Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_df742fd1-5d4b-461c-a35d-f7640dc3f772.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_df742fd1-5d4b-461c-a35d-f7640dc3f772.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
|
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
|
modified
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\18CX51L3HYLNCBJ0DXHU.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\73UER8CAKXBLFX5X1DQF.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5862 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5862 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5862 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json.tmp
|
JSON data
|
dropped
|
There are 32 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244
-prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {0d4c19da-07e9-4e1a-9ce2-f4e466361ce6} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" 1f18e16ef10 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4088 -parentBuildID 20230927232528 -prefsHandle 3880
-prefMapHandle 2888 -prefsLen 26208 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5f226f1-1a1c-41d2-bbb4-bf72ea27501c}
3084 "\\.\pipe\gecko-crash-server-pipe.3084" 1f18e182a10 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2612 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 5364 -prefMapHandle 5360 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {2dce7259-bfc2-44f9-b9ca-cb65ac3e711e} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" 1f1a07c7510 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema.
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
http://mozilla.org/0
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2020-12/schema/=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
|
unknown
|
||
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://amazon.com
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListenerUseOfReleaseEventsWarningUse
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
http://mozilla.org/D
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.195.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.1
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.1.91
|
||
dyna.wikimedia.org
|
185.15.58.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.181.142
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
dualstack.reddit.map.fastly.net
|
151.101.1.140
|
||
youtube-ui.l.google.com
|
172.217.19.238
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
ipv4only.arpa
|
192.0.0.170
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
151.101.1.91
|
services.addons.mozilla.org
|
United States
|
||
142.250.181.142
|
youtube.com
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1060000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A14F8000
|
trusted library allocation
|
page read and write
|
||
1F19DD8A000
|
trusted library allocation
|
page read and write
|
||
1F19DE77000
|
trusted library allocation
|
page read and write
|
||
1F1A952F000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F1A6190000
|
trusted library allocation
|
page read and write
|
||
27141FB9000
|
heap
|
page read and write
|
||
27141FE1000
|
heap
|
page read and write
|
||
2A2F5C8A000
|
heap
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A267B000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1A90C4000
|
trusted library allocation
|
page read and write
|
||
1F1A05EB000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A9595000
|
trusted library allocation
|
page read and write
|
||
1F19DFC9000
|
trusted library allocation
|
page read and write
|
||
1F1998C8000
|
trusted library allocation
|
page read and write
|
||
27141FED000
|
heap
|
page read and write
|
||
1F1A1ED8000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F19DA99000
|
trusted library allocation
|
page read and write
|
||
1F1A6255000
|
trusted library allocation
|
page read and write
|
||
1F1A05B3000
|
trusted library allocation
|
page read and write
|
||
1F1A68BB000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F1AABE9000
|
trusted library allocation
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F19EDB1000
|
trusted library allocation
|
page read and write
|
||
1F19F998000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E93000
|
heap
|
page read and write
|
||
1F19F36A000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19DFBB000
|
trusted library allocation
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194E96000
|
heap
|
page read and write
|
||
14DDB3B7000
|
heap
|
page read and write
|
||
1F19F56F000
|
trusted library allocation
|
page read and write
|
||
1F18FDD1000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
2A2F5DA2000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A80BC000
|
trusted library allocation
|
page read and write
|
||
1F1A006A000
|
trusted library allocation
|
page read and write
|
||
1F1A60FC000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F19FF8D000
|
trusted library allocation
|
page read and write
|
||
1F19F5E7000
|
trusted library allocation
|
page read and write
|
||
1F1A61AD000
|
trusted library allocation
|
page read and write
|
||
1F19F01D000
|
trusted library allocation
|
page read and write
|
||
1F1A27A7000
|
trusted library allocation
|
page read and write
|
||
1F19FAF1000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19B222000
|
trusted library allocation
|
page read and write
|
||
1F1A63F9000
|
trusted library allocation
|
page read and write
|
||
1F19ED74000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1A619A000
|
trusted library allocation
|
page read and write
|
||
1F1A80B4000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F194EFC000
|
heap
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F194F1B000
|
heap
|
page read and write
|
||
1F1A0085000
|
trusted library allocation
|
page read and write
|
||
1F19F9E0000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1900DFF000
|
stack
|
page read and write
|
||
1F1A147B000
|
trusted library allocation
|
page read and write
|
||
1F19FF8D000
|
trusted library allocation
|
page read and write
|
||
1F1A05F9000
|
trusted library allocation
|
page read and write
|
||
1F1A1EC6000
|
trusted library allocation
|
page read and write
|
||
1F1A63C5000
|
trusted library allocation
|
page read and write
|
||
27141378000
|
trusted library allocation
|
page read and write
|
||
1F194E77000
|
heap
|
page read and write
|
||
1F19F3F6000
|
trusted library allocation
|
page read and write
|
||
1071000
|
heap
|
page read and write
|
||
1F1A09BF000
|
trusted library allocation
|
page read and write
|
||
1F1A9965000
|
trusted library allocation
|
page read and write
|
||
1F19FF44000
|
trusted library allocation
|
page read and write
|
||
1F19FFE4000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19DF7A000
|
trusted library allocation
|
page read and write
|
||
1F19DD6A000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194EA0000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F19DFA7000
|
trusted library allocation
|
page read and write
|
||
1F1A63EC000
|
trusted library allocation
|
page read and write
|
||
2E9DFBE000
|
stack
|
page read and write
|
||
1F1A08FE000
|
trusted library allocation
|
page read and write
|
||
1F1A68F3000
|
trusted library allocation
|
page read and write
|
||
27141FFD000
|
heap
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
1F19F983000
|
trusted library allocation
|
page read and write
|
||
1F19FF93000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
1F19F705000
|
trusted library allocation
|
page read and write
|
||
1F19ED91000
|
trusted library allocation
|
page read and write
|
||
1F19DF93000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F19B1F4000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19ECC4000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
27141E00000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F194EB3000
|
heap
|
page read and write
|
||
1F19DAF9000
|
trusted library allocation
|
page read and write
|
||
1F1A18C5000
|
trusted library allocation
|
page read and write
|
||
1F1A62BE000
|
trusted library allocation
|
page read and write
|
||
1F1A05EB000
|
trusted library allocation
|
page read and write
|
||
1F19FF8B000
|
trusted library allocation
|
page read and write
|
||
1F19F6E6000
|
trusted library allocation
|
page read and write
|
||
1F1A9085000
|
trusted library allocation
|
page read and write
|
||
1F19ED47000
|
trusted library allocation
|
page read and write
|
||
1F194EB6000
|
heap
|
page read and write
|
||
1F199FF0000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194F11000
|
heap
|
page read and write
|
||
1F1A9FCB000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1E430F81000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19F006000
|
trusted library allocation
|
page read and write
|
||
1F19F611000
|
trusted library allocation
|
page read and write
|
||
27141F69000
|
heap
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
27142077000
|
heap
|
page read and write
|
||
6F275FF000
|
stack
|
page read and write
|
||
1F1A95F9000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19F9EB000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1AA34D000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19FDF1000
|
trusted library allocation
|
page read and write
|
||
1F1A06D8000
|
trusted library allocation
|
page read and write
|
||
1F1A80AA000
|
trusted library allocation
|
page read and write
|
||
27141F5C000
|
heap
|
page read and write
|
||
1F194F24000
|
heap
|
page read and write
|
||
1F19FF68000
|
trusted library allocation
|
page read and write
|
||
1F19ED0F000
|
trusted library allocation
|
page read and write
|
||
1F1A6179000
|
trusted library allocation
|
page read and write
|
||
1F19DF3D000
|
trusted library allocation
|
page read and write
|
||
1F19FFD4000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194F19000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A9F23000
|
trusted library allocation
|
page read and write
|
||
1F1A9F42000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A9083000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19B237000
|
trusted library allocation
|
page read and write
|
||
1F19FFA7000
|
trusted library allocation
|
page read and write
|
||
1F1A61E4000
|
trusted library allocation
|
page read and write
|
||
1F1AA0D1000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F1A06DE000
|
trusted library allocation
|
page read and write
|
||
1F194F2D000
|
heap
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1AABE9000
|
trusted library allocation
|
page read and write
|
||
1F1A186E000
|
trusted library allocation
|
page read and write
|
||
1F1A79A3000
|
trusted library allocation
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F1AA2E5000
|
trusted library allocation
|
page read and write
|
||
1F1A63EC000
|
trusted library allocation
|
page read and write
|
||
1F19ECBF000
|
trusted library allocation
|
page read and write
|
||
27141FE6000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19EDC8000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19FF23000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1A1890000
|
trusted library allocation
|
page read and write
|
||
1F1AABFC000
|
trusted library allocation
|
page read and write
|
||
1F19EDC8000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F1A80A5000
|
trusted library allocation
|
page read and write
|
||
1F19F031000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1AA2E5000
|
trusted library allocation
|
page read and write
|
||
1F1AABEE000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19FF67000
|
trusted library allocation
|
page read and write
|
||
B5CB39E000
|
unkown
|
page readonly
|
||
1F19B0F1000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F19DFB9000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
27141F69000
|
heap
|
page read and write
|
||
1F1A0036000
|
trusted library allocation
|
page read and write
|
||
1F19FFE5000
|
trusted library allocation
|
page read and write
|
||
1F19FDB0000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A9927000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A68F7000
|
trusted library allocation
|
page read and write
|
||
1F19ED54000
|
trusted library allocation
|
page read and write
|
||
1F194EB9000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
2A2F61B6000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F19B155000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F199EF6000
|
trusted library allocation
|
page read and write
|
||
1F1A0AFC000
|
trusted library allocation
|
page read and write
|
||
1F19FFED000
|
trusted library allocation
|
page read and write
|
||
1F19F01D000
|
trusted library allocation
|
page read and write
|
||
1F1A05B5000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F194EA0000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
27141FE3000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F01A000000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1A68DB000
|
trusted library allocation
|
page read and write
|
||
1F1A1898000
|
trusted library allocation
|
page read and write
|
||
27141890000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A14DE000
|
trusted library allocation
|
page read and write
|
||
1F19B8A6000
|
heap
|
page read and write
|
||
1F19F9E8000
|
trusted library allocation
|
page read and write
|
||
1F1AA3BB000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F19F00F000
|
trusted library allocation
|
page read and write
|
||
1F19FFC8000
|
trusted library allocation
|
page read and write
|
||
1F19F9A9000
|
trusted library allocation
|
page read and write
|
||
1F1AA03D000
|
trusted library allocation
|
page read and write
|
||
1F194E76000
|
heap
|
page read and write
|
||
1F19F58B000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A05B5000
|
trusted library allocation
|
page read and write
|
||
1F19F6E2000
|
trusted library allocation
|
page read and write
|
||
1F19F4EF000
|
trusted library allocation
|
page read and write
|
||
1F19F03F000
|
trusted library allocation
|
page read and write
|
||
1F1A0466000
|
trusted library allocation
|
page read and write
|
||
1F19EDA8000
|
trusted library allocation
|
page read and write
|
||
1F1A14C8000
|
trusted library allocation
|
page read and write
|
||
1F1AACC2000
|
trusted library allocation
|
page read and write
|
||
1F19E1FC000
|
trusted library allocation
|
page read and write
|
||
1F19FF73000
|
trusted library allocation
|
page read and write
|
||
1F194EFA000
|
heap
|
page read and write
|
||
1F1A63F9000
|
trusted library allocation
|
page read and write
|
||
1F19DFD8000
|
trusted library allocation
|
page read and write
|
||
1F19DD7E000
|
trusted library allocation
|
page read and write
|
||
1F19EDB8000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A9F2B000
|
trusted library allocation
|
page read and write
|
||
1F1A60DD000
|
trusted library allocation
|
page read and write
|
||
1F194EFE000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19DF87000
|
trusted library allocation
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F1A79C8000
|
trusted library allocation
|
page read and write
|
||
1F19FDE4000
|
trusted library allocation
|
page read and write
|
||
1F19DA9C000
|
trusted library allocation
|
page read and write
|
||
1F19DF52000
|
trusted library allocation
|
page read and write
|
||
1F19DE8A000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F1A63DC000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
2E9CEFE000
|
stack
|
page read and write
|
||
1F1A60E4000
|
trusted library allocation
|
page read and write
|
||
1F19B848000
|
heap
|
page read and write
|
||
1F1A05CB000
|
trusted library allocation
|
page read and write
|
||
1F19FFED000
|
trusted library allocation
|
page read and write
|
||
1F19B6CB000
|
trusted library allocation
|
page read and write
|
||
1F1A7AA3000
|
trusted library allocation
|
page read and write
|
||
1F1A7A07000
|
trusted library allocation
|
page read and write
|
||
1F19EC46000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F1A6400000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A60FE000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F1A95BC000
|
trusted library allocation
|
page read and write
|
||
1F19B846000
|
heap
|
page read and write
|
||
1F194F1B000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
2E9C5FE000
|
unkown
|
page readonly
|
||
1F19ED2C000
|
trusted library allocation
|
page read and write
|
||
1F1A6876000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1AAC5E000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
2E9C6FE000
|
unkown
|
page readonly
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F1A05B5000
|
trusted library allocation
|
page read and write
|
||
1F19ED6A000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F19DD63000
|
trusted library allocation
|
page read and write
|
||
1F19FFC1000
|
trusted library allocation
|
page read and write
|
||
1F19F639000
|
trusted library allocation
|
page read and write
|
||
1F1A0445000
|
trusted library allocation
|
page read and write
|
||
1F19ED56000
|
trusted library allocation
|
page read and write
|
||
1F19ED6A000
|
trusted library allocation
|
page read and write
|
||
1F1A61F9000
|
trusted library allocation
|
page read and write
|
||
1F19FE2E000
|
trusted library allocation
|
page read and write
|
||
1F1A08E4000
|
trusted library allocation
|
page read and write
|
||
1F19B1F0000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
2714132F000
|
trusted library allocation
|
page read and write
|
||
1F1AA0DB000
|
trusted library allocation
|
page read and write
|
||
1F19F6BB000
|
trusted library allocation
|
page read and write
|
||
1F1AA347000
|
trusted library allocation
|
page read and write
|
||
1F19F5FC000
|
trusted library allocation
|
page read and write
|
||
1F19EC15000
|
trusted library allocation
|
page read and write
|
||
1F194EAE000
|
heap
|
page read and write
|
||
1F19F55D000
|
trusted library allocation
|
page read and write
|
||
27141FF1000
|
heap
|
page read and write
|
||
1F19DFBB000
|
trusted library allocation
|
page read and write
|
||
1F1A0032000
|
trusted library allocation
|
page read and write
|
||
1F194EFE000
|
heap
|
page read and write
|
||
1F1A2184000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F19EDBE000
|
trusted library allocation
|
page read and write
|
||
1F1A5FE5000
|
trusted library allocation
|
page read and write
|
||
1F1A05FC000
|
trusted library allocation
|
page read and write
|
||
1F19F4B3000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F019E00000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F1A00BF000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A6099000
|
trusted library allocation
|
page read and write
|
||
1F1A9543000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1AA2F3000
|
trusted library allocation
|
page read and write
|
||
1F19ECC2000
|
trusted library allocation
|
page read and write
|
||
1F19B8D5000
|
heap
|
page read and write
|
||
1F1A9691000
|
trusted library allocation
|
page read and write
|
||
1F1A63F9000
|
trusted library allocation
|
page read and write
|
||
1F19DE8A000
|
trusted library allocation
|
page read and write
|
||
1F19B235000
|
trusted library allocation
|
page read and write
|
||
1F19EDC3000
|
trusted library allocation
|
page read and write
|
||
2714110F000
|
unclassified section
|
page read and write
|
||
1F19FDFE000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F19ECB5000
|
trusted library allocation
|
page read and write
|
||
1F1AAC47000
|
trusted library allocation
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F19ECBB000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19FFAB000
|
trusted library allocation
|
page read and write
|
||
1F19FDFE000
|
trusted library allocation
|
page read and write
|
||
1F19DF53000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F019F94000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F019F47000
|
trusted library allocation
|
page read and write
|
||
1F1A00C6000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F1A5FB4000
|
trusted library allocation
|
page read and write
|
||
1F1AACAB000
|
trusted library allocation
|
page read and write
|
||
1F1A68CC000
|
trusted library allocation
|
page read and write
|
||
1F194E87000
|
heap
|
page read and write
|
||
1F19ED89000
|
trusted library allocation
|
page read and write
|
||
1F1A9CF7000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19DD78000
|
trusted library allocation
|
page read and write
|
||
1F1A282C000
|
trusted library allocation
|
page read and write
|
||
1F194EA0000
|
heap
|
page read and write
|
||
1F1A95D8000
|
trusted library allocation
|
page read and write
|
||
1F1A7AE4000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19FDC8000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19E682000
|
trusted library allocation
|
page read and write
|
||
1F1AABF3000
|
trusted library allocation
|
page read and write
|
||
1F19FFCB000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F19E1F6000
|
trusted library allocation
|
page read and write
|
||
1F1AA076000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
27141130000
|
heap
|
page read and write
|
||
27141FF1000
|
heap
|
page read and write
|
||
1F19F39C000
|
trusted library allocation
|
page read and write
|
||
1F19B869000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F19EC78000
|
trusted library allocation
|
page read and write
|
||
1F1A18CF000
|
trusted library allocation
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F19B87A000
|
heap
|
page read and write
|
||
1F1A6874000
|
trusted library allocation
|
page read and write
|
||
1F19E6B7000
|
trusted library allocation
|
page read and write
|
||
1F19B1F6000
|
trusted library allocation
|
page read and write
|
||
1F19B1F4000
|
trusted library allocation
|
page read and write
|
||
1F1A9780000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1AA0AF000
|
trusted library allocation
|
page read and write
|
||
1F19F9B7000
|
trusted library allocation
|
page read and write
|
||
1F194F32000
|
heap
|
page read and write
|
||
27141FE8000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1092000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A63DC000
|
trusted library allocation
|
page read and write
|
||
107A000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F1A186B000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F019AC0000
|
unclassified section
|
page readonly
|
||
1F1A5F24000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19DE68000
|
trusted library allocation
|
page read and write
|
||
1F19DD6A000
|
trusted library allocation
|
page read and write
|
||
1F19F9AD000
|
trusted library allocation
|
page read and write
|
||
1F194E77000
|
heap
|
page read and write
|
||
1F194EA3000
|
heap
|
page read and write
|
||
1F19EDC1000
|
trusted library allocation
|
page read and write
|
||
1F1A14F0000
|
trusted library allocation
|
page read and write
|
||
1F1A007C000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
6F26DFE000
|
stack
|
page read and write
|
||
1F1AAC56000
|
trusted library allocation
|
page read and write
|
||
1F1AAC78000
|
trusted library allocation
|
page read and write
|
||
6F24DFF000
|
stack
|
page read and write
|
||
1F1A6212000
|
trusted library allocation
|
page read and write
|
||
1F19F9BE000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A5F12000
|
trusted library allocation
|
page read and write
|
||
1F19E177000
|
trusted library allocation
|
page read and write
|
||
1F1A9524000
|
trusted library allocation
|
page read and write
|
||
1F1A63BD000
|
trusted library allocation
|
page read and write
|
||
2A2F6203000
|
trusted library allocation
|
page read and write
|
||
1F19DF8E000
|
trusted library allocation
|
page read and write
|
||
2A2F61B4000
|
heap
|
page read and write
|
||
1E432B29000
|
heap
|
page read and write
|
||
1F1A0074000
|
trusted library allocation
|
page read and write
|
||
1F1A14C5000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19ED6E000
|
trusted library allocation
|
page read and write
|
||
1F1A14F0000
|
trusted library allocation
|
page read and write
|
||
295DA5F1000
|
trusted library allocation
|
page execute read
|
||
1F194EB6000
|
heap
|
page read and write
|
||
1F1A8079000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
7BC000
|
unkown
|
page readonly
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A0BF3000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A61C2000
|
trusted library allocation
|
page read and write
|
||
1F19FE7F000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
27140EE0000
|
unclassified section
|
page readonly
|
||
1F1A9558000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F19F4AE000
|
trusted library allocation
|
page read and write
|
||
1F1A07C1000
|
trusted library allocation
|
page read and write
|
||
1F19E1CD000
|
trusted library allocation
|
page read and write
|
||
1F1A1478000
|
trusted library allocation
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F19ED15000
|
trusted library allocation
|
page read and write
|
||
1F199F82000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F19DA33000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A08E6000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19EC48000
|
trusted library allocation
|
page read and write
|
||
1F19F377000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19FCAC000
|
trusted library allocation
|
page read and write
|
||
1F19E684000
|
trusted library allocation
|
page read and write
|
||
1F19F4F1000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A06E4000
|
trusted library allocation
|
page read and write
|
||
1F199898000
|
trusted library allocation
|
page read and write
|
||
1F19FCF7000
|
trusted library allocation
|
page read and write
|
||
1F019F12000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
2E9A39E000
|
unkown
|
page readonly
|
||
2714206D000
|
heap
|
page read and write
|
||
1F019F96000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F1A06E4000
|
trusted library allocation
|
page read and write
|
||
1F1998A7000
|
trusted library allocation
|
page read and write
|
||
1F19DF9D000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19FDDE000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F19F38C000
|
trusted library allocation
|
page read and write
|
||
1F1A6221000
|
trusted library allocation
|
page read and write
|
||
1F19FF43000
|
trusted library allocation
|
page read and write
|
||
1F19F488000
|
trusted library allocation
|
page read and write
|
||
2A2F5D30000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1A0533000
|
trusted library allocation
|
page read and write
|
||
1F19B87A000
|
heap
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
1F19FDDE000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1AAC87000
|
trusted library allocation
|
page read and write
|
||
1F1A63EC000
|
trusted library allocation
|
page read and write
|
||
1F19FDEE000
|
trusted library allocation
|
page read and write
|
||
1F19DFCD000
|
trusted library allocation
|
page read and write
|
||
1F19EC76000
|
trusted library allocation
|
page read and write
|
||
1F1A09EC000
|
trusted library allocation
|
page read and write
|
||
1F19DA62000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19ED2C000
|
trusted library allocation
|
page read and write
|
||
1F1A952F000
|
trusted library allocation
|
page read and write
|
||
1F1A00BB000
|
trusted library allocation
|
page read and write
|
||
1F1A07FD000
|
trusted library allocation
|
page read and write
|
||
1F1AABE5000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
27141400000
|
heap
|
page read and write
|
||
1F19FF67000
|
trusted library allocation
|
page read and write
|
||
1F1A00D2000
|
trusted library allocation
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F19DFBE000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F1A14C8000
|
trusted library allocation
|
page read and write
|
||
1F1A9F64000
|
trusted library allocation
|
page read and write
|
||
1F1A042F000
|
trusted library allocation
|
page read and write
|
||
1F19DFB3000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19ECB5000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F19FFBB000
|
trusted library allocation
|
page read and write
|
||
2714206D000
|
heap
|
page read and write
|
||
1F1A9518000
|
trusted library allocation
|
page read and write
|
||
1F1A68DB000
|
trusted library allocation
|
page read and write
|
||
1093000
|
heap
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F19FFE4000
|
trusted library allocation
|
page read and write
|
||
1F1A05A0000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F19F647000
|
trusted library allocation
|
page read and write
|
||
1F1A0533000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F1A058A000
|
trusted library allocation
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F1A96DB000
|
trusted library allocation
|
page read and write
|
||
1F19B08E000
|
trusted library allocation
|
page read and write
|
||
1F1A14D6000
|
trusted library allocation
|
page read and write
|
||
27141FF1000
|
heap
|
page read and write
|
||
D31B2BE000
|
unkown
|
page readonly
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F019F0B000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19B1BE000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F19F045000
|
trusted library allocation
|
page read and write
|
||
271411DA000
|
unkown
|
page execute read
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A0599000
|
trusted library allocation
|
page read and write
|
||
1F19EC36000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
27141FE8000
|
heap
|
page read and write
|
||
1F194E8D000
|
heap
|
page read and write
|
||
1F1A9523000
|
trusted library allocation
|
page read and write
|
||
1F1AA0CD000
|
trusted library allocation
|
page read and write
|
||
1F1A1526000
|
trusted library allocation
|
page read and write
|
||
1F19EDC3000
|
trusted library allocation
|
page read and write
|
||
1F1A95C7000
|
trusted library allocation
|
page read and write
|
||
1F19ED0D000
|
trusted library allocation
|
page read and write
|
||
1F19B8AB000
|
heap
|
page read and write
|
||
D31B23E000
|
unkown
|
page readonly
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F1AABE5000
|
trusted library allocation
|
page read and write
|
||
1F1A07DC000
|
trusted library allocation
|
page read and write
|
||
1F19F5E0000
|
trusted library allocation
|
page read and write
|
||
1F19F360000
|
trusted library allocation
|
page read and write
|
||
6F265FE000
|
stack
|
page read and write
|
||
1F1AA31C000
|
trusted library allocation
|
page read and write
|
||
1F19FE77000
|
trusted library allocation
|
page read and write
|
||
1F1A14D3000
|
trusted library allocation
|
page read and write
|
||
1F1A1898000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19ED80000
|
trusted library allocation
|
page read and write
|
||
1F19FDA1000
|
trusted library allocation
|
page read and write
|
||
1F194F11000
|
heap
|
page read and write
|
||
1F1AABDD000
|
trusted library allocation
|
page read and write
|
||
1F19F993000
|
trusted library allocation
|
page read and write
|
||
1F1A9FF1000
|
trusted library allocation
|
page read and write
|
||
1F1A61C2000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19ED89000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A0074000
|
trusted library allocation
|
page read and write
|
||
1F1A68CC000
|
trusted library allocation
|
page read and write
|
||
1F1A1898000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19ED25000
|
trusted library allocation
|
page read and write
|
||
1F1AA320000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A18CC000
|
trusted library allocation
|
page read and write
|
||
1F19F9B5000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F1A05B8000
|
trusted library allocation
|
page read and write
|
||
1F1A1893000
|
trusted library allocation
|
page read and write
|
||
1F1A63B6000
|
trusted library allocation
|
page read and write
|
||
1F19DD9A000
|
trusted library allocation
|
page read and write
|
||
1F19F9B1000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F1A08E8000
|
trusted library allocation
|
page read and write
|
||
1F19E675000
|
trusted library allocation
|
page read and write
|
||
1F019B90000
|
heap
|
page read and write
|
||
1F19EC25000
|
trusted library allocation
|
page read and write
|
||
1F19FF9B000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1AAB50000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F19B663000
|
trusted library allocation
|
page read and write
|
||
1F1A00A7000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F1A63E7000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1AA2B7000
|
trusted library allocation
|
page read and write
|
||
1F194EA6000
|
heap
|
page read and write
|
||
1F1A5FE1000
|
trusted library allocation
|
page read and write
|
||
1F199E23000
|
trusted library allocation
|
page read and write
|
||
D31B27E000
|
stack
|
page read and write
|
||
1F1A0A79000
|
trusted library allocation
|
page read and write
|
||
1F1A95AD000
|
trusted library allocation
|
page read and write
|
||
1F1A63E7000
|
trusted library allocation
|
page read and write
|
||
1F19B196000
|
trusted library allocation
|
page read and write
|
||
1F19DD90000
|
trusted library allocation
|
page read and write
|
||
1F1A06D8000
|
trusted library allocation
|
page read and write
|
||
271411D0000
|
unkown
|
page execute read
|
||
1F19DAE7000
|
trusted library allocation
|
page read and write
|
||
2A2F5D24000
|
trusted library allocation
|
page read and write
|
||
1F1A0644000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F1A1463000
|
trusted library allocation
|
page read and write
|
||
B5CCDFE000
|
stack
|
page read and write
|
||
1F194E99000
|
heap
|
page read and write
|
||
1E430F73000
|
heap
|
page read and write
|
||
1F1A1ED8000
|
trusted library allocation
|
page read and write
|
||
1F1A0B6C000
|
trusted library allocation
|
page read and write
|
||
27141F69000
|
heap
|
page read and write
|
||
1F19F01B000
|
trusted library allocation
|
page read and write
|
||
1F1AABED000
|
trusted library allocation
|
page read and write
|
||
1F194EA3000
|
heap
|
page read and write
|
||
271411F5000
|
unkown
|
page execute read
|
||
1F19F03D000
|
trusted library allocation
|
page read and write
|
||
2A2F5B6E000
|
remote allocation
|
page execute read
|
||
1F1A26C8000
|
trusted library allocation
|
page read and write
|
||
1F1A00C1000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
unkown
|
page readonly
|
||
1F1A18CF000
|
trusted library allocation
|
page read and write
|
||
1F19DFCE000
|
trusted library allocation
|
page read and write
|
||
1F1A68F1000
|
trusted library allocation
|
page read and write
|
||
1F19DDAC000
|
trusted library allocation
|
page read and write
|
||
1F019F2E000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F1A95CB000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
27141FE3000
|
heap
|
page read and write
|
||
1F19F4E7000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19F9B1000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F19FFC8000
|
trusted library allocation
|
page read and write
|
||
271411C0000
|
trusted library allocation
|
page read and write
|
||
1F19DF87000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F194E6E000
|
heap
|
page read and write
|
||
2714188E000
|
heap
|
page read and write
|
||
1F1A9531000
|
trusted library allocation
|
page read and write
|
||
27141F7F000
|
heap
|
page read and write
|
||
1F19EC06000
|
trusted library allocation
|
page read and write
|
||
1F1AAC99000
|
trusted library allocation
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F19B0A5000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F1A0484000
|
trusted library allocation
|
page read and write
|
||
1F19F5C9000
|
trusted library allocation
|
page read and write
|
||
1F19DF58000
|
trusted library allocation
|
page read and write
|
||
1F1A6898000
|
trusted library allocation
|
page read and write
|
||
1F1A6826000
|
trusted library allocation
|
page read and write
|
||
1F1A9554000
|
trusted library allocation
|
page read and write
|
||
1F1A63F9000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
unkown
|
page readonly
|
||
1F19F9AF000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F19ED84000
|
trusted library allocation
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F19EDCC000
|
trusted library allocation
|
page read and write
|
||
1F19ED54000
|
trusted library allocation
|
page read and write
|
||
106E000
|
heap
|
page read and write
|
||
1F1A0BC0000
|
trusted library allocation
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F19B0AC000
|
trusted library allocation
|
page read and write
|
||
2714203B000
|
heap
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1AA0A8000
|
trusted library allocation
|
page read and write
|
||
1F19ECC4000
|
trusted library allocation
|
page read and write
|
||
1F1AA4CE000
|
heap
|
page read and write
|
||
1F1A14DE000
|
trusted library allocation
|
page read and write
|
||
1F19B8B9000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F1A681F000
|
trusted library allocation
|
page read and write
|
||
1F1998BF000
|
trusted library allocation
|
page read and write
|
||
1F19FFAE000
|
trusted library allocation
|
page read and write
|
||
1F19F499000
|
trusted library allocation
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19B091000
|
trusted library allocation
|
page read and write
|
||
1F19FE00000
|
trusted library allocation
|
page read and write
|
||
1F1A05E7000
|
trusted library allocation
|
page read and write
|
||
1F1A14C0000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F1A6898000
|
trusted library allocation
|
page read and write
|
||
1F1A0009000
|
trusted library allocation
|
page read and write
|
||
1F19F52E000
|
trusted library allocation
|
page read and write
|
||
1F1A5F32000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F1A14F8000
|
trusted library allocation
|
page read and write
|
||
1F1A07C1000
|
trusted library allocation
|
page read and write
|
||
1F19DD78000
|
trusted library allocation
|
page read and write
|
||
1F19FF5F000
|
trusted library allocation
|
page read and write
|
||
1F1A2833000
|
trusted library allocation
|
page read and write
|
||
1F19DD50000
|
trusted library allocation
|
page read and write
|
||
1F1A7A05000
|
trusted library allocation
|
page read and write
|
||
1F1A147B000
|
trusted library allocation
|
page read and write
|
||
1F1A1EE4000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1AA435000
|
heap
|
page read and write
|
||
1F1A0032000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19FF67000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A61B7000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
2A2F5D5F000
|
trusted library allocation
|
page read and write
|
||
1F19FDF9000
|
trusted library allocation
|
page read and write
|
||
1F019BB0000
|
heap
|
page read and write
|
||
1F1A6882000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A62D2000
|
trusted library allocation
|
page read and write
|
||
1F1A0883000
|
trusted library allocation
|
page read and write
|
||
2A2F5AE0000
|
unclassified section
|
page readonly
|
||
1F19DA7A000
|
trusted library allocation
|
page read and write
|
||
1F194E77000
|
heap
|
page read and write
|
||
1F1A1473000
|
trusted library allocation
|
page read and write
|
||
27141FE8000
|
heap
|
page read and write
|
||
27140F80000
|
heap
|
page read and write
|
||
1F1A956F000
|
trusted library allocation
|
page read and write
|
||
1F19DFC4000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A63E7000
|
trusted library allocation
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F194EBA000
|
heap
|
page read and write
|
||
1F19FFE1000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
271413BA000
|
trusted library allocation
|
page read and write
|
||
1F19FE56000
|
trusted library allocation
|
page read and write
|
||
1F1A06DE000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
27141FF1000
|
heap
|
page read and write
|
||
1F19DFFC000
|
trusted library allocation
|
page read and write
|
||
1F1AACB4000
|
trusted library allocation
|
page read and write
|
||
2A2F5D15000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A07B9000
|
trusted library allocation
|
page read and write
|
||
3881000
|
heap
|
page read and write
|
||
1F19DFFC000
|
trusted library allocation
|
page read and write
|
||
1F1A1898000
|
trusted library allocation
|
page read and write
|
||
2A2F5D69000
|
trusted library allocation
|
page read and write
|
||
1F1A80A5000
|
trusted library allocation
|
page read and write
|
||
1F1A6600000
|
trusted library allocation
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F1A18C5000
|
trusted library allocation
|
page read and write
|
||
2A2F5DB2000
|
trusted library allocation
|
page read and write
|
||
1F19E63C000
|
trusted library allocation
|
page read and write
|
||
1F19DA72000
|
trusted library allocation
|
page read and write
|
||
1F19FD0E000
|
trusted library allocation
|
page read and write
|
||
1F19B0C0000
|
trusted library allocation
|
page read and write
|
||
1F1A60D5000
|
trusted library allocation
|
page read and write
|
||
1F1A14D6000
|
trusted library allocation
|
page read and write
|
||
1F1A000D000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19ED52000
|
trusted library allocation
|
page read and write
|
||
1F19EC46000
|
trusted library allocation
|
page read and write
|
||
1F1A80F8000
|
trusted library allocation
|
page read and write
|
||
1F1A14EB000
|
trusted library allocation
|
page read and write
|
||
1F1AA471000
|
heap
|
page read and write
|
||
1F19F4BC000
|
trusted library allocation
|
page read and write
|
||
1F1A79E5000
|
trusted library allocation
|
page read and write
|
||
1F19F6FD000
|
trusted library allocation
|
page read and write
|
||
1F1A2705000
|
trusted library allocation
|
page read and write
|
||
1F1A21F1000
|
trusted library allocation
|
page read and write
|
||
1F194F18000
|
heap
|
page read and write
|
||
1F1A05F0000
|
trusted library allocation
|
page read and write
|
||
1F1998B3000
|
trusted library allocation
|
page read and write
|
||
1F19EC0D000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F1A06F3000
|
trusted library allocation
|
page read and write
|
||
1F01A104000
|
heap
|
page read and write
|
||
27141312000
|
trusted library allocation
|
page read and write
|
||
1F1A14EB000
|
trusted library allocation
|
page read and write
|
||
1F19ED29000
|
trusted library allocation
|
page read and write
|
||
1F1A8EA8000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1AA3E7000
|
trusted library allocation
|
page read and write
|
||
1F1AABE9000
|
trusted library allocation
|
page read and write
|
||
1F1A0472000
|
trusted library allocation
|
page read and write
|
||
27141310000
|
trusted library allocation
|
page read and write
|
||
1F19DF6F000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F1A068E000
|
trusted library allocation
|
page read and write
|
||
1F1A06F3000
|
trusted library allocation
|
page read and write
|
||
1F1A148E000
|
trusted library allocation
|
page read and write
|
||
1F1A60CD000
|
trusted library allocation
|
page read and write
|
||
1F1A0A56000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1AA2F1000
|
trusted library allocation
|
page read and write
|
||
1F1A952F000
|
trusted library allocation
|
page read and write
|
||
1F19ED2C000
|
trusted library allocation
|
page read and write
|
||
1F1A80E8000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
unkown
|
page readonly
|
||
1E30000
|
heap
|
page read and write
|
||
1F1A6188000
|
trusted library allocation
|
page read and write
|
||
1F194E92000
|
heap
|
page read and write
|
||
1F199E71000
|
trusted library allocation
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
1F194EA3000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F01A102000
|
heap
|
page read and write
|
||
1F19B09A000
|
trusted library allocation
|
page read and write
|
||
2A2F5D72000
|
trusted library allocation
|
page read and write
|
||
1F1A996B000
|
trusted library allocation
|
page read and write
|
||
1F19F053000
|
trusted library allocation
|
page read and write
|
||
1F019CB3000
|
heap
|
page read and write
|
||
1F19B848000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F199F1A000
|
trusted library allocation
|
page read and write
|
||
1F1A00E8000
|
trusted library allocation
|
page read and write
|
||
1F19B1EB000
|
trusted library allocation
|
page read and write
|
||
1F19B6D5000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F1A9521000
|
trusted library allocation
|
page read and write
|
||
12A63091E000
|
trusted library allocation
|
page read and write
|
||
1F19DAA9000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A064E000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F1AABA9000
|
trusted library allocation
|
page read and write
|
||
1F19ECC8000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1AAC78000
|
trusted library allocation
|
page read and write
|
||
1F1AA46A000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A9591000
|
trusted library allocation
|
page read and write
|
||
27142058000
|
heap
|
page read and write
|
||
1F19ECBF000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A05B3000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A95D2000
|
trusted library allocation
|
page read and write
|
||
1F1A9087000
|
trusted library allocation
|
page read and write
|
||
1F19FDEE000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A1888000
|
trusted library allocation
|
page read and write
|
||
1F19FD39000
|
trusted library allocation
|
page read and write
|
||
1F19F038000
|
trusted library allocation
|
page read and write
|
||
1F1A907F000
|
trusted library allocation
|
page read and write
|
||
1F1A95AD000
|
trusted library allocation
|
page read and write
|
||
1F19F98C000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F1A00EE000
|
trusted library allocation
|
page read and write
|
||
1F1A00D2000
|
trusted library allocation
|
page read and write
|
||
2714136F000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19F5E7000
|
trusted library allocation
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F19F994000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19DD94000
|
trusted library allocation
|
page read and write
|
||
1F1A184F000
|
trusted library allocation
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19DD71000
|
trusted library allocation
|
page read and write
|
||
1F1A07B7000
|
trusted library allocation
|
page read and write
|
||
1F19B6CF000
|
trusted library allocation
|
page read and write
|
||
1F1AA082000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19DE65000
|
trusted library allocation
|
page read and write
|
||
1F19F4D9000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19B881000
|
heap
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F1A68C3000
|
trusted library allocation
|
page read and write
|
||
1F1A61B0000
|
trusted library allocation
|
page read and write
|
||
1F19E633000
|
trusted library allocation
|
page read and write
|
||
1F19E1F6000
|
trusted library allocation
|
page read and write
|
||
1F1A9F2B000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F1A27E4000
|
trusted library allocation
|
page read and write
|
||
1F1A9927000
|
trusted library allocation
|
page read and write
|
||
1F1A18CC000
|
trusted library allocation
|
page read and write
|
||
1F194F1B000
|
heap
|
page read and write
|
||
1F19FCE6000
|
trusted library allocation
|
page read and write
|
||
1F1A5F3C000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19FF8B000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1089000
|
heap
|
page read and write
|
||
1F19F00D000
|
trusted library allocation
|
page read and write
|
||
2A2F5E52000
|
unclassified section
|
page read and write
|
||
1F194F02000
|
heap
|
page read and write
|
||
1F1A0597000
|
trusted library allocation
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F19F548000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19F5D1000
|
trusted library allocation
|
page read and write
|
||
1F19F02C000
|
trusted library allocation
|
page read and write
|
||
1F1A0AFD000
|
trusted library allocation
|
page read and write
|
||
1F1AAC5C000
|
trusted library allocation
|
page read and write
|
||
1F19DF91000
|
trusted library allocation
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F19F9B1000
|
trusted library allocation
|
page read and write
|
||
1F1A6060000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
2A2F5B70000
|
unclassified section
|
page readonly
|
||
1F19FFCB000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A80B8000
|
trusted library allocation
|
page read and write
|
||
1F1A952F000
|
trusted library allocation
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F194E90000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19B8D3000
|
heap
|
page read and write
|
||
1F1A7B06000
|
trusted library allocation
|
page read and write
|
||
1F19B84B000
|
heap
|
page read and write
|
||
27141F60000
|
heap
|
page read and write
|
||
1F1AACAB000
|
trusted library allocation
|
page read and write
|
||
1F199881000
|
trusted library allocation
|
page read and write
|
||
1F019B43000
|
remote allocation
|
page execute read
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1AA366000
|
trusted library allocation
|
page read and write
|
||
1F194F10000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F19ECFB000
|
trusted library allocation
|
page read and write
|
||
1F1AAC5E000
|
trusted library allocation
|
page read and write
|
||
1F1A276D000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A61F7000
|
trusted library allocation
|
page read and write
|
||
1F19F9DC000
|
trusted library allocation
|
page read and write
|
||
1F1A62CC000
|
trusted library allocation
|
page read and write
|
||
1F1AAC66000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
2A2F5AF0000
|
unclassified section
|
page readonly
|
||
1F194F1B000
|
heap
|
page read and write
|
||
1F19ED56000
|
trusted library allocation
|
page read and write
|
||
1F1A9582000
|
trusted library allocation
|
page read and write
|
||
1F19E64D000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F01A01B000
|
trusted library allocation
|
page read and write
|
||
1089000
|
heap
|
page read and write
|
||
27141F00000
|
heap
|
page read and write
|
||
1F1A63E0000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1A9595000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19DE68000
|
trusted library allocation
|
page read and write
|
||
1F19F9DC000
|
trusted library allocation
|
page read and write
|
||
1F19F9DC000
|
trusted library allocation
|
page read and write
|
||
1F1A609B000
|
trusted library allocation
|
page read and write
|
||
1F1A27AC000
|
trusted library allocation
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F199F17000
|
trusted library allocation
|
page read and write
|
||
1F19F01B000
|
trusted library allocation
|
page read and write
|
||
1F19F03C000
|
trusted library allocation
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
974000
|
heap
|
page read and write
|
||
1F1A9944000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19F553000
|
trusted library allocation
|
page read and write
|
||
1F194EFA000
|
heap
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
1F19F03C000
|
trusted library allocation
|
page read and write
|
||
1F194E99000
|
heap
|
page read and write
|
||
1F1A90E1000
|
trusted library allocation
|
page read and write
|
||
271411E0000
|
heap
|
page read and write
|
||
1F19FFD9000
|
trusted library allocation
|
page read and write
|
||
1F1A00EA000
|
trusted library allocation
|
page read and write
|
||
1F1AABE5000
|
trusted library allocation
|
page read and write
|
||
1F19F6EA000
|
trusted library allocation
|
page read and write
|
||
1F1A2741000
|
trusted library allocation
|
page read and write
|
||
1F19FDF1000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19F9B3000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19B059000
|
trusted library allocation
|
page read and write
|
||
1F1A07AF000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F19EDA8000
|
trusted library allocation
|
page read and write
|
||
1F1A95BC000
|
trusted library allocation
|
page read and write
|
||
1F1AA05D000
|
trusted library allocation
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F19F02E000
|
trusted library allocation
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
2A2F5D82000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A055D000
|
trusted library allocation
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194F25000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F1A18BD000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1AA4BC000
|
heap
|
page read and write
|
||
1F1A994A000
|
trusted library allocation
|
page read and write
|
||
1F19AE2C000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F1A63DC000
|
trusted library allocation
|
page read and write
|
||
1F19F050000
|
trusted library allocation
|
page read and write
|
||
1F19DE3C000
|
trusted library allocation
|
page read and write
|
||
1F19F38F000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A0828000
|
trusted library allocation
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F19E653000
|
trusted library allocation
|
page read and write
|
||
1F19F5B1000
|
trusted library allocation
|
page read and write
|
||
1F19B8B5000
|
heap
|
page read and write
|
||
1F19ED91000
|
trusted library allocation
|
page read and write
|
||
1F1A62BE000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
27142044000
|
heap
|
page read and write
|
||
1F1A00C1000
|
trusted library allocation
|
page read and write
|
||
1F19E118000
|
trusted library allocation
|
page read and write
|
||
27141F60000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19F5C1000
|
trusted library allocation
|
page read and write
|
||
1F1A63BD000
|
trusted library allocation
|
page read and write
|
||
2A2F5D76000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A066C000
|
trusted library allocation
|
page read and write
|
||
1F1A63F1000
|
trusted library allocation
|
page read and write
|
||
1F1A96D7000
|
trusted library allocation
|
page read and write
|
||
27141300000
|
trusted library allocation
|
page read and write
|
||
1F1A952F000
|
trusted library allocation
|
page read and write
|
||
1F1A617B000
|
trusted library allocation
|
page read and write
|
||
1F194EAE000
|
heap
|
page read and write
|
||
1F19F707000
|
trusted library allocation
|
page read and write
|
||
1F1A7B2E000
|
trusted library allocation
|
page read and write
|
||
1F1A00EA000
|
trusted library allocation
|
page read and write
|
||
1F1A61B9000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F1A7B01000
|
trusted library allocation
|
page read and write
|
||
1F19DFBE000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1AA324000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F19DF8A000
|
trusted library allocation
|
page read and write
|
||
1F1A06DE000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F1A6835000
|
trusted library allocation
|
page read and write
|
||
1F19EDC8000
|
trusted library allocation
|
page read and write
|
||
1F1A0059000
|
trusted library allocation
|
page read and write
|
||
1F1A1851000
|
trusted library allocation
|
page read and write
|
||
1F194F16000
|
heap
|
page read and write
|
||
1F1A685C000
|
trusted library allocation
|
page read and write
|
||
1F1A0961000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F1A1890000
|
trusted library allocation
|
page read and write
|
||
1F19F0D5000
|
trusted library allocation
|
page read and write
|
||
1F19FDB3000
|
trusted library allocation
|
page read and write
|
||
108D000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A7A4D000
|
trusted library allocation
|
page read and write
|
||
1F19F5E4000
|
trusted library allocation
|
page read and write
|
||
1F019F10000
|
trusted library allocation
|
page read and write
|
||
1F19F02A000
|
trusted library allocation
|
page read and write
|
||
1F18FDEB000
|
heap
|
page read and write
|
||
1F1A14FA000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19FDEE000
|
trusted library allocation
|
page read and write
|
||
1F1A68AA000
|
trusted library allocation
|
page read and write
|
||
1F1A80B8000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19F4BD000
|
trusted library allocation
|
page read and write
|
||
1F1A1455000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19ED0A000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19F017000
|
trusted library allocation
|
page read and write
|
||
1F1AA2F3000
|
trusted library allocation
|
page read and write
|
||
1F19F4B5000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19FDF5000
|
trusted library allocation
|
page read and write
|
||
1F1A9100000
|
trusted library allocation
|
page read and write
|
||
1F1A9595000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F1AACBD000
|
trusted library allocation
|
page read and write
|
||
1F1A0438000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
2A2F5CE0000
|
heap
|
page read and write
|
||
1F1A6876000
|
trusted library allocation
|
page read and write
|
||
1F1A0083000
|
trusted library allocation
|
page read and write
|
||
1F19B23A000
|
trusted library allocation
|
page read and write
|
||
1F19F4C0000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194E6E000
|
heap
|
page read and write
|
||
1F19FFA7000
|
trusted library allocation
|
page read and write
|
||
1F1A1EC6000
|
trusted library allocation
|
page read and write
|
||
1F1A0475000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F19B8AB000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A0B70000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F19F558000
|
trusted library allocation
|
page read and write
|
||
1F1A09C7000
|
trusted library allocation
|
page read and write
|
||
1F19ED29000
|
trusted library allocation
|
page read and write
|
||
1F19ECC8000
|
trusted library allocation
|
page read and write
|
||
1F1A9937000
|
trusted library allocation
|
page read and write
|
||
1F19FF9E000
|
trusted library allocation
|
page read and write
|
||
1F19E10F000
|
trusted library allocation
|
page read and write
|
||
1F19FDA1000
|
trusted library allocation
|
page read and write
|
||
1F1A0BEB000
|
trusted library allocation
|
page read and write
|
||
1F1A002C000
|
trusted library allocation
|
page read and write
|
||
2714135C000
|
trusted library allocation
|
page read and write
|
||
1F194F11000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
271413CC000
|
trusted library allocation
|
page read and write
|
||
1F19F6B7000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19F02E000
|
trusted library allocation
|
page read and write
|
||
1F1A14D6000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F19B869000
|
heap
|
page read and write
|
||
1F19ED89000
|
trusted library allocation
|
page read and write
|
||
14DDB3B0000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F19DFC9000
|
trusted library allocation
|
page read and write
|
||
1F1A14C5000
|
trusted library allocation
|
page read and write
|
||
1F1A8098000
|
trusted library allocation
|
page read and write
|
||
1F19F4BC000
|
trusted library allocation
|
page read and write
|
||
27141F60000
|
heap
|
page read and write
|
||
1F1A686D000
|
trusted library allocation
|
page read and write
|
||
1F194EB6000
|
heap
|
page read and write
|
||
1F19B1F4000
|
trusted library allocation
|
page read and write
|
||
1F019FA4000
|
trusted library allocation
|
page read and write
|
||
1F194E97000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1AAC72000
|
trusted library allocation
|
page read and write
|
||
1F1A274D000
|
trusted library allocation
|
page read and write
|
||
1F1A689D000
|
trusted library allocation
|
page read and write
|
||
1F019FBA000
|
trusted library allocation
|
page read and write
|
||
1F19B8AF000
|
heap
|
page read and write
|
||
1F1A607E000
|
trusted library allocation
|
page read and write
|
||
1F19DF87000
|
trusted library allocation
|
page read and write
|
||
27142021000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19FE75000
|
trusted library allocation
|
page read and write
|
||
1F19F0D7000
|
trusted library allocation
|
page read and write
|
||
1F1A002C000
|
trusted library allocation
|
page read and write
|
||
1F19DE1F000
|
trusted library allocation
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19DF47000
|
trusted library allocation
|
page read and write
|
||
1F19DF8E000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F19FF9B000
|
trusted library allocation
|
page read and write
|
||
1F194EA3000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19DF5E000
|
trusted library allocation
|
page read and write
|
||
1F19B1DC000
|
trusted library allocation
|
page read and write
|
||
2A2F6300000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F194E71000
|
heap
|
page read and write
|
||
1F19DD61000
|
trusted library allocation
|
page read and write
|
||
1F1A2684000
|
trusted library allocation
|
page read and write
|
||
1F19FF67000
|
trusted library allocation
|
page read and write
|
||
B5CB3DE000
|
stack
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F1A95D8000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A05F0000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19ED99000
|
trusted library allocation
|
page read and write
|
||
1F19B822000
|
heap
|
page read and write
|
||
1F194E8D000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F19FDEE000
|
trusted library allocation
|
page read and write
|
||
1F19F5EF000
|
trusted library allocation
|
page read and write
|
||
1F1A0070000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A0533000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F199F26000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F19FD7C000
|
trusted library allocation
|
page read and write
|
||
1F1A60EA000
|
trusted library allocation
|
page read and write
|
||
1F1A0897000
|
trusted library allocation
|
page read and write
|
||
1F19F038000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19B1F6000
|
trusted library allocation
|
page read and write
|
||
1F1A0654000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F19DD9C000
|
trusted library allocation
|
page read and write
|
||
1F194E8D000
|
heap
|
page read and write
|
||
1F19ED89000
|
trusted library allocation
|
page read and write
|
||
1F19B882000
|
heap
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F19DF5E000
|
trusted library allocation
|
page read and write
|
||
1F19B1EB000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F19F5E7000
|
trusted library allocation
|
page read and write
|
||
1F19DD7C000
|
trusted library allocation
|
page read and write
|
||
1F1A18CF000
|
trusted library allocation
|
page read and write
|
||
1F19F9C1000
|
trusted library allocation
|
page read and write
|
||
1F19B17D000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F18FDC9000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
27141F60000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1E431370000
|
heap
|
page read and write
|
||
27140EF0000
|
unclassified section
|
page readonly
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F19FDFB000
|
trusted library allocation
|
page read and write
|
||
1F1A08E0000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19FFBB000
|
trusted library allocation
|
page read and write
|
||
1F19F5E4000
|
trusted library allocation
|
page read and write
|
||
1F1A90C4000
|
trusted library allocation
|
page read and write
|
||
27141F09000
|
heap
|
page read and write
|
||
1F19FF29000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F1A061B000
|
trusted library allocation
|
page read and write
|
||
1F1A04C7000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1AA3C3000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F19F4F8000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194EB8000
|
heap
|
page read and write
|
||
1F1A0BEF000
|
trusted library allocation
|
page read and write
|
||
1F19ED35000
|
trusted library allocation
|
page read and write
|
||
1F1A188A000
|
trusted library allocation
|
page read and write
|
||
1F19B881000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F19FF73000
|
trusted library allocation
|
page read and write
|
||
1F1A03FE000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
27141F01000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F19ED51000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194EFE000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
27142079000
|
heap
|
page read and write
|
||
1F19F591000
|
trusted library allocation
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F19DE6A000
|
trusted library allocation
|
page read and write
|
||
27141E2A000
|
trusted library allocation
|
page read and write
|
||
1F19DD45000
|
trusted library allocation
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F19FFD9000
|
trusted library allocation
|
page read and write
|
||
1F19E65A000
|
trusted library allocation
|
page read and write
|
||
1F1A63C5000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19ED89000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F1A212F000
|
trusted library allocation
|
page read and write
|
||
1F1AA406000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A0667000
|
trusted library allocation
|
page read and write
|
||
1F1A63B6000
|
trusted library allocation
|
page read and write
|
||
1F19FFA7000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1E430F6E000
|
heap
|
page read and write
|
||
1F19F04D000
|
trusted library allocation
|
page read and write
|
||
1F19ED44000
|
trusted library allocation
|
page read and write
|
||
1F1AA2E5000
|
trusted library allocation
|
page read and write
|
||
1E430EE0000
|
heap
|
page read and write
|
||
1F1A9543000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1AAC72000
|
trusted library allocation
|
page read and write
|
||
2A2F5B50000
|
remote allocation
|
page read and write
|
||
1F19E68F000
|
trusted library allocation
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
27141FAA000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F19FDE4000
|
trusted library allocation
|
page read and write
|
||
1F1A63E0000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A1877000
|
trusted library allocation
|
page read and write
|
||
1F1A09E8000
|
trusted library allocation
|
page read and write
|
||
1F19FFC1000
|
trusted library allocation
|
page read and write
|
||
1F19B1C7000
|
trusted library allocation
|
page read and write
|
||
1F19FDDA000
|
trusted library allocation
|
page read and write
|
||
1F1A63BA000
|
trusted library allocation
|
page read and write
|
||
1F1A0B95000
|
trusted library allocation
|
page read and write
|
||
1F019F5B000
|
trusted library allocation
|
page read and write
|
||
1F1A5FCF000
|
trusted library allocation
|
page read and write
|
||
1F1A96FC000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
27141F7D000
|
heap
|
page read and write
|
||
1F1AA446000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
2E9BDFE000
|
stack
|
page read and write
|
||
1F1AABF8000
|
trusted library allocation
|
page read and write
|
||
1F1A0B67000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F1A68D8000
|
trusted library allocation
|
page read and write
|
||
1F1A63F1000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F19E645000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1071000
|
heap
|
page read and write
|
||
1F19E65B000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F1A002A000
|
trusted library allocation
|
page read and write
|
||
1F19FDDA000
|
trusted library allocation
|
page read and write
|
||
1F19FDCF000
|
trusted library allocation
|
page read and write
|
||
1F1A80B0000
|
trusted library allocation
|
page read and write
|
||
1F1AABD5000
|
trusted library allocation
|
page read and write
|
||
1F1A8075000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A6188000
|
trusted library allocation
|
page read and write
|
||
27141F8A000
|
heap
|
page read and write
|
||
1F1A90DE000
|
trusted library allocation
|
page read and write
|
||
1F1A1879000
|
trusted library allocation
|
page read and write
|
||
1F194E93000
|
heap
|
page read and write
|
||
2714206D000
|
heap
|
page read and write
|
||
1F19F6EC000
|
trusted library allocation
|
page read and write
|
||
1F1A00EE000
|
trusted library allocation
|
page read and write
|
||
1F1A95D8000
|
trusted library allocation
|
page read and write
|
||
1F1A9F1A000
|
trusted library allocation
|
page read and write
|
||
1F19EC80000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F19ED51000
|
trusted library allocation
|
page read and write
|
||
1F1A63EC000
|
trusted library allocation
|
page read and write
|
||
1F1AA0CF000
|
trusted library allocation
|
page read and write
|
||
1F19FDF5000
|
trusted library allocation
|
page read and write
|
||
1F1A5F20000
|
trusted library allocation
|
page read and write
|
||
1F19B8B7000
|
heap
|
page read and write
|
||
1F1AAC5C000
|
trusted library allocation
|
page read and write
|
||
1F1A0582000
|
trusted library allocation
|
page read and write
|
||
1F1A9085000
|
trusted library allocation
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F1A188A000
|
trusted library allocation
|
page read and write
|
||
1F1A26A2000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
D31C2BE000
|
unkown
|
page readonly
|
||
2714135F000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F1A68F1000
|
trusted library allocation
|
page read and write
|
||
1F1A1898000
|
trusted library allocation
|
page read and write
|
||
1F19EC72000
|
trusted library allocation
|
page read and write
|
||
1F1AA03D000
|
trusted library allocation
|
page read and write
|
||
1F19B8A6000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F019AD0000
|
unclassified section
|
page readonly
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F19F053000
|
trusted library allocation
|
page read and write
|
||
1F1A1898000
|
trusted library allocation
|
page read and write
|
||
1F1AA3BB000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1AA076000
|
trusted library allocation
|
page read and write
|
||
1F19B87A000
|
heap
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F1A00BF000
|
trusted library allocation
|
page read and write
|
||
1F1A007C000
|
trusted library allocation
|
page read and write
|
||
1F194E9B000
|
heap
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F194EFC000
|
heap
|
page read and write
|
||
2714202C000
|
heap
|
page read and write
|
||
1F1A616A000
|
trusted library allocation
|
page read and write
|
||
1F1A681A000
|
trusted library allocation
|
page read and write
|
||
27141318000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19FFC8000
|
trusted library allocation
|
page read and write
|
||
1F1A05BF000
|
trusted library allocation
|
page read and write
|
||
1F19FFD4000
|
trusted library allocation
|
page read and write
|
||
27142077000
|
heap
|
page read and write
|
||
1F1A80B8000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F19DFB3000
|
trusted library allocation
|
page read and write
|
||
1F1A6383000
|
trusted library allocation
|
page read and write
|
||
1F19F702000
|
trusted library allocation
|
page read and write
|
||
1F19EDCC000
|
trusted library allocation
|
page read and write
|
||
1F1A18A9000
|
trusted library allocation
|
page read and write
|
||
1F1A09E4000
|
trusted library allocation
|
page read and write
|
||
2A2F5D11000
|
trusted library allocation
|
page read and write
|
||
27142058000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F19DE61000
|
trusted library allocation
|
page read and write
|
||
1F19E6B4000
|
trusted library allocation
|
page read and write
|
||
1F19F9C0000
|
trusted library allocation
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F19DD43000
|
trusted library allocation
|
page read and write
|
||
1F19F02F000
|
trusted library allocation
|
page read and write
|
||
1F19DFA7000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19F4C0000
|
trusted library allocation
|
page read and write
|
||
1F194E87000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F1A9F61000
|
trusted library allocation
|
page read and write
|
||
1F1A80C1000
|
trusted library allocation
|
page read and write
|
||
1F19B056000
|
trusted library allocation
|
page read and write
|
||
1F1A90AE000
|
trusted library allocation
|
page read and write
|
||
1F1A05A8000
|
trusted library allocation
|
page read and write
|
||
1F1A7A0C000
|
trusted library allocation
|
page read and write
|
||
2E9D7BE000
|
unkown
|
page readonly
|
||
B5CD63E000
|
unkown
|
page readonly
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A148E000
|
trusted library allocation
|
page read and write
|
||
1F19E661000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19FDCA000
|
trusted library allocation
|
page read and write
|
||
1F1A0036000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19E67A000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F1A8600000
|
trusted library allocation
|
page read and write
|
||
1F19ED91000
|
trusted library allocation
|
page read and write
|
||
1F1AA4CE000
|
heap
|
page read and write
|
||
14DDB260000
|
heap
|
page read and write
|
||
1F19FD43000
|
trusted library allocation
|
page read and write
|
||
1F19FD20000
|
trusted library allocation
|
page read and write
|
||
1F1A5F7F000
|
trusted library allocation
|
page read and write
|
||
1F19FCEE000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F1A6882000
|
trusted library allocation
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
1F1A62B9000
|
trusted library allocation
|
page read and write
|
||
1F19DF6C000
|
trusted library allocation
|
page read and write
|
||
1F1A07E8000
|
trusted library allocation
|
page read and write
|
||
1F19DA62000
|
trusted library allocation
|
page read and write
|
||
1F19ED11000
|
trusted library allocation
|
page read and write
|
||
1F19F4C4000
|
trusted library allocation
|
page read and write
|
||
1F19DC00000
|
trusted library allocation
|
page read and write
|
||
27141376000
|
trusted library allocation
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1092000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F19DE4B000
|
trusted library allocation
|
page read and write
|
||
1F19B097000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F1A2743000
|
trusted library allocation
|
page read and write
|
||
1F1A680B000
|
trusted library allocation
|
page read and write
|
||
1F1A0632000
|
trusted library allocation
|
page read and write
|
||
1F1A68BD000
|
trusted library allocation
|
page read and write
|
||
2A2F5DC4000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F1A6835000
|
trusted library allocation
|
page read and write
|
||
1F19DFDC000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F19F57F000
|
trusted library allocation
|
page read and write
|
||
1F19ED6E000
|
trusted library allocation
|
page read and write
|
||
1F1A7AA7000
|
trusted library allocation
|
page read and write
|
||
1F1A18CC000
|
trusted library allocation
|
page read and write
|
||
27141F9C000
|
heap
|
page read and write
|
||
2A2F5D03000
|
trusted library allocation
|
page read and write
|
||
1F1A6180000
|
trusted library allocation
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1AAC60000
|
trusted library allocation
|
page read and write
|
||
1F1A188A000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
27141FED000
|
heap
|
page read and write
|
||
1F1A68D5000
|
trusted library allocation
|
page read and write
|
||
1093000
|
heap
|
page read and write
|
||
1F1AAC8D000
|
trusted library allocation
|
page read and write
|
||
1F1A14FA000
|
trusted library allocation
|
page read and write
|
||
1F199F7E000
|
trusted library allocation
|
page read and write
|
||
1F19B056000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19FAF3000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1AA0B8000
|
trusted library allocation
|
page read and write
|
||
1F1A80FD000
|
trusted library allocation
|
page read and write
|
||
1F19FF3B000
|
trusted library allocation
|
page read and write
|
||
27141FE9000
|
heap
|
page read and write
|
||
1F19F038000
|
trusted library allocation
|
page read and write
|
||
1F194E8D000
|
heap
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F19F00A000
|
trusted library allocation
|
page read and write
|
||
1F19B869000
|
heap
|
page read and write
|
||
1F1A0584000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A5F2E000
|
trusted library allocation
|
page read and write
|
||
1F1A066C000
|
trusted library allocation
|
page read and write
|
||
1F1A06E4000
|
trusted library allocation
|
page read and write
|
||
1F1A9C1A000
|
trusted library allocation
|
page read and write
|
||
1F19F579000
|
trusted library allocation
|
page read and write
|
||
1F1A62CC000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F19AE4F000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F1A7AC5000
|
trusted library allocation
|
page read and write
|
||
2714202B000
|
heap
|
page read and write
|
||
1F19F9CB000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F1AABC5000
|
trusted library allocation
|
page read and write
|
||
1F1A99E8000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19FE84000
|
trusted library allocation
|
page read and write
|
||
1F1A9F1A000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F019F03000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F19FF1B000
|
trusted library allocation
|
page read and write
|
||
1F1AA0CD000
|
trusted library allocation
|
page read and write
|
||
1F19F9AD000
|
trusted library allocation
|
page read and write
|
||
1F19DE53000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F019F92000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19DFAA000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19DE68000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A1896000
|
trusted library allocation
|
page read and write
|
||
1F1AA435000
|
heap
|
page read and write
|
||
1F19F4C5000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
14DDB600000
|
trusted library allocation
|
page read and write
|
||
1F19DE49000
|
trusted library allocation
|
page read and write
|
||
1F19DF3B000
|
trusted library allocation
|
page read and write
|
||
1F1A6269000
|
trusted library allocation
|
page read and write
|
||
1F1A7A6D000
|
trusted library allocation
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F1A1EB2000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
unkown
|
page readonly
|
||
1F1AACC2000
|
trusted library allocation
|
page read and write
|
||
1F01A003000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F1A14CB000
|
trusted library allocation
|
page read and write
|
||
1F19DFB8000
|
trusted library allocation
|
page read and write
|
||
1F194EF6000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19AE49000
|
trusted library allocation
|
page read and write
|
||
1F019C70000
|
heap
|
page read and write
|
||
1F1A63F1000
|
trusted library allocation
|
page read and write
|
||
1F194F0F000
|
heap
|
page read and write
|
||
27141110000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F19B848000
|
heap
|
page read and write
|
||
1F19F4DC000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F1A1890000
|
trusted library allocation
|
page read and write
|
||
1F019F7B000
|
trusted library allocation
|
page read and write
|
||
27141FE0000
|
heap
|
page read and write
|
||
1F19F031000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F19F01D000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F19E63F000
|
trusted library allocation
|
page read and write
|
||
1F19EC58000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F1A0470000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F19DFC4000
|
trusted library allocation
|
page read and write
|
||
1F19FDDE000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
27141F6C000
|
heap
|
page read and write
|
||
1F1AA427000
|
heap
|
page read and write
|
||
1F19FD05000
|
trusted library allocation
|
page read and write
|
||
1F19F9BB000
|
trusted library allocation
|
page read and write
|
||
1F1A6182000
|
trusted library allocation
|
page read and write
|
||
1F1A63E7000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A968D000
|
trusted library allocation
|
page read and write
|
||
1F19EDC8000
|
trusted library allocation
|
page read and write
|
||
1F19E6C1000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19ED84000
|
trusted library allocation
|
page read and write
|
||
1F19F9CB000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A08DE000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A03F6000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19DA7C000
|
trusted library allocation
|
page read and write
|
||
27141970000
|
trusted library allocation
|
page read and write
|
||
27142077000
|
heap
|
page read and write
|
||
1F1AA0AF000
|
trusted library allocation
|
page read and write
|
||
1F19B669000
|
trusted library allocation
|
page read and write
|
||
1F194E87000
|
heap
|
page read and write
|
||
1F19B17D000
|
trusted library allocation
|
page read and write
|
||
27142044000
|
heap
|
page read and write
|
||
1F19ED74000
|
trusted library allocation
|
page read and write
|
||
1F19FE30000
|
trusted library allocation
|
page read and write
|
||
1F19FF2E000
|
trusted library allocation
|
page read and write
|
||
1F1A057A000
|
trusted library allocation
|
page read and write
|
||
1F19B1BC000
|
trusted library allocation
|
page read and write
|
||
1F19B8B5000
|
heap
|
page read and write
|
||
1F19F9C0000
|
trusted library allocation
|
page read and write
|
||
1F19ED76000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A68BB000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
FEF000
|
stack
|
page read and write
|
||
1F194E71000
|
heap
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
1F1A9596000
|
trusted library allocation
|
page read and write
|
||
1F19F4B3000
|
trusted library allocation
|
page read and write
|
||
1F1A63E7000
|
trusted library allocation
|
page read and write
|
||
1F1A18C5000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19FDDE000
|
trusted library allocation
|
page read and write
|
||
1F194E77000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F19DDF3000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A084A000
|
trusted library allocation
|
page read and write
|
||
27141FE9000
|
heap
|
page read and write
|
||
1F1A18CC000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19F9B7000
|
trusted library allocation
|
page read and write
|
||
1F19DD71000
|
trusted library allocation
|
page read and write
|
||
1F19FF43000
|
trusted library allocation
|
page read and write
|
||
1F1A00E8000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1AA042000
|
trusted library allocation
|
page read and write
|
||
1F19F70A000
|
trusted library allocation
|
page read and write
|
||
1F019FB1000
|
trusted library allocation
|
page read and write
|
||
1F1AA0D1000
|
trusted library allocation
|
page read and write
|
||
1F19ED74000
|
trusted library allocation
|
page read and write
|
||
1F19FCAE000
|
trusted library allocation
|
page read and write
|
||
1F19F04B000
|
trusted library allocation
|
page read and write
|
||
1F1A18C2000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F19ECC8000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F19EDCC000
|
trusted library allocation
|
page read and write
|
||
1F19F00F000
|
trusted library allocation
|
page read and write
|
||
1F19F5CF000
|
trusted library allocation
|
page read and write
|
||
1F19F4B9000
|
trusted library allocation
|
page read and write
|
||
1F1A80FD000
|
trusted library allocation
|
page read and write
|
||
1F19F004000
|
trusted library allocation
|
page read and write
|
||
1F1A03FE000
|
trusted library allocation
|
page read and write
|
||
1F1A63C5000
|
trusted library allocation
|
page read and write
|
||
1F19ED84000
|
trusted library allocation
|
page read and write
|
||
1F19ECC4000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
1F1A6835000
|
trusted library allocation
|
page read and write
|
||
1F19B8A6000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F199F26000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19ED2C000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F1A95AD000
|
trusted library allocation
|
page read and write
|
||
1F1A1895000
|
trusted library allocation
|
page read and write
|
||
1F1A18E6000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A1E8E000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F019F70000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F1A9081000
|
trusted library allocation
|
page read and write
|
||
1F19B66B000
|
trusted library allocation
|
page read and write
|
||
27141374000
|
trusted library allocation
|
page read and write
|
||
1F19FDFB000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F1A14C0000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F19FF31000
|
trusted library allocation
|
page read and write
|
||
1E430F80000
|
heap
|
page read and write
|
||
1F19FFBB000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F19ED40000
|
trusted library allocation
|
page read and write
|
||
1F1A0B9F000
|
trusted library allocation
|
page read and write
|
||
1F19DFBE000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A9FAC000
|
trusted library allocation
|
page read and write
|
||
1F19DFC4000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1AA2DD000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A9946000
|
trusted library allocation
|
page read and write
|
||
1F1A05B3000
|
trusted library allocation
|
page read and write
|
||
1F1A18CC000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F1A099F000
|
trusted library allocation
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F1A1891000
|
trusted library allocation
|
page read and write
|
||
1F1A61B2000
|
trusted library allocation
|
page read and write
|
||
1F19F482000
|
trusted library allocation
|
page read and write
|
||
1F1A6830000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F19F0E0000
|
trusted library allocation
|
page read and write
|
||
1F1A18B3000
|
trusted library allocation
|
page read and write
|
||
1F1A0BD4000
|
trusted library allocation
|
page read and write
|
||
1F19DFD8000
|
trusted library allocation
|
page read and write
|
||
1F19B822000
|
heap
|
page read and write
|
||
1F194E87000
|
heap
|
page read and write
|
||
1F1A9583000
|
trusted library allocation
|
page read and write
|
||
1F1A05E1000
|
trusted library allocation
|
page read and write
|
||
1F1A1890000
|
trusted library allocation
|
page read and write
|
||
1F1A0653000
|
trusted library allocation
|
page read and write
|
||
1F19B076000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A9590000
|
trusted library allocation
|
page read and write
|
||
1F1A18B3000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F1A0623000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A95C0000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F1A00C8000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F1A07FB000
|
trusted library allocation
|
page read and write
|
||
1F19A000000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19F9F4000
|
trusted library allocation
|
page read and write
|
||
1F19F54A000
|
trusted library allocation
|
page read and write
|
||
1F194EB6000
|
heap
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F1A5FB4000
|
trusted library allocation
|
page read and write
|
||
1F19F03C000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F19DE8C000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E83000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A0475000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A00C1000
|
trusted library allocation
|
page read and write
|
||
1F19FD79000
|
trusted library allocation
|
page read and write
|
||
1F19B19A000
|
trusted library allocation
|
page read and write
|
||
1F19DAA2000
|
trusted library allocation
|
page read and write
|
||
1F19ED80000
|
trusted library allocation
|
page read and write
|
||
1F19EDC8000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A1EF9000
|
trusted library allocation
|
page read and write
|
||
1F194E99000
|
heap
|
page read and write
|
||
1F1AA2B3000
|
trusted library allocation
|
page read and write
|
||
1F19B663000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A0B8E000
|
trusted library allocation
|
page read and write
|
||
1F1A60D7000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F1A689D000
|
trusted library allocation
|
page read and write
|
||
1F19DFFC000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A14C0000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F19FE09000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F19E15C000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1C3F000
|
stack
|
page read and write
|
||
7EC000
|
unkown
|
page write copy
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F19DA63000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19B8A6000
|
heap
|
page read and write
|
||
3881000
|
heap
|
page read and write
|
||
1F1A80C1000
|
trusted library allocation
|
page read and write
|
||
1F1A9543000
|
trusted library allocation
|
page read and write
|
||
1F19B1AA000
|
trusted library allocation
|
page read and write
|
||
107C000
|
heap
|
page read and write
|
||
1F1AAC64000
|
trusted library allocation
|
page read and write
|
||
1F194EBE000
|
heap
|
page read and write
|
||
1F19B8A3000
|
heap
|
page read and write
|
||
1F1AAB76000
|
trusted library allocation
|
page read and write
|
||
1F1AA366000
|
trusted library allocation
|
page read and write
|
||
1F1A616A000
|
trusted library allocation
|
page read and write
|
||
27141F8D000
|
heap
|
page read and write
|
||
1F1AA0CD000
|
trusted library allocation
|
page read and write
|
||
1F1A18C3000
|
trusted library allocation
|
page read and write
|
||
1F019C20000
|
heap
|
page read and write
|
||
27141348000
|
trusted library allocation
|
page read and write
|
||
1F1A7B2C000
|
trusted library allocation
|
page read and write
|
||
1F1A9523000
|
trusted library allocation
|
page read and write
|
||
1F1A1847000
|
trusted library allocation
|
page read and write
|
||
1F1A80F8000
|
trusted library allocation
|
page read and write
|
||
1F1A1461000
|
trusted library allocation
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F1A61B7000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A63E0000
|
trusted library allocation
|
page read and write
|
||
1F19DA74000
|
trusted library allocation
|
page read and write
|
||
1F1AAC99000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A8079000
|
trusted library allocation
|
page read and write
|
||
1F194EB0000
|
heap
|
page read and write
|
||
1F19DFBB000
|
trusted library allocation
|
page read and write
|
||
1F19DFCC000
|
trusted library allocation
|
page read and write
|
||
27141F60000
|
heap
|
page read and write
|
||
1F1AACC4000
|
trusted library allocation
|
page read and write
|
||
271413C6000
|
trusted library allocation
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F19F6B3000
|
trusted library allocation
|
page read and write
|
||
1F1A18C5000
|
trusted library allocation
|
page read and write
|
||
1F19F67C000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F1A96B7000
|
trusted library allocation
|
page read and write
|
||
1F19FDC8000
|
trusted library allocation
|
page read and write
|
||
1F1A63A7000
|
trusted library allocation
|
page read and write
|
||
1F1A689D000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19B8AB000
|
heap
|
page read and write
|
||
1F194E71000
|
heap
|
page read and write
|
||
1F1AABC7000
|
trusted library allocation
|
page read and write
|
||
1F194F26000
|
heap
|
page read and write
|
||
1F194F10000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F19B0A5000
|
trusted library allocation
|
page read and write
|
||
1F1A055D000
|
trusted library allocation
|
page read and write
|
||
1F1AA4D1000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A148E000
|
trusted library allocation
|
page read and write
|
||
1F1AAB60000
|
trusted library allocation
|
page read and write
|
||
1F194E83000
|
heap
|
page read and write
|
||
1F19F038000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F19DE53000
|
trusted library allocation
|
page read and write
|
||
1F1A08AC000
|
trusted library allocation
|
page read and write
|
||
1F1AA0B8000
|
trusted library allocation
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F1AA0DF000
|
trusted library allocation
|
page read and write
|
||
106A000
|
heap
|
page read and write
|
||
1F19DD9A000
|
trusted library allocation
|
page read and write
|
||
1F1A6188000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F019F6E000
|
trusted library allocation
|
page read and write
|
||
7EC000
|
unkown
|
page read and write
|
||
27142058000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F19B89D000
|
heap
|
page read and write
|
||
1F1AA2F3000
|
trusted library allocation
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F01A012000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F19ECC8000
|
trusted library allocation
|
page read and write
|
||
1F019FE7000
|
trusted library allocation
|
page read and write
|
||
1F19B19D000
|
trusted library allocation
|
page read and write
|
||
1F19F527000
|
trusted library allocation
|
page read and write
|
||
1F1A18B3000
|
trusted library allocation
|
page read and write
|
||
1F19F98F000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F1A046B000
|
trusted library allocation
|
page read and write
|
||
1F1A6174000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A61C2000
|
trusted library allocation
|
page read and write
|
||
1F1AACB4000
|
trusted library allocation
|
page read and write
|
||
1F19F04A000
|
trusted library allocation
|
page read and write
|
||
1F1A1A02000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A0616000
|
trusted library allocation
|
page read and write
|
||
1F1A0BD0000
|
trusted library allocation
|
page read and write
|
||
2A2F5D00000
|
trusted library allocation
|
page read and write
|
||
1F19FD76000
|
trusted library allocation
|
page read and write
|
||
1F1A0B87000
|
trusted library allocation
|
page read and write
|
||
27141F4D000
|
heap
|
page read and write
|
||
1F19B8B6000
|
heap
|
page read and write
|
||
1F1A18A9000
|
trusted library allocation
|
page read and write
|
||
1F19DD5E000
|
trusted library allocation
|
page read and write
|
||
1F19F5D1000
|
trusted library allocation
|
page read and write
|
||
1F19DE65000
|
trusted library allocation
|
page read and write
|
||
27141090000
|
heap
|
page read and write
|
||
1F1A00AB000
|
trusted library allocation
|
page read and write
|
||
27141385000
|
trusted library allocation
|
page read and write
|
||
1F1A008E000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1AA0D7000
|
trusted library allocation
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F1A5F00000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A9087000
|
trusted library allocation
|
page read and write
|
||
1F1A6194000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A7B33000
|
trusted library allocation
|
page read and write
|
||
1F19B895000
|
heap
|
page read and write
|
||
1F19ECF9000
|
trusted library allocation
|
page read and write
|
||
1F19FCE2000
|
trusted library allocation
|
page read and write
|
||
27141980000
|
unkown
|
page execute read
|
||
1F19F9C5000
|
trusted library allocation
|
page read and write
|
||
1F19B84B000
|
heap
|
page read and write
|
||
1F1A0667000
|
trusted library allocation
|
page read and write
|
||
1F1A1864000
|
trusted library allocation
|
page read and write
|
||
1F1A5FD6000
|
trusted library allocation
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
1F1A0484000
|
trusted library allocation
|
page read and write
|
||
1F1A68AA000
|
trusted library allocation
|
page read and write
|
||
1F1A5F7F000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F1A0842000
|
trusted library allocation
|
page read and write
|
||
1F19EC78000
|
trusted library allocation
|
page read and write
|
||
1F1A7AAC000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
27141F63000
|
heap
|
page read and write
|
||
1F19FDEE000
|
trusted library allocation
|
page read and write
|
||
1F1998C5000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
27141323000
|
trusted library allocation
|
page read and write
|
||
1F1A18A9000
|
trusted library allocation
|
page read and write
|
||
1900DFC000
|
stack
|
page read and write
|
||
1F19FD5C000
|
trusted library allocation
|
page read and write
|
||
1F1A95C0000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A7A48000
|
trusted library allocation
|
page read and write
|
||
1F194EFA000
|
heap
|
page read and write
|
||
1F199F66000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1A148C000
|
trusted library allocation
|
page read and write
|
||
1F1A0BAF000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A0564000
|
trusted library allocation
|
page read and write
|
||
1F1A05BA000
|
trusted library allocation
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F199FE4000
|
trusted library allocation
|
page read and write
|
||
27141FF2000
|
heap
|
page read and write
|
||
1F19F984000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F19E63A000
|
trusted library allocation
|
page read and write
|
||
1F19F9AF000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E77000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1A969B000
|
trusted library allocation
|
page read and write
|
||
1F19F560000
|
trusted library allocation
|
page read and write
|
||
1F19F0CA000
|
trusted library allocation
|
page read and write
|
||
1F194F11000
|
heap
|
page read and write
|
||
1F19B882000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194E90000
|
heap
|
page read and write
|
||
1F19B6CF000
|
trusted library allocation
|
page read and write
|
||
1F1A991F000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A0BCA000
|
trusted library allocation
|
page read and write
|
||
1F19DF87000
|
trusted library allocation
|
page read and write
|
||
1F19F5D4000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A18C2000
|
trusted library allocation
|
page read and write
|
||
1F19FF59000
|
trusted library allocation
|
page read and write
|
||
1F19DD7C000
|
trusted library allocation
|
page read and write
|
||
2E9E7BE000
|
unkown
|
page readonly
|
||
1F194E8D000
|
heap
|
page read and write
|
||
1F19FD3C000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19F017000
|
trusted library allocation
|
page read and write
|
||
1F19ED1D000
|
trusted library allocation
|
page read and write
|
||
1F1A09FC000
|
trusted library allocation
|
page read and write
|
||
1F194E77000
|
heap
|
page read and write
|
||
1F1A9564000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F1A08CD000
|
trusted library allocation
|
page read and write
|
||
1F1A9555000
|
trusted library allocation
|
page read and write
|
||
1F19F4E2000
|
trusted library allocation
|
page read and write
|
||
1F19F053000
|
trusted library allocation
|
page read and write
|
||
1F19F59E000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19F4A4000
|
trusted library allocation
|
page read and write
|
||
1F19FDCB000
|
trusted library allocation
|
page read and write
|
||
1F1AA06B000
|
trusted library allocation
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F19F58D000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194EFA000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A07A3000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F19B1DC000
|
trusted library allocation
|
page read and write
|
||
1F19F4C8000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F019CB0000
|
heap
|
page read and write
|
||
1F194E71000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EFE000
|
heap
|
page read and write
|
||
1F1A095F000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19DD97000
|
trusted library allocation
|
page read and write
|
||
1F19ED8F000
|
trusted library allocation
|
page read and write
|
||
1F19F9BE000
|
trusted library allocation
|
page read and write
|
||
1F19FF71000
|
trusted library allocation
|
page read and write
|
||
1F19ED99000
|
trusted library allocation
|
page read and write
|
||
1F19F46B000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A05F7000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F1A07D6000
|
trusted library allocation
|
page read and write
|
||
1F194E71000
|
heap
|
page read and write
|
||
1F19DFBE000
|
trusted library allocation
|
page read and write
|
||
1F19FD23000
|
trusted library allocation
|
page read and write
|
||
1F1A80E8000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A18CF000
|
trusted library allocation
|
page read and write
|
||
6F25DFE000
|
stack
|
page read and write
|
||
1F1A14D3000
|
trusted library allocation
|
page read and write
|
||
1F19FE39000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F1A96C3000
|
trusted library allocation
|
page read and write
|
||
1F194E70000
|
heap
|
page read and write
|
||
1F1A0455000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
D3199D8000
|
stack
|
page read and write
|
||
1F194E8D000
|
heap
|
page read and write
|
||
1F019F00000
|
trusted library allocation
|
page read and write
|
||
1F1AA2AF000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F194EFA000
|
heap
|
page read and write
|
||
D318FDD000
|
stack
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F1A63EC000
|
trusted library allocation
|
page read and write
|
||
1F19F48B000
|
trusted library allocation
|
page read and write
|
||
1F194EF6000
|
heap
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F19F54E000
|
trusted library allocation
|
page read and write
|
||
1F1A61C2000
|
trusted library allocation
|
page read and write
|
||
1E430EC0000
|
heap
|
page read and write
|
||
1F19B089000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19E1A8000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F1AACBD000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A68F9000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A06F3000
|
trusted library allocation
|
page read and write
|
||
1F19F3EB000
|
trusted library allocation
|
page read and write
|
||
1F19B097000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F1A05DC000
|
trusted library allocation
|
page read and write
|
||
1F1A6258000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F019B30000
|
remote allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1F19DE65000
|
trusted library allocation
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
14DDB590000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F1A6830000
|
trusted library allocation
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
2A2F5D18000
|
trusted library allocation
|
page read and write
|
||
1F19F9FD000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
108E000
|
heap
|
page read and write
|
||
1F19B14E000
|
trusted library allocation
|
page read and write
|
||
1F1A06E4000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A0B7C000
|
trusted library allocation
|
page read and write
|
||
1F1A0425000
|
trusted library allocation
|
page read and write
|
||
1F19DE59000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F1A620D000
|
trusted library allocation
|
page read and write
|
||
1F194EFA000
|
heap
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F194E90000
|
heap
|
page read and write
|
||
1F19FDB3000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19EDB8000
|
trusted library allocation
|
page read and write
|
||
1F19E635000
|
trusted library allocation
|
page read and write
|
||
1F194F0F000
|
heap
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
D318F9E000
|
unkown
|
page readonly
|
||
1F19EC58000
|
trusted library allocation
|
page read and write
|
||
2A2F630C000
|
trusted library allocation
|
page read and write
|
||
1F194F18000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194F15000
|
heap
|
page read and write
|
||
1F1A68C5000
|
trusted library allocation
|
page read and write
|
||
2A2F5F00000
|
trusted library allocation
|
page read and write
|
||
1F1A63AE000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A7A41000
|
trusted library allocation
|
page read and write
|
||
1F1A9F46000
|
trusted library allocation
|
page read and write
|
||
1F1A61BA000
|
trusted library allocation
|
page read and write
|
||
1F1AA4CE000
|
heap
|
page read and write
|
||
1F19F989000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1AA4CE000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F1AA03D000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19EDB9000
|
trusted library allocation
|
page read and write
|
||
1F1A63F9000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A0075000
|
trusted library allocation
|
page read and write
|
||
1F194EB0000
|
heap
|
page read and write
|
||
3881000
|
heap
|
page read and write
|
||
1F19E66F000
|
trusted library allocation
|
page read and write
|
||
1F19ED1F000
|
trusted library allocation
|
page read and write
|
||
1F19F3C4000
|
trusted library allocation
|
page read and write
|
||
271410E0000
|
heap
|
page readonly
|
||
1F1A0834000
|
trusted library allocation
|
page read and write
|
||
1F1A098F000
|
trusted library allocation
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
1F1A6807000
|
trusted library allocation
|
page read and write
|
||
1F19DA1D000
|
trusted library allocation
|
page read and write
|
||
1F019F79000
|
trusted library allocation
|
page read and write
|
||
1F19FF68000
|
trusted library allocation
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F1A0723000
|
trusted library allocation
|
page read and write
|
||
1F1A6898000
|
trusted library allocation
|
page read and write
|
||
1F1A9927000
|
trusted library allocation
|
page read and write
|
||
1F1A14CB000
|
trusted library allocation
|
page read and write
|
||
271419D0000
|
heap
|
page read and write
|
||
1F19E18D000
|
trusted library allocation
|
page read and write
|
||
1F19F5CF000
|
trusted library allocation
|
page read and write
|
||
1F1A0958000
|
trusted library allocation
|
page read and write
|
||
1F1A1896000
|
trusted library allocation
|
page read and write
|
||
1F19FF8D000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A5F9D000
|
trusted library allocation
|
page read and write
|
||
1F19DFBB000
|
trusted library allocation
|
page read and write
|
||
1F19B848000
|
heap
|
page read and write
|
||
1F1AAC8D000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19DE8E000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19FCD2000
|
trusted library allocation
|
page read and write
|
||
1F1A61CE000
|
trusted library allocation
|
page read and write
|
||
14DDB400000
|
trusted library allocation
|
page read and write
|
||
1F1A955E000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
2A2F5DDB000
|
trusted library allocation
|
page read and write
|
||
1F194F1B000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
27142077000
|
heap
|
page read and write
|
||
1F194E8D000
|
heap
|
page read and write
|
||
1F01A00C000
|
trusted library allocation
|
page read and write
|
||
1F19F02A000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F19FDCA000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F1A1876000
|
trusted library allocation
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A63BD000
|
trusted library allocation
|
page read and write
|
||
1F1A5F3B000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F1A80B4000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19F4FA000
|
trusted library allocation
|
page read and write
|
||
1F1A00AC000
|
trusted library allocation
|
page read and write
|
||
1F19B84B000
|
heap
|
page read and write
|
||
1F1A1855000
|
trusted library allocation
|
page read and write
|
||
D31A9FE000
|
stack
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F194EAB000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
1F1A07AF000
|
trusted library allocation
|
page read and write
|
||
1F194F1C000
|
heap
|
page read and write
|
||
1F1A61C2000
|
trusted library allocation
|
page read and write
|
||
1F1A8079000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
2A2F5D70000
|
trusted library allocation
|
page read and write
|
||
1F19DF5E000
|
trusted library allocation
|
page read and write
|
||
27142058000
|
heap
|
page read and write
|
||
1F1A186E000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A0036000
|
trusted library allocation
|
page read and write
|
||
1F19F4AE000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F19FEFB000
|
trusted library allocation
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F1A809D000
|
trusted library allocation
|
page read and write
|
||
1F1A9F23000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F194E9E000
|
heap
|
page read and write
|
||
1F19F0CD000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
3880000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19F9BE000
|
trusted library allocation
|
page read and write
|
||
1F1AA462000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F1A26E5000
|
trusted library allocation
|
page read and write
|
||
1F1A991F000
|
trusted library allocation
|
page read and write
|
||
1F194EA8000
|
heap
|
page read and write
|
||
1F1A05AD000
|
trusted library allocation
|
page read and write
|
||
1F1A1877000
|
trusted library allocation
|
page read and write
|
||
1F1A80F8000
|
trusted library allocation
|
page read and write
|
||
2A2F5D64000
|
trusted library allocation
|
page read and write
|
||
14DDB370000
|
heap
|
page read and write
|
||
1F1A0592000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F19FED9000
|
trusted library allocation
|
page read and write
|
||
1F19DF85000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A60C0000
|
trusted library allocation
|
page read and write
|
||
27141303000
|
trusted library allocation
|
page read and write
|
||
27141070000
|
heap
|
page read and write
|
||
1F1AAC47000
|
trusted library allocation
|
page read and write
|
||
1F194EFD000
|
heap
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F1A003D000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A066C000
|
trusted library allocation
|
page read and write
|
||
1F19F5E4000
|
trusted library allocation
|
page read and write
|
||
1F19FD10000
|
trusted library allocation
|
page read and write
|
||
1F1A18A9000
|
trusted library allocation
|
page read and write
|
||
1F19DF4C000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1AACAB000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19989E000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
2A2F6207000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F1A21B3000
|
trusted library allocation
|
page read and write
|
||
1F1A907D000
|
trusted library allocation
|
page read and write
|
||
1F19F02E000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F19FDB6000
|
trusted library allocation
|
page read and write
|
||
1F19E62C000
|
trusted library allocation
|
page read and write
|
||
271411D5000
|
unkown
|
page execute read
|
||
1F1A68D1000
|
trusted library allocation
|
page read and write
|
||
1F194EFD000
|
heap
|
page read and write
|
||
1F1A68C3000
|
trusted library allocation
|
page read and write
|
||
1F194F1C000
|
heap
|
page read and write
|
||
1F19FF23000
|
trusted library allocation
|
page read and write
|
||
1F19F342000
|
trusted library allocation
|
page read and write
|
||
1F19ED91000
|
trusted library allocation
|
page read and write
|
||
1F194E87000
|
heap
|
page read and write
|
||
1F19AE20000
|
trusted library allocation
|
page read and write
|
||
1F19EC34000
|
trusted library allocation
|
page read and write
|
||
1F199F13000
|
trusted library allocation
|
page read and write
|
||
1F1A6882000
|
trusted library allocation
|
page read and write
|
||
1F1A6830000
|
trusted library allocation
|
page read and write
|
||
2714202B000
|
heap
|
page read and write
|
||
1F19B14E000
|
trusted library allocation
|
page read and write
|
||
1F1A80C1000
|
trusted library allocation
|
page read and write
|
||
1F19ED33000
|
trusted library allocation
|
page read and write
|
||
1F194E8D000
|
heap
|
page read and write
|
||
1F194EFC000
|
heap
|
page read and write
|
||
1F1A956A000
|
trusted library allocation
|
page read and write
|
||
1F1A7E00000
|
trusted library allocation
|
page read and write
|
||
1F1A0632000
|
trusted library allocation
|
page read and write
|
||
1F19F4CD000
|
trusted library allocation
|
page read and write
|
||
1F19FDE4000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EB6000
|
heap
|
page read and write
|
||
1F1A05B8000
|
trusted library allocation
|
page read and write
|
||
1F19FF71000
|
trusted library allocation
|
page read and write
|
||
1F194F25000
|
heap
|
page read and write
|
||
1F194EA3000
|
heap
|
page read and write
|
||
1F1A0921000
|
trusted library allocation
|
page read and write
|
||
1F1A18C5000
|
trusted library allocation
|
page read and write
|
||
1F1AA39C000
|
trusted library allocation
|
page read and write
|
||
1F19FF68000
|
trusted library allocation
|
page read and write
|
||
1F1A068E000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19EC20000
|
trusted library allocation
|
page read and write
|
||
1F19FDB0000
|
trusted library allocation
|
page read and write
|
||
1F19F9F7000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A098D000
|
trusted library allocation
|
page read and write
|
||
1F1A6179000
|
trusted library allocation
|
page read and write
|
||
1F1A907D000
|
trusted library allocation
|
page read and write
|
||
1F194E99000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A0666000
|
trusted library allocation
|
page read and write
|
||
1F1A68F1000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F1A95FC000
|
trusted library allocation
|
page read and write
|
||
1F19EDB8000
|
trusted library allocation
|
page read and write
|
||
1F1A8075000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F18FDDE000
|
heap
|
page read and write
|
||
1F19B0AC000
|
trusted library allocation
|
page read and write
|
||
1F1A689D000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1E430F50000
|
heap
|
page read and write
|
||
27141361000
|
trusted library allocation
|
page read and write
|
||
1F1A0021000
|
trusted library allocation
|
page read and write
|
||
1F194EA0000
|
heap
|
page read and write
|
||
1F1A14C8000
|
trusted library allocation
|
page read and write
|
||
1F19B1A1000
|
trusted library allocation
|
page read and write
|
||
1F1AABC5000
|
trusted library allocation
|
page read and write
|
||
1F19EDB3000
|
trusted library allocation
|
page read and write
|
||
1F1A0068000
|
trusted library allocation
|
page read and write
|
||
1F19DFFC000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19ED84000
|
trusted library allocation
|
page read and write
|
||
1F1AABB3000
|
trusted library allocation
|
page read and write
|
||
1F194EA0000
|
heap
|
page read and write
|
||
1F1A0613000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F194EFE000
|
heap
|
page read and write
|
||
1F1A68F3000
|
trusted library allocation
|
page read and write
|
||
1F1A63C5000
|
trusted library allocation
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F194EB0000
|
heap
|
page read and write
|
||
1F1AA0DF000
|
trusted library allocation
|
page read and write
|
||
1F199E2F000
|
trusted library allocation
|
page read and write
|
||
1F1A616A000
|
trusted library allocation
|
page read and write
|
||
1F194E87000
|
heap
|
page read and write
|
||
1F19ED17000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A18B3000
|
trusted library allocation
|
page read and write
|
||
1F19FE3C000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1AA0DF000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F19B885000
|
heap
|
page read and write
|
||
1F19FDC8000
|
trusted library allocation
|
page read and write
|
||
1F19F3F2000
|
trusted library allocation
|
page read and write
|
||
1F1A18CF000
|
trusted library allocation
|
page read and write
|
||
2A2F5E30000
|
heap
|
page read and write
|
||
2A2F5B90000
|
heap
|
page read and write
|
||
1F1A90DE000
|
trusted library allocation
|
page read and write
|
||
1F19FD39000
|
trusted library allocation
|
page read and write
|
||
1F19F4FE000
|
trusted library allocation
|
page read and write
|
||
1F1A68C5000
|
trusted library allocation
|
page read and write
|
||
1F1A95DA000
|
trusted library allocation
|
page read and write
|
||
7A8E9904000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F1A05EB000
|
trusted library allocation
|
page read and write
|
||
1F01A100000
|
heap
|
page read and write
|
||
1F19F053000
|
trusted library allocation
|
page read and write
|
||
1F194EFE000
|
heap
|
page read and write
|
||
1F19B882000
|
heap
|
page read and write
|
||
1F1A9965000
|
trusted library allocation
|
page read and write
|
||
1F019C60000
|
unclassified section
|
page read and write
|
||
1F19DE53000
|
trusted library allocation
|
page read and write
|
||
1F19FC9E000
|
trusted library allocation
|
page read and write
|
||
1F1A14A1000
|
trusted library allocation
|
page read and write
|
||
1F1AA0B8000
|
trusted library allocation
|
page read and write
|
||
1E431207000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A682D000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F1A992F000
|
trusted library allocation
|
page read and write
|
||
1F194F16000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F01A01F000
|
trusted library allocation
|
page read and write
|
||
1F194E77000
|
heap
|
page read and write
|
||
1F19FDE4000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A9521000
|
trusted library allocation
|
page read and write
|
||
1F19FD96000
|
trusted library allocation
|
page read and write
|
||
1F1A008E000
|
trusted library allocation
|
page read and write
|
||
1F19B8E4000
|
heap
|
page read and write
|
||
1F1A07FD000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F19F9F4000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F1A07DC000
|
trusted library allocation
|
page read and write
|
||
1F1AA08D000
|
trusted library allocation
|
page read and write
|
||
1F19DE89000
|
trusted library allocation
|
page read and write
|
||
1F19F3E1000
|
trusted library allocation
|
page read and write
|
||
1F1A282E000
|
trusted library allocation
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F19EC40000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1AAC56000
|
trusted library allocation
|
page read and write
|
||
1F1A055D000
|
trusted library allocation
|
page read and write
|
||
1F1A9558000
|
trusted library allocation
|
page read and write
|
||
1F19FC94000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1F1A9300000
|
trusted library allocation
|
page read and write
|
||
1F19B0CD000
|
trusted library allocation
|
page read and write
|
||
1F1A9C9C000
|
trusted library allocation
|
page read and write
|
||
1F194EFC000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19F9D4000
|
trusted library allocation
|
page read and write
|
||
1F1A5FE1000
|
trusted library allocation
|
page read and write
|
||
1F19FFC1000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
2A2F5E60000
|
heap
|
page read and write
|
||
1F1AA0DB000
|
trusted library allocation
|
page read and write
|
||
1F19DA80000
|
trusted library allocation
|
page read and write
|
||
1F1AA4E1000
|
heap
|
page read and write
|
||
1F1A6150000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F1A2801000
|
trusted library allocation
|
page read and write
|
||
1F194F11000
|
heap
|
page read and write
|
||
1F1A216D000
|
trusted library allocation
|
page read and write
|
||
1F1AABB9000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A63E0000
|
trusted library allocation
|
page read and write
|
||
1F1AABB6000
|
trusted library allocation
|
page read and write
|
||
1F1A183A000
|
trusted library allocation
|
page read and write
|
||
1F19DFB5000
|
trusted library allocation
|
page read and write
|
||
1F1A809D000
|
trusted library allocation
|
page read and write
|
||
1F194F1E000
|
heap
|
page read and write
|
||
1F19E656000
|
trusted library allocation
|
page read and write
|
||
1F1A0ACE000
|
trusted library allocation
|
page read and write
|
||
1F19B869000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A00CB000
|
trusted library allocation
|
page read and write
|
||
1F19E67A000
|
trusted library allocation
|
page read and write
|
||
27141F7D000
|
heap
|
page read and write
|
||
1F19DDCB000
|
trusted library allocation
|
page read and write
|
||
1F194EA0000
|
heap
|
page read and write
|
||
1F1A14F0000
|
trusted library allocation
|
page read and write
|
||
1F1AA082000
|
trusted library allocation
|
page read and write
|
||
1F19B6C8000
|
trusted library allocation
|
page read and write
|
||
1F19B6F4000
|
trusted library allocation
|
page read and write
|
||
1F019F72000
|
trusted library allocation
|
page read and write
|
||
1F1A18CF000
|
trusted library allocation
|
page read and write
|
||
1F019F81000
|
trusted library allocation
|
page read and write
|
||
1F194F15000
|
heap
|
page read and write
|
||
1F199FB9000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1AACB4000
|
trusted library allocation
|
page read and write
|
||
1E431200000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19FEE8000
|
trusted library allocation
|
page read and write
|
||
1F19EDB1000
|
trusted library allocation
|
page read and write
|
||
1F1AAC72000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19F3DB000
|
trusted library allocation
|
page read and write
|
||
1F19FD1D000
|
trusted library allocation
|
page read and write
|
||
1F1A9FE5000
|
trusted library allocation
|
page read and write
|
||
84D000
|
stack
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1AABE9000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19FD1D000
|
trusted library allocation
|
page read and write
|
||
1F19F9B1000
|
trusted library allocation
|
page read and write
|
||
2A2F5E33000
|
heap
|
page read and write
|
||
1F1A0AC2000
|
trusted library allocation
|
page read and write
|
||
1F1AAC78000
|
trusted library allocation
|
page read and write
|
||
1E432B36000
|
heap
|
page read and write
|
||
1F1A68F3000
|
trusted library allocation
|
page read and write
|
||
1F194F2C000
|
heap
|
page read and write
|
||
1F19FFAB000
|
trusted library allocation
|
page read and write
|
||
1F1A80FD000
|
trusted library allocation
|
page read and write
|
||
1F1A8098000
|
trusted library allocation
|
page read and write
|
||
1F19F587000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
unkown
|
page write copy
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A09AE000
|
trusted library allocation
|
page read and write
|
||
1F19B848000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19EC76000
|
trusted library allocation
|
page read and write
|
||
1F19F04D000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F1A06D8000
|
trusted library allocation
|
page read and write
|
||
1F19F04A000
|
trusted library allocation
|
page read and write
|
||
1F194E9B000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F19ED84000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A80BC000
|
trusted library allocation
|
page read and write
|
||
1F19FDFE000
|
trusted library allocation
|
page read and write
|
||
1F1AA39C000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F01A032000
|
trusted library allocation
|
page read and write
|
||
1F19F018000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F1A07D6000
|
trusted library allocation
|
page read and write
|
||
1F19F01D000
|
trusted library allocation
|
page read and write
|
||
14DDB60A000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F1A07A3000
|
trusted library allocation
|
page read and write
|
||
1F1A05B8000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A61B9000
|
trusted library allocation
|
page read and write
|
||
1F19F4B9000
|
trusted library allocation
|
page read and write
|
||
1F19F9A9000
|
trusted library allocation
|
page read and write
|
||
1F1A0492000
|
trusted library allocation
|
page read and write
|
||
1F19F038000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A098A000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1AABC7000
|
trusted library allocation
|
page read and write
|
||
1F1A61B2000
|
trusted library allocation
|
page read and write
|
||
1F1A2857000
|
trusted library allocation
|
page read and write
|
||
1F19B869000
|
heap
|
page read and write
|
||
1F1A181F000
|
trusted library allocation
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
1F1A9564000
|
trusted library allocation
|
page read and write
|
||
1F19B09A000
|
trusted library allocation
|
page read and write
|
||
2A2F5DF6000
|
trusted library allocation
|
page read and write
|
||
1F199FBB000
|
trusted library allocation
|
page read and write
|
||
1F1A68DB000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1A1896000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F19F6B5000
|
trusted library allocation
|
page read and write
|
||
1F1A089F000
|
trusted library allocation
|
page read and write
|
||
1F1A05F7000
|
trusted library allocation
|
page read and write
|
||
1F19FD96000
|
trusted library allocation
|
page read and write
|
||
1F194EB6000
|
heap
|
page read and write
|
||
1F1A14C5000
|
trusted library allocation
|
page read and write
|
||
1F1AA0C9000
|
trusted library allocation
|
page read and write
|
||
1F1A61AD000
|
trusted library allocation
|
page read and write
|
||
1F1AAC72000
|
trusted library allocation
|
page read and write
|
||
1F19F349000
|
trusted library allocation
|
page read and write
|
||
1F1A9558000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
27141FFD000
|
heap
|
page read and write
|
||
1F1AA0DB000
|
trusted library allocation
|
page read and write
|
||
1F19F5EB000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1AA2F3000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A06FE000
|
trusted library allocation
|
page read and write
|
||
1F1A07B1000
|
trusted library allocation
|
page read and write
|
||
1F1A1872000
|
trusted library allocation
|
page read and write
|
||
1F19FF23000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A0470000
|
trusted library allocation
|
page read and write
|
||
1F19FDFB000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19DFBE000
|
trusted library allocation
|
page read and write
|
||
1F1A05F9000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19DDB3000
|
trusted library allocation
|
page read and write
|
||
1F1A60C4000
|
trusted library allocation
|
page read and write
|
||
B5CD5FE000
|
unkown
|
page readonly
|
||
1F1A62B9000
|
trusted library allocation
|
page read and write
|
||
1F1A18B3000
|
trusted library allocation
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19ED56000
|
trusted library allocation
|
page read and write
|
||
1F1A95BC000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F19B1C7000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1089000
|
heap
|
page read and write
|
||
27142044000
|
heap
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A1877000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A267F000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EAE000
|
heap
|
page read and write
|
||
1F19DF4C000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F19DACD000
|
trusted library allocation
|
page read and write
|
||
1F1A5F9D000
|
trusted library allocation
|
page read and write
|
||
1F19EC28000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F19F9C0000
|
trusted library allocation
|
page read and write
|
||
1F1A9F42000
|
trusted library allocation
|
page read and write
|
||
1F1A5FFC000
|
trusted library allocation
|
page read and write
|
||
1F019B50000
|
unclassified section
|
page readonly
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19B0D0000
|
trusted library allocation
|
page read and write
|
||
1F19B84B000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F19B1F8000
|
trusted library allocation
|
page read and write
|
||
1F1A614D000
|
trusted library allocation
|
page read and write
|
||
1F19FF8F000
|
trusted library allocation
|
page read and write
|
||
1F19FF8D000
|
trusted library allocation
|
page read and write
|
||
1F1A9C05000
|
trusted library allocation
|
page read and write
|
||
1F19E175000
|
trusted library allocation
|
page read and write
|
||
1F1A5F3B000
|
trusted library allocation
|
page read and write
|
||
1F19FF44000
|
trusted library allocation
|
page read and write
|
||
1F19DA33000
|
trusted library allocation
|
page read and write
|
||
1F1A06FE000
|
trusted library allocation
|
page read and write
|
||
B5CDE3E000
|
stack
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A6188000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A95C7000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F19EDC8000
|
trusted library allocation
|
page read and write
|
||
1F1AAC99000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19ED91000
|
trusted library allocation
|
page read and write
|
||
1F19F00A000
|
trusted library allocation
|
page read and write
|
||
1F1A689D000
|
trusted library allocation
|
page read and write
|
||
1F1A0A74000
|
trusted library allocation
|
page read and write
|
||
6F27DFF000
|
stack
|
page read and write
|
||
1F19B681000
|
trusted library allocation
|
page read and write
|
||
1F19E1D9000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A0500000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194EF6000
|
heap
|
page read and write
|
||
1F19ED54000
|
trusted library allocation
|
page read and write
|
||
1F1A1895000
|
trusted library allocation
|
page read and write
|
||
1F19F5CB000
|
trusted library allocation
|
page read and write
|
||
1F19DE55000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19FDE4000
|
trusted library allocation
|
page read and write
|
||
1F19FDCA000
|
trusted library allocation
|
page read and write
|
||
1F1A6270000
|
trusted library allocation
|
page read and write
|
||
58A000
|
stack
|
page read and write
|
||
1F1A0052000
|
trusted library allocation
|
page read and write
|
||
1F19FFAE000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1F19DA82000
|
trusted library allocation
|
page read and write
|
||
27141404000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
271411DF000
|
unkown
|
page execute read
|
||
721000
|
unkown
|
page execute read
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F1A95C7000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F194EBD000
|
heap
|
page read and write
|
||
1F1A60FD000
|
trusted library allocation
|
page read and write
|
||
271413BE000
|
trusted library allocation
|
page read and write
|
||
1F19F5E0000
|
trusted library allocation
|
page read and write
|
||
1F19FDC5000
|
trusted library allocation
|
page read and write
|
||
107A000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
2A2F5D8F000
|
trusted library allocation
|
page read and write
|
||
1F1A09C1000
|
trusted library allocation
|
page read and write
|
||
1F1A05C2000
|
trusted library allocation
|
page read and write
|
||
1F1A90EC000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19ED47000
|
trusted library allocation
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F19EDCC000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19F9B3000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1A6188000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
27141FA8000
|
heap
|
page read and write
|
||
1F194E90000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F19FD20000
|
trusted library allocation
|
page read and write
|
||
1F1A1874000
|
trusted library allocation
|
page read and write
|
||
1F19F9B5000
|
trusted library allocation
|
page read and write
|
||
27141870000
|
heap
|
page read and write
|
||
1F1A6194000
|
trusted library allocation
|
page read and write
|
||
1F1AAC66000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F19B1DD000
|
trusted library allocation
|
page read and write
|
||
1F1A0723000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F19FD43000
|
trusted library allocation
|
page read and write
|
||
1F1A9F1A000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
27141FF1000
|
heap
|
page read and write
|
||
1F19E179000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
27141380000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EA3000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F1A06DE000
|
trusted library allocation
|
page read and write
|
||
1F19F038000
|
trusted library allocation
|
page read and write
|
||
1F1A049B000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
2A2F5E80000
|
unclassified section
|
page readonly
|
||
27141FFD000
|
heap
|
page read and write
|
||
1F1A62D2000
|
trusted library allocation
|
page read and write
|
||
1E432B20000
|
heap
|
page read and write
|
||
1F19B1F6000
|
trusted library allocation
|
page read and write
|
||
1F19FF68000
|
trusted library allocation
|
page read and write
|
||
1F1A6807000
|
trusted library allocation
|
page read and write
|
||
1F1A219E000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19F01B000
|
trusted library allocation
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
1F19EC23000
|
trusted library allocation
|
page read and write
|
||
1F194EB0000
|
heap
|
page read and write
|
||
1F19DFC4000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
27142058000
|
heap
|
page read and write
|
||
1F19ED6A000
|
trusted library allocation
|
page read and write
|
||
1F1A9582000
|
trusted library allocation
|
page read and write
|
||
1F194E8D000
|
heap
|
page read and write
|
||
B5CB31E000
|
unkown
|
page readonly
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A68C5000
|
trusted library allocation
|
page read and write
|
||
1F1A9543000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F1A049B000
|
trusted library allocation
|
page read and write
|
||
1F194F0F000
|
heap
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19DFC4000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F194EBD000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
B5CB2DB000
|
stack
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F1A07D6000
|
trusted library allocation
|
page read and write
|
||
1F1A9582000
|
trusted library allocation
|
page read and write
|
||
1F1A05E2000
|
trusted library allocation
|
page read and write
|
||
1F19DADB000
|
trusted library allocation
|
page read and write
|
||
1F19DE8E000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
27142021000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F199EFB000
|
trusted library allocation
|
page read and write
|
||
1F1A14D3000
|
trusted library allocation
|
page read and write
|
||
1F194E87000
|
heap
|
page read and write
|
||
1F1A62BE000
|
trusted library allocation
|
page read and write
|
||
1F1AAC66000
|
trusted library allocation
|
page read and write
|
||
27142058000
|
heap
|
page read and write
|
||
1F1A1EBA000
|
trusted library allocation
|
page read and write
|
||
1F1A0BD2000
|
trusted library allocation
|
page read and write
|
||
1089000
|
heap
|
page read and write
|
||
1F19F03D000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1AA0C9000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F019B70000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1A60E4000
|
trusted library allocation
|
page read and write
|
||
1F1A68CC000
|
trusted library allocation
|
page read and write
|
||
1F1A065C000
|
trusted library allocation
|
page read and write
|
||
27141FE8000
|
heap
|
page read and write
|
||
1F19F3A8000
|
trusted library allocation
|
page read and write
|
||
1F19EC58000
|
trusted library allocation
|
page read and write
|
||
1F19DD59000
|
trusted library allocation
|
page read and write
|
||
1F1A61B7000
|
trusted library allocation
|
page read and write
|
||
1F19DFB8000
|
trusted library allocation
|
page read and write
|
||
1F1A68AA000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F194EB0000
|
heap
|
page read and write
|
||
1F1A06DE000
|
trusted library allocation
|
page read and write
|
||
1F19F399000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A0095000
|
trusted library allocation
|
page read and write
|
||
1F1AA0DD000
|
trusted library allocation
|
page read and write
|
||
1F1A80B0000
|
trusted library allocation
|
page read and write
|
||
1F194F10000
|
heap
|
page read and write
|
||
1F1A68AA000
|
trusted library allocation
|
page read and write
|
||
1F19DFCC000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19F61A000
|
trusted library allocation
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
1F1A9564000
|
trusted library allocation
|
page read and write
|
||
99803303000
|
trusted library allocation
|
page read and write
|
||
1F1AA0CF000
|
trusted library allocation
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
2714113A000
|
heap
|
page read and write
|
||
1F1A05BA000
|
trusted library allocation
|
page read and write
|
||
1F1AA0C9000
|
trusted library allocation
|
page read and write
|
||
1F19DF9C000
|
trusted library allocation
|
page read and write
|
||
1F19F031000
|
trusted library allocation
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F1A05B8000
|
trusted library allocation
|
page read and write
|
||
1F19FF87000
|
trusted library allocation
|
page read and write
|
||
1F1A1876000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
2E9C677000
|
stack
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A0B4F000
|
trusted library allocation
|
page read and write
|
||
1F1AA44D000
|
heap
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F1AA0D7000
|
trusted library allocation
|
page read and write
|
||
1F1A1895000
|
trusted library allocation
|
page read and write
|
||
1F1A90E1000
|
trusted library allocation
|
page read and write
|
||
27141FE0000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19ED6E000
|
trusted library allocation
|
page read and write
|
||
1F1A2707000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F1AABDD000
|
trusted library allocation
|
page read and write
|
||
2E9C67B000
|
stack
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
1F1A05BA000
|
trusted library allocation
|
page read and write
|
||
1F1A6190000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F1A5F25000
|
trusted library allocation
|
page read and write
|
||
1F1A9FB5000
|
trusted library allocation
|
page read and write
|
||
1F1AA05D000
|
trusted library allocation
|
page read and write
|
||
1F1A064B000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1E431375000
|
heap
|
page read and write
|
||
1F1A6258000
|
trusted library allocation
|
page read and write
|
||
1F194E87000
|
heap
|
page read and write
|
||
1F194EB6000
|
heap
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F19F4CC000
|
trusted library allocation
|
page read and write
|
||
1F19B8E6000
|
heap
|
page read and write
|
||
1F1A188C000
|
trusted library allocation
|
page read and write
|
||
27141F60000
|
heap
|
page read and write
|
||
1F19F4DE000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
B5CE63E000
|
unkown
|
page readonly
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F1A0492000
|
trusted library allocation
|
page read and write
|
||
1F19DE85000
|
trusted library allocation
|
page read and write
|
||
1F19F9FD000
|
trusted library allocation
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F1A6807000
|
trusted library allocation
|
page read and write
|
||
1F1A8640000
|
trusted library allocation
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F1A61E4000
|
trusted library allocation
|
page read and write
|
||
2A2F5D0C000
|
trusted library allocation
|
page read and write
|
||
1F1A63F1000
|
trusted library allocation
|
page read and write
|
||
1F1AA042000
|
trusted library allocation
|
page read and write
|
||
183E000
|
stack
|
page read and write
|
||
27142044000
|
heap
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F1A9FF6000
|
trusted library allocation
|
page read and write
|
||
1F199FF0000
|
trusted library allocation
|
page read and write
|
||
1F1A18C5000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1A27C5000
|
trusted library allocation
|
page read and write
|
||
1F19F375000
|
trusted library allocation
|
page read and write
|
||
1F1A00A6000
|
trusted library allocation
|
page read and write
|
||
1F1A7A43000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F199FE4000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F19FFAE000
|
trusted library allocation
|
page read and write
|
||
1E432B33000
|
heap
|
page read and write
|
||
2A2F6200000
|
trusted library allocation
|
page read and write
|
||
1F194E77000
|
heap
|
page read and write
|
||
1F1A07B9000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F1A14FA000
|
trusted library allocation
|
page read and write
|
||
1F19F0D5000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1089000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A96BF000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F19B1BE000
|
trusted library allocation
|
page read and write
|
||
1F194E90000
|
heap
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F19DF8E000
|
trusted library allocation
|
page read and write
|
||
1F19E648000
|
trusted library allocation
|
page read and write
|
||
1F1AA2F1000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F019C50000
|
heap
|
page readonly
|
||
1F19DE65000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
27142077000
|
heap
|
page read and write
|
||
1F19F48D000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A1859000
|
trusted library allocation
|
page read and write
|
||
1F1A9516000
|
trusted library allocation
|
page read and write
|
||
1F1AABE9000
|
trusted library allocation
|
page read and write
|
||
1F194F11000
|
heap
|
page read and write
|
||
1F19FD17000
|
trusted library allocation
|
page read and write
|
||
1F1A00F0000
|
trusted library allocation
|
page read and write
|
||
1F19B846000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19FFED000
|
trusted library allocation
|
page read and write
|
||
27141FED000
|
heap
|
page read and write
|
||
1F1AA33E000
|
trusted library allocation
|
page read and write
|
||
1F1A61AC000
|
trusted library allocation
|
page read and write
|
||
1F1A992F000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
19015FD000
|
stack
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A06D8000
|
trusted library allocation
|
page read and write
|
||
1F1A18CC000
|
trusted library allocation
|
page read and write
|
||
1F1A60FD000
|
trusted library allocation
|
page read and write
|
||
1F1A6269000
|
trusted library allocation
|
page read and write
|
||
1F1A80B4000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F1A619A000
|
trusted library allocation
|
page read and write
|
||
1F1A809D000
|
trusted library allocation
|
page read and write
|
||
1F19DAA9000
|
trusted library allocation
|
page read and write
|
||
1F19ECB3000
|
trusted library allocation
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F1A04C4000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194EF6000
|
heap
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19F99B000
|
trusted library allocation
|
page read and write
|
||
1F1AACBD000
|
trusted library allocation
|
page read and write
|
||
1F1A046B000
|
trusted library allocation
|
page read and write
|
||
1F19FDFB000
|
trusted library allocation
|
page read and write
|
||
2A2F5DF2000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F1A68C5000
|
trusted library allocation
|
page read and write
|
||
1F1A9F2B000
|
trusted library allocation
|
page read and write
|
||
1F1A63EC000
|
trusted library allocation
|
page read and write
|
||
1F19B22D000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F1A90B9000
|
trusted library allocation
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A9F3F000
|
trusted library allocation
|
page read and write
|
||
1F1A9F23000
|
trusted library allocation
|
page read and write
|
||
1F1AA0AF000
|
trusted library allocation
|
page read and write
|
||
1F1A63E7000
|
trusted library allocation
|
page read and write
|
||
1F19B144000
|
trusted library allocation
|
page read and write
|
||
1F19ED89000
|
trusted library allocation
|
page read and write
|
||
1F19E653000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1A9F95000
|
trusted library allocation
|
page read and write
|
||
1F19F4D5000
|
trusted library allocation
|
page read and write
|
||
1F19F0C3000
|
trusted library allocation
|
page read and write
|
||
27141F6C000
|
heap
|
page read and write
|
||
27142077000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194EFC000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19B698000
|
trusted library allocation
|
page read and write
|
||
1F1A03F4000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19ED5A000
|
trusted library allocation
|
page read and write
|
||
1F19FE49000
|
trusted library allocation
|
page read and write
|
||
1F1A61B2000
|
trusted library allocation
|
page read and write
|
||
27141F8A000
|
heap
|
page read and write
|
||
1F19F01B000
|
trusted library allocation
|
page read and write
|
||
1F1A9F9E000
|
trusted library allocation
|
page read and write
|
||
D318F5E000
|
stack
|
page read and write
|
||
1F1A95CF000
|
trusted library allocation
|
page read and write
|
||
1F194F18000
|
heap
|
page read and write
|
||
1F194F14000
|
heap
|
page read and write
|
||
1F1A05F7000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19ED25000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F019F23000
|
trusted library allocation
|
page read and write
|
||
1F19B822000
|
heap
|
page read and write
|
||
1F19ED6E000
|
trusted library allocation
|
page read and write
|
||
1F1A80AA000
|
trusted library allocation
|
page read and write
|
||
1F194E85000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F1A68D8000
|
trusted library allocation
|
page read and write
|
||
1F1AA3E7000
|
trusted library allocation
|
page read and write
|
||
1F194E76000
|
heap
|
page read and write
|
||
1F1AABDD000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
27141F64000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1A1463000
|
trusted library allocation
|
page read and write
|
||
1F19DFFC000
|
trusted library allocation
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A9C9C000
|
trusted library allocation
|
page read and write
|
||
1F19F613000
|
trusted library allocation
|
page read and write
|
||
1F1A1827000
|
trusted library allocation
|
page read and write
|
||
1F19B68C000
|
trusted library allocation
|
page read and write
|
||
1F19F9BE000
|
trusted library allocation
|
page read and write
|
||
1F1AA379000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
271413F1000
|
trusted library allocation
|
page read and write
|
||
1F194F11000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
1F19B6D5000
|
trusted library allocation
|
page read and write
|
||
1F1A18BD000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19DFBB000
|
trusted library allocation
|
page read and write
|
||
1F194E71000
|
heap
|
page read and write
|
||
1F19FD5A000
|
trusted library allocation
|
page read and write
|
||
1F19DAA9000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F1A9F42000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F19DF91000
|
trusted library allocation
|
page read and write
|
||
1F1A9554000
|
trusted library allocation
|
page read and write
|
||
1F19E6EB000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19ED84000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F1A5F16000
|
trusted library allocation
|
page read and write
|
||
1F19F0E2000
|
trusted library allocation
|
page read and write
|
||
1F1A9F35000
|
trusted library allocation
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F19B822000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F1A68D5000
|
trusted library allocation
|
page read and write
|
||
1F1A60BD000
|
trusted library allocation
|
page read and write
|
||
2E9A3DE000
|
stack
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19ED04000
|
trusted library allocation
|
page read and write
|
||
1F19B1DD000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F1AAC87000
|
trusted library allocation
|
page read and write
|
||
1F1A08E2000
|
trusted library allocation
|
page read and write
|
||
1F1A907B000
|
trusted library allocation
|
page read and write
|
||
1F19F6C3000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F19B883000
|
heap
|
page read and write
|
||
1F019D90000
|
unclassified section
|
page readonly
|
||
1F019F69000
|
trusted library allocation
|
page read and write
|
||
1F1A0665000
|
trusted library allocation
|
page read and write
|
||
721000
|
unkown
|
page execute read
|
||
1F1A68F3000
|
trusted library allocation
|
page read and write
|
||
1F19F9B5000
|
trusted library allocation
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19ED74000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19B87A000
|
heap
|
page read and write
|
||
1F19FDBF000
|
trusted library allocation
|
page read and write
|
||
1F1AA54E000
|
heap
|
page read and write
|
||
1F1A862D000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F1A8098000
|
trusted library allocation
|
page read and write
|
||
1F1A61B5000
|
trusted library allocation
|
page read and write
|
||
1F1A9543000
|
trusted library allocation
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
1F1A18A9000
|
trusted library allocation
|
page read and write
|
||
1F1AABE5000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19F9CB000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F1A6827000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194F02000
|
heap
|
page read and write
|
||
1F19B846000
|
heap
|
page read and write
|
||
1F1A0BA5000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1AA401000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A0466000
|
trusted library allocation
|
page read and write
|
||
1F19FFBB000
|
trusted library allocation
|
page read and write
|
||
1F1A907F000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F19E6F1000
|
trusted library allocation
|
page read and write
|
||
1F1A8E02000
|
trusted library allocation
|
page read and write
|
||
1F1A2748000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F19ED6A000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F1A63DC000
|
trusted library allocation
|
page read and write
|
||
1F19EDC3000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19B8A6000
|
heap
|
page read and write
|
||
1F1A80B0000
|
trusted library allocation
|
page read and write
|
||
1F1A066C000
|
trusted library allocation
|
page read and write
|
||
1F1A95C0000
|
trusted library allocation
|
page read and write
|
||
1089000
|
heap
|
page read and write
|
||
1F19DFD2000
|
trusted library allocation
|
page read and write
|
||
27141365000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19DF8E000
|
trusted library allocation
|
page read and write
|
||
1F1A6835000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A18B3000
|
trusted library allocation
|
page read and write
|
||
1F1A0472000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A62D2000
|
trusted library allocation
|
page read and write
|
||
1F1A9516000
|
trusted library allocation
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F1AA0A8000
|
trusted library allocation
|
page read and write
|
||
1F19FF1B000
|
trusted library allocation
|
page read and write
|
||
27141200000
|
trusted library allocation
|
page read and write
|
||
1F19DD8A000
|
trusted library allocation
|
page read and write
|
||
1F194EBF000
|
heap
|
page read and write
|
||
1F1A6827000
|
trusted library allocation
|
page read and write
|
||
1F194F1E000
|
heap
|
page read and write
|
||
27141170000
|
trusted library section
|
page readonly
|
||
1F1A1EFE000
|
trusted library allocation
|
page read and write
|
||
1F1A9F35000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F19F031000
|
trusted library allocation
|
page read and write
|
||
1F1A068E000
|
trusted library allocation
|
page read and write
|
||
1F19ED4E000
|
trusted library allocation
|
page read and write
|
||
1076000
|
heap
|
page read and write
|
||
1F19F5A6000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F1A6179000
|
trusted library allocation
|
page read and write
|
||
1F1A8656000
|
trusted library allocation
|
page read and write
|
||
1E430F00000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
27140F56000
|
remote allocation
|
page execute read
|
||
1F1AA324000
|
trusted library allocation
|
page read and write
|
||
1F1A14F8000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E70000
|
heap
|
page read and write
|
||
271413B5000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F19F69D000
|
trusted library allocation
|
page read and write
|
||
1F194EA3000
|
heap
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F19B6D5000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A618F000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F19FD3C000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19FDAE000
|
trusted library allocation
|
page read and write
|
||
1F1A6898000
|
trusted library allocation
|
page read and write
|
||
1F19F9DE000
|
trusted library allocation
|
page read and write
|
||
1F19ED91000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A0449000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F019C6F000
|
unclassified section
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F1A90EC000
|
trusted library allocation
|
page read and write
|
||
1F194F15000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
27141FA1000
|
heap
|
page read and write
|
||
1F1A68F3000
|
trusted library allocation
|
page read and write
|
||
1F1A9083000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F1A62CC000
|
trusted library allocation
|
page read and write
|
||
1F1A21CE000
|
trusted library allocation
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
27141100000
|
unclassified section
|
page read and write
|
||
1F1A2806000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F1A6883000
|
trusted library allocation
|
page read and write
|
||
1F1A9C15000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F19DE5A000
|
trusted library allocation
|
page read and write
|
||
2A2F5C80000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A00AC000
|
trusted library allocation
|
page read and write
|
||
1F194EFA000
|
heap
|
page read and write
|
||
1F199F1E000
|
trusted library allocation
|
page read and write
|
||
1F1A186B000
|
trusted library allocation
|
page read and write
|
||
1F1A1ED8000
|
trusted library allocation
|
page read and write
|
||
1F1AA082000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A90B9000
|
trusted library allocation
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
27141102000
|
unclassified section
|
page read and write
|
||
1F1A60EA000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A68BB000
|
trusted library allocation
|
page read and write
|
||
1F19EC28000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1AA06B000
|
trusted library allocation
|
page read and write
|
||
1F1AA48A000
|
heap
|
page read and write
|
||
1F194F2C000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
6F255FE000
|
stack
|
page read and write
|
||
1F1A68F3000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A14A1000
|
trusted library allocation
|
page read and write
|
||
1092000
|
heap
|
page read and write
|
||
2A2F5D5D000
|
trusted library allocation
|
page read and write
|
||
1F19FFC1000
|
trusted library allocation
|
page read and write
|
||
1F1A05BA000
|
trusted library allocation
|
page read and write
|
||
1F1A61B0000
|
trusted library allocation
|
page read and write
|
||
1F19F5FB000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A80BC000
|
trusted library allocation
|
page read and write
|
||
1E432C50000
|
heap
|
page read and write
|
||
1F194E73000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
27141FE0000
|
heap
|
page read and write
|
||
1F1AA042000
|
trusted library allocation
|
page read and write
|
||
1F1A95C4000
|
trusted library allocation
|
page read and write
|
||
1F194E8C000
|
heap
|
page read and write
|
||
1F19FF1B000
|
trusted library allocation
|
page read and write
|
||
7BC000
|
unkown
|
page readonly
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F1A68F1000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19F4F5000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A68B1000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
27141F60000
|
heap
|
page read and write
|
||
1F19FDB6000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19F9BB000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F1A96A1000
|
trusted library allocation
|
page read and write
|
||
1F194EA8000
|
heap
|
page read and write
|
||
1F19ED56000
|
trusted library allocation
|
page read and write
|
||
2714130A000
|
trusted library allocation
|
page read and write
|
||
1F1A0449000
|
trusted library allocation
|
page read and write
|
||
2A2F5E5F000
|
unclassified section
|
page read and write
|
||
1F1A07B7000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A1EF5000
|
trusted library allocation
|
page read and write
|
||
1F199EFE000
|
trusted library allocation
|
page read and write
|
||
1F1A60EE000
|
trusted library allocation
|
page read and write
|
||
1F19DE85000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194EBB000
|
heap
|
page read and write
|
||
1F01A108000
|
heap
|
page read and write
|
||
1F194E9B000
|
heap
|
page read and write
|
||
1F1AA446000
|
heap
|
page read and write
|
||
1F19ED89000
|
trusted library allocation
|
page read and write
|
||
1F019FB7000
|
trusted library allocation
|
page read and write
|
||
1F1A9521000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A5F2E000
|
trusted library allocation
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
1F1AA49B000
|
heap
|
page read and write
|
||
1F1A63E0000
|
trusted library allocation
|
page read and write
|
||
1F19B689000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F19ED5D000
|
trusted library allocation
|
page read and write
|
||
1F19FF44000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F1A80AA000
|
trusted library allocation
|
page read and write
|
||
1F1AAC87000
|
trusted library allocation
|
page read and write
|
||
1F19F3D2000
|
trusted library allocation
|
page read and write
|
||
1F19EC80000
|
trusted library allocation
|
page read and write
|
||
1F1A0438000
|
trusted library allocation
|
page read and write
|
||
1F019F66000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A9691000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A968D000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19DF60000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F19F00F000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
27141F5C000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F194EE8000
|
heap
|
page read and write
|
||
1F19FDF1000
|
trusted library allocation
|
page read and write
|
||
1F1A6835000
|
trusted library allocation
|
page read and write
|
||
1F19F9B5000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F194F32000
|
heap
|
page read and write
|
||
2E9D73E000
|
unkown
|
page readonly
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1E432B34000
|
heap
|
page read and write
|
||
1F1A68D5000
|
trusted library allocation
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F19F02A000
|
trusted library allocation
|
page read and write
|
||
1F1A081B000
|
trusted library allocation
|
page read and write
|
||
1F1A06DE000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A095C000
|
trusted library allocation
|
page read and write
|
||
3A2DA903000
|
trusted library allocation
|
page read and write
|
||
1F1AAC60000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A9081000
|
trusted library allocation
|
page read and write
|
||
1F1A68D5000
|
trusted library allocation
|
page read and write
|
||
1F19F424000
|
trusted library allocation
|
page read and write
|
||
1F19FD5A000
|
trusted library allocation
|
page read and write
|
||
1F19EC40000
|
trusted library allocation
|
page read and write
|
||
1F1AABDD000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A00E4000
|
trusted library allocation
|
page read and write
|
||
1F1AA0CF000
|
trusted library allocation
|
page read and write
|
||
1F1A05EB000
|
trusted library allocation
|
page read and write
|
||
1F1AA47F000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F19EDC8000
|
trusted library allocation
|
page read and write
|
||
1F1AA05D000
|
trusted library allocation
|
page read and write
|
||
1F1AAC78000
|
trusted library allocation
|
page read and write
|
||
1F19ED26000
|
trusted library allocation
|
page read and write
|
||
1F1A1EC6000
|
trusted library allocation
|
page read and write
|
||
27141FED000
|
heap
|
page read and write
|
||
1F19F9C5000
|
trusted library allocation
|
page read and write
|
||
1F194F28000
|
heap
|
page read and write
|
||
1E432B28000
|
heap
|
page read and write
|
||
1F194F24000
|
heap
|
page read and write
|
||
1F1A00BA000
|
trusted library allocation
|
page read and write
|
||
1F194E6F000
|
heap
|
page read and write
|
||
1F19FFA7000
|
trusted library allocation
|
page read and write
|
||
1F1A5FD6000
|
trusted library allocation
|
page read and write
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F19F6B1000
|
trusted library allocation
|
page read and write
|
||
1F1A0BCC000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19FFC8000
|
trusted library allocation
|
page read and write
|
||
1901DFE000
|
stack
|
page read and write
|
||
1F1AA2F1000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F1A0BF5000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
295DA541000
|
trusted library allocation
|
page execute read
|
||
1F1A0016000
|
trusted library allocation
|
page read and write
|
||
1F19F00F000
|
trusted library allocation
|
page read and write
|
||
1F1A078C000
|
trusted library allocation
|
page read and write
|
||
1F1A18A1000
|
trusted library allocation
|
page read and write
|
||
1F19EDC3000
|
trusted library allocation
|
page read and write
|
||
1F19F455000
|
trusted library allocation
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
1F1A0060000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A60E5000
|
trusted library allocation
|
page read and write
|
||
1F1A06FE000
|
trusted library allocation
|
page read and write
|
||
1F1A68AA000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1AA440000
|
heap
|
page read and write
|
||
1F01A015000
|
trusted library allocation
|
page read and write
|
||
1F1A0421000
|
trusted library allocation
|
page read and write
|
||
1F19DA62000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19B846000
|
heap
|
page read and write
|
||
1F1A0587000
|
trusted library allocation
|
page read and write
|
||
1F1A8636000
|
trusted library allocation
|
page read and write
|
||
1F1A9944000
|
trusted library allocation
|
page read and write
|
||
1F19DFCE000
|
trusted library allocation
|
page read and write
|
||
1F1A68E3000
|
trusted library allocation
|
page read and write
|
||
1F19FDCA000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1AAC60000
|
trusted library allocation
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F19F9EB000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F19B884000
|
heap
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F1998EF000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194F1C000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F19F5D4000
|
trusted library allocation
|
page read and write
|
||
1F1A8614000
|
trusted library allocation
|
page read and write
|
||
1F194EFD000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194F11000
|
heap
|
page read and write
|
||
1F1AA4CE000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A6824000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F19EDCC000
|
trusted library allocation
|
page read and write
|
||
27142059000
|
heap
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F1A096C000
|
trusted library allocation
|
page read and write
|
||
2E9D6FE000
|
unkown
|
page readonly
|
||
1F19FDC8000
|
trusted library allocation
|
page read and write
|
||
1F1A61B9000
|
trusted library allocation
|
page read and write
|
||
1F19DE61000
|
trusted library allocation
|
page read and write
|
||
2714203B000
|
heap
|
page read and write
|
||
1F19F615000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1AA347000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A685C000
|
trusted library allocation
|
page read and write
|
||
1F1A60CD000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F1A9937000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F1A056C000
|
trusted library allocation
|
page read and write
|
||
1F19B87A000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A96E2000
|
trusted library allocation
|
page read and write
|
||
1F194F02000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19F9D4000
|
trusted library allocation
|
page read and write
|
||
1F1A68DB000
|
trusted library allocation
|
page read and write
|
||
1F1A63B6000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A05F5000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19F017000
|
trusted library allocation
|
page read and write
|
||
1069000
|
heap
|
page read and write
|
||
1F19FFE1000
|
trusted library allocation
|
page read and write
|
||
1F1A7B57000
|
trusted library allocation
|
page read and write
|
||
1F19FDFE000
|
trusted library allocation
|
page read and write
|
||
1F194EBF000
|
heap
|
page read and write
|
||
1F19F383000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F19F464000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F019BBA000
|
heap
|
page read and write
|
||
1F19F989000
|
trusted library allocation
|
page read and write
|
||
1F1A062B000
|
trusted library allocation
|
page read and write
|
||
1F1A9554000
|
trusted library allocation
|
page read and write
|
||
1F1A9079000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F19E1FC000
|
trusted library allocation
|
page read and write
|
||
2714136B000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A6174000
|
trusted library allocation
|
page read and write
|
||
1F19F63D000
|
trusted library allocation
|
page read and write
|
||
1F194E70000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
27141F6C000
|
heap
|
page read and write
|
||
27141F5C000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19B8AB000
|
heap
|
page read and write
|
||
1F19EC46000
|
trusted library allocation
|
page read and write
|
||
1F019C24000
|
heap
|
page read and write
|
||
1F1AAB5E000
|
trusted library allocation
|
page read and write
|
||
1F19DE4F000
|
trusted library allocation
|
page read and write
|
||
1F19E643000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A6830000
|
trusted library allocation
|
page read and write
|
||
1F194EFC000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1F1A9CF7000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F1A188A000
|
trusted library allocation
|
page read and write
|
||
1F19E65D000
|
trusted library allocation
|
page read and write
|
||
1F1A07DC000
|
trusted library allocation
|
page read and write
|
||
1F1A08EA000
|
trusted library allocation
|
page read and write
|
||
1F19FCF4000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194E84000
|
heap
|
page read and write
|
||
1F19F6B9000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
27141FF1000
|
heap
|
page read and write
|
||
1F1A27A3000
|
trusted library allocation
|
page read and write
|
||
1F019F5D000
|
trusted library allocation
|
page read and write
|
||
1F194EFB000
|
heap
|
page read and write
|
||
1F19F3BE000
|
trusted library allocation
|
page read and write
|
||
1E430F5A000
|
heap
|
page read and write
|
||
1F194F10000
|
heap
|
page read and write
|
||
111244503000
|
trusted library allocation
|
page read and write
|
||
1F1A00E4000
|
trusted library allocation
|
page read and write
|
||
1F1A18C5000
|
trusted library allocation
|
page read and write
|
||
27141E05000
|
trusted library allocation
|
page read and write
|
||
1F19ED1F000
|
trusted library allocation
|
page read and write
|
||
2714202D000
|
heap
|
page read and write
|
||
1F1A05F3000
|
trusted library allocation
|
page read and write
|
||
1F1AAC8D000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F19B897000
|
heap
|
page read and write
|
||
1F19F4AF000
|
trusted library allocation
|
page read and write
|
||
1F19DE9E000
|
trusted library allocation
|
page read and write
|
||
1F1AABE5000
|
trusted library allocation
|
page read and write
|
||
1F1998EF000
|
trusted library allocation
|
page read and write
|
||
1F1A63F9000
|
trusted library allocation
|
page read and write
|
||
1F1A8075000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A907B000
|
trusted library allocation
|
page read and write
|
||
1F1A1876000
|
trusted library allocation
|
page read and write
|
||
1F1A996B000
|
trusted library allocation
|
page read and write
|
||
1F19FEE3000
|
trusted library allocation
|
page read and write
|
||
1F194F0D000
|
heap
|
page read and write
|
||
1F19FEFB000
|
trusted library allocation
|
page read and write
|
||
FDB000
|
stack
|
page read and write
|
||
1F1A05DC000
|
trusted library allocation
|
page read and write
|
||
1F194E90000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1AAB6D000
|
trusted library allocation
|
page read and write
|
||
1F19E1D9000
|
trusted library allocation
|
page read and write
|
||
1F19B89D000
|
heap
|
page read and write
|
||
1F194F04000
|
heap
|
page read and write
|
||
1F1AA2F1000
|
trusted library allocation
|
page read and write
|
||
1F1A6076000
|
trusted library allocation
|
page read and write
|
||
1F19B846000
|
heap
|
page read and write
|
||
1F19F6FB000
|
trusted library allocation
|
page read and write
|
||
1F1A63EC000
|
trusted library allocation
|
page read and write
|
||
1F1A07FD000
|
trusted library allocation
|
page read and write
|
||
1F19B1F6000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A05F3000
|
trusted library allocation
|
page read and write
|
||
1F1A9590000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F19B84B000
|
heap
|
page read and write
|
||
1F19B822000
|
heap
|
page read and write
|
||
1F19E689000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19ED0F000
|
trusted library allocation
|
page read and write
|
||
14DDB607000
|
trusted library allocation
|
page read and write
|
||
D31BABE000
|
stack
|
page read and write
|
||
1F1A6168000
|
trusted library allocation
|
page read and write
|
||
1F199F75000
|
trusted library allocation
|
page read and write
|
||
1F19F534000
|
trusted library allocation
|
page read and write
|
||
1F1A6898000
|
trusted library allocation
|
page read and write
|
||
1F19F628000
|
trusted library allocation
|
page read and write
|
||
1F19F02C000
|
trusted library allocation
|
page read and write
|
||
1F1A9F35000
|
trusted library allocation
|
page read and write
|
||
1F194E82000
|
heap
|
page read and write
|
||
1F1A96BF000
|
trusted library allocation
|
page read and write
|
||
1F1A63A7000
|
trusted library allocation
|
page read and write
|
||
1F194EFE000
|
heap
|
page read and write
|
||
1F1A63A9000
|
trusted library allocation
|
page read and write
|
||
1F1A80A5000
|
trusted library allocation
|
page read and write
|
||
1F1A68D8000
|
trusted library allocation
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
2E9A35C000
|
stack
|
page read and write
|
||
1F19EDBE000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A18B3000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A188C000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F19FF38000
|
trusted library allocation
|
page read and write
|
||
14DDB340000
|
heap
|
page read and write
|
||
1F19E629000
|
trusted library allocation
|
page read and write
|
||
1F19DE8D000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
27142029000
|
heap
|
page read and write
|
||
1F19B1A5000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19FEF3000
|
trusted library allocation
|
page read and write
|
||
2714206D000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19ECB3000
|
trusted library allocation
|
page read and write
|
||
1F19E68F000
|
trusted library allocation
|
page read and write
|
||
1F19DAA5000
|
trusted library allocation
|
page read and write
|
||
1F19B882000
|
heap
|
page read and write
|
||
1F19F6E8000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A058D000
|
trusted library allocation
|
page read and write
|
||
1F19FD8F000
|
trusted library allocation
|
page read and write
|
||
1F1A14DE000
|
trusted library allocation
|
page read and write
|
||
B5CBDD8000
|
stack
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F19ED91000
|
trusted library allocation
|
page read and write
|
||
1F19F574000
|
trusted library allocation
|
page read and write
|
||
1F1AA0A8000
|
trusted library allocation
|
page read and write
|
||
1F1A270C000
|
trusted library allocation
|
page read and write
|
||
1F194EA0000
|
heap
|
page read and write
|
||
1F1A0032000
|
trusted library allocation
|
page read and write
|
||
1F1A186D000
|
trusted library allocation
|
page read and write
|
||
1F194F05000
|
heap
|
page read and write
|
||
1F19F46B000
|
trusted library allocation
|
page read and write
|
||
1F19F009000
|
trusted library allocation
|
page read and write
|
||
1F1A0007000
|
trusted library allocation
|
page read and write
|
||
1F1A06D8000
|
trusted library allocation
|
page read and write
|
||
1F19FDC5000
|
trusted library allocation
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
2A2F5CC0000
|
heap
|
page read and write
|
||
1F19FDFE000
|
trusted library allocation
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F1A6822000
|
trusted library allocation
|
page read and write
|
||
1F1A1851000
|
trusted library allocation
|
page read and write
|
||
2E9D77E000
|
stack
|
page read and write
|
||
1F019C26000
|
heap
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19DE59000
|
trusted library allocation
|
page read and write
|
||
2E9ADD8000
|
stack
|
page read and write
|
||
1F1AA4BC000
|
heap
|
page read and write
|
||
1F019C62000
|
unclassified section
|
page read and write
|
||
1F1A9590000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A95AD000
|
trusted library allocation
|
page read and write
|
||
2A2F61B0000
|
heap
|
page read and write
|
||
2A2F6000000
|
heap
|
page read and write
|
||
1F1A95C8000
|
trusted library allocation
|
page read and write
|
||
27142000000
|
heap
|
page read and write
|
||
1F1A68C3000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A1864000
|
trusted library allocation
|
page read and write
|
||
1F19F58F000
|
trusted library allocation
|
page read and write
|
||
1F1AA08D000
|
trusted library allocation
|
page read and write
|
||
1F1A06FE000
|
trusted library allocation
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F1A0613000
|
trusted library allocation
|
page read and write
|
||
1F19B8AB000
|
heap
|
page read and write
|
||
1F194E8F000
|
heap
|
page read and write
|
||
1F1A607E000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F1A188A000
|
trusted library allocation
|
page read and write
|
||
2A2F5E50000
|
unclassified section
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F1A05A8000
|
trusted library allocation
|
page read and write
|
||
1F1A08EC000
|
trusted library allocation
|
page read and write
|
||
271413E7000
|
trusted library allocation
|
page read and write
|
||
1F199F6A000
|
trusted library allocation
|
page read and write
|
||
1F19F5CD000
|
trusted library allocation
|
page read and write
|
||
1F1A0533000
|
trusted library allocation
|
page read and write
|
||
1F19DDB3000
|
trusted library allocation
|
page read and write
|
||
27141FE6000
|
heap
|
page read and write
|
||
1F19FFAA000
|
trusted library allocation
|
page read and write
|
||
1F1A9C75000
|
trusted library allocation
|
page read and write
|
||
1F19FDE2000
|
trusted library allocation
|
page read and write
|
||
1F1A055D000
|
trusted library allocation
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19B897000
|
heap
|
page read and write
|
||
27141F5F000
|
heap
|
page read and write
|
||
1F194EBA000
|
heap
|
page read and write
|
||
1F19B1F0000
|
trusted library allocation
|
page read and write
|
||
1F1A042C000
|
trusted library allocation
|
page read and write
|
||
1F19DEA5000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F18FDE2000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F19F03B000
|
trusted library allocation
|
page read and write
|
||
6F24DFA000
|
stack
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F194E99000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
27142029000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F1A9F3F000
|
trusted library allocation
|
page read and write
|
||
1F1A90AD000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19F031000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1A62B9000
|
trusted library allocation
|
page read and write
|
||
1F1A1898000
|
trusted library allocation
|
page read and write
|
||
1F1A95D6000
|
trusted library allocation
|
page read and write
|
||
27141FED000
|
heap
|
page read and write
|
||
1F1A6892000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F1AA33E000
|
trusted library allocation
|
page read and write
|
||
1F1A1820000
|
trusted library allocation
|
page read and write
|
||
1F19B895000
|
heap
|
page read and write
|
||
1F1998DF000
|
trusted library allocation
|
page read and write
|
||
1F1A042F000
|
trusted library allocation
|
page read and write
|
||
2A2F5E40000
|
heap
|
page readonly
|
||
1F194EF3000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19FE92000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19AE4D000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F1A6255000
|
trusted library allocation
|
page read and write
|
||
1F1AA0D7000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F19F9CD000
|
trusted library allocation
|
page read and write
|
||
1F1AA06B000
|
trusted library allocation
|
page read and write
|
||
1F19E1BD000
|
trusted library allocation
|
page read and write
|
||
1F1A955C000
|
trusted library allocation
|
page read and write
|
||
1F1A14EB000
|
trusted library allocation
|
page read and write
|
||
1F1A0B75000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F19FF87000
|
trusted library allocation
|
page read and write
|
||
1F1A057C000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F1A9F3F000
|
trusted library allocation
|
page read and write
|
||
1F1A9FF3000
|
trusted library allocation
|
page read and write
|
||
1F1A5FE5000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F194EB6000
|
heap
|
page read and write
|
||
1F194EFE000
|
heap
|
page read and write
|
||
1F1A001B000
|
trusted library allocation
|
page read and write
|
||
B5CB35C000
|
stack
|
page read and write
|
||
1F1A9FE7000
|
trusted library allocation
|
page read and write
|
||
1F19DF49000
|
trusted library allocation
|
page read and write
|
||
1F19DFD2000
|
trusted library allocation
|
page read and write
|
||
1089000
|
heap
|
page read and write
|
||
1F19FCC5000
|
trusted library allocation
|
page read and write
|
||
1F199E76000
|
trusted library allocation
|
page read and write
|
||
1F1AA0DD000
|
trusted library allocation
|
page read and write
|
||
1F1A14A1000
|
trusted library allocation
|
page read and write
|
||
1F199890000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F1A05F5000
|
trusted library allocation
|
page read and write
|
||
1F1A952B000
|
trusted library allocation
|
page read and write
|
||
1F19F3F6000
|
trusted library allocation
|
page read and write
|
||
1F1A9938000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194EA7000
|
heap
|
page read and write
|
||
1F19F02C000
|
trusted library allocation
|
page read and write
|
||
1F19DD84000
|
trusted library allocation
|
page read and write
|
||
1F1A0090000
|
trusted library allocation
|
page read and write
|
||
1F1A6182000
|
trusted library allocation
|
page read and write
|
||
1F194EE9000
|
heap
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F1A05EB000
|
trusted library allocation
|
page read and write
|
||
2A2F5D13000
|
trusted library allocation
|
page read and write
|
||
1F019BF0000
|
heap
|
page read and write
|
||
1F1A63C5000
|
trusted library allocation
|
page read and write
|
||
27142029000
|
heap
|
page read and write
|
||
1F19FCD8000
|
trusted library allocation
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F19FD1A000
|
trusted library allocation
|
page read and write
|
||
1F1A68C3000
|
trusted library allocation
|
page read and write
|
||
27141FED000
|
heap
|
page read and write
|
||
1F19F6AF000
|
trusted library allocation
|
page read and write
|
||
1F1AAC47000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1E431100000
|
trusted library allocation
|
page read and write
|
||
1F19DADC000
|
trusted library allocation
|
page read and write
|
||
1F194EA0000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1AA0D1000
|
trusted library allocation
|
page read and write
|
||
1F1AA076000
|
trusted library allocation
|
page read and write
|
||
1F19FF8B000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A68F1000
|
trusted library allocation
|
page read and write
|
||
1F1A63F9000
|
trusted library allocation
|
page read and write
|
||
1F1A63F1000
|
trusted library allocation
|
page read and write
|
||
1F19F565000
|
trusted library allocation
|
page read and write
|
||
1F19EC48000
|
trusted library allocation
|
page read and write
|
||
1069000
|
heap
|
page read and write
|
||
1F19B1F8000
|
trusted library allocation
|
page read and write
|
||
1F194F17000
|
heap
|
page read and write
|
||
1F19FD23000
|
trusted library allocation
|
page read and write
|
||
1F1AA08D000
|
trusted library allocation
|
page read and write
|
||
1F1A18B3000
|
trusted library allocation
|
page read and write
|
||
1F1A04C7000
|
trusted library allocation
|
page read and write
|
||
1F19EC3A000
|
trusted library allocation
|
page read and write
|
||
27140F60000
|
unclassified section
|
page readonly
|
||
1F194F08000
|
heap
|
page read and write
|
||
1F19B0D0000
|
trusted library allocation
|
page read and write
|
||
1F19F4BC000
|
trusted library allocation
|
page read and write
|
||
1F194E9A000
|
heap
|
page read and write
|
||
1F19F3DE000
|
trusted library allocation
|
page read and write
|
||
1F1A63AE000
|
trusted library allocation
|
page read and write
|
||
1F19F35E000
|
trusted library allocation
|
page read and write
|
||
1F19FDDE000
|
trusted library allocation
|
page read and write
|
||
2A2F5D78000
|
trusted library allocation
|
page read and write
|
||
1F19B8F0000
|
heap
|
page read and write
|
||
1F194EA3000
|
heap
|
page read and write
|
||
1F194E9F000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A63F1000
|
trusted library allocation
|
page read and write
|
||
1F194E79000
|
heap
|
page read and write
|
||
D31B1FE000
|
unkown
|
page readonly
|
||
1F1A07E8000
|
trusted library allocation
|
page read and write
|
||
1F1A63DC000
|
trusted library allocation
|
page read and write
|
||
1F19E661000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F19E65D000
|
trusted library allocation
|
page read and write
|
||
1F194EFC000
|
heap
|
page read and write
|
||
1F19EDCC000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F19F56C000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F194F19000
|
heap
|
page read and write
|
||
1F194E8D000
|
heap
|
page read and write
|
||
1F1A0AC9000
|
trusted library allocation
|
page read and write
|
||
1F19B1EB000
|
trusted library allocation
|
page read and write
|
||
1F1A8C00000
|
trusted library allocation
|
page read and write
|
||
1F1A99E8000
|
trusted library allocation
|
page read and write
|
||
1F194EB1000
|
heap
|
page read and write
|
||
1F194EB0000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F19DD84000
|
trusted library allocation
|
page read and write
|
||
1F1A14CB000
|
trusted library allocation
|
page read and write
|
||
1F19F366000
|
trusted library allocation
|
page read and write
|
||
1F19F6BD000
|
trusted library allocation
|
page read and write
|
||
1F194EB4000
|
heap
|
page read and write
|
||
1F1AA2E4000
|
trusted library allocation
|
page read and write
|
||
1F19B1EB000
|
trusted library allocation
|
page read and write
|
||
2714203B000
|
heap
|
page read and write
|
||
1F1A09E0000
|
trusted library allocation
|
page read and write
|
||
1F194E8E000
|
heap
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1A7987000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F19E663000
|
trusted library allocation
|
page read and write
|
||
1F194E88000
|
heap
|
page read and write
|
||
1F19FDF5000
|
trusted library allocation
|
page read and write
|
||
1F1A68CC000
|
trusted library allocation
|
page read and write
|
||
1F1AA0DD000
|
trusted library allocation
|
page read and write
|
||
1F1A06FE000
|
trusted library allocation
|
page read and write
|
||
1F194E9D000
|
heap
|
page read and write
|
||
1F1AAC56000
|
trusted library allocation
|
page read and write
|
||
1F19DECE000
|
trusted library allocation
|
page read and write
|
||
1F1A95EE000
|
trusted library allocation
|
page read and write
|
||
1F194EEE000
|
heap
|
page read and write
|
||
1F194EE5000
|
heap
|
page read and write
|
||
1F19DE65000
|
trusted library allocation
|
page read and write
|
||
1F194E94000
|
heap
|
page read and write
|
||
1F1A68D8000
|
trusted library allocation
|
page read and write
|
||
1F19B078000
|
trusted library allocation
|
page read and write
|
||
1F19DE59000
|
trusted library allocation
|
page read and write
|
||
1F19FF46000
|
trusted library allocation
|
page read and write
|
||
1F194F11000
|
heap
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19F4B5000
|
trusted library allocation
|
page read and write
|
||
1F1A7A86000
|
trusted library allocation
|
page read and write
|
||
1F19DFC7000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F194EA5000
|
heap
|
page read and write
|
||
1E43120A000
|
trusted library allocation
|
page read and write
|
||
1F019F64000
|
trusted library allocation
|
page read and write
|
||
1F19B8D9000
|
heap
|
page read and write
|
||
1F194EE6000
|
heap
|
page read and write
|
||
1F19F9BA000
|
trusted library allocation
|
page read and write
|
||
1F194F0F000
|
heap
|
page read and write
|
||
1F1A9F4C000
|
trusted library allocation
|
page read and write
|
||
1F1A2786000
|
trusted library allocation
|
page read and write
|
||
1F1A9079000
|
trusted library allocation
|
page read and write
|
||
1F19ED6A000
|
trusted library allocation
|
page read and write
|
||
1F1A6874000
|
trusted library allocation
|
page read and write
|
||
1F194EF5000
|
heap
|
page read and write
|
||
1F194EA4000
|
heap
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
27141F69000
|
heap
|
page read and write
|
||
1F19DAEC000
|
trusted library allocation
|
page read and write
|
||
1F19F9BA000
|
trusted library allocation
|
page read and write
|
||
1F194EC5000
|
heap
|
page read and write
|
||
1F19E1CD000
|
trusted library allocation
|
page read and write
|
||
1E432B3A000
|
heap
|
page read and write
|
||
1F19DFA7000
|
trusted library allocation
|
page read and write
|
||
1F1A0BD6000
|
trusted library allocation
|
page read and write
|
||
1F194E7A000
|
heap
|
page read and write
|
||
1F1A05D3000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F1A6876000
|
trusted library allocation
|
page read and write
|
||
1F194EC0000
|
heap
|
page read and write
|
||
1F194E95000
|
heap
|
page read and write
|
||
1F194E77000
|
heap
|
page read and write
|
||
1F19F4B5000
|
trusted library allocation
|
page read and write
|
||
1F1998C0000
|
trusted library allocation
|
page read and write
|
||
1F194EED000
|
heap
|
page read and write
|
||
1F194ED6000
|
heap
|
page read and write
|
||
1F1A80E8000
|
trusted library allocation
|
page read and write
|
||
1F1A6097000
|
trusted library allocation
|
page read and write
|
||
1F194EFC000
|
heap
|
page read and write
|
||
1F1A9523000
|
trusted library allocation
|
page read and write
|
||
1F1A63E0000
|
trusted library allocation
|
page read and write
|
||
2714206D000
|
heap
|
page read and write
|
||
2A2F5D49000
|
trusted library allocation
|
page read and write
|
||
2714202B000
|
heap
|
page read and write
|
There are 4078 hidden memdumps, click here to show them.