|
||
1A85877B000
|
trusted library allocation
|
page read and write
|
||
1A858992000
|
trusted library allocation
|
page read and write
|
||
1A8597F3000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A8588C2000
|
trusted library allocation
|
page read and write
|
||
1A858DC0000
|
trusted library allocation
|
page read and write
|
||
1A857645000
|
trusted library allocation
|
page read and write
|
||
1A858D9B000
|
trusted library allocation
|
page read and write
|
||
1A857129000
|
trusted library allocation
|
page read and write
|
||
1A858AFA000
|
trusted library allocation
|
page read and write
|
||
1A8586C5000
|
trusted library allocation
|
page read and write
|
||
1A85F4A2000
|
trusted library allocation
|
page read and write
|
||
1A859B94000
|
trusted library allocation
|
page read and write
|
||
1A861388000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
2190F364000
|
heap
|
page read and write
|
||
1A85F591000
|
trusted library allocation
|
page read and write
|
||
1A859929000
|
trusted library allocation
|
page read and write
|
||
9052C7E000
|
unkown
|
page readonly
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A84E2B0000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
B513C7B000
|
stack
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A858D5D000
|
trusted library allocation
|
page read and write
|
||
20D1A570000
|
unclassified section
|
page readonly
|
||
1A85F63E000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A85AE93000
|
trusted library allocation
|
page read and write
|
||
1A85AA9D000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A854CA2000
|
heap
|
page read and write
|
||
1A860E66000
|
trusted library allocation
|
page read and write
|
||
1A85F6ED000
|
trusted library allocation
|
page read and write
|
||
1A858894000
|
trusted library allocation
|
page read and write
|
||
1A858DAB000
|
trusted library allocation
|
page read and write
|
||
1A856E99000
|
trusted library allocation
|
page read and write
|
||
1A85AEF8000
|
trusted library allocation
|
page read and write
|
||
1A857287000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A861388000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A8549B8000
|
trusted library allocation
|
page read and write
|
||
1A84E2BE000
|
heap
|
page read and write
|
||
1A857AA7000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A859AC3000
|
trusted library allocation
|
page read and write
|
||
1A8586DC000
|
trusted library allocation
|
page read and write
|
||
1A8589D3000
|
trusted library allocation
|
page read and write
|
||
1A858B3B000
|
trusted library allocation
|
page read and write
|
||
1A858798000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
2190F363000
|
heap
|
page read and write
|
||
1A862B0D000
|
trusted library allocation
|
page read and write
|
||
1A8557E1000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A857EB0000
|
trusted library allocation
|
page read and write
|
||
1A861257000
|
trusted library allocation
|
page read and write
|
||
1A858B3D000
|
trusted library allocation
|
page read and write
|
||
1A859927000
|
trusted library allocation
|
page read and write
|
||
1A86198E000
|
trusted library allocation
|
page read and write
|
||
1A858766000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A859B93000
|
trusted library allocation
|
page read and write
|
||
1A859BE3000
|
trusted library allocation
|
page read and write
|
||
20D1A526000
|
heap
|
page read and write
|
||
1A85858F000
|
trusted library allocation
|
page read and write
|
||
1A85F7D3000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
21590900000
|
trusted library allocation
|
page read and write
|
||
1A8581AC000
|
trusted library allocation
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A858931000
|
trusted library allocation
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
1A8544E8000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A8631E1000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A859180000
|
trusted library allocation
|
page read and write
|
||
1A859BE0000
|
trusted library allocation
|
page read and write
|
||
190CFB80000
|
heap
|
page read and write
|
||
1A85A7D9000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A858B40000
|
trusted library allocation
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
7C2B5FE000
|
unkown
|
page readonly
|
||
1A857FF1000
|
trusted library allocation
|
page read and write
|
||
1A858D9E000
|
trusted library allocation
|
page read and write
|
||
1A85870F000
|
trusted library allocation
|
page read and write
|
||
1A85A9F6000
|
trusted library allocation
|
page read and write
|
||
1A84E275000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A858E7F000
|
trusted library allocation
|
page read and write
|
||
1A857E45000
|
trusted library allocation
|
page read and write
|
||
1A859BEC000
|
trusted library allocation
|
page read and write
|
||
1A85AB39000
|
trusted library allocation
|
page read and write
|
||
1A859865000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E2F3000
|
heap
|
page read and write
|
||
2190F360000
|
heap
|
page read and write
|
||
1A862C5A000
|
heap
|
page read and write
|
||
B5167FE000
|
stack
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
20D1A498000
|
trusted library allocation
|
page read and write
|
||
1A858132000
|
trusted library allocation
|
page read and write
|
||
1A857EBE000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A85F591000
|
trusted library allocation
|
page read and write
|
||
1A85AB39000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A859BF4000
|
trusted library allocation
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A8589D0000
|
trusted library allocation
|
page read and write
|
||
1A857E7D000
|
trusted library allocation
|
page read and write
|
||
1A85F6C2000
|
trusted library allocation
|
page read and write
|
||
1A85A7DA000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A858EEE000
|
trusted library allocation
|
page read and write
|
||
1A85A8BD000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A859B8B000
|
trusted library allocation
|
page read and write
|
||
1A859D5B000
|
trusted library allocation
|
page read and write
|
||
1A858DBC000
|
trusted library allocation
|
page read and write
|
||
1A85AE6F000
|
trusted library allocation
|
page read and write
|
||
1A85F7FA000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A857FCB000
|
trusted library allocation
|
page read and write
|
||
1A858BBC000
|
trusted library allocation
|
page read and write
|
||
1A85F589000
|
trusted library allocation
|
page read and write
|
||
1A8585B2000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A857E9B000
|
trusted library allocation
|
page read and write
|
||
1A859BFE000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A857F57000
|
trusted library allocation
|
page read and write
|
||
1A85F651000
|
trusted library allocation
|
page read and write
|
||
1A85F35B000
|
trusted library allocation
|
page read and write
|
||
1A857EB7000
|
trusted library allocation
|
page read and write
|
||
1A85F9DF000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8626A8000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A858E9C000
|
trusted library allocation
|
page read and write
|
||
1A8599A1000
|
trusted library allocation
|
page read and write
|
||
1A858761000
|
trusted library allocation
|
page read and write
|
||
1A857EAB000
|
trusted library allocation
|
page read and write
|
||
2190F3AA000
|
heap
|
page read and write
|
||
1A8575E3000
|
trusted library allocation
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A857E81000
|
trusted library allocation
|
page read and write
|
||
1A85F916000
|
trusted library allocation
|
page read and write
|
||
1A858E9D000
|
trusted library allocation
|
page read and write
|
||
1A85AD78000
|
trusted library allocation
|
page read and write
|
||
2190F42B000
|
heap
|
page read and write
|
||
1A858BED000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A84E2B6000
|
heap
|
page read and write
|
||
2190F3F1000
|
heap
|
page read and write
|
||
20D1A618000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A858A2D000
|
trusted library allocation
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
190CFF0A000
|
trusted library allocation
|
page read and write
|
||
1A861337000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A84E2DD000
|
heap
|
page read and write
|
||
1A85893C000
|
trusted library allocation
|
page read and write
|
||
1A858E5D000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A857EFA000
|
trusted library allocation
|
page read and write
|
||
1A8590E6000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8581A9000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A858E7F000
|
trusted library allocation
|
page read and write
|
||
1A85F2D8000
|
trusted library allocation
|
page read and write
|
||
1A8575E7000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A8533D2000
|
trusted library allocation
|
page read and write
|
||
2359CC17000
|
trusted library allocation
|
page read and write
|
||
1A85855E000
|
trusted library allocation
|
page read and write
|
||
1A858154000
|
trusted library allocation
|
page read and write
|
||
1A854575000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A85AD38000
|
trusted library allocation
|
page read and write
|
||
1A85AE51000
|
trusted library allocation
|
page read and write
|
||
1A859B8F000
|
trusted library allocation
|
page read and write
|
||
1A854544000
|
trusted library allocation
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A8545EB000
|
trusted library allocation
|
page read and write
|
||
1A858DC0000
|
trusted library allocation
|
page read and write
|
||
1A857EAB000
|
trusted library allocation
|
page read and write
|
||
1A85817B000
|
trusted library allocation
|
page read and write
|
||
F82000
|
heap
|
page read and write
|
||
2359CC70000
|
trusted library allocation
|
page read and write
|
||
1A85F67A000
|
trusted library allocation
|
page read and write
|
||
2190E3F0000
|
unclassified section
|
page readonly
|
||
1A858582000
|
trusted library allocation
|
page read and write
|
||
1A857E7D000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A85F376000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A858768000
|
trusted library allocation
|
page read and write
|
||
20D1A410000
|
trusted library allocation
|
page read and write
|
||
1A8574B9000
|
trusted library allocation
|
page read and write
|
||
1A859989000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85498C000
|
trusted library allocation
|
page read and write
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
2190E80C000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A858798000
|
trusted library allocation
|
page read and write
|
||
1A85499A000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A8544EF000
|
trusted library allocation
|
page read and write
|
||
1A860F01000
|
trusted library allocation
|
page read and write
|
||
1A8572CE000
|
trusted library allocation
|
page read and write
|
||
1A8587AC000
|
trusted library allocation
|
page read and write
|
||
1A857EFA000
|
trusted library allocation
|
page read and write
|
||
1A85F6E1000
|
trusted library allocation
|
page read and write
|
||
215906E0000
|
heap
|
page read and write
|
||
1A8597A5000
|
trusted library allocation
|
page read and write
|
||
1A854CA2000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A85F68E000
|
trusted library allocation
|
page read and write
|
||
1A856E60000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A858734000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
F86000
|
heap
|
page read and write
|
||
1A857E7D000
|
trusted library allocation
|
page read and write
|
||
1A857E8B000
|
trusted library allocation
|
page read and write
|
||
1A858191000
|
trusted library allocation
|
page read and write
|
||
1A85898D000
|
trusted library allocation
|
page read and write
|
||
1A861304000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A857F8D000
|
trusted library allocation
|
page read and write
|
||
1A85443D000
|
trusted library allocation
|
page read and write
|
||
1A8585AD000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
2190F3EB000
|
heap
|
page read and write
|
||
1A86131E000
|
trusted library allocation
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A858761000
|
trusted library allocation
|
page read and write
|
||
1A85AE93000
|
trusted library allocation
|
page read and write
|
||
1A8542CB000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A858560000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
DCBB641000
|
trusted library allocation
|
page execute read
|
||
D74000
|
heap
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A854538000
|
trusted library allocation
|
page read and write
|
||
20D1A130000
|
remote allocation
|
page read and write
|
||
1A858A4D000
|
trusted library allocation
|
page read and write
|
||
1A859BF4000
|
trusted library allocation
|
page read and write
|
||
1A84E2DD000
|
heap
|
page read and write
|
||
1A858794000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A862885000
|
trusted library allocation
|
page read and write
|
||
474000
|
unkown
|
page readonly
|
||
1A85F547000
|
trusted library allocation
|
page read and write
|
||
1A84E2DD000
|
heap
|
page read and write
|
||
1A8586AD000
|
trusted library allocation
|
page read and write
|
||
1A858D9E000
|
trusted library allocation
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A858EE9000
|
trusted library allocation
|
page read and write
|
||
1A85ABA8000
|
trusted library allocation
|
page read and write
|
||
1A854D85000
|
trusted library allocation
|
page read and write
|
||
1A8599D6000
|
trusted library allocation
|
page read and write
|
||
1A84E2F0000
|
heap
|
page read and write
|
||
1A854D3C000
|
trusted library allocation
|
page read and write
|
||
1A858587000
|
trusted library allocation
|
page read and write
|
||
1A86135D000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A857E87000
|
trusted library allocation
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A858A1B000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A857EA8000
|
trusted library allocation
|
page read and write
|
||
1A858B62000
|
trusted library allocation
|
page read and write
|
||
1A8628B8000
|
trusted library allocation
|
page read and write
|
||
190CFA70000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A84E2AD000
|
heap
|
page read and write
|
||
1A858DB4000
|
trusted library allocation
|
page read and write
|
||
1A85879B000
|
trusted library allocation
|
page read and write
|
||
1A8557F0000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A85A938000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A859B67000
|
trusted library allocation
|
page read and write
|
||
1A84E2A5000
|
heap
|
page read and write
|
||
1A85F68A000
|
trusted library allocation
|
page read and write
|
||
7C2A47B000
|
stack
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
2190E848000
|
trusted library allocation
|
page read and write
|
||
1A857A66000
|
trusted library allocation
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A85F7D3000
|
trusted library allocation
|
page read and write
|
||
1A858A42000
|
trusted library allocation
|
page read and write
|
||
1A859BFE000
|
trusted library allocation
|
page read and write
|
||
1A853318000
|
trusted library allocation
|
page read and write
|
||
1A8575FB000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A858E65000
|
trusted library allocation
|
page read and write
|
||
1A858155000
|
trusted library allocation
|
page read and write
|
||
1A85992D000
|
trusted library allocation
|
page read and write
|
||
1A8598DD000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A858768000
|
trusted library allocation
|
page read and write
|
||
1A85498F000
|
trusted library allocation
|
page read and write
|
||
1A857A53000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A858EC9000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A857E71000
|
trusted library allocation
|
page read and write
|
||
1A85F686000
|
trusted library allocation
|
page read and write
|
||
1A85A8F6000
|
trusted library allocation
|
page read and write
|
||
2359CBB4000
|
heap
|
page read and write
|
||
1A857EB1000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
2190F35C000
|
heap
|
page read and write
|
||
1A858563000
|
trusted library allocation
|
page read and write
|
||
1A857171000
|
trusted library allocation
|
page read and write
|
||
1A85AE84000
|
trusted library allocation
|
page read and write
|
||
1A858771000
|
trusted library allocation
|
page read and write
|
||
2190F43B000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A858768000
|
trusted library allocation
|
page read and write
|
||
1A859BD4000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A858D7F000
|
trusted library allocation
|
page read and write
|
||
1A85719A000
|
trusted library allocation
|
page read and write
|
||
1A85F6AF000
|
trusted library allocation
|
page read and write
|
||
1A857F63000
|
trusted library allocation
|
page read and write
|
||
1A84E286000
|
heap
|
page read and write
|
||
1A8572B9000
|
trusted library allocation
|
page read and write
|
||
1A858A0A000
|
trusted library allocation
|
page read and write
|
||
1A859AF8000
|
trusted library allocation
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A861376000
|
trusted library allocation
|
page read and write
|
||
1A858777000
|
trusted library allocation
|
page read and write
|
||
1A85A9DD000
|
trusted library allocation
|
page read and write
|
||
1A854D68000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A85728A000
|
trusted library allocation
|
page read and write
|
||
1A8572C4000
|
trusted library allocation
|
page read and write
|
||
20D1A524000
|
heap
|
page read and write
|
||
1A858B8E000
|
trusted library allocation
|
page read and write
|
||
1A85A9B5000
|
trusted library allocation
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
1A858DFC000
|
trusted library allocation
|
page read and write
|
||
1A85F2B1000
|
trusted library allocation
|
page read and write
|
||
1A858B31000
|
trusted library allocation
|
page read and write
|
||
1A85F643000
|
trusted library allocation
|
page read and write
|
||
1A857D80000
|
trusted library allocation
|
page read and write
|
||
1A859BF0000
|
trusted library allocation
|
page read and write
|
||
2190F429000
|
heap
|
page read and write
|
||
1A857E81000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A859DD3000
|
trusted library allocation
|
page read and write
|
||
1A857291000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A856E1D000
|
trusted library allocation
|
page read and write
|
||
1A85F678000
|
trusted library allocation
|
page read and write
|
||
1A858EBB000
|
trusted library allocation
|
page read and write
|
||
2190F300000
|
heap
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A857FF1000
|
trusted library allocation
|
page read and write
|
||
1A857EC3000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
190CFEE0000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
F87000
|
heap
|
page read and write
|
||
1A857E93000
|
trusted library allocation
|
page read and write
|
||
F8D000
|
heap
|
page read and write
|
||
1A857132000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A85FC33000
|
trusted library allocation
|
page read and write
|
||
1A85819B000
|
trusted library allocation
|
page read and write
|
||
1A85AB40000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A85819B000
|
trusted library allocation
|
page read and write
|
||
1A8544F8000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A856E93000
|
trusted library allocation
|
page read and write
|
||
1A8572DC000
|
trusted library allocation
|
page read and write
|
||
1A8590D0000
|
trusted library allocation
|
page read and write
|
||
1A85855B000
|
trusted library allocation
|
page read and write
|
||
1A85F6FA000
|
trusted library allocation
|
page read and write
|
||
1A859B51000
|
trusted library allocation
|
page read and write
|
||
1A8612FB000
|
trusted library allocation
|
page read and write
|
||
1A8628F4000
|
trusted library allocation
|
page read and write
|
||
1A862B56000
|
trusted library allocation
|
page read and write
|
||
1A85F6E4000
|
trusted library allocation
|
page read and write
|
||
1A858DE6000
|
trusted library allocation
|
page read and write
|
||
1A8581AC000
|
trusted library allocation
|
page read and write
|
||
1A8588EE000
|
trusted library allocation
|
page read and write
|
||
1A858728000
|
trusted library allocation
|
page read and write
|
||
2359CCAA000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A85F7EC000
|
trusted library allocation
|
page read and write
|
||
3DE21FE000
|
stack
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A857247000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A85F55F000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
1A8544EA000
|
trusted library allocation
|
page read and write
|
||
1A857F30000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A8585FB000
|
trusted library allocation
|
page read and write
|
||
1A8575EC000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A859748000
|
trusted library allocation
|
page read and write
|
||
9052D3E000
|
stack
|
page read and write
|
||
1A858B33000
|
trusted library allocation
|
page read and write
|
||
1A85A9EA000
|
trusted library allocation
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
2190F477000
|
heap
|
page read and write
|
||
2359C81A000
|
heap
|
page read and write
|
||
21590A00000
|
trusted library allocation
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A8619DF000
|
trusted library allocation
|
page read and write
|
||
1A859DF5000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A85AD34000
|
trusted library allocation
|
page read and write
|
||
1A859B8B000
|
trusted library allocation
|
page read and write
|
||
2190F400000
|
heap
|
page read and write
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
2190E875000
|
trusted library allocation
|
page read and write
|
||
1A858757000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
stack
|
page read and write
|
||
1A858A3F000
|
trusted library allocation
|
page read and write
|
||
1A84E284000
|
heap
|
page read and write
|
||
1A862B28000
|
trusted library allocation
|
page read and write
|
||
20D1A530000
|
heap
|
page readonly
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A858D9F000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85F7EC000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A8575CF000
|
trusted library allocation
|
page read and write
|
||
1A8599E2000
|
trusted library allocation
|
page read and write
|
||
1A858677000
|
trusted library allocation
|
page read and write
|
||
1A858539000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A859931000
|
trusted library allocation
|
page read and write
|
||
1A85339E000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A861200000
|
trusted library allocation
|
page read and write
|
||
1A85F631000
|
trusted library allocation
|
page read and write
|
||
1A8599DD000
|
trusted library allocation
|
page read and write
|
||
1A857E81000
|
trusted library allocation
|
page read and write
|
||
1A862D99000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A85F72A000
|
trusted library allocation
|
page read and write
|
||
1A859B5A000
|
trusted library allocation
|
page read and write
|
||
20D1A400000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85F33A000
|
trusted library allocation
|
page read and write
|
||
1A86255F000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A862971000
|
trusted library allocation
|
page read and write
|
||
1A8589D0000
|
trusted library allocation
|
page read and write
|
||
1A85AE3F000
|
trusted library allocation
|
page read and write
|
||
21590730000
|
heap
|
page read and write
|
||
1A8575F5000
|
trusted library allocation
|
page read and write
|
||
1A857E9E000
|
trusted library allocation
|
page read and write
|
||
1A85A819000
|
trusted library allocation
|
page read and write
|
||
1A858A59000
|
trusted library allocation
|
page read and write
|
||
1A85F970000
|
trusted library allocation
|
page read and write
|
||
20D1A2AA000
|
heap
|
page read and write
|
||
1A859B87000
|
trusted library allocation
|
page read and write
|
||
1A857F9F000
|
trusted library allocation
|
page read and write
|
||
1A857197000
|
trusted library allocation
|
page read and write
|
||
190CFC09000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A861376000
|
trusted library allocation
|
page read and write
|
||
1A85F56A000
|
trusted library allocation
|
page read and write
|
||
1A85974C000
|
trusted library allocation
|
page read and write
|
||
1A857A58000
|
trusted library allocation
|
page read and write
|
||
1A858A55000
|
trusted library allocation
|
page read and write
|
||
1A85879D000
|
trusted library allocation
|
page read and write
|
||
1A854D8A000
|
trusted library allocation
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
1A84E283000
|
heap
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85F5B6000
|
trusted library allocation
|
page read and write
|
||
1A85F48D000
|
trusted library allocation
|
page read and write
|
||
3DE39FE000
|
stack
|
page read and write
|
||
1A85F7D3000
|
trusted library allocation
|
page read and write
|
||
1A85874A000
|
trusted library allocation
|
page read and write
|
||
1A852C81000
|
trusted library allocation
|
page read and write
|
||
2359CCDB000
|
trusted library allocation
|
page read and write
|
||
1A84E2BE000
|
heap
|
page read and write
|
||
1A86123E000
|
trusted library allocation
|
page read and write
|
||
2359CE07000
|
trusted library allocation
|
page read and write
|
||
1A84E267000
|
heap
|
page read and write
|
||
1A85AA59000
|
trusted library allocation
|
page read and write
|
||
1A854561000
|
trusted library allocation
|
page read and write
|
||
1A8581A5000
|
trusted library allocation
|
page read and write
|
||
1A857EAD000
|
trusted library allocation
|
page read and write
|
||
1A857E87000
|
trusted library allocation
|
page read and write
|
||
2190E800000
|
trusted library allocation
|
page read and write
|
||
1A8585FB000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A85F6F2000
|
trusted library allocation
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
1A859DE5000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A858A42000
|
trusted library allocation
|
page read and write
|
||
1A8589C8000
|
trusted library allocation
|
page read and write
|
||
1A857D40000
|
trusted library allocation
|
page read and write
|
||
1A84E2AD000
|
heap
|
page read and write
|
||
1A858745000
|
trusted library allocation
|
page read and write
|
||
1A85F4D2000
|
trusted library allocation
|
page read and write
|
||
2190F46C000
|
heap
|
page read and write
|
||
1A858B55000
|
trusted library allocation
|
page read and write
|
||
1A85FC9E000
|
trusted library allocation
|
page read and write
|
||
1A85F6FA000
|
trusted library allocation
|
page read and write
|
||
1A859B8B000
|
trusted library allocation
|
page read and write
|
||
1A8585E6000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A8628F8000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85899C000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A857F9F000
|
trusted library allocation
|
page read and write
|
||
3DE19FF000
|
stack
|
page read and write
|
||
2190F3F1000
|
heap
|
page read and write
|
||
1A85873D000
|
trusted library allocation
|
page read and write
|
||
1A854D77000
|
trusted library allocation
|
page read and write
|
||
1A854D65000
|
trusted library allocation
|
page read and write
|
||
1A860DFC000
|
trusted library allocation
|
page read and write
|
||
1A858A6C000
|
trusted library allocation
|
page read and write
|
||
1A8598EB000
|
trusted library allocation
|
page read and write
|
||
9052CBD000
|
stack
|
page read and write
|
||
1A858994000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A8572CD000
|
trusted library allocation
|
page read and write
|
||
1A84E2B7000
|
heap
|
page read and write
|
||
1A8544BD000
|
trusted library allocation
|
page read and write
|
||
1A8628FA000
|
trusted library allocation
|
page read and write
|
||
1A8613EE000
|
trusted library allocation
|
page read and write
|
||
1A85F6AA000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A85F7EC000
|
trusted library allocation
|
page read and write
|
||
1A85A8BF000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A8619D0000
|
trusted library allocation
|
page read and write
|
||
1A85980C000
|
trusted library allocation
|
page read and write
|
||
1A859BF2000
|
trusted library allocation
|
page read and write
|
||
1A84E2BC000
|
heap
|
page read and write
|
||
2190E760000
|
unclassified section
|
page read and write
|
||
1A857DCC000
|
trusted library allocation
|
page read and write
|
||
1A862C01000
|
heap
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
38E5E2124000
|
trusted library allocation
|
page read and write
|
||
1A85A8C7000
|
trusted library allocation
|
page read and write
|
||
1A85A97A000
|
trusted library allocation
|
page read and write
|
||
2190F458000
|
heap
|
page read and write
|
||
1A858DED000
|
trusted library allocation
|
page read and write
|
||
2C9000
|
stack
|
page read and write
|
||
1A858A3B000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A858E71000
|
trusted library allocation
|
page read and write
|
||
1A858E5D000
|
trusted library allocation
|
page read and write
|
||
1A85ADF0000
|
trusted library allocation
|
page read and write
|
||
1A85F66B000
|
trusted library allocation
|
page read and write
|
||
1A857EFA000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A85F664000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A86255F000
|
trusted library allocation
|
page read and write
|
||
1A858599000
|
trusted library allocation
|
page read and write
|
||
1A8532FB000
|
trusted library allocation
|
page read and write
|
||
1A85F745000
|
trusted library allocation
|
page read and write
|
||
1A85F2CA000
|
trusted library allocation
|
page read and write
|
||
1A858545000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A86134F000
|
trusted library allocation
|
page read and write
|
||
2190F200000
|
trusted library allocation
|
page read and write
|
||
1A858DE3000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A862480000
|
trusted library allocation
|
page read and write
|
||
1A858D6D000
|
trusted library allocation
|
page read and write
|
||
1A85A828000
|
trusted library allocation
|
page read and write
|
||
1A859AFB000
|
trusted library allocation
|
page read and write
|
||
1A85A89C000
|
trusted library allocation
|
page read and write
|
||
1A85AAFE000
|
trusted library allocation
|
page read and write
|
||
1A857E89000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A85ABD5000
|
trusted library allocation
|
page read and write
|
||
1A86131E000
|
trusted library allocation
|
page read and write
|
||
1A852CBF000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8612B2000
|
trusted library allocation
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
1A85815C000
|
trusted library allocation
|
page read and write
|
||
1A862DAF000
|
heap
|
page read and write
|
||
1A85783D000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A861376000
|
trusted library allocation
|
page read and write
|
||
1A859B5A000
|
trusted library allocation
|
page read and write
|
||
1A857881000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
1A8588EE000
|
trusted library allocation
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A858D4F000
|
trusted library allocation
|
page read and write
|
||
1A857FA1000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E2AD000
|
heap
|
page read and write
|
||
1A8575FE000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A858D9E000
|
trusted library allocation
|
page read and write
|
||
1A84E2B2000
|
heap
|
page read and write
|
||
2190F3F2000
|
heap
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A858176000
|
trusted library allocation
|
page read and write
|
||
1A84E2EF000
|
heap
|
page read and write
|
||
2190F3F1000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A858169000
|
trusted library allocation
|
page read and write
|
||
1A8544EA000
|
trusted library allocation
|
page read and write
|
||
1A858A42000
|
trusted library allocation
|
page read and write
|
||
1A857EBE000
|
trusted library allocation
|
page read and write
|
||
1A8581A9000
|
trusted library allocation
|
page read and write
|
||
1A854CAC000
|
heap
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
1A8589EE000
|
trusted library allocation
|
page read and write
|
||
1A85878E000
|
trusted library allocation
|
page read and write
|
||
1A8572D2000
|
trusted library allocation
|
page read and write
|
||
1A857EBC000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A8590A5000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85F6E1000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A85A9FE000
|
trusted library allocation
|
page read and write
|
||
1A85F54D000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
2190F3E8000
|
heap
|
page read and write
|
||
1A859B51000
|
trusted library allocation
|
page read and write
|
||
1A85AE43000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A85F7DD000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A85A9CD000
|
trusted library allocation
|
page read and write
|
||
1A857F73000
|
trusted library allocation
|
page read and write
|
||
1A8572BE000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1A85984D000
|
trusted library allocation
|
page read and write
|
||
BBF000
|
stack
|
page read and write
|
||
1A8581AC000
|
trusted library allocation
|
page read and write
|
||
1A84E2E9000
|
heap
|
page read and write
|
||
9052CFE000
|
unkown
|
page readonly
|
||
1A85F6D2000
|
trusted library allocation
|
page read and write
|
||
1A860E18000
|
trusted library allocation
|
page read and write
|
||
1A858EED000
|
trusted library allocation
|
page read and write
|
||
2190F20B000
|
trusted library allocation
|
page read and write
|
||
1A858BAA000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A858DB4000
|
trusted library allocation
|
page read and write
|
||
1A85ADD6000
|
trusted library allocation
|
page read and write
|
||
2190F1BF000
|
unkown
|
page execute read
|
||
1A85F640000
|
trusted library allocation
|
page read and write
|
||
1A85F7EC000
|
trusted library allocation
|
page read and write
|
||
1A84E283000
|
heap
|
page read and write
|
||
1A85894A000
|
trusted library allocation
|
page read and write
|
||
1A85A970000
|
trusted library allocation
|
page read and write
|
||
20D1A270000
|
heap
|
page read and write
|
||
1A86135D000
|
trusted library allocation
|
page read and write
|
||
1A8625D4000
|
trusted library allocation
|
page read and write
|
||
1A85F54D000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A858935000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A85F7E1000
|
trusted library allocation
|
page read and write
|
||
1A85AB06000
|
trusted library allocation
|
page read and write
|
||
1A8628C8000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A862996000
|
trusted library allocation
|
page read and write
|
||
1A8590D7000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A85AB51000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A85A984000
|
trusted library allocation
|
page read and write
|
||
1A86295E000
|
trusted library allocation
|
page read and write
|
||
1A85A7F2000
|
trusted library allocation
|
page read and write
|
||
2190F43B000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85819B000
|
trusted library allocation
|
page read and write
|
||
1A857E4F000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A85A948000
|
trusted library allocation
|
page read and write
|
||
1A858DFC000
|
trusted library allocation
|
page read and write
|
||
1A857EAB000
|
trusted library allocation
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A8545F6000
|
trusted library allocation
|
page read and write
|
||
1A853276000
|
trusted library allocation
|
page read and write
|
||
2190E85F000
|
trusted library allocation
|
page read and write
|
||
1A85F55E000
|
trusted library allocation
|
page read and write
|
||
1A8581C3000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A8588DA000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A859BFE000
|
trusted library allocation
|
page read and write
|
||
1A854D85000
|
trusted library allocation
|
page read and write
|
||
1A8590D8000
|
trusted library allocation
|
page read and write
|
||
1A863196000
|
trusted library allocation
|
page read and write
|
||
1A8589CB000
|
trusted library allocation
|
page read and write
|
||
1A857EBE000
|
trusted library allocation
|
page read and write
|
||
2190F360000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A85AD38000
|
trusted library allocation
|
page read and write
|
||
1A85FC14000
|
trusted library allocation
|
page read and write
|
||
1A8589BB000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A85F737000
|
trusted library allocation
|
page read and write
|
||
1A85F3E1000
|
trusted library allocation
|
page read and write
|
||
1A86255A000
|
trusted library allocation
|
page read and write
|
||
1A857575000
|
trusted library allocation
|
page read and write
|
||
1A85F3DE000
|
trusted library allocation
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A85A7FB000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A859AF5000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
2190F458000
|
heap
|
page read and write
|
||
1A85815A000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A85875B000
|
trusted library allocation
|
page read and write
|
||
1A8581A7000
|
trusted library allocation
|
page read and write
|
||
1A85858C000
|
trusted library allocation
|
page read and write
|
||
2359C7A0000
|
remote allocation
|
page read and write
|
||
FA6000
|
heap
|
page read and write
|
||
2359C9B0000
|
heap
|
page read and write
|
||
1A857293000
|
trusted library allocation
|
page read and write
|
||
1A85F2C6000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A85F5B6000
|
trusted library allocation
|
page read and write
|
||
1A85FCB7000
|
trusted library allocation
|
page read and write
|
||
2190F458000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A858DB4000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A85A8DF000
|
trusted library allocation
|
page read and write
|
||
1A8549F1000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A859063000
|
trusted library allocation
|
page read and write
|
||
1A8585E6000
|
trusted library allocation
|
page read and write
|
||
1A862B9E000
|
trusted library allocation
|
page read and write
|
||
1A857EFA000
|
trusted library allocation
|
page read and write
|
||
1A85725E000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1A857FE3000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A861348000
|
trusted library allocation
|
page read and write
|
||
1A8589D3000
|
trusted library allocation
|
page read and write
|
||
1A862BCF000
|
trusted library allocation
|
page read and write
|
||
1A858B1C000
|
trusted library allocation
|
page read and write
|
||
1A8589E2000
|
trusted library allocation
|
page read and write
|
||
1A854CA8000
|
heap
|
page read and write
|
||
1A857E45000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A84E28F000
|
heap
|
page read and write
|
||
1A84E282000
|
heap
|
page read and write
|
||
1A8572A9000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
21592370000
|
heap
|
page read and write
|
||
1A8544B5000
|
trusted library allocation
|
page read and write
|
||
1A84E2E9000
|
heap
|
page read and write
|
||
2190E8E9000
|
trusted library allocation
|
page read and write
|
||
1A84E2B2000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A8619EE000
|
trusted library allocation
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A859C13000
|
trusted library allocation
|
page read and write
|
||
1A85F336000
|
trusted library allocation
|
page read and write
|
||
1A85421B000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A8613D6000
|
trusted library allocation
|
page read and write
|
||
2190E770000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A859BE3000
|
trusted library allocation
|
page read and write
|
||
1A858936000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8613F6000
|
trusted library allocation
|
page read and write
|
||
1A8585B2000
|
trusted library allocation
|
page read and write
|
||
1A85ABCA000
|
trusted library allocation
|
page read and write
|
||
1A8544EA000
|
trusted library allocation
|
page read and write
|
||
1A862C01000
|
heap
|
page read and write
|
||
1A857EAD000
|
trusted library allocation
|
page read and write
|
||
1A85717E000
|
trusted library allocation
|
page read and write
|
||
1A858191000
|
trusted library allocation
|
page read and write
|
||
1A8575FB000
|
trusted library allocation
|
page read and write
|
||
1A8589DB000
|
trusted library allocation
|
page read and write
|
||
1A8557F4000
|
trusted library allocation
|
page read and write
|
||
1A859B76000
|
trusted library allocation
|
page read and write
|
||
1A85F361000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A85FCED000
|
trusted library allocation
|
page read and write
|
||
1A8587D7000
|
trusted library allocation
|
page read and write
|
||
1A857DBA000
|
trusted library allocation
|
page read and write
|
||
3D3EE4D03000
|
trusted library allocation
|
page read and write
|
||
1A854D6A000
|
trusted library allocation
|
page read and write
|
||
905357E000
|
stack
|
page read and write
|
||
7C281CE000
|
unkown
|
page readonly
|
||
1A85AB5B000
|
trusted library allocation
|
page read and write
|
||
1A862589000
|
trusted library allocation
|
page read and write
|
||
1A858D95000
|
trusted library allocation
|
page read and write
|
||
1A8544EA000
|
trusted library allocation
|
page read and write
|
||
1A84E297000
|
heap
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A8549D6000
|
trusted library allocation
|
page read and write
|
||
1A8557F2000
|
trusted library allocation
|
page read and write
|
||
1A8587A9000
|
trusted library allocation
|
page read and write
|
||
1A858747000
|
trusted library allocation
|
page read and write
|
||
1A84E27F000
|
heap
|
page read and write
|
||
2190F309000
|
heap
|
page read and write
|
||
1A858768000
|
trusted library allocation
|
page read and write
|
||
1A8612F7000
|
trusted library allocation
|
page read and write
|
||
1A858A55000
|
trusted library allocation
|
page read and write
|
||
1A854CB2000
|
heap
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A86131E000
|
trusted library allocation
|
page read and write
|
||
1A8612DF000
|
trusted library allocation
|
page read and write
|
||
1A8629A6000
|
trusted library allocation
|
page read and write
|
||
1A85AE2B000
|
trusted library allocation
|
page read and write
|
||
1A85F98D000
|
trusted library allocation
|
page read and write
|
||
1A85719A000
|
trusted library allocation
|
page read and write
|
||
1A85818B000
|
trusted library allocation
|
page read and write
|
||
1A8545A2000
|
trusted library allocation
|
page read and write
|
||
1A85F7D0000
|
trusted library allocation
|
page read and write
|
||
1A85F4B1000
|
trusted library allocation
|
page read and write
|
||
1A858D9B000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
1A854D3B000
|
trusted library allocation
|
page read and write
|
||
1A857E15000
|
trusted library allocation
|
page read and write
|
||
2190F3E1000
|
heap
|
page read and write
|
||
1A859083000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A857FEB000
|
trusted library allocation
|
page read and write
|
||
1A84E2DD000
|
heap
|
page read and write
|
||
1A85F644000
|
trusted library allocation
|
page read and write
|
||
1A856EDB000
|
trusted library allocation
|
page read and write
|
||
20D1A4EB000
|
trusted library allocation
|
page read and write
|
||
1A84E27F000
|
heap
|
page read and write
|
||
1A858745000
|
trusted library allocation
|
page read and write
|
||
1A852CC3000
|
trusted library allocation
|
page read and write
|
||
1A858BF5000
|
trusted library allocation
|
page read and write
|
||
1A861255000
|
trusted library allocation
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A8581A9000
|
trusted library allocation
|
page read and write
|
||
1A857F33000
|
trusted library allocation
|
page read and write
|
||
1A858191000
|
trusted library allocation
|
page read and write
|
||
1A858759000
|
trusted library allocation
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
1A853326000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8586DC000
|
trusted library allocation
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A857E75000
|
trusted library allocation
|
page read and write
|
||
1A862971000
|
trusted library allocation
|
page read and write
|
||
1A862565000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
2190F3EB000
|
heap
|
page read and write
|
||
1A859BFE000
|
trusted library allocation
|
page read and write
|
||
1A8544F8000
|
trusted library allocation
|
page read and write
|
||
1A84E2B6000
|
heap
|
page read and write
|
||
1A85813E000
|
trusted library allocation
|
page read and write
|
||
1A85F620000
|
trusted library allocation
|
page read and write
|
||
1A84E2A5000
|
heap
|
page read and write
|
||
1A858AFD000
|
trusted library allocation
|
page read and write
|
||
1A858BC0000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A85AE29000
|
trusted library allocation
|
page read and write
|
||
1A857EB6000
|
trusted library allocation
|
page read and write
|
||
21592398000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A85ABF5000
|
trusted library allocation
|
page read and write
|
||
1A85728A000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A84E2E3000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E2E0000
|
heap
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A85F5B6000
|
trusted library allocation
|
page read and write
|
||
2359CC30000
|
trusted library allocation
|
page read and write
|
||
1A85F2C6000
|
trusted library allocation
|
page read and write
|
||
B513D7E000
|
stack
|
page read and write
|
||
1A8572D8000
|
trusted library allocation
|
page read and write
|
||
1A858DAB000
|
trusted library allocation
|
page read and write
|
||
1A85A8A6000
|
trusted library allocation
|
page read and write
|
||
1A85F587000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A854237000
|
trusted library allocation
|
page read and write
|
||
1A862B36000
|
trusted library allocation
|
page read and write
|
||
2359CD00000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A8557CB000
|
trusted library allocation
|
page read and write
|
||
1A8590D0000
|
trusted library allocation
|
page read and write
|
||
1A857FEB000
|
trusted library allocation
|
page read and write
|
||
1A858DB4000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A86294E000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A857EB1000
|
trusted library allocation
|
page read and write
|
||
1A85ABF7000
|
trusted library allocation
|
page read and write
|
||
1A8585E2000
|
trusted library allocation
|
page read and write
|
||
1A85ABDC000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
2190F421000
|
heap
|
page read and write
|
||
1A85AF00000
|
trusted library allocation
|
page read and write
|
||
2190F421000
|
heap
|
page read and write
|
||
1A85F97E000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A8589DF000
|
trusted library allocation
|
page read and write
|
||
1A85F4DE000
|
trusted library allocation
|
page read and write
|
||
1A85F6C2000
|
trusted library allocation
|
page read and write
|
||
1A858A9E000
|
trusted library allocation
|
page read and write
|
||
1A85F9B2000
|
trusted library allocation
|
page read and write
|
||
1A862C01000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
2190E823000
|
trusted library allocation
|
page read and write
|
||
1A84E282000
|
heap
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
2190E744000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
1A85716A000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A858E71000
|
trusted library allocation
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A858599000
|
trusted library allocation
|
page read and write
|
||
1A85F6A3000
|
trusted library allocation
|
page read and write
|
||
1A8586F8000
|
trusted library allocation
|
page read and write
|
||
1A858AFA000
|
trusted library allocation
|
page read and write
|
||
1A857D73000
|
trusted library allocation
|
page read and write
|
||
1A8581C3000
|
trusted library allocation
|
page read and write
|
||
1A858D95000
|
trusted library allocation
|
page read and write
|
||
1A85758B000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A85AEFB000
|
trusted library allocation
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A854564000
|
trusted library allocation
|
page read and write
|
||
1A856E4C000
|
trusted library allocation
|
page read and write
|
||
1A862C3E000
|
heap
|
page read and write
|
||
1A857EBC000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85728E000
|
trusted library allocation
|
page read and write
|
||
1A85F737000
|
trusted library allocation
|
page read and write
|
||
1A8575E3000
|
trusted library allocation
|
page read and write
|
||
1A85463A000
|
trusted library allocation
|
page read and write
|
||
2359CF00000
|
trusted library allocation
|
page read and write
|
||
1A85FC1B000
|
trusted library allocation
|
page read and write
|
||
1A84E282000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A860EB4000
|
trusted library allocation
|
page read and write
|
||
1A858A55000
|
trusted library allocation
|
page read and write
|
||
1A857EB6000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A857667000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A85498F000
|
trusted library allocation
|
page read and write
|
||
1A85F4D4000
|
trusted library allocation
|
page read and write
|
||
1A8587ED000
|
trusted library allocation
|
page read and write
|
||
20D1A600000
|
trusted library allocation
|
page read and write
|
||
1A8572FC000
|
trusted library allocation
|
page read and write
|
||
1A8624DD000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A858A4E000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A8590D8000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A8613D6000
|
trusted library allocation
|
page read and write
|
||
1A8557EE000
|
trusted library allocation
|
page read and write
|
||
2190E4B0000
|
heap
|
page read and write
|
||
1A8581A3000
|
trusted library allocation
|
page read and write
|
||
2359CC11000
|
trusted library allocation
|
page read and write
|
||
1A860F04000
|
trusted library allocation
|
page read and write
|
||
1A85874C000
|
trusted library allocation
|
page read and write
|
||
1A85C002000
|
trusted library allocation
|
page read and write
|
||
1A858D9B000
|
trusted library allocation
|
page read and write
|
||
1A858794000
|
trusted library allocation
|
page read and write
|
||
1A8578B7000
|
trusted library allocation
|
page read and write
|
||
1A85A9F6000
|
trusted library allocation
|
page read and write
|
||
1A84E2BE000
|
heap
|
page read and write
|
||
2190F3E0000
|
heap
|
page read and write
|
||
1A857FA3000
|
trusted library allocation
|
page read and write
|
||
2190F3E8000
|
heap
|
page read and write
|
||
1A8624C9000
|
trusted library allocation
|
page read and write
|
||
1A852CDF000
|
trusted library allocation
|
page read and write
|
||
1A862200000
|
trusted library allocation
|
page read and write
|
||
1A85F6E4000
|
trusted library allocation
|
page read and write
|
||
1A85F9BD000
|
trusted library allocation
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A85A9D8000
|
trusted library allocation
|
page read and write
|
||
1A85F3F1000
|
trusted library allocation
|
page read and write
|
||
1A857FDA000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
21590830000
|
heap
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A8545DD000
|
trusted library allocation
|
page read and write
|
||
1A8542F5000
|
trusted library allocation
|
page read and write
|
||
1A8619CD000
|
trusted library allocation
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A84E2B2000
|
heap
|
page read and write
|
||
1A85788A000
|
trusted library allocation
|
page read and write
|
||
1A85441E000
|
trusted library allocation
|
page read and write
|
||
1A858DED000
|
trusted library allocation
|
page read and write
|
||
1A85782D000
|
trusted library allocation
|
page read and write
|
||
2190F444000
|
heap
|
page read and write
|
||
1A8545F8000
|
trusted library allocation
|
page read and write
|
||
1A859BD4000
|
trusted library allocation
|
page read and write
|
||
2190E82F000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A858577000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A857E6F000
|
trusted library allocation
|
page read and write
|
||
1A86135D000
|
trusted library allocation
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
2190F22D000
|
trusted library allocation
|
page read and write
|
||
1A85A96C000
|
trusted library allocation
|
page read and write
|
||
1A84E2A3000
|
heap
|
page read and write
|
||
1A84E289000
|
heap
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85F69A000
|
trusted library allocation
|
page read and write
|
||
2359CC72000
|
trusted library allocation
|
page read and write
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
1A862C71000
|
heap
|
page read and write
|
||
1A859B7F000
|
trusted library allocation
|
page read and write
|
||
1A85F6F2000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A857D73000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8578B7000
|
trusted library allocation
|
page read and write
|
||
1A85F6B9000
|
trusted library allocation
|
page read and write
|
||
1A85F9C1000
|
trusted library allocation
|
page read and write
|
||
1A8587CC000
|
trusted library allocation
|
page read and write
|
||
1A85FCE3000
|
trusted library allocation
|
page read and write
|
||
1A85F6B9000
|
trusted library allocation
|
page read and write
|
||
1A85F6BD000
|
trusted library allocation
|
page read and write
|
||
1A8589D3000
|
trusted library allocation
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
1A85F74B000
|
trusted library allocation
|
page read and write
|
||
1A858DF2000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A86257F000
|
trusted library allocation
|
page read and write
|
||
1A84E2AD000
|
heap
|
page read and write
|
||
1A8598CD000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
F79000
|
heap
|
page read and write
|
||
1A8576F0000
|
trusted library allocation
|
page read and write
|
||
1A858521000
|
trusted library allocation
|
page read and write
|
||
1A84E282000
|
heap
|
page read and write
|
||
20D1A540000
|
unclassified section
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A857284000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A862B96000
|
trusted library allocation
|
page read and write
|
||
1A858D6D000
|
trusted library allocation
|
page read and write
|
||
2359CC8F000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E2E3000
|
heap
|
page read and write
|
||
1A858A49000
|
trusted library allocation
|
page read and write
|
||
1A84E291000
|
heap
|
page read and write
|
||
20D1A54F000
|
unclassified section
|
page read and write
|
||
1A861314000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
2159074F000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A85F632000
|
trusted library allocation
|
page read and write
|
||
1A857E79000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A858777000
|
trusted library allocation
|
page read and write
|
||
1A85AB45000
|
trusted library allocation
|
page read and write
|
||
1A84E2EA000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A85A94D000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
2359C740000
|
unclassified section
|
page readonly
|
||
1A858169000
|
trusted library allocation
|
page read and write
|
||
1A84E282000
|
heap
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A8581F9000
|
trusted library allocation
|
page read and write
|
||
1A8589DB000
|
trusted library allocation
|
page read and write
|
||
1A85A8C9000
|
trusted library allocation
|
page read and write
|
||
299D7FE000
|
stack
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A856EE7000
|
trusted library allocation
|
page read and write
|
||
2190F3F1000
|
heap
|
page read and write
|
||
2190F360000
|
heap
|
page read and write
|
||
1A8597F3000
|
trusted library allocation
|
page read and write
|
||
20D1A632000
|
trusted library allocation
|
page read and write
|
||
1A859DA1000
|
trusted library allocation
|
page read and write
|
||
1A85AB34000
|
trusted library allocation
|
page read and write
|
||
1A857E82000
|
trusted library allocation
|
page read and write
|
||
1A8589EE000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
F81000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A8587AD000
|
trusted library allocation
|
page read and write
|
||
1A8612E5000
|
trusted library allocation
|
page read and write
|
||
1A8572BB000
|
trusted library allocation
|
page read and write
|
||
1A858E83000
|
trusted library allocation
|
page read and write
|
||
B5147D8000
|
stack
|
page read and write
|
||
1A8612DF000
|
trusted library allocation
|
page read and write
|
||
20D1A403000
|
trusted library allocation
|
page read and write
|
||
1A858663000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A858DC0000
|
trusted library allocation
|
page read and write
|
||
2190F37F000
|
heap
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A858DC0000
|
trusted library allocation
|
page read and write
|
||
1A8625DA000
|
trusted library allocation
|
page read and write
|
||
B5157FE000
|
stack
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
20D1A0D0000
|
unclassified section
|
page readonly
|
||
1A8585F5000
|
trusted library allocation
|
page read and write
|
||
1A85F9FC000
|
trusted library allocation
|
page read and write
|
||
1A85F3DC000
|
trusted library allocation
|
page read and write
|
||
1A85F372000
|
trusted library allocation
|
page read and write
|
||
1A85723B000
|
trusted library allocation
|
page read and write
|
||
1A859754000
|
trusted library allocation
|
page read and write
|
||
1A858E65000
|
trusted library allocation
|
page read and write
|
||
1A8599FB000
|
trusted library allocation
|
page read and write
|
||
1A85F9A9000
|
trusted library allocation
|
page read and write
|
||
1A8624EA000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A858757000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A859B6C000
|
trusted library allocation
|
page read and write
|
||
2190F1B6000
|
unkown
|
page execute read
|
||
F8C000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A862B2C000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E2EE000
|
heap
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A858DF2000
|
trusted library allocation
|
page read and write
|
||
1A862871000
|
trusted library allocation
|
page read and write
|
||
1A8587B0000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A861337000
|
trusted library allocation
|
page read and write
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A85448E000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E266000
|
heap
|
page read and write
|
||
1A854539000
|
trusted library allocation
|
page read and write
|
||
1A85F750000
|
trusted library allocation
|
page read and write
|
||
1A85F3C4000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A857EB1000
|
trusted library allocation
|
page read and write
|
||
1A85A9FE000
|
trusted library allocation
|
page read and write
|
||
2190F3E3000
|
heap
|
page read and write
|
||
2190F3EB000
|
heap
|
page read and write
|
||
1A862432000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
2359C7BB000
|
remote allocation
|
page execute read
|
||
1A858587000
|
trusted library allocation
|
page read and write
|
||
1A8581A7000
|
trusted library allocation
|
page read and write
|
||
2190E89F000
|
trusted library allocation
|
page read and write
|
||
1A862879000
|
trusted library allocation
|
page read and write
|
||
2190E810000
|
trusted library allocation
|
page read and write
|
||
1A85A88F000
|
trusted library allocation
|
page read and write
|
||
1A85F740000
|
trusted library allocation
|
page read and write
|
||
2190F444000
|
heap
|
page read and write
|
||
1A8545F3000
|
trusted library allocation
|
page read and write
|
||
F7C000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A857DA0000
|
trusted library allocation
|
page read and write
|
||
1A86136F000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A857FF1000
|
trusted library allocation
|
page read and write
|
||
1A857287000
|
trusted library allocation
|
page read and write
|
||
1A858548000
|
trusted library allocation
|
page read and write
|
||
90513D8000
|
stack
|
page read and write
|
||
1A8549BF000
|
trusted library allocation
|
page read and write
|
||
1A859935000
|
trusted library allocation
|
page read and write
|
||
1A858A02000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A8589D6000
|
trusted library allocation
|
page read and write
|
||
1A85872B000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A858775000
|
trusted library allocation
|
page read and write
|
||
1A854D8E000
|
trusted library allocation
|
page read and write
|
||
1A862602000
|
trusted library allocation
|
page read and write
|
||
1A8628F6000
|
trusted library allocation
|
page read and write
|
||
2190E5E0000
|
heap
|
page read and write
|
||
2190E819000
|
trusted library allocation
|
page read and write
|
||
1A858ADA000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A86124A000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A854496000
|
trusted library allocation
|
page read and write
|
||
1A8588B1000
|
trusted library allocation
|
page read and write
|
||
1A8599CD000
|
trusted library allocation
|
page read and write
|
||
1A854CAE000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A85F7F7000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85ABE1000
|
trusted library allocation
|
page read and write
|
||
1A85A838000
|
trusted library allocation
|
page read and write
|
||
1A84E305000
|
heap
|
page read and write
|
||
1A85F547000
|
trusted library allocation
|
page read and write
|
||
1A857FFC000
|
trusted library allocation
|
page read and write
|
||
1A85F6E4000
|
trusted library allocation
|
page read and write
|
||
1A862C6B000
|
heap
|
page read and write
|
||
2190E762000
|
unclassified section
|
page read and write
|
||
1A858B3B000
|
trusted library allocation
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A85AB64000
|
trusted library allocation
|
page read and write
|
||
1A85ADD8000
|
trusted library allocation
|
page read and write
|
||
1A857EB6000
|
trusted library allocation
|
page read and write
|
||
20D1A4A7000
|
trusted library allocation
|
page read and write
|
||
20D1A0C0000
|
unclassified section
|
page readonly
|
||
1A85876B000
|
trusted library allocation
|
page read and write
|
||
1A8612B2000
|
trusted library allocation
|
page read and write
|
||
1A858A4E000
|
trusted library allocation
|
page read and write
|
||
1A861282000
|
trusted library allocation
|
page read and write
|
||
1A858563000
|
trusted library allocation
|
page read and write
|
||
1A859B9B000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A857827000
|
trusted library allocation
|
page read and write
|
||
1A858AE8000
|
trusted library allocation
|
page read and write
|
||
1A85717C000
|
trusted library allocation
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
35887BF03000
|
trusted library allocation
|
page read and write
|
||
1A857E75000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85F589000
|
trusted library allocation
|
page read and write
|
||
1A8572BB000
|
trusted library allocation
|
page read and write
|
||
1A84E2F3000
|
heap
|
page read and write
|
||
1A84E2EE000
|
heap
|
page read and write
|
||
1A8587B5000
|
trusted library allocation
|
page read and write
|
||
1A8544E8000
|
trusted library allocation
|
page read and write
|
||
2190F46C000
|
heap
|
page read and write
|
||
1A85895A000
|
trusted library allocation
|
page read and write
|
||
1A8589C0000
|
trusted library allocation
|
page read and write
|
||
1A8572C7000
|
trusted library allocation
|
page read and write
|
||
1A859D8A000
|
trusted library allocation
|
page read and write
|
||
1A858AE8000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A85992F000
|
trusted library allocation
|
page read and write
|
||
1A859DD3000
|
trusted library allocation
|
page read and write
|
||
1A857178000
|
trusted library allocation
|
page read and write
|
||
43C000
|
unkown
|
page readonly
|
||
1A8549D9000
|
trusted library allocation
|
page read and write
|
||
20D1A461000
|
trusted library allocation
|
page read and write
|
||
1A85F72E000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A859D20000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85F3FB000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
1A86240F000
|
trusted library allocation
|
page read and write
|
||
1A857EA8000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A857E93000
|
trusted library allocation
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A85F68A000
|
trusted library allocation
|
page read and write
|
||
1A85F7DD000
|
trusted library allocation
|
page read and write
|
||
1A857E73000
|
trusted library allocation
|
page read and write
|
||
7C2818C000
|
stack
|
page read and write
|
||
3DE19FA000
|
stack
|
page read and write
|
||
1A85F56E000
|
trusted library allocation
|
page read and write
|
||
1A858B4F000
|
trusted library allocation
|
page read and write
|
||
1A8575E6000
|
trusted library allocation
|
page read and write
|
||
1A85F6F2000
|
trusted library allocation
|
page read and write
|
||
1A858E7F000
|
trusted library allocation
|
page read and write
|
||
1A85AE9D000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A85F3C6000
|
trusted library allocation
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A85818B000
|
trusted library allocation
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A858168000
|
trusted library allocation
|
page read and write
|
||
1A854981000
|
trusted library allocation
|
page read and write
|
||
B513CFD000
|
stack
|
page read and write
|
||
1A8549AB000
|
trusted library allocation
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
20D1A4A5000
|
trusted library allocation
|
page read and write
|
||
1A85F3F8000
|
trusted library allocation
|
page read and write
|
||
1A857D56000
|
trusted library allocation
|
page read and write
|
||
1A858B15000
|
trusted library allocation
|
page read and write
|
||
2190E8BA000
|
trusted library allocation
|
page read and write
|
||
1A85A88B000
|
trusted library allocation
|
page read and write
|
||
1A859BD4000
|
trusted library allocation
|
page read and write
|
||
21590700000
|
heap
|
page read and write
|
||
1A862579000
|
trusted library allocation
|
page read and write
|
||
2359CCC4000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A854627000
|
trusted library allocation
|
page read and write
|
||
1A8581A3000
|
trusted library allocation
|
page read and write
|
||
1A85A821000
|
trusted library allocation
|
page read and write
|
||
1A862867000
|
trusted library allocation
|
page read and write
|
||
1A859C13000
|
trusted library allocation
|
page read and write
|
||
2190E5C0000
|
heap
|
page read and write
|
||
1A8533FB000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
1A858941000
|
trusted library allocation
|
page read and write
|
||
2359CC69000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
2190F3E3000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A860EB1000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A857579000
|
trusted library allocation
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A854D8A000
|
trusted library allocation
|
page read and write
|
||
1A858B22000
|
trusted library allocation
|
page read and write
|
||
1A85ABC2000
|
trusted library allocation
|
page read and write
|
||
1A852CEF000
|
trusted library allocation
|
page read and write
|
||
20D1A45B000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E289000
|
heap
|
page read and write
|
||
1A8575F0000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A8589C8000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A8585A0000
|
trusted library allocation
|
page read and write
|
||
1A84E27C000
|
heap
|
page read and write
|
||
1A85F281000
|
trusted library allocation
|
page read and write
|
||
1A85A984000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A857EEF000
|
trusted library allocation
|
page read and write
|
||
1A8572D8000
|
trusted library allocation
|
page read and write
|
||
1A861388000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A8589D3000
|
trusted library allocation
|
page read and write
|
||
20D1A4C8000
|
trusted library allocation
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A8575F4000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A859B93000
|
trusted library allocation
|
page read and write
|
||
1A858587000
|
trusted library allocation
|
page read and write
|
||
1A8533D2000
|
trusted library allocation
|
page read and write
|
||
1A84E2E0000
|
heap
|
page read and write
|
||
20D1A700000
|
heap
|
page read and write
|
||
1A84E2A5000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
43C000
|
unkown
|
page readonly
|
||
1A858768000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A856E60000
|
trusted library allocation
|
page read and write
|
||
1A857F28000
|
trusted library allocation
|
page read and write
|
||
1A857EBE000
|
trusted library allocation
|
page read and write
|
||
1A858BB0000
|
trusted library allocation
|
page read and write
|
||
1A8581EB000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A858ADA000
|
trusted library allocation
|
page read and write
|
||
1A854224000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E282000
|
heap
|
page read and write
|
||
1A84E2A3000
|
heap
|
page read and write
|
||
1A862D53000
|
heap
|
page read and write
|
||
1A8578B5000
|
trusted library allocation
|
page read and write
|
||
1A85F645000
|
trusted library allocation
|
page read and write
|
||
1A862C4D000
|
heap
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A853375000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A862434000
|
trusted library allocation
|
page read and write
|
||
1A857287000
|
trusted library allocation
|
page read and write
|
||
7C2ACFE000
|
stack
|
page read and write
|
||
1A86139D000
|
trusted library allocation
|
page read and write
|
||
1A858EBB000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A854963000
|
trusted library allocation
|
page read and write
|
||
1A85AACE000
|
trusted library allocation
|
page read and write
|
||
1A862581000
|
trusted library allocation
|
page read and write
|
||
1A85F63E000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A84E2E6000
|
heap
|
page read and write
|
||
1A84E2E2000
|
heap
|
page read and write
|
||
1A8575B9000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A859DF1000
|
trusted library allocation
|
page read and write
|
||
1A858BFB000
|
trusted library allocation
|
page read and write
|
||
1A85F4D6000
|
trusted library allocation
|
page read and write
|
||
1A85F71F000
|
trusted library allocation
|
page read and write
|
||
1A859BFE000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
2190F1D0000
|
trusted library allocation
|
page read and write
|
||
F78000
|
heap
|
page read and write
|
||
1A85F6B3000
|
trusted library allocation
|
page read and write
|
||
2190F46C000
|
heap
|
page read and write
|
||
1A85F485000
|
trusted library allocation
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
2190F36C000
|
heap
|
page read and write
|
||
2359CCA2000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A858A3F000
|
trusted library allocation
|
page read and write
|
||
1A858A55000
|
trusted library allocation
|
page read and write
|
||
1A859DB3000
|
trusted library allocation
|
page read and write
|
||
1A84E2E9000
|
heap
|
page read and write
|
||
20D1A173000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A859BFB000
|
trusted library allocation
|
page read and write
|
||
1A86121A000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
46C000
|
unkown
|
page read and write
|
||
1A858967000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A859D39000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85A831000
|
trusted library allocation
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A8578FC000
|
trusted library allocation
|
page read and write
|
||
1A84E2D4000
|
heap
|
page read and write
|
||
1A859B8F000
|
trusted library allocation
|
page read and write
|
||
1A858A4E000
|
trusted library allocation
|
page read and write
|
||
1A857F2A000
|
trusted library allocation
|
page read and write
|
||
1A8587AC000
|
trusted library allocation
|
page read and write
|
||
1A85ABCA000
|
trusted library allocation
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A858E2F000
|
trusted library allocation
|
page read and write
|
||
1A85F4DA000
|
trusted library allocation
|
page read and write
|
||
1A8575EB000
|
trusted library allocation
|
page read and write
|
||
1A854CAC000
|
heap
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A857FD0000
|
trusted library allocation
|
page read and write
|
||
1A862C36000
|
heap
|
page read and write
|
||
1A858551000
|
trusted library allocation
|
page read and write
|
||
1A8587D0000
|
trusted library allocation
|
page read and write
|
||
1A858560000
|
trusted library allocation
|
page read and write
|
||
1A85AB69000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A85F620000
|
trusted library allocation
|
page read and write
|
||
1A858567000
|
trusted library allocation
|
page read and write
|
||
1A85AD1A000
|
trusted library allocation
|
page read and write
|
||
1A84E2B7000
|
heap
|
page read and write
|
||
1A85875B000
|
trusted library allocation
|
page read and write
|
||
1A857E81000
|
trusted library allocation
|
page read and write
|
||
1A857190000
|
trusted library allocation
|
page read and write
|
||
2190F479000
|
heap
|
page read and write
|
||
1A858169000
|
trusted library allocation
|
page read and write
|
||
1A862C01000
|
heap
|
page read and write
|
||
1A8572B8000
|
trusted library allocation
|
page read and write
|
||
1A85A9D5000
|
trusted library allocation
|
page read and write
|
||
7C2A4FE000
|
unkown
|
page readonly
|
||
1A85F6E6000
|
trusted library allocation
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A857AB7000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A859B6C000
|
trusted library allocation
|
page read and write
|
||
1A858539000
|
trusted library allocation
|
page read and write
|
||
1A85F54D000
|
trusted library allocation
|
page read and write
|
||
1A8589BD000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85449F000
|
trusted library allocation
|
page read and write
|
||
1A85F2A8000
|
trusted library allocation
|
page read and write
|
||
1A85F587000
|
trusted library allocation
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A857DAB000
|
trusted library allocation
|
page read and write
|
||
1A84E2EE000
|
heap
|
page read and write
|
||
1A859B4D000
|
trusted library allocation
|
page read and write
|
||
1A854561000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A85813E000
|
trusted library allocation
|
page read and write
|
||
1A857F90000
|
trusted library allocation
|
page read and write
|
||
1A8544E8000
|
trusted library allocation
|
page read and write
|
||
1A85F9FC000
|
trusted library allocation
|
page read and write
|
||
1A85712F000
|
trusted library allocation
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
2190F35C000
|
heap
|
page read and write
|
||
1A859AFB000
|
trusted library allocation
|
page read and write
|
||
1A858D8B000
|
trusted library allocation
|
page read and write
|
||
1A85454D000
|
trusted library allocation
|
page read and write
|
||
F88000
|
heap
|
page read and write
|
||
1A8586C5000
|
trusted library allocation
|
page read and write
|
||
1A85337D000
|
trusted library allocation
|
page read and write
|
||
1A85F74E000
|
trusted library allocation
|
page read and write
|
||
1A86127A000
|
trusted library allocation
|
page read and write
|
||
2190F458000
|
heap
|
page read and write
|
||
1A85788B000
|
trusted library allocation
|
page read and write
|
||
1A857E7D000
|
trusted library allocation
|
page read and write
|
||
1A859BE3000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A859BFE000
|
trusted library allocation
|
page read and write
|
||
1A85F6D2000
|
trusted library allocation
|
page read and write
|
||
1A856EE0000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A859BFB000
|
trusted library allocation
|
page read and write
|
||
1A858B2D000
|
trusted library allocation
|
page read and write
|
||
1A85FCA6000
|
trusted library allocation
|
page read and write
|
||
1A84E2A5000
|
heap
|
page read and write
|
||
1A857873000
|
trusted library allocation
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A858DAB000
|
trusted library allocation
|
page read and write
|
||
1A860E89000
|
trusted library allocation
|
page read and write
|
||
1A85F4DC000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E2B7000
|
heap
|
page read and write
|
||
1A84E2BE000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A8571F3000
|
trusted library allocation
|
page read and write
|
||
1A8629C3000
|
trusted library allocation
|
page read and write
|
||
190CFD00000
|
trusted library allocation
|
page read and write
|
||
1A85F6D2000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A85813B000
|
trusted library allocation
|
page read and write
|
||
1A857EAD000
|
trusted library allocation
|
page read and write
|
||
1A85F610000
|
trusted library allocation
|
page read and write
|
||
1A8589E4000
|
trusted library allocation
|
page read and write
|
||
1A853313000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
2159072A000
|
heap
|
page read and write
|
||
1A85A9AC000
|
trusted library allocation
|
page read and write
|
||
1A857FEA000
|
trusted library allocation
|
page read and write
|
||
1A85710E000
|
trusted library allocation
|
page read and write
|
||
1A85F63E000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A8588C8000
|
trusted library allocation
|
page read and write
|
||
1A8613AE000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A8544D6000
|
trusted library allocation
|
page read and write
|
||
1A85F570000
|
trusted library allocation
|
page read and write
|
||
1A858761000
|
trusted library allocation
|
page read and write
|
||
2190F3EB000
|
heap
|
page read and write
|
||
1A857A68000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A85F9A9000
|
trusted library allocation
|
page read and write
|
||
1A85F669000
|
trusted library allocation
|
page read and write
|
||
3591000
|
heap
|
page read and write
|
||
1A84E293000
|
heap
|
page read and write
|
||
1A8586F9000
|
trusted library allocation
|
page read and write
|
||
1A857A6D000
|
trusted library allocation
|
page read and write
|
||
1A857E9E000
|
trusted library allocation
|
page read and write
|
||
2190F444000
|
heap
|
page read and write
|
||
1A84E2D1000
|
heap
|
page read and write
|
||
1A84E289000
|
heap
|
page read and write
|
||
1A859B8F000
|
trusted library allocation
|
page read and write
|
||
1A860E5C000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A85ABAF000
|
trusted library allocation
|
page read and write
|
||
F82000
|
heap
|
page read and write
|
||
1A858B75000
|
trusted library allocation
|
page read and write
|
||
1A84E2EE000
|
heap
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
1A857EA1000
|
trusted library allocation
|
page read and write
|
||
1A857EB1000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8589E4000
|
trusted library allocation
|
page read and write
|
||
1A85F7D0000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A85F2A8000
|
trusted library allocation
|
page read and write
|
||
1A857E9B000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A85854C000
|
trusted library allocation
|
page read and write
|
||
2190F3FD000
|
heap
|
page read and write
|
||
1A85F9EA000
|
trusted library allocation
|
page read and write
|
||
1A857FD8000
|
trusted library allocation
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85A980000
|
trusted library allocation
|
page read and write
|
||
1A85723D000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A857F90000
|
trusted library allocation
|
page read and write
|
||
1A85A9B2000
|
trusted library allocation
|
page read and write
|
||
2190F444000
|
heap
|
page read and write
|
||
1A8544E4000
|
trusted library allocation
|
page read and write
|
||
1A856E4C000
|
trusted library allocation
|
page read and write
|
||
9052BFE000
|
unkown
|
page readonly
|
||
1A858515000
|
trusted library allocation
|
page read and write
|
||
1A85AEF0000
|
trusted library allocation
|
page read and write
|
||
1A858ED5000
|
trusted library allocation
|
page read and write
|
||
1A857151000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
1A8578EC000
|
trusted library allocation
|
page read and write
|
||
1A858775000
|
trusted library allocation
|
page read and write
|
||
1A857EEF000
|
trusted library allocation
|
page read and write
|
||
1A85A932000
|
trusted library allocation
|
page read and write
|
||
1A8628F8000
|
trusted library allocation
|
page read and write
|
||
1A85F4D8000
|
trusted library allocation
|
page read and write
|
||
1A84E283000
|
heap
|
page read and write
|
||
1A85AD2D000
|
trusted library allocation
|
page read and write
|
||
1A85A9AF000
|
trusted library allocation
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E2E6000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
2359CC03000
|
trusted library allocation
|
page read and write
|
||
2190F477000
|
heap
|
page read and write
|
||
1A85F2D8000
|
trusted library allocation
|
page read and write
|
||
1A85AE1A000
|
trusted library allocation
|
page read and write
|
||
2190E490000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8589E2000
|
trusted library allocation
|
page read and write
|
||
1A858DC7000
|
trusted library allocation
|
page read and write
|
||
1A85AE2D000
|
trusted library allocation
|
page read and write
|
||
2190F3A1000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
2190F3F1000
|
heap
|
page read and write
|
||
2359CB00000
|
unclassified section
|
page readonly
|
||
1A856E60000
|
trusted library allocation
|
page read and write
|
||
20D1A150000
|
unclassified section
|
page readonly
|
||
1A85984C000
|
trusted library allocation
|
page read and write
|
||
1A857FDA000
|
trusted library allocation
|
page read and write
|
||
1A85F4FE000
|
trusted library allocation
|
page read and write
|
||
1A85F563000
|
trusted library allocation
|
page read and write
|
||
1A8589E4000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A8578B5000
|
trusted library allocation
|
page read and write
|
||
1A85F985000
|
trusted library allocation
|
page read and write
|
||
1A859873000
|
trusted library allocation
|
page read and write
|
||
1A858759000
|
trusted library allocation
|
page read and write
|
||
1A84E27B000
|
heap
|
page read and write
|
||
1A84E2EF000
|
heap
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A858695000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
heap
|
page read and write
|
||
1A85F61E000
|
trusted library allocation
|
page read and write
|
||
1A85F654000
|
trusted library allocation
|
page read and write
|
||
1A859B9B000
|
trusted library allocation
|
page read and write
|
||
1A857EAD000
|
trusted library allocation
|
page read and write
|
||
1A857D8C000
|
trusted library allocation
|
page read and write
|
||
1A861258000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A858D80000
|
trusted library allocation
|
page read and write
|
||
1A85498F000
|
trusted library allocation
|
page read and write
|
||
1A8619D9000
|
trusted library allocation
|
page read and write
|
||
1A854638000
|
trusted library allocation
|
page read and write
|
||
1A85F5B6000
|
trusted library allocation
|
page read and write
|
||
1A862429000
|
trusted library allocation
|
page read and write
|
||
1A8613E4000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A854481000
|
trusted library allocation
|
page read and write
|
||
1A84E291000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
190CFC00000
|
heap
|
page read and write
|
||
1A85F72A000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A859AFB000
|
trusted library allocation
|
page read and write
|
||
1A85A7F4000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A862562000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A858FF1000
|
trusted library allocation
|
page read and write
|
||
1A85AEF0000
|
trusted library allocation
|
page read and write
|
||
1A8585AD000
|
trusted library allocation
|
page read and write
|
||
20D1A550000
|
heap
|
page read and write
|
||
1A85AB5C000
|
trusted library allocation
|
page read and write
|
||
1A85F4E0000
|
trusted library allocation
|
page read and write
|
||
1A85F716000
|
trusted library allocation
|
page read and write
|
||
1A8619EE000
|
trusted library allocation
|
page read and write
|
||
1A85F633000
|
trusted library allocation
|
page read and write
|
||
1A854281000
|
trusted library allocation
|
page read and write
|
||
1A8589D0000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A84E29D000
|
heap
|
page read and write
|
||
1A85F5B6000
|
trusted library allocation
|
page read and write
|
||
1A8599F4000
|
trusted library allocation
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A85F48D000
|
trusted library allocation
|
page read and write
|
||
1A854564000
|
trusted library allocation
|
page read and write
|
||
1A858879000
|
trusted library allocation
|
page read and write
|
||
1A85F3D4000
|
trusted library allocation
|
page read and write
|
||
1A8587CC000
|
trusted library allocation
|
page read and write
|
||
1A857258000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A858E65000
|
trusted library allocation
|
page read and write
|
||
1A85F2F7000
|
trusted library allocation
|
page read and write
|
||
1A862556000
|
trusted library allocation
|
page read and write
|
||
1A8544EF000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A84E283000
|
heap
|
page read and write
|
||
190CFF00000
|
trusted library allocation
|
page read and write
|
||
1A858F68000
|
trusted library allocation
|
page read and write
|
||
1A85F9DF000
|
trusted library allocation
|
page read and write
|
||
1A85F3ED000
|
trusted library allocation
|
page read and write
|
||
1A858781000
|
trusted library allocation
|
page read and write
|
||
1A858A4E000
|
trusted library allocation
|
page read and write
|
||
2190F458000
|
heap
|
page read and write
|
||
2159073D000
|
heap
|
page read and write
|
||
1A857D80000
|
trusted library allocation
|
page read and write
|
||
1A858569000
|
trusted library allocation
|
page read and write
|
||
1A859B97000
|
trusted library allocation
|
page read and write
|
||
2359CC13000
|
trusted library allocation
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
2159238B000
|
heap
|
page read and write
|
||
1A8589E4000
|
trusted library allocation
|
page read and write
|
||
1A857E5E000
|
trusted library allocation
|
page read and write
|
||
1A84E275000
|
heap
|
page read and write
|
||
3DE31FE000
|
stack
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A859A33000
|
trusted library allocation
|
page read and write
|
||
1A857E9E000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A858B27000
|
trusted library allocation
|
page read and write
|
||
1A859B47000
|
trusted library allocation
|
page read and write
|
||
1A84E2B6000
|
heap
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
20D1A472000
|
trusted library allocation
|
page read and write
|
||
1A862CA2000
|
heap
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A862C45000
|
heap
|
page read and write
|
||
1A8625C7000
|
trusted library allocation
|
page read and write
|
||
1A85AEC1000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A858DED000
|
trusted library allocation
|
page read and write
|
||
21590860000
|
heap
|
page read and write
|
||
1A85A989000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A8629A6000
|
trusted library allocation
|
page read and write
|
||
1A8575D0000
|
trusted library allocation
|
page read and write
|
||
1A8544AA000
|
trusted library allocation
|
page read and write
|
||
1A8587ED000
|
trusted library allocation
|
page read and write
|
||
1A84E291000
|
heap
|
page read and write
|
||
1A858D6D000
|
trusted library allocation
|
page read and write
|
||
1A858599000
|
trusted library allocation
|
page read and write
|
||
20D1A61E000
|
trusted library allocation
|
page read and write
|
||
1A859AC5000
|
trusted library allocation
|
page read and write
|
||
1A84E2E7000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A84E2DD000
|
heap
|
page read and write
|
||
1A858D95000
|
trusted library allocation
|
page read and write
|
||
1A859748000
|
trusted library allocation
|
page read and write
|
||
1A8629C3000
|
trusted library allocation
|
page read and write
|
||
7C2A478000
|
stack
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85871D000
|
trusted library allocation
|
page read and write
|
||
1A8589B0000
|
trusted library allocation
|
page read and write
|
||
1A84E2AD000
|
heap
|
page read and write
|
||
21592397000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8612AA000
|
trusted library allocation
|
page read and write
|
||
1A8590D0000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
2190F3E6000
|
heap
|
page read and write
|
||
1A8589C8000
|
trusted library allocation
|
page read and write
|
||
1A8613B5000
|
trusted library allocation
|
page read and write
|
||
1A85F7D0000
|
trusted library allocation
|
page read and write
|
||
1A85F369000
|
trusted library allocation
|
page read and write
|
||
1A858DC7000
|
trusted library allocation
|
page read and write
|
||
1A8545A2000
|
trusted library allocation
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
20D1A496000
|
trusted library allocation
|
page read and write
|
||
1A8575F0000
|
trusted library allocation
|
page read and write
|
||
1A85F612000
|
trusted library allocation
|
page read and write
|
||
1A85A9AC000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A85AE31000
|
trusted library allocation
|
page read and write
|
||
1A862800000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A856E33000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A8590A5000
|
trusted library allocation
|
page read and write
|
||
1A85818B000
|
trusted library allocation
|
page read and write
|
||
1A85A9EA000
|
trusted library allocation
|
page read and write
|
||
1A852C98000
|
trusted library allocation
|
page read and write
|
||
1A85F563000
|
trusted library allocation
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A85876C000
|
trusted library allocation
|
page read and write
|
||
1A85ABB8000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
3591000
|
heap
|
page read and write
|
||
2359CC78000
|
trusted library allocation
|
page read and write
|
||
20D1A42E000
|
trusted library allocation
|
page read and write
|
||
1A858E78000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A857841000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A86295E000
|
trusted library allocation
|
page read and write
|
||
1A857EB9000
|
trusted library allocation
|
page read and write
|
||
20D1A620000
|
trusted library allocation
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A85866F000
|
trusted library allocation
|
page read and write
|
||
1A858FF1000
|
trusted library allocation
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A85F620000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A85F589000
|
trusted library allocation
|
page read and write
|
||
1A85F997000
|
trusted library allocation
|
page read and write
|
||
1A854497000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A8576FB000
|
trusted library allocation
|
page read and write
|
||
1A85AE67000
|
trusted library allocation
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A8628F4000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A85F724000
|
trusted library allocation
|
page read and write
|
||
1A858742000
|
trusted library allocation
|
page read and write
|
||
1A858569000
|
trusted library allocation
|
page read and write
|
||
1A858883000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A85F7D0000
|
trusted library allocation
|
page read and write
|
||
1A8572FC000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A862589000
|
trusted library allocation
|
page read and write
|
||
1A84E293000
|
heap
|
page read and write
|
||
1A85AB39000
|
trusted library allocation
|
page read and write
|
||
1A85F587000
|
trusted library allocation
|
page read and write
|
||
1A858925000
|
trusted library allocation
|
page read and write
|
||
1A85A967000
|
trusted library allocation
|
page read and write
|
||
1A8572FC000
|
trusted library allocation
|
page read and write
|
||
1A8549D9000
|
trusted library allocation
|
page read and write
|
||
1A86134F000
|
trusted library allocation
|
page read and write
|
||
1A8575E5000
|
trusted library allocation
|
page read and write
|
||
1A857E79000
|
trusted library allocation
|
page read and write
|
||
1A858A71000
|
trusted library allocation
|
page read and write
|
||
1A854CD1000
|
heap
|
page read and write
|
||
1A857E30000
|
trusted library allocation
|
page read and write
|
||
1A85F7FB000
|
trusted library allocation
|
page read and write
|
||
1A854D5A000
|
trusted library allocation
|
page read and write
|
||
1A858EEE000
|
trusted library allocation
|
page read and write
|
||
1A85AEFB000
|
trusted library allocation
|
page read and write
|
||
1A84E291000
|
heap
|
page read and write
|
||
1A8542E9000
|
trusted library allocation
|
page read and write
|
||
1A84E2DD000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8581A7000
|
trusted library allocation
|
page read and write
|
||
1A862413000
|
trusted library allocation
|
page read and write
|
||
1A8549CD000
|
trusted library allocation
|
page read and write
|
||
1A858DFC000
|
trusted library allocation
|
page read and write
|
||
1A858152000
|
trusted library allocation
|
page read and write
|
||
1A858153000
|
trusted library allocation
|
page read and write
|
||
1A8585DF000
|
trusted library allocation
|
page read and write
|
||
1A862885000
|
trusted library allocation
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A8625E5000
|
trusted library allocation
|
page read and write
|
||
1A858A7D000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
2190F301000
|
heap
|
page read and write
|
||
1A85F4A2000
|
trusted library allocation
|
page read and write
|
||
1A859B43000
|
trusted library allocation
|
page read and write
|
||
1A858536000
|
trusted library allocation
|
page read and write
|
||
1A85F27F000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A8619DC000
|
trusted library allocation
|
page read and write
|
||
1A859AF8000
|
trusted library allocation
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A862400000
|
trusted library allocation
|
page read and write
|
||
20D1A170000
|
heap
|
page read and write
|
||
1A8625DE000
|
trusted library allocation
|
page read and write
|
||
1A85F2D4000
|
trusted library allocation
|
page read and write
|
||
1A854549000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
2359C730000
|
unclassified section
|
page readonly
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A858AFD000
|
trusted library allocation
|
page read and write
|
||
1A85A840000
|
trusted library allocation
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A858D8B000
|
trusted library allocation
|
page read and write
|
||
1A8589E2000
|
trusted library allocation
|
page read and write
|
||
1A858718000
|
trusted library allocation
|
page read and write
|
||
20D1A4CA000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A86292D000
|
trusted library allocation
|
page read and write
|
||
1A85A858000
|
trusted library allocation
|
page read and write
|
||
1A858759000
|
trusted library allocation
|
page read and write
|
||
1A8628C3000
|
trusted library allocation
|
page read and write
|
||
1A85F329000
|
trusted library allocation
|
page read and write
|
||
1A85F369000
|
trusted library allocation
|
page read and write
|
||
1A85AB39000
|
trusted library allocation
|
page read and write
|
||
1A859959000
|
trusted library allocation
|
page read and write
|
||
20D1A180000
|
heap
|
page read and write
|
||
1A85F54D000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A8597F3000
|
trusted library allocation
|
page read and write
|
||
2190E8F3000
|
trusted library allocation
|
page read and write
|
||
1A8581AC000
|
trusted library allocation
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A84E2B0000
|
heap
|
page read and write
|
||
1A862C01000
|
heap
|
page read and write
|
||
1A85A9B5000
|
trusted library allocation
|
page read and write
|
||
1A85F607000
|
trusted library allocation
|
page read and write
|
||
1A8589DF000
|
trusted library allocation
|
page read and write
|
||
1A857EBE000
|
trusted library allocation
|
page read and write
|
||
1A85ABFA000
|
trusted library allocation
|
page read and write
|
||
1A84E2AA000
|
heap
|
page read and write
|
||
1A84E2E8000
|
heap
|
page read and write
|
||
1A8585C3000
|
trusted library allocation
|
page read and write
|
||
1A8576F2000
|
trusted library allocation
|
page read and write
|
||
1A858A59000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A857A4D000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A859DB3000
|
trusted library allocation
|
page read and write
|
||
1A859DF1000
|
trusted library allocation
|
page read and write
|
||
2190E746000
|
heap
|
page read and write
|
||
1A859BC3000
|
trusted library allocation
|
page read and write
|
||
1A8585FB000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A854D8D000
|
trusted library allocation
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A858874000
|
trusted library allocation
|
page read and write
|
||
1A862C09000
|
heap
|
page read and write
|
||
1A858173000
|
trusted library allocation
|
page read and write
|
||
1A8542F1000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
1A859B8F000
|
trusted library allocation
|
page read and write
|
||
1A8625B8000
|
trusted library allocation
|
page read and write
|
||
1A858157000
|
trusted library allocation
|
page read and write
|
||
2190E86A000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A8585A7000
|
trusted library allocation
|
page read and write
|
||
1A8575F3000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
299CFFC000
|
stack
|
page read and write
|
||
1A85A8F2000
|
trusted library allocation
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
1A859D14000
|
trusted library allocation
|
page read and write
|
||
2359C990000
|
heap
|
page readonly
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A858E0B000
|
trusted library allocation
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A856E4C000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A858B65000
|
trusted library allocation
|
page read and write
|
||
1A8571CA000
|
trusted library allocation
|
page read and write
|
||
1A84E2E9000
|
heap
|
page read and write
|
||
1A858DEA000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
2190F206000
|
trusted library allocation
|
page read and write
|
||
1A8575B3000
|
trusted library allocation
|
page read and write
|
||
1A858E71000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A857253000
|
trusted library allocation
|
page read and write
|
||
1A85A989000
|
trusted library allocation
|
page read and write
|
||
1A84E289000
|
heap
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A85F4DA000
|
trusted library allocation
|
page read and write
|
||
2359CC67000
|
trusted library allocation
|
page read and write
|
||
1A84E2E9000
|
heap
|
page read and write
|
||
1A859A00000
|
trusted library allocation
|
page read and write
|
||
1A85ADD2000
|
trusted library allocation
|
page read and write
|
||
1A86296A000
|
trusted library allocation
|
page read and write
|
||
1A84E2E7000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A854257000
|
trusted library allocation
|
page read and write
|
||
1A859BFE000
|
trusted library allocation
|
page read and write
|
||
1A85F9B2000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E275000
|
heap
|
page read and write
|
||
2359CC49000
|
trusted library allocation
|
page read and write
|
||
1A8571B3000
|
trusted library allocation
|
page read and write
|
||
1A858157000
|
trusted library allocation
|
page read and write
|
||
1A85858F000
|
trusted library allocation
|
page read and write
|
||
1A85728E000
|
trusted library allocation
|
page read and write
|
||
2190F3E6000
|
heap
|
page read and write
|
||
1A858E65000
|
trusted library allocation
|
page read and write
|
||
1A85AD75000
|
trusted library allocation
|
page read and write
|
||
1A858775000
|
trusted library allocation
|
page read and write
|
||
1A85ADFB000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A858B40000
|
trusted library allocation
|
page read and write
|
||
1A859BFE000
|
trusted library allocation
|
page read and write
|
||
1A85F74E000
|
trusted library allocation
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A85AE73000
|
trusted library allocation
|
page read and write
|
||
1A858894000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A8544EF000
|
trusted library allocation
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A858DE6000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A859DD3000
|
trusted library allocation
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A858ED5000
|
trusted library allocation
|
page read and write
|
||
1A8581A9000
|
trusted library allocation
|
page read and write
|
||
1A858179000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A859AFB000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A8587CC000
|
trusted library allocation
|
page read and write
|
||
1A857833000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A858E13000
|
trusted library allocation
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A858E71000
|
trusted library allocation
|
page read and write
|
||
20D1A613000
|
trusted library allocation
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
1A857D2B000
|
trusted library allocation
|
page read and write
|
||
1A862D53000
|
heap
|
page read and write
|
||
1A85FC9E000
|
trusted library allocation
|
page read and write
|
||
1A858B4F000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85F372000
|
trusted library allocation
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
2190E8C2000
|
trusted library allocation
|
page read and write
|
||
1A859D78000
|
trusted library allocation
|
page read and write
|
||
1A858E2B000
|
trusted library allocation
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A858147000
|
trusted library allocation
|
page read and write
|
||
1A8585AA000
|
trusted library allocation
|
page read and write
|
||
1A85717C000
|
trusted library allocation
|
page read and write
|
||
1A85498C000
|
trusted library allocation
|
page read and write
|
||
1A858757000
|
trusted library allocation
|
page read and write
|
||
1A858759000
|
trusted library allocation
|
page read and write
|
||
1A862B92000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A859043000
|
trusted library allocation
|
page read and write
|
||
1A86292F000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A85AB19000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
2190F3E8000
|
heap
|
page read and write
|
||
1A859B4B000
|
trusted library allocation
|
page read and write
|
||
2190E400000
|
unclassified section
|
page readonly
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A858AFD000
|
trusted library allocation
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A8581AD000
|
trusted library allocation
|
page read and write
|
||
1A84E29E000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A85AE5D000
|
trusted library allocation
|
page read and write
|
||
1A85A8D3000
|
trusted library allocation
|
page read and write
|
||
1A857A51000
|
trusted library allocation
|
page read and write
|
||
1A857D32000
|
trusted library allocation
|
page read and write
|
||
1A859D7E000
|
trusted library allocation
|
page read and write
|
||
1A8545EB000
|
trusted library allocation
|
page read and write
|
||
1A862B2E000
|
trusted library allocation
|
page read and write
|
||
1A8572C9000
|
trusted library allocation
|
page read and write
|
||
1A85874C000
|
trusted library allocation
|
page read and write
|
||
1A859883000
|
trusted library allocation
|
page read and write
|
||
2359C940000
|
heap
|
page read and write
|
||
1A85F7EE000
|
trusted library allocation
|
page read and write
|
||
1A859023000
|
trusted library allocation
|
page read and write
|
||
1A85498C000
|
trusted library allocation
|
page read and write
|
||
1A862B94000
|
trusted library allocation
|
page read and write
|
||
1A857839000
|
trusted library allocation
|
page read and write
|
||
1A857249000
|
trusted library allocation
|
page read and write
|
||
1A85F926000
|
trusted library allocation
|
page read and write
|
||
1A859BF4000
|
trusted library allocation
|
page read and write
|
||
1A85F6C2000
|
trusted library allocation
|
page read and write
|
||
1A85A970000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A852CB3000
|
trusted library allocation
|
page read and write
|
||
1A85872E000
|
trusted library allocation
|
page read and write
|
||
1A8574C3000
|
trusted library allocation
|
page read and write
|
||
1A8575F0000
|
trusted library allocation
|
page read and write
|
||
7C2C5FE000
|
unkown
|
page readonly
|
||
1A85A941000
|
trusted library allocation
|
page read and write
|
||
1A857138000
|
trusted library allocation
|
page read and write
|
||
1A8572B3000
|
trusted library allocation
|
page read and write
|
||
1A856EBC000
|
trusted library allocation
|
page read and write
|
||
1A857F5C000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
20D1A447000
|
trusted library allocation
|
page read and write
|
||
1A85F28F000
|
trusted library allocation
|
page read and write
|
||
1A854D65000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A8542D3000
|
trusted library allocation
|
page read and write
|
||
1A8613A4000
|
trusted library allocation
|
page read and write
|
||
1A858990000
|
trusted library allocation
|
page read and write
|
||
1A857D6D000
|
trusted library allocation
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A85A9AF000
|
trusted library allocation
|
page read and write
|
||
1A85992B000
|
trusted library allocation
|
page read and write
|
||
1A85ADF5000
|
trusted library allocation
|
page read and write
|
||
1A857184000
|
trusted library allocation
|
page read and write
|
||
2190E865000
|
trusted library allocation
|
page read and write
|
||
2190F37D000
|
heap
|
page read and write
|
||
1A85F645000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A86127A000
|
trusted library allocation
|
page read and write
|
||
1A85AEFB000
|
trusted library allocation
|
page read and write
|
||
20D1A639000
|
trusted library allocation
|
page read and write
|
||
1A84E283000
|
heap
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A85A97A000
|
trusted library allocation
|
page read and write
|
||
2190E8C7000
|
trusted library allocation
|
page read and write
|
||
2190F39C000
|
heap
|
page read and write
|
||
1A8597FC000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A857F9D000
|
trusted library allocation
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A8587A9000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1A8575D5000
|
trusted library allocation
|
page read and write
|
||
1A857EAD000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A8612FB000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A85F56C000
|
trusted library allocation
|
page read and write
|
||
1A857E87000
|
trusted library allocation
|
page read and write
|
||
1A857F9D000
|
trusted library allocation
|
page read and write
|
||
1A858DBC000
|
trusted library allocation
|
page read and write
|
||
1A85ADFB000
|
trusted library allocation
|
page read and write
|
||
1A858D8A000
|
trusted library allocation
|
page read and write
|
||
1A859995000
|
trusted library allocation
|
page read and write
|
||
1A8572C4000
|
trusted library allocation
|
page read and write
|
||
1A853223000
|
trusted library allocation
|
page read and write
|
||
1A85F997000
|
trusted library allocation
|
page read and write
|
||
1A85F6AC000
|
trusted library allocation
|
page read and write
|
||
1A859848000
|
trusted library allocation
|
page read and write
|
||
2190F35F000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A854943000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
7C2B57E000
|
unkown
|
page readonly
|
||
1A85AD1A000
|
trusted library allocation
|
page read and write
|
||
1A85AE3F000
|
trusted library allocation
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A85F54A000
|
trusted library allocation
|
page read and write
|
||
1A859A53000
|
trusted library allocation
|
page read and write
|
||
1A857A49000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
2190F458000
|
heap
|
page read and write
|
||
1A859B3E000
|
trusted library allocation
|
page read and write
|
||
1A8542F9000
|
trusted library allocation
|
page read and write
|
||
1A857A6F000
|
trusted library allocation
|
page read and write
|
||
1A85F745000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
2190F36C000
|
heap
|
page read and write
|
||
1A84E2EE000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8575E3000
|
trusted library allocation
|
page read and write
|
||
1A85F367000
|
trusted library allocation
|
page read and write
|
||
1A8588A6000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
2190F3B9000
|
heap
|
page read and write
|
||
1A85AB32000
|
trusted library allocation
|
page read and write
|
||
1A858DE6000
|
trusted library allocation
|
page read and write
|
||
474000
|
unkown
|
page readonly
|
||
1A84E279000
|
heap
|
page read and write
|
||
2190F360000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A858692000
|
trusted library allocation
|
page read and write
|
||
1A857F5E000
|
trusted library allocation
|
page read and write
|
||
7C29BFE000
|
stack
|
page read and write
|
||
1A859BFE000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A858775000
|
trusted library allocation
|
page read and write
|
||
1A857EB1000
|
trusted library allocation
|
page read and write
|
||
1A858D44000
|
trusted library allocation
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
1A8598D5000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A858176000
|
trusted library allocation
|
page read and write
|
||
1A84E269000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
2190E881000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85AE58000
|
trusted library allocation
|
page read and write
|
||
1A8572BE000
|
trusted library allocation
|
page read and write
|
||
1A85F6FA000
|
trusted library allocation
|
page read and write
|
||
1A862B9C000
|
trusted library allocation
|
page read and write
|
||
1A857E7D000
|
trusted library allocation
|
page read and write
|
||
1A85F2B1000
|
trusted library allocation
|
page read and write
|
||
1A85F6FC000
|
trusted library allocation
|
page read and write
|
||
1A85FC14000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A8549F8000
|
trusted library allocation
|
page read and write
|
||
1A859DC7000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A85893E000
|
trusted library allocation
|
page read and write
|
||
1A858E9C000
|
trusted library allocation
|
page read and write
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
1A857EA8000
|
trusted library allocation
|
page read and write
|
||
1A84E2F3000
|
heap
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A857DAB000
|
trusted library allocation
|
page read and write
|
||
20D1A467000
|
trusted library allocation
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A8631AD000
|
trusted library allocation
|
page read and write
|
||
1A85F9D6000
|
trusted library allocation
|
page read and write
|
||
1A8613D6000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A859BF4000
|
trusted library allocation
|
page read and write
|
||
1A8590A5000
|
trusted library allocation
|
page read and write
|
||
1A8613B9000
|
trusted library allocation
|
page read and write
|
||
1A8581C3000
|
trusted library allocation
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A858D88000
|
trusted library allocation
|
page read and write
|
||
1A85F98D000
|
trusted library allocation
|
page read and write
|
||
1A85817B000
|
trusted library allocation
|
page read and write
|
||
1A857E0D000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A859AE5000
|
trusted library allocation
|
page read and write
|
||
1A859B93000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A8581D8000
|
trusted library allocation
|
page read and write
|
||
7C2B53E000
|
stack
|
page read and write
|
||
1A8585C0000
|
trusted library allocation
|
page read and write
|
||
1A862B30000
|
trusted library allocation
|
page read and write
|
||
1A857EFA000
|
trusted library allocation
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A859B6C000
|
trusted library allocation
|
page read and write
|
||
1A85A9D5000
|
trusted library allocation
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A85F3FB000
|
trusted library allocation
|
page read and write
|
||
1A858AFD000
|
trusted library allocation
|
page read and write
|
||
1A85F375000
|
trusted library allocation
|
page read and write
|
||
1A858742000
|
trusted library allocation
|
page read and write
|
||
1A85498C000
|
trusted library allocation
|
page read and write
|
||
1A8587B5000
|
trusted library allocation
|
page read and write
|
||
470000
|
unkown
|
page write copy
|
||
1A85858F000
|
trusted library allocation
|
page read and write
|
||
1A859B68000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A857F97000
|
trusted library allocation
|
page read and write
|
||
2190E803000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
2159239F000
|
heap
|
page read and write
|
||
1A857F2F000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A85498F000
|
trusted library allocation
|
page read and write
|
||
1A857E2C000
|
trusted library allocation
|
page read and write
|
||
2359CC82000
|
trusted library allocation
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
F6F000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
1A85F7E3000
|
trusted library allocation
|
page read and write
|
||
1A857178000
|
trusted library allocation
|
page read and write
|
||
1A85F913000
|
trusted library allocation
|
page read and write
|
||
1A85449C000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A85F2D0000
|
trusted library allocation
|
page read and write
|
||
1A858DA8000
|
trusted library allocation
|
page read and write
|
||
1A8628C3000
|
trusted library allocation
|
page read and write
|
||
1A85A97E000
|
trusted library allocation
|
page read and write
|
||
1A85875B000
|
trusted library allocation
|
page read and write
|
||
1A85750F000
|
trusted library allocation
|
page read and write
|
||
2190ED80000
|
heap
|
page read and write
|
||
1A858B85000
|
trusted library allocation
|
page read and write
|
||
1A857184000
|
trusted library allocation
|
page read and write
|
||
1A853400000
|
trusted library allocation
|
page read and write
|
||
1A84E27D000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A858DE3000
|
trusted library allocation
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A858DD6000
|
trusted library allocation
|
page read and write
|
||
1A858757000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A85A980000
|
trusted library allocation
|
page read and write
|
||
1A862D92000
|
heap
|
page read and write
|
||
B516FFE000
|
unkown
|
page readonly
|
||
1A858AA6000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
2190E4BA000
|
heap
|
page read and write
|
||
1A858759000
|
trusted library allocation
|
page read and write
|
||
1A84E26E000
|
heap
|
page read and write
|
||
1A85718A000
|
trusted library allocation
|
page read and write
|
||
1A85ABC2000
|
trusted library allocation
|
page read and write
|
||
1A85F640000
|
trusted library allocation
|
page read and write
|
||
1A857AEB000
|
trusted library allocation
|
page read and write
|
||
1A8545DD000
|
trusted library allocation
|
page read and write
|
||
1A859063000
|
trusted library allocation
|
page read and write
|
||
1A85F9D6000
|
trusted library allocation
|
page read and write
|
||
1A859DAF000
|
trusted library allocation
|
page read and write
|
||
1A85AE7C000
|
trusted library allocation
|
page read and write
|
||
2190E740000
|
heap
|
page read and write
|
||
1A85AE1F000
|
trusted library allocation
|
page read and write
|
||
2359CC5F000
|
trusted library allocation
|
page read and write
|
||
1A85A80F000
|
trusted library allocation
|
page read and write
|
||
1A8544FA000
|
trusted library allocation
|
page read and write
|
||
1A85F4DE000
|
trusted library allocation
|
page read and write
|
||
1A85ADF1000
|
trusted library allocation
|
page read and write
|
||
1A85AD36000
|
trusted library allocation
|
page read and write
|
||
1A858AF3000
|
trusted library allocation
|
page read and write
|
||
20D1A45D000
|
trusted library allocation
|
page read and write
|
||
1A84E28F000
|
heap
|
page read and write
|
||
1A858B55000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A85F9EA000
|
trusted library allocation
|
page read and write
|
||
1A858E5D000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8585C3000
|
trusted library allocation
|
page read and write
|
||
1A8585BA000
|
trusted library allocation
|
page read and write
|
||
2159239E000
|
heap
|
page read and write
|
||
1A85A808000
|
trusted library allocation
|
page read and write
|
||
1A858933000
|
trusted library allocation
|
page read and write
|
||
1A85F6AF000
|
trusted library allocation
|
page read and write
|
||
1A85AE84000
|
trusted library allocation
|
page read and write
|
||
1A857F8D000
|
trusted library allocation
|
page read and write
|
||
2359CF0C000
|
trusted library allocation
|
page read and write
|
||
1A862C01000
|
heap
|
page read and write
|
||
1A857DD5000
|
trusted library allocation
|
page read and write
|
||
1A858141000
|
trusted library allocation
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A86292F000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A859D45000
|
trusted library allocation
|
page read and write
|
||
1A858757000
|
trusted library allocation
|
page read and write
|
||
1A859DEA000
|
trusted library allocation
|
page read and write
|
||
1A857EFA000
|
trusted library allocation
|
page read and write
|
||
1A85F965000
|
trusted library allocation
|
page read and write
|
||
1A85817B000
|
trusted library allocation
|
page read and write
|
||
1A85F7DD000
|
trusted library allocation
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A858161000
|
trusted library allocation
|
page read and write
|
||
1A857DB3000
|
trusted library allocation
|
page read and write
|
||
1A858A6C000
|
trusted library allocation
|
page read and write
|
||
1A854D65000
|
trusted library allocation
|
page read and write
|
||
1A857EB1000
|
trusted library allocation
|
page read and write
|
||
2359C9A0000
|
unclassified section
|
page read and write
|
||
1A860F24000
|
trusted library allocation
|
page read and write
|
||
1A857252000
|
trusted library allocation
|
page read and write
|
||
1A85AEED000
|
trusted library allocation
|
page read and write
|
||
1A85987C000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E2F3000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A857F22000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A84E27F000
|
heap
|
page read and write
|
||
1A85ADF5000
|
trusted library allocation
|
page read and write
|
||
2190E468000
|
remote allocation
|
page execute read
|
||
1A85F664000
|
trusted library allocation
|
page read and write
|
||
1A8599EE000
|
trusted library allocation
|
page read and write
|
||
1A8588E2000
|
trusted library allocation
|
page read and write
|
||
1A85443B000
|
trusted library allocation
|
page read and write
|
||
1A858EFE000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A856EDC000
|
trusted library allocation
|
page read and write
|
||
1A858736000
|
trusted library allocation
|
page read and write
|
||
1A853326000
|
trusted library allocation
|
page read and write
|
||
1A859B65000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A85F589000
|
trusted library allocation
|
page read and write
|
||
1A8625FE000
|
trusted library allocation
|
page read and write
|
||
1A8612B2000
|
trusted library allocation
|
page read and write
|
||
1A85AB48000
|
trusted library allocation
|
page read and write
|
||
1A8625EE000
|
trusted library allocation
|
page read and write
|
||
1A858173000
|
trusted library allocation
|
page read and write
|
||
1A85728E000
|
trusted library allocation
|
page read and write
|
||
1A85AE73000
|
trusted library allocation
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A85F2B5000
|
trusted library allocation
|
page read and write
|
||
1A85A97E000
|
trusted library allocation
|
page read and write
|
||
1A857E87000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A857EB1000
|
trusted library allocation
|
page read and write
|
||
1A857FEA000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85A967000
|
trusted library allocation
|
page read and write
|
||
2190E76F000
|
unclassified section
|
page read and write
|
||
1A84E2E9000
|
heap
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8589AB000
|
trusted library allocation
|
page read and write
|
||
20D1A2D6000
|
heap
|
page read and write
|
||
1A858ADA000
|
trusted library allocation
|
page read and write
|
||
1A84E282000
|
heap
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
1A854960000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A85F587000
|
trusted library allocation
|
page read and write
|
||
1A8597A5000
|
trusted library allocation
|
page read and write
|
||
1A8589D0000
|
trusted library allocation
|
page read and write
|
||
2190F42C000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A858A22000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
2190E7F0000
|
trusted library allocation
|
page read and write
|
||
1A863158000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8613C1000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85F587000
|
trusted library allocation
|
page read and write
|
||
1A8612E5000
|
trusted library allocation
|
page read and write
|
||
1A858528000
|
trusted library allocation
|
page read and write
|
||
1A854956000
|
trusted library allocation
|
page read and write
|
||
2190F3E8000
|
heap
|
page read and write
|
||
1A84E2B2000
|
heap
|
page read and write
|
||
1A854C75000
|
heap
|
page read and write
|
||
1A85AA13000
|
trusted library allocation
|
page read and write
|
||
1A85426F000
|
trusted library allocation
|
page read and write
|
||
1A861314000
|
trusted library allocation
|
page read and write
|
||
1A85853C000
|
trusted library allocation
|
page read and write
|
||
1A84E286000
|
heap
|
page read and write
|
||
1A85F55F000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A857DD5000
|
trusted library allocation
|
page read and write
|
||
1A857EA4000
|
trusted library allocation
|
page read and write
|
||
1A859754000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
1A85AE78000
|
trusted library allocation
|
page read and write
|
||
1A8544F8000
|
trusted library allocation
|
page read and write
|
||
1A857284000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A85F7FB000
|
trusted library allocation
|
page read and write
|
||
1A85F2BB000
|
trusted library allocation
|
page read and write
|
||
1A84E291000
|
heap
|
page read and write
|
||
1A857171000
|
trusted library allocation
|
page read and write
|
||
2190E780000
|
trusted library section
|
page readonly
|
||
1A858DDE000
|
trusted library allocation
|
page read and write
|
||
1A86292D000
|
trusted library allocation
|
page read and write
|
||
2190F35C000
|
heap
|
page read and write
|
||
1A857E4F000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85727A000
|
trusted library allocation
|
page read and write
|
||
1A8589F0000
|
trusted library allocation
|
page read and write
|
||
2190ED60000
|
heap
|
page read and write
|
||
1A85894B000
|
trusted library allocation
|
page read and write
|
||
1A857EA8000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
2190F3E9000
|
heap
|
page read and write
|
||
1A85A943000
|
trusted library allocation
|
page read and write
|
||
1A861304000
|
trusted library allocation
|
page read and write
|
||
1A854CA2000
|
heap
|
page read and write
|
||
1A856E61000
|
trusted library allocation
|
page read and write
|
||
1A854D3F000
|
trusted library allocation
|
page read and write
|
||
1A862C36000
|
heap
|
page read and write
|
||
1A85F7EE000
|
trusted library allocation
|
page read and write
|
||
1A858872000
|
trusted library allocation
|
page read and write
|
||
1A84E284000
|
heap
|
page read and write
|
||
1A857EC6000
|
trusted library allocation
|
page read and write
|
||
1A8590A3000
|
trusted library allocation
|
page read and write
|
||
1A8549BF000
|
trusted library allocation
|
page read and write
|
||
1A8628F6000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A860EFC000
|
trusted library allocation
|
page read and write
|
||
1A84E2E0000
|
heap
|
page read and write
|
||
1A862C71000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A854540000
|
trusted library allocation
|
page read and write
|
||
1A85AE9D000
|
trusted library allocation
|
page read and write
|
||
1A854CC3000
|
heap
|
page read and write
|
||
2190E886000
|
trusted library allocation
|
page read and write
|
||
1A8575BE000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A857EB9000
|
trusted library allocation
|
page read and write
|
||
1A862B34000
|
trusted library allocation
|
page read and write
|
||
20D1A481000
|
trusted library allocation
|
page read and write
|
||
1A85FC4A000
|
trusted library allocation
|
page read and write
|
||
1A85F6E1000
|
trusted library allocation
|
page read and write
|
||
1A85AB48000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
2359CCF6000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
2190E8C5000
|
trusted library allocation
|
page read and write
|
||
1A862540000
|
trusted library allocation
|
page read and write
|
||
1A85818B000
|
trusted library allocation
|
page read and write
|
||
1A8581AC000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A8549A8000
|
trusted library allocation
|
page read and write
|
||
1A858998000
|
trusted library allocation
|
page read and write
|
||
1A859D49000
|
trusted library allocation
|
page read and write
|
||
1A856EB2000
|
trusted library allocation
|
page read and write
|
||
1A84E282000
|
heap
|
page read and write
|
||
1A85F2C2000
|
trusted library allocation
|
page read and write
|
||
1A860E85000
|
trusted library allocation
|
page read and write
|
||
1A861348000
|
trusted library allocation
|
page read and write
|
||
1A84E2E1000
|
heap
|
page read and write
|
||
F9F000
|
heap
|
page read and write
|
||
2359CE03000
|
trusted library allocation
|
page read and write
|
||
1A858141000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A85FC4A000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A85F6E6000
|
trusted library allocation
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85F31F000
|
trusted library allocation
|
page read and write
|
||
1A854951000
|
trusted library allocation
|
page read and write
|
||
1A85783B000
|
trusted library allocation
|
page read and write
|
||
1A858A6C000
|
trusted library allocation
|
page read and write
|
||
1A85A89A000
|
trusted library allocation
|
page read and write
|
||
1A857AFE000
|
trusted library allocation
|
page read and write
|
||
1A862B9A000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A85F7EE000
|
trusted library allocation
|
page read and write
|
||
1A857EC6000
|
trusted library allocation
|
page read and write
|
||
1A85F664000
|
trusted library allocation
|
page read and write
|
||
1A858998000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
1A854CA2000
|
heap
|
page read and write
|
||
1A852CAA000
|
trusted library allocation
|
page read and write
|
||
1A858DF2000
|
trusted library allocation
|
page read and write
|
||
1A854622000
|
trusted library allocation
|
page read and write
|
||
1A856E72000
|
trusted library allocation
|
page read and write
|
||
1A857EA8000
|
trusted library allocation
|
page read and write
|
||
1A84E28F000
|
heap
|
page read and write
|
||
1A859B51000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8587A2000
|
trusted library allocation
|
page read and write
|
||
1A84E27C000
|
heap
|
page read and write
|
||
1A85AB45000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A8629C3000
|
trusted library allocation
|
page read and write
|
||
1A85AE37000
|
trusted library allocation
|
page read and write
|
||
1A85AE7E000
|
trusted library allocation
|
page read and write
|
||
1A858DB0000
|
trusted library allocation
|
page read and write
|
||
2190E812000
|
trusted library allocation
|
page read and write
|
||
1A857EC6000
|
trusted library allocation
|
page read and write
|
||
2359C943000
|
heap
|
page read and write
|
||
1A857D93000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85F372000
|
trusted library allocation
|
page read and write
|
||
1A85F4FE000
|
trusted library allocation
|
page read and write
|
||
1A857F30000
|
trusted library allocation
|
page read and write
|
||
1A858A3F000
|
trusted library allocation
|
page read and write
|
||
1A8625E2000
|
trusted library allocation
|
page read and write
|
||
1A85F626000
|
trusted library allocation
|
page read and write
|
||
1A857EC3000
|
trusted library allocation
|
page read and write
|
||
1A854CA0000
|
heap
|
page read and write
|
||
1A858165000
|
trusted library allocation
|
page read and write
|
||
1A858D7F000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A858969000
|
trusted library allocation
|
page read and write
|
||
1A86241C000
|
trusted library allocation
|
page read and write
|
||
1A85886A000
|
trusted library allocation
|
page read and write
|
||
1A854CA2000
|
heap
|
page read and write
|
||
1A859B65000
|
trusted library allocation
|
page read and write
|
||
1A8628C3000
|
trusted library allocation
|
page read and write
|
||
1A85875B000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A857D34000
|
trusted library allocation
|
page read and write
|
||
1A858B0B000
|
trusted library allocation
|
page read and write
|
||
1A854956000
|
trusted library allocation
|
page read and write
|
||
1A86292F000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A85F727000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A85AE7C000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A8578F2000
|
trusted library allocation
|
page read and write
|
||
20D1A148000
|
remote allocation
|
page execute read
|
||
1A857FEA000
|
trusted library allocation
|
page read and write
|
||
1A858EBB000
|
trusted library allocation
|
page read and write
|
||
1A85853C000
|
trusted library allocation
|
page read and write
|
||
1A858145000
|
trusted library allocation
|
page read and write
|
||
1A8588E2000
|
trusted library allocation
|
page read and write
|
||
1A858DED000
|
trusted library allocation
|
page read and write
|
||
21590751000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A854D04000
|
trusted library allocation
|
page read and write
|
||
1A85F66F000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A85A84A000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A859BF2000
|
trusted library allocation
|
page read and write
|
||
1A86254E000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E27C000
|
heap
|
page read and write
|
||
1A8589A8000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A85F7F7000
|
trusted library allocation
|
page read and write
|
||
1A857FF1000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
stack
|
page read and write
|
||
1A857FA3000
|
trusted library allocation
|
page read and write
|
||
1A85F2D0000
|
trusted library allocation
|
page read and write
|
||
1A858E5B000
|
trusted library allocation
|
page read and write
|
||
1A857ADD000
|
trusted library allocation
|
page read and write
|
||
1A857D6D000
|
trusted library allocation
|
page read and write
|
||
1A858DF2000
|
trusted library allocation
|
page read and write
|
||
2359CE00000
|
trusted library allocation
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A854D1F000
|
trusted library allocation
|
page read and write
|
||
1A859DAF000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A85AEF0000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A8628E2000
|
trusted library allocation
|
page read and write
|
||
1A858EEE000
|
trusted library allocation
|
page read and write
|
||
1A857FE9000
|
trusted library allocation
|
page read and write
|
||
1A862496000
|
trusted library allocation
|
page read and write
|
||
1A8549C5000
|
trusted library allocation
|
page read and write
|
||
1A84E2DD000
|
heap
|
page read and write
|
||
1A84E2A5000
|
heap
|
page read and write
|
||
1A85322F000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A858761000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A857000000
|
trusted library allocation
|
page read and write
|
||
1A858169000
|
trusted library allocation
|
page read and write
|
||
1A8572FC000
|
trusted library allocation
|
page read and write
|
||
1A8587D0000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A858645000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A862565000
|
trusted library allocation
|
page read and write
|
||
1A8612EE000
|
trusted library allocation
|
page read and write
|
||
1A852C9E000
|
trusted library allocation
|
page read and write
|
||
1A8625B8000
|
trusted library allocation
|
page read and write
|
||
F8A000
|
heap
|
page read and write
|
||
21590A07000
|
trusted library allocation
|
page read and write
|
||
1A857DB3000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A858B65000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A85F671000
|
trusted library allocation
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85817B000
|
trusted library allocation
|
page read and write
|
||
1A857EFE000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
2190F3EB000
|
heap
|
page read and write
|
||
1A8598E4000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
3A1000
|
unkown
|
page execute read
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A858BC8000
|
trusted library allocation
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
21590A0A000
|
trusted library allocation
|
page read and write
|
||
2359CBB0000
|
heap
|
page read and write
|
||
1A85F7F7000
|
trusted library allocation
|
page read and write
|
||
1A8572BE000
|
trusted library allocation
|
page read and write
|
||
1A857EC6000
|
trusted library allocation
|
page read and write
|
||
1A862D53000
|
heap
|
page read and write
|
||
1A854CCF000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A858518000
|
trusted library allocation
|
page read and write
|
||
2190F38A000
|
heap
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A857EB1000
|
trusted library allocation
|
page read and write
|
||
1A84E28F000
|
heap
|
page read and write
|
||
2190F42B000
|
heap
|
page read and write
|
||
1A8575F5000
|
trusted library allocation
|
page read and write
|
||
1A85F9BD000
|
trusted library allocation
|
page read and write
|
||
21590720000
|
heap
|
page read and write
|
||
1A858165000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A8589E4000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A85FCEC000
|
trusted library allocation
|
page read and write
|
||
1A8575CF000
|
trusted library allocation
|
page read and write
|
||
1A85AD2D000
|
trusted library allocation
|
page read and write
|
||
1A858DB4000
|
trusted library allocation
|
page read and write
|
||
1A85452C000
|
trusted library allocation
|
page read and write
|
||
1A8590E6000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A861997000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A861304000
|
trusted library allocation
|
page read and write
|
||
1A857FF9000
|
trusted library allocation
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A857FE3000
|
trusted library allocation
|
page read and write
|
||
1A854CA2000
|
heap
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A85818B000
|
trusted library allocation
|
page read and write
|
||
1A8544E4000
|
trusted library allocation
|
page read and write
|
||
1A858EE9000
|
trusted library allocation
|
page read and write
|
||
1A858148000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
2359CA00000
|
trusted library allocation
|
page read and write
|
||
1A84E29E000
|
heap
|
page read and write
|
||
1A858E2B000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A859DC4000
|
trusted library allocation
|
page read and write
|
||
1A858DF6000
|
trusted library allocation
|
page read and write
|
||
1A857EC3000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85A972000
|
trusted library allocation
|
page read and write
|
||
2359CC24000
|
trusted library allocation
|
page read and write
|
||
1A85AEFB000
|
trusted library allocation
|
page read and write
|
||
1A857EAB000
|
trusted library allocation
|
page read and write
|
||
1A8575EB000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
2190E80A000
|
trusted library allocation
|
page read and write
|
||
1A857F2B000
|
trusted library allocation
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
2359C920000
|
heap
|
page read and write
|
||
1A85AB50000
|
trusted library allocation
|
page read and write
|
||
2190F477000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85AD27000
|
trusted library allocation
|
page read and write
|
||
1A8578F9000
|
trusted library allocation
|
page read and write
|
||
1A85AE58000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A85A9D8000
|
trusted library allocation
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A8545F6000
|
trusted library allocation
|
page read and write
|
||
1A8585F5000
|
trusted library allocation
|
page read and write
|
||
1A84E2AA000
|
heap
|
page read and write
|
||
1A854D61000
|
trusted library allocation
|
page read and write
|
||
1A858766000
|
trusted library allocation
|
page read and write
|
||
2190F429000
|
heap
|
page read and write
|
||
1A8575EB000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A858DFC000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A84E289000
|
heap
|
page read and write
|
||
1A857E73000
|
trusted library allocation
|
page read and write
|
||
1A858D82000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
90523FE000
|
stack
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A854248000
|
trusted library allocation
|
page read and write
|
||
1A84E283000
|
heap
|
page read and write
|
||
1A859AF8000
|
trusted library allocation
|
page read and write
|
||
1A854D68000
|
trusted library allocation
|
page read and write
|
||
1A862562000
|
trusted library allocation
|
page read and write
|
||
1A862C26000
|
heap
|
page read and write
|
||
1A8613E4000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
2190F38A000
|
heap
|
page read and write
|
||
46C000
|
unkown
|
page write copy
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A858B36000
|
trusted library allocation
|
page read and write
|
||
1A859AF6000
|
trusted library allocation
|
page read and write
|
||
1A858724000
|
trusted library allocation
|
page read and write
|
||
20D1A412000
|
trusted library allocation
|
page read and write
|
||
1A85F2CA000
|
trusted library allocation
|
page read and write
|
||
1A85F6A0000
|
trusted library allocation
|
page read and write
|
||
1A856E7A000
|
trusted library allocation
|
page read and write
|
||
1A8628F6000
|
trusted library allocation
|
page read and write
|
||
1A85AD75000
|
trusted library allocation
|
page read and write
|
||
2190F38D000
|
heap
|
page read and write
|
||
1A85453D000
|
trusted library allocation
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A858942000
|
trusted library allocation
|
page read and write
|
||
1A85AEC9000
|
trusted library allocation
|
page read and write
|
||
1A854D4B000
|
trusted library allocation
|
page read and write
|
||
1A8597AD000
|
trusted library allocation
|
page read and write
|
||
1A858ED1000
|
trusted library allocation
|
page read and write
|
||
1A8599FB000
|
trusted library allocation
|
page read and write
|
||
1A85AEF0000
|
trusted library allocation
|
page read and write
|
||
1A8587D7000
|
trusted library allocation
|
page read and write
|
||
1A85815A000
|
trusted library allocation
|
page read and write
|
||
1A857EC6000
|
trusted library allocation
|
page read and write
|
||
1A857FFA000
|
trusted library allocation
|
page read and write
|
||
1A8628B8000
|
trusted library allocation
|
page read and write
|
||
1A857E9E000
|
trusted library allocation
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A857ACD000
|
trusted library allocation
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A8533F0000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A862C13000
|
heap
|
page read and write
|
||
1A8575E7000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
B513CBE000
|
unkown
|
page readonly
|
||
1A858A42000
|
trusted library allocation
|
page read and write
|
||
1A85F66C000
|
trusted library allocation
|
page read and write
|
||
1A8599DB000
|
trusted library allocation
|
page read and write
|
||
1A85F589000
|
trusted library allocation
|
page read and write
|
||
1A85F4DC000
|
trusted library allocation
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A853271000
|
trusted library allocation
|
page read and write
|
||
1A85F93A000
|
trusted library allocation
|
page read and write
|
||
1A8574F4000
|
trusted library allocation
|
page read and write
|
||
1A85ABFC000
|
trusted library allocation
|
page read and write
|
||
1A8545F3000
|
trusted library allocation
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
1A85F6FC000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A85AE77000
|
trusted library allocation
|
page read and write
|
||
1A85A96C000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A858992000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A85724C000
|
trusted library allocation
|
page read and write
|
||
2190F46C000
|
heap
|
page read and write
|
||
2190F3F1000
|
heap
|
page read and write
|
||
1A85875B000
|
trusted library allocation
|
page read and write
|
||
1A8589E2000
|
trusted library allocation
|
page read and write
|
||
1A85F6A2000
|
trusted library allocation
|
page read and write
|
||
1A857E79000
|
trusted library allocation
|
page read and write
|
||
1A857F94000
|
trusted library allocation
|
page read and write
|
||
F7B000
|
heap
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A858B3D000
|
trusted library allocation
|
page read and write
|
||
1A85F626000
|
trusted library allocation
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
1A8589B8000
|
trusted library allocation
|
page read and write
|
||
1A84E305000
|
heap
|
page read and write
|
||
1A8589E2000
|
trusted library allocation
|
page read and write
|
||
1A858DC9000
|
trusted library allocation
|
page read and write
|
||
1A85ABE1000
|
trusted library allocation
|
page read and write
|
||
2190F429000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A8597FC000
|
trusted library allocation
|
page read and write
|
||
1A8575FB000
|
trusted library allocation
|
page read and write
|
||
1A84E284000
|
heap
|
page read and write
|
||
20D1A60C000
|
trusted library allocation
|
page read and write
|
||
1A857297000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A85A7CD000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A85F643000
|
trusted library allocation
|
page read and write
|
||
1A857AEE000
|
trusted library allocation
|
page read and write
|
||
2190E85C000
|
trusted library allocation
|
page read and write
|
||
1A861314000
|
trusted library allocation
|
page read and write
|
||
1A85F640000
|
trusted library allocation
|
page read and write
|
||
1A857DCC000
|
trusted library allocation
|
page read and write
|
||
1A84E2B0000
|
heap
|
page read and write
|
||
1A85728E000
|
trusted library allocation
|
page read and write
|
||
1A859BF0000
|
trusted library allocation
|
page read and write
|
||
1A862574000
|
trusted library allocation
|
page read and write
|
||
2190F360000
|
heap
|
page read and write
|
||
1A85863B000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A859B8B000
|
trusted library allocation
|
page read and write
|
||
1A857E4F000
|
trusted library allocation
|
page read and write
|
||
1A857EEF000
|
trusted library allocation
|
page read and write
|
||
1A85A9CD000
|
trusted library allocation
|
page read and write
|
||
2159239C000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
2159238A000
|
heap
|
page read and write
|
||
1A8549A8000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A8575D2000
|
trusted library allocation
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A8542DE000
|
trusted library allocation
|
page read and write
|
||
1A85F33A000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
2359C7E0000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A862DB1000
|
heap
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A8545EB000
|
trusted library allocation
|
page read and write
|
||
1A858A71000
|
trusted library allocation
|
page read and write
|
||
1A8575E3000
|
trusted library allocation
|
page read and write
|
||
B513D3E000
|
unkown
|
page readonly
|
||
1A857E2F000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A85718A000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8581ED000
|
trusted library allocation
|
page read and write
|
||
1A85455F000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A858113000
|
trusted library allocation
|
page read and write
|
||
1A85A7FE000
|
trusted library allocation
|
page read and write
|
||
2359CC76000
|
trusted library allocation
|
page read and write
|
||
1A8587A9000
|
trusted library allocation
|
page read and write
|
||
1A85F64A000
|
trusted library allocation
|
page read and write
|
||
1A857FE8000
|
trusted library allocation
|
page read and write
|
||
1A858766000
|
trusted library allocation
|
page read and write
|
||
1A854D55000
|
trusted library allocation
|
page read and write
|
||
1A858D57000
|
trusted library allocation
|
page read and write
|
||
1A8624AF000
|
trusted library allocation
|
page read and write
|
||
1A85ABD5000
|
trusted library allocation
|
page read and write
|
||
1A85F748000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A8589D3000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A8545F6000
|
trusted library allocation
|
page read and write
|
||
1A858FF1000
|
trusted library allocation
|
page read and write
|
||
1A85853C000
|
trusted library allocation
|
page read and write
|
||
1A85A7CD000
|
trusted library allocation
|
page read and write
|
||
1A8581AC000
|
trusted library allocation
|
page read and write
|
||
1A858DAB000
|
trusted library allocation
|
page read and write
|
||
1A858EE4000
|
trusted library allocation
|
page read and write
|
||
1A85817B000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A85FA00000
|
trusted library allocation
|
page read and write
|
||
1A858775000
|
trusted library allocation
|
page read and write
|
||
1A8589D3000
|
trusted library allocation
|
page read and write
|
||
1A858AA6000
|
trusted library allocation
|
page read and write
|
||
1A8613F8000
|
trusted library allocation
|
page read and write
|
||
1A84E2E9000
|
heap
|
page read and write
|
||
1A8589E8000
|
trusted library allocation
|
page read and write
|
||
1A857835000
|
trusted library allocation
|
page read and write
|
||
1A857E5E000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E28F000
|
heap
|
page read and write
|
||
1A85FC7C000
|
trusted library allocation
|
page read and write
|
||
1A856E96000
|
trusted library allocation
|
page read and write
|
||
1A85FC7C000
|
trusted library allocation
|
page read and write
|
||
1A859933000
|
trusted library allocation
|
page read and write
|
||
1A84E275000
|
heap
|
page read and write
|
||
1A8587D7000
|
trusted library allocation
|
page read and write
|
||
1A84E284000
|
heap
|
page read and write
|
||
1A8588D9000
|
trusted library allocation
|
page read and write
|
||
1A8619E6000
|
trusted library allocation
|
page read and write
|
||
1A85A8D7000
|
trusted library allocation
|
page read and write
|
||
1A862C01000
|
heap
|
page read and write
|
||
1A858528000
|
trusted library allocation
|
page read and write
|
||
1A85F555000
|
trusted library allocation
|
page read and write
|
||
1A862975000
|
trusted library allocation
|
page read and write
|
||
1A8575BE000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
2190E878000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A858A49000
|
trusted library allocation
|
page read and write
|
||
1A857831000
|
trusted library allocation
|
page read and write
|
||
20D1A2E0000
|
heap
|
page read and write
|
||
1A84E28F000
|
heap
|
page read and write
|
||
1A85AE34000
|
trusted library allocation
|
page read and write
|
||
1A8587D0000
|
trusted library allocation
|
page read and write
|
||
1A858173000
|
trusted library allocation
|
page read and write
|
||
1A8585E6000
|
trusted library allocation
|
page read and write
|
||
1A8544E4000
|
trusted library allocation
|
page read and write
|
||
3DE29FE000
|
stack
|
page read and write
|
||
1A85726C000
|
trusted library allocation
|
page read and write
|
||
1A85871A000
|
trusted library allocation
|
page read and write
|
||
1A85AE67000
|
trusted library allocation
|
page read and write
|
||
1A857E36000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A856E9D000
|
trusted library allocation
|
page read and write
|
||
1A85F626000
|
trusted library allocation
|
page read and write
|
||
1A8586DC000
|
trusted library allocation
|
page read and write
|
||
1A85F3CD000
|
trusted library allocation
|
page read and write
|
||
1A8575FB000
|
trusted library allocation
|
page read and write
|
||
1A8628F4000
|
trusted library allocation
|
page read and write
|
||
2190F36C000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A85F6FC000
|
trusted library allocation
|
page read and write
|
||
1A859A63000
|
trusted library allocation
|
page read and write
|
||
1A85A7D8000
|
trusted library allocation
|
page read and write
|
||
21592380000
|
heap
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A85815C000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A8613EE000
|
trusted library allocation
|
page read and write
|
||
1A858AFA000
|
trusted library allocation
|
page read and write
|
||
1A858BDD000
|
trusted library allocation
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
9053D7E000
|
unkown
|
page readonly
|
||
1A854DA5000
|
trusted library allocation
|
page read and write
|
||
1A85F37E000
|
trusted library allocation
|
page read and write
|
||
1A85A851000
|
trusted library allocation
|
page read and write
|
||
1A857EBE000
|
trusted library allocation
|
page read and write
|
||
1A8613E4000
|
trusted library allocation
|
page read and write
|
||
1A862C88000
|
heap
|
page read and write
|
||
3DE41FE000
|
stack
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A857EAD000
|
trusted library allocation
|
page read and write
|
||
1A84E2E0000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A857AC4000
|
trusted library allocation
|
page read and write
|
||
3DE49FF000
|
stack
|
page read and write
|
||
1A85F2BB000
|
trusted library allocation
|
page read and write
|
||
7C2BDFE000
|
stack
|
page read and write
|
||
1A858766000
|
trusted library allocation
|
page read and write
|
||
1A859DC7000
|
trusted library allocation
|
page read and write
|
||
1A85888B000
|
trusted library allocation
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A8572BB000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
2190F369000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A8585A0000
|
trusted library allocation
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
1A858D60000
|
trusted library allocation
|
page read and write
|
||
1A8628C8000
|
trusted library allocation
|
page read and write
|
||
1A858173000
|
trusted library allocation
|
page read and write
|
||
1A859BF4000
|
trusted library allocation
|
page read and write
|
||
1A858DE6000
|
trusted library allocation
|
page read and write
|
||
2359CCB6000
|
trusted library allocation
|
page read and write
|
||
1A857A62000
|
trusted library allocation
|
page read and write
|
||
2190F46C000
|
heap
|
page read and write
|
||
1A857EC6000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
2359CC7B000
|
trusted library allocation
|
page read and write
|
||
1A85FC46000
|
trusted library allocation
|
page read and write
|
||
1A84E279000
|
heap
|
page read and write
|
||
1A8625A7000
|
trusted library allocation
|
page read and write
|
||
1A85982F000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A86136F000
|
trusted library allocation
|
page read and write
|
||
1A859AF5000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E289000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A85F2A3000
|
trusted library allocation
|
page read and write
|
||
1A8581AC000
|
trusted library allocation
|
page read and write
|
||
2159239A000
|
heap
|
page read and write
|
||
1A85893A000
|
trusted library allocation
|
page read and write
|
||
1A8544E8000
|
trusted library allocation
|
page read and write
|
||
1A858E55000
|
trusted library allocation
|
page read and write
|
||
1A8628E2000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A85F91F000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A857EBC000
|
trusted library allocation
|
page read and write
|
||
1A858A49000
|
trusted library allocation
|
page read and write
|
||
1A85FC56000
|
trusted library allocation
|
page read and write
|
||
2190E600000
|
trusted library allocation
|
page read and write
|
||
1A854D68000
|
trusted library allocation
|
page read and write
|
||
20D1A603000
|
trusted library allocation
|
page read and write
|
||
1A858536000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A85A7D8000
|
trusted library allocation
|
page read and write
|
||
1A854635000
|
trusted library allocation
|
page read and write
|
||
1A86255B000
|
trusted library allocation
|
page read and write
|
||
1A854531000
|
trusted library allocation
|
page read and write
|
||
1A860EF9000
|
trusted library allocation
|
page read and write
|
||
1A857E79000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A85F6AF000
|
trusted library allocation
|
page read and write
|
||
20D1A616000
|
trusted library allocation
|
page read and write
|
||
2359CC5D000
|
trusted library allocation
|
page read and write
|
||
1A86198C000
|
trusted library allocation
|
page read and write
|
||
1A85F591000
|
trusted library allocation
|
page read and write
|
||
1A86124E000
|
trusted library allocation
|
page read and write
|
||
1A8625A4000
|
trusted library allocation
|
page read and write
|
||
1A858D7F000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A8612DF000
|
trusted library allocation
|
page read and write
|
||
3591000
|
heap
|
page read and write
|
||
1A858A5E000
|
trusted library allocation
|
page read and write
|
||
2359C9A2000
|
unclassified section
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A8619E5000
|
trusted library allocation
|
page read and write
|
||
2190F3E0000
|
heap
|
page read and write
|
||
1A85726F000
|
trusted library allocation
|
page read and write
|
||
1A84E2AD000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A857F60000
|
trusted library allocation
|
page read and write
|
||
1A854493000
|
trusted library allocation
|
page read and write
|
||
1A858141000
|
trusted library allocation
|
page read and write
|
||
1A857EFA000
|
trusted library allocation
|
page read and write
|
||
1A857E87000
|
trusted library allocation
|
page read and write
|
||
1A862545000
|
trusted library allocation
|
page read and write
|
||
1A858BC3000
|
trusted library allocation
|
page read and write
|
||
20D1A542000
|
unclassified section
|
page read and write
|
||
1A84E260000
|
heap
|
page read and write
|
||
1A85864E000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A85F3CD000
|
trusted library allocation
|
page read and write
|
||
1A85ADF9000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A8544A9000
|
trusted library allocation
|
page read and write
|
||
20D1A300000
|
trusted library allocation
|
page read and write
|
||
1A858127000
|
trusted library allocation
|
page read and write
|
||
1A8589F0000
|
trusted library allocation
|
page read and write
|
||
1A85F7DD000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A85878C000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A858ADA000
|
trusted library allocation
|
page read and write
|
||
1A85AEA8000
|
trusted library allocation
|
page read and write
|
||
1A858742000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A857F87000
|
trusted library allocation
|
page read and write
|
||
1A862B3B000
|
trusted library allocation
|
page read and write
|
||
1A85724C000
|
trusted library allocation
|
page read and write
|
||
1A858626000
|
trusted library allocation
|
page read and write
|
||
1A858167000
|
trusted library allocation
|
page read and write
|
||
1A85F748000
|
trusted library allocation
|
page read and write
|
||
2359C810000
|
heap
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A85FC3F000
|
trusted library allocation
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A856E8E000
|
trusted library allocation
|
page read and write
|
||
1A852C90000
|
trusted library allocation
|
page read and write
|
||
2190F3FD000
|
heap
|
page read and write
|
||
1A8590DD000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A8576E9000
|
trusted library allocation
|
page read and write
|
||
2190F3EB000
|
heap
|
page read and write
|
||
1A85F2B5000
|
trusted library allocation
|
page read and write
|
||
1A8588D6000
|
trusted library allocation
|
page read and write
|
||
1A858B62000
|
trusted library allocation
|
page read and write
|
||
1A8545EB000
|
trusted library allocation
|
page read and write
|
||
1A85F54E000
|
trusted library allocation
|
page read and write
|
||
1A859B87000
|
trusted library allocation
|
page read and write
|
||
1A85725E000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A84E291000
|
heap
|
page read and write
|
||
1A84E264000
|
heap
|
page read and write
|
||
1A857686000
|
trusted library allocation
|
page read and write
|
||
1A84E285000
|
heap
|
page read and write
|
||
1A85F985000
|
trusted library allocation
|
page read and write
|
||
1A854CBB000
|
heap
|
page read and write
|
||
1A858A71000
|
trusted library allocation
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A85781E000
|
trusted library allocation
|
page read and write
|
||
2190F369000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A84E27C000
|
heap
|
page read and write
|
||
1A8532F6000
|
trusted library allocation
|
page read and write
|
||
1A858D64000
|
trusted library allocation
|
page read and write
|
||
1A85F4D2000
|
trusted library allocation
|
page read and write
|
||
1A84E291000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A8589CB000
|
trusted library allocation
|
page read and write
|
||
1A84E2AE000
|
heap
|
page read and write
|
||
1A858D64000
|
trusted library allocation
|
page read and write
|
||
2190F360000
|
heap
|
page read and write
|
||
F82000
|
heap
|
page read and write
|
||
B515FFE000
|
unkown
|
page readonly
|
||
1A8586AF000
|
trusted library allocation
|
page read and write
|
||
2190F43B000
|
heap
|
page read and write
|
||
7C2A3FE000
|
unkown
|
page readonly
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A857DA0000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A862BF4000
|
trusted library allocation
|
page read and write
|
||
9052D7E000
|
unkown
|
page readonly
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85FCB0000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A84E28B000
|
heap
|
page read and write
|
||
1A857A7A000
|
trusted library allocation
|
page read and write
|
||
1A860DBA000
|
trusted library allocation
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A858577000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
2190EE60000
|
heap
|
page read and write
|
||
20D1A47B000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A8628E2000
|
trusted library allocation
|
page read and write
|
||
1A852CEF000
|
trusted library allocation
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A8572C4000
|
trusted library allocation
|
page read and write
|
||
1A861251000
|
trusted library allocation
|
page read and write
|
||
1A862CA0000
|
heap
|
page read and write
|
||
2359CBB6000
|
heap
|
page read and write
|
||
1A862885000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A857E81000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A85F7FB000
|
trusted library allocation
|
page read and write
|
||
2190F369000
|
heap
|
page read and write
|
||
299CFFF000
|
stack
|
page read and write
|
||
1A854CA4000
|
heap
|
page read and write
|
||
1A85AE5D000
|
trusted library allocation
|
page read and write
|
||
1A857843000
|
trusted library allocation
|
page read and write
|
||
1A85F645000
|
trusted library allocation
|
page read and write
|
||
1A8588EC000
|
trusted library allocation
|
page read and write
|
||
1A84E280000
|
heap
|
page read and write
|
||
1A853271000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
2190F42B000
|
heap
|
page read and write
|
||
1A85F55F000
|
trusted library allocation
|
page read and write
|
||
2190F1C1000
|
unkown
|
page execute read
|
||
1A859855000
|
trusted library allocation
|
page read and write
|
||
1A8572C4000
|
trusted library allocation
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A85980C000
|
trusted library allocation
|
page read and write
|
||
1A859A83000
|
trusted library allocation
|
page read and write
|
||
1A858D6D000
|
trusted library allocation
|
page read and write
|
||
1A85F609000
|
trusted library allocation
|
page read and write
|
||
1A85F589000
|
trusted library allocation
|
page read and write
|
||
1A84E2A9000
|
heap
|
page read and write
|
||
1A85A8BB000
|
trusted library allocation
|
page read and write
|
||
1A858165000
|
trusted library allocation
|
page read and write
|
||
1A858A49000
|
trusted library allocation
|
page read and write
|
||
1A858DD6000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A861993000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A858577000
|
trusted library allocation
|
page read and write
|
||
1A8612F7000
|
trusted library allocation
|
page read and write
|
||
1A857EA1000
|
trusted library allocation
|
page read and write
|
||
1A858DB4000
|
trusted library allocation
|
page read and write
|
||
1A85331E000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
1A857F6B000
|
trusted library allocation
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A858747000
|
trusted library allocation
|
page read and write
|
||
1A84E283000
|
heap
|
page read and write
|
||
1A84E289000
|
heap
|
page read and write
|
||
1A8585EE000
|
trusted library allocation
|
page read and write
|
||
1A862999000
|
trusted library allocation
|
page read and write
|
||
1A862499000
|
trusted library allocation
|
page read and write
|
||
1A857260000
|
trusted library allocation
|
page read and write
|
||
1A858742000
|
trusted library allocation
|
page read and write
|
||
1A858D8F000
|
trusted library allocation
|
page read and write
|
||
1A8598E8000
|
trusted library allocation
|
page read and write
|
||
1A8544F8000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
2359C950000
|
heap
|
page read and write
|
||
1A85F9C1000
|
trusted library allocation
|
page read and write
|
||
1A854293000
|
trusted library allocation
|
page read and write
|
||
1A858DEA000
|
trusted library allocation
|
page read and write
|
||
1A858569000
|
trusted library allocation
|
page read and write
|
||
1A86136F000
|
trusted library allocation
|
page read and write
|
||
1A859789000
|
trusted library allocation
|
page read and write
|
||
1A858ADA000
|
trusted library allocation
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A862B98000
|
trusted library allocation
|
page read and write
|
||
1A858563000
|
trusted library allocation
|
page read and write
|
||
1A8585B6000
|
trusted library allocation
|
page read and write
|
||
1A8586F9000
|
trusted library allocation
|
page read and write
|
||
1A85AE93000
|
trusted library allocation
|
page read and write
|
||
1A84E2E8000
|
heap
|
page read and write
|
||
2190F3E0000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A858191000
|
trusted library allocation
|
page read and write
|
||
1A85F718000
|
trusted library allocation
|
page read and write
|
||
1A860DC1000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A852CC7000
|
trusted library allocation
|
page read and write
|
||
2190F37D000
|
heap
|
page read and write
|
||
7C28BD8000
|
stack
|
page read and write
|
||
1A8588EC000
|
trusted library allocation
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
1A85AE51000
|
trusted library allocation
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A862BC4000
|
trusted library allocation
|
page read and write
|
||
1A85AD31000
|
trusted library allocation
|
page read and write
|
||
1A85F4D6000
|
trusted library allocation
|
page read and write
|
||
1A85AD36000
|
trusted library allocation
|
page read and write
|
||
1A84E262000
|
heap
|
page read and write
|
||
1A8572BB000
|
trusted library allocation
|
page read and write
|
||
1A858DB4000
|
trusted library allocation
|
page read and write
|
||
1A85AB19000
|
trusted library allocation
|
page read and write
|
||
2190F3A8000
|
heap
|
page read and write
|
||
1A858EEE000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A8628C8000
|
trusted library allocation
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A8544D6000
|
trusted library allocation
|
page read and write
|
||
1A857EB9000
|
trusted library allocation
|
page read and write
|
||
1A859B76000
|
trusted library allocation
|
page read and write
|
||
20D1A46E000
|
trusted library allocation
|
page read and write
|
||
1A86295E000
|
trusted library allocation
|
page read and write
|
||
1A86286B000
|
trusted library allocation
|
page read and write
|
||
1A858766000
|
trusted library allocation
|
page read and write
|
||
2359C9AF000
|
unclassified section
|
page read and write
|
||
1A862B61000
|
trusted library allocation
|
page read and write
|
||
1A85AB45000
|
trusted library allocation
|
page read and write
|
||
1A8629DA000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A858560000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
DCBB5A1000
|
trusted library allocation
|
page execute read
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E2A6000
|
heap
|
page read and write
|
||
1A857E93000
|
trusted library allocation
|
page read and write
|
||
1A858DA0000
|
trusted library allocation
|
page read and write
|
||
1A84E275000
|
heap
|
page read and write
|
||
1A8572CC000
|
trusted library allocation
|
page read and write
|
||
1A85873B000
|
trusted library allocation
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A862C01000
|
heap
|
page read and write
|
||
1A85F4D4000
|
trusted library allocation
|
page read and write
|
||
1A8599EC000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A862436000
|
trusted library allocation
|
page read and write
|
||
1A84E292000
|
heap
|
page read and write
|
||
1A84E29F000
|
heap
|
page read and write
|
||
1A8588CB000
|
trusted library allocation
|
page read and write
|
||
1A84E298000
|
heap
|
page read and write
|
||
1A85864A000
|
trusted library allocation
|
page read and write
|
||
1A8549B8000
|
trusted library allocation
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A85F587000
|
trusted library allocation
|
page read and write
|
||
1A858D64000
|
trusted library allocation
|
page read and write
|
||
1A857163000
|
trusted library allocation
|
page read and write
|
||
1A858A55000
|
trusted library allocation
|
page read and write
|
||
1A85974C000
|
trusted library allocation
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
B513DBE000
|
unkown
|
page readonly
|
||
1A85783F000
|
trusted library allocation
|
page read and write
|
||
1A85F6EB000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
1A8589E8000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A85A945000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
20D1A2A0000
|
heap
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A8575D7000
|
trusted library allocation
|
page read and write
|
||
1A862949000
|
trusted library allocation
|
page read and write
|
||
1A8589F0000
|
trusted library allocation
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A858520000
|
trusted library allocation
|
page read and write
|
||
1A857E98000
|
trusted library allocation
|
page read and write
|
||
1A85F547000
|
trusted library allocation
|
page read and write
|
||
1A84E2DF000
|
heap
|
page read and write
|
||
1A84E2D8000
|
heap
|
page read and write
|
||
1A85719C000
|
trusted library allocation
|
page read and write
|
||
1A84E290000
|
heap
|
page read and write
|
||
1A84E2E9000
|
heap
|
page read and write
|
||
1A85F732000
|
trusted library allocation
|
page read and write
|
||
2190E86F000
|
trusted library allocation
|
page read and write
|
||
1A858B51000
|
trusted library allocation
|
page read and write
|
||
1A858FEE000
|
trusted library allocation
|
page read and write
|
||
1A84E2DC000
|
heap
|
page read and write
|
||
1A858A59000
|
trusted library allocation
|
page read and write
|
||
1A8585F5000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A8619EE000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A857AAB000
|
trusted library allocation
|
page read and write
|
||
1A854CA0000
|
heap
|
page read and write
|
||
1A85F7E7000
|
trusted library allocation
|
page read and write
|
||
1A8533FB000
|
trusted library allocation
|
page read and write
|
||
1A854248000
|
trusted library allocation
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E28A000
|
heap
|
page read and write
|
||
1A858B69000
|
trusted library allocation
|
page read and write
|
||
1A8585A0000
|
trusted library allocation
|
page read and write
|
||
9052C3E000
|
stack
|
page read and write
|
||
1A85AEC9000
|
trusted library allocation
|
page read and write
|
||
1A862D94000
|
heap
|
page read and write
|
||
1A85ABDC000
|
trusted library allocation
|
page read and write
|
||
1A858B37000
|
trusted library allocation
|
page read and write
|
||
1A85AB5E000
|
trusted library allocation
|
page read and write
|
||
1A8544EB000
|
trusted library allocation
|
page read and write
|
||
1A85AD78000
|
trusted library allocation
|
page read and write
|
||
1A862539000
|
trusted library allocation
|
page read and write
|
||
1A85F550000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E2D2000
|
heap
|
page read and write
|
||
1A861348000
|
trusted library allocation
|
page read and write
|
||
1A857FE3000
|
trusted library allocation
|
page read and write
|
||
1A857E6A000
|
trusted library allocation
|
page read and write
|
||
1A854D61000
|
trusted library allocation
|
page read and write
|
||
1A85718E000
|
trusted library allocation
|
page read and write
|
||
1A84E2AD000
|
heap
|
page read and write
|
||
1A8533FB000
|
trusted library allocation
|
page read and write
|
||
1A85FC56000
|
trusted library allocation
|
page read and write
|
||
1A858EDA000
|
trusted library allocation
|
page read and write
|
||
1A8587A4000
|
trusted library allocation
|
page read and write
|
||
1A85FC0C000
|
trusted library allocation
|
page read and write
|
||
1A858BAC000
|
trusted library allocation
|
page read and write
|
||
1A858EF7000
|
trusted library allocation
|
page read and write
|
||
1A8590D0000
|
trusted library allocation
|
page read and write
|
||
1A85AB36000
|
trusted library allocation
|
page read and write
|
||
1A85331A000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
2190F477000
|
heap
|
page read and write
|
||
1A862A00000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
1A862C5B000
|
heap
|
page read and write
|
||
1A858669000
|
trusted library allocation
|
page read and write
|
||
1A858A3F000
|
trusted library allocation
|
page read and write
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A8544EA000
|
trusted library allocation
|
page read and write
|
||
1A85A896000
|
trusted library allocation
|
page read and write
|
||
38E5E211E000
|
trusted library allocation
|
page read and write
|
||
1A854981000
|
trusted library allocation
|
page read and write
|
||
1A85AE8C000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
1A857E79000
|
trusted library allocation
|
page read and write
|
||
1A85F35B000
|
trusted library allocation
|
page read and write
|
||
1A84E2AF000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E2ED000
|
heap
|
page read and write
|
||
1A857E98000
|
trusted library allocation
|
page read and write
|
||
2359CCD7000
|
trusted library allocation
|
page read and write
|
||
1A862C01000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
2190F3FD000
|
heap
|
page read and write
|
||
1A85AEF4000
|
trusted library allocation
|
page read and write
|
||
2190F34D000
|
heap
|
page read and write
|
||
1A85F547000
|
trusted library allocation
|
page read and write
|
||
1A84E2E9000
|
heap
|
page read and write
|
||
1A84E299000
|
heap
|
page read and write
|
||
1A85FC0C000
|
trusted library allocation
|
page read and write
|
||
1A862489000
|
trusted library allocation
|
page read and write
|
||
1A8549D6000
|
trusted library allocation
|
page read and write
|
||
1A857E9E000
|
trusted library allocation
|
page read and write
|
||
1A85AEC1000
|
trusted library allocation
|
page read and write
|
||
1A858EFB000
|
trusted library allocation
|
page read and write
|
||
2190E470000
|
unclassified section
|
page readonly
|
||
1A84E2AC000
|
heap
|
page read and write
|
||
1A8585E6000
|
trusted library allocation
|
page read and write
|
||
1A862D53000
|
heap
|
page read and write
|
||
1A857F63000
|
trusted library allocation
|
page read and write
|
||
1A858DC0000
|
trusted library allocation
|
page read and write
|
||
1A862CE3000
|
heap
|
page read and write
|
||
1A862C88000
|
heap
|
page read and write
|
||
1A84E284000
|
heap
|
page read and write
|
||
1A859B6A000
|
trusted library allocation
|
page read and write
|
||
1A861337000
|
trusted library allocation
|
page read and write
|
||
1A84E2D0000
|
heap
|
page read and write
|
||
1A858994000
|
trusted library allocation
|
page read and write
|
||
1A858EE6000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A85AD34000
|
trusted library allocation
|
page read and write
|
||
1A85F565000
|
trusted library allocation
|
page read and write
|
||
1A85729C000
|
trusted library allocation
|
page read and write
|
||
1A857E6D000
|
trusted library allocation
|
page read and write
|
||
1A84E289000
|
heap
|
page read and write
|
||
1A854DCE000
|
trusted library allocation
|
page read and write
|
||
1A84E2DA000
|
heap
|
page read and write
|
||
1A857194000
|
trusted library allocation
|
page read and write
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A84E2CF000
|
heap
|
page read and write
|
||
1A8586AF000
|
trusted library allocation
|
page read and write
|
||
1A84E2D3000
|
heap
|
page read and write
|
||
1A854D9E000
|
trusted library allocation
|
page read and write
|
||
1A8572B0000
|
trusted library allocation
|
page read and write
|
||
1A85F643000
|
trusted library allocation
|
page read and write
|
||
1A8572AA000
|
trusted library allocation
|
page read and write
|
||
1A84E281000
|
heap
|
page read and write
|
||
1A84E2E5000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A84E2EE000
|
heap
|
page read and write
|
||
1A858FD4000
|
trusted library allocation
|
page read and write
|
||
1A85F300000
|
trusted library allocation
|
page read and write
|
||
1A857F5E000
|
trusted library allocation
|
page read and write
|
||
1A8628B8000
|
trusted library allocation
|
page read and write
|
||
1A857F60000
|
trusted library allocation
|
page read and write
|
||
190CFB60000
|
heap
|
page read and write
|
||
1A84E2D7000
|
heap
|
page read and write
|
||
1A84E2A0000
|
heap
|
page read and write
|
||
1A85781A000
|
trusted library allocation
|
page read and write
|
||
1A858DC5000
|
trusted library allocation
|
page read and write
|
||
1A857EC6000
|
trusted library allocation
|
page read and write
|
||
1A85F33C000
|
trusted library allocation
|
page read and write
|
||
1A85F7D3000
|
trusted library allocation
|
page read and write
|
||
1A85F560000
|
trusted library allocation
|
page read and write
|
||
1A8572BE000
|
trusted library allocation
|
page read and write
|
||
1A859A23000
|
trusted library allocation
|
page read and write
|
||
1A85AE47000
|
trusted library allocation
|
page read and write
|
||
1A84E2E7000
|
heap
|
page read and write
|
||
1A85F6E6000
|
trusted library allocation
|
page read and write
|
||
1A857E93000
|
trusted library allocation
|
page read and write
|
||
1A85F563000
|
trusted library allocation
|
page read and write
|
||
1A858DED000
|
trusted library allocation
|
page read and write
|
||
7C2B4FE000
|
unkown
|
page readonly
|
||
1A84E26D000
|
heap
|
page read and write
|
||
1A84E27A000
|
heap
|
page read and write
|
||
1A858AFD000
|
trusted library allocation
|
page read and write
|
||
1A85F6DC000
|
trusted library allocation
|
page read and write
|
||
1A84E26A000
|
heap
|
page read and write
|
||
1A859B4B000
|
trusted library allocation
|
page read and write
|
||
1A856E75000
|
trusted library allocation
|
page read and write
|
||
1A857EB9000
|
trusted library allocation
|
page read and write
|
||
1A85AACA000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
1A85A972000
|
trusted library allocation
|
page read and write
|
||
1A85AB32000
|
trusted library allocation
|
page read and write
|
||
1A84E294000
|
heap
|
page read and write
|
||
1A84E295000
|
heap
|
page read and write
|
||
1A857DCA000
|
trusted library allocation
|
page read and write
|
||
1A85A9B2000
|
trusted library allocation
|
page read and write
|
||
7C2B5BE000
|
stack
|
page read and write
|
There are 3896 hidden memdumps, click here to show them.