Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_3b636ac8-4ab4-4839-b2e3-b3220a7a0b96.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_3b636ac8-4ab4-4839-b2e3-b3220a7a0b96.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
|
ASCII text, with very long lines (1769), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1769), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228
-prefMapHandle 2220 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {343c6f86-1b5f-473e-9dba-35b770c7833f} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1fd7576dd10 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3016 -parentBuildID 20230927232528 -prefsHandle 3060
-prefMapHandle 2996 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2796a079-c3f2-485a-9277-415ee10c3b63}
7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1fd05fc6e10 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5132 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 5180 -prefMapHandle 5176 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {99b798a6-e00b-468f-8fbe-32fc4b2fef5c} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1fd0f5fab10 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
|
unknown
|
||
https://mathiasbynens.be/notes/javascript-escapes#single
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warning
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://youtube.com/account?=ht~
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
http://exslt.org/sets
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
|
unknown
|
||
https://www.instagram.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
http://exslt.org/common
|
unknown
|
||
https://ok.ru/
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://fpn.firefox.com
|
unknown
|
||
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
http://exslt.org/dates-and-times
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://amazon.com
|
unknown
|
||
http://detectportal.firefox.comP
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://spocs.getpocket.com/CN=The
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.0/
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://youtube.com/var(--focus-outline)
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
http://youtube.com/
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://a9.com/-/spec/opensearch/1.1/
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
|
unknown
|
||
https://duckduckgo.com/?t=ffab&q=
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mathiasbynens.be/
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.196.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.193
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.193.91
|
||
dyna.wikimedia.org
|
185.15.58.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.181.78
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
172.217.17.78
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.129.140
|
||
ipv4only.arpa
|
192.0.0.170
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 21 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
151.101.193.91
|
services.addons.mozilla.org
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
142.250.181.78
|
youtube.com
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F5F000
|
heap
|
page read and write
|
||
F64000
|
heap
|
page read and write
|
||
1FD0DF9D000
|
trusted library allocation
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD08EE8000
|
trusted library allocation
|
page read and write
|
||
1FD06A10000
|
trusted library allocation
|
page read and write
|
||
1FD0549D000
|
trusted library allocation
|
page read and write
|
||
1FD7FD78000
|
trusted library allocation
|
page read and write
|
||
1FD069D9000
|
trusted library allocation
|
page read and write
|
||
1FD05340000
|
trusted library allocation
|
page read and write
|
||
1FD7FE4F000
|
trusted library allocation
|
page read and write
|
||
1FD02DAA000
|
heap
|
page read and write
|
||
1B391917000
|
trusted library allocation
|
page read and write
|
||
1B3915C6000
|
heap
|
page read and write
|
||
1FD05AF6000
|
trusted library allocation
|
page read and write
|
||
1FD10887000
|
trusted library allocation
|
page read and write
|
||
1FD07168000
|
trusted library allocation
|
page read and write
|
||
1FD05471000
|
trusted library allocation
|
page read and write
|
||
1FD7C484000
|
heap
|
page read and write
|
||
1FD07189000
|
trusted library allocation
|
page read and write
|
||
1FD7E66D000
|
trusted library allocation
|
page read and write
|
||
1FD08E77000
|
trusted library allocation
|
page read and write
|
||
1FD068B0000
|
trusted library allocation
|
page read and write
|
||
23A8AB26000
|
heap
|
page read and write
|
||
1FD08E5C000
|
trusted library allocation
|
page read and write
|
||
1FD06CB5000
|
trusted library allocation
|
page read and write
|
||
1FD06AFA000
|
trusted library allocation
|
page read and write
|
||
1FD0E3DB000
|
trusted library allocation
|
page read and write
|
||
1FD053D6000
|
trusted library allocation
|
page read and write
|
||
1FD0F2BB000
|
trusted library allocation
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
1FD0DB1C000
|
trusted library allocation
|
page read and write
|
||
482DE7E000
|
unkown
|
page readonly
|
||
1FD06C78000
|
trusted library allocation
|
page read and write
|
||
1ED5FDC0000
|
unclassified section
|
page readonly
|
||
A9C000
|
unkown
|
page readonly
|
||
1FD05AEF000
|
trusted library allocation
|
page read and write
|
||
72365FF000
|
stack
|
page read and write
|
||
1FD0E3E1000
|
trusted library allocation
|
page read and write
|
||
1FD0DBED000
|
trusted library allocation
|
page read and write
|
||
1FD069D7000
|
trusted library allocation
|
page read and write
|
||
1FD0686B000
|
trusted library allocation
|
page read and write
|
||
1FD06C59000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0EFCB000
|
trusted library allocation
|
page read and write
|
||
1FD070B0000
|
trusted library allocation
|
page read and write
|
||
1FD06C36000
|
trusted library allocation
|
page read and write
|
||
1FD0524E000
|
trusted library allocation
|
page read and write
|
||
1FD057C7000
|
trusted library allocation
|
page read and write
|
||
1ED60E23000
|
heap
|
page read and write
|
||
1FD07722000
|
trusted library allocation
|
page read and write
|
||
1FD7FD95000
|
trusted library allocation
|
page read and write
|
||
1FD7FD7E000
|
trusted library allocation
|
page read and write
|
||
1ED60E40000
|
heap
|
page read and write
|
||
1ED60110000
|
trusted library allocation
|
page read and write
|
||
1FD0544D000
|
trusted library allocation
|
page read and write
|
||
1FD08EAB000
|
trusted library allocation
|
page read and write
|
||
1FD02DA9000
|
heap
|
page read and write
|
||
1FD06C8D000
|
trusted library allocation
|
page read and write
|
||
1FD08B2A000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD0F3AD000
|
trusted library allocation
|
page read and write
|
||
1FD05BB6000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD3000
|
trusted library allocation
|
page read and write
|
||
1FD08E8C000
|
trusted library allocation
|
page read and write
|
||
1FD05AE3000
|
trusted library allocation
|
page read and write
|
||
1FD7C4A0000
|
heap
|
page read and write
|
||
1FD0693B000
|
trusted library allocation
|
page read and write
|
||
1FD08BA3000
|
trusted library allocation
|
page read and write
|
||
1FD116CE000
|
trusted library allocation
|
page read and write
|
||
1FD7C41E000
|
heap
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD0F5B3000
|
trusted library allocation
|
page read and write
|
||
1FD0661A000
|
trusted library allocation
|
page read and write
|
||
972783E000
|
unkown
|
page readonly
|
||
1FD0695A000
|
trusted library allocation
|
page read and write
|
||
1FD106F5000
|
trusted library allocation
|
page read and write
|
||
1FD0573A000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE0000
|
trusted library allocation
|
page read and write
|
||
1FD054C2000
|
trusted library allocation
|
page read and write
|
||
1FD07E12000
|
trusted library allocation
|
page read and write
|
||
1FD02BF6000
|
trusted library allocation
|
page read and write
|
||
1FD7FEA8000
|
trusted library allocation
|
page read and write
|
||
1FD08E73000
|
trusted library allocation
|
page read and write
|
||
1FD0686B000
|
trusted library allocation
|
page read and write
|
||
1FD0F5D5000
|
trusted library allocation
|
page read and write
|
||
1FD05AB5000
|
trusted library allocation
|
page read and write
|
||
1FD08BF6000
|
trusted library allocation
|
page read and write
|
||
1ED60EB7000
|
heap
|
page read and write
|
||
1FD054AD000
|
trusted library allocation
|
page read and write
|
||
1FD0F412000
|
trusted library allocation
|
page read and write
|
||
1ED60DAC000
|
heap
|
page read and write
|
||
1FD0F5C3000
|
trusted library allocation
|
page read and write
|
||
1FD10200000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD7C4AD000
|
heap
|
page read and write
|
||
1FD0F425000
|
trusted library allocation
|
page read and write
|
||
1FD07981000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD106FB000
|
trusted library allocation
|
page read and write
|
||
1FD06C47000
|
trusted library allocation
|
page read and write
|
||
1FD7C4AB000
|
heap
|
page read and write
|
||
1FD0D9A5000
|
trusted library allocation
|
page read and write
|
||
1FD7E686000
|
trusted library allocation
|
page read and write
|
||
1FD0D97D000
|
trusted library allocation
|
page read and write
|
||
1FD0DC49000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD04F88000
|
trusted library allocation
|
page read and write
|
||
1ED6012F000
|
trusted library allocation
|
page read and write
|
||
1FD0E1A3000
|
trusted library allocation
|
page read and write
|
||
1FD06CF9000
|
trusted library allocation
|
page read and write
|
||
1FD06A80000
|
trusted library allocation
|
page read and write
|
||
1FD0693E000
|
trusted library allocation
|
page read and write
|
||
1FD0537F000
|
trusted library allocation
|
page read and write
|
||
1FD05AE1000
|
trusted library allocation
|
page read and write
|
||
1FD071DB000
|
trusted library allocation
|
page read and write
|
||
1FD0EFB4000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD0536F000
|
trusted library allocation
|
page read and write
|
||
972683E000
|
unkown
|
page readonly
|
||
1FD06AC9000
|
trusted library allocation
|
page read and write
|
||
1FD05100000
|
trusted library allocation
|
page read and write
|
||
1FD0DAB6000
|
trusted library allocation
|
page read and write
|
||
1FD08BF7000
|
trusted library allocation
|
page read and write
|
||
1FD0E3E6000
|
trusted library allocation
|
page read and write
|
||
1FD7C451000
|
heap
|
page read and write
|
||
1FD7C4AD000
|
heap
|
page read and write
|
||
1FD092F9000
|
trusted library allocation
|
page read and write
|
||
1FD7C484000
|
heap
|
page read and write
|
||
1FD7C41F000
|
heap
|
page read and write
|
||
1FD05B64000
|
trusted library allocation
|
page read and write
|
||
1FD0DC91000
|
trusted library allocation
|
page read and write
|
||
1FD066A5000
|
trusted library allocation
|
page read and write
|
||
1FD06A35000
|
trusted library allocation
|
page read and write
|
||
1FD0DFDA000
|
trusted library allocation
|
page read and write
|
||
1FD05B2E000
|
trusted library allocation
|
page read and write
|
||
1FD0EFAE000
|
trusted library allocation
|
page read and write
|
||
1FD0F5E7000
|
trusted library allocation
|
page read and write
|
||
1FD7FEA1000
|
trusted library allocation
|
page read and write
|
||
1FD0696F000
|
trusted library allocation
|
page read and write
|
||
1FD05ADD000
|
trusted library allocation
|
page read and write
|
||
1FD7C491000
|
heap
|
page read and write
|
||
1FD05ADC000
|
trusted library allocation
|
page read and write
|
||
1ED60E28000
|
heap
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
23A8AB3F000
|
heap
|
page read and write
|
||
1FD069AE000
|
trusted library allocation
|
page read and write
|
||
1FD0E14D000
|
trusted library allocation
|
page read and write
|
||
1FD0DAB2000
|
trusted library allocation
|
page read and write
|
||
1FD0F395000
|
trusted library allocation
|
page read and write
|
||
1FD06CB5000
|
trusted library allocation
|
page read and write
|
||
1FD7C49F000
|
heap
|
page read and write
|
||
1FD06AE1000
|
trusted library allocation
|
page read and write
|
||
1FD052A0000
|
trusted library allocation
|
page read and write
|
||
1FD0E3FE000
|
trusted library allocation
|
page read and write
|
||
1FD0F484000
|
trusted library allocation
|
page read and write
|
||
1FD05467000
|
trusted library allocation
|
page read and write
|
||
1FD066EF000
|
trusted library allocation
|
page read and write
|
||
1FD053A7000
|
trusted library allocation
|
page read and write
|
||
1FD06612000
|
trusted library allocation
|
page read and write
|
||
1FD06AA2000
|
trusted library allocation
|
page read and write
|
||
F78000
|
heap
|
page read and write
|
||
1FD069DF000
|
trusted library allocation
|
page read and write
|
||
1FD08DFB000
|
trusted library allocation
|
page read and write
|
||
1FD7E5C0000
|
trusted library allocation
|
page read and write
|
||
1FD06676000
|
trusted library allocation
|
page read and write
|
||
1FD0716F000
|
trusted library allocation
|
page read and write
|
||
1FD079E9000
|
trusted library allocation
|
page read and write
|
||
1FD06C78000
|
trusted library allocation
|
page read and write
|
||
1FD116ED000
|
trusted library allocation
|
page read and write
|
||
1FD05AEF000
|
trusted library allocation
|
page read and write
|
||
1FD0F3A7000
|
trusted library allocation
|
page read and write
|
||
22569173000
|
trusted library allocation
|
page read and write
|
||
1FD7C475000
|
heap
|
page read and write
|
||
1FD02D73000
|
heap
|
page read and write
|
||
1ED60E31000
|
heap
|
page read and write
|
||
1FD06AB1000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD7FD4E000
|
trusted library allocation
|
page read and write
|
||
1FD0E016000
|
trusted library allocation
|
page read and write
|
||
1FD05ABC000
|
trusted library allocation
|
page read and write
|
||
1FD108CA000
|
trusted library allocation
|
page read and write
|
||
1FD0F386000
|
trusted library allocation
|
page read and write
|
||
1FD09258000
|
trusted library allocation
|
page read and write
|
||
1FD0DD84000
|
trusted library allocation
|
page read and write
|
||
1FD06C77000
|
trusted library allocation
|
page read and write
|
||
1FD069EC000
|
trusted library allocation
|
page read and write
|
||
1FD06A72000
|
trusted library allocation
|
page read and write
|
||
1FD05AF8000
|
trusted library allocation
|
page read and write
|
||
1FD05B99000
|
trusted library allocation
|
page read and write
|
||
1FD06ACA000
|
trusted library allocation
|
page read and write
|
||
1FD0549D000
|
trusted library allocation
|
page read and write
|
||
1FD05AFE000
|
trusted library allocation
|
page read and write
|
||
1FD0F3F5000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD06AD2000
|
trusted library allocation
|
page read and write
|
||
1FD054FE000
|
trusted library allocation
|
page read and write
|
||
1FD0F3FB000
|
trusted library allocation
|
page read and write
|
||
1FD0689C000
|
trusted library allocation
|
page read and write
|
||
1FD05BF5000
|
trusted library allocation
|
page read and write
|
||
1FD068BC000
|
trusted library allocation
|
page read and write
|
||
1FD054AB000
|
trusted library allocation
|
page read and write
|
||
1FD066FE000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD0E3C9000
|
trusted library allocation
|
page read and write
|
||
22568CA0000
|
unclassified section
|
page readonly
|
||
1FD05F3C000
|
trusted library allocation
|
page read and write
|
||
1FD02B55000
|
trusted library allocation
|
page read and write
|
||
1FD069F4000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
1FD071A0000
|
trusted library allocation
|
page read and write
|
||
1FD069F4000
|
trusted library allocation
|
page read and write
|
||
1FD05BF3000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC1000
|
trusted library allocation
|
page read and write
|
||
1FD06807000
|
trusted library allocation
|
page read and write
|
||
1FD06AB6000
|
trusted library allocation
|
page read and write
|
||
1FD08EB7000
|
trusted library allocation
|
page read and write
|
||
1ED60DA0000
|
heap
|
page read and write
|
||
1FD0F347000
|
trusted library allocation
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD05357000
|
trusted library allocation
|
page read and write
|
||
1FD7C495000
|
heap
|
page read and write
|
||
1FD09304000
|
trusted library allocation
|
page read and write
|
||
1FD07D43000
|
trusted library allocation
|
page read and write
|
||
1FD0D9DD000
|
trusted library allocation
|
page read and write
|
||
1FD7FE6E000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD108F9000
|
trusted library allocation
|
page read and write
|
||
1FD0F591000
|
trusted library allocation
|
page read and write
|
||
1FD05BE0000
|
trusted library allocation
|
page read and write
|
||
23A8AB25000
|
heap
|
page read and write
|
||
1FD069E7000
|
trusted library allocation
|
page read and write
|
||
1FD7C41B000
|
heap
|
page read and write
|
||
1FD7C41F000
|
heap
|
page read and write
|
||
1FD06A72000
|
trusted library allocation
|
page read and write
|
||
1FD0EFEE000
|
trusted library allocation
|
page read and write
|
||
1FD052D6000
|
trusted library allocation
|
page read and write
|
||
1FD054AF000
|
trusted library allocation
|
page read and write
|
||
1FD0F348000
|
trusted library allocation
|
page read and write
|
||
1FD07EA7000
|
trusted library allocation
|
page read and write
|
||
1FD05DD7000
|
trusted library allocation
|
page read and write
|
||
1FD06A45000
|
trusted library allocation
|
page read and write
|
||
1FD06A96000
|
trusted library allocation
|
page read and write
|
||
1ED6015F000
|
trusted library allocation
|
page read and write
|
||
1FD0F359000
|
trusted library allocation
|
page read and write
|
||
1FD08BAE000
|
trusted library allocation
|
page read and write
|
||
1FD104AA000
|
trusted library allocation
|
page read and write
|
||
1FD10B00000
|
trusted library allocation
|
page read and write
|
||
1FD7C49A000
|
heap
|
page read and write
|
||
1FD07047000
|
trusted library allocation
|
page read and write
|
||
1FD7EFED000
|
trusted library allocation
|
page read and write
|
||
1FD7FEA8000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1FD07E56000
|
trusted library allocation
|
page read and write
|
||
1FD07AB6000
|
trusted library allocation
|
page read and write
|
||
16DC9F803000
|
trusted library allocation
|
page read and write
|
||
1FD02B61000
|
trusted library allocation
|
page read and write
|
||
1FD104C0000
|
trusted library allocation
|
page read and write
|
||
1FD069CB000
|
trusted library allocation
|
page read and write
|
||
1FD07E3E000
|
trusted library allocation
|
page read and write
|
||
1B391712000
|
trusted library allocation
|
page read and write
|
||
1ED60E31000
|
heap
|
page read and write
|
||
1FD7FDCE000
|
trusted library allocation
|
page read and write
|
||
1FD08B96000
|
trusted library allocation
|
page read and write
|
||
1FD0526C000
|
trusted library allocation
|
page read and write
|
||
1FD7C458000
|
heap
|
page read and write
|
||
1FD069EC000
|
trusted library allocation
|
page read and write
|
||
1FD06CF6000
|
trusted library allocation
|
page read and write
|
||
1FD7C451000
|
heap
|
page read and write
|
||
1FD068E8000
|
trusted library allocation
|
page read and write
|
||
1ED60E28000
|
heap
|
page read and write
|
||
1FD071C0000
|
trusted library allocation
|
page read and write
|
||
1FD068FB000
|
trusted library allocation
|
page read and write
|
||
F59F6103000
|
trusted library allocation
|
page read and write
|
||
1FD0E1C0000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCF000
|
trusted library allocation
|
page read and write
|
||
1B39176E000
|
trusted library allocation
|
page read and write
|
||
1FD08EA6000
|
trusted library allocation
|
page read and write
|
||
1FD0F474000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1FD08B33000
|
trusted library allocation
|
page read and write
|
||
1FD02D92000
|
heap
|
page read and write
|
||
1FD05BB6000
|
trusted library allocation
|
page read and write
|
||
1FD08B9B000
|
trusted library allocation
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD0DAB2000
|
trusted library allocation
|
page read and write
|
||
1FD05BED000
|
trusted library allocation
|
page read and write
|
||
1FD0F4CB000
|
trusted library allocation
|
page read and write
|
||
1FD07131000
|
trusted library allocation
|
page read and write
|
||
1FD0DAF9000
|
trusted library allocation
|
page read and write
|
||
1FD0DBEF000
|
trusted library allocation
|
page read and write
|
||
1FD070FC000
|
trusted library allocation
|
page read and write
|
||
1FD7C422000
|
heap
|
page read and write
|
||
1FD7FBC5000
|
trusted library allocation
|
page read and write
|
||
1FD08B0B000
|
trusted library allocation
|
page read and write
|
||
1FD7FEBE000
|
trusted library allocation
|
page read and write
|
||
1FD0E05B000
|
trusted library allocation
|
page read and write
|
||
1FD0E1E4000
|
trusted library allocation
|
page read and write
|
||
1FD0F599000
|
trusted library allocation
|
page read and write
|
||
1FD068E8000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD08EA9000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD06898000
|
trusted library allocation
|
page read and write
|
||
1FD02BDB000
|
trusted library allocation
|
page read and write
|
||
1FD0DF0A000
|
trusted library allocation
|
page read and write
|
||
1ED60DCA000
|
heap
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0EFBC000
|
trusted library allocation
|
page read and write
|
||
1FD10DA8000
|
trusted library allocation
|
page read and write
|
||
1FD06CEE000
|
trusted library allocation
|
page read and write
|
||
1ED602C0000
|
heap
|
page read and write
|
||
1FD1069F000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD7FCE2000
|
trusted library allocation
|
page read and write
|
||
1FD0543F000
|
trusted library allocation
|
page read and write
|
||
1FD0545A000
|
trusted library allocation
|
page read and write
|
||
1FD0E1E6000
|
trusted library allocation
|
page read and write
|
||
1FD7EFB3000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD08BF6000
|
trusted library allocation
|
page read and write
|
||
1FD069DF000
|
trusted library allocation
|
page read and write
|
||
1FD06953000
|
trusted library allocation
|
page read and write
|
||
1FD06C78000
|
trusted library allocation
|
page read and write
|
||
1FD09289000
|
trusted library allocation
|
page read and write
|
||
1FD0EFBC000
|
trusted library allocation
|
page read and write
|
||
1FD05220000
|
trusted library allocation
|
page read and write
|
||
1FD0DAE9000
|
trusted library allocation
|
page read and write
|
||
1FD0F331000
|
trusted library allocation
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD08EAF000
|
trusted library allocation
|
page read and write
|
||
1FD10428000
|
trusted library allocation
|
page read and write
|
||
1FD06964000
|
trusted library allocation
|
page read and write
|
||
1FD0DB13000
|
trusted library allocation
|
page read and write
|
||
1FD0E1BE000
|
trusted library allocation
|
page read and write
|
||
1FD05453000
|
trusted library allocation
|
page read and write
|
||
482BBAE000
|
stack
|
page read and write
|
||
1FD06CC5000
|
trusted library allocation
|
page read and write
|
||
1FD0D98F000
|
trusted library allocation
|
page read and write
|
||
1FD07EB9000
|
trusted library allocation
|
page read and write
|
||
1FD0523D000
|
trusted library allocation
|
page read and write
|
||
1FD0E3D9000
|
trusted library allocation
|
page read and write
|
||
1FD06A9D000
|
trusted library allocation
|
page read and write
|
||
1FD069A5000
|
trusted library allocation
|
page read and write
|
||
1FD0F3DD000
|
trusted library allocation
|
page read and write
|
||
1FD068D3000
|
trusted library allocation
|
page read and write
|
||
1FD06A92000
|
trusted library allocation
|
page read and write
|
||
1FD070FD000
|
trusted library allocation
|
page read and write
|
||
1FD1089C000
|
trusted library allocation
|
page read and write
|
||
1FD06CD3000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD7C4A0000
|
heap
|
page read and write
|
||
1FD06AB5000
|
trusted library allocation
|
page read and write
|
||
1FD0F37B000
|
trusted library allocation
|
page read and write
|
||
1FD0F591000
|
trusted library allocation
|
page read and write
|
||
1FD053A0000
|
trusted library allocation
|
page read and write
|
||
1FD053A0000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
1FD7FE6C000
|
trusted library allocation
|
page read and write
|
||
1FD05244000
|
trusted library allocation
|
page read and write
|
||
1FD0549D000
|
trusted library allocation
|
page read and write
|
||
1FD08B37000
|
trusted library allocation
|
page read and write
|
||
1FD054C5000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1FD7EBFE000
|
trusted library allocation
|
page read and write
|
||
A777DFE000
|
unkown
|
page readonly
|
||
1FD0F381000
|
trusted library allocation
|
page read and write
|
||
1FD0F3FD000
|
trusted library allocation
|
page read and write
|
||
1FD0699B000
|
trusted library allocation
|
page read and write
|
||
1FD7FCF1000
|
trusted library allocation
|
page read and write
|
||
1FD0E3CB000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0F377000
|
trusted library allocation
|
page read and write
|
||
1FD07E56000
|
trusted library allocation
|
page read and write
|
||
1FD0695F000
|
trusted library allocation
|
page read and write
|
||
1FD7EFF0000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD054A6000
|
trusted library allocation
|
page read and write
|
||
1FD05BB9000
|
trusted library allocation
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
1FD05292000
|
trusted library allocation
|
page read and write
|
||
1FD05366000
|
trusted library allocation
|
page read and write
|
||
1FD0681D000
|
trusted library allocation
|
page read and write
|
||
22569100000
|
trusted library allocation
|
page read and write
|
||
1FD06C57000
|
trusted library allocation
|
page read and write
|
||
1FD05BF0000
|
trusted library allocation
|
page read and write
|
||
1FD02D96000
|
heap
|
page read and write
|
||
1FD7C49F000
|
heap
|
page read and write
|
||
1ED60D8D000
|
heap
|
page read and write
|
||
1FD05B6A000
|
trusted library allocation
|
page read and write
|
||
225691C4000
|
trusted library allocation
|
page read and write
|
||
1FD104A1000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD069A7000
|
trusted library allocation
|
page read and write
|
||
1FD02D8C000
|
heap
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
1FD0D9AB000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B5000
|
trusted library allocation
|
page read and write
|
||
1FD06C86000
|
trusted library allocation
|
page read and write
|
||
1FD0DDCB000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD05BAC000
|
trusted library allocation
|
page read and write
|
||
1ED60E62000
|
heap
|
page read and write
|
||
1FD06A52000
|
trusted library allocation
|
page read and write
|
||
1FD7FB3A000
|
trusted library allocation
|
page read and write
|
||
1FD06A3B000
|
trusted library allocation
|
page read and write
|
||
1ED60112000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1ED60DF9000
|
heap
|
page read and write
|
||
1FD091F1000
|
heap
|
page read and write
|
||
1FD116D5000
|
trusted library allocation
|
page read and write
|
||
1FD7E5A1000
|
trusted library allocation
|
page read and write
|
||
1FD7EF08000
|
trusted library allocation
|
page read and write
|
||
1FD08EB1000
|
trusted library allocation
|
page read and write
|
||
1FD08E38000
|
trusted library allocation
|
page read and write
|
||
1FD05AFE000
|
trusted library allocation
|
page read and write
|
||
1FD0F450000
|
trusted library allocation
|
page read and write
|
||
1FD0DC63000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD1000
|
trusted library allocation
|
page read and write
|
||
1FD06AC3000
|
trusted library allocation
|
page read and write
|
||
1FD7C4AA000
|
heap
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD7FDD5000
|
trusted library allocation
|
page read and write
|
||
1FD0685D000
|
trusted library allocation
|
page read and write
|
||
1FD0DB9F000
|
trusted library allocation
|
page read and write
|
||
1FD069E8000
|
trusted library allocation
|
page read and write
|
||
1FD06A5A000
|
trusted library allocation
|
page read and write
|
||
1FD1083D000
|
trusted library allocation
|
page read and write
|
||
9723FD8000
|
stack
|
page read and write
|
||
1FD0E0C0000
|
trusted library allocation
|
page read and write
|
||
1FD05471000
|
trusted library allocation
|
page read and write
|
||
23A8AB40000
|
heap
|
page read and write
|
||
1FD0DFA1000
|
trusted library allocation
|
page read and write
|
||
22569300000
|
trusted library allocation
|
page read and write
|
||
1FD071AC000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE6000
|
trusted library allocation
|
page read and write
|
||
1FD06A24000
|
trusted library allocation
|
page read and write
|
||
1FD06A46000
|
trusted library allocation
|
page read and write
|
||
1FD08EE1000
|
trusted library allocation
|
page read and write
|
||
1FD0E3C5000
|
trusted library allocation
|
page read and write
|
||
1FD0DC47000
|
trusted library allocation
|
page read and write
|
||
97234FD000
|
stack
|
page read and write
|
||
1FD05FA4000
|
trusted library allocation
|
page read and write
|
||
1FD0DBF1000
|
trusted library allocation
|
page read and write
|
||
482DE3D000
|
stack
|
page read and write
|
||
1FD04F9F000
|
trusted library allocation
|
page read and write
|
||
1FD079D8000
|
trusted library allocation
|
page read and write
|
||
1FD7C420000
|
heap
|
page read and write
|
||
1FD06A5A000
|
trusted library allocation
|
page read and write
|
||
1FD069D7000
|
trusted library allocation
|
page read and write
|
||
1FD0547D000
|
trusted library allocation
|
page read and write
|
||
1FD0D951000
|
trusted library allocation
|
page read and write
|
||
1FD05467000
|
trusted library allocation
|
page read and write
|
||
1FD0F377000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD05AEF000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD116D5000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD0EFE0000
|
trusted library allocation
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD7FE79000
|
trusted library allocation
|
page read and write
|
||
1FD08EB1000
|
trusted library allocation
|
page read and write
|
||
1FD054D5000
|
trusted library allocation
|
page read and write
|
||
1FD06C8F000
|
trusted library allocation
|
page read and write
|
||
1FD05B29000
|
trusted library allocation
|
page read and write
|
||
1ED60186000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCB000
|
trusted library allocation
|
page read and write
|
||
1FD0E319000
|
trusted library allocation
|
page read and write
|
||
1FD0F5BF000
|
trusted library allocation
|
page read and write
|
||
1ED602C6000
|
heap
|
page read and write
|
||
1FD0663B000
|
trusted library allocation
|
page read and write
|
||
22569000000
|
trusted library allocation
|
page read and write
|
||
1FD0DDE5000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
972603E000
|
stack
|
page read and write
|
||
1FD054FE000
|
trusted library allocation
|
page read and write
|
||
1FD0F58F000
|
trusted library allocation
|
page read and write
|
||
1FD0F383000
|
trusted library allocation
|
page read and write
|
||
1FD11658000
|
trusted library allocation
|
page read and write
|
||
1FD06AFA000
|
trusted library allocation
|
page read and write
|
||
1FD0DCD3000
|
trusted library allocation
|
page read and write
|
||
1FD08E28000
|
trusted library allocation
|
page read and write
|
||
1FD068FB000
|
trusted library allocation
|
page read and write
|
||
1FD06C9F000
|
trusted library allocation
|
page read and write
|
||
1FD7C492000
|
heap
|
page read and write
|
||
1FD07998000
|
trusted library allocation
|
page read and write
|
||
1B391600000
|
trusted library allocation
|
page read and write
|
||
1FD7EFBF000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD07AFA000
|
trusted library allocation
|
page read and write
|
||
1FD0E19F000
|
trusted library allocation
|
page read and write
|
||
1FD08BB3000
|
trusted library allocation
|
page read and write
|
||
1FD0DBB2000
|
trusted library allocation
|
page read and write
|
||
3821000
|
heap
|
page read and write
|
||
1FD0F5AC000
|
trusted library allocation
|
page read and write
|
||
1FD0DB80000
|
trusted library allocation
|
page read and write
|
||
1ED60EB7000
|
heap
|
page read and write
|
||
1FD07187000
|
trusted library allocation
|
page read and write
|
||
1FD0F414000
|
trusted library allocation
|
page read and write
|
||
1FD068D0000
|
trusted library allocation
|
page read and write
|
||
1FD054C0000
|
trusted library allocation
|
page read and write
|
||
1ED60DA3000
|
heap
|
page read and write
|
||
1FD05F3E000
|
trusted library allocation
|
page read and write
|
||
1FD05B62000
|
trusted library allocation
|
page read and write
|
||
1FD07DC5000
|
trusted library allocation
|
page read and write
|
||
1FD06957000
|
trusted library allocation
|
page read and write
|
||
1FD0DC27000
|
trusted library allocation
|
page read and write
|
||
1ED60EAA000
|
heap
|
page read and write
|
||
1FD0DB8F000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
1FD08EAB000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD106F1000
|
trusted library allocation
|
page read and write
|
||
1FD0F5ED000
|
trusted library allocation
|
page read and write
|
||
23A89370000
|
heap
|
page read and write
|
||
1FD0D97B000
|
trusted library allocation
|
page read and write
|
||
1FD05B3B000
|
trusted library allocation
|
page read and write
|
||
1FD08EA9000
|
trusted library allocation
|
page read and write
|
||
1FD7E6AE000
|
trusted library allocation
|
page read and write
|
||
1FD06C96000
|
trusted library allocation
|
page read and write
|
||
1FD0682F000
|
trusted library allocation
|
page read and write
|
||
F91000
|
heap
|
page read and write
|
||
1FD05B3F000
|
trusted library allocation
|
page read and write
|
||
482D5FE000
|
stack
|
page read and write
|
||
1FD05DC1000
|
trusted library allocation
|
page read and write
|
||
1FD1048F000
|
trusted library allocation
|
page read and write
|
||
1FD078FE000
|
trusted library allocation
|
page read and write
|
||
1FD06A92000
|
trusted library allocation
|
page read and write
|
||
1FD06CD3000
|
trusted library allocation
|
page read and write
|
||
1FD0E3CB000
|
trusted library allocation
|
page read and write
|
||
1FD07954000
|
trusted library allocation
|
page read and write
|
||
1FD7FE93000
|
trusted library allocation
|
page read and write
|
||
A7775FE000
|
stack
|
page read and write
|
||
1FD02D70000
|
heap
|
page read and write
|
||
1FD1042D000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD0DB9B000
|
trusted library allocation
|
page read and write
|
||
1FD069B0000
|
trusted library allocation
|
page read and write
|
||
1FD053A7000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD7C496000
|
heap
|
page read and write
|
||
1FD0693B000
|
trusted library allocation
|
page read and write
|
||
1FD06CDA000
|
trusted library allocation
|
page read and write
|
||
1FD0F45B000
|
trusted library allocation
|
page read and write
|
||
1FD066FE000
|
trusted library allocation
|
page read and write
|
||
1FD07D20000
|
trusted library allocation
|
page read and write
|
||
1FD1048C000
|
trusted library allocation
|
page read and write
|
||
1FD0681D000
|
trusted library allocation
|
page read and write
|
||
1FD0689C000
|
trusted library allocation
|
page read and write
|
||
1FD7FEBE000
|
trusted library allocation
|
page read and write
|
||
1FD06685000
|
trusted library allocation
|
page read and write
|
||
1FD0DC3B000
|
trusted library allocation
|
page read and write
|
||
1FD7C458000
|
heap
|
page read and write
|
||
1FD08B80000
|
trusted library allocation
|
page read and write
|
||
1FD054BB000
|
trusted library allocation
|
page read and write
|
||
1FD0D9A1000
|
trusted library allocation
|
page read and write
|
||
1FD7FCCE000
|
trusted library allocation
|
page read and write
|
||
1FD106C4000
|
trusted library allocation
|
page read and write
|
||
1FD06853000
|
trusted library allocation
|
page read and write
|
||
1FD068B4000
|
trusted library allocation
|
page read and write
|
||
1FD10666000
|
trusted library allocation
|
page read and write
|
||
1FD06A98000
|
trusted library allocation
|
page read and write
|
||
1FD06993000
|
trusted library allocation
|
page read and write
|
||
1FD05AB9000
|
trusted library allocation
|
page read and write
|
||
1FD0770B000
|
trusted library allocation
|
page read and write
|
||
1FD06BB7000
|
trusted library allocation
|
page read and write
|
||
1FD05AB5000
|
trusted library allocation
|
page read and write
|
||
1ED6010A000
|
trusted library allocation
|
page read and write
|
||
1FD05266000
|
trusted library allocation
|
page read and write
|
||
1FD0F3C1000
|
trusted library allocation
|
page read and write
|
||
1FD057EE000
|
trusted library allocation
|
page read and write
|
||
1FD078D5000
|
trusted library allocation
|
page read and write
|
||
1FD116A6000
|
trusted library allocation
|
page read and write
|
||
1FD0E1FC000
|
trusted library allocation
|
page read and write
|
||
1FD10881000
|
trusted library allocation
|
page read and write
|
||
1FD08B96000
|
trusted library allocation
|
page read and write
|
||
2512A500000
|
trusted library allocation
|
page read and write
|
||
1FD0DA3E000
|
trusted library allocation
|
page read and write
|
||
1FD0710A000
|
trusted library allocation
|
page read and write
|
||
1FD06AA2000
|
trusted library allocation
|
page read and write
|
||
1FD07D5E000
|
trusted library allocation
|
page read and write
|
||
1FD0E199000
|
trusted library allocation
|
page read and write
|
||
1FD7C41E000
|
heap
|
page read and write
|
||
1FD066FE000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD08EAF000
|
trusted library allocation
|
page read and write
|
||
1FD06AB1000
|
trusted library allocation
|
page read and write
|
||
1FD04FFB000
|
trusted library allocation
|
page read and write
|
||
1FD7FF22000
|
trusted library allocation
|
page read and write
|
||
1B3917E4000
|
trusted library allocation
|
page read and write
|
||
2512A310000
|
heap
|
page read and write
|
||
1FD7FEF6000
|
trusted library allocation
|
page read and write
|
||
1FD7C419000
|
heap
|
page read and write
|
||
1FD054AF000
|
trusted library allocation
|
page read and write
|
||
1FD07AFA000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C7000
|
trusted library allocation
|
page read and write
|
||
1FD068D0000
|
trusted library allocation
|
page read and write
|
||
1FD7C484000
|
heap
|
page read and write
|
||
1FD04F86000
|
trusted library allocation
|
page read and write
|
||
1FD7FDD5000
|
trusted library allocation
|
page read and write
|
||
1ED60E3D000
|
heap
|
page read and write
|
||
1FD06052000
|
trusted library allocation
|
page read and write
|
||
1FD0EFBC000
|
trusted library allocation
|
page read and write
|
||
1ED601E9000
|
trusted library allocation
|
page read and write
|
||
1FD09156000
|
heap
|
page read and write
|
||
1FD06CD3000
|
trusted library allocation
|
page read and write
|
||
22569400000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD07DB6000
|
trusted library allocation
|
page read and write
|
||
1FD09361000
|
trusted library allocation
|
page read and write
|
||
1FD0F5DD000
|
trusted library allocation
|
page read and write
|
||
1FD7FBC5000
|
trusted library allocation
|
page read and write
|
||
1FD7FEA6000
|
trusted library allocation
|
page read and write
|
||
1FD7C418000
|
heap
|
page read and write
|
||
1FD7FE99000
|
trusted library allocation
|
page read and write
|
||
1FD06AB9000
|
trusted library allocation
|
page read and write
|
||
1FD068A1000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
1FD05DD7000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C1000
|
trusted library allocation
|
page read and write
|
||
1FD06AB5000
|
trusted library allocation
|
page read and write
|
||
1FD05230000
|
trusted library allocation
|
page read and write
|
||
1FD06CD3000
|
trusted library allocation
|
page read and write
|
||
1FD0DB88000
|
trusted library allocation
|
page read and write
|
||
1BC0000
|
heap
|
page read and write
|
||
1FD05F54000
|
trusted library allocation
|
page read and write
|
||
1FD0DD21000
|
trusted library allocation
|
page read and write
|
||
1FD04FFB000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD06964000
|
trusted library allocation
|
page read and write
|
||
1FD0DF91000
|
trusted library allocation
|
page read and write
|
||
1FD071F3000
|
trusted library allocation
|
page read and write
|
||
1FD066BD000
|
trusted library allocation
|
page read and write
|
||
1FD7FDC1000
|
trusted library allocation
|
page read and write
|
||
1FD0DBFD000
|
trusted library allocation
|
page read and write
|
||
1FD0F58D000
|
trusted library allocation
|
page read and write
|
||
1FD7C472000
|
heap
|
page read and write
|
||
1FD0695F000
|
trusted library allocation
|
page read and write
|
||
1FD0F58B000
|
trusted library allocation
|
page read and write
|
||
1FD0F4DD000
|
trusted library allocation
|
page read and write
|
||
1FD0EFA9000
|
trusted library allocation
|
page read and write
|
||
1FD7FEDD000
|
trusted library allocation
|
page read and write
|
||
1FD7EC26000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
1FD06ADC000
|
trusted library allocation
|
page read and write
|
||
1FD05AFE000
|
trusted library allocation
|
page read and write
|
||
1FD02D8D000
|
heap
|
page read and write
|
||
1FD0668A000
|
trusted library allocation
|
page read and write
|
||
1FD7FEBE000
|
trusted library allocation
|
page read and write
|
||
1ED60DBF000
|
heap
|
page read and write
|
||
1FD070A5000
|
trusted library allocation
|
page read and write
|
||
1FD11DE9000
|
trusted library allocation
|
page read and write
|
||
1FD08EB7000
|
trusted library allocation
|
page read and write
|
||
1FD07120000
|
trusted library allocation
|
page read and write
|
||
1FD0F575000
|
trusted library allocation
|
page read and write
|
||
1FD06AB5000
|
trusted library allocation
|
page read and write
|
||
1FD0F45F000
|
trusted library allocation
|
page read and write
|
||
1FD069B0000
|
trusted library allocation
|
page read and write
|
||
23A8920A000
|
trusted library allocation
|
page read and write
|
||
1FD7FC6A000
|
trusted library allocation
|
page read and write
|
||
1FD104AA000
|
trusted library allocation
|
page read and write
|
||
1FD7FD72000
|
trusted library allocation
|
page read and write
|
||
1FD7FE79000
|
trusted library allocation
|
page read and write
|
||
1FD08BF3000
|
trusted library allocation
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD7EC7D000
|
trusted library allocation
|
page read and write
|
||
1FD7FB53000
|
trusted library allocation
|
page read and write
|
||
1FD054DC000
|
trusted library allocation
|
page read and write
|
||
1FD0E31D000
|
trusted library allocation
|
page read and write
|
||
1FD0F3DD000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C9000
|
trusted library allocation
|
page read and write
|
||
1FD0E334000
|
trusted library allocation
|
page read and write
|
||
A775BBC000
|
stack
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD05B43000
|
trusted library allocation
|
page read and write
|
||
1B391440000
|
heap
|
page read and write
|
||
1FD07854000
|
trusted library allocation
|
page read and write
|
||
1FD08B96000
|
trusted library allocation
|
page read and write
|
||
1FD0918C000
|
heap
|
page read and write
|
||
1FD06CEE000
|
trusted library allocation
|
page read and write
|
||
1FD073FB000
|
trusted library allocation
|
page read and write
|
||
1FD0DC20000
|
trusted library allocation
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD06CDA000
|
trusted library allocation
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1FD069C7000
|
trusted library allocation
|
page read and write
|
||
1FD02BBA000
|
trusted library allocation
|
page read and write
|
||
1FD7FD92000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD06690000
|
trusted library allocation
|
page read and write
|
||
1FD1083F000
|
trusted library allocation
|
page read and write
|
||
1FD068B0000
|
trusted library allocation
|
page read and write
|
||
1FD06ADC000
|
trusted library allocation
|
page read and write
|
||
1FD05273000
|
trusted library allocation
|
page read and write
|
||
F73000
|
heap
|
page read and write
|
||
1FD092B1000
|
trusted library allocation
|
page read and write
|
||
1FD7FD72000
|
trusted library allocation
|
page read and write
|
||
1FD0E0E5000
|
trusted library allocation
|
page read and write
|
||
1FD054BD000
|
trusted library allocation
|
page read and write
|
||
1FD0F24F000
|
trusted library allocation
|
page read and write
|
||
1FD0E059000
|
trusted library allocation
|
page read and write
|
||
1FD0F410000
|
trusted library allocation
|
page read and write
|
||
1FD08800000
|
trusted library allocation
|
page read and write
|
||
1FD0799E000
|
trusted library allocation
|
page read and write
|
||
1FD0FBC8000
|
trusted library allocation
|
page read and write
|
||
1FD07054000
|
trusted library allocation
|
page read and write
|
||
1FD068AF000
|
trusted library allocation
|
page read and write
|
||
1FD06A35000
|
trusted library allocation
|
page read and write
|
||
1FD066EB000
|
trusted library allocation
|
page read and write
|
||
972353E000
|
unkown
|
page readonly
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD06944000
|
trusted library allocation
|
page read and write
|
||
1FD05AE3000
|
trusted library allocation
|
page read and write
|
||
1FD7FE6E000
|
trusted library allocation
|
page read and write
|
||
1FD06A95000
|
trusted library allocation
|
page read and write
|
||
1FD052CD000
|
trusted library allocation
|
page read and write
|
||
1FD0706D000
|
trusted library allocation
|
page read and write
|
||
1FD08E1F000
|
trusted library allocation
|
page read and write
|
||
1FD092FC000
|
trusted library allocation
|
page read and write
|
||
1B391921000
|
trusted library allocation
|
page read and write
|
||
1FD0DCE4000
|
trusted library allocation
|
page read and write
|
||
1FD08ED4000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD7C42A000
|
heap
|
page read and write
|
||
1FD7FEBC000
|
trusted library allocation
|
page read and write
|
||
1FD07AE0000
|
trusted library allocation
|
page read and write
|
||
1FD0DBE9000
|
trusted library allocation
|
page read and write
|
||
1ED60E60000
|
heap
|
page read and write
|
||
1FD057F2000
|
trusted library allocation
|
page read and write
|
||
1FD02D8C000
|
heap
|
page read and write
|
||
1FD08ED4000
|
trusted library allocation
|
page read and write
|
||
1FD06A5F000
|
trusted library allocation
|
page read and write
|
||
1FD08B9B000
|
trusted library allocation
|
page read and write
|
||
1FD054A6000
|
trusted library allocation
|
page read and write
|
||
1FD0F373000
|
trusted library allocation
|
page read and write
|
||
1FD7C494000
|
heap
|
page read and write
|
||
1FD0EFB4000
|
trusted library allocation
|
page read and write
|
||
1FD08EE1000
|
trusted library allocation
|
page read and write
|
||
1FD06CC5000
|
trusted library allocation
|
page read and write
|
||
1FD054FE000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD054A6000
|
trusted library allocation
|
page read and write
|
||
1FD7C41F000
|
heap
|
page read and write
|
||
1FD06A3B000
|
trusted library allocation
|
page read and write
|
||
1FD07871000
|
trusted library allocation
|
page read and write
|
||
1FD7FB50000
|
trusted library allocation
|
page read and write
|
||
1FD0F45B000
|
trusted library allocation
|
page read and write
|
||
1FD0663B000
|
trusted library allocation
|
page read and write
|
||
1FD7FE6E000
|
trusted library allocation
|
page read and write
|
||
1FD7EFDE000
|
trusted library allocation
|
page read and write
|
||
22568EE0000
|
heap
|
page read and write
|
||
1FD0533E000
|
trusted library allocation
|
page read and write
|
||
1FD06A24000
|
trusted library allocation
|
page read and write
|
||
2512A507000
|
trusted library allocation
|
page read and write
|
||
1FD0D971000
|
trusted library allocation
|
page read and write
|
||
1FD7FDBA000
|
trusted library allocation
|
page read and write
|
||
1FD07120000
|
trusted library allocation
|
page read and write
|
||
1FD05294000
|
trusted library allocation
|
page read and write
|
||
1FD0F5ED000
|
trusted library allocation
|
page read and write
|
||
1FD0D9A1000
|
trusted library allocation
|
page read and write
|
||
1ED60EAA000
|
heap
|
page read and write
|
||
1FD0F4CE000
|
trusted library allocation
|
page read and write
|
||
1FD7FEF6000
|
trusted library allocation
|
page read and write
|
||
1FD0695F000
|
trusted library allocation
|
page read and write
|
||
2512A630000
|
heap
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD0F000000
|
trusted library allocation
|
page read and write
|
||
1FD108E5000
|
trusted library allocation
|
page read and write
|
||
1FD108F7000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD8000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0666F000
|
trusted library allocation
|
page read and write
|
||
1FD11DF5000
|
trusted library allocation
|
page read and write
|
||
1FD11DE9000
|
trusted library allocation
|
page read and write
|
||
1FD053D6000
|
trusted library allocation
|
page read and write
|
||
1FD06AE3000
|
trusted library allocation
|
page read and write
|
||
1FD7FD18000
|
trusted library allocation
|
page read and write
|
||
1FD1048A000
|
trusted library allocation
|
page read and write
|
||
1FD05BE0000
|
trusted library allocation
|
page read and write
|
||
1FD05BE0000
|
trusted library allocation
|
page read and write
|
||
1FD08DBF000
|
trusted library allocation
|
page read and write
|
||
1FD0EFF0000
|
trusted library allocation
|
page read and write
|
||
1FD7FD95000
|
trusted library allocation
|
page read and write
|
||
1FD06C33000
|
trusted library allocation
|
page read and write
|
||
1FD077B2000
|
trusted library allocation
|
page read and write
|
||
1FD07D56000
|
trusted library allocation
|
page read and write
|
||
1FD06C8F000
|
trusted library allocation
|
page read and write
|
||
1FD7C472000
|
heap
|
page read and write
|
||
1FD070F8000
|
trusted library allocation
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD091FC000
|
trusted library allocation
|
page read and write
|
||
1FD02DAE000
|
heap
|
page read and write
|
||
1FD1167D000
|
trusted library allocation
|
page read and write
|
||
1FD0EFF0000
|
trusted library allocation
|
page read and write
|
||
1ED60E3D000
|
heap
|
page read and write
|
||
1FD06AD8000
|
trusted library allocation
|
page read and write
|
||
1FD1067E000
|
trusted library allocation
|
page read and write
|
||
1FD0521F000
|
trusted library allocation
|
page read and write
|
||
1FD06863000
|
trusted library allocation
|
page read and write
|
||
1FD07180000
|
trusted library allocation
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1ED60E31000
|
heap
|
page read and write
|
||
1FD0DA32000
|
trusted library allocation
|
page read and write
|
||
1FD02B33000
|
trusted library allocation
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD108BB000
|
trusted library allocation
|
page read and write
|
||
1FD05BF5000
|
trusted library allocation
|
page read and write
|
||
1FD0DBF5000
|
trusted library allocation
|
page read and write
|
||
1FD0DAF9000
|
trusted library allocation
|
page read and write
|
||
1FD0DC68000
|
trusted library allocation
|
page read and write
|
||
1FD7C455000
|
heap
|
page read and write
|
||
1FD05AEF000
|
trusted library allocation
|
page read and write
|
||
1FD07EAF000
|
trusted library allocation
|
page read and write
|
||
1FD070A5000
|
trusted library allocation
|
page read and write
|
||
1FD0E19D000
|
trusted library allocation
|
page read and write
|
||
1FD08B9B000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC1000
|
trusted library allocation
|
page read and write
|
||
1FD7FD60000
|
trusted library allocation
|
page read and write
|
||
1ED60DE8000
|
heap
|
page read and write
|
||
1FD0DBFE000
|
trusted library allocation
|
page read and write
|
||
1FD7FE0D000
|
trusted library allocation
|
page read and write
|
||
1FD066BB000
|
trusted library allocation
|
page read and write
|
||
1FD08B31000
|
trusted library allocation
|
page read and write
|
||
1FD0DD81000
|
trusted library allocation
|
page read and write
|
||
23A89200000
|
trusted library allocation
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD0E3E9000
|
trusted library allocation
|
page read and write
|
||
1FD08BAB000
|
trusted library allocation
|
page read and write
|
||
1FD0692F000
|
trusted library allocation
|
page read and write
|
||
1ED60DA0000
|
heap
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
1FD0EF85000
|
trusted library allocation
|
page read and write
|
||
1FD0DB7E000
|
trusted library allocation
|
page read and write
|
||
1FD0E1C8000
|
trusted library allocation
|
page read and write
|
||
2256940C000
|
trusted library allocation
|
page read and write
|
||
1FD053D6000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD108F7000
|
trusted library allocation
|
page read and write
|
||
1FD0545F000
|
trusted library allocation
|
page read and write
|
||
1FD7FEF3000
|
trusted library allocation
|
page read and write
|
||
A4A5BFE000
|
stack
|
page read and write
|
||
1FD066E0000
|
trusted library allocation
|
page read and write
|
||
1FD066FB000
|
trusted library allocation
|
page read and write
|
||
1FD07179000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD0F26E000
|
trusted library allocation
|
page read and write
|
||
1FD05375000
|
trusted library allocation
|
page read and write
|
||
1FD07E40000
|
trusted library allocation
|
page read and write
|
||
1FD7E5BF000
|
trusted library allocation
|
page read and write
|
||
1FD7C41F000
|
heap
|
page read and write
|
||
1FD06AC7000
|
trusted library allocation
|
page read and write
|
||
482DDFE000
|
unkown
|
page readonly
|
||
1FD06C8F000
|
trusted library allocation
|
page read and write
|
||
1FD0E0EE000
|
trusted library allocation
|
page read and write
|
||
1FD069FC000
|
trusted library allocation
|
page read and write
|
||
1FD106F3000
|
trusted library allocation
|
page read and write
|
||
1FD7FDF4000
|
trusted library allocation
|
page read and write
|
||
A779FFE000
|
unkown
|
page readonly
|
||
1FD069E1000
|
trusted library allocation
|
page read and write
|
||
1FD06932000
|
trusted library allocation
|
page read and write
|
||
1FD7FDF4000
|
trusted library allocation
|
page read and write
|
||
1FD06844000
|
trusted library allocation
|
page read and write
|
||
1FD053A0000
|
trusted library allocation
|
page read and write
|
||
1FD057F3000
|
trusted library allocation
|
page read and write
|
||
1FD066E0000
|
trusted library allocation
|
page read and write
|
||
1FD0EFFB000
|
trusted library allocation
|
page read and write
|
||
1FD0DA84000
|
trusted library allocation
|
page read and write
|
||
1FD0547B000
|
trusted library allocation
|
page read and write
|
||
A4A4BFE000
|
stack
|
page read and write
|
||
22569124000
|
trusted library allocation
|
page read and write
|
||
1FD068E6000
|
trusted library allocation
|
page read and write
|
||
1FD066A0000
|
trusted library allocation
|
page read and write
|
||
1FD7FDBA000
|
trusted library allocation
|
page read and write
|
||
1FD06054000
|
trusted library allocation
|
page read and write
|
||
1FD0DFD2000
|
trusted library allocation
|
page read and write
|
||
1FD08EAF000
|
trusted library allocation
|
page read and write
|
||
1FD7FEA6000
|
trusted library allocation
|
page read and write
|
||
1B3F000
|
stack
|
page read and write
|
||
1FD069EC000
|
trusted library allocation
|
page read and write
|
||
1FD069F4000
|
trusted library allocation
|
page read and write
|
||
1FD08BA3000
|
trusted library allocation
|
page read and write
|
||
1FD08B17000
|
trusted library allocation
|
page read and write
|
||
1FD078EA000
|
trusted library allocation
|
page read and write
|
||
1FD0DCDE000
|
trusted library allocation
|
page read and write
|
||
1FD02D8D000
|
heap
|
page read and write
|
||
1FD0DBE3000
|
trusted library allocation
|
page read and write
|
||
1ED60DCD000
|
heap
|
page read and write
|
||
1FD06C33000
|
trusted library allocation
|
page read and write
|
||
1FD02D92000
|
heap
|
page read and write
|
||
1FD7FC71000
|
trusted library allocation
|
page read and write
|
||
1B3917A5000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
2256911A000
|
trusted library allocation
|
page read and write
|
||
1FD05AB7000
|
trusted library allocation
|
page read and write
|
||
1FD06CBD000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD0F3D1000
|
trusted library allocation
|
page read and write
|
||
1FD06C36000
|
trusted library allocation
|
page read and write
|
||
1FD077F0000
|
trusted library allocation
|
page read and write
|
||
1FD0E3C5000
|
trusted library allocation
|
page read and write
|
||
1FD0E0C9000
|
trusted library allocation
|
page read and write
|
||
23A88F62000
|
heap
|
page read and write
|
||
1FD116CA000
|
trusted library allocation
|
page read and write
|
||
1FD06CB5000
|
trusted library allocation
|
page read and write
|
||
1FD05F38000
|
trusted library allocation
|
page read and write
|
||
1FD7E668000
|
trusted library allocation
|
page read and write
|
||
1FD06A80000
|
trusted library allocation
|
page read and write
|
||
1FD0F484000
|
trusted library allocation
|
page read and write
|
||
1FD06A9D000
|
trusted library allocation
|
page read and write
|
||
1FD060C1000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD0EFBC000
|
trusted library allocation
|
page read and write
|
||
1FD07E18000
|
trusted library allocation
|
page read and write
|
||
1FD7FD7B000
|
trusted library allocation
|
page read and write
|
||
1FD08B93000
|
trusted library allocation
|
page read and write
|
||
482DEFE000
|
unkown
|
page readonly
|
||
1FD10479000
|
trusted library allocation
|
page read and write
|
||
1FD04F62000
|
trusted library allocation
|
page read and write
|
||
1FD0EFDA000
|
trusted library allocation
|
page read and write
|
||
1FD11685000
|
trusted library allocation
|
page read and write
|
||
1B391909000
|
trusted library allocation
|
page read and write
|
||
1FD053A7000
|
trusted library allocation
|
page read and write
|
||
1FD0781F000
|
trusted library allocation
|
page read and write
|
||
1FD0F5A1000
|
trusted library allocation
|
page read and write
|
||
1ED60D41000
|
heap
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD0DB93000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD0DD19000
|
trusted library allocation
|
page read and write
|
||
1FD06A3B000
|
trusted library allocation
|
page read and write
|
||
1FD7EF89000
|
trusted library allocation
|
page read and write
|
||
1FD7FD9B000
|
trusted library allocation
|
page read and write
|
||
1FD06A89000
|
trusted library allocation
|
page read and write
|
||
1FD071A6000
|
trusted library allocation
|
page read and write
|
||
ACC000
|
unkown
|
page write copy
|
||
1FD7EB23000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD9000
|
trusted library allocation
|
page read and write
|
||
1FD066BC000
|
trusted library allocation
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD054D4000
|
trusted library allocation
|
page read and write
|
||
1FD06AFA000
|
trusted library allocation
|
page read and write
|
||
1FD06948000
|
trusted library allocation
|
page read and write
|
||
1FD0D9E1000
|
trusted library allocation
|
page read and write
|
||
1FD05792000
|
trusted library allocation
|
page read and write
|
||
225691B7000
|
trusted library allocation
|
page read and write
|
||
1FD0DFD0000
|
trusted library allocation
|
page read and write
|
||
1FD06C69000
|
trusted library allocation
|
page read and write
|
||
1FD7C4AD000
|
heap
|
page read and write
|
||
1FD1048C000
|
trusted library allocation
|
page read and write
|
||
1FD060A3000
|
trusted library allocation
|
page read and write
|
||
1FD108A4000
|
trusted library allocation
|
page read and write
|
||
1FD7FDFA000
|
trusted library allocation
|
page read and write
|
||
1FD0F3A7000
|
trusted library allocation
|
page read and write
|
||
1FD06966000
|
trusted library allocation
|
page read and write
|
||
1ED60E29000
|
heap
|
page read and write
|
||
70A8DB0000
|
trusted library allocation
|
page execute read
|
||
1FD04FD1000
|
trusted library allocation
|
page read and write
|
||
1FD7FE9D000
|
trusted library allocation
|
page read and write
|
||
1FD06C2F000
|
trusted library allocation
|
page read and write
|
||
1FD07095000
|
trusted library allocation
|
page read and write
|
||
1FD0F37A000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
1FD7EFAD000
|
trusted library allocation
|
page read and write
|
||
1ED6010C000
|
trusted library allocation
|
page read and write
|
||
1FD0F3F5000
|
trusted library allocation
|
page read and write
|
||
1FD0E195000
|
trusted library allocation
|
page read and write
|
||
1FD05DEF000
|
trusted library allocation
|
page read and write
|
||
1FD0DDD0000
|
trusted library allocation
|
page read and write
|
||
1FD7C496000
|
heap
|
page read and write
|
||
1FD057BE000
|
trusted library allocation
|
page read and write
|
||
1FD7FE79000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B9000
|
trusted library allocation
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD11D73000
|
trusted library allocation
|
page read and write
|
||
1FD02D8C000
|
heap
|
page read and write
|
||
1FD071B2000
|
trusted library allocation
|
page read and write
|
||
1FD0EFC3000
|
trusted library allocation
|
page read and write
|
||
1FD077D3000
|
trusted library allocation
|
page read and write
|
||
1FD071AC000
|
trusted library allocation
|
page read and write
|
||
1FD0F48F000
|
trusted library allocation
|
page read and write
|
||
1FD0DBE4000
|
trusted library allocation
|
page read and write
|
||
1FD06CEE000
|
trusted library allocation
|
page read and write
|
||
1B391700000
|
trusted library allocation
|
page read and write
|
||
1FD06CF6000
|
trusted library allocation
|
page read and write
|
||
1FD02D92000
|
heap
|
page read and write
|
||
1FD06AEB000
|
trusted library allocation
|
page read and write
|
||
1FD0DA8A000
|
trusted library allocation
|
page read and write
|
||
1FD0EFBC000
|
trusted library allocation
|
page read and write
|
||
1FD7FEBC000
|
trusted library allocation
|
page read and write
|
||
1FD05DF6000
|
trusted library allocation
|
page read and write
|
||
1FD0F3F9000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
1FD0EFEE000
|
trusted library allocation
|
page read and write
|
||
1FD06CBD000
|
trusted library allocation
|
page read and write
|
||
23A88F3F000
|
heap
|
page read and write
|
||
1B3915B0000
|
heap
|
page readonly
|
||
1FD066FE000
|
trusted library allocation
|
page read and write
|
||
1FD069EC000
|
trusted library allocation
|
page read and write
|
||
1FD0668E000
|
trusted library allocation
|
page read and write
|
||
1FD06A9D000
|
trusted library allocation
|
page read and write
|
||
1FD0EFB4000
|
trusted library allocation
|
page read and write
|
||
1FD070B2000
|
trusted library allocation
|
page read and write
|
||
1FD07E45000
|
trusted library allocation
|
page read and write
|
||
1FD068F3000
|
trusted library allocation
|
page read and write
|
||
1FD02D97000
|
heap
|
page read and write
|
||
1FD08EB1000
|
trusted library allocation
|
page read and write
|
||
1FD02BD1000
|
trusted library allocation
|
page read and write
|
||
1FD0DD25000
|
trusted library allocation
|
page read and write
|
||
1FD071B6000
|
trusted library allocation
|
page read and write
|
||
1FD071C0000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD7C47D000
|
heap
|
page read and write
|
||
1FD7FDCE000
|
trusted library allocation
|
page read and write
|
||
1FD0F33F000
|
trusted library allocation
|
page read and write
|
||
1FD116B9000
|
trusted library allocation
|
page read and write
|
||
1ED60E31000
|
heap
|
page read and write
|
||
1FD7C477000
|
heap
|
page read and write
|
||
1FD08B83000
|
trusted library allocation
|
page read and write
|
||
1FD0F581000
|
trusted library allocation
|
page read and write
|
||
1FD057A3000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1ED60917000
|
trusted library allocation
|
page read and write
|
||
1FD0E0F9000
|
trusted library allocation
|
page read and write
|
||
1FD0669C000
|
trusted library allocation
|
page read and write
|
||
1ED5FE28000
|
remote allocation
|
page execute read
|
||
1FD7FCAE000
|
trusted library allocation
|
page read and write
|
||
1FD0F377000
|
trusted library allocation
|
page read and write
|
||
1FD0546D000
|
trusted library allocation
|
page read and write
|
||
1FD08BA7000
|
trusted library allocation
|
page read and write
|
||
1FD0DDDB000
|
trusted library allocation
|
page read and write
|
||
1FD08BB3000
|
trusted library allocation
|
page read and write
|
||
1FD116E7000
|
trusted library allocation
|
page read and write
|
||
1FD0EFC3000
|
trusted library allocation
|
page read and write
|
||
1FD08ED9000
|
trusted library allocation
|
page read and write
|
||
1FD066A3000
|
trusted library allocation
|
page read and write
|
||
1FD0DBBE000
|
trusted library allocation
|
page read and write
|
||
F94000
|
heap
|
page read and write
|
||
1FD05BB6000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B9000
|
trusted library allocation
|
page read and write
|
||
1FD08EE8000
|
trusted library allocation
|
page read and write
|
||
1FD7C418000
|
heap
|
page read and write
|
||
1FD07E68000
|
trusted library allocation
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD06C2F000
|
trusted library allocation
|
page read and write
|
||
1FD05AE1000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C7000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD0689C000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE0000
|
trusted library allocation
|
page read and write
|
||
1FD06C47000
|
trusted library allocation
|
page read and write
|
||
1FD05471000
|
trusted library allocation
|
page read and write
|
||
1FD0F29A000
|
trusted library allocation
|
page read and write
|
||
1FD05B94000
|
trusted library allocation
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
1FD0704B000
|
trusted library allocation
|
page read and write
|
||
1FD0F5D7000
|
trusted library allocation
|
page read and write
|
||
1FD0DC61000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1FD05AFA000
|
trusted library allocation
|
page read and write
|
||
1FD06C0F000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD7FDAB000
|
trusted library allocation
|
page read and write
|
||
1FD066A3000
|
trusted library allocation
|
page read and write
|
||
1FD0546B000
|
trusted library allocation
|
page read and write
|
||
1FD0DDF9000
|
trusted library allocation
|
page read and write
|
||
1FD7FD58000
|
trusted library allocation
|
page read and write
|
||
1FD0D9DD000
|
trusted library allocation
|
page read and write
|
||
1FD0DC39000
|
trusted library allocation
|
page read and write
|
||
1FD0693B000
|
trusted library allocation
|
page read and write
|
||
1FD116FB000
|
trusted library allocation
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
1FD0695F000
|
trusted library allocation
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD106F3000
|
trusted library allocation
|
page read and write
|
||
1FD7FEAC000
|
trusted library allocation
|
page read and write
|
||
1FD05AB0000
|
trusted library allocation
|
page read and write
|
||
1FD07180000
|
trusted library allocation
|
page read and write
|
||
1ED60E26000
|
heap
|
page read and write
|
||
1FD0EFF0000
|
trusted library allocation
|
page read and write
|
||
1FD0DDFD000
|
trusted library allocation
|
page read and write
|
||
1FD0E3CB000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1FD06A58000
|
trusted library allocation
|
page read and write
|
||
1FD108E5000
|
trusted library allocation
|
page read and write
|
||
1FD05BF2000
|
trusted library allocation
|
page read and write
|
||
1FD06A95000
|
trusted library allocation
|
page read and write
|
||
1FD05BF7000
|
trusted library allocation
|
page read and write
|
||
1FD0EFC3000
|
trusted library allocation
|
page read and write
|
||
1FD0FBE0000
|
trusted library allocation
|
page read and write
|
||
1FD0E140000
|
trusted library allocation
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD0521B000
|
trusted library allocation
|
page read and write
|
||
1FD07081000
|
trusted library allocation
|
page read and write
|
||
1FD106FD000
|
trusted library allocation
|
page read and write
|
||
1FD0DD7D000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD0E08B000
|
trusted library allocation
|
page read and write
|
||
1FD05AB0000
|
trusted library allocation
|
page read and write
|
||
1FD0D985000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD066E3000
|
trusted library allocation
|
page read and write
|
||
1FD068B6000
|
trusted library allocation
|
page read and write
|
||
1FD0F381000
|
trusted library allocation
|
page read and write
|
||
1FD06A9D000
|
trusted library allocation
|
page read and write
|
||
1FD0DB95000
|
trusted library allocation
|
page read and write
|
||
1FD0680A000
|
trusted library allocation
|
page read and write
|
||
1FD06AC9000
|
trusted library allocation
|
page read and write
|
||
1FD08EAB000
|
trusted library allocation
|
page read and write
|
||
1FD0F5A1000
|
trusted library allocation
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD069B6000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC7000
|
trusted library allocation
|
page read and write
|
||
1FD104DA000
|
trusted library allocation
|
page read and write
|
||
1FD071A6000
|
trusted library allocation
|
page read and write
|
||
1FD07185000
|
trusted library allocation
|
page read and write
|
||
1FD066BF000
|
trusted library allocation
|
page read and write
|
||
1FD0DBF9000
|
trusted library allocation
|
page read and write
|
||
1FD06A5F000
|
trusted library allocation
|
page read and write
|
||
1FD7FE24000
|
trusted library allocation
|
page read and write
|
||
1FD7C458000
|
heap
|
page read and write
|
||
1FD0F484000
|
trusted library allocation
|
page read and write
|
||
1FD08EF1000
|
trusted library allocation
|
page read and write
|
||
1FD06AF8000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
23A88F4D000
|
heap
|
page read and write
|
||
1FD0DB3D000
|
trusted library allocation
|
page read and write
|
||
1FD0E0E2000
|
trusted library allocation
|
page read and write
|
||
1B3913DB000
|
remote allocation
|
page execute read
|
||
1FD7FDDD000
|
trusted library allocation
|
page read and write
|
||
1FD06A87000
|
trusted library allocation
|
page read and write
|
||
1FD7C434000
|
heap
|
page read and write
|
||
1FD7EFF0000
|
trusted library allocation
|
page read and write
|
||
1FD060D3000
|
trusted library allocation
|
page read and write
|
||
1FD0DD1F000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B1000
|
trusted library allocation
|
page read and write
|
||
1FD07E4D000
|
trusted library allocation
|
page read and write
|
||
1FD11656000
|
trusted library allocation
|
page read and write
|
||
1FD0F571000
|
trusted library allocation
|
page read and write
|
||
1FD11DF9000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD0E3E1000
|
trusted library allocation
|
page read and write
|
||
1FD7C419000
|
heap
|
page read and write
|
||
1FD06CEE000
|
trusted library allocation
|
page read and write
|
||
1FD0782E000
|
trusted library allocation
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
1FD08BAB000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B1000
|
trusted library allocation
|
page read and write
|
||
1FD069AE000
|
trusted library allocation
|
page read and write
|
||
1FD07871000
|
trusted library allocation
|
page read and write
|
||
1FD06897000
|
trusted library allocation
|
page read and write
|
||
1ED60D9C000
|
heap
|
page read and write
|
||
1FD06C77000
|
trusted library allocation
|
page read and write
|
||
1FD0795D000
|
trusted library allocation
|
page read and write
|
||
1FD7ECE5000
|
trusted library allocation
|
page read and write
|
||
1FD07004000
|
trusted library allocation
|
page read and write
|
||
1FD7EBF6000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD8000
|
trusted library allocation
|
page read and write
|
||
1FD0E1A3000
|
trusted library allocation
|
page read and write
|
||
1FD7FD72000
|
trusted library allocation
|
page read and write
|
||
1FD0DD61000
|
trusted library allocation
|
page read and write
|
||
1FD0F3D1000
|
trusted library allocation
|
page read and write
|
||
1FD106A7000
|
trusted library allocation
|
page read and write
|
||
1FD06C8D000
|
trusted library allocation
|
page read and write
|
||
1FD0685B000
|
trusted library allocation
|
page read and write
|
||
1FD7FDC7000
|
trusted library allocation
|
page read and write
|
||
1FD0E091000
|
trusted library allocation
|
page read and write
|
||
1FD7C4AD000
|
heap
|
page read and write
|
||
1FD08B7A000
|
trusted library allocation
|
page read and write
|
||
1ED60730000
|
heap
|
page read and write
|
||
1FD0DB9B000
|
trusted library allocation
|
page read and write
|
||
1FD07984000
|
trusted library allocation
|
page read and write
|
||
1FD7FD9B000
|
trusted library allocation
|
page read and write
|
||
1FD0D97B000
|
trusted library allocation
|
page read and write
|
||
1FD7C491000
|
heap
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD0F378000
|
trusted library allocation
|
page read and write
|
||
1FD09285000
|
trusted library allocation
|
page read and write
|
||
1FD06940000
|
trusted library allocation
|
page read and write
|
||
1FD07AFA000
|
trusted library allocation
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1ED60EB7000
|
heap
|
page read and write
|
||
1FD0DAB0000
|
trusted library allocation
|
page read and write
|
||
1ED6090D000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD06C5D000
|
trusted library allocation
|
page read and write
|
||
1FD07EAD000
|
trusted library allocation
|
page read and write
|
||
1FD079E9000
|
trusted library allocation
|
page read and write
|
||
1FD0DD7D000
|
trusted library allocation
|
page read and write
|
||
1FD06C2F000
|
trusted library allocation
|
page read and write
|
||
1FD07E74000
|
trusted library allocation
|
page read and write
|
||
F98000
|
heap
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1FD053D6000
|
trusted library allocation
|
page read and write
|
||
1FD05AD4000
|
trusted library allocation
|
page read and write
|
||
1FD07E4D000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCB000
|
trusted library allocation
|
page read and write
|
||
1FD7FD7B000
|
trusted library allocation
|
page read and write
|
||
1FD02D8C000
|
heap
|
page read and write
|
||
1FD070C1000
|
trusted library allocation
|
page read and write
|
||
1FD0936A000
|
trusted library allocation
|
page read and write
|
||
1FD7FD98000
|
trusted library allocation
|
page read and write
|
||
1FD7FD58000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE0000
|
trusted library allocation
|
page read and write
|
||
1FD10887000
|
trusted library allocation
|
page read and write
|
||
1FD7C477000
|
heap
|
page read and write
|
||
1FD06AD6000
|
trusted library allocation
|
page read and write
|
||
1FD0F4A3000
|
trusted library allocation
|
page read and write
|
||
1FD069A7000
|
trusted library allocation
|
page read and write
|
||
1FD0F3FD000
|
trusted library allocation
|
page read and write
|
||
1FD0F429000
|
trusted library allocation
|
page read and write
|
||
1FD0DA95000
|
trusted library allocation
|
page read and write
|
||
1FD057D7000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD06AD6000
|
trusted library allocation
|
page read and write
|
||
A9C000
|
unkown
|
page readonly
|
||
984000
|
heap
|
page read and write
|
||
1FD08EE8000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD0F3A7000
|
trusted library allocation
|
page read and write
|
||
1FD0F474000
|
trusted library allocation
|
page read and write
|
||
1FD06CEE000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C3000
|
trusted library allocation
|
page read and write
|
||
1FD07032000
|
trusted library allocation
|
page read and write
|
||
1FD0DAEC000
|
trusted library allocation
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
F7D000
|
heap
|
page read and write
|
||
1FD0573C000
|
trusted library allocation
|
page read and write
|
||
F7D000
|
heap
|
page read and write
|
||
1FD7EF85000
|
trusted library allocation
|
page read and write
|
||
1FD7EF08000
|
trusted library allocation
|
page read and write
|
||
9724FFE000
|
stack
|
page read and write
|
||
1FD06A92000
|
trusted library allocation
|
page read and write
|
||
1FD0EFEE000
|
trusted library allocation
|
page read and write
|
||
1FD0DB88000
|
trusted library allocation
|
page read and write
|
||
1FD0778F000
|
trusted library allocation
|
page read and write
|
||
1ED601EF000
|
trusted library allocation
|
page read and write
|
||
1FD06AF8000
|
trusted library allocation
|
page read and write
|
||
1FD069C3000
|
trusted library allocation
|
page read and write
|
||
1ED60E31000
|
heap
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD06957000
|
trusted library allocation
|
page read and write
|
||
A4A63FF000
|
stack
|
page read and write
|
||
1FD7FEF2000
|
trusted library allocation
|
page read and write
|
||
1FD05257000
|
trusted library allocation
|
page read and write
|
||
1FD0EFEE000
|
trusted library allocation
|
page read and write
|
||
1FD0F433000
|
trusted library allocation
|
page read and write
|
||
1FD0DD77000
|
trusted library allocation
|
page read and write
|
||
1FD02B61000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD068BC000
|
trusted library allocation
|
page read and write
|
||
1FD0DD1F000
|
trusted library allocation
|
page read and write
|
||
1FD06AF0000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CB000
|
trusted library allocation
|
page read and write
|
||
1FD070D7000
|
trusted library allocation
|
page read and write
|
||
1FD7EB71000
|
trusted library allocation
|
page read and write
|
||
1FD06A5A000
|
trusted library allocation
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD0E05D000
|
trusted library allocation
|
page read and write
|
||
1FD1167D000
|
trusted library allocation
|
page read and write
|
||
1FD0DA00000
|
trusted library allocation
|
page read and write
|
||
1FD05BAE000
|
trusted library allocation
|
page read and write
|
||
1FD05B43000
|
trusted library allocation
|
page read and write
|
||
1FD0D993000
|
trusted library allocation
|
page read and write
|
||
1FD7FB62000
|
trusted library allocation
|
page read and write
|
||
1FD7E639000
|
trusted library allocation
|
page read and write
|
||
1FD052D6000
|
trusted library allocation
|
page read and write
|
||
1FD0EFAE000
|
trusted library allocation
|
page read and write
|
||
1FD08E73000
|
trusted library allocation
|
page read and write
|
||
1FD7C4AD000
|
heap
|
page read and write
|
||
1FD0DB0E000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE6000
|
trusted library allocation
|
page read and write
|
||
1FD0DC47000
|
trusted library allocation
|
page read and write
|
||
1FD0F46C000
|
trusted library allocation
|
page read and write
|
||
22568EE4000
|
heap
|
page read and write
|
||
1FD0F3FD000
|
trusted library allocation
|
page read and write
|
||
1FD7EC13000
|
trusted library allocation
|
page read and write
|
||
1FD0E336000
|
trusted library allocation
|
page read and write
|
||
1FD7FCF1000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCB000
|
trusted library allocation
|
page read and write
|
||
1FD077BD000
|
trusted library allocation
|
page read and write
|
||
1ED60DCA000
|
heap
|
page read and write
|
||
1FD0DB95000
|
trusted library allocation
|
page read and write
|
||
1FD08B7A000
|
trusted library allocation
|
page read and write
|
||
1FD106A6000
|
trusted library allocation
|
page read and write
|
||
1FD0575A000
|
trusted library allocation
|
page read and write
|
||
1FD7C498000
|
heap
|
page read and write
|
||
1FD05F73000
|
trusted library allocation
|
page read and write
|
||
1FD06A1C000
|
trusted library allocation
|
page read and write
|
||
1FD08EA6000
|
trusted library allocation
|
page read and write
|
||
1FD0F352000
|
trusted library allocation
|
page read and write
|
||
1FD0DFD2000
|
trusted library allocation
|
page read and write
|
||
1ED60181000
|
trusted library allocation
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD7FEC7000
|
trusted library allocation
|
page read and write
|
||
1FD7FE33000
|
trusted library allocation
|
page read and write
|
||
F71000
|
heap
|
page read and write
|
||
1FD7FEF6000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C5000
|
trusted library allocation
|
page read and write
|
||
1FD054AA000
|
trusted library allocation
|
page read and write
|
||
1FD07E45000
|
trusted library allocation
|
page read and write
|
||
1FD054C2000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CB000
|
trusted library allocation
|
page read and write
|
||
1FD06CF5000
|
trusted library allocation
|
page read and write
|
||
1FD0F478000
|
trusted library allocation
|
page read and write
|
||
1FD0782E000
|
trusted library allocation
|
page read and write
|
||
1FD10479000
|
trusted library allocation
|
page read and write
|
||
1FD7FEDD000
|
trusted library allocation
|
page read and write
|
||
22568E7F000
|
unclassified section
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
1FD02D92000
|
heap
|
page read and write
|
||
1FD08B80000
|
trusted library allocation
|
page read and write
|
||
1ED60177000
|
trusted library allocation
|
page read and write
|
||
1FD05473000
|
trusted library allocation
|
page read and write
|
||
1FD05BC1000
|
trusted library allocation
|
page read and write
|
||
1FD7FC82000
|
trusted library allocation
|
page read and write
|
||
1FD05AEF000
|
trusted library allocation
|
page read and write
|
||
1FD09296000
|
trusted library allocation
|
page read and write
|
||
22569103000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCB000
|
trusted library allocation
|
page read and write
|
||
1ED60DAC000
|
heap
|
page read and write
|
||
1FD05BC1000
|
trusted library allocation
|
page read and write
|
||
1FD06952000
|
trusted library allocation
|
page read and write
|
||
1FD068DB000
|
trusted library allocation
|
page read and write
|
||
1B3917B4000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD06690000
|
trusted library allocation
|
page read and write
|
||
1FD070B8000
|
trusted library allocation
|
page read and write
|
||
1FD7C455000
|
heap
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0EFAE000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD05AEF000
|
trusted library allocation
|
page read and write
|
||
1FD07E0D000
|
trusted library allocation
|
page read and write
|
||
1FD068E6000
|
trusted library allocation
|
page read and write
|
||
1FD0E0AE000
|
trusted library allocation
|
page read and write
|
||
70A8DF0000
|
trusted library allocation
|
page execute read
|
||
1FD108CA000
|
trusted library allocation
|
page read and write
|
||
1FD06CF0000
|
trusted library allocation
|
page read and write
|
||
1FD7FE69000
|
trusted library allocation
|
page read and write
|
||
1FD06CC5000
|
trusted library allocation
|
page read and write
|
||
A4A3BFB000
|
stack
|
page read and write
|
||
1FD0DBAF000
|
trusted library allocation
|
page read and write
|
||
1FD05471000
|
trusted library allocation
|
page read and write
|
||
1FD7ECE5000
|
trusted library allocation
|
page read and write
|
||
1FD06AB1000
|
trusted library allocation
|
page read and write
|
||
1FD05385000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD09154000
|
heap
|
page read and write
|
||
1FD09261000
|
trusted library allocation
|
page read and write
|
||
1FD0F2DF000
|
trusted library allocation
|
page read and write
|
||
1FD0D9AB000
|
trusted library allocation
|
page read and write
|
||
1FD08B33000
|
trusted library allocation
|
page read and write
|
||
1FD0EFFB000
|
trusted library allocation
|
page read and write
|
||
1FD7C497000
|
heap
|
page read and write
|
||
1FD02B55000
|
trusted library allocation
|
page read and write
|
||
1FD0F57D000
|
trusted library allocation
|
page read and write
|
||
1FD07AE0000
|
trusted library allocation
|
page read and write
|
||
1FD06853000
|
trusted library allocation
|
page read and write
|
||
1B3917E7000
|
trusted library allocation
|
page read and write
|
||
1ED60E3D000
|
heap
|
page read and write
|
||
3820000
|
heap
|
page read and write
|
||
1FD08BF3000
|
trusted library allocation
|
page read and write
|
||
1FD0DBF1000
|
trusted library allocation
|
page read and write
|
||
1FD07ED2000
|
trusted library allocation
|
page read and write
|
||
1FD7C49E000
|
heap
|
page read and write
|
||
23A8AB3D000
|
heap
|
page read and write
|
||
1FD0EFA9000
|
trusted library allocation
|
page read and write
|
||
1FD0DC79000
|
trusted library allocation
|
page read and write
|
||
1FD057C4000
|
trusted library allocation
|
page read and write
|
||
1FD06BE5000
|
trusted library allocation
|
page read and write
|
||
1FD08E8C000
|
trusted library allocation
|
page read and write
|
||
1FD11661000
|
trusted library allocation
|
page read and write
|
||
1FD06940000
|
trusted library allocation
|
page read and write
|
||
1FD0925C000
|
trusted library allocation
|
page read and write
|
||
1FD0F5BF000
|
trusted library allocation
|
page read and write
|
||
1FD06C36000
|
trusted library allocation
|
page read and write
|
||
1FD10492000
|
trusted library allocation
|
page read and write
|
||
1FD068FB000
|
trusted library allocation
|
page read and write
|
||
1B391747000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C5000
|
trusted library allocation
|
page read and write
|
||
1FD06802000
|
trusted library allocation
|
page read and write
|
||
1FD06964000
|
trusted library allocation
|
page read and write
|
||
1ED60EB7000
|
heap
|
page read and write
|
||
1FD7FB67000
|
trusted library allocation
|
page read and write
|
||
1FD1048F000
|
trusted library allocation
|
page read and write
|
||
1FD06CDA000
|
trusted library allocation
|
page read and write
|
||
1FD1167D000
|
trusted library allocation
|
page read and write
|
||
1FD09301000
|
trusted library allocation
|
page read and write
|
||
1FD06AB5000
|
trusted library allocation
|
page read and write
|
||
1FD052D0000
|
trusted library allocation
|
page read and write
|
||
1FD11A6A000
|
trusted library allocation
|
page read and write
|
||
1FD0F33E000
|
trusted library allocation
|
page read and write
|
||
2512A200000
|
heap
|
page read and write
|
||
1FD05363000
|
trusted library allocation
|
page read and write
|
||
1FD05493000
|
trusted library allocation
|
page read and write
|
||
1FD068C1000
|
trusted library allocation
|
page read and write
|
||
1FD0DC39000
|
trusted library allocation
|
page read and write
|
||
1FD0547B000
|
trusted library allocation
|
page read and write
|
||
1FD07489000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD7C42A000
|
heap
|
page read and write
|
||
1FD07943000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD06A80000
|
trusted library allocation
|
page read and write
|
||
1ED60103000
|
trusted library allocation
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
1FD0F5AA000
|
trusted library allocation
|
page read and write
|
||
1FD0DFD8000
|
trusted library allocation
|
page read and write
|
||
1FD07AF2000
|
trusted library allocation
|
page read and write
|
||
1FD116CE000
|
trusted library allocation
|
page read and write
|
||
1FD7EFED000
|
trusted library allocation
|
page read and write
|
||
1FD0F5A1000
|
trusted library allocation
|
page read and write
|
||
1FD0D971000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD7FD98000
|
trusted library allocation
|
page read and write
|
||
1FD7EC7F000
|
trusted library allocation
|
page read and write
|
||
1FD0E1D9000
|
trusted library allocation
|
page read and write
|
||
1FD02DA0000
|
heap
|
page read and write
|
||
1FD0F5C3000
|
trusted library allocation
|
page read and write
|
||
1ED60DA4000
|
heap
|
page read and write
|
||
1FD0F3F5000
|
trusted library allocation
|
page read and write
|
||
1FD07182000
|
trusted library allocation
|
page read and write
|
||
482F6FE000
|
stack
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD06C36000
|
trusted library allocation
|
page read and write
|
||
1FD0E1F6000
|
trusted library allocation
|
page read and write
|
||
1FD0D971000
|
trusted library allocation
|
page read and write
|
||
1FD0E1C0000
|
trusted library allocation
|
page read and write
|
||
1FD108BF000
|
trusted library allocation
|
page read and write
|
||
F8F000
|
heap
|
page read and write
|
||
1FD06860000
|
trusted library allocation
|
page read and write
|
||
1ED60EAA000
|
heap
|
page read and write
|
||
1FD057F7000
|
trusted library allocation
|
page read and write
|
||
1FD068FB000
|
trusted library allocation
|
page read and write
|
||
1FD06A30000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD7C41A000
|
heap
|
page read and write
|
||
1FD068A1000
|
trusted library allocation
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD0EFF0000
|
trusted library allocation
|
page read and write
|
||
1FD7C42A000
|
heap
|
page read and write
|
||
1FD06AC9000
|
trusted library allocation
|
page read and write
|
||
1FD0D951000
|
trusted library allocation
|
page read and write
|
||
1FD7FDFD000
|
trusted library allocation
|
page read and write
|
||
1FD06CFC000
|
trusted library allocation
|
page read and write
|
||
1ED60844000
|
unkown
|
page execute read
|
||
1FD10675000
|
trusted library allocation
|
page read and write
|
||
1FD06C60000
|
trusted library allocation
|
page read and write
|
||
1FD057F5000
|
trusted library allocation
|
page read and write
|
||
1FD0E1BE000
|
trusted library allocation
|
page read and write
|
||
1FD07136000
|
trusted library allocation
|
page read and write
|
||
1FD068F9000
|
trusted library allocation
|
page read and write
|
||
1ED60DBD000
|
heap
|
page read and write
|
||
1FD7FEDC000
|
trusted library allocation
|
page read and write
|
||
1FD0706D000
|
trusted library allocation
|
page read and write
|
||
1FD07E40000
|
trusted library allocation
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1FD7C455000
|
heap
|
page read and write
|
||
1FD0E0C7000
|
trusted library allocation
|
page read and write
|
||
1FD0D9A1000
|
trusted library allocation
|
page read and write
|
||
1FD06AE9000
|
trusted library allocation
|
page read and write
|
||
1FD05496000
|
trusted library allocation
|
page read and write
|
||
1FD08E1B000
|
trusted library allocation
|
page read and write
|
||
1FD08E14000
|
trusted library allocation
|
page read and write
|
||
1FD0EFA7000
|
trusted library allocation
|
page read and write
|
||
1FD7EFDE000
|
trusted library allocation
|
page read and write
|
||
1FD7FE6C000
|
trusted library allocation
|
page read and write
|
||
1B39191C000
|
trusted library allocation
|
page read and write
|
||
1FD06AB5000
|
trusted library allocation
|
page read and write
|
||
1FD06A78000
|
trusted library allocation
|
page read and write
|
||
1FD0703A000
|
trusted library allocation
|
page read and write
|
||
1FD0665A000
|
trusted library allocation
|
page read and write
|
||
1FD7FEDD000
|
trusted library allocation
|
page read and write
|
||
1FD7FC55000
|
trusted library allocation
|
page read and write
|
||
1FD06BD9000
|
trusted library allocation
|
page read and write
|
||
1FD7FB62000
|
trusted library allocation
|
page read and write
|
||
1B39156A000
|
heap
|
page read and write
|
||
1FD7FD11000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD0DF64000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC1000
|
trusted library allocation
|
page read and write
|
||
1FD11DF9000
|
trusted library allocation
|
page read and write
|
||
1FD0EFBF000
|
trusted library allocation
|
page read and write
|
||
1FD06853000
|
trusted library allocation
|
page read and write
|
||
1FD05AFC000
|
trusted library allocation
|
page read and write
|
||
1FD08E73000
|
trusted library allocation
|
page read and write
|
||
A77A7FE000
|
stack
|
page read and write
|
||
1FD057CD000
|
trusted library allocation
|
page read and write
|
||
1FD7C451000
|
heap
|
page read and write
|
||
1FD08EAF000
|
trusted library allocation
|
page read and write
|
||
1FD0DBA6000
|
trusted library allocation
|
page read and write
|
||
1FD057F7000
|
trusted library allocation
|
page read and write
|
||
1FD0DABC000
|
trusted library allocation
|
page read and write
|
||
1FD07AB6000
|
trusted library allocation
|
page read and write
|
||
1FD05476000
|
trusted library allocation
|
page read and write
|
||
1FD0DD66000
|
trusted library allocation
|
page read and write
|
||
1ED60220000
|
trusted library section
|
page readonly
|
||
1FD0EFCB000
|
trusted library allocation
|
page read and write
|
||
1FD0543D000
|
trusted library allocation
|
page read and write
|
||
1FD053A7000
|
trusted library allocation
|
page read and write
|
||
1FD08BEB000
|
trusted library allocation
|
page read and write
|
||
1FD08BA6000
|
trusted library allocation
|
page read and write
|
||
1FD7C414000
|
heap
|
page read and write
|
||
F93000
|
heap
|
page read and write
|
||
1FD0DBFD000
|
trusted library allocation
|
page read and write
|
||
1FD0F435000
|
trusted library allocation
|
page read and write
|
||
1FD0E027000
|
trusted library allocation
|
page read and write
|
||
1FD0681D000
|
trusted library allocation
|
page read and write
|
||
1FD0EFC3000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCF000
|
trusted library allocation
|
page read and write
|
||
22568D00000
|
heap
|
page read and write
|
||
1FD7FD98000
|
trusted library allocation
|
page read and write
|
||
1FD07981000
|
trusted library allocation
|
page read and write
|
||
1FD0F5AC000
|
trusted library allocation
|
page read and write
|
||
1ED60169000
|
trusted library allocation
|
page read and write
|
||
1FD0DFA1000
|
trusted library allocation
|
page read and write
|
||
1FD7C451000
|
heap
|
page read and write
|
||
1FD0E061000
|
trusted library allocation
|
page read and write
|
||
1FD108BF000
|
trusted library allocation
|
page read and write
|
||
1ED60E84000
|
heap
|
page read and write
|
||
1FD066C2000
|
trusted library allocation
|
page read and write
|
||
1FD0DBC8000
|
trusted library allocation
|
page read and write
|
||
1FD7FB36000
|
trusted library allocation
|
page read and write
|
||
1FD04F8D000
|
trusted library allocation
|
page read and write
|
||
1FD0DC47000
|
trusted library allocation
|
page read and write
|
||
1FD07AE7000
|
trusted library allocation
|
page read and write
|
||
1FD060C4000
|
trusted library allocation
|
page read and write
|
||
1FD07E4B000
|
trusted library allocation
|
page read and write
|
||
1FD08EFA000
|
trusted library allocation
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD05ABD000
|
trusted library allocation
|
page read and write
|
||
1FD0F478000
|
trusted library allocation
|
page read and write
|
||
1FD7C434000
|
heap
|
page read and write
|
||
1FD071FC000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC7000
|
trusted library allocation
|
page read and write
|
||
1FD0578F000
|
trusted library allocation
|
page read and write
|
||
1FD1043A000
|
trusted library allocation
|
page read and write
|
||
1FD0DD90000
|
trusted library allocation
|
page read and write
|
||
1FD08BAB000
|
trusted library allocation
|
page read and write
|
||
1FD0EFB4000
|
trusted library allocation
|
page read and write
|
||
1FD06AF8000
|
trusted library allocation
|
page read and write
|
||
1B391703000
|
trusted library allocation
|
page read and write
|
||
1FD7C472000
|
heap
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD0F37A000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD7C41E000
|
heap
|
page read and write
|
||
1FD08E77000
|
trusted library allocation
|
page read and write
|
||
1FD116E5000
|
trusted library allocation
|
page read and write
|
||
1FD05B94000
|
trusted library allocation
|
page read and write
|
||
1FD08EB7000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0DBD9000
|
trusted library allocation
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD06940000
|
trusted library allocation
|
page read and write
|
||
1FD0DDC8000
|
trusted library allocation
|
page read and write
|
||
1FD0DCD7000
|
trusted library allocation
|
page read and write
|
||
1FD7FD6D000
|
trusted library allocation
|
page read and write
|
||
1FD078FE000
|
trusted library allocation
|
page read and write
|
||
1FD0DDBC000
|
trusted library allocation
|
page read and write
|
||
1FD0521F000
|
trusted library allocation
|
page read and write
|
||
1FD0E3E6000
|
trusted library allocation
|
page read and write
|
||
F48000
|
heap
|
page read and write
|
||
1ED60E99000
|
heap
|
page read and write
|
||
1FD0E341000
|
trusted library allocation
|
page read and write
|
||
1FD7EF89000
|
trusted library allocation
|
page read and write
|
||
1FD0E325000
|
trusted library allocation
|
page read and write
|
||
22568C20000
|
unclassified section
|
page readonly
|
||
1FD0E1A6000
|
trusted library allocation
|
page read and write
|
||
1FD02D72000
|
heap
|
page read and write
|
||
22568C10000
|
unclassified section
|
page readonly
|
||
1FD7FD20000
|
trusted library allocation
|
page read and write
|
||
1FD052D1000
|
trusted library allocation
|
page read and write
|
||
1FD7EBFB000
|
trusted library allocation
|
page read and write
|
||
1FD06BF9000
|
trusted library allocation
|
page read and write
|
||
AD4000
|
unkown
|
page readonly
|
||
1FD0F4FE000
|
trusted library allocation
|
page read and write
|
||
1FD7FD92000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD0DD5E000
|
trusted library allocation
|
page read and write
|
||
1FD0E1DB000
|
trusted library allocation
|
page read and write
|
||
1FD06CF1000
|
trusted library allocation
|
page read and write
|
||
1FD11DE9000
|
trusted library allocation
|
page read and write
|
||
1FD0EFF0000
|
trusted library allocation
|
page read and write
|
||
1FD0917A000
|
heap
|
page read and write
|
||
1FD0DADA000
|
trusted library allocation
|
page read and write
|
||
23A8AB2B000
|
heap
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
22568C96000
|
remote allocation
|
page execute read
|
||
1FD7C436000
|
heap
|
page read and write
|
||
1FD0DC49000
|
trusted library allocation
|
page read and write
|
||
1FD06863000
|
trusted library allocation
|
page read and write
|
||
1FD054A6000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD7FDB2000
|
trusted library allocation
|
page read and write
|
||
1FD07076000
|
trusted library allocation
|
page read and write
|
||
22568F73000
|
heap
|
page read and write
|
||
1FD06646000
|
trusted library allocation
|
page read and write
|
||
1FD05F38000
|
trusted library allocation
|
page read and write
|
||
1FD7C451000
|
heap
|
page read and write
|
||
1FD071B6000
|
trusted library allocation
|
page read and write
|
||
1FD0F586000
|
trusted library allocation
|
page read and write
|
||
1FD06AD2000
|
trusted library allocation
|
page read and write
|
||
1FD0F33E000
|
trusted library allocation
|
page read and write
|
||
1FD0F5E7000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD0683D000
|
trusted library allocation
|
page read and write
|
||
1FD05449000
|
trusted library allocation
|
page read and write
|
||
1B3915D2000
|
unclassified section
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD11DEF000
|
trusted library allocation
|
page read and write
|
||
A778F7E000
|
unkown
|
page readonly
|
||
1FD05AC3000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
482FEFE000
|
unkown
|
page readonly
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD0F5D7000
|
trusted library allocation
|
page read and write
|
||
1FD05385000
|
trusted library allocation
|
page read and write
|
||
1FD06AE1000
|
trusted library allocation
|
page read and write
|
||
1B39175D000
|
trusted library allocation
|
page read and write
|
||
1FD0F3F5000
|
trusted library allocation
|
page read and write
|
||
1FD0F5A8000
|
trusted library allocation
|
page read and write
|
||
1FD07795000
|
trusted library allocation
|
page read and write
|
||
1FD0F3B4000
|
trusted library allocation
|
page read and write
|
||
1FD08B7D000
|
trusted library allocation
|
page read and write
|
||
1FD7FD20000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCF000
|
trusted library allocation
|
page read and write
|
||
1FD06AFA000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0EFB4000
|
trusted library allocation
|
page read and write
|
||
23A89100000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC7000
|
trusted library allocation
|
page read and write
|
||
1FD057D7000
|
trusted library allocation
|
page read and write
|
||
1FD106F7000
|
trusted library allocation
|
page read and write
|
||
1FD0F382000
|
trusted library allocation
|
page read and write
|
||
1ED60DAC000
|
heap
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1B391710000
|
trusted library allocation
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
1FD06AF0000
|
trusted library allocation
|
page read and write
|
||
1FD04F56000
|
trusted library allocation
|
page read and write
|
||
97234BE000
|
unkown
|
page readonly
|
||
1FD0E1E4000
|
trusted library allocation
|
page read and write
|
||
1FD05B98000
|
trusted library allocation
|
page read and write
|
||
1FD10881000
|
trusted library allocation
|
page read and write
|
||
1FD06642000
|
trusted library allocation
|
page read and write
|
||
1FD7FE2C000
|
trusted library allocation
|
page read and write
|
||
1FD0781F000
|
trusted library allocation
|
page read and write
|
||
1FD0527A000
|
trusted library allocation
|
page read and write
|
||
1FD11A27000
|
trusted library allocation
|
page read and write
|
||
1FD116ED000
|
trusted library allocation
|
page read and write
|
||
1FD05AC1000
|
trusted library allocation
|
page read and write
|
||
1FD0EFF0000
|
trusted library allocation
|
page read and write
|
||
1FD06940000
|
trusted library allocation
|
page read and write
|
||
1FD06897000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
70A8E10000
|
trusted library allocation
|
page execute read
|
||
1FD068CE000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C5000
|
trusted library allocation
|
page read and write
|
||
1FD0705D000
|
trusted library allocation
|
page read and write
|
||
1FD0DCD7000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD116CE000
|
trusted library allocation
|
page read and write
|
||
1FD10874000
|
trusted library allocation
|
page read and write
|
||
1FD071A9000
|
trusted library allocation
|
page read and write
|
||
1ED60900000
|
trusted library allocation
|
page read and write
|
||
1FD0E3F5000
|
trusted library allocation
|
page read and write
|
||
1FD7EFAD000
|
trusted library allocation
|
page read and write
|
||
1ED60D9C000
|
heap
|
page read and write
|
||
1FD7E68A000
|
trusted library allocation
|
page read and write
|
||
1FD05AFC000
|
trusted library allocation
|
page read and write
|
||
1FD07D5E000
|
trusted library allocation
|
page read and write
|
||
1FD06953000
|
trusted library allocation
|
page read and write
|
||
1FD104A1000
|
trusted library allocation
|
page read and write
|
||
1FD0788D000
|
trusted library allocation
|
page read and write
|
||
1FD06C0F000
|
trusted library allocation
|
page read and write
|
||
22569303000
|
trusted library allocation
|
page read and write
|
||
1FD057F3000
|
trusted library allocation
|
page read and write
|
||
1FD0F408000
|
trusted library allocation
|
page read and write
|
||
1FD7C455000
|
heap
|
page read and write
|
||
1FD106FB000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C9000
|
trusted library allocation
|
page read and write
|
||
22569200000
|
heap
|
page read and write
|
||
1FD07ECC000
|
trusted library allocation
|
page read and write
|
||
1FD077C4000
|
trusted library allocation
|
page read and write
|
||
1FD7FBB3000
|
trusted library allocation
|
page read and write
|
||
1FD071C0000
|
trusted library allocation
|
page read and write
|
||
1FD07E7D000
|
trusted library allocation
|
page read and write
|
||
1FD0F5D5000
|
trusted library allocation
|
page read and write
|
||
1FD7E598000
|
trusted library allocation
|
page read and write
|
||
1ED60E6D000
|
heap
|
page read and write
|
||
1FD07106000
|
trusted library allocation
|
page read and write
|
||
1FD0F581000
|
trusted library allocation
|
page read and write
|
||
1FD06CEE000
|
trusted library allocation
|
page read and write
|
||
1FD1169B000
|
trusted library allocation
|
page read and write
|
||
F93000
|
heap
|
page read and write
|
||
1FD053A7000
|
trusted library allocation
|
page read and write
|
||
1FD05B3B000
|
trusted library allocation
|
page read and write
|
||
1FD077F6000
|
trusted library allocation
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
1FD7FE5E000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0E0F9000
|
trusted library allocation
|
page read and write
|
||
1FD06A56000
|
trusted library allocation
|
page read and write
|
||
1FD05244000
|
trusted library allocation
|
page read and write
|
||
1FD02B55000
|
trusted library allocation
|
page read and write
|
||
97235BE000
|
unkown
|
page readonly
|
||
1FD7C41E000
|
heap
|
page read and write
|
||
1FD0F593000
|
trusted library allocation
|
page read and write
|
||
1FD104C0000
|
trusted library allocation
|
page read and write
|
||
1FD0E0F3000
|
trusted library allocation
|
page read and write
|
||
1FD0DC63000
|
trusted library allocation
|
page read and write
|
||
1FD05B2D000
|
trusted library allocation
|
page read and write
|
||
1FD7FDBA000
|
trusted library allocation
|
page read and write
|
||
1FD0D92B000
|
trusted library allocation
|
page read and write
|
||
1FD0DD3D000
|
trusted library allocation
|
page read and write
|
||
1FD069FC000
|
trusted library allocation
|
page read and write
|
||
1FD08B31000
|
trusted library allocation
|
page read and write
|
||
225691F6000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C1000
|
trusted library allocation
|
page read and write
|
||
1FD092B4000
|
trusted library allocation
|
page read and write
|
||
1FD06849000
|
trusted library allocation
|
page read and write
|
||
1FD0E011000
|
trusted library allocation
|
page read and write
|
||
1FD0704B000
|
trusted library allocation
|
page read and write
|
||
1FD05AE3000
|
trusted library allocation
|
page read and write
|
||
1B3915E0000
|
heap
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
1FD066F5000
|
trusted library allocation
|
page read and write
|
||
1FD066CB000
|
trusted library allocation
|
page read and write
|
||
2256916B000
|
trusted library allocation
|
page read and write
|
||
1FD0E0F3000
|
trusted library allocation
|
page read and write
|
||
1FD0F478000
|
trusted library allocation
|
page read and write
|
||
1FD0669C000
|
trusted library allocation
|
page read and write
|
||
1FD07120000
|
trusted library allocation
|
page read and write
|
||
1FD05B92000
|
trusted library allocation
|
page read and write
|
||
1FD7C47D000
|
heap
|
page read and write
|
||
1FD08BAB000
|
trusted library allocation
|
page read and write
|
||
1FD054C8000
|
trusted library allocation
|
page read and write
|
||
1FD069CF000
|
trusted library allocation
|
page read and write
|
||
1FD0DA3C000
|
trusted library allocation
|
page read and write
|
||
1FD07185000
|
trusted library allocation
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1B3915C4000
|
heap
|
page read and write
|
||
1FD0F4F2000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC1000
|
trusted library allocation
|
page read and write
|
||
1FD108A3000
|
trusted library allocation
|
page read and write
|
||
1B3917C9000
|
trusted library allocation
|
page read and write
|
||
1FD08BA6000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE4000
|
trusted library allocation
|
page read and write
|
||
1B391768000
|
trusted library allocation
|
page read and write
|
||
1FD06CFA000
|
trusted library allocation
|
page read and write
|
||
1FD053A0000
|
trusted library allocation
|
page read and write
|
||
1FD7FD92000
|
trusted library allocation
|
page read and write
|
||
1FD0DDCB000
|
trusted library allocation
|
page read and write
|
||
1FD053D6000
|
trusted library allocation
|
page read and write
|
||
1FD08EF1000
|
trusted library allocation
|
page read and write
|
||
1FD08BAE000
|
trusted library allocation
|
page read and write
|
||
1FD0DDD2000
|
trusted library allocation
|
page read and write
|
||
1FD02D70000
|
heap
|
page read and write
|
||
1FD7FCF1000
|
trusted library allocation
|
page read and write
|
||
1FD108AA000
|
trusted library allocation
|
page read and write
|
||
1FD0F35B000
|
trusted library allocation
|
page read and write
|
||
1ED60D49000
|
heap
|
page read and write
|
||
1FD02B33000
|
trusted library allocation
|
page read and write
|
||
1FD7FDB2000
|
trusted library allocation
|
page read and write
|
||
1FD7FC81000
|
trusted library allocation
|
page read and write
|
||
1FD7EF54000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC7000
|
trusted library allocation
|
page read and write
|
||
1FD05B3F000
|
trusted library allocation
|
page read and write
|
||
1FD0547F000
|
trusted library allocation
|
page read and write
|
||
1FD06CF5000
|
trusted library allocation
|
page read and write
|
||
1FD06AC7000
|
trusted library allocation
|
page read and write
|
||
1FD068BC000
|
trusted library allocation
|
page read and write
|
||
1FD069F4000
|
trusted library allocation
|
page read and write
|
||
1FD068A1000
|
trusted library allocation
|
page read and write
|
||
1FD0547B000
|
trusted library allocation
|
page read and write
|
||
1FD0669E000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD07E8C000
|
trusted library allocation
|
page read and write
|
||
1FD08EE1000
|
trusted library allocation
|
page read and write
|
||
1FD05471000
|
trusted library allocation
|
page read and write
|
||
1FD7FCA8000
|
trusted library allocation
|
page read and write
|
||
1FD08BFB000
|
trusted library allocation
|
page read and write
|
||
1FD078FB000
|
trusted library allocation
|
page read and write
|
||
1FD0FBDE000
|
trusted library allocation
|
page read and write
|
||
1FD02D96000
|
heap
|
page read and write
|
||
1FD07E6F000
|
trusted library allocation
|
page read and write
|
||
1FD07095000
|
trusted library allocation
|
page read and write
|
||
1FD05BF5000
|
trusted library allocation
|
page read and write
|
||
1FD7FBC5000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE0000
|
trusted library allocation
|
page read and write
|
||
1FD7FE9D000
|
trusted library allocation
|
page read and write
|
||
1FD10431000
|
trusted library allocation
|
page read and write
|
||
1FD116A6000
|
trusted library allocation
|
page read and write
|
||
1FD05B7A000
|
trusted library allocation
|
page read and write
|
||
1FD11A61000
|
trusted library allocation
|
page read and write
|
||
2512A3CA000
|
heap
|
page read and write
|
||
1FD06CDA000
|
trusted library allocation
|
page read and write
|
||
1FD0683B000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD7FE97000
|
trusted library allocation
|
page read and write
|
||
1FD10877000
|
trusted library allocation
|
page read and write
|
||
1FD04FAB000
|
trusted library allocation
|
page read and write
|
||
1FD05BA8000
|
trusted library allocation
|
page read and write
|
||
1FD02DA4000
|
heap
|
page read and write
|
||
1FD070E0000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD8000
|
trusted library allocation
|
page read and write
|
||
1FD7C451000
|
heap
|
page read and write
|
||
1FD0794F000
|
trusted library allocation
|
page read and write
|
||
1FD066E0000
|
trusted library allocation
|
page read and write
|
||
1FD7FDE5000
|
trusted library allocation
|
page read and write
|
||
1FD0DC8C000
|
trusted library allocation
|
page read and write
|
||
1FD06958000
|
trusted library allocation
|
page read and write
|
||
1FD066EF000
|
trusted library allocation
|
page read and write
|
||
1FD7FE69000
|
trusted library allocation
|
page read and write
|
||
1FD7C4A9000
|
heap
|
page read and write
|
||
1FD7C484000
|
heap
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD10492000
|
trusted library allocation
|
page read and write
|
||
1FD0E0C0000
|
trusted library allocation
|
page read and write
|
||
1FD05FC0000
|
trusted library allocation
|
page read and write
|
||
1FD08BA3000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE9000
|
trusted library allocation
|
page read and write
|
||
1FD077D3000
|
trusted library allocation
|
page read and write
|
||
1FD068B0000
|
trusted library allocation
|
page read and write
|
||
1FD0F37C000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD104A1000
|
trusted library allocation
|
page read and write
|
||
1FD05B33000
|
trusted library allocation
|
page read and write
|
||
22569182000
|
trusted library allocation
|
page read and write
|
||
1FD06AB1000
|
trusted library allocation
|
page read and write
|
||
1FD10898000
|
trusted library allocation
|
page read and write
|
||
1FD06C57000
|
trusted library allocation
|
page read and write
|
||
1E7CC1C03000
|
trusted library allocation
|
page read and write
|
||
225691B1000
|
trusted library allocation
|
page read and write
|
||
1FD7FDC1000
|
trusted library allocation
|
page read and write
|
||
1FD0703A000
|
trusted library allocation
|
page read and write
|
||
1FD07168000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
1FD10874000
|
trusted library allocation
|
page read and write
|
||
1FD07E21000
|
trusted library allocation
|
page read and write
|
||
1FD02BF6000
|
trusted library allocation
|
page read and write
|
||
1FD06C9A000
|
trusted library allocation
|
page read and write
|
||
A7765D8000
|
stack
|
page read and write
|
||
1FD07D93000
|
trusted library allocation
|
page read and write
|
||
1FD0663B000
|
trusted library allocation
|
page read and write
|
||
1FD0F589000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
1FD06AA2000
|
trusted library allocation
|
page read and write
|
||
1ED60D9F000
|
heap
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD05273000
|
trusted library allocation
|
page read and write
|
||
1FD11685000
|
trusted library allocation
|
page read and write
|
||
569000
|
stack
|
page read and write
|
||
22569170000
|
trusted library allocation
|
page read and write
|
||
1FD0577D000
|
trusted library allocation
|
page read and write
|
||
1FD08EA6000
|
trusted library allocation
|
page read and write
|
||
1FD7C496000
|
heap
|
page read and write
|
||
1FD07D5B000
|
trusted library allocation
|
page read and write
|
||
1FD057B1000
|
trusted library allocation
|
page read and write
|
||
1FD0686B000
|
trusted library allocation
|
page read and write
|
||
1FD05B43000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
2512A50A000
|
trusted library allocation
|
page read and write
|
||
1FD053A7000
|
trusted library allocation
|
page read and write
|
||
1FD08B37000
|
trusted library allocation
|
page read and write
|
||
1FD06C37000
|
trusted library allocation
|
page read and write
|
||
1FD0F3DD000
|
trusted library allocation
|
page read and write
|
||
1FD05230000
|
trusted library allocation
|
page read and write
|
||
1FD06C0B000
|
trusted library allocation
|
page read and write
|
||
1FD07EE8000
|
trusted library allocation
|
page read and write
|
||
1FD07136000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD0F4E6000
|
trusted library allocation
|
page read and write
|
||
1FD06C99000
|
trusted library allocation
|
page read and write
|
||
1FD06AC3000
|
trusted library allocation
|
page read and write
|
||
1FD08E6C000
|
trusted library allocation
|
page read and write
|
||
1FD02DA0000
|
heap
|
page read and write
|
||
1FD06964000
|
trusted library allocation
|
page read and write
|
||
1FD08B83000
|
trusted library allocation
|
page read and write
|
||
1FD7C496000
|
heap
|
page read and write
|
||
1FD05475000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD7FDF4000
|
trusted library allocation
|
page read and write
|
||
1FD06CB5000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD0F429000
|
trusted library allocation
|
page read and write
|
||
1FD116B9000
|
trusted library allocation
|
page read and write
|
||
1FD05711000
|
trusted library allocation
|
page read and write
|
||
A778FFE000
|
unkown
|
page readonly
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD7FDDD000
|
trusted library allocation
|
page read and write
|
||
1FD069F4000
|
trusted library allocation
|
page read and write
|
||
1FD0E0F1000
|
trusted library allocation
|
page read and write
|
||
1FD06CDA000
|
trusted library allocation
|
page read and write
|
||
1FD7FB50000
|
trusted library allocation
|
page read and write
|
||
1FD106DB000
|
trusted library allocation
|
page read and write
|
||
1FD06AEC000
|
trusted library allocation
|
page read and write
|
||
1FD068E8000
|
trusted library allocation
|
page read and write
|
||
1FD091F1000
|
heap
|
page read and write
|
||
1FD7C49E000
|
heap
|
page read and write
|
||
1FD0DC33000
|
trusted library allocation
|
page read and write
|
||
1FD7EC1E000
|
trusted library allocation
|
page read and write
|
||
1FD0E33C000
|
trusted library allocation
|
page read and write
|
||
1FD066CF000
|
trusted library allocation
|
page read and write
|
||
1FD7FD18000
|
trusted library allocation
|
page read and write
|
||
1FD0DC27000
|
trusted library allocation
|
page read and write
|
||
1FD068FB000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC1000
|
trusted library allocation
|
page read and write
|
||
1FD0719C000
|
trusted library allocation
|
page read and write
|
||
1FD0DF75000
|
trusted library allocation
|
page read and write
|
||
1FD05AE3000
|
trusted library allocation
|
page read and write
|
||
1FD06A52000
|
trusted library allocation
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
1FD06671000
|
trusted library allocation
|
page read and write
|
||
1B39172E000
|
trusted library allocation
|
page read and write
|
||
1FD0693E000
|
trusted library allocation
|
page read and write
|
||
1FD07E08000
|
trusted library allocation
|
page read and write
|
||
1FD7C496000
|
heap
|
page read and write
|
||
1FD0EFD1000
|
trusted library allocation
|
page read and write
|
||
1ED602C4000
|
heap
|
page read and write
|
||
1FD0DC33000
|
trusted library allocation
|
page read and write
|
||
1FD0D933000
|
trusted library allocation
|
page read and write
|
||
1FD7FD7E000
|
trusted library allocation
|
page read and write
|
||
1FD08EA6000
|
trusted library allocation
|
page read and write
|
||
1FD02D72000
|
heap
|
page read and write
|
||
1FD08EA6000
|
trusted library allocation
|
page read and write
|
||
1FD0E0A8000
|
trusted library allocation
|
page read and write
|
||
1FD06AD6000
|
trusted library allocation
|
page read and write
|
||
23A8AB38000
|
heap
|
page read and write
|
||
1FD0DF08000
|
trusted library allocation
|
page read and write
|
||
1FD0E199000
|
trusted library allocation
|
page read and write
|
||
1FD06953000
|
trusted library allocation
|
page read and write
|
||
1FD104DA000
|
trusted library allocation
|
page read and write
|
||
1FD0661C000
|
trusted library allocation
|
page read and write
|
||
1FD07866000
|
trusted library allocation
|
page read and write
|
||
1B391560000
|
heap
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD7FEDC000
|
trusted library allocation
|
page read and write
|
||
1FD7C41E000
|
heap
|
page read and write
|
||
1FD07DB9000
|
trusted library allocation
|
page read and write
|
||
1FD0538B000
|
trusted library allocation
|
page read and write
|
||
1FD02DA0000
|
heap
|
page read and write
|
||
1FD071B8000
|
trusted library allocation
|
page read and write
|
||
1FD06A8B000
|
trusted library allocation
|
page read and write
|
||
1FD7C4A0000
|
heap
|
page read and write
|
||
1FD0EFF0000
|
trusted library allocation
|
page read and write
|
||
1FD1081A000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD05AB7000
|
trusted library allocation
|
page read and write
|
||
A7797FE000
|
stack
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD11656000
|
trusted library allocation
|
page read and write
|
||
1FD08E3E000
|
trusted library allocation
|
page read and write
|
||
1FD05B3B000
|
trusted library allocation
|
page read and write
|
||
1FD06805000
|
trusted library allocation
|
page read and write
|
||
1FD08EB1000
|
trusted library allocation
|
page read and write
|
||
1FD068BC000
|
trusted library allocation
|
page read and write
|
||
1FD10833000
|
trusted library allocation
|
page read and write
|
||
1FD06860000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0FBE0000
|
trusted library allocation
|
page read and write
|
||
1FD7E5A8000
|
trusted library allocation
|
page read and write
|
||
1FD0DC63000
|
trusted library allocation
|
page read and write
|
||
1ED5FFF0000
|
heap
|
page readonly
|
||
1FD06E00000
|
trusted library allocation
|
page read and write
|
||
1FD0DBDE000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD0F5D3000
|
trusted library allocation
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD06C78000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD8000
|
trusted library allocation
|
page read and write
|
||
1FD7C458000
|
heap
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD116ED000
|
trusted library allocation
|
page read and write
|
||
1FD05D5B000
|
trusted library allocation
|
page read and write
|
||
1ED60EAA000
|
heap
|
page read and write
|
||
1FD0E0E2000
|
trusted library allocation
|
page read and write
|
||
1FD05B7A000
|
trusted library allocation
|
page read and write
|
||
1FD06BB3000
|
trusted library allocation
|
page read and write
|
||
1FD7C420000
|
heap
|
page read and write
|
||
1FD02B80000
|
trusted library allocation
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1ED60DA0000
|
heap
|
page read and write
|
||
1FD7FCF5000
|
trusted library allocation
|
page read and write
|
||
1FD05DD1000
|
trusted library allocation
|
page read and write
|
||
1FD0E3E1000
|
trusted library allocation
|
page read and write
|
||
1FD0EFC3000
|
trusted library allocation
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
1FD108B8000
|
trusted library allocation
|
page read and write
|
||
1FD057F3000
|
trusted library allocation
|
page read and write
|
||
1FD07AE7000
|
trusted library allocation
|
page read and write
|
||
1FD06A56000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD0DD23000
|
trusted library allocation
|
page read and write
|
||
1FD06696000
|
trusted library allocation
|
page read and write
|
||
1FD0F579000
|
trusted library allocation
|
page read and write
|
||
1FD06656000
|
trusted library allocation
|
page read and write
|
||
1FD057DE000
|
trusted library allocation
|
page read and write
|
||
1FD7FCC6000
|
trusted library allocation
|
page read and write
|
||
1B39175B000
|
trusted library allocation
|
page read and write
|
||
1ED60EB7000
|
heap
|
page read and write
|
||
1FD7C426000
|
heap
|
page read and write
|
||
1FD0E14A000
|
trusted library allocation
|
page read and write
|
||
1B39170D000
|
trusted library allocation
|
page read and write
|
||
1FD05AA1000
|
trusted library allocation
|
page read and write
|
||
1FD7C47D000
|
heap
|
page read and write
|
||
1FD0521B000
|
trusted library allocation
|
page read and write
|
||
2256915D000
|
trusted library allocation
|
page read and write
|
||
1FD08EAB000
|
trusted library allocation
|
page read and write
|
||
1FD06A87000
|
trusted library allocation
|
page read and write
|
||
1FD06A43000
|
trusted library allocation
|
page read and write
|
||
1FD05460000
|
trusted library allocation
|
page read and write
|
||
1FD02DF2000
|
heap
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD0F5AA000
|
trusted library allocation
|
page read and write
|
||
1FD116FB000
|
trusted library allocation
|
page read and write
|
||
1FD069AA000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD0F4E6000
|
trusted library allocation
|
page read and write
|
||
1FD066E0000
|
trusted library allocation
|
page read and write
|
||
1FD0685B000
|
trusted library allocation
|
page read and write
|
||
1FD08EA9000
|
trusted library allocation
|
page read and write
|
||
1FD04F7F000
|
trusted library allocation
|
page read and write
|
||
1FD02DA0000
|
heap
|
page read and write
|
||
1FD057F5000
|
trusted library allocation
|
page read and write
|
||
1FD02DA0000
|
heap
|
page read and write
|
||
1FD05DC1000
|
trusted library allocation
|
page read and write
|
||
1FD0DAB6000
|
trusted library allocation
|
page read and write
|
||
1FD07AE0000
|
trusted library allocation
|
page read and write
|
||
1FD0F3A7000
|
trusted library allocation
|
page read and write
|
||
1FD0D96E000
|
trusted library allocation
|
page read and write
|
||
1FD07E2B000
|
trusted library allocation
|
page read and write
|
||
1FD06843000
|
trusted library allocation
|
page read and write
|
||
22569166000
|
trusted library allocation
|
page read and write
|
||
1ED60E98000
|
heap
|
page read and write
|
||
1FD0665A000
|
trusted library allocation
|
page read and write
|
||
1FD07787000
|
trusted library allocation
|
page read and write
|
||
1FD071C0000
|
trusted library allocation
|
page read and write
|
||
1FD0DF90000
|
trusted library allocation
|
page read and write
|
||
A77AFFE000
|
unkown
|
page readonly
|
||
1FD0F36D000
|
trusted library allocation
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD06AC3000
|
trusted library allocation
|
page read and write
|
||
1FD06CF5000
|
trusted library allocation
|
page read and write
|
||
1FD06CC1000
|
trusted library allocation
|
page read and write
|
||
1FD0FB99000
|
trusted library allocation
|
page read and write
|
||
1FD05BAA000
|
trusted library allocation
|
page read and write
|
||
1FD0DFAC000
|
trusted library allocation
|
page read and write
|
||
1FD06AFA000
|
trusted library allocation
|
page read and write
|
||
1FD0EFC3000
|
trusted library allocation
|
page read and write
|
||
1FD0DDE5000
|
trusted library allocation
|
page read and write
|
||
1ED60E6A000
|
heap
|
page read and write
|
||
1FD05BA8000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD06860000
|
trusted library allocation
|
page read and write
|
||
1FD0DFD0000
|
trusted library allocation
|
page read and write
|
||
1FD054C2000
|
trusted library allocation
|
page read and write
|
||
1B3915DF000
|
unclassified section
|
page read and write
|
||
1FD06C97000
|
trusted library allocation
|
page read and write
|
||
1FD0F36C000
|
trusted library allocation
|
page read and write
|
||
1FD068BC000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD0DAB0000
|
trusted library allocation
|
page read and write
|
||
1FD0695F000
|
trusted library allocation
|
page read and write
|
||
1FD06A58000
|
trusted library allocation
|
page read and write
|
||
1B391420000
|
heap
|
page read and write
|
||
1FD08E53000
|
trusted library allocation
|
page read and write
|
||
1FD0DB3D000
|
trusted library allocation
|
page read and write
|
||
1FD0DC33000
|
trusted library allocation
|
page read and write
|
||
22568E70000
|
unclassified section
|
page read and write
|
||
1FD068A1000
|
trusted library allocation
|
page read and write
|
||
1FD0DC3B000
|
trusted library allocation
|
page read and write
|
||
1FD7FE81000
|
trusted library allocation
|
page read and write
|
||
1FD7E65B000
|
trusted library allocation
|
page read and write
|
||
22569130000
|
trusted library allocation
|
page read and write
|
||
1FD0DC81000
|
trusted library allocation
|
page read and write
|
||
1FD0DFC8000
|
trusted library allocation
|
page read and write
|
||
1FD07192000
|
trusted library allocation
|
page read and write
|
||
1FD07E45000
|
trusted library allocation
|
page read and write
|
||
1FD068DB000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD08B89000
|
trusted library allocation
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
94D000
|
stack
|
page read and write
|
||
1FD0E0E5000
|
trusted library allocation
|
page read and write
|
||
1FD7ECC5000
|
trusted library allocation
|
page read and write
|
||
1FD7EC75000
|
trusted library allocation
|
page read and write
|
||
1FD0DBA8000
|
trusted library allocation
|
page read and write
|
||
1FD06AFA000
|
trusted library allocation
|
page read and write
|
||
1FD7C452000
|
heap
|
page read and write
|
||
1FD0E3D9000
|
trusted library allocation
|
page read and write
|
||
1FD09259000
|
trusted library allocation
|
page read and write
|
||
1FD0788D000
|
trusted library allocation
|
page read and write
|
||
1ED60EAA000
|
heap
|
page read and write
|
||
1FD0FBE0000
|
trusted library allocation
|
page read and write
|
||
2256915F000
|
trusted library allocation
|
page read and write
|
||
1B391350000
|
unclassified section
|
page readonly
|
||
1FD0DF0C000
|
trusted library allocation
|
page read and write
|
||
EDF000
|
stack
|
page read and write
|
||
1ED60E98000
|
heap
|
page read and write
|
||
1ED60E28000
|
heap
|
page read and write
|
||
1FD0538F000
|
trusted library allocation
|
page read and write
|
||
1FD02D8C000
|
heap
|
page read and write
|
||
1FD05B92000
|
trusted library allocation
|
page read and write
|
||
1FD04F63000
|
trusted library allocation
|
page read and write
|
||
1FD0DB95000
|
trusted library allocation
|
page read and write
|
||
1FD0DDDF000
|
trusted library allocation
|
page read and write
|
||
1FD7E5EF000
|
trusted library allocation
|
page read and write
|
||
1FD0DB9B000
|
trusted library allocation
|
page read and write
|
||
1FD068C1000
|
trusted library allocation
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD02BDB000
|
trusted library allocation
|
page read and write
|
||
1FD7FC46000
|
trusted library allocation
|
page read and write
|
||
1FD7E5A6000
|
trusted library allocation
|
page read and write
|
||
1FD7E5C7000
|
trusted library allocation
|
page read and write
|
||
1FD0DD3B000
|
trusted library allocation
|
page read and write
|
||
1FD0F3C0000
|
trusted library allocation
|
page read and write
|
||
1FD0FBD0000
|
trusted library allocation
|
page read and write
|
||
1FD08BF6000
|
trusted library allocation
|
page read and write
|
||
1FD06A3F000
|
trusted library allocation
|
page read and write
|
||
1FD0DADA000
|
trusted library allocation
|
page read and write
|
||
1FD0F59D000
|
trusted library allocation
|
page read and write
|
||
1FD10877000
|
trusted library allocation
|
page read and write
|
||
1ED60E6A000
|
heap
|
page read and write
|
||
1FD06A98000
|
trusted library allocation
|
page read and write
|
||
1FD06A30000
|
trusted library allocation
|
page read and write
|
||
1FD06CEE000
|
trusted library allocation
|
page read and write
|
||
1FD0DDB6000
|
trusted library allocation
|
page read and write
|
||
1FD08ED4000
|
trusted library allocation
|
page read and write
|
||
1FD108F9000
|
trusted library allocation
|
page read and write
|
||
1FD069AE000
|
trusted library allocation
|
page read and write
|
||
1FD06661000
|
trusted library allocation
|
page read and write
|
||
1FD05BED000
|
trusted library allocation
|
page read and write
|
||
1FD0EFFB000
|
trusted library allocation
|
page read and write
|
||
1FD0F5BB000
|
trusted library allocation
|
page read and write
|
||
1FD06CBD000
|
trusted library allocation
|
page read and write
|
||
1FD02BE1000
|
trusted library allocation
|
page read and write
|
||
1FD7FE6E000
|
trusted library allocation
|
page read and write
|
||
1FD116E7000
|
trusted library allocation
|
page read and write
|
||
1FD7C46D000
|
heap
|
page read and write
|
||
1FD0DC68000
|
trusted library allocation
|
page read and write
|
||
1FD7FD46000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CD000
|
trusted library allocation
|
page read and write
|
||
1FD0EFFB000
|
trusted library allocation
|
page read and write
|
||
1FD04FFA000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCB000
|
trusted library allocation
|
page read and write
|
||
1FD08B80000
|
trusted library allocation
|
page read and write
|
||
1FD0685D000
|
trusted library allocation
|
page read and write
|
||
1FD07767000
|
trusted library allocation
|
page read and write
|
||
1FD0537F000
|
trusted library allocation
|
page read and write
|
||
1FD0F377000
|
trusted library allocation
|
page read and write
|
||
1FD7C484000
|
heap
|
page read and write
|
||
1FD0785D000
|
trusted library allocation
|
page read and write
|
||
1FD106F5000
|
trusted library allocation
|
page read and write
|
||
1FD7C496000
|
heap
|
page read and write
|
||
1FD08EFA000
|
trusted library allocation
|
page read and write
|
||
1FD07131000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CF000
|
trusted library allocation
|
page read and write
|
||
1FD0EFA3000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE0000
|
trusted library allocation
|
page read and write
|
||
1FD0ED80000
|
trusted library allocation
|
page read and write
|
||
1FD06CF6000
|
trusted library allocation
|
page read and write
|
||
1FD05DEF000
|
trusted library allocation
|
page read and write
|
||
2256910C000
|
trusted library allocation
|
page read and write
|
||
1FD0E0C9000
|
trusted library allocation
|
page read and write
|
||
1FD0543D000
|
trusted library allocation
|
page read and write
|
||
1FD08EE8000
|
trusted library allocation
|
page read and write
|
||
1FD7FEF6000
|
trusted library allocation
|
page read and write
|
||
1FD10661000
|
trusted library allocation
|
page read and write
|
||
1FD0538B000
|
trusted library allocation
|
page read and write
|
||
1FD08EE8000
|
trusted library allocation
|
page read and write
|
||
1FD06A82000
|
trusted library allocation
|
page read and write
|
||
1FD0F4CB000
|
trusted library allocation
|
page read and write
|
||
1FD068FB000
|
trusted library allocation
|
page read and write
|
||
1FD0933B000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
22568F70000
|
heap
|
page read and write
|
||
1ED6015C000
|
trusted library allocation
|
page read and write
|
||
1FD06CB0000
|
trusted library allocation
|
page read and write
|
||
1FD06AAE000
|
trusted library allocation
|
page read and write
|
||
1FD0F37B000
|
trusted library allocation
|
page read and write
|
||
1ED60EAA000
|
heap
|
page read and write
|
||
1FD0F45F000
|
trusted library allocation
|
page read and write
|
||
1FD069A4000
|
trusted library allocation
|
page read and write
|
||
1FD0711E000
|
trusted library allocation
|
page read and write
|
||
1ED60DA0000
|
heap
|
page read and write
|
||
1FD07727000
|
trusted library allocation
|
page read and write
|
||
1FD08B33000
|
trusted library allocation
|
page read and write
|
||
1FD06AFE000
|
trusted library allocation
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1FD06CAD000
|
trusted library allocation
|
page read and write
|
||
1FD0DAEF000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1FD09146000
|
heap
|
page read and write
|
||
1FD108B8000
|
trusted library allocation
|
page read and write
|
||
1FD08BEB000
|
trusted library allocation
|
page read and write
|
||
1FD054CF000
|
trusted library allocation
|
page read and write
|
||
1FD0F5E2000
|
trusted library allocation
|
page read and write
|
||
1FD05BAA000
|
trusted library allocation
|
page read and write
|
||
1FD0DF91000
|
trusted library allocation
|
page read and write
|
||
1FD0E1E1000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
1FD7FCE5000
|
trusted library allocation
|
page read and write
|
||
1FD053A0000
|
trusted library allocation
|
page read and write
|
||
1FD0F589000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CF000
|
trusted library allocation
|
page read and write
|
||
1FD0F5BD000
|
trusted library allocation
|
page read and write
|
||
1FD054D7000
|
trusted library allocation
|
page read and write
|
||
1FD07959000
|
trusted library allocation
|
page read and write
|
||
1FD0DB7E000
|
trusted library allocation
|
page read and write
|
||
1FD0F3D1000
|
trusted library allocation
|
page read and write
|
||
1FD0537F000
|
trusted library allocation
|
page read and write
|
||
1FD05BB9000
|
trusted library allocation
|
page read and write
|
||
1FD7FD55000
|
trusted library allocation
|
page read and write
|
||
1FD06C33000
|
trusted library allocation
|
page read and write
|
||
1FD0E1BA000
|
trusted library allocation
|
page read and write
|
||
1FD06964000
|
trusted library allocation
|
page read and write
|
||
1FD06954000
|
trusted library allocation
|
page read and write
|
||
1ED60DEA000
|
heap
|
page read and write
|
||
1FD06CF0000
|
trusted library allocation
|
page read and write
|
||
1FD068A1000
|
trusted library allocation
|
page read and write
|
||
1FD052B5000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD08ED4000
|
trusted library allocation
|
page read and write
|
||
1FD0F5BF000
|
trusted library allocation
|
page read and write
|
||
1FD05492000
|
trusted library allocation
|
page read and write
|
||
1FD108FD000
|
trusted library allocation
|
page read and write
|
||
1FD116FB000
|
trusted library allocation
|
page read and write
|
||
1FD08ED9000
|
trusted library allocation
|
page read and write
|
||
1ED60E98000
|
heap
|
page read and write
|
||
1FD7FEBE000
|
trusted library allocation
|
page read and write
|
||
1ED60E7B000
|
heap
|
page read and write
|
||
1FD10428000
|
trusted library allocation
|
page read and write
|
||
1FD08B17000
|
trusted library allocation
|
page read and write
|
||
1FD11100000
|
trusted library allocation
|
page read and write
|
||
1FD06CDA000
|
trusted library allocation
|
page read and write
|
||
1FD0526C000
|
trusted library allocation
|
page read and write
|
||
1FD068F6000
|
trusted library allocation
|
page read and write
|
||
1FD066E7000
|
trusted library allocation
|
page read and write
|
||
1FD05BAE000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B7000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD0EFBC000
|
trusted library allocation
|
page read and write
|
||
1FD057D7000
|
trusted library allocation
|
page read and write
|
||
1FD0F591000
|
trusted library allocation
|
page read and write
|
||
1FD06CC5000
|
trusted library allocation
|
page read and write
|
||
1FD7FD38000
|
trusted library allocation
|
page read and write
|
||
A4A3BFF000
|
stack
|
page read and write
|
||
1FD0DAB5000
|
trusted library allocation
|
page read and write
|
||
1FD05B92000
|
trusted library allocation
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
23A8AB20000
|
heap
|
page read and write
|
||
1FD0DBB1000
|
trusted library allocation
|
page read and write
|
||
1FD0E3DB000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD06A4C000
|
trusted library allocation
|
page read and write
|
||
1FD0EFAE000
|
trusted library allocation
|
page read and write
|
||
1FD07E08000
|
trusted library allocation
|
page read and write
|
||
1FD0545A000
|
trusted library allocation
|
page read and write
|
||
1FD0798F000
|
trusted library allocation
|
page read and write
|
||
1FD07098000
|
trusted library allocation
|
page read and write
|
||
1ED60DBD000
|
heap
|
page read and write
|
||
1FD06A77000
|
trusted library allocation
|
page read and write
|
||
1FD0DDB1000
|
trusted library allocation
|
page read and write
|
||
1FD0669E000
|
trusted library allocation
|
page read and write
|
||
1FD0F5DB000
|
trusted library allocation
|
page read and write
|
||
1FD0F377000
|
trusted library allocation
|
page read and write
|
||
1FD06C92000
|
trusted library allocation
|
page read and write
|
||
1FD0E3D9000
|
trusted library allocation
|
page read and write
|
||
1FD0E3F5000
|
trusted library allocation
|
page read and write
|
||
1FD0E15B000
|
trusted library allocation
|
page read and write
|
||
1FD0549D000
|
trusted library allocation
|
page read and write
|
||
1FD7FD58000
|
trusted library allocation
|
page read and write
|
||
2E1DC11E000
|
trusted library allocation
|
page read and write
|
||
AC2000
|
unkown
|
page readonly
|
||
1FD066F5000
|
trusted library allocation
|
page read and write
|
||
1FD7C49F000
|
heap
|
page read and write
|
||
1FD1169B000
|
trusted library allocation
|
page read and write
|
||
1FD06A13000
|
trusted library allocation
|
page read and write
|
||
1ED60EB7000
|
heap
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
1ED6021F000
|
unclassified section
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD06C86000
|
trusted library allocation
|
page read and write
|
||
1FD05ADC000
|
trusted library allocation
|
page read and write
|
||
1FD071FC000
|
trusted library allocation
|
page read and write
|
||
1FD7FB64000
|
trusted library allocation
|
page read and write
|
||
1FD7C458000
|
heap
|
page read and write
|
||
1FD0E0CD000
|
trusted library allocation
|
page read and write
|
||
1FD0549D000
|
trusted library allocation
|
page read and write
|
||
1FD7FE19000
|
trusted library allocation
|
page read and write
|
||
1FD06C26000
|
trusted library allocation
|
page read and write
|
||
1FD0F433000
|
trusted library allocation
|
page read and write
|
||
1FD07185000
|
trusted library allocation
|
page read and write
|
||
482E6FE000
|
stack
|
page read and write
|
||
1FD7FEC7000
|
trusted library allocation
|
page read and write
|
||
1FD0F59D000
|
trusted library allocation
|
page read and write
|
||
1FD0E14D000
|
trusted library allocation
|
page read and write
|
||
1ED60E31000
|
heap
|
page read and write
|
||
1FD08E59000
|
trusted library allocation
|
page read and write
|
||
1FD0E1E6000
|
trusted library allocation
|
page read and write
|
||
1FD02BF6000
|
trusted library allocation
|
page read and write
|
||
1FD7E5CA000
|
trusted library allocation
|
page read and write
|
||
1FD066F5000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD0F5C5000
|
trusted library allocation
|
page read and write
|
||
1FD06C20000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD06986000
|
trusted library allocation
|
page read and write
|
||
1FD104A1000
|
trusted library allocation
|
page read and write
|
||
1FD068B0000
|
trusted library allocation
|
page read and write
|
||
1FD0DFD2000
|
trusted library allocation
|
page read and write
|
||
1FD7C499000
|
heap
|
page read and write
|
||
1FD7FDAB000
|
trusted library allocation
|
page read and write
|
||
1FD0F425000
|
trusted library allocation
|
page read and write
|
||
2512A400000
|
trusted library allocation
|
page read and write
|
||
1B391794000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
1FD0DC79000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD05473000
|
trusted library allocation
|
page read and write
|
||
1FD06C9F000
|
trusted library allocation
|
page read and write
|
||
1FD068EB000
|
trusted library allocation
|
page read and write
|
||
1FD0EFB4000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD0F373000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1ED60E20000
|
heap
|
page read and write
|
||
1FD0665A000
|
trusted library allocation
|
page read and write
|
||
1FD05B9F000
|
trusted library allocation
|
page read and write
|
||
1FD08BFB000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD0E3E6000
|
trusted library allocation
|
page read and write
|
||
1FD1043A000
|
trusted library allocation
|
page read and write
|
||
1FD0E14D000
|
trusted library allocation
|
page read and write
|
||
1FD0E1E0000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD06C47000
|
trusted library allocation
|
page read and write
|
||
1FD0E1E0000
|
trusted library allocation
|
page read and write
|
||
1FD07943000
|
trusted library allocation
|
page read and write
|
||
1B391763000
|
trusted library allocation
|
page read and write
|
||
1FD05B3A000
|
trusted library allocation
|
page read and write
|
||
1FD06C92000
|
trusted library allocation
|
page read and write
|
||
1FD057D7000
|
trusted library allocation
|
page read and write
|
||
1FD7C48E000
|
heap
|
page read and write
|
||
1FD054C2000
|
trusted library allocation
|
page read and write
|
||
1FD068A6000
|
trusted library allocation
|
page read and write
|
||
1FD06AEB000
|
trusted library allocation
|
page read and write
|
||
1FD7FD11000
|
trusted library allocation
|
page read and write
|
||
1FD0F575000
|
trusted library allocation
|
page read and write
|
||
1FD0D9CD000
|
trusted library allocation
|
page read and write
|
||
1FD7C41E000
|
heap
|
page read and write
|
||
1FD0DDDB000
|
trusted library allocation
|
page read and write
|
||
1FD06C57000
|
trusted library allocation
|
page read and write
|
||
1FD0F5D3000
|
trusted library allocation
|
page read and write
|
||
1FD7FE9D000
|
trusted library allocation
|
page read and write
|
||
1FD0F3F5000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD054BD000
|
trusted library allocation
|
page read and write
|
||
1FD08ED9000
|
trusted library allocation
|
page read and write
|
||
1FD0F4E6000
|
trusted library allocation
|
page read and write
|
||
1FD06932000
|
trusted library allocation
|
page read and write
|
||
1FD05375000
|
trusted library allocation
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1FD0F29F000
|
trusted library allocation
|
page read and write
|
||
1FD06AEC000
|
trusted library allocation
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
1FD0DA16000
|
trusted library allocation
|
page read and write
|
||
A775BFE000
|
unkown
|
page readonly
|
||
1FD06A4F000
|
trusted library allocation
|
page read and write
|
||
2E1DC124000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
1FD7E5B3000
|
trusted library allocation
|
page read and write
|
||
1B3917B8000
|
trusted library allocation
|
page read and write
|
||
1FD066A3000
|
trusted library allocation
|
page read and write
|
||
1FD06C27000
|
trusted library allocation
|
page read and write
|
||
1FD11D4C000
|
trusted library allocation
|
page read and write
|
||
1FD0F360000
|
trusted library allocation
|
page read and write
|
||
1ED6017A000
|
trusted library allocation
|
page read and write
|
||
1FD08B31000
|
trusted library allocation
|
page read and write
|
||
1FD07AE7000
|
trusted library allocation
|
page read and write
|
||
1FD06ABA000
|
trusted library allocation
|
page read and write
|
||
1FD06A78000
|
trusted library allocation
|
page read and write
|
||
1ED60DA9000
|
heap
|
page read and write
|
||
2256918F000
|
trusted library allocation
|
page read and write
|
||
1FD0EF83000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD0D9DD000
|
trusted library allocation
|
page read and write
|
||
1FD7FDD5000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
482EEFE000
|
unkown
|
page readonly
|
||
1FD0543F000
|
trusted library allocation
|
page read and write
|
||
972703E000
|
stack
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD0523D000
|
trusted library allocation
|
page read and write
|
||
A778FBE000
|
stack
|
page read and write
|
||
1FD0E1E6000
|
trusted library allocation
|
page read and write
|
||
1FD057F7000
|
trusted library allocation
|
page read and write
|
||
1FD06C74000
|
trusted library allocation
|
page read and write
|
||
1FD05B95000
|
trusted library allocation
|
page read and write
|
||
1FD08EAD000
|
trusted library allocation
|
page read and write
|
||
23A89207000
|
trusted library allocation
|
page read and write
|
||
1FD0F5D3000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE6000
|
trusted library allocation
|
page read and write
|
||
1FD7FC91000
|
trusted library allocation
|
page read and write
|
||
1FD0E05F000
|
trusted library allocation
|
page read and write
|
||
1FD06C27000
|
trusted library allocation
|
page read and write
|
||
1FD0DF5E000
|
trusted library allocation
|
page read and write
|
||
1FD06AF6000
|
trusted library allocation
|
page read and write
|
||
1FD1088C000
|
trusted library allocation
|
page read and write
|
||
1FD079D1000
|
trusted library allocation
|
page read and write
|
||
22568E80000
|
heap
|
page read and write
|
||
1FD0D993000
|
trusted library allocation
|
page read and write
|
||
1FD0FBE0000
|
trusted library allocation
|
page read and write
|
||
1FD0DC63000
|
trusted library allocation
|
page read and write
|
||
1FD068AF000
|
trusted library allocation
|
page read and write
|
||
1FD06C26000
|
trusted library allocation
|
page read and write
|
||
1FD05BAE000
|
trusted library allocation
|
page read and write
|
||
1FD054B9000
|
trusted library allocation
|
page read and write
|
||
1FD7FD6B000
|
trusted library allocation
|
page read and write
|
||
1ED5FDB0000
|
unclassified section
|
page readonly
|
||
1FD0E0C7000
|
trusted library allocation
|
page read and write
|
||
1FD07EDC000
|
trusted library allocation
|
page read and write
|
||
1FD7C49F000
|
heap
|
page read and write
|
||
1FD108FB000
|
trusted library allocation
|
page read and write
|
||
1FD7FD2E000
|
trusted library allocation
|
page read and write
|
||
1FD7C477000
|
heap
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1B391800000
|
unclassified section
|
page readonly
|
||
1FD0F28F000
|
trusted library allocation
|
page read and write
|
||
1FD7FEAA000
|
trusted library allocation
|
page read and write
|
||
1FD08B7D000
|
trusted library allocation
|
page read and write
|
||
1FD05BAE000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD7E6E0000
|
trusted library allocation
|
page read and write
|
||
1FD08EF1000
|
trusted library allocation
|
page read and write
|
||
1FD10836000
|
trusted library allocation
|
page read and write
|
||
1FD116ED000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1FD091BA000
|
trusted library allocation
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
1ED60E2C000
|
heap
|
page read and write
|
||
1FD0EFFC000
|
trusted library allocation
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD074F8000
|
trusted library allocation
|
page read and write
|
||
1FD07180000
|
trusted library allocation
|
page read and write
|
||
1FD054AA000
|
trusted library allocation
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1ED60DA0000
|
heap
|
page read and write
|
||
1FD0F581000
|
trusted library allocation
|
page read and write
|
||
1FD7FDFA000
|
trusted library allocation
|
page read and write
|
||
1FD11D73000
|
trusted library allocation
|
page read and write
|
||
1FD06A72000
|
trusted library allocation
|
page read and write
|
||
1FD7FF25000
|
trusted library allocation
|
page read and write
|
||
1ED60E29000
|
heap
|
page read and write
|
||
1FD7FCCA000
|
trusted library allocation
|
page read and write
|
||
1FD054B8000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD066FE000
|
trusted library allocation
|
page read and write
|
||
1FD0F46C000
|
trusted library allocation
|
page read and write
|
||
1FD1048A000
|
trusted library allocation
|
page read and write
|
||
1FD7FDCE000
|
trusted library allocation
|
page read and write
|
||
1FD06C0B000
|
trusted library allocation
|
page read and write
|
||
1FD7FD6B000
|
trusted library allocation
|
page read and write
|
||
1FD053A0000
|
trusted library allocation
|
page read and write
|
||
1FD0667E000
|
trusted library allocation
|
page read and write
|
||
1FD05B94000
|
trusted library allocation
|
page read and write
|
||
1FD108AA000
|
trusted library allocation
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
1FD066F5000
|
trusted library allocation
|
page read and write
|
||
1FD068EB000
|
trusted library allocation
|
page read and write
|
||
1FD07E81000
|
trusted library allocation
|
page read and write
|
||
1FD0DD77000
|
trusted library allocation
|
page read and write
|
||
1FD7C420000
|
heap
|
page read and write
|
||
1FD066A5000
|
trusted library allocation
|
page read and write
|
||
1FD7FDA2000
|
trusted library allocation
|
page read and write
|
||
1FD05DE4000
|
trusted library allocation
|
page read and write
|
||
1FD0F589000
|
trusted library allocation
|
page read and write
|
||
1FD08B37000
|
trusted library allocation
|
page read and write
|
||
1FD7FE97000
|
trusted library allocation
|
page read and write
|
||
1FD1083D000
|
trusted library allocation
|
page read and write
|
||
23A89375000
|
heap
|
page read and write
|
||
1FD02D72000
|
heap
|
page read and write
|
||
1FD0F5B9000
|
trusted library allocation
|
page read and write
|
||
1ED60E2C000
|
heap
|
page read and write
|
||
1FD092E1000
|
trusted library allocation
|
page read and write
|
||
1FD06C9F000
|
trusted library allocation
|
page read and write
|
||
1FD068DB000
|
trusted library allocation
|
page read and write
|
||
1FD05B3F000
|
trusted library allocation
|
page read and write
|
||
1FD05B94000
|
trusted library allocation
|
page read and write
|
||
1FD7C41E000
|
heap
|
page read and write
|
||
1FD068D6000
|
trusted library allocation
|
page read and write
|
||
1FD0F352000
|
trusted library allocation
|
page read and write
|
||
1B391D40000
|
heap
|
page read and write
|
||
1FD068FB000
|
trusted library allocation
|
page read and write
|
||
1FD05280000
|
trusted library allocation
|
page read and write
|
||
1FD07E5F000
|
trusted library allocation
|
page read and write
|
||
1FD09181000
|
heap
|
page read and write
|
||
1FD06CF5000
|
trusted library allocation
|
page read and write
|
||
1FD0664B000
|
trusted library allocation
|
page read and write
|
||
1FD0E0E5000
|
trusted library allocation
|
page read and write
|
||
1FD06C99000
|
trusted library allocation
|
page read and write
|
||
1FD068B0000
|
trusted library allocation
|
page read and write
|
||
1FD11A04000
|
trusted library allocation
|
page read and write
|
||
1FD0DD51000
|
trusted library allocation
|
page read and write
|
||
1FD106EF000
|
trusted library allocation
|
page read and write
|
||
1FD0F46C000
|
trusted library allocation
|
page read and write
|
||
1FD05B92000
|
trusted library allocation
|
page read and write
|
||
1FD06863000
|
trusted library allocation
|
page read and write
|
||
1FD06AF8000
|
trusted library allocation
|
page read and write
|
||
1FD7FEAC000
|
trusted library allocation
|
page read and write
|
||
1FD7C41F000
|
heap
|
page read and write
|
||
1ED60DE1000
|
heap
|
page read and write
|
||
1FD7EFC6000
|
trusted library allocation
|
page read and write
|
||
1FD0E328000
|
trusted library allocation
|
page read and write
|
||
1FD02D96000
|
heap
|
page read and write
|
||
1FD06AB5000
|
trusted library allocation
|
page read and write
|
||
1FD0F331000
|
trusted library allocation
|
page read and write
|
||
1FD108FD000
|
trusted library allocation
|
page read and write
|
||
1FD0F4FC000
|
trusted library allocation
|
page read and write
|
||
1FD066DF000
|
trusted library allocation
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD06AD2000
|
trusted library allocation
|
page read and write
|
||
1FD07998000
|
trusted library allocation
|
page read and write
|
||
1FD7C495000
|
heap
|
page read and write
|
||
1ED60E28000
|
heap
|
page read and write
|
||
1FD7C42A000
|
heap
|
page read and write
|
||
1FD7ECE3000
|
trusted library allocation
|
page read and write
|
||
AC2000
|
unkown
|
page readonly
|
||
1FD0FB88000
|
trusted library allocation
|
page read and write
|
||
1B391463000
|
heap
|
page read and write
|
||
1FD05359000
|
trusted library allocation
|
page read and write
|
||
1FD02DA8000
|
heap
|
page read and write
|
||
1FD069D1000
|
trusted library allocation
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
1FD0F5CD000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD05757000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
1FD0E33A000
|
trusted library allocation
|
page read and write
|
||
1FD7C485000
|
heap
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD02DA6000
|
heap
|
page read and write
|
||
1FD0F4FC000
|
trusted library allocation
|
page read and write
|
||
1FD0DC33000
|
trusted library allocation
|
page read and write
|
||
1FD0F5ED000
|
trusted library allocation
|
page read and write
|
||
1FD05209000
|
trusted library allocation
|
page read and write
|
||
1ED60212000
|
unclassified section
|
page read and write
|
||
1FD7FE43000
|
trusted library allocation
|
page read and write
|
||
23A88F00000
|
heap
|
page read and write
|
||
1FD0FBE2000
|
trusted library allocation
|
page read and write
|
||
22569113000
|
trusted library allocation
|
page read and write
|
||
1FD08EB1000
|
trusted library allocation
|
page read and write
|
||
A777E78000
|
stack
|
page read and write
|
||
1ED60E2C000
|
heap
|
page read and write
|
||
1FD0705D000
|
trusted library allocation
|
page read and write
|
||
1FD108FB000
|
trusted library allocation
|
page read and write
|
||
1FD057C5000
|
trusted library allocation
|
page read and write
|
||
1FD7C41F000
|
heap
|
page read and write
|
||
1FD05AB7000
|
trusted library allocation
|
page read and write
|
||
1FD7FCCE000
|
trusted library allocation
|
page read and write
|
||
1FD05384000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD0E032000
|
trusted library allocation
|
page read and write
|
||
225691DB000
|
trusted library allocation
|
page read and write
|
||
1FD7C42A000
|
heap
|
page read and write
|
||
1FD066EF000
|
trusted library allocation
|
page read and write
|
||
1FD06A98000
|
trusted library allocation
|
page read and write
|
||
1FD06CBD000
|
trusted library allocation
|
page read and write
|
||
1FD7C491000
|
heap
|
page read and write
|
||
1FD7C496000
|
heap
|
page read and write
|
||
1FD054CD000
|
trusted library allocation
|
page read and write
|
||
1FD05A23000
|
trusted library allocation
|
page read and write
|
||
1FD10890000
|
trusted library allocation
|
page read and write
|
||
1FD05488000
|
trusted library allocation
|
page read and write
|
||
1FD08BEB000
|
trusted library allocation
|
page read and write
|
||
1FD08E14000
|
trusted library allocation
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD070D0000
|
trusted library allocation
|
page read and write
|
||
1FD0703C000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0EFF0000
|
trusted library allocation
|
page read and write
|
||
1B39190F000
|
trusted library allocation
|
page read and write
|
||
1FD07842000
|
trusted library allocation
|
page read and write
|
||
1FD069AE000
|
trusted library allocation
|
page read and write
|
||
1FD068B6000
|
trusted library allocation
|
page read and write
|
||
1FD0DF0C000
|
trusted library allocation
|
page read and write
|
||
1ED60D40000
|
heap
|
page read and write
|
||
1FD0F45B000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD0F5CD000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1ED60100000
|
trusted library allocation
|
page read and write
|
||
1FD10818000
|
trusted library allocation
|
page read and write
|
||
1FD0DCB5000
|
trusted library allocation
|
page read and write
|
||
1FD05AE1000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD7FE79000
|
trusted library allocation
|
page read and write
|
||
1FD0DF9D000
|
trusted library allocation
|
page read and write
|
||
1FD08BA3000
|
trusted library allocation
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD05298000
|
trusted library allocation
|
page read and write
|
||
1FD0F361000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CD000
|
trusted library allocation
|
page read and write
|
||
1FD1169B000
|
trusted library allocation
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD7FE10000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD7FDC7000
|
trusted library allocation
|
page read and write
|
||
1FD0547F000
|
trusted library allocation
|
page read and write
|
||
1FD054AF000
|
trusted library allocation
|
page read and write
|
||
1FD06C2F000
|
trusted library allocation
|
page read and write
|
||
1FD7FDB2000
|
trusted library allocation
|
page read and write
|
||
2512A3C0000
|
heap
|
page read and write
|
||
1FD06C2B000
|
trusted library allocation
|
page read and write
|
||
1FD07968000
|
trusted library allocation
|
page read and write
|
||
1FD08BF3000
|
trusted library allocation
|
page read and write
|
||
1FD0916C000
|
heap
|
page read and write
|
||
1FD0E18C000
|
trusted library allocation
|
page read and write
|
||
1FD0F58F000
|
trusted library allocation
|
page read and write
|
||
1FD7FDAB000
|
trusted library allocation
|
page read and write
|
||
1FD066EF000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD8000
|
trusted library allocation
|
page read and write
|
||
23A88F52000
|
heap
|
page read and write
|
||
1ED60E84000
|
heap
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD08B9B000
|
trusted library allocation
|
page read and write
|
||
1FD0DAEF000
|
trusted library allocation
|
page read and write
|
||
1FD7FE9D000
|
trusted library allocation
|
page read and write
|
||
1FD07E5B000
|
trusted library allocation
|
page read and write
|
||
1FD068CC000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCB000
|
trusted library allocation
|
page read and write
|
||
1FD7FE2C000
|
trusted library allocation
|
page read and write
|
||
1FD02BF6000
|
trusted library allocation
|
page read and write
|
||
1FD054A6000
|
trusted library allocation
|
page read and write
|
||
1FD071C3000
|
trusted library allocation
|
page read and write
|
||
1FD0F348000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1FD1088C000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD08EE1000
|
trusted library allocation
|
page read and write
|
||
1FD10479000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD0711E000
|
trusted library allocation
|
page read and write
|
||
1FD07182000
|
trusted library allocation
|
page read and write
|
||
1FD05A83000
|
trusted library allocation
|
page read and write
|
||
1FD071B6000
|
trusted library allocation
|
page read and write
|
||
1FD0EFB4000
|
trusted library allocation
|
page read and write
|
||
1FD0DADF000
|
trusted library allocation
|
page read and write
|
||
1FD7C41F000
|
heap
|
page read and write
|
||
1B391781000
|
trusted library allocation
|
page read and write
|
||
1FD06ADA000
|
trusted library allocation
|
page read and write
|
||
1FD06BA3000
|
trusted library allocation
|
page read and write
|
||
1FD7EF54000
|
trusted library allocation
|
page read and write
|
||
1FD07D56000
|
trusted library allocation
|
page read and write
|
||
22568E60000
|
heap
|
page readonly
|
||
1FD053D6000
|
trusted library allocation
|
page read and write
|
||
1FD0DDCE000
|
trusted library allocation
|
page read and write
|
||
1ED602A0000
|
unkown
|
page execute read
|
||
1FD09266000
|
trusted library allocation
|
page read and write
|
||
1FD0DD20000
|
trusted library allocation
|
page read and write
|
||
1FD0538B000
|
trusted library allocation
|
page read and write
|
||
1FD7FD55000
|
trusted library allocation
|
page read and write
|
||
1FD052F5000
|
trusted library allocation
|
page read and write
|
||
1FD7FC5D000
|
trusted library allocation
|
page read and write
|
||
1FD05F54000
|
trusted library allocation
|
page read and write
|
||
1FD054C2000
|
trusted library allocation
|
page read and write
|
||
1FD068BC000
|
trusted library allocation
|
page read and write
|
||
1FD068BC000
|
trusted library allocation
|
page read and write
|
||
1FD7C495000
|
heap
|
page read and write
|
||
1FD06CDA000
|
trusted library allocation
|
page read and write
|
||
1FD0683B000
|
trusted library allocation
|
page read and write
|
||
1FD0E192000
|
trusted library allocation
|
page read and write
|
||
1FD7FC6A000
|
trusted library allocation
|
page read and write
|
||
1ED60210000
|
unclassified section
|
page read and write
|
||
1FD0693E000
|
trusted library allocation
|
page read and write
|
||
1FD0F393000
|
trusted library allocation
|
page read and write
|
||
1FD08B83000
|
trusted library allocation
|
page read and write
|
||
1FD05B36000
|
trusted library allocation
|
page read and write
|
||
1FD10900000
|
trusted library allocation
|
page read and write
|
||
1FD02DA0000
|
heap
|
page read and write
|
||
1FD0E3C5000
|
trusted library allocation
|
page read and write
|
||
A4A43FF000
|
stack
|
page read and write
|
||
1FD7C454000
|
heap
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD06A13000
|
trusted library allocation
|
page read and write
|
||
1FD7FB53000
|
trusted library allocation
|
page read and write
|
||
1FD0DC49000
|
trusted library allocation
|
page read and write
|
||
1FD7EF85000
|
trusted library allocation
|
page read and write
|
||
1FD0F24F000
|
trusted library allocation
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD05AE3000
|
trusted library allocation
|
page read and write
|
||
1FD08B93000
|
trusted library allocation
|
page read and write
|
||
1FD06A82000
|
trusted library allocation
|
page read and write
|
||
1FD0DABC000
|
trusted library allocation
|
page read and write
|
||
1FD7FEDD000
|
trusted library allocation
|
page read and write
|
||
1FD0F279000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD07076000
|
trusted library allocation
|
page read and write
|
||
1FD08BA6000
|
trusted library allocation
|
page read and write
|
||
1FD069EC000
|
trusted library allocation
|
page read and write
|
||
1FD1081E000
|
trusted library allocation
|
page read and write
|
||
1FD08E0F000
|
trusted library allocation
|
page read and write
|
||
1FD07DC1000
|
trusted library allocation
|
page read and write
|
||
1FD0DD6F000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
1FD053D6000
|
trusted library allocation
|
page read and write
|
||
1FD08E78000
|
trusted library allocation
|
page read and write
|
||
1FD0522C000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD1168D000
|
trusted library allocation
|
page read and write
|
||
1FD068F9000
|
trusted library allocation
|
page read and write
|
||
1FD0F36D000
|
trusted library allocation
|
page read and write
|
||
1FD07491000
|
trusted library allocation
|
page read and write
|
||
1FD06A4F000
|
trusted library allocation
|
page read and write
|
||
1FD0E311000
|
trusted library allocation
|
page read and write
|
||
1FD068C5000
|
trusted library allocation
|
page read and write
|
||
1FD06CF6000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD0579D000
|
trusted library allocation
|
page read and write
|
||
1FD0F5E2000
|
trusted library allocation
|
page read and write
|
||
1FD0E0EE000
|
trusted library allocation
|
page read and write
|
||
1FD06C57000
|
trusted library allocation
|
page read and write
|
||
1FD0F3A0000
|
trusted library allocation
|
page read and write
|
||
1FD07E3E000
|
trusted library allocation
|
page read and write
|
||
1FD0DA95000
|
trusted library allocation
|
page read and write
|
||
23A88F63000
|
heap
|
page read and write
|
||
1FD0F5BC000
|
trusted library allocation
|
page read and write
|
||
1FD06823000
|
trusted library allocation
|
page read and write
|
||
1FD08E28000
|
trusted library allocation
|
page read and write
|
||
22568EE6000
|
heap
|
page read and write
|
||
1FD08EAB000
|
trusted library allocation
|
page read and write
|
||
1FD0F5BF000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C7000
|
trusted library allocation
|
page read and write
|
||
1FD0F4DD000
|
trusted library allocation
|
page read and write
|
||
1FD06C0F000
|
trusted library allocation
|
page read and write
|
||
1FD0546B000
|
trusted library allocation
|
page read and write
|
||
1FD7FE6C000
|
trusted library allocation
|
page read and write
|
||
1FD0EFA3000
|
trusted library allocation
|
page read and write
|
||
1FD054BD000
|
trusted library allocation
|
page read and write
|
||
2512A2F0000
|
heap
|
page read and write
|
||
1FD7C436000
|
heap
|
page read and write
|
||
1FD0DBB8000
|
trusted library allocation
|
page read and write
|
||
1FD06CC5000
|
trusted library allocation
|
page read and write
|
||
1FD05263000
|
trusted library allocation
|
page read and write
|
||
1ED602A8000
|
unkown
|
page execute read
|
||
1FD0F3F5000
|
trusted library allocation
|
page read and write
|
||
1FD7FE63000
|
trusted library allocation
|
page read and write
|
||
A4A53FF000
|
stack
|
page read and write
|
||
1FD7FB3A000
|
trusted library allocation
|
page read and write
|
||
1FD05A9F000
|
trusted library allocation
|
page read and write
|
||
1B39176A000
|
trusted library allocation
|
page read and write
|
||
1FD06685000
|
trusted library allocation
|
page read and write
|
||
1FD06AEB000
|
trusted library allocation
|
page read and write
|
||
1FD06AB9000
|
trusted library allocation
|
page read and write
|
||
1FD053A7000
|
trusted library allocation
|
page read and write
|
||
1FD05DE4000
|
trusted library allocation
|
page read and write
|
||
1FD09304000
|
trusted library allocation
|
page read and write
|
||
1B391939000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0D98F000
|
trusted library allocation
|
page read and write
|
||
1FD05496000
|
trusted library allocation
|
page read and write
|
||
1FD0D929000
|
trusted library allocation
|
page read and write
|
||
1FD7FD46000
|
trusted library allocation
|
page read and write
|
||
1FD116D5000
|
trusted library allocation
|
page read and write
|
||
F7B000
|
heap
|
page read and write
|
||
1FD0F4F1000
|
trusted library allocation
|
page read and write
|
||
1FD0DABC000
|
trusted library allocation
|
page read and write
|
||
1FD7FC7E000
|
trusted library allocation
|
page read and write
|
||
1FD057AE000
|
trusted library allocation
|
page read and write
|
||
1FD0F38F000
|
trusted library allocation
|
page read and write
|
||
1FD06088000
|
trusted library allocation
|
page read and write
|
||
1FD06C47000
|
trusted library allocation
|
page read and write
|
||
1FD116E7000
|
trusted library allocation
|
page read and write
|
||
1FD08BFB000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD07BFC000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD08CD0000
|
trusted library allocation
|
page read and write
|
||
1FD0FBE4000
|
trusted library allocation
|
page read and write
|
||
1FD0914E000
|
heap
|
page read and write
|
||
1FD07D20000
|
trusted library allocation
|
page read and write
|
||
1FD0785D000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1FD0666F000
|
trusted library allocation
|
page read and write
|
||
1FD7FD60000
|
trusted library allocation
|
page read and write
|
||
1B39177D000
|
trusted library allocation
|
page read and write
|
||
1FD7FEC1000
|
trusted library allocation
|
page read and write
|
||
1FD0F57B000
|
trusted library allocation
|
page read and write
|
||
1ED602B0000
|
heap
|
page read and write
|
||
1FD0DD5E000
|
trusted library allocation
|
page read and write
|
||
1FD06A95000
|
trusted library allocation
|
page read and write
|
||
1FD07EBD000
|
trusted library allocation
|
page read and write
|
||
1FD06075000
|
trusted library allocation
|
page read and write
|
||
1FD06C26000
|
trusted library allocation
|
page read and write
|
||
1FD06696000
|
trusted library allocation
|
page read and write
|
||
1FD0DDDF000
|
trusted library allocation
|
page read and write
|
||
1FD116FB000
|
trusted library allocation
|
page read and write
|
||
1FD0F3A7000
|
trusted library allocation
|
page read and write
|
||
1FD0E192000
|
trusted library allocation
|
page read and write
|
||
1FD07136000
|
trusted library allocation
|
page read and write
|
||
1FD0EFAE000
|
trusted library allocation
|
page read and write
|
||
1ED60260000
|
trusted library allocation
|
page read and write
|
||
1FD05286000
|
trusted library allocation
|
page read and write
|
||
1FD05BE6000
|
trusted library allocation
|
page read and write
|
||
1FD07ADB000
|
trusted library allocation
|
page read and write
|
||
1FD7EFBF000
|
trusted library allocation
|
page read and write
|
||
72355FC000
|
stack
|
page read and write
|
||
1FD7E6F1000
|
trusted library allocation
|
page read and write
|
||
1FD10492000
|
trusted library allocation
|
page read and write
|
||
1FD06CD3000
|
trusted library allocation
|
page read and write
|
||
1FD0668E000
|
trusted library allocation
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD05B5D000
|
trusted library allocation
|
page read and write
|
||
1ED601C1000
|
trusted library allocation
|
page read and write
|
||
1FD0F360000
|
trusted library allocation
|
page read and write
|
||
1FD05BF6000
|
trusted library allocation
|
page read and write
|
||
1FD06AFE000
|
trusted library allocation
|
page read and write
|
||
1FD05BFA000
|
trusted library allocation
|
page read and write
|
||
972347B000
|
stack
|
page read and write
|
||
1FD069AA000
|
trusted library allocation
|
page read and write
|
||
1FD06CB0000
|
trusted library allocation
|
page read and write
|
||
1FD10F00000
|
trusted library allocation
|
page read and write
|
||
2256910E000
|
trusted library allocation
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
1FD07EC2000
|
trusted library allocation
|
page read and write
|
||
1FD0719A000
|
trusted library allocation
|
page read and write
|
||
1FD06A5F000
|
trusted library allocation
|
page read and write
|
||
1FD06C79000
|
trusted library allocation
|
page read and write
|
||
1FD0F48F000
|
trusted library allocation
|
page read and write
|
||
1FD7FDC7000
|
trusted library allocation
|
page read and write
|
||
1FD07DF5000
|
trusted library allocation
|
page read and write
|
||
1FD0E142000
|
trusted library allocation
|
page read and write
|
||
1FD1089B000
|
trusted library allocation
|
page read and write
|
||
1FD06A8B000
|
trusted library allocation
|
page read and write
|
||
1FD06AD6000
|
trusted library allocation
|
page read and write
|
||
1FD0661A000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD7FDDD000
|
trusted library allocation
|
page read and write
|
||
1FD0D97D000
|
trusted library allocation
|
page read and write
|
||
1ED60E2C000
|
heap
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD0F3A7000
|
trusted library allocation
|
page read and write
|
||
1FD071FC000
|
trusted library allocation
|
page read and write
|
||
1FD06CD3000
|
trusted library allocation
|
page read and write
|
||
1FD7FDFD000
|
trusted library allocation
|
page read and write
|
||
A778EFE000
|
unkown
|
page readonly
|
||
1FD0E18C000
|
trusted library allocation
|
page read and write
|
||
1FD06962000
|
trusted library allocation
|
page read and write
|
||
1FD0E3F1000
|
trusted library allocation
|
page read and write
|
||
1FD7FCDC000
|
trusted library allocation
|
page read and write
|
||
1FD07AF2000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD06A80000
|
trusted library allocation
|
page read and write
|
||
1FD0D9CD000
|
trusted library allocation
|
page read and write
|
||
1FD07D43000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD0F3D1000
|
trusted library allocation
|
page read and write
|
||
A01000
|
unkown
|
page execute read
|
||
1ED60830000
|
trusted library allocation
|
page read and write
|
||
1FD11DF5000
|
trusted library allocation
|
page read and write
|
||
1FD7C46D000
|
heap
|
page read and write
|
||
1FD0F3B4000
|
trusted library allocation
|
page read and write
|
||
1FD06913000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD0DF9D000
|
trusted library allocation
|
page read and write
|
||
1FD0718C000
|
trusted library allocation
|
page read and write
|
||
1FD02D96000
|
heap
|
page read and write
|
||
1FD7C414000
|
heap
|
page read and write
|
||
1FD7E6F1000
|
trusted library allocation
|
page read and write
|
||
1FD0E0B8000
|
trusted library allocation
|
page read and write
|
||
1FD08EA9000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCF000
|
trusted library allocation
|
page read and write
|
||
1FD054FE000
|
trusted library allocation
|
page read and write
|
||
1FD07179000
|
trusted library allocation
|
page read and write
|
||
1FD054FE000
|
trusted library allocation
|
page read and write
|
||
1FD0D9CD000
|
trusted library allocation
|
page read and write
|
||
1FD057C5000
|
trusted library allocation
|
page read and write
|
||
1FD07DCF000
|
trusted library allocation
|
page read and write
|
||
1FD07EA0000
|
trusted library allocation
|
page read and write
|
||
1FD0EFA7000
|
trusted library allocation
|
page read and write
|
||
1ED60909000
|
trusted library allocation
|
page read and write
|
||
1FD02B61000
|
trusted library allocation
|
page read and write
|
||
A777E7B000
|
stack
|
page read and write
|
||
1FD066CB000
|
trusted library allocation
|
page read and write
|
||
1FD11DF9000
|
trusted library allocation
|
page read and write
|
||
F7C000
|
heap
|
page read and write
|
||
1FD0525F000
|
trusted library allocation
|
page read and write
|
||
ACC000
|
unkown
|
page read and write
|
||
1FD0719A000
|
trusted library allocation
|
page read and write
|
||
1FD08EF7000
|
trusted library allocation
|
page read and write
|
||
1FD0E0E2000
|
trusted library allocation
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1FD0F3DD000
|
trusted library allocation
|
page read and write
|
||
1FD0DDFE000
|
trusted library allocation
|
page read and write
|
||
1FD0DB29000
|
trusted library allocation
|
page read and write
|
||
1FD08B96000
|
trusted library allocation
|
page read and write
|
||
1B391360000
|
unclassified section
|
page readonly
|
||
1FD7FD49000
|
trusted library allocation
|
page read and write
|
||
1FD07E56000
|
trusted library allocation
|
page read and write
|
||
1FD7FE41000
|
trusted library allocation
|
page read and write
|
||
1FD0527E000
|
trusted library allocation
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD06AF8000
|
trusted library allocation
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD0686B000
|
trusted library allocation
|
page read and write
|
||
1FD10809000
|
trusted library allocation
|
page read and write
|
||
1FD7ED00000
|
trusted library allocation
|
page read and write
|
||
1ED5FE30000
|
unclassified section
|
page readonly
|
||
1FD7E58B000
|
trusted library allocation
|
page read and write
|
||
1FD0DD1B000
|
trusted library allocation
|
page read and write
|
||
1ED601C7000
|
trusted library allocation
|
page read and write
|
||
1FD7FB68000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
unkown
|
page write copy
|
||
1FD06C8D000
|
trusted library allocation
|
page read and write
|
||
1FD0F5AA000
|
trusted library allocation
|
page read and write
|
||
1ED5FE50000
|
heap
|
page read and write
|
||
1FD7C458000
|
heap
|
page read and write
|
||
1FD0538D000
|
trusted library allocation
|
page read and write
|
||
1FD0F435000
|
trusted library allocation
|
page read and write
|
||
1FD04F51000
|
trusted library allocation
|
page read and write
|
||
1FD05B82000
|
trusted library allocation
|
page read and write
|
||
1FD0F587000
|
trusted library allocation
|
page read and write
|
||
1FD7FE93000
|
trusted library allocation
|
page read and write
|
||
1FD08E77000
|
trusted library allocation
|
page read and write
|
||
1FD0F5D3000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD5000
|
trusted library allocation
|
page read and write
|
||
1FD09181000
|
heap
|
page read and write
|
||
1FD7E656000
|
trusted library allocation
|
page read and write
|
||
1FD06CC5000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD08EB7000
|
trusted library allocation
|
page read and write
|
||
1FD7FB53000
|
trusted library allocation
|
page read and write
|
||
1FD091C8000
|
heap
|
page read and write
|
||
1FD0E195000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B7000
|
trusted library allocation
|
page read and write
|
||
1FD08EA9000
|
trusted library allocation
|
page read and write
|
||
1FD054BD000
|
trusted library allocation
|
page read and write
|
||
23A88F30000
|
heap
|
page read and write
|
||
1FD0547B000
|
trusted library allocation
|
page read and write
|
||
1FD0DDB4000
|
trusted library allocation
|
page read and write
|
||
1FD07DEB000
|
trusted library allocation
|
page read and write
|
||
1B3915D0000
|
unclassified section
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD06A80000
|
trusted library allocation
|
page read and write
|
||
1FD7FD51000
|
trusted library allocation
|
page read and write
|
||
1FD0DB80000
|
trusted library allocation
|
page read and write
|
||
1FD057EE000
|
trusted library allocation
|
page read and write
|
||
1FD7C458000
|
heap
|
page read and write
|
||
1FD116CA000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CB000
|
trusted library allocation
|
page read and write
|
||
1ED60DA9000
|
heap
|
page read and write
|
||
1FD08EE1000
|
trusted library allocation
|
page read and write
|
||
1FD7FB31000
|
trusted library allocation
|
page read and write
|
||
1FD0DC47000
|
trusted library allocation
|
page read and write
|
||
1FD0F3F5000
|
trusted library allocation
|
page read and write
|
||
1FD09327000
|
trusted library allocation
|
page read and write
|
||
1FD068B6000
|
trusted library allocation
|
page read and write
|
||
1FD106F9000
|
trusted library allocation
|
page read and write
|
||
1FD7C4A9000
|
heap
|
page read and write
|
||
1FD0E320000
|
trusted library allocation
|
page read and write
|
||
1FD7FB62000
|
trusted library allocation
|
page read and write
|
||
1FD7FEF6000
|
trusted library allocation
|
page read and write
|
||
1FD106F9000
|
trusted library allocation
|
page read and write
|
||
1FD0F450000
|
trusted library allocation
|
page read and write
|
||
1FD091C1000
|
trusted library allocation
|
page read and write
|
||
1FD053A0000
|
trusted library allocation
|
page read and write
|
||
1FD7FB50000
|
trusted library allocation
|
page read and write
|
||
1FD0DF6A000
|
trusted library allocation
|
page read and write
|
||
1FD08B13000
|
trusted library allocation
|
page read and write
|
||
F69000
|
heap
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD07054000
|
trusted library allocation
|
page read and write
|
||
1FD0574C000
|
trusted library allocation
|
page read and write
|
||
1FD7EB76000
|
trusted library allocation
|
page read and write
|
||
1FD05B64000
|
trusted library allocation
|
page read and write
|
||
1FD06CBD000
|
trusted library allocation
|
page read and write
|
||
1FD0DFAD000
|
trusted library allocation
|
page read and write
|
||
1FD06926000
|
trusted library allocation
|
page read and write
|
||
1FD7C498000
|
heap
|
page read and write
|
||
1FD7E656000
|
trusted library allocation
|
page read and write
|
||
1FD7C485000
|
heap
|
page read and write
|
||
1FD0E19F000
|
trusted library allocation
|
page read and write
|
||
1FD116CA000
|
trusted library allocation
|
page read and write
|
||
1FD0DBD3000
|
trusted library allocation
|
page read and write
|
||
A7786FE000
|
stack
|
page read and write
|
||
1FD0F562000
|
trusted library allocation
|
page read and write
|
||
1FD7FDFA000
|
trusted library allocation
|
page read and write
|
||
1FD0DD3B000
|
trusted library allocation
|
page read and write
|
||
1FD0DC7E000
|
trusted library allocation
|
page read and write
|
||
1FD0D9E1000
|
trusted library allocation
|
page read and write
|
||
1FD0D9A5000
|
trusted library allocation
|
page read and write
|
||
ECB000
|
stack
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0DC63000
|
trusted library allocation
|
page read and write
|
||
1FD07035000
|
trusted library allocation
|
page read and write
|
||
1FD0529E000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD0F33C000
|
trusted library allocation
|
page read and write
|
||
7235DFE000
|
stack
|
page read and write
|
||
1ED60E21000
|
heap
|
page read and write
|
||
23A8AB2C000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD06CB5000
|
trusted library allocation
|
page read and write
|
||
1FD071B8000
|
trusted library allocation
|
page read and write
|
||
1FD0DD1D000
|
trusted library allocation
|
page read and write
|
||
1FD02D96000
|
heap
|
page read and write
|
||
A777EFE000
|
unkown
|
page readonly
|
||
1FD05760000
|
trusted library allocation
|
page read and write
|
||
1FD069AA000
|
trusted library allocation
|
page read and write
|
||
F6F000
|
heap
|
page read and write
|
||
1FD0DF8D000
|
trusted library allocation
|
page read and write
|
||
1FD0E1FE000
|
trusted library allocation
|
page read and write
|
||
1FD7E59E000
|
trusted library allocation
|
page read and write
|
||
1ED60EB9000
|
heap
|
page read and write
|
||
1FD0F4E3000
|
trusted library allocation
|
page read and write
|
||
1FD05BAE000
|
trusted library allocation
|
page read and write
|
||
1FD02D96000
|
heap
|
page read and write
|
||
1FD068D0000
|
trusted library allocation
|
page read and write
|
||
1FD066FE000
|
trusted library allocation
|
page read and write
|
||
1FD7FDA2000
|
trusted library allocation
|
page read and write
|
||
1FD06AB9000
|
trusted library allocation
|
page read and write
|
||
1FD0E3E9000
|
trusted library allocation
|
page read and write
|
||
1FD0E1BE000
|
trusted library allocation
|
page read and write
|
||
1FD7FCAE000
|
trusted library allocation
|
page read and write
|
||
1FD06C17000
|
trusted library allocation
|
page read and write
|
||
1FD066FE000
|
trusted library allocation
|
page read and write
|
||
1FD06AC3000
|
trusted library allocation
|
page read and write
|
||
1FD7C496000
|
heap
|
page read and write
|
||
1FD7FB67000
|
trusted library allocation
|
page read and write
|
||
1FD05213000
|
trusted library allocation
|
page read and write
|
||
1FD7FEA6000
|
trusted library allocation
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD02DA0000
|
heap
|
page read and write
|
||
1FD116B9000
|
trusted library allocation
|
page read and write
|
||
1FD0F377000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1FD0693E000
|
trusted library allocation
|
page read and write
|
||
1FD06A9D000
|
trusted library allocation
|
page read and write
|
||
1FD02B21000
|
trusted library allocation
|
page read and write
|
||
1FD7E668000
|
trusted library allocation
|
page read and write
|
||
1FD07981000
|
trusted library allocation
|
page read and write
|
||
1FD0DDD2000
|
trusted library allocation
|
page read and write
|
||
1FD0DC49000
|
trusted library allocation
|
page read and write
|
||
1FD06AB1000
|
trusted library allocation
|
page read and write
|
||
1FD08E42000
|
trusted library allocation
|
page read and write
|
||
1FD0F3B4000
|
trusted library allocation
|
page read and write
|
||
1FD0EFA9000
|
trusted library allocation
|
page read and write
|
||
1FD0527A000
|
trusted library allocation
|
page read and write
|
||
1FD116E5000
|
trusted library allocation
|
page read and write
|
||
1FD0F37B000
|
trusted library allocation
|
page read and write
|
||
1FD0E065000
|
trusted library allocation
|
page read and write
|
||
1FD08EFA000
|
trusted library allocation
|
page read and write
|
||
1FD06C86000
|
trusted library allocation
|
page read and write
|
||
1FD06A9D000
|
trusted library allocation
|
page read and write
|
||
1FD11D42000
|
trusted library allocation
|
page read and write
|
||
1FD092CA000
|
trusted library allocation
|
page read and write
|
||
22568EA0000
|
unclassified section
|
page readonly
|
||
1FD07ABD000
|
trusted library allocation
|
page read and write
|
||
1FD7C4A9000
|
heap
|
page read and write
|
||
1FD0F23A000
|
trusted library allocation
|
page read and write
|
||
1FD7FCE5000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD7C455000
|
heap
|
page read and write
|
||
1FD0D9A5000
|
trusted library allocation
|
page read and write
|
||
1FD09145000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
1FD0DC3B000
|
trusted library allocation
|
page read and write
|
||
1FD104C0000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B5000
|
trusted library allocation
|
page read and write
|
||
1ED5FF4A000
|
heap
|
page read and write
|
||
1FD0DFE9000
|
trusted library allocation
|
page read and write
|
||
1FD05BEA000
|
trusted library allocation
|
page read and write
|
||
1FD0F59D000
|
trusted library allocation
|
page read and write
|
||
1FD10814000
|
trusted library allocation
|
page read and write
|
||
1FD06AFC000
|
trusted library allocation
|
page read and write
|
||
1FD06964000
|
trusted library allocation
|
page read and write
|
||
1FD0F4A3000
|
trusted library allocation
|
page read and write
|
||
1FD02D96000
|
heap
|
page read and write
|
||
1FD7FDED000
|
trusted library allocation
|
page read and write
|
||
1FD066A0000
|
trusted library allocation
|
page read and write
|
||
1FD0F37F000
|
trusted library allocation
|
page read and write
|
||
1FD0F5BB000
|
trusted library allocation
|
page read and write
|
||
1FD07ADB000
|
trusted library allocation
|
page read and write
|
||
1FD0F571000
|
trusted library allocation
|
page read and write
|
||
1FD7C458000
|
heap
|
page read and write
|
||
1FD05AF8000
|
trusted library allocation
|
page read and write
|
||
1FD0DAB2000
|
trusted library allocation
|
page read and write
|
||
72355FF000
|
stack
|
page read and write
|
||
1FD0F581000
|
trusted library allocation
|
page read and write
|
||
1ED60E60000
|
heap
|
page read and write
|
||
1FD069E4000
|
trusted library allocation
|
page read and write
|
||
1FD7C413000
|
heap
|
page read and write
|
||
1FD7FC6F000
|
trusted library allocation
|
page read and write
|
||
1FD0578F000
|
trusted library allocation
|
page read and write
|
||
1FD06CD3000
|
trusted library allocation
|
page read and write
|
||
1FD0D985000
|
trusted library allocation
|
page read and write
|
||
1FD7FC71000
|
trusted library allocation
|
page read and write
|
||
1FD05378000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD05AD3000
|
trusted library allocation
|
page read and write
|
||
1FD10492000
|
trusted library allocation
|
page read and write
|
||
1FD06524000
|
trusted library allocation
|
page read and write
|
||
1FD0F4F2000
|
trusted library allocation
|
page read and write
|
||
1FD0E3DB000
|
trusted library allocation
|
page read and write
|
||
F99000
|
heap
|
page read and write
|
||
1FD0F332000
|
trusted library allocation
|
page read and write
|
||
1FD7E66D000
|
trusted library allocation
|
page read and write
|
||
1B391779000
|
trusted library allocation
|
page read and write
|
||
22569111000
|
trusted library allocation
|
page read and write
|
||
1FD0794A000
|
trusted library allocation
|
page read and write
|
||
1FD11D42000
|
trusted library allocation
|
page read and write
|
||
1FD06C57000
|
trusted library allocation
|
page read and write
|
||
1FD7FEBE000
|
trusted library allocation
|
page read and write
|
||
1FD0E067000
|
trusted library allocation
|
page read and write
|
||
1ED60DA0000
|
heap
|
page read and write
|
||
1FD08EAD000
|
trusted library allocation
|
page read and write
|
||
22569149000
|
trusted library allocation
|
page read and write
|
||
1FD07ADB000
|
trusted library allocation
|
page read and write
|
||
1FD0774A000
|
trusted library allocation
|
page read and write
|
||
1ED60000000
|
trusted library allocation
|
page read and write
|
||
1FD7E6E0000
|
trusted library allocation
|
page read and write
|
||
1FD0F444000
|
trusted library allocation
|
page read and write
|
||
34D4000
|
heap
|
page read and write
|
||
1FD06AFA000
|
trusted library allocation
|
page read and write
|
||
1FD05AFE000
|
trusted library allocation
|
page read and write
|
||
1FD0DDD0000
|
trusted library allocation
|
page read and write
|
||
1FD0F5E2000
|
trusted library allocation
|
page read and write
|
||
1ED60E26000
|
heap
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD06BE8000
|
trusted library allocation
|
page read and write
|
||
1FD0DAB0000
|
trusted library allocation
|
page read and write
|
||
1FD0F361000
|
trusted library allocation
|
page read and write
|
||
1FD08B89000
|
trusted library allocation
|
page read and write
|
||
1FD069A7000
|
trusted library allocation
|
page read and write
|
||
1FD0707B000
|
trusted library allocation
|
page read and write
|
||
1FD09383000
|
trusted library allocation
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD0F45F000
|
trusted library allocation
|
page read and write
|
||
1FD06CAD000
|
trusted library allocation
|
page read and write
|
||
1FD068E8000
|
trusted library allocation
|
page read and write
|
||
1FD054A8000
|
trusted library allocation
|
page read and write
|
||
1FD0F57D000
|
trusted library allocation
|
page read and write
|
||
1FD0D98F000
|
trusted library allocation
|
page read and write
|
||
1FD09324000
|
trusted library allocation
|
page read and write
|
||
1FD05BEB000
|
trusted library allocation
|
page read and write
|
||
1FD069BE000
|
trusted library allocation
|
page read and write
|
||
1FD7C4A9000
|
heap
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
1FD068D6000
|
trusted library allocation
|
page read and write
|
||
1FD08B22000
|
trusted library allocation
|
page read and write
|
||
1ED60EB7000
|
heap
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD7FE95000
|
trusted library allocation
|
page read and write
|
||
1FD079EF000
|
trusted library allocation
|
page read and write
|
||
1FD057DE000
|
trusted library allocation
|
page read and write
|
||
1FD068C3000
|
trusted library allocation
|
page read and write
|
||
1FD0695F000
|
trusted library allocation
|
page read and write
|
||
1FD7FDED000
|
trusted library allocation
|
page read and write
|
||
1FD0E0F3000
|
trusted library allocation
|
page read and write
|
||
1FD7C420000
|
heap
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD10D02000
|
trusted library allocation
|
page read and write
|
||
1FD08ED9000
|
trusted library allocation
|
page read and write
|
||
1FD068E8000
|
trusted library allocation
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
1FD7C46C000
|
heap
|
page read and write
|
||
A778F3E000
|
stack
|
page read and write
|
||
1FD06C86000
|
trusted library allocation
|
page read and write
|
||
1FD02BFE000
|
trusted library allocation
|
page read and write
|
||
1ED60E6A000
|
heap
|
page read and write
|
||
1FD7C425000
|
heap
|
page read and write
|
||
1FD0F425000
|
trusted library allocation
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD7EC26000
|
trusted library allocation
|
page read and write
|
||
1FD06A92000
|
trusted library allocation
|
page read and write
|
||
1FD07E64000
|
trusted library allocation
|
page read and write
|
||
1FD0DB7E000
|
trusted library allocation
|
page read and write
|
||
1FD7C438000
|
heap
|
page read and write
|
||
1FD02BF6000
|
trusted library allocation
|
page read and write
|
||
1FD0DC79000
|
trusted library allocation
|
page read and write
|
||
1FD07E4B000
|
trusted library allocation
|
page read and write
|
||
1FD0703E000
|
trusted library allocation
|
page read and write
|
||
1FD10840000
|
trusted library allocation
|
page read and write
|
||
1FD0711E000
|
trusted library allocation
|
page read and write
|
||
1FD1043A000
|
trusted library allocation
|
page read and write
|
||
1FD07E21000
|
trusted library allocation
|
page read and write
|
||
1ED60DDC000
|
heap
|
page read and write
|
||
1FD0DAB6000
|
trusted library allocation
|
page read and write
|
||
1FD0DD1D000
|
trusted library allocation
|
page read and write
|
||
37B909704000
|
trusted library allocation
|
page read and write
|
||
1FD7E598000
|
trusted library allocation
|
page read and write
|
||
1FD07AE5000
|
trusted library allocation
|
page read and write
|
||
1FD0DD23000
|
trusted library allocation
|
page read and write
|
||
1FD7FEF6000
|
trusted library allocation
|
page read and write
|
||
1FD0E091000
|
trusted library allocation
|
page read and write
|
||
1FD06A4C000
|
trusted library allocation
|
page read and write
|
||
1FD053A7000
|
trusted library allocation
|
page read and write
|
||
1FD069EC000
|
trusted library allocation
|
page read and write
|
||
1FD0F48F000
|
trusted library allocation
|
page read and write
|
||
1FD7FD95000
|
trusted library allocation
|
page read and write
|
||
1FD06C7D000
|
trusted library allocation
|
page read and write
|
||
1FD07E2B000
|
trusted library allocation
|
page read and write
|
||
1B391932000
|
trusted library allocation
|
page read and write
|
||
1FD06CC5000
|
trusted library allocation
|
page read and write
|
||
482C5D8000
|
stack
|
page read and write
|
||
1FD11D73000
|
trusted library allocation
|
page read and write
|
||
22568CC0000
|
heap
|
page read and write
|
||
1FD0F269000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C1000
|
trusted library allocation
|
page read and write
|
||
1FD0DABC000
|
trusted library allocation
|
page read and write
|
||
1ED60D9C000
|
heap
|
page read and write
|
||
1B39177B000
|
trusted library allocation
|
page read and write
|
||
1FD05265000
|
trusted library allocation
|
page read and write
|
||
1FD116CE000
|
trusted library allocation
|
page read and write
|
||
1FD066F5000
|
trusted library allocation
|
page read and write
|
||
1FD0F373000
|
trusted library allocation
|
page read and write
|
||
1FD0EFAE000
|
trusted library allocation
|
page read and write
|
||
1FD06828000
|
trusted library allocation
|
page read and write
|
||
97257FE000
|
unkown
|
page readonly
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
1FD0E3F1000
|
trusted library allocation
|
page read and write
|
||
1FD07119000
|
trusted library allocation
|
page read and write
|
||
1FD07AE5000
|
trusted library allocation
|
page read and write
|
||
1FD08DE5000
|
trusted library allocation
|
page read and write
|
||
1FD0FBC8000
|
trusted library allocation
|
page read and write
|
||
1FD05AF6000
|
trusted library allocation
|
page read and write
|
||
1FD05D67000
|
trusted library allocation
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
1FD06C8F000
|
trusted library allocation
|
page read and write
|
||
1FD7C484000
|
heap
|
page read and write
|
||
1FD7E65B000
|
trusted library allocation
|
page read and write
|
||
1FD05F88000
|
trusted library allocation
|
page read and write
|
||
1FD0D97D000
|
trusted library allocation
|
page read and write
|
||
1FD0DD86000
|
trusted library allocation
|
page read and write
|
||
1FD7FEBE000
|
trusted library allocation
|
page read and write
|
||
1FD0DC68000
|
trusted library allocation
|
page read and write
|
||
1FD0E1F6000
|
trusted library allocation
|
page read and write
|
||
1FD7FE93000
|
trusted library allocation
|
page read and write
|
||
1FD05BAC000
|
trusted library allocation
|
page read and write
|
||
1FD0DFAC000
|
trusted library allocation
|
page read and write
|
||
482BBEE000
|
unkown
|
page readonly
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD0F5E7000
|
trusted library allocation
|
page read and write
|
||
1FD05BC0000
|
trusted library allocation
|
page read and write
|
||
1FD07E4D000
|
trusted library allocation
|
page read and write
|
||
1FD06A8B000
|
trusted library allocation
|
page read and write
|
||
1FD05BE8000
|
trusted library allocation
|
page read and write
|
||
70A8DB1000
|
trusted library allocation
|
page execute read
|
||
1FD0DFC8000
|
trusted library allocation
|
page read and write
|
||
1ED60148000
|
trusted library allocation
|
page read and write
|
||
1FD06C78000
|
trusted library allocation
|
page read and write
|
||
1ED60E84000
|
heap
|
page read and write
|
||
1ED60118000
|
trusted library allocation
|
page read and write
|
||
1FD02D72000
|
heap
|
page read and write
|
||
1FD104DA000
|
trusted library allocation
|
page read and write
|
||
1FD7FDFD000
|
trusted library allocation
|
page read and write
|
||
70A8E61000
|
trusted library allocation
|
page execute read
|
||
1FD11685000
|
trusted library allocation
|
page read and write
|
||
1FD0F5A8000
|
trusted library allocation
|
page read and write
|
||
1B391772000
|
trusted library allocation
|
page read and write
|
||
1ED60E7B000
|
heap
|
page read and write
|
||
1B391900000
|
trusted library allocation
|
page read and write
|
||
1FD0DC79000
|
trusted library allocation
|
page read and write
|
||
1FD08DEB000
|
trusted library allocation
|
page read and write
|
||
1FD0DFE1000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD06611000
|
trusted library allocation
|
page read and write
|
||
1FD7FE97000
|
trusted library allocation
|
page read and write
|
||
1FD069EC000
|
trusted library allocation
|
page read and write
|
||
1ED60E98000
|
heap
|
page read and write
|
||
1FD0528C000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B9000
|
trusted library allocation
|
page read and write
|
||
1FD06962000
|
trusted library allocation
|
page read and write
|
||
1FD06C36000
|
trusted library allocation
|
page read and write
|
||
1B3913C0000
|
remote allocation
|
page read and write
|
||
1FD0D9AB000
|
trusted library allocation
|
page read and write
|
||
1FD078FB000
|
trusted library allocation
|
page read and write
|
||
1FD07981000
|
trusted library allocation
|
page read and write
|
||
1FD7EC8C000
|
trusted library allocation
|
page read and write
|
||
1FD7E588000
|
trusted library allocation
|
page read and write
|
||
1FD05BE0000
|
trusted library allocation
|
page read and write
|
||
1FD7FEA8000
|
trusted library allocation
|
page read and write
|
||
1ED60E23000
|
heap
|
page read and write
|
||
1ED5FF40000
|
heap
|
page read and write
|
||
1FD7E5DF000
|
trusted library allocation
|
page read and write
|
||
1FD05B61000
|
trusted library allocation
|
page read and write
|
||
1FD0DAC8000
|
trusted library allocation
|
page read and write
|
||
1FD05DF6000
|
trusted library allocation
|
page read and write
|
||
1FD0EFBC000
|
trusted library allocation
|
page read and write
|
||
1FD071FC000
|
trusted library allocation
|
page read and write
|
||
1FD07E18000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD07E0D000
|
trusted library allocation
|
page read and write
|
||
1FD08B0B000
|
trusted library allocation
|
page read and write
|
||
482DEBE000
|
stack
|
page read and write
|
||
1FD0E3E9000
|
trusted library allocation
|
page read and write
|
||
1FD7FC6F000
|
trusted library allocation
|
page read and write
|
||
1ED60290000
|
trusted library allocation
|
page read and write
|
||
1FD08B13000
|
trusted library allocation
|
page read and write
|
||
1FD06ADA000
|
trusted library allocation
|
page read and write
|
||
1FD7FCF1000
|
trusted library allocation
|
page read and write
|
||
1FD7FDA2000
|
trusted library allocation
|
page read and write
|
||
1ED60DA9000
|
heap
|
page read and write
|
||
1FD0DC68000
|
trusted library allocation
|
page read and write
|
||
1FD05220000
|
trusted library allocation
|
page read and write
|
||
1FD05B61000
|
trusted library allocation
|
page read and write
|
||
1FD069CD000
|
trusted library allocation
|
page read and write
|
||
1FD0E1E4000
|
trusted library allocation
|
page read and write
|
||
1FD0DA70000
|
trusted library allocation
|
page read and write
|
||
1FD0E308000
|
trusted library allocation
|
page read and write
|
||
1FD0D933000
|
trusted library allocation
|
page read and write
|
||
1FD06A95000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD068F3000
|
trusted library allocation
|
page read and write
|
||
1FD0E0CF000
|
trusted library allocation
|
page read and write
|
||
1B391400000
|
heap
|
page read and write
|
||
1FD0915E000
|
heap
|
page read and write
|
||
1FD106DB000
|
trusted library allocation
|
page read and write
|
||
1FD7FCEE000
|
trusted library allocation
|
page read and write
|
||
1FD05AE3000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C3000
|
trusted library allocation
|
page read and write
|
||
1FD08EF1000
|
trusted library allocation
|
page read and write
|
||
1FD0F437000
|
trusted library allocation
|
page read and write
|
||
1FD06C86000
|
trusted library allocation
|
page read and write
|
||
1FD0F437000
|
trusted library allocation
|
page read and write
|
||
1FD054DE000
|
trusted library allocation
|
page read and write
|
||
1FD08BB3000
|
trusted library allocation
|
page read and write
|
||
1FD07D93000
|
trusted library allocation
|
page read and write
|
||
1FD0EFCF000
|
trusted library allocation
|
page read and write
|
||
A01000
|
unkown
|
page execute read
|
||
1FD069E1000
|
trusted library allocation
|
page read and write
|
||
1FD0DC10000
|
trusted library allocation
|
page read and write
|
||
1FD05BE0000
|
trusted library allocation
|
page read and write
|
||
1FD0F4A3000
|
trusted library allocation
|
page read and write
|
||
1FD06C1B000
|
trusted library allocation
|
page read and write
|
||
1FD06AC9000
|
trusted library allocation
|
page read and write
|
||
1FD7C410000
|
heap
|
page read and write
|
||
1FD05AE3000
|
trusted library allocation
|
page read and write
|
||
1FD0F444000
|
trusted library allocation
|
page read and write
|
||
1FD0E336000
|
trusted library allocation
|
page read and write
|
||
1FD7C427000
|
heap
|
page read and write
|
||
1FD0F3FB000
|
trusted library allocation
|
page read and write
|
||
1FD066CB000
|
trusted library allocation
|
page read and write
|
||
1FD7C45C000
|
heap
|
page read and write
|
||
1FD08EF1000
|
trusted library allocation
|
page read and write
|
||
1FD06AC7000
|
trusted library allocation
|
page read and write
|
||
1FD0693B000
|
trusted library allocation
|
page read and write
|
||
1FD08ED9000
|
trusted library allocation
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD1069F000
|
trusted library allocation
|
page read and write
|
||
1ED60DA9000
|
heap
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
23A890C0000
|
heap
|
page read and write
|
||
1FD7C455000
|
heap
|
page read and write
|
||
1FD0693B000
|
trusted library allocation
|
page read and write
|
||
1FD0DFD0000
|
trusted library allocation
|
page read and write
|
||
1FD0EFE0000
|
trusted library allocation
|
page read and write
|
||
1FD077A3000
|
trusted library allocation
|
page read and write
|
||
1B3915C0000
|
heap
|
page read and write
|
||
1FD7FEA6000
|
trusted library allocation
|
page read and write
|
||
1FD02DA0000
|
heap
|
page read and write
|
||
1FD068F9000
|
trusted library allocation
|
page read and write
|
||
1FD06AA2000
|
trusted library allocation
|
page read and write
|
||
22569115000
|
trusted library allocation
|
page read and write
|
||
1FD06837000
|
trusted library allocation
|
page read and write
|
||
1FD7C495000
|
heap
|
page read and write
|
||
1FD7FE69000
|
trusted library allocation
|
page read and write
|
||
1FD0549A000
|
trusted library allocation
|
page read and write
|
||
1FD08E78000
|
trusted library allocation
|
page read and write
|
||
1FD08EB7000
|
trusted library allocation
|
page read and write
|
||
1FD08BEB000
|
trusted library allocation
|
page read and write
|
||
1FD0F429000
|
trusted library allocation
|
page read and write
|
||
1B391761000
|
trusted library allocation
|
page read and write
|
||
23A89040000
|
heap
|
page read and write
|
||
1FD06C7D000
|
trusted library allocation
|
page read and write
|
||
1ED60E98000
|
heap
|
page read and write
|
||
1FD7EFB3000
|
trusted library allocation
|
page read and write
|
||
1FD106C4000
|
trusted library allocation
|
page read and write
|
||
F69000
|
heap
|
page read and write
|
||
1FD0524E000
|
trusted library allocation
|
page read and write
|
||
1FD08B2A000
|
trusted library allocation
|
page read and write
|
||
1FD0DCE4000
|
trusted library allocation
|
page read and write
|
||
1FD05DD1000
|
trusted library allocation
|
page read and write
|
||
1FD06CC9000
|
trusted library allocation
|
page read and write
|
||
1FD7FDED000
|
trusted library allocation
|
page read and write
|
||
1FD0FB86000
|
trusted library allocation
|
page read and write
|
||
1FD053A0000
|
trusted library allocation
|
page read and write
|
||
1FD7FDC3000
|
trusted library allocation
|
page read and write
|
||
1FD05321000
|
trusted library allocation
|
page read and write
|
||
1FD7C40E000
|
heap
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD11DF0000
|
trusted library allocation
|
page read and write
|
||
1FD06A80000
|
trusted library allocation
|
page read and write
|
||
1FD07131000
|
trusted library allocation
|
page read and write
|
||
1FD02D8C000
|
heap
|
page read and write
|
||
1FD7C41F000
|
heap
|
page read and write
|
||
1FD7EC66000
|
trusted library allocation
|
page read and write
|
||
1FD0F584000
|
trusted library allocation
|
page read and write
|
||
1FD0DC79000
|
trusted library allocation
|
page read and write
|
||
1FD05B43000
|
trusted library allocation
|
page read and write
|
||
1ED60E20000
|
heap
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD0F3A7000
|
trusted library allocation
|
page read and write
|
||
1FD0EFC3000
|
trusted library allocation
|
page read and write
|
||
1FD068CD000
|
trusted library allocation
|
page read and write
|
||
1FD05360000
|
trusted library allocation
|
page read and write
|
||
1FD7FB3D000
|
trusted library allocation
|
page read and write
|
||
1FD0E314000
|
trusted library allocation
|
page read and write
|
||
1FD0576B000
|
trusted library allocation
|
page read and write
|
||
1FD0EFDB000
|
trusted library allocation
|
page read and write
|
||
1FD7FEBC000
|
trusted library allocation
|
page read and write
|
||
1FD069C7000
|
trusted library allocation
|
page read and write
|
||
1FD0DD5C000
|
trusted library allocation
|
page read and write
|
||
1FD06A8B000
|
trusted library allocation
|
page read and write
|
||
1FD069AA000
|
trusted library allocation
|
page read and write
|
||
1FD7FCAE000
|
trusted library allocation
|
page read and write
|
||
1FD0DD43000
|
trusted library allocation
|
page read and write
|
||
A4A6BFF000
|
stack
|
page read and write
|
||
F73000
|
heap
|
page read and write
|
||
1FD06696000
|
trusted library allocation
|
page read and write
|
||
1FD054A1000
|
trusted library allocation
|
page read and write
|
||
1FD071B3000
|
trusted library allocation
|
page read and write
|
||
1FD05B29000
|
trusted library allocation
|
page read and write
|
||
1FD0578B000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CB000
|
trusted library allocation
|
page read and write
|
||
1FD06CF4000
|
trusted library allocation
|
page read and write
|
||
1FD7EB2F000
|
trusted library allocation
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1B391460000
|
heap
|
page read and write
|
||
1FD7C455000
|
heap
|
page read and write
|
||
1FD07120000
|
trusted library allocation
|
page read and write
|
||
1FD0D9E1000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD069F8000
|
trusted library allocation
|
page read and write
|
||
1FD06A9B000
|
trusted library allocation
|
page read and write
|
||
1FD092AD000
|
trusted library allocation
|
page read and write
|
||
AD4000
|
unkown
|
page readonly
|
||
1FD07866000
|
trusted library allocation
|
page read and write
|
||
1FD116AF000
|
trusted library allocation
|
page read and write
|
||
1FD7C40F000
|
heap
|
page read and write
|
||
1FD0917A000
|
heap
|
page read and write
|
||
1FD0E0EE000
|
trusted library allocation
|
page read and write
|
||
1FD106F1000
|
trusted library allocation
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
1FD069EC000
|
trusted library allocation
|
page read and write
|
||
1FD066AB000
|
trusted library allocation
|
page read and write
|
||
1ED602A3000
|
unkown
|
page execute read
|
||
1FD0E3C9000
|
trusted library allocation
|
page read and write
|
||
1FD02DA9000
|
heap
|
page read and write
|
||
1FD08BFB000
|
trusted library allocation
|
page read and write
|
||
1FD7C48C000
|
heap
|
page read and write
|
||
1FD0E1BA000
|
trusted library allocation
|
page read and write
|
||
1FD06C2F000
|
trusted library allocation
|
page read and write
|
||
1FD069A7000
|
trusted library allocation
|
page read and write
|
||
1FD069E4000
|
trusted library allocation
|
page read and write
|
||
1FD0A702000
|
trusted library allocation
|
page read and write
|
||
1FD05F0B000
|
trusted library allocation
|
page read and write
|
||
1FD07ED7000
|
trusted library allocation
|
page read and write
|
||
1FD104AA000
|
trusted library allocation
|
page read and write
|
||
1FD0683D000
|
trusted library allocation
|
page read and write
|
||
1FD069A4000
|
trusted library allocation
|
page read and write
|
||
1FD05BEA000
|
trusted library allocation
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
1FD069E7000
|
trusted library allocation
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD106F7000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CF000
|
trusted library allocation
|
page read and write
|
||
1FD0685B000
|
trusted library allocation
|
page read and write
|
||
1FD05775000
|
trusted library allocation
|
page read and write
|
||
1FD7FC75000
|
trusted library allocation
|
page read and write
|
||
1FD04F23000
|
trusted library allocation
|
page read and write
|
||
1FD05BE0000
|
trusted library allocation
|
page read and write
|
||
1FD0F39D000
|
trusted library allocation
|
page read and write
|
||
1FD071B8000
|
trusted library allocation
|
page read and write
|
||
1FD07854000
|
trusted library allocation
|
page read and write
|
||
1FD05B5E000
|
trusted library allocation
|
page read and write
|
||
22569178000
|
trusted library allocation
|
page read and write
|
||
1FD06CC5000
|
trusted library allocation
|
page read and write
|
||
1FD06A3F000
|
trusted library allocation
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
1FD06AD7000
|
trusted library allocation
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD05753000
|
trusted library allocation
|
page read and write
|
||
1FD08E5C000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD7FCE5000
|
trusted library allocation
|
page read and write
|
||
1FD7C492000
|
heap
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
1FD0F39D000
|
trusted library allocation
|
page read and write
|
||
1FD7FDE5000
|
trusted library allocation
|
page read and write
|
||
1FD068C1000
|
trusted library allocation
|
page read and write
|
||
1FD05257000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1FD0F4DD000
|
trusted library allocation
|
page read and write
|
||
1FD0664F000
|
trusted library allocation
|
page read and write
|
||
1FD0E0B8000
|
trusted library allocation
|
page read and write
|
||
1FD07D7D000
|
trusted library allocation
|
page read and write
|
||
1FD05778000
|
trusted library allocation
|
page read and write
|
||
22568D50000
|
heap
|
page read and write
|
||
1FD0F3B4000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD7EC82000
|
trusted library allocation
|
page read and write
|
||
1FD05AFE000
|
trusted library allocation
|
page read and write
|
||
1FD06C9A000
|
trusted library allocation
|
page read and write
|
||
1FD0DA95000
|
trusted library allocation
|
page read and write
|
||
1FD08BF3000
|
trusted library allocation
|
page read and write
|
||
1FD070C0000
|
trusted library allocation
|
page read and write
|
||
1FD06C58000
|
trusted library allocation
|
page read and write
|
||
22568D5A000
|
heap
|
page read and write
|
||
1FD068C1000
|
trusted library allocation
|
page read and write
|
||
1FD7FEBC000
|
trusted library allocation
|
page read and write
|
||
1FD09111000
|
heap
|
page read and write
|
||
1FD07136000
|
trusted library allocation
|
page read and write
|
||
1B3913E0000
|
unclassified section
|
page readonly
|
||
1FD0F5D5000
|
trusted library allocation
|
page read and write
|
||
1FD0EFAE000
|
trusted library allocation
|
page read and write
|
||
1FD0F450000
|
trusted library allocation
|
page read and write
|
||
1FD0F5D7000
|
trusted library allocation
|
page read and write
|
||
1B39190C000
|
trusted library allocation
|
page read and write
|
||
1FD02D70000
|
heap
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1FD07E52000
|
trusted library allocation
|
page read and write
|
||
1FD05BC3000
|
trusted library allocation
|
page read and write
|
||
1FD07AF2000
|
trusted library allocation
|
page read and write
|
||
1FD0EFEE000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD0EFBF000
|
trusted library allocation
|
page read and write
|
||
1FD05AFE000
|
trusted library allocation
|
page read and write
|
||
1FD0F567000
|
trusted library allocation
|
page read and write
|
||
1FD02DAA000
|
heap
|
page read and write
|
||
1FD08B7D000
|
trusted library allocation
|
page read and write
|
||
1FD05D73000
|
trusted library allocation
|
page read and write
|
||
1FD0F444000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C9000
|
trusted library allocation
|
page read and write
|
||
1B391766000
|
trusted library allocation
|
page read and write
|
||
1FD7FD20000
|
trusted library allocation
|
page read and write
|
||
1ED608D0000
|
heap
|
page read and write
|
||
22568CE0000
|
heap
|
page read and write
|
||
1FD7C486000
|
heap
|
page read and write
|
||
1FD0FBC8000
|
trusted library allocation
|
page read and write
|
||
1FD06C47000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
1FD0F38A000
|
trusted library allocation
|
page read and write
|
||
1FD0E063000
|
trusted library allocation
|
page read and write
|
||
1FD0DF8D000
|
trusted library allocation
|
page read and write
|
||
1FD7C424000
|
heap
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
1FD08BAE000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C9000
|
trusted library allocation
|
page read and write
|
||
1ED60123000
|
trusted library allocation
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
1ED5FF80000
|
heap
|
page read and write
|
||
1FD7FB1C000
|
trusted library allocation
|
page read and write
|
||
1FD116A6000
|
trusted library allocation
|
page read and write
|
||
1FD0F5CF000
|
trusted library allocation
|
page read and write
|
||
1FD0E0F9000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD7C484000
|
heap
|
page read and write
|
||
1FD7E6B6000
|
trusted library allocation
|
page read and write
|
||
1FD052B2000
|
trusted library allocation
|
page read and write
|
||
1ED5FFA0000
|
heap
|
page read and write
|
||
1FD7FDC3000
|
trusted library allocation
|
page read and write
|
||
1FD7FDC3000
|
trusted library allocation
|
page read and write
|
||
1FD06917000
|
trusted library allocation
|
page read and write
|
||
1FD0699A000
|
trusted library allocation
|
page read and write
|
||
1FD0D985000
|
trusted library allocation
|
page read and write
|
||
1FD7C47E000
|
heap
|
page read and write
|
||
3821000
|
heap
|
page read and write
|
||
1FD068CB000
|
trusted library allocation
|
page read and write
|
||
1FD0DF75000
|
trusted library allocation
|
page read and write
|
||
1FD116E5000
|
trusted library allocation
|
page read and write
|
||
1FD08ED4000
|
trusted library allocation
|
page read and write
|
||
1FD0DC3B000
|
trusted library allocation
|
page read and write
|
||
1FD0F2E7000
|
trusted library allocation
|
page read and write
|
||
1FD054BD000
|
trusted library allocation
|
page read and write
|
||
1FD07888000
|
trusted library allocation
|
page read and write
|
||
1FD06AC7000
|
trusted library allocation
|
page read and write
|
||
1FD06C26000
|
trusted library allocation
|
page read and write
|
||
22568C80000
|
remote allocation
|
page read and write
|
||
1ED60E32000
|
heap
|
page read and write
|
||
1ED60E84000
|
heap
|
page read and write
|
||
1FD7E590000
|
trusted library allocation
|
page read and write
|
||
1FD07784000
|
trusted library allocation
|
page read and write
|
||
22569176000
|
trusted library allocation
|
page read and write
|
||
1FD0D953000
|
trusted library allocation
|
page read and write
|
||
1FD0DB34000
|
trusted library allocation
|
page read and write
|
||
1FD7FDC1000
|
trusted library allocation
|
page read and write
|
||
1FD7C420000
|
heap
|
page read and write
|
||
1FD1048F000
|
trusted library allocation
|
page read and write
|
||
1FD0E192000
|
trusted library allocation
|
page read and write
|
||
1FD7C452000
|
heap
|
page read and write
|
||
1FD08B89000
|
trusted library allocation
|
page read and write
|
||
1FD06AFA000
|
trusted library allocation
|
page read and write
|
||
1FD08EAF000
|
trusted library allocation
|
page read and write
|
||
1FD11DF0000
|
trusted library allocation
|
page read and write
|
||
1FD02BF6000
|
trusted library allocation
|
page read and write
|
||
1ED60E98000
|
heap
|
page read and write
|
||
1FD05BC0000
|
trusted library allocation
|
page read and write
|
||
1FD0F3F9000
|
trusted library allocation
|
page read and write
|
||
1FD06AE3000
|
trusted library allocation
|
page read and write
|
||
1FD7C415000
|
heap
|
page read and write
|
||
1ED6016F000
|
trusted library allocation
|
page read and write
|
||
1FD0917A000
|
heap
|
page read and write
|
||
1FD05B92000
|
trusted library allocation
|
page read and write
|
||
1FD7EC19000
|
trusted library allocation
|
page read and write
|
||
1FD071B8000
|
trusted library allocation
|
page read and write
|
||
1FD07ABD000
|
trusted library allocation
|
page read and write
|
||
1FD0E1B0000
|
trusted library allocation
|
page read and write
|
||
1FD0E0A8000
|
trusted library allocation
|
page read and write
|
||
1FD104AA000
|
trusted library allocation
|
page read and write
|
||
1FD7C41D000
|
heap
|
page read and write
|
||
1FD7C499000
|
heap
|
page read and write
|
||
1FD7FCEE000
|
trusted library allocation
|
page read and write
|
||
1FD08E73000
|
trusted library allocation
|
page read and write
|
||
1FD10822000
|
trusted library allocation
|
page read and write
|
||
1FD054B9000
|
trusted library allocation
|
page read and write
|
||
1FD0DCA4000
|
trusted library allocation
|
page read and write
|
||
1FD0E3F1000
|
trusted library allocation
|
page read and write
|
||
1FD7C41B000
|
heap
|
page read and write
|
||
1FD10890000
|
trusted library allocation
|
page read and write
|
||
1FD07177000
|
trusted library allocation
|
page read and write
|
||
1FD11A3B000
|
trusted library allocation
|
page read and write
|
||
1FD06023000
|
trusted library allocation
|
page read and write
|
||
1FD07BFC000
|
trusted library allocation
|
page read and write
|
||
1FD052D6000
|
trusted library allocation
|
page read and write
|
||
1FD053D6000
|
trusted library allocation
|
page read and write
|
||
1FD0DDF9000
|
trusted library allocation
|
page read and write
|
||
1FD0E1FE000
|
trusted library allocation
|
page read and write
|
||
1FD0D97B000
|
trusted library allocation
|
page read and write
|
||
1FD7FD9B000
|
trusted library allocation
|
page read and write
|
||
1FD071B0000
|
trusted library allocation
|
page read and write
|
||
1FD05209000
|
trusted library allocation
|
page read and write
|
||
1FD06095000
|
trusted library allocation
|
page read and write
|
||
1FD068AB000
|
trusted library allocation
|
page read and write
|
||
1FD7C488000
|
heap
|
page read and write
|
||
1FD08E59000
|
trusted library allocation
|
page read and write
|
||
22568E72000
|
unclassified section
|
page read and write
|
||
1FD06A77000
|
trusted library allocation
|
page read and write
|
||
1FD07E4B000
|
trusted library allocation
|
page read and write
|
||
1FD106EF000
|
trusted library allocation
|
page read and write
|
||
1FD0667E000
|
trusted library allocation
|
page read and write
|
||
1FD0E3C9000
|
trusted library allocation
|
page read and write
|
||
1FD116B9000
|
trusted library allocation
|
page read and write
|
||
1FD0DCE4000
|
trusted library allocation
|
page read and write
|
||
1FD7FE69000
|
trusted library allocation
|
page read and write
|
||
1FD05F3C000
|
trusted library allocation
|
page read and write
|
||
1ED60E7B000
|
heap
|
page read and write
|
||
1FD08DF2000
|
trusted library allocation
|
page read and write
|
||
23A88F3A000
|
heap
|
page read and write
|
||
1ED6019F000
|
trusted library allocation
|
page read and write
|
||
1FD068E6000
|
trusted library allocation
|
page read and write
|
||
1FD078EA000
|
trusted library allocation
|
page read and write
|
||
1FD06CF5000
|
trusted library allocation
|
page read and write
|
||
1FD0DC68000
|
trusted library allocation
|
page read and write
|
||
1FD7FE6C000
|
trusted library allocation
|
page read and write
|
||
1FD0D993000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD0F39D000
|
trusted library allocation
|
page read and write
|
||
1FD08B2A000
|
trusted library allocation
|
page read and write
|
||
22569307000
|
trusted library allocation
|
page read and write
|
||
1FD0686B000
|
trusted library allocation
|
page read and write
|
||
1FD0F5DD000
|
trusted library allocation
|
page read and write
|
||
1FD7E581000
|
trusted library allocation
|
page read and write
|
||
1FD02D9F000
|
heap
|
page read and write
|
||
1FD0EFA7000
|
trusted library allocation
|
page read and write
|
||
1FD0F373000
|
trusted library allocation
|
page read and write
|
||
1FD7FB5F000
|
trusted library allocation
|
page read and write
|
||
1FD06AF8000
|
trusted library allocation
|
page read and write
|
||
1FD104C0000
|
trusted library allocation
|
page read and write
|
||
1FD0FB8D000
|
trusted library allocation
|
page read and write
|
||
1FD7FE3F000
|
trusted library allocation
|
page read and write
|
||
3821000
|
heap
|
page read and write
|
||
1FD0DC39000
|
trusted library allocation
|
page read and write
|
||
1FD07DB6000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C7000
|
trusted library allocation
|
page read and write
|
||
1FD07D5B000
|
trusted library allocation
|
page read and write
|
||
1FD7FDE5000
|
trusted library allocation
|
page read and write
|
||
1FD0DD74000
|
trusted library allocation
|
page read and write
|
||
1FD0EFEE000
|
trusted library allocation
|
page read and write
|
||
1FD7C431000
|
heap
|
page read and write
|
||
1FD05B3F000
|
trusted library allocation
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
1FD08B7A000
|
trusted library allocation
|
page read and write
|
||
23A88EE0000
|
heap
|
page read and write
|
||
1FD0E199000
|
trusted library allocation
|
page read and write
|
||
1FD052B5000
|
trusted library allocation
|
page read and write
|
||
1FD066A7000
|
trusted library allocation
|
page read and write
|
||
1FD08B22000
|
trusted library allocation
|
page read and write
|
||
1FD7C499000
|
heap
|
page read and write
|
||
1FD0EFEE000
|
trusted library allocation
|
page read and write
|
||
1FD7FC48000
|
trusted library allocation
|
page read and write
|
||
1FD05743000
|
trusted library allocation
|
page read and write
|
||
1FD07116000
|
trusted library allocation
|
page read and write
|
||
1FD0DFA1000
|
trusted library allocation
|
page read and write
|
||
1FD07085000
|
trusted library allocation
|
page read and write
|
||
1FD06A8B000
|
trusted library allocation
|
page read and write
|
||
1FD06897000
|
trusted library allocation
|
page read and write
|
||
1FD0546D000
|
trusted library allocation
|
page read and write
|
||
1ED60E20000
|
heap
|
page read and write
|
||
1FD11A83000
|
trusted library allocation
|
page read and write
|
||
1FD0F5C1000
|
trusted library allocation
|
page read and write
|
||
1FD07189000
|
trusted library allocation
|
page read and write
|
||
1FD7C41C000
|
heap
|
page read and write
|
||
1FD070D0000
|
trusted library allocation
|
page read and write
|
||
1FD0E0F1000
|
trusted library allocation
|
page read and write
|
||
1FD05F3E000
|
trusted library allocation
|
page read and write
|
||
1FD11DF5000
|
trusted library allocation
|
page read and write
|
||
1FD068D6000
|
trusted library allocation
|
page read and write
|
||
1FD0F5B3000
|
trusted library allocation
|
page read and write
|
||
1FD02D9F000
|
heap
|
page read and write
|
||
1FD07E86000
|
trusted library allocation
|
page read and write
|
||
1FD0F437000
|
trusted library allocation
|
page read and write
|
||
1FD057C5000
|
trusted library allocation
|
page read and write
|
||
1FD07E12000
|
trusted library allocation
|
page read and write
|
||
1FD0663B000
|
trusted library allocation
|
page read and write
|
||
1FD106FD000
|
trusted library allocation
|
page read and write
|
||
1FD0F4CB000
|
trusted library allocation
|
page read and write
|
||
1FD1048C000
|
trusted library allocation
|
page read and write
|
||
972357E000
|
stack
|
page read and write
|
||
1FD0523D000
|
trusted library allocation
|
page read and write
|
||
1FD060BD000
|
trusted library allocation
|
page read and write
|
||
1FD06AB6000
|
trusted library allocation
|
page read and write
|
||
1FD0F5D5000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1FD07E52000
|
trusted library allocation
|
page read and write
|
||
1FD0F474000
|
trusted library allocation
|
page read and write
|
||
1FD0E3F5000
|
trusted library allocation
|
page read and write
|
||
1FD05280000
|
trusted library allocation
|
page read and write
|
||
1FD05B31000
|
trusted library allocation
|
page read and write
|
||
1FD071AC000
|
trusted library allocation
|
page read and write
|
||
1FD7E643000
|
trusted library allocation
|
page read and write
|
||
1FD7C455000
|
heap
|
page read and write
|
||
1FD108BC000
|
trusted library allocation
|
page read and write
|
||
1ED60E2C000
|
heap
|
page read and write
|
||
1FD06A80000
|
trusted library allocation
|
page read and write
|
||
1FD078D5000
|
trusted library allocation
|
page read and write
|
||
1FD7C461000
|
heap
|
page read and write
|
||
1FD05B61000
|
trusted library allocation
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD7C472000
|
heap
|
page read and write
|
||
1FD116CA000
|
trusted library allocation
|
page read and write
|
||
1FD09218000
|
trusted library allocation
|
page read and write
|
||
1ED60E2C000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
1FD05486000
|
trusted library allocation
|
page read and write
|
||
1FD7C416000
|
heap
|
page read and write
|
||
1FD05AEF000
|
trusted library allocation
|
page read and write
|
||
1FD7C484000
|
heap
|
page read and write
|
||
1FD06CEE000
|
trusted library allocation
|
page read and write
|
||
1FD06676000
|
trusted library allocation
|
page read and write
|
||
1FD104DA000
|
trusted library allocation
|
page read and write
|
||
1FD0DD25000
|
trusted library allocation
|
page read and write
|
||
1FD7C490000
|
heap
|
page read and write
|
||
1FD06A80000
|
trusted library allocation
|
page read and write
|
||
1FD06AEE000
|
trusted library allocation
|
page read and write
|
||
1FD069FC000
|
trusted library allocation
|
page read and write
|
||
1FD0F373000
|
trusted library allocation
|
page read and write
|
||
1FD0E1F6000
|
trusted library allocation
|
page read and write
|
||
1FD7C471000
|
heap
|
page read and write
|
||
1ED60DA0000
|
heap
|
page read and write
|
||
1FD08E6C000
|
trusted library allocation
|
page read and write
|
||
1FD7FC7D000
|
trusted library allocation
|
page read and write
|
||
1B391723000
|
trusted library allocation
|
page read and write
|
||
1FD07AE5000
|
trusted library allocation
|
page read and write
|
||
1FD1048F000
|
trusted library allocation
|
page read and write
|
There are 3781 hidden memdumps, click here to show them.