Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dea8bdd6-ded2-44c3-b4aa-716f26b8b3f0.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_dea8bdd6-ded2-44c3-b4aa-716f26b8b3f0.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
|
ASCII text, with very long lines (1769), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1769), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5861 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244
-prefMapHandle 2236 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {23394519-5634-4e38-af03-29850acb4b80} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" 23d3be6e510 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3664 -parentBuildID 20230927232528 -prefsHandle 3648
-prefMapHandle 2912 -prefsLen 26151 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e42fb9f8-7b06-4a0a-8703-7e638740022d}
3964 "\\.\pipe\gecko-crash-server-pipe.3964" 23d3be7a710 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4896 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 4920 -prefMapHandle 4916 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {32652d90-4854-4b87-9fab-293d8e7df5cd} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" 23d4e207510 utility
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
|
unknown
|
||
https://mathiasbynens.be/notes/javascript-escapes#single
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
http://crl.microso
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://youtube.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
|
unknown
|
||
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
|
unknown
|
||
https://www.instagram.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://youtube.com/account?=htA
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://youtube.com/account?=
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://infra.spec.whatwg.org/#ascii-whitespace
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema
|
unknown
|
||
https://duckduckgo.com/?t=ffab&q=
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
|
unknown
|
||
https://identity.mozilla.com/apps/relay
|
unknown
|
||
https://mathiasbynens.be/
|
unknown
|
||
https://mozilla.cloudflare-dns.com/dns-query
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
|
unknown
|
||
https://mail.yahoo.co.jp/compose/?To=%s
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://relay.firefox.com/api/v1/
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
|
unknown
|
||
https://topsites.services.mozilla.com/cid/
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
|
unknown
|
||
https://poczta.interia.pl/mh/?mailto=%s
|
unknown
|
||
https://www.google.com/complete/search
|
unknown
|
||
https://watch.sling.com/
|
unknown
|
||
https://getpocket.com/firefox/new_tab_learn_more/
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/google/closure-compiler/issues/3177
|
unknown
|
||
https://www.google.com/complete/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.196.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.1
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
151.101.65.91
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
dyna.wikimedia.org
|
185.15.58.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.181.78
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
172.217.19.206
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.129.140
|
||
ipv4only.arpa
|
192.0.0.170
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 22 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
151.101.65.91
|
services.addons.mozilla.org
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.201.103.21
|
normandy-cdn.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
142.250.181.78
|
youtube.com
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23D42B0F000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
213C776A000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D53F76000
|
trusted library allocation
|
page read and write
|
||
23D4BDF1000
|
trusted library allocation
|
page read and write
|
||
23D4C1FC000
|
trusted library allocation
|
page read and write
|
||
23D57C91000
|
trusted library allocation
|
page read and write
|
||
23D57C66000
|
trusted library allocation
|
page read and write
|
||
BBD000
|
heap
|
page read and write
|
||
23D4BD14000
|
trusted library allocation
|
page read and write
|
||
23D4F940000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
213C75D0000
|
heap
|
page read and write
|
||
23D4D235000
|
trusted library allocation
|
page read and write
|
||
23D4D966000
|
trusted library allocation
|
page read and write
|
||
23D4CEC9000
|
trusted library allocation
|
page read and write
|
||
23D4CEBC000
|
trusted library allocation
|
page read and write
|
||
23D4D941000
|
trusted library allocation
|
page read and write
|
||
23D42B57000
|
heap
|
page read and write
|
||
23D57A61000
|
trusted library allocation
|
page read and write
|
||
23D4FACD000
|
trusted library allocation
|
page read and write
|
||
23D5799D000
|
trusted library allocation
|
page read and write
|
||
23D55A4B000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D4D7C1000
|
trusted library allocation
|
page read and write
|
||
23D50C58000
|
trusted library allocation
|
page read and write
|
||
23D4CBBC000
|
trusted library allocation
|
page read and write
|
||
213C8467000
|
heap
|
page read and write
|
||
23D55084000
|
trusted library allocation
|
page read and write
|
||
23D42B0E000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
1EEA4100000
|
heap
|
page read and write
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D4BA89000
|
trusted library allocation
|
page read and write
|
||
23D4E340000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
23D4BDE1000
|
trusted library allocation
|
page read and write
|
||
23D57AEE000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
213C8369000
|
heap
|
page read and write
|
||
23D42B30000
|
heap
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D5868F000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
23D57DB4000
|
trusted library allocation
|
page read and write
|
||
22D6821F000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4C194000
|
trusted library allocation
|
page read and write
|
||
23D57D76000
|
trusted library allocation
|
page read and write
|
||
23D4D853000
|
trusted library allocation
|
page read and write
|
||
213C770A000
|
trusted library allocation
|
page read and write
|
||
FE5BFFC000
|
stack
|
page read and write
|
||
23D4B4CF000
|
heap
|
page read and write
|
||
22D67C90000
|
unclassified section
|
page readonly
|
||
23D57D73000
|
trusted library allocation
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4F3F9000
|
trusted library allocation
|
page read and write
|
||
23D4D6F9000
|
trusted library allocation
|
page read and write
|
||
23D5516D000
|
trusted library allocation
|
page read and write
|
||
23D4F012000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D57D7F000
|
trusted library allocation
|
page read and write
|
||
23D4CB10000
|
trusted library allocation
|
page read and write
|
||
23D4CE60000
|
trusted library allocation
|
page read and write
|
||
23D5858F000
|
trusted library allocation
|
page read and write
|
||
23D4B21E000
|
trusted library allocation
|
page read and write
|
||
23D4D276000
|
trusted library allocation
|
page read and write
|
||
23D53F68000
|
trusted library allocation
|
page read and write
|
||
23D4C188000
|
trusted library allocation
|
page read and write
|
||
23D57A19000
|
trusted library allocation
|
page read and write
|
||
213C77F3000
|
trusted library allocation
|
page read and write
|
||
23D4E491000
|
trusted library allocation
|
page read and write
|
||
23D50C7D000
|
trusted library allocation
|
page read and write
|
||
23D4E479000
|
trusted library allocation
|
page read and write
|
||
23D48A16000
|
trusted library allocation
|
page read and write
|
||
23D4D840000
|
trusted library allocation
|
page read and write
|
||
23D48CC1000
|
trusted library allocation
|
page read and write
|
||
23D579AD000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D4DFF8000
|
trusted library allocation
|
page read and write
|
||
23D4D9A4000
|
trusted library allocation
|
page read and write
|
||
23D540F7000
|
trusted library allocation
|
page read and write
|
||
23D4D788000
|
trusted library allocation
|
page read and write
|
||
23D4D86C000
|
trusted library allocation
|
page read and write
|
||
23D4CB8C000
|
trusted library allocation
|
page read and write
|
||
23D4BB71000
|
trusted library allocation
|
page read and write
|
||
23D4E65D000
|
trusted library allocation
|
page read and write
|
||
213C842B000
|
heap
|
page read and write
|
||
23D57A9A000
|
trusted library allocation
|
page read and write
|
||
23D4E19B000
|
trusted library allocation
|
page read and write
|
||
23D4F8D8000
|
trusted library allocation
|
page read and write
|
||
23D57BC8000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4BBA8000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4CBAB000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4F4D6000
|
trusted library allocation
|
page read and write
|
||
23D48DBB000
|
trusted library allocation
|
page read and write
|
||
23D47B82000
|
trusted library allocation
|
page read and write
|
||
23D48CA1000
|
trusted library allocation
|
page read and write
|
||
23D4DCFD000
|
trusted library allocation
|
page read and write
|
||
23D57998000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D585AD000
|
trusted library allocation
|
page read and write
|
||
23D4CAC7000
|
trusted library allocation
|
page read and write
|
||
23D4C1EF000
|
trusted library allocation
|
page read and write
|
||
23D57EE3000
|
heap
|
page read and write
|
||
23D576FE000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D50C39000
|
trusted library allocation
|
page read and write
|
||
226BC460000
|
heap
|
page read and write
|
||
23D53ED6000
|
trusted library allocation
|
page read and write
|
||
23D4CB8C000
|
trusted library allocation
|
page read and write
|
||
23D579DC000
|
trusted library allocation
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D4BD3F000
|
trusted library allocation
|
page read and write
|
||
23D586C1000
|
trusted library allocation
|
page read and write
|
||
23D57C78000
|
trusted library allocation
|
page read and write
|
||
23D47A71000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D4C15A000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D5506D000
|
trusted library allocation
|
page read and write
|
||
23D4D2C1000
|
trusted library allocation
|
page read and write
|
||
213C8209000
|
trusted library allocation
|
page read and write
|
||
23D585F5000
|
trusted library allocation
|
page read and write
|
||
23D54937000
|
trusted library allocation
|
page read and write
|
||
23D4D2B4000
|
trusted library allocation
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D4E2D3000
|
trusted library allocation
|
page read and write
|
||
226BC85F000
|
trusted library allocation
|
page read and write
|
||
213C83E8000
|
heap
|
page read and write
|
||
23D4D999000
|
trusted library allocation
|
page read and write
|
||
23D48AD9000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4CEAF000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D55AC9000
|
trusted library allocation
|
page read and write
|
||
23D4CA96000
|
trusted library allocation
|
page read and write
|
||
23D53F56000
|
trusted library allocation
|
page read and write
|
||
23D4E4C2000
|
trusted library allocation
|
page read and write
|
||
D0CF7FE000
|
unkown
|
page readonly
|
||
23D585C7000
|
trusted library allocation
|
page read and write
|
||
213C8458000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
213C8369000
|
heap
|
page read and write
|
||
23D4B4F3000
|
heap
|
page read and write
|
||
23D4DEB0000
|
trusted library allocation
|
page read and write
|
||
23D4C188000
|
trusted library allocation
|
page read and write
|
||
23D4D955000
|
trusted library allocation
|
page read and write
|
||
23D50C69000
|
trusted library allocation
|
page read and write
|
||
22D68160000
|
trusted library allocation
|
page read and write
|
||
23D4D23B000
|
trusted library allocation
|
page read and write
|
||
23D53E17000
|
trusted library allocation
|
page read and write
|
||
23D50CB3000
|
trusted library allocation
|
page read and write
|
||
23D5795E000
|
trusted library allocation
|
page read and write
|
||
23D4CAE1000
|
trusted library allocation
|
page read and write
|
||
23D573E8000
|
trusted library allocation
|
page read and write
|
||
23D4D84C000
|
trusted library allocation
|
page read and write
|
||
23D57E71000
|
heap
|
page read and write
|
||
23D4D8FA000
|
trusted library allocation
|
page read and write
|
||
23D53FCB000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D4C17F000
|
trusted library allocation
|
page read and write
|
||
1EEA5BBB000
|
heap
|
page read and write
|
||
23D57DE3000
|
trusted library allocation
|
page read and write
|
||
213C8467000
|
heap
|
page read and write
|
||
23D4E62D000
|
trusted library allocation
|
page read and write
|
||
23D58595000
|
trusted library allocation
|
page read and write
|
||
23D47B93000
|
trusted library allocation
|
page read and write
|
||
23D4CB6B000
|
trusted library allocation
|
page read and write
|
||
23D4C109000
|
trusted library allocation
|
page read and write
|
||
23D5767D000
|
trusted library allocation
|
page read and write
|
||
213C750A000
|
heap
|
page read and write
|
||
213C83B9000
|
heap
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
23D57AFC000
|
trusted library allocation
|
page read and write
|
||
23D4B4F4000
|
heap
|
page read and write
|
||
213C8200000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D42B38000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
23D42B10000
|
heap
|
page read and write
|
||
23D4F47F000
|
trusted library allocation
|
page read and write
|
||
23D42B65000
|
heap
|
page read and write
|
||
23D4FAE3000
|
trusted library allocation
|
page read and write
|
||
23D4E3F6000
|
trusted library allocation
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
23D4C1A6000
|
trusted library allocation
|
page read and write
|
||
23D4D70C000
|
trusted library allocation
|
page read and write
|
||
23D50DE6000
|
trusted library allocation
|
page read and write
|
||
213C7773000
|
trusted library allocation
|
page read and write
|
||
23D57A61000
|
trusted library allocation
|
page read and write
|
||
23D4B4E4000
|
heap
|
page read and write
|
||
23D48D9E000
|
trusted library allocation
|
page read and write
|
||
23D53EB9000
|
trusted library allocation
|
page read and write
|
||
23D4FAFD000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
213C83A8000
|
heap
|
page read and write
|
||
23D4FA3C000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4E184000
|
trusted library allocation
|
page read and write
|
||
23D4B989000
|
trusted library allocation
|
page read and write
|
||
23D57A9C000
|
trusted library allocation
|
page read and write
|
||
23D4B98F000
|
trusted library allocation
|
page read and write
|
||
23D50D28000
|
trusted library allocation
|
page read and write
|
||
BDA000
|
heap
|
page read and write
|
||
BFD478E000
|
unkown
|
page readonly
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
23D4C17A000
|
trusted library allocation
|
page read and write
|
||
213C83EC000
|
heap
|
page read and write
|
||
23D4D9D4000
|
trusted library allocation
|
page read and write
|
||
23D42B14000
|
heap
|
page read and write
|
||
23D4CAC3000
|
trusted library allocation
|
page read and write
|
||
23D4D791000
|
trusted library allocation
|
page read and write
|
||
23D4E34D000
|
trusted library allocation
|
page read and write
|
||
23D47B13000
|
trusted library allocation
|
page read and write
|
||
23D4D220000
|
trusted library allocation
|
page read and write
|
||
23D48A7F000
|
trusted library allocation
|
page read and write
|
||
23D4CEBE000
|
trusted library allocation
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D42B5A000
|
heap
|
page read and write
|
||
23D4CBE0000
|
trusted library allocation
|
page read and write
|
||
23D53FFD000
|
trusted library allocation
|
page read and write
|
||
23D48AE8000
|
trusted library allocation
|
page read and write
|
||
23D4E387000
|
trusted library allocation
|
page read and write
|
||
23D4E3F2000
|
trusted library allocation
|
page read and write
|
||
23D42B51000
|
heap
|
page read and write
|
||
B34000
|
unkown
|
page readonly
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D4BBA8000
|
trusted library allocation
|
page read and write
|
||
23D47B75000
|
trusted library allocation
|
page read and write
|
||
23D4BDFA000
|
trusted library allocation
|
page read and write
|
||
23D4FAA1000
|
trusted library allocation
|
page read and write
|
||
23D4D238000
|
trusted library allocation
|
page read and write
|
||
22D681EB000
|
trusted library allocation
|
page read and write
|
||
23D4DCFD000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D53E0F000
|
trusted library allocation
|
page read and write
|
||
213C83E8000
|
heap
|
page read and write
|
||
23D4CA96000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D586B0000
|
trusted library allocation
|
page read and write
|
||
23D4E39E000
|
trusted library allocation
|
page read and write
|
||
23D4CEF2000
|
trusted library allocation
|
page read and write
|
||
23D4CAF6000
|
trusted library allocation
|
page read and write
|
||
23D4B557000
|
trusted library allocation
|
page read and write
|
||
23D42B37000
|
heap
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D4D767000
|
trusted library allocation
|
page read and write
|
||
213C8445000
|
heap
|
page read and write
|
||
23D4E1DB000
|
trusted library allocation
|
page read and write
|
||
23D4E48D000
|
trusted library allocation
|
page read and write
|
||
23D4CD70000
|
trusted library allocation
|
page read and write
|
||
21DF2DD1000
|
trusted library allocation
|
page execute read
|
||
23D57AF0000
|
trusted library allocation
|
page read and write
|
||
23D4F4DA000
|
trusted library allocation
|
page read and write
|
||
23D4CA96000
|
trusted library allocation
|
page read and write
|
||
23D4E3FC000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
213C7500000
|
heap
|
page read and write
|
||
23D4D7C5000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D55A6E000
|
trusted library allocation
|
page read and write
|
||
1CAEF5D000
|
stack
|
page read and write
|
||
226BC882000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D42B1A000
|
heap
|
page read and write
|
||
23D4C15A000
|
trusted library allocation
|
page read and write
|
||
23D5434D000
|
trusted library allocation
|
page read and write
|
||
39D000
|
stack
|
page read and write
|
||
23D58697000
|
trusted library allocation
|
page read and write
|
||
23D57DF7000
|
trusted library allocation
|
page read and write
|
||
1EEA4105000
|
heap
|
page read and write
|
||
23D4CA26000
|
trusted library allocation
|
page read and write
|
||
23D55107000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4B9A3000
|
trusted library allocation
|
page read and write
|
||
23D42B0E000
|
heap
|
page read and write
|
||
2A00FFE000
|
stack
|
page read and write
|
||
22D67F23000
|
heap
|
page read and write
|
||
23D4DDC5000
|
trusted library allocation
|
page read and write
|
||
23D42B0E000
|
heap
|
page read and write
|
||
23D57BDB000
|
trusted library allocation
|
page read and write
|
||
23D586A9000
|
trusted library allocation
|
page read and write
|
||
23D50C40000
|
trusted library allocation
|
page read and write
|
||
23D4F8D8000
|
trusted library allocation
|
page read and write
|
||
23D4F47C000
|
trusted library allocation
|
page read and write
|
||
23D4C17A000
|
trusted library allocation
|
page read and write
|
||
213C8429000
|
heap
|
page read and write
|
||
226BC8DB000
|
trusted library allocation
|
page read and write
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D42B31000
|
heap
|
page read and write
|
||
23D4D7FD000
|
trusted library allocation
|
page read and write
|
||
23D53E24000
|
trusted library allocation
|
page read and write
|
||
23D57A56000
|
trusted library allocation
|
page read and write
|
||
23D55A72000
|
trusted library allocation
|
page read and write
|
||
23D57AFA000
|
trusted library allocation
|
page read and write
|
||
23D4BA54000
|
trusted library allocation
|
page read and write
|
||
23D4CD74000
|
trusted library allocation
|
page read and write
|
||
23D54A84000
|
trusted library allocation
|
page read and write
|
||
1EEA430A000
|
trusted library allocation
|
page read and write
|
||
23D48A69000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D4BBF5000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D57C4F000
|
trusted library allocation
|
page read and write
|
||
23D4FA36000
|
trusted library allocation
|
page read and write
|
||
23D50CA7000
|
trusted library allocation
|
page read and write
|
||
23D55143000
|
trusted library allocation
|
page read and write
|
||
23D4D256000
|
trusted library allocation
|
page read and write
|
||
226BCA07000
|
trusted library allocation
|
page read and write
|
||
23D56433000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D579E0000
|
trusted library allocation
|
page read and write
|
||
23D4E389000
|
trusted library allocation
|
page read and write
|
||
23D4F8B5000
|
trusted library allocation
|
page read and write
|
||
23D4E4B8000
|
trusted library allocation
|
page read and write
|
||
2AF7CE40000
|
heap
|
page read and write
|
||
23D42B30000
|
heap
|
page read and write
|
||
23D4CD72000
|
trusted library allocation
|
page read and write
|
||
23D57BFC000
|
trusted library allocation
|
page read and write
|
||
23D4BA83000
|
trusted library allocation
|
page read and write
|
||
23D4CEC9000
|
trusted library allocation
|
page read and write
|
||
23D4BDF6000
|
trusted library allocation
|
page read and write
|
||
23D4DD88000
|
trusted library allocation
|
page read and write
|
||
23D4B4D4000
|
heap
|
page read and write
|
||
23D4CBE6000
|
trusted library allocation
|
page read and write
|
||
23D48D4A000
|
trusted library allocation
|
page read and write
|
||
23D4F881000
|
trusted library allocation
|
page read and write
|
||
23D4BE29000
|
trusted library allocation
|
page read and write
|
||
23D4D23A000
|
trusted library allocation
|
page read and write
|
||
23D57DE7000
|
trusted library allocation
|
page read and write
|
||
23D4FAD2000
|
trusted library allocation
|
page read and write
|
||
23D4BBE0000
|
trusted library allocation
|
page read and write
|
||
23D4E240000
|
trusted library allocation
|
page read and write
|
||
23D4B233000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4D785000
|
trusted library allocation
|
page read and write
|
||
23D47D23000
|
trusted library allocation
|
page read and write
|
||
23D4D9FB000
|
trusted library allocation
|
page read and write
|
||
23D4D8B3000
|
trusted library allocation
|
page read and write
|
||
23D57CF6000
|
trusted library allocation
|
page read and write
|
||
23D4D8F7000
|
trusted library allocation
|
page read and write
|
||
23D48AD4000
|
trusted library allocation
|
page read and write
|
||
23D5436D000
|
trusted library allocation
|
page read and write
|
||
23D50C84000
|
trusted library allocation
|
page read and write
|
||
23D562C8000
|
trusted library allocation
|
page read and write
|
||
23D57DFB000
|
trusted library allocation
|
page read and write
|
||
23D586F0000
|
trusted library allocation
|
page read and write
|
||
23D5642C000
|
trusted library allocation
|
page read and write
|
||
23D57BFC000
|
trusted library allocation
|
page read and write
|
||
23D4C156000
|
trusted library allocation
|
page read and write
|
||
23D5867D000
|
trusted library allocation
|
page read and write
|
||
23D48A27000
|
trusted library allocation
|
page read and write
|
||
23D4C1F3000
|
trusted library allocation
|
page read and write
|
||
23D57CD5000
|
trusted library allocation
|
page read and write
|
||
23D585EC000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D576BE000
|
trusted library allocation
|
page read and write
|
||
226BC805000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4F0F5000
|
trusted library allocation
|
page read and write
|
||
23D53E6A000
|
trusted library allocation
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D4D84E000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4B279000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
213C775F000
|
trusted library allocation
|
page read and write
|
||
23D4F94B000
|
trusted library allocation
|
page read and write
|
||
23D57AF2000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D55201000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D4CFFA000
|
trusted library allocation
|
page read and write
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D4F029000
|
trusted library allocation
|
page read and write
|
||
213C75B0000
|
unclassified section
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D579FE000
|
trusted library allocation
|
page read and write
|
||
23D42B5F000
|
heap
|
page read and write
|
||
23D4E699000
|
trusted library allocation
|
page read and write
|
||
23D4F80D000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
22D68123000
|
trusted library allocation
|
page read and write
|
||
23D4D226000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D4B276000
|
trusted library allocation
|
page read and write
|
||
23D4BB92000
|
trusted library allocation
|
page read and write
|
||
23D4F9D2000
|
trusted library allocation
|
page read and write
|
||
23D4E4D9000
|
trusted library allocation
|
page read and write
|
||
23D4CBA3000
|
trusted library allocation
|
page read and write
|
||
23D54A9E000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D47A23000
|
trusted library allocation
|
page read and write
|
||
23D57D9F000
|
trusted library allocation
|
page read and write
|
||
23D4D796000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D4FAD5000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D42B54000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D4B4F6000
|
heap
|
page read and write
|
||
23D540D6000
|
trusted library allocation
|
page read and write
|
||
213C838A000
|
heap
|
page read and write
|
||
23D4C161000
|
trusted library allocation
|
page read and write
|
||
23D57D85000
|
trusted library allocation
|
page read and write
|
||
213C8360000
|
heap
|
page read and write
|
||
23D4CEF5000
|
trusted library allocation
|
page read and write
|
||
23D48CB3000
|
trusted library allocation
|
page read and write
|
||
23D42B36000
|
heap
|
page read and write
|
||
23D4D216000
|
trusted library allocation
|
page read and write
|
||
23D4D831000
|
trusted library allocation
|
page read and write
|
||
23D42B2B000
|
heap
|
page read and write
|
||
23D48DF6000
|
trusted library allocation
|
page read and write
|
||
23D57DA5000
|
trusted library allocation
|
page read and write
|
||
23D42B13000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D4CAE3000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
23D4D786000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
22D67DE0000
|
unclassified section
|
page read and write
|
||
23D4BBA8000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D5850D000
|
trusted library allocation
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
23D4F9FD000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D4F9D2000
|
trusted library allocation
|
page read and write
|
||
23D4C19E000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4B217000
|
trusted library allocation
|
page read and write
|
||
23D579E0000
|
trusted library allocation
|
page read and write
|
||
23D4BBCE000
|
trusted library allocation
|
page read and write
|
||
226BC867000
|
trusted library allocation
|
page read and write
|
||
23D4D863000
|
trusted library allocation
|
page read and write
|
||
23D4CB5B000
|
trusted library allocation
|
page read and write
|
||
23D543A7000
|
trusted library allocation
|
page read and write
|
||
23D4D247000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
23D55A6B000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D4E1D6000
|
trusted library allocation
|
page read and write
|
||
23D4FA38000
|
trusted library allocation
|
page read and write
|
||
23D57A96000
|
trusted library allocation
|
page read and write
|
||
23D573B3000
|
trusted library allocation
|
page read and write
|
||
23D4CE5C000
|
trusted library allocation
|
page read and write
|
||
23D4BB87000
|
trusted library allocation
|
page read and write
|
||
23D4D84C000
|
trusted library allocation
|
page read and write
|
||
23D540F7000
|
trusted library allocation
|
page read and write
|
||
23D4F03E000
|
trusted library allocation
|
page read and write
|
||
23D540C8000
|
trusted library allocation
|
page read and write
|
||
23D4E370000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4D757000
|
trusted library allocation
|
page read and write
|
||
23D4D7BE000
|
trusted library allocation
|
page read and write
|
||
23D4DDF4000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D585AC000
|
trusted library allocation
|
page read and write
|
||
23D579E4000
|
trusted library allocation
|
page read and write
|
||
23D4B2A1000
|
trusted library allocation
|
page read and write
|
||
23D4C1FC000
|
trusted library allocation
|
page read and write
|
||
213C8360000
|
heap
|
page read and write
|
||
23D540BE000
|
trusted library allocation
|
page read and write
|
||
23D4F9C3000
|
trusted library allocation
|
page read and write
|
||
23D4D853000
|
trusted library allocation
|
page read and write
|
||
23D474DF000
|
trusted library allocation
|
page read and write
|
||
23D4BE53000
|
trusted library allocation
|
page read and write
|
||
23D50C40000
|
trusted library allocation
|
page read and write
|
||
213C8360000
|
heap
|
page read and write
|
||
213C83EC000
|
heap
|
page read and write
|
||
213C83E0000
|
heap
|
page read and write
|
||
23D57AEE000
|
trusted library allocation
|
page read and write
|
||
213C77C4000
|
trusted library allocation
|
page read and write
|
||
23D4CBAB000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4F820000
|
trusted library allocation
|
page read and write
|
||
1EEA415A000
|
heap
|
page read and write
|
||
23D4CA74000
|
trusted library allocation
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D57A61000
|
trusted library allocation
|
page read and write
|
||
23D4BC93000
|
trusted library allocation
|
page read and write
|
||
23D57D61000
|
trusted library allocation
|
page read and write
|
||
23D4D8D3000
|
trusted library allocation
|
page read and write
|
||
23D4B4D6000
|
heap
|
page read and write
|
||
23D55AAD000
|
trusted library allocation
|
page read and write
|
||
23D540F5000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
22D67D40000
|
heap
|
page read and write
|
||
23D4CEC0000
|
trusted library allocation
|
page read and write
|
||
1EEA4200000
|
trusted library allocation
|
page read and write
|
||
23D4BBC2000
|
trusted library allocation
|
page read and write
|
||
23D573F0000
|
trusted library allocation
|
page read and write
|
||
23D4B228000
|
trusted library allocation
|
page read and write
|
||
1EEA4150000
|
heap
|
page read and write
|
||
23D48DBE000
|
trusted library allocation
|
page read and write
|
||
23D4CA3C000
|
trusted library allocation
|
page read and write
|
||
23D4BA63000
|
trusted library allocation
|
page read and write
|
||
23D55A72000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
213C83F1000
|
heap
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
213C7CBF000
|
unkown
|
page execute read
|
||
23D4E353000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4D866000
|
trusted library allocation
|
page read and write
|
||
23D4FAD5000
|
trusted library allocation
|
page read and write
|
||
23D57AF4000
|
trusted library allocation
|
page read and write
|
||
23D4D83B000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D4DD82000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4DE94000
|
trusted library allocation
|
page read and write
|
||
22D68373000
|
heap
|
page read and write
|
||
23D53F60000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4F4D1000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D57DC1000
|
trusted library allocation
|
page read and write
|
||
23D4FADF000
|
trusted library allocation
|
page read and write
|
||
23D4F4E4000
|
trusted library allocation
|
page read and write
|
||
23D4DD73000
|
trusted library allocation
|
page read and write
|
||
23D549AC000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4B22A000
|
trusted library allocation
|
page read and write
|
||
23D57A92000
|
trusted library allocation
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D57AFA000
|
trusted library allocation
|
page read and write
|
||
23D585FB000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4DD8D000
|
trusted library allocation
|
page read and write
|
||
213C838A000
|
heap
|
page read and write
|
||
1EEA4300000
|
trusted library allocation
|
page read and write
|
||
23D5798C000
|
trusted library allocation
|
page read and write
|
||
23D4F008000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D57BFC000
|
trusted library allocation
|
page read and write
|
||
23D57AFA000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
213C8360000
|
heap
|
page read and write
|
||
23D42B8F000
|
heap
|
page read and write
|
||
23D50C7D000
|
trusted library allocation
|
page read and write
|
||
23D4DFEC000
|
trusted library allocation
|
page read and write
|
||
23D55AA3000
|
trusted library allocation
|
page read and write
|
||
23D48AD9000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
23D4E3D0000
|
trusted library allocation
|
page read and write
|
||
23D5864C000
|
trusted library allocation
|
page read and write
|
||
23D4E0AB000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4E18D000
|
trusted library allocation
|
page read and write
|
||
23D4B9D4000
|
trusted library allocation
|
page read and write
|
||
23D4BBC7000
|
trusted library allocation
|
page read and write
|
||
23D586B9000
|
trusted library allocation
|
page read and write
|
||
23D55AA3000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4CEF2000
|
trusted library allocation
|
page read and write
|
||
23D55AC9000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
D0CB51D000
|
stack
|
page read and write
|
||
23D4D8DA000
|
trusted library allocation
|
page read and write
|
||
23D57AF8000
|
trusted library allocation
|
page read and write
|
||
23D4D29C000
|
trusted library allocation
|
page read and write
|
||
23D4D840000
|
trusted library allocation
|
page read and write
|
||
23D58537000
|
trusted library allocation
|
page read and write
|
||
23D57C20000
|
trusted library allocation
|
page read and write
|
||
23D48DBE000
|
trusted library allocation
|
page read and write
|
||
23D4D8E6000
|
trusted library allocation
|
page read and write
|
||
23D4BBA1000
|
trusted library allocation
|
page read and write
|
||
23D4BBC2000
|
trusted library allocation
|
page read and write
|
||
1CAEF1E000
|
unkown
|
page readonly
|
||
23D4DED8000
|
trusted library allocation
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4BB6C000
|
trusted library allocation
|
page read and write
|
||
23D55A7A000
|
trusted library allocation
|
page read and write
|
||
213C7CBB000
|
unkown
|
page execute read
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
226BC350000
|
remote allocation
|
page read and write
|
||
23D4C130000
|
trusted library allocation
|
page read and write
|
||
213C74E0000
|
heap
|
page read and write
|
||
23D4BA83000
|
trusted library allocation
|
page read and write
|
||
23D57D72000
|
trusted library allocation
|
page read and write
|
||
23D4D7C5000
|
trusted library allocation
|
page read and write
|
||
23D5794E000
|
trusted library allocation
|
page read and write
|
||
23D4C16D000
|
trusted library allocation
|
page read and write
|
||
23D42B37000
|
heap
|
page read and write
|
||
23D4C138000
|
trusted library allocation
|
page read and write
|
||
23D4D85A000
|
trusted library allocation
|
page read and write
|
||
23D42B54000
|
heap
|
page read and write
|
||
23D4F9D5000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
23D573F5000
|
trusted library allocation
|
page read and write
|
||
23D4B4E8000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
22D68232000
|
trusted library allocation
|
page read and write
|
||
23D55A9C000
|
trusted library allocation
|
page read and write
|
||
23D4D83D000
|
trusted library allocation
|
page read and write
|
||
23D579E2000
|
trusted library allocation
|
page read and write
|
||
22D67D20000
|
unclassified section
|
page readonly
|
||
23D56287000
|
trusted library allocation
|
page read and write
|
||
23D4E38B000
|
trusted library allocation
|
page read and write
|
||
23D57FC2000
|
heap
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D4CA74000
|
trusted library allocation
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
23D4FA40000
|
trusted library allocation
|
page read and write
|
||
213C83F1000
|
heap
|
page read and write
|
||
23D4C122000
|
trusted library allocation
|
page read and write
|
||
23D4D7C7000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
23D4BA61000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D4FA3C000
|
trusted library allocation
|
page read and write
|
||
23D57BB9000
|
trusted library allocation
|
page read and write
|
||
23D4BCA7000
|
trusted library allocation
|
page read and write
|
||
22D67D00000
|
remote allocation
|
page read and write
|
||
23D57CFD000
|
trusted library allocation
|
page read and write
|
||
23D57D9F000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4B989000
|
trusted library allocation
|
page read and write
|
||
23D57CBE000
|
trusted library allocation
|
page read and write
|
||
213C836C000
|
heap
|
page read and write
|
||
23D57BEB000
|
trusted library allocation
|
page read and write
|
||
23D47B26000
|
trusted library allocation
|
page read and write
|
||
23D4D7AF000
|
trusted library allocation
|
page read and write
|
||
23D4B25F000
|
trusted library allocation
|
page read and write
|
||
23D4D876000
|
trusted library allocation
|
page read and write
|
||
23D4E610000
|
trusted library allocation
|
page read and write
|
||
23D57974000
|
trusted library allocation
|
page read and write
|
||
23D4E18D000
|
trusted library allocation
|
page read and write
|
||
23D4BBC2000
|
trusted library allocation
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D47BE3000
|
trusted library allocation
|
page read and write
|
||
23D4F075000
|
trusted library allocation
|
page read and write
|
||
23D50C4A000
|
trusted library allocation
|
page read and write
|
||
2A02FFE000
|
stack
|
page read and write
|
||
23D4CAD2000
|
trusted library allocation
|
page read and write
|
||
23D4F7F3000
|
trusted library allocation
|
page read and write
|
||
22D681BA000
|
trusted library allocation
|
page read and write
|
||
23D57A9E000
|
trusted library allocation
|
page read and write
|
||
23D4F837000
|
trusted library allocation
|
page read and write
|
||
23D5859B000
|
trusted library allocation
|
page read and write
|
||
23D4C185000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D57FC2000
|
heap
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
226BC803000
|
trusted library allocation
|
page read and write
|
||
23D4BBD9000
|
trusted library allocation
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D4CE66000
|
trusted library allocation
|
page read and write
|
||
23D542C8000
|
trusted library allocation
|
page read and write
|
||
23D4BA60000
|
trusted library allocation
|
page read and write
|
||
23D4F860000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D42B57000
|
heap
|
page read and write
|
||
23D4E10B000
|
trusted library allocation
|
page read and write
|
||
23D4FA1C000
|
trusted library allocation
|
page read and write
|
||
23D4E10B000
|
trusted library allocation
|
page read and write
|
||
23D4D86B000
|
trusted library allocation
|
page read and write
|
||
23D573B5000
|
trusted library allocation
|
page read and write
|
||
23D4C1EF000
|
trusted library allocation
|
page read and write
|
||
213C7D00000
|
heap
|
page read and write
|
||
23D4CA64000
|
trusted library allocation
|
page read and write
|
||
23D5795E000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D4FA93000
|
trusted library allocation
|
page read and write
|
||
23D562A3000
|
trusted library allocation
|
page read and write
|
||
23D4D8FA000
|
trusted library allocation
|
page read and write
|
||
23D4F835000
|
trusted library allocation
|
page read and write
|
||
23D4B93F000
|
trusted library allocation
|
page read and write
|
||
226BC46A000
|
heap
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D5427F000
|
trusted library allocation
|
page read and write
|
||
213C837D000
|
heap
|
page read and write
|
||
23D4C17A000
|
trusted library allocation
|
page read and write
|
||
23D4C11A000
|
trusted library allocation
|
page read and write
|
||
23D4B508000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D53F68000
|
trusted library allocation
|
page read and write
|
||
23D4E2C5000
|
trusted library allocation
|
page read and write
|
||
23D57CD2000
|
trusted library allocation
|
page read and write
|
||
23D4E344000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D4CA32000
|
trusted library allocation
|
page read and write
|
||
23D4D233000
|
trusted library allocation
|
page read and write
|
||
23D53F5F000
|
trusted library allocation
|
page read and write
|
||
23D4FAB1000
|
trusted library allocation
|
page read and write
|
||
22D67E28000
|
heap
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D4CDAD000
|
trusted library allocation
|
page read and write
|
||
23D4F6E3000
|
trusted library allocation
|
page read and write
|
||
23D57DF2000
|
trusted library allocation
|
page read and write
|
||
23D4D7C7000
|
trusted library allocation
|
page read and write
|
||
23D4B98F000
|
trusted library allocation
|
page read and write
|
||
23D55AC9000
|
trusted library allocation
|
page read and write
|
||
23D48D90000
|
trusted library allocation
|
page read and write
|
||
23D4D9E2000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D586D6000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D4BBE0000
|
trusted library allocation
|
page read and write
|
||
23D57DDA000
|
trusted library allocation
|
page read and write
|
||
23D4B4E8000
|
heap
|
page read and write
|
||
23D585AA000
|
trusted library allocation
|
page read and write
|
||
23D4C19E000
|
trusted library allocation
|
page read and write
|
||
23D4E2DD000
|
trusted library allocation
|
page read and write
|
||
23D48AC0000
|
trusted library allocation
|
page read and write
|
||
23D4BB76000
|
trusted library allocation
|
page read and write
|
||
23D4B4E4000
|
heap
|
page read and write
|
||
23D4D89C000
|
trusted library allocation
|
page read and write
|
||
23D4BBD9000
|
trusted library allocation
|
page read and write
|
||
213C8469000
|
heap
|
page read and write
|
||
213C83E0000
|
heap
|
page read and write
|
||
23D55AC2000
|
trusted library allocation
|
page read and write
|
||
23D4B4D5000
|
heap
|
page read and write
|
||
23D4CD9C000
|
trusted library allocation
|
page read and write
|
||
23D4BBC2000
|
trusted library allocation
|
page read and write
|
||
23D551A7000
|
trusted library allocation
|
page read and write
|
||
23D4BB54000
|
trusted library allocation
|
page read and write
|
||
23D48A5E000
|
trusted library allocation
|
page read and write
|
||
23D4F8C0000
|
trusted library allocation
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D55AD1000
|
trusted library allocation
|
page read and write
|
||
23D4B5CB000
|
trusted library allocation
|
page read and write
|
||
213C75C0000
|
trusted library allocation
|
page read and write
|
||
23D4CB94000
|
trusted library allocation
|
page read and write
|
||
23D5862E000
|
trusted library allocation
|
page read and write
|
||
23D4B4D6000
|
heap
|
page read and write
|
||
23D57D9F000
|
trusted library allocation
|
page read and write
|
||
23D57DF6000
|
trusted library allocation
|
page read and write
|
||
23D4D876000
|
trusted library allocation
|
page read and write
|
||
23D5869F000
|
trusted library allocation
|
page read and write
|
||
23D4F04E000
|
trusted library allocation
|
page read and write
|
||
23D54950000
|
trusted library allocation
|
page read and write
|
||
23D50D58000
|
trusted library allocation
|
page read and write
|
||
23D54093000
|
trusted library allocation
|
page read and write
|
||
23D4BBCE000
|
trusted library allocation
|
page read and write
|
||
23D57967000
|
trusted library allocation
|
page read and write
|
||
23D4CA84000
|
trusted library allocation
|
page read and write
|
||
23D4D8F7000
|
trusted library allocation
|
page read and write
|
||
23D4F9A1000
|
trusted library allocation
|
page read and write
|
||
23D42B28000
|
heap
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D4CB6B000
|
trusted library allocation
|
page read and write
|
||
23D4CA58000
|
trusted library allocation
|
page read and write
|
||
23D4F9BC000
|
trusted library allocation
|
page read and write
|
||
213C83EC000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4CD6E000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4D7BE000
|
trusted library allocation
|
page read and write
|
||
23D4B2B3000
|
trusted library allocation
|
page read and write
|
||
213C77BA000
|
trusted library allocation
|
page read and write
|
||
23D3DA78000
|
heap
|
page read and write
|
||
23D4E14B000
|
trusted library allocation
|
page read and write
|
||
23D579FE000
|
trusted library allocation
|
page read and write
|
||
23D48AB8000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D573E8000
|
trusted library allocation
|
page read and write
|
||
23D57DDA000
|
trusted library allocation
|
page read and write
|
||
213C83E9000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
226BCB0C000
|
trusted library allocation
|
page read and write
|
||
23D4F451000
|
trusted library allocation
|
page read and write
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D4D23B000
|
trusted library allocation
|
page read and write
|
||
23D474EF000
|
trusted library allocation
|
page read and write
|
||
23D4B2BC000
|
trusted library allocation
|
page read and write
|
||
23D4E196000
|
trusted library allocation
|
page read and write
|
||
23D57AFA000
|
trusted library allocation
|
page read and write
|
||
23D42B5A000
|
heap
|
page read and write
|
||
23D4FA44000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
213C83FC000
|
heap
|
page read and write
|
||
1CB1ABE000
|
stack
|
page read and write
|
||
23D4D107000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D48A7D000
|
trusted library allocation
|
page read and write
|
||
23D4E3D0000
|
trusted library allocation
|
page read and write
|
||
23D4BDE1000
|
trusted library allocation
|
page read and write
|
||
23D4BD5D000
|
trusted library allocation
|
page read and write
|
||
23D4D796000
|
trusted library allocation
|
page read and write
|
||
23D55AC2000
|
trusted library allocation
|
page read and write
|
||
23D42B26000
|
heap
|
page read and write
|
||
23D4BBBB000
|
trusted library allocation
|
page read and write
|
||
23D576BD000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D4D788000
|
trusted library allocation
|
page read and write
|
||
23D50CAE000
|
trusted library allocation
|
page read and write
|
||
23D4C1B6000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
23D576E0000
|
trusted library allocation
|
page read and write
|
||
2A7FDFB000
|
stack
|
page read and write
|
||
23D4D7A5000
|
trusted library allocation
|
page read and write
|
||
23D4C1FC000
|
trusted library allocation
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
23D57DE3000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
213C8369000
|
heap
|
page read and write
|
||
23D4F416000
|
trusted library allocation
|
page read and write
|
||
23D53F68000
|
trusted library allocation
|
page read and write
|
||
23D4D22C000
|
trusted library allocation
|
page read and write
|
||
23D57C0E000
|
trusted library allocation
|
page read and write
|
||
23D4C16D000
|
trusted library allocation
|
page read and write
|
||
213C7781000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4CF34000
|
trusted library allocation
|
page read and write
|
||
23D4BB90000
|
trusted library allocation
|
page read and write
|
||
23D4F44A000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D579E6000
|
trusted library allocation
|
page read and write
|
||
23D4F4D8000
|
trusted library allocation
|
page read and write
|
||
23D4B4CF000
|
heap
|
page read and write
|
||
23D4BA54000
|
trusted library allocation
|
page read and write
|
||
23D57B9E000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D5868F000
|
trusted library allocation
|
page read and write
|
||
23D4F02D000
|
trusted library allocation
|
page read and write
|
||
23D4B4E5000
|
heap
|
page read and write
|
||
213C8429000
|
heap
|
page read and write
|
||
23D4BBFB000
|
trusted library allocation
|
page read and write
|
||
23D4B9D9000
|
trusted library allocation
|
page read and write
|
||
23D540C1000
|
trusted library allocation
|
page read and write
|
||
213C8360000
|
heap
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D4CB7E000
|
trusted library allocation
|
page read and write
|
||
23D50CD7000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4D84E000
|
trusted library allocation
|
page read and write
|
||
23D4E100000
|
trusted library allocation
|
page read and write
|
||
23D4E1F7000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D57D98000
|
trusted library allocation
|
page read and write
|
||
23D4D7C1000
|
trusted library allocation
|
page read and write
|
||
23D563A7000
|
trusted library allocation
|
page read and write
|
||
23D586C9000
|
trusted library allocation
|
page read and write
|
||
226BC870000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4D833000
|
trusted library allocation
|
page read and write
|
||
23D57DDF000
|
trusted library allocation
|
page read and write
|
||
23D4B989000
|
trusted library allocation
|
page read and write
|
||
23D576FE000
|
trusted library allocation
|
page read and write
|
||
23D4E389000
|
trusted library allocation
|
page read and write
|
||
23D4BA4F000
|
trusted library allocation
|
page read and write
|
||
23D4BA64000
|
trusted library allocation
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
23D4D2B6000
|
trusted library allocation
|
page read and write
|
||
23D4D7BE000
|
trusted library allocation
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D4CBE6000
|
trusted library allocation
|
page read and write
|
||
23D4D26D000
|
trusted library allocation
|
page read and write
|
||
23D50C6E000
|
trusted library allocation
|
page read and write
|
||
23D4F686000
|
trusted library allocation
|
page read and write
|
||
23D550F1000
|
trusted library allocation
|
page read and write
|
||
23D5864B000
|
trusted library allocation
|
page read and write
|
||
23D57D0E000
|
trusted library allocation
|
page read and write
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
23D48DDD000
|
trusted library allocation
|
page read and write
|
||
23D550CE000
|
trusted library allocation
|
page read and write
|
||
23D4B2FD000
|
trusted library allocation
|
page read and write
|
||
23D42B0E000
|
heap
|
page read and write
|
||
23D48E32000
|
trusted library allocation
|
page read and write
|
||
23D4FAD5000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4E11C000
|
trusted library allocation
|
page read and write
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D4D842000
|
trusted library allocation
|
page read and write
|
||
23D4E485000
|
trusted library allocation
|
page read and write
|
||
23D50CA4000
|
trusted library allocation
|
page read and write
|
||
23D42B51000
|
heap
|
page read and write
|
||
213C83AA000
|
heap
|
page read and write
|
||
23D4BD95000
|
trusted library allocation
|
page read and write
|
||
23D57626000
|
trusted library allocation
|
page read and write
|
||
226BC830000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
23D50C69000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
213C7712000
|
trusted library allocation
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
23D4CA60000
|
trusted library allocation
|
page read and write
|
||
23D4E3B2000
|
trusted library allocation
|
page read and write
|
||
23D4E4CD000
|
trusted library allocation
|
page read and write
|
||
23D4CA16000
|
trusted library allocation
|
page read and write
|
||
23D4D9C1000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D4F4D1000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D54086000
|
trusted library allocation
|
page read and write
|
||
23D50C6E000
|
trusted library allocation
|
page read and write
|
||
23D4B997000
|
trusted library allocation
|
page read and write
|
||
23D4CACF000
|
trusted library allocation
|
page read and write
|
||
23D586B0000
|
trusted library allocation
|
page read and write
|
||
23D48A1F000
|
trusted library allocation
|
page read and write
|
||
23D4CA84000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D57C64000
|
trusted library allocation
|
page read and write
|
||
23D4BD56000
|
trusted library allocation
|
page read and write
|
||
23D53EB9000
|
trusted library allocation
|
page read and write
|
||
23D50C4C000
|
trusted library allocation
|
page read and write
|
||
23D4D6F6000
|
trusted library allocation
|
page read and write
|
||
23D4BDC8000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D50C6E000
|
trusted library allocation
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D48CC4000
|
trusted library allocation
|
page read and write
|
||
213C83B2000
|
heap
|
page read and write
|
||
23D4E485000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D579DE000
|
trusted library allocation
|
page read and write
|
||
226BC8F2000
|
trusted library allocation
|
page read and write
|
||
23D4E37E000
|
trusted library allocation
|
page read and write
|
||
23D4B2D2000
|
trusted library allocation
|
page read and write
|
||
23D4B2A9000
|
trusted library allocation
|
page read and write
|
||
23D4F8DA000
|
trusted library allocation
|
page read and write
|
||
23D42B1A000
|
heap
|
page read and write
|
||
23D53FBF000
|
trusted library allocation
|
page read and write
|
||
23D57BE0000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
22D68172000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D42B2A000
|
heap
|
page read and write
|
||
23D4E3C7000
|
trusted library allocation
|
page read and write
|
||
23D4E3F2000
|
trusted library allocation
|
page read and write
|
||
22D6810D000
|
trusted library allocation
|
page read and write
|
||
23D4D711000
|
trusted library allocation
|
page read and write
|
||
23D57A98000
|
trusted library allocation
|
page read and write
|
||
23D4B9D0000
|
trusted library allocation
|
page read and write
|
||
23D4B261000
|
trusted library allocation
|
page read and write
|
||
23D4E3B7000
|
trusted library allocation
|
page read and write
|
||
23D57F53000
|
heap
|
page read and write
|
||
23D4BD5A000
|
trusted library allocation
|
page read and write
|
||
23D42B6C000
|
heap
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4B261000
|
trusted library allocation
|
page read and write
|
||
23D4D833000
|
trusted library allocation
|
page read and write
|
||
23D4BBCA000
|
trusted library allocation
|
page read and write
|
||
23D4FAA4000
|
trusted library allocation
|
page read and write
|
||
23D4F9BC000
|
trusted library allocation
|
page read and write
|
||
23D4F0F2000
|
trusted library allocation
|
page read and write
|
||
23D4D27A000
|
trusted library allocation
|
page read and write
|
||
23D57A92000
|
trusted library allocation
|
page read and write
|
||
213C843B000
|
heap
|
page read and write
|
||
23D55A6B000
|
trusted library allocation
|
page read and write
|
||
213C83E3000
|
heap
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
213C836C000
|
heap
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D57BA4000
|
trusted library allocation
|
page read and write
|
||
23D50C5B000
|
trusted library allocation
|
page read and write
|
||
213C7764000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D540C8000
|
trusted library allocation
|
page read and write
|
||
23D4D2FE000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D474EF000
|
trusted library allocation
|
page read and write
|
||
23D4B4F6000
|
heap
|
page read and write
|
||
23D4F835000
|
trusted library allocation
|
page read and write
|
||
23D57AF2000
|
trusted library allocation
|
page read and write
|
||
23D586C9000
|
trusted library allocation
|
page read and write
|
||
213C835C000
|
heap
|
page read and write
|
||
2AF7D207000
|
trusted library allocation
|
page read and write
|
||
23D4CA9D000
|
trusted library allocation
|
page read and write
|
||
23D4BA63000
|
trusted library allocation
|
page read and write
|
||
23D4C191000
|
trusted library allocation
|
page read and write
|
||
23D4BBE3000
|
trusted library allocation
|
page read and write
|
||
23D4E35B000
|
trusted library allocation
|
page read and write
|
||
23D4CAE3000
|
trusted library allocation
|
page read and write
|
||
23D4CA41000
|
trusted library allocation
|
page read and write
|
||
23D4FAE3000
|
trusted library allocation
|
page read and write
|
||
23D4CEA4000
|
trusted library allocation
|
page read and write
|
||
23D4DF13000
|
trusted library allocation
|
page read and write
|
||
2AF7CF30000
|
heap
|
page read and write
|
||
23D585BA000
|
trusted library allocation
|
page read and write
|
||
23D4E353000
|
trusted library allocation
|
page read and write
|
||
23D579FE000
|
trusted library allocation
|
page read and write
|
||
23D4F7FC000
|
trusted library allocation
|
page read and write
|
||
23D4E392000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D579E2000
|
trusted library allocation
|
page read and write
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D57A65000
|
trusted library allocation
|
page read and write
|
||
23D4CA91000
|
trusted library allocation
|
page read and write
|
||
23D4FA2E000
|
trusted library allocation
|
page read and write
|
||
23D42B3E000
|
heap
|
page read and write
|
||
23D53EA9000
|
trusted library allocation
|
page read and write
|
||
23D4F8B5000
|
trusted library allocation
|
page read and write
|
||
23D4F9A1000
|
trusted library allocation
|
page read and write
|
||
23D585EC000
|
trusted library allocation
|
page read and write
|
||
23D4E39E000
|
trusted library allocation
|
page read and write
|
||
23D57FC2000
|
heap
|
page read and write
|
||
1EEA5BB8000
|
heap
|
page read and write
|
||
23D50CA7000
|
trusted library allocation
|
page read and write
|
||
23D57AD5000
|
trusted library allocation
|
page read and write
|
||
23D55AC2000
|
trusted library allocation
|
page read and write
|
||
213C842D000
|
heap
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4BA61000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
23D4CEF2000
|
trusted library allocation
|
page read and write
|
||
23D4B98F000
|
trusted library allocation
|
page read and write
|
||
23D4E49B000
|
trusted library allocation
|
page read and write
|
||
23D57D87000
|
trusted library allocation
|
page read and write
|
||
23D4B4F2000
|
heap
|
page read and write
|
||
23D4CE38000
|
trusted library allocation
|
page read and write
|
||
23D540DD000
|
trusted library allocation
|
page read and write
|
||
23D57BBC000
|
trusted library allocation
|
page read and write
|
||
23D4E146000
|
trusted library allocation
|
page read and write
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
23D4D8DD000
|
trusted library allocation
|
page read and write
|
||
23D4E3A4000
|
trusted library allocation
|
page read and write
|
||
23D540DD000
|
trusted library allocation
|
page read and write
|
||
23D55167000
|
trusted library allocation
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D48DE5000
|
trusted library allocation
|
page read and write
|
||
23D576E0000
|
trusted library allocation
|
page read and write
|
||
22D6817A000
|
trusted library allocation
|
page read and write
|
||
23D57A92000
|
trusted library allocation
|
page read and write
|
||
23D57A9A000
|
trusted library allocation
|
page read and write
|
||
23D4F949000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D4D7B7000
|
trusted library allocation
|
page read and write
|
||
2AF7CFD0000
|
heap
|
page read and write
|
||
BB7000
|
heap
|
page read and write
|
||
23D4D213000
|
trusted library allocation
|
page read and write
|
||
23D57A9C000
|
trusted library allocation
|
page read and write
|
||
23D4C158000
|
trusted library allocation
|
page read and write
|
||
23D4BE41000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4D9F2000
|
trusted library allocation
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
23D4F4E4000
|
trusted library allocation
|
page read and write
|
||
23D4E6D6000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D4B4CF000
|
heap
|
page read and write
|
||
23D53F7F000
|
trusted library allocation
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
213C7786000
|
trusted library allocation
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D4CFE0000
|
trusted library allocation
|
page read and write
|
||
23D4E3A8000
|
trusted library allocation
|
page read and write
|
||
23D4C13D000
|
trusted library allocation
|
page read and write
|
||
23D55A78000
|
trusted library allocation
|
page read and write
|
||
23D5430C000
|
trusted library allocation
|
page read and write
|
||
23D42B0E000
|
heap
|
page read and write
|
||
22D68378000
|
heap
|
page read and write
|
||
23D4F9A1000
|
trusted library allocation
|
page read and write
|
||
23D55A33000
|
trusted library allocation
|
page read and write
|
||
23D4F8B5000
|
trusted library allocation
|
page read and write
|
||
23D4F40F000
|
trusted library allocation
|
page read and write
|
||
23D53E23000
|
trusted library allocation
|
page read and write
|
||
23D586EC000
|
trusted library allocation
|
page read and write
|
||
23D4D796000
|
trusted library allocation
|
page read and write
|
||
23D4F4D6000
|
trusted library allocation
|
page read and write
|
||
23D4F3CD000
|
trusted library allocation
|
page read and write
|
||
23D4BBE0000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
213C7C60000
|
trusted library section
|
page readonly
|
||
23D4D786000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4D9B6000
|
trusted library allocation
|
page read and write
|
||
23D50CB3000
|
trusted library allocation
|
page read and write
|
||
23D4F9DF000
|
trusted library allocation
|
page read and write
|
||
23D4BB92000
|
trusted library allocation
|
page read and write
|
||
23D4CADF000
|
trusted library allocation
|
page read and write
|
||
BFD464C000
|
stack
|
page read and write
|
||
23D57DFB000
|
trusted library allocation
|
page read and write
|
||
23D48D9A000
|
trusted library allocation
|
page read and write
|
||
23D55AB7000
|
trusted library allocation
|
page read and write
|
||
23D47C00000
|
trusted library allocation
|
page read and write
|
||
23D4DFCB000
|
trusted library allocation
|
page read and write
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D4D791000
|
trusted library allocation
|
page read and write
|
||
22D681C8000
|
trusted library allocation
|
page read and write
|
||
23D57BAB000
|
trusted library allocation
|
page read and write
|
||
23D47BF0000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
BFD51D8000
|
stack
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D55A9C000
|
trusted library allocation
|
page read and write
|
||
213C834D000
|
heap
|
page read and write
|
||
22D6815B000
|
trusted library allocation
|
page read and write
|
||
35B1000
|
heap
|
page read and write
|
||
23D55A84000
|
trusted library allocation
|
page read and write
|
||
23D48A6A000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D55233000
|
trusted library allocation
|
page read and write
|
||
23D57DC1000
|
trusted library allocation
|
page read and write
|
||
23D53F7F000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D4CB4E000
|
trusted library allocation
|
page read and write
|
||
1EEA4182000
|
heap
|
page read and write
|
||
23D4CADF000
|
trusted library allocation
|
page read and write
|
||
23D4E6A4000
|
trusted library allocation
|
page read and write
|
||
23D3DA6C000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D48AC4000
|
trusted library allocation
|
page read and write
|
||
1EEA415F000
|
heap
|
page read and write
|
||
23D53E40000
|
trusted library allocation
|
page read and write
|
||
23D4D959000
|
trusted library allocation
|
page read and write
|
||
23D57A94000
|
trusted library allocation
|
page read and write
|
||
23D585FB000
|
trusted library allocation
|
page read and write
|
||
23D586B0000
|
trusted library allocation
|
page read and write
|
||
23D4CB9E000
|
trusted library allocation
|
page read and write
|
||
23D5859F000
|
trusted library allocation
|
page read and write
|
||
23D5733A000
|
trusted library allocation
|
page read and write
|
||
23D54343000
|
trusted library allocation
|
page read and write
|
||
23D4BBC2000
|
trusted library allocation
|
page read and write
|
||
23D4F9D5000
|
trusted library allocation
|
page read and write
|
||
23D4B5D9000
|
trusted library allocation
|
page read and write
|
||
23D4F6DE000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4E2C9000
|
trusted library allocation
|
page read and write
|
||
23D50C69000
|
trusted library allocation
|
page read and write
|
||
23D55AB7000
|
trusted library allocation
|
page read and write
|
||
23D4CFF7000
|
trusted library allocation
|
page read and write
|
||
23D4F945000
|
trusted library allocation
|
page read and write
|
||
23D57E8C000
|
heap
|
page read and write
|
||
23D4FA99000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4E1BA000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D5798C000
|
trusted library allocation
|
page read and write
|
||
23D57967000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D540CF000
|
trusted library allocation
|
page read and write
|
||
23D42B50000
|
heap
|
page read and write
|
||
22D6820F000
|
trusted library allocation
|
page read and write
|
||
23D4D288000
|
trusted library allocation
|
page read and write
|
||
23D4CB59000
|
trusted library allocation
|
page read and write
|
||
23D4CEB7000
|
trusted library allocation
|
page read and write
|
||
23D5851A000
|
trusted library allocation
|
page read and write
|
||
213C7703000
|
trusted library allocation
|
page read and write
|
||
23D4CDC5000
|
trusted library allocation
|
page read and write
|
||
23D57AF0000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D4FAB7000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D57CF6000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
213C835C000
|
heap
|
page read and write
|
||
23D4CAD0000
|
trusted library allocation
|
page read and write
|
||
23D4B4D6000
|
heap
|
page read and write
|
||
23D4F496000
|
trusted library allocation
|
page read and write
|
||
23D4F8DA000
|
trusted library allocation
|
page read and write
|
||
23D4D6E2000
|
trusted library allocation
|
page read and write
|
||
213C7600000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D4CEC4000
|
trusted library allocation
|
page read and write
|
||
23D5858F000
|
trusted library allocation
|
page read and write
|
||
23D4D23A000
|
trusted library allocation
|
page read and write
|
||
23D540C1000
|
trusted library allocation
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D4DA9B000
|
trusted library allocation
|
page read and write
|
||
23D55105000
|
trusted library allocation
|
page read and write
|
||
23D4E2DD000
|
trusted library allocation
|
page read and write
|
||
2400003F000
|
trusted library allocation
|
page read and write
|
||
23D4B9A1000
|
trusted library allocation
|
page read and write
|
||
1CB2ABE000
|
stack
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D3DA63000
|
heap
|
page read and write
|
||
23D4CE5A000
|
trusted library allocation
|
page read and write
|
||
23D42B57000
|
heap
|
page read and write
|
||
23D4CB76000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D4F467000
|
trusted library allocation
|
page read and write
|
||
23D55AC9000
|
trusted library allocation
|
page read and write
|
||
23D4F964000
|
trusted library allocation
|
page read and write
|
||
23D4D830000
|
trusted library allocation
|
page read and write
|
||
23D4D7AF000
|
trusted library allocation
|
page read and write
|
||
23D4BBCE000
|
trusted library allocation
|
page read and write
|
||
23D53FCB000
|
trusted library allocation
|
page read and write
|
||
23D42B30000
|
heap
|
page read and write
|
||
23D4CB8F000
|
trusted library allocation
|
page read and write
|
||
23D4B4E2000
|
heap
|
page read and write
|
||
23D4CB33000
|
trusted library allocation
|
page read and write
|
||
23D4CEC8000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D4D798000
|
trusted library allocation
|
page read and write
|
||
23D48DB9000
|
trusted library allocation
|
page read and write
|
||
23D540EE000
|
trusted library allocation
|
page read and write
|
||
23D42B61000
|
heap
|
page read and write
|
||
23D4CB7E000
|
trusted library allocation
|
page read and write
|
||
22D68215000
|
trusted library allocation
|
page read and write
|
||
23D57AF8000
|
trusted library allocation
|
page read and write
|
||
23D4FA0F000
|
trusted library allocation
|
page read and write
|
||
23D55A85000
|
trusted library allocation
|
page read and write
|
||
23D4D8AF000
|
trusted library allocation
|
page read and write
|
||
23D4D2B6000
|
trusted library allocation
|
page read and write
|
||
23D4DE5F000
|
trusted library allocation
|
page read and write
|
||
23D57AFE000
|
trusted library allocation
|
page read and write
|
||
23D4BB8E000
|
trusted library allocation
|
page read and write
|
||
23D57C6B000
|
trusted library allocation
|
page read and write
|
||
213C775C000
|
trusted library allocation
|
page read and write
|
||
23D586CE000
|
trusted library allocation
|
page read and write
|
||
23D4BBB3000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D47B66000
|
trusted library allocation
|
page read and write
|
||
23D4BA68000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D57DF1000
|
trusted library allocation
|
page read and write
|
||
23D57D7E000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4E36B000
|
trusted library allocation
|
page read and write
|
||
226BC3D0000
|
heap
|
page read and write
|
||
23D4CFC8000
|
trusted library allocation
|
page read and write
|
||
23D4CBA3000
|
trusted library allocation
|
page read and write
|
||
23D579AD000
|
trusted library allocation
|
page read and write
|
||
22D67FA6000
|
heap
|
page read and write
|
||
23D42B3E000
|
heap
|
page read and write
|
||
23D4D8AF000
|
trusted library allocation
|
page read and write
|
||
23D48DF6000
|
trusted library allocation
|
page read and write
|
||
23D54093000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4D843000
|
trusted library allocation
|
page read and write
|
||
23D57652000
|
trusted library allocation
|
page read and write
|
||
23D573B7000
|
trusted library allocation
|
page read and write
|
||
23D4E359000
|
trusted library allocation
|
page read and write
|
||
23D4FAD2000
|
trusted library allocation
|
page read and write
|
||
23D4BBC7000
|
trusted library allocation
|
page read and write
|
||
23D4FADE000
|
trusted library allocation
|
page read and write
|
||
23D4F998000
|
trusted library allocation
|
page read and write
|
||
23D4F47C000
|
trusted library allocation
|
page read and write
|
||
23D4F8DA000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D58633000
|
trusted library allocation
|
page read and write
|
||
23D4BB3D000
|
trusted library allocation
|
page read and write
|
||
23D4D8DD000
|
trusted library allocation
|
page read and write
|
||
23D4CAF6000
|
trusted library allocation
|
page read and write
|
||
23D42B59000
|
heap
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4E4B8000
|
trusted library allocation
|
page read and write
|
||
23D42B65000
|
heap
|
page read and write
|
||
23D48DFE000
|
trusted library allocation
|
page read and write
|
||
23D579E6000
|
trusted library allocation
|
page read and write
|
||
23D4E37E000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D563A3000
|
trusted library allocation
|
page read and write
|
||
23D4BDF6000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4F820000
|
trusted library allocation
|
page read and write
|
||
213C8360000
|
heap
|
page read and write
|
||
23D540F7000
|
trusted library allocation
|
page read and write
|
||
23D4B58A000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4CFDA000
|
trusted library allocation
|
page read and write
|
||
23D586BC000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
BFD9ABE000
|
unkown
|
page readonly
|
||
23D50C46000
|
trusted library allocation
|
page read and write
|
||
23D4FA86000
|
trusted library allocation
|
page read and write
|
||
23D55A9C000
|
trusted library allocation
|
page read and write
|
||
23D58658000
|
trusted library allocation
|
page read and write
|
||
23D4F4F6000
|
trusted library allocation
|
page read and write
|
||
23D4CED3000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D4D775000
|
trusted library allocation
|
page read and write
|
||
23D4D88F000
|
trusted library allocation
|
page read and write
|
||
23D4CEB9000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D55A75000
|
trusted library allocation
|
page read and write
|
||
23D4BA83000
|
trusted library allocation
|
page read and write
|
||
23D4B92F000
|
trusted library allocation
|
page read and write
|
||
23D540FD000
|
trusted library allocation
|
page read and write
|
||
23D55137000
|
trusted library allocation
|
page read and write
|
||
23D551C5000
|
trusted library allocation
|
page read and write
|
||
23D585E3000
|
trusted library allocation
|
page read and write
|
||
23D57DAF000
|
trusted library allocation
|
page read and write
|
||
23D54457000
|
trusted library allocation
|
page read and write
|
||
23D4CBC0000
|
trusted library allocation
|
page read and write
|
||
23D573F1000
|
trusted library allocation
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
213C7CA0000
|
trusted library allocation
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
23D4E393000
|
trusted library allocation
|
page read and write
|
||
1EEA4172000
|
heap
|
page read and write
|
||
23D4E37E000
|
trusted library allocation
|
page read and write
|
||
23D4E4BF000
|
trusted library allocation
|
page read and write
|
||
23D4BA8D000
|
trusted library allocation
|
page read and write
|
||
23D4E64B000
|
trusted library allocation
|
page read and write
|
||
23D57B97000
|
trusted library allocation
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D4CED3000
|
trusted library allocation
|
page read and write
|
||
23D4D946000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4FA8F000
|
trusted library allocation
|
page read and write
|
||
23D4CA46000
|
trusted library allocation
|
page read and write
|
||
23D42B50000
|
heap
|
page read and write
|
||
23D58593000
|
trusted library allocation
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
23D4F7E9000
|
trusted library allocation
|
page read and write
|
||
23D5862E000
|
trusted library allocation
|
page read and write
|
||
23D4FA34000
|
trusted library allocation
|
page read and write
|
||
23D4BBA8000
|
trusted library allocation
|
page read and write
|
||
23D4D876000
|
trusted library allocation
|
page read and write
|
||
23D4B9B8000
|
trusted library allocation
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
23D57AD5000
|
trusted library allocation
|
page read and write
|
||
213C7762000
|
trusted library allocation
|
page read and write
|
||
23D57A98000
|
trusted library allocation
|
page read and write
|
||
23D48A83000
|
trusted library allocation
|
page read and write
|
||
23D4E370000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4B2B3000
|
trusted library allocation
|
page read and write
|
||
23D4B4F8000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
22D67CA0000
|
unclassified section
|
page readonly
|
||
23D42B33000
|
heap
|
page read and write
|
||
23D54089000
|
trusted library allocation
|
page read and write
|
||
23D4DDDD000
|
trusted library allocation
|
page read and write
|
||
23D4B487000
|
heap
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D4E3B8000
|
trusted library allocation
|
page read and write
|
||
23D586CE000
|
trusted library allocation
|
page read and write
|
||
23D543C5000
|
trusted library allocation
|
page read and write
|
||
23D4DDEE000
|
trusted library allocation
|
page read and write
|
||
23D55AC9000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D4FAE3000
|
trusted library allocation
|
page read and write
|
||
23D4CA89000
|
trusted library allocation
|
page read and write
|
||
23D53E4A000
|
trusted library allocation
|
page read and write
|
||
23D57A4E000
|
trusted library allocation
|
page read and write
|
||
23D57D09000
|
trusted library allocation
|
page read and write
|
||
23D48CBB000
|
trusted library allocation
|
page read and write
|
||
23D4D7C7000
|
trusted library allocation
|
page read and write
|
||
23D4D988000
|
trusted library allocation
|
page read and write
|
||
23D57DDF000
|
trusted library allocation
|
page read and write
|
||
23D42B57000
|
heap
|
page read and write
|
||
22D67FA4000
|
heap
|
page read and write
|
||
23D4BBBB000
|
trusted library allocation
|
page read and write
|
||
23D4B2D4000
|
trusted library allocation
|
page read and write
|
||
23D540D6000
|
trusted library allocation
|
page read and write
|
||
23D4E6AA000
|
trusted library allocation
|
page read and write
|
||
213C83A1000
|
heap
|
page read and write
|
||
23D58647000
|
trusted library allocation
|
page read and write
|
||
23D573AF000
|
trusted library allocation
|
page read and write
|
||
23D5509E000
|
trusted library allocation
|
page read and write
|
||
23D54284000
|
trusted library allocation
|
page read and write
|
||
23D4E0FD000
|
trusted library allocation
|
page read and write
|
||
23D57BE0000
|
trusted library allocation
|
page read and write
|
||
23D4CAD9000
|
trusted library allocation
|
page read and write
|
||
23D4B4E8000
|
heap
|
page read and write
|
||
23D57AA0000
|
trusted library allocation
|
page read and write
|
||
23D48A16000
|
trusted library allocation
|
page read and write
|
||
23D4C11F000
|
trusted library allocation
|
page read and write
|
||
23D4CD37000
|
trusted library allocation
|
page read and write
|
||
213C8467000
|
heap
|
page read and write
|
||
23D58697000
|
trusted library allocation
|
page read and write
|
||
23D4CEE1000
|
trusted library allocation
|
page read and write
|
||
BFD7A3E000
|
unkown
|
page readonly
|
||
1CAF9D8000
|
stack
|
page read and write
|
||
23D4BCD9000
|
trusted library allocation
|
page read and write
|
||
23D57647000
|
trusted library allocation
|
page read and write
|
||
23D4BB9A000
|
trusted library allocation
|
page read and write
|
||
23D4D882000
|
trusted library allocation
|
page read and write
|
||
23D57DA4000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4E43D000
|
trusted library allocation
|
page read and write
|
||
213C83E1000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
23D4D766000
|
trusted library allocation
|
page read and write
|
||
23D586BA000
|
trusted library allocation
|
page read and write
|
||
23D4E353000
|
trusted library allocation
|
page read and write
|
||
23D540FD000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4F4E2000
|
trusted library allocation
|
page read and write
|
||
23D4C18F000
|
trusted library allocation
|
page read and write
|
||
23D4C18F000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4E3A0000
|
trusted library allocation
|
page read and write
|
||
23D42B1B000
|
heap
|
page read and write
|
||
213C8421000
|
heap
|
page read and write
|
||
23D47CA3000
|
trusted library allocation
|
page read and write
|
||
23D4BBCC000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D53F3C000
|
trusted library allocation
|
page read and write
|
||
23D55A47000
|
trusted library allocation
|
page read and write
|
||
23D4D224000
|
trusted library allocation
|
page read and write
|
||
23D4CEE7000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D57633000
|
trusted library allocation
|
page read and write
|
||
23D4FA2E000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4BBC7000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D57D5A000
|
trusted library allocation
|
page read and write
|
||
23D50C51000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
213C8458000
|
heap
|
page read and write
|
||
23D57DE7000
|
trusted library allocation
|
page read and write
|
||
23D42B31000
|
heap
|
page read and write
|
||
23D4F47F000
|
trusted library allocation
|
page read and write
|
||
23D550E5000
|
trusted library allocation
|
page read and write
|
||
23D4D774000
|
trusted library allocation
|
page read and write
|
||
23D4BC9E000
|
trusted library allocation
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
23D57DFB000
|
trusted library allocation
|
page read and write
|
||
23D57DF1000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D4F47C000
|
trusted library allocation
|
page read and write
|
||
23D4E0D9000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4CE7E000
|
trusted library allocation
|
page read and write
|
||
23D4E358000
|
trusted library allocation
|
page read and write
|
||
23D4D882000
|
trusted library allocation
|
page read and write
|
||
23D540EE000
|
trusted library allocation
|
page read and write
|
||
23D4D280000
|
trusted library allocation
|
page read and write
|
||
23D56386000
|
trusted library allocation
|
page read and write
|
||
23D4D791000
|
trusted library allocation
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D42B36000
|
heap
|
page read and write
|
||
BFD79FE000
|
unkown
|
page readonly
|
||
23D55148000
|
trusted library allocation
|
page read and write
|
||
23D4FACC000
|
trusted library allocation
|
page read and write
|
||
23D4D796000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D4FAA1000
|
trusted library allocation
|
page read and write
|
||
23D4CBE4000
|
trusted library allocation
|
page read and write
|
||
23D4D8CE000
|
trusted library allocation
|
page read and write
|
||
23D57C0A000
|
trusted library allocation
|
page read and write
|
||
213C83F1000
|
heap
|
page read and write
|
||
23D573AA000
|
trusted library allocation
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D42B5C000
|
heap
|
page read and write
|
||
23D48CBC000
|
trusted library allocation
|
page read and write
|
||
23D4F017000
|
trusted library allocation
|
page read and write
|
||
23D4CD78000
|
trusted library allocation
|
page read and write
|
||
23D4FA8F000
|
trusted library allocation
|
page read and write
|
||
23D4F0B2000
|
trusted library allocation
|
page read and write
|
||
23D50C39000
|
trusted library allocation
|
page read and write
|
||
23D4D236000
|
trusted library allocation
|
page read and write
|
||
23D4C188000
|
trusted library allocation
|
page read and write
|
||
23D57A92000
|
trusted library allocation
|
page read and write
|
||
23D42B38000
|
heap
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D4D7CA000
|
trusted library allocation
|
page read and write
|
||
23D4B9B8000
|
trusted library allocation
|
page read and write
|
||
23D4F4E2000
|
trusted library allocation
|
page read and write
|
||
23D4B2FD000
|
trusted library allocation
|
page read and write
|
||
226BC2E0000
|
unclassified section
|
page readonly
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D55A84000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
22D68212000
|
trusted library allocation
|
page read and write
|
||
D0CCFFE000
|
stack
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D4BA52000
|
trusted library allocation
|
page read and write
|
||
23D4BB71000
|
trusted library allocation
|
page read and write
|
||
23D48CA3000
|
trusted library allocation
|
page read and write
|
||
23D4D788000
|
trusted library allocation
|
page read and write
|
||
23D48D94000
|
trusted library allocation
|
page read and write
|
||
23D58616000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D585C7000
|
trusted library allocation
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D4DD93000
|
trusted library allocation
|
page read and write
|
||
23D53EE5000
|
trusted library allocation
|
page read and write
|
||
226BC85D000
|
trusted library allocation
|
page read and write
|
||
23D50C7D000
|
trusted library allocation
|
page read and write
|
||
23D4D9CC000
|
trusted library allocation
|
page read and write
|
||
23D4D886000
|
trusted library allocation
|
page read and write
|
||
FE5C7FE000
|
stack
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D4D873000
|
trusted library allocation
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D4D7C7000
|
trusted library allocation
|
page read and write
|
||
23D4DDF4000
|
trusted library allocation
|
page read and write
|
||
23D48AAB000
|
trusted library allocation
|
page read and write
|
||
23D53F16000
|
trusted library allocation
|
page read and write
|
||
23D4CA89000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
213C7D80000
|
heap
|
page read and write
|
||
226BC390000
|
heap
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D4D8AF000
|
trusted library allocation
|
page read and write
|
||
23D53EFA000
|
trusted library allocation
|
page read and write
|
||
23D4BBC2000
|
trusted library allocation
|
page read and write
|
||
23D4C8BA000
|
trusted library allocation
|
page read and write
|
||
23D57974000
|
trusted library allocation
|
page read and write
|
||
226BC80C000
|
trusted library allocation
|
page read and write
|
||
23D4F4EF000
|
trusted library allocation
|
page read and write
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
213C77C7000
|
trusted library allocation
|
page read and write
|
||
23D4F85B000
|
trusted library allocation
|
page read and write
|
||
23D4D84B000
|
trusted library allocation
|
page read and write
|
||
22D68181000
|
trusted library allocation
|
page read and write
|
||
23D3DA56000
|
heap
|
page read and write
|
||
23D50C4A000
|
trusted library allocation
|
page read and write
|
||
23D4D7C7000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D55A64000
|
trusted library allocation
|
page read and write
|
||
23D57DB4000
|
trusted library allocation
|
page read and write
|
||
23D4B261000
|
trusted library allocation
|
page read and write
|
||
23D4CBE0000
|
trusted library allocation
|
page read and write
|
||
BFD4708000
|
stack
|
page read and write
|
||
23D4CA2B000
|
trusted library allocation
|
page read and write
|
||
23D474C4000
|
trusted library allocation
|
page read and write
|
||
23D4BB9A000
|
trusted library allocation
|
page read and write
|
||
23D48CB8000
|
trusted library allocation
|
page read and write
|
||
23D4DCEA000
|
trusted library allocation
|
page read and write
|
||
23D55A94000
|
trusted library allocation
|
page read and write
|
||
23D4BED7000
|
trusted library allocation
|
page read and write
|
||
226BC593000
|
heap
|
page read and write
|
||
23D4D8D3000
|
trusted library allocation
|
page read and write
|
||
23D57DC0000
|
trusted library allocation
|
page read and write
|
||
23D53E5C000
|
trusted library allocation
|
page read and write
|
||
23D4E593000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D5634D000
|
trusted library allocation
|
page read and write
|
||
D0CB5DE000
|
unkown
|
page readonly
|
||
23D4E375000
|
trusted library allocation
|
page read and write
|
||
23D4D737000
|
trusted library allocation
|
page read and write
|
||
23D4D922000
|
trusted library allocation
|
page read and write
|
||
23D4E392000
|
trusted library allocation
|
page read and write
|
||
23D579DE000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D5518A000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D57DA9000
|
trusted library allocation
|
page read and write
|
||
23D4FAB1000
|
trusted library allocation
|
page read and write
|
||
23D4B224000
|
trusted library allocation
|
page read and write
|
||
23D4B962000
|
trusted library allocation
|
page read and write
|
||
23D4C161000
|
trusted library allocation
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
D0CD7FE000
|
unkown
|
page readonly
|
||
23D579DA000
|
trusted library allocation
|
page read and write
|
||
23D4D9FE000
|
trusted library allocation
|
page read and write
|
||
B34000
|
unkown
|
page readonly
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D53E93000
|
trusted library allocation
|
page read and write
|
||
23D4B507000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D4CB45000
|
trusted library allocation
|
page read and write
|
||
23D4B224000
|
trusted library allocation
|
page read and write
|
||
23D4B2DA000
|
trusted library allocation
|
page read and write
|
||
23D4CAE1000
|
trusted library allocation
|
page read and write
|
||
23D4C1C3000
|
trusted library allocation
|
page read and write
|
||
23D4F95E000
|
trusted library allocation
|
page read and write
|
||
23D4F8D4000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
23D4FA99000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4B4D6000
|
heap
|
page read and write
|
||
23D5763A000
|
trusted library allocation
|
page read and write
|
||
23D4CB88000
|
trusted library allocation
|
page read and write
|
||
23D540A9000
|
trusted library allocation
|
page read and write
|
||
23D57D87000
|
trusted library allocation
|
page read and write
|
||
23D579AD000
|
trusted library allocation
|
page read and write
|
||
23D542A2000
|
trusted library allocation
|
page read and write
|
||
23D4E1BF000
|
trusted library allocation
|
page read and write
|
||
23D4FAD5000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D586C9000
|
trusted library allocation
|
page read and write
|
||
23D585B4000
|
trusted library allocation
|
page read and write
|
||
23D4CA4C000
|
trusted library allocation
|
page read and write
|
||
213C77E7000
|
trusted library allocation
|
page read and write
|
||
23D4C123000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D47AF6000
|
trusted library allocation
|
page read and write
|
||
23D4DD5F000
|
trusted library allocation
|
page read and write
|
||
23D4E333000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D4CBF4000
|
trusted library allocation
|
page read and write
|
||
23D4BBAC000
|
trusted library allocation
|
page read and write
|
||
23D4FAC3000
|
trusted library allocation
|
page read and write
|
||
23D42B54000
|
heap
|
page read and write
|
||
23D4BB3F000
|
trusted library allocation
|
page read and write
|
||
23D55AFC000
|
trusted library allocation
|
page read and write
|
||
23D4D2ED000
|
trusted library allocation
|
page read and write
|
||
23D4E358000
|
trusted library allocation
|
page read and write
|
||
23D573F6000
|
trusted library allocation
|
page read and write
|
||
23D4B2DB000
|
trusted library allocation
|
page read and write
|
||
23D50D15000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D4DF8C000
|
trusted library allocation
|
page read and write
|
||
23D4FACD000
|
trusted library allocation
|
page read and write
|
||
23D4F4F6000
|
trusted library allocation
|
page read and write
|
||
23D47481000
|
trusted library allocation
|
page read and write
|
||
1EEA5CC0000
|
heap
|
page read and write
|
||
23D4F0EA000
|
trusted library allocation
|
page read and write
|
||
23D4F881000
|
trusted library allocation
|
page read and write
|
||
23D57BB7000
|
trusted library allocation
|
page read and write
|
||
23D4B4CF000
|
heap
|
page read and write
|
||
23D50C69000
|
trusted library allocation
|
page read and write
|
||
23D4B4F6000
|
heap
|
page read and write
|
||
23D4B99B000
|
trusted library allocation
|
page read and write
|
||
23D4E214000
|
trusted library allocation
|
page read and write
|
||
23D4D28B000
|
trusted library allocation
|
page read and write
|
||
23D4BBAE000
|
trusted library allocation
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
2AF7D200000
|
trusted library allocation
|
page read and write
|
||
23D4E4B2000
|
trusted library allocation
|
page read and write
|
||
23D4CA56000
|
trusted library allocation
|
page read and write
|
||
23D4D2EA000
|
trusted library allocation
|
page read and write
|
||
23D4F837000
|
trusted library allocation
|
page read and write
|
||
23D4E387000
|
trusted library allocation
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
23D4CB7E000
|
trusted library allocation
|
page read and write
|
||
23D54993000
|
trusted library allocation
|
page read and write
|
||
23D4F881000
|
trusted library allocation
|
page read and write
|
||
23D50D15000
|
trusted library allocation
|
page read and write
|
||
23D55AC0000
|
trusted library allocation
|
page read and write
|
||
23D42B16000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
B2C000
|
unkown
|
page read and write
|
||
213C7700000
|
trusted library allocation
|
page read and write
|
||
23D4D2C1000
|
trusted library allocation
|
page read and write
|
||
23D4F464000
|
trusted library allocation
|
page read and write
|
||
23D4B5FA000
|
trusted library allocation
|
page read and write
|
||
23D42B50000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D42B2A000
|
heap
|
page read and write
|
||
23D540E7000
|
trusted library allocation
|
page read and write
|
||
23D4D778000
|
trusted library allocation
|
page read and write
|
||
23D4F4E4000
|
trusted library allocation
|
page read and write
|
||
23D48A2A000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D57AF2000
|
trusted library allocation
|
page read and write
|
||
23D4E3AE000
|
trusted library allocation
|
page read and write
|
||
23D4CA84000
|
trusted library allocation
|
page read and write
|
||
23D57AFC000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D50D88000
|
trusted library allocation
|
page read and write
|
||
23D48DA7000
|
trusted library allocation
|
page read and write
|
||
23D540FA000
|
trusted library allocation
|
page read and write
|
||
23D4D7B7000
|
trusted library allocation
|
page read and write
|
||
226BC8C4000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page write copy
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D4CB7E000
|
trusted library allocation
|
page read and write
|
||
23D57E35000
|
heap
|
page read and write
|
||
23D4D8D1000
|
trusted library allocation
|
page read and write
|
||
23D4B4F4000
|
heap
|
page read and write
|
||
1CB11FE000
|
unkown
|
page readonly
|
||
23D58587000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
BB9000
|
heap
|
page read and write
|
||
23D54341000
|
trusted library allocation
|
page read and write
|
||
23D4BA51000
|
trusted library allocation
|
page read and write
|
||
23D57AC9000
|
trusted library allocation
|
page read and write
|
||
23D4CB7C000
|
trusted library allocation
|
page read and write
|
||
23D4F0A2000
|
trusted library allocation
|
page read and write
|
||
23D576AF000
|
trusted library allocation
|
page read and write
|
||
23D56341000
|
trusted library allocation
|
page read and write
|
||
23D55A82000
|
trusted library allocation
|
page read and write
|
||
23D4D7A5000
|
trusted library allocation
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
23D540CF000
|
trusted library allocation
|
page read and write
|
||
23D56307000
|
trusted library allocation
|
page read and write
|
||
23D57AFE000
|
trusted library allocation
|
page read and write
|
||
23D4D8AF000
|
trusted library allocation
|
page read and write
|
||
23D57AA0000
|
trusted library allocation
|
page read and write
|
||
23D57F53000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D5442E000
|
trusted library allocation
|
page read and write
|
||
23D4D243000
|
trusted library allocation
|
page read and write
|
||
23D4B559000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4CEF5000
|
trusted library allocation
|
page read and write
|
||
23D42B50000
|
heap
|
page read and write
|
||
23D4C87D000
|
trusted library allocation
|
page read and write
|
||
213C75B2000
|
unclassified section
|
page read and write
|
||
213C7360000
|
unclassified section
|
page readonly
|
||
23D4C123000
|
trusted library allocation
|
page read and write
|
||
23D4FA30000
|
trusted library allocation
|
page read and write
|
||
23D4DF98000
|
trusted library allocation
|
page read and write
|
||
23D4E3D0000
|
trusted library allocation
|
page read and write
|
||
213C83FC000
|
heap
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4F4FA000
|
trusted library allocation
|
page read and write
|
||
23D586D6000
|
trusted library allocation
|
page read and write
|
||
23D4C18F000
|
trusted library allocation
|
page read and write
|
||
23D4DD63000
|
trusted library allocation
|
page read and write
|
||
23D4BB9A000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4C1EF000
|
trusted library allocation
|
page read and write
|
||
23D4DED3000
|
trusted library allocation
|
page read and write
|
||
23D4D74E000
|
trusted library allocation
|
page read and write
|
||
23D4CEF2000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D4D211000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4D750000
|
trusted library allocation
|
page read and write
|
||
23D4C106000
|
trusted library allocation
|
page read and write
|
||
23D4D946000
|
trusted library allocation
|
page read and write
|
||
23D540F7000
|
trusted library allocation
|
page read and write
|
||
23D57A9A000
|
trusted library allocation
|
page read and write
|
||
23D57D98000
|
trusted library allocation
|
page read and write
|
||
23D5795E000
|
trusted library allocation
|
page read and write
|
||
23D4D7C5000
|
trusted library allocation
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
23D4CAD7000
|
trusted library allocation
|
page read and write
|
||
23D4E6D2000
|
trusted library allocation
|
page read and write
|
||
23D4FA88000
|
trusted library allocation
|
page read and write
|
||
23D48A50000
|
trusted library allocation
|
page read and write
|
||
23D4D778000
|
trusted library allocation
|
page read and write
|
||
23D4F6E0000
|
trusted library allocation
|
page read and write
|
||
23D4CE27000
|
trusted library allocation
|
page read and write
|
||
23D4E32E000
|
trusted library allocation
|
page read and write
|
||
23D4BBCC000
|
trusted library allocation
|
page read and write
|
||
213C75D6000
|
heap
|
page read and write
|
||
BFD71FE000
|
stack
|
page read and write
|
||
23D551AC000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
213C83E8000
|
heap
|
page read and write
|
||
23D48DC4000
|
trusted library allocation
|
page read and write
|
||
1EEA5BA6000
|
heap
|
page read and write
|
||
23D4B563000
|
trusted library allocation
|
page read and write
|
||
1CAEF9E000
|
unkown
|
page readonly
|
||
23D42B65000
|
heap
|
page read and write
|
||
23D4DDC5000
|
trusted library allocation
|
page read and write
|
||
23D4D7C5000
|
trusted library allocation
|
page read and write
|
||
23D586BC000
|
trusted library allocation
|
page read and write
|
||
23D4C1B6000
|
trusted library allocation
|
page read and write
|
||
23D53FFE000
|
trusted library allocation
|
page read and write
|
||
23D42B66000
|
heap
|
page read and write
|
||
23D4B90F000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D56406000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4BA83000
|
trusted library allocation
|
page read and write
|
||
23D57D98000
|
trusted library allocation
|
page read and write
|
||
226BC88F000
|
trusted library allocation
|
page read and write
|
||
213C8300000
|
heap
|
page read and write
|
||
23D4B5D1000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D5736A000
|
trusted library allocation
|
page read and write
|
||
213C842B000
|
heap
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
23D551A3000
|
trusted library allocation
|
page read and write
|
||
BFD92BE000
|
stack
|
page read and write
|
||
23D4D247000
|
trusted library allocation
|
page read and write
|
||
23D57DA6000
|
trusted library allocation
|
page read and write
|
||
23D58682000
|
trusted library allocation
|
page read and write
|
||
23D4F8BD000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D57AF4000
|
trusted library allocation
|
page read and write
|
||
23D4F945000
|
trusted library allocation
|
page read and write
|
||
23D4DFA8000
|
trusted library allocation
|
page read and write
|
||
23D57AF6000
|
trusted library allocation
|
page read and write
|
||
23D58545000
|
trusted library allocation
|
page read and write
|
||
213C836C000
|
heap
|
page read and write
|
||
23D3DA6C000
|
heap
|
page read and write
|
||
23D4F80D000
|
trusted library allocation
|
page read and write
|
||
23D54A4E000
|
trusted library allocation
|
page read and write
|
||
23D57C04000
|
trusted library allocation
|
page read and write
|
||
23D4DDC5000
|
trusted library allocation
|
page read and write
|
||
23D4D8D7000
|
trusted library allocation
|
page read and write
|
||
23D4C1A4000
|
trusted library allocation
|
page read and write
|
||
23D48C86000
|
trusted library allocation
|
page read and write
|
||
23D54500000
|
trusted library allocation
|
page read and write
|
||
23D4CFCD000
|
trusted library allocation
|
page read and write
|
||
23D4E3A0000
|
trusted library allocation
|
page read and write
|
||
23D56457000
|
trusted library allocation
|
page read and write
|
||
23D42B4B000
|
heap
|
page read and write
|
||
23D57DE3000
|
trusted library allocation
|
page read and write
|
||
23D550C8000
|
trusted library allocation
|
page read and write
|
||
23D55A6E000
|
trusted library allocation
|
page read and write
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
23D4D794000
|
trusted library allocation
|
page read and write
|
||
23D57373000
|
trusted library allocation
|
page read and write
|
||
23D550A2000
|
trusted library allocation
|
page read and write
|
||
2A027FE000
|
stack
|
page read and write
|
||
23D4BBBB000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D57D7A000
|
trusted library allocation
|
page read and write
|
||
23D4BDFE000
|
trusted library allocation
|
page read and write
|
||
23D57AC6000
|
trusted library allocation
|
page read and write
|
||
23D585EC000
|
trusted library allocation
|
page read and write
|
||
23D57D98000
|
trusted library allocation
|
page read and write
|
||
23D4BB92000
|
trusted library allocation
|
page read and write
|
||
23D4E348000
|
trusted library allocation
|
page read and write
|
||
23D42B50000
|
heap
|
page read and write
|
||
23D579E2000
|
trusted library allocation
|
page read and write
|
||
23D4FAA9000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
23D57DC4000
|
trusted library allocation
|
page read and write
|
||
23D586F0000
|
trusted library allocation
|
page read and write
|
||
23D50CAE000
|
trusted library allocation
|
page read and write
|
||
23D57F53000
|
heap
|
page read and write
|
||
23D53E2F000
|
trusted library allocation
|
page read and write
|
||
23D4B4FC000
|
heap
|
page read and write
|
||
23D586F0000
|
trusted library allocation
|
page read and write
|
||
23D57A94000
|
trusted library allocation
|
page read and write
|
||
23D3DA56000
|
heap
|
page read and write
|
||
23D4B4F6000
|
heap
|
page read and write
|
||
23D47A2F000
|
trusted library allocation
|
page read and write
|
||
23D5858A000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4D7AF000
|
trusted library allocation
|
page read and write
|
||
23D5793B000
|
trusted library allocation
|
page read and write
|
||
23D4CF40000
|
trusted library allocation
|
page read and write
|
||
23D48D50000
|
trusted library allocation
|
page read and write
|
||
23D56305000
|
trusted library allocation
|
page read and write
|
||
23D4FAD5000
|
trusted library allocation
|
page read and write
|
||
23D4E34D000
|
trusted library allocation
|
page read and write
|
||
23D4B4F6000
|
heap
|
page read and write
|
||
23D4CA96000
|
trusted library allocation
|
page read and write
|
||
23D4B2FD000
|
trusted library allocation
|
page read and write
|
||
23D5768F000
|
trusted library allocation
|
page read and write
|
||
23D4F7E9000
|
trusted library allocation
|
page read and write
|
||
23D4E6E8000
|
trusted library allocation
|
page read and write
|
||
23D4CBE6000
|
trusted library allocation
|
page read and write
|
||
23D57AF2000
|
trusted library allocation
|
page read and write
|
||
23D4F4FA000
|
trusted library allocation
|
page read and write
|
||
23D4B4DB000
|
heap
|
page read and write
|
||
23D4CEFB000
|
trusted library allocation
|
page read and write
|
||
1EEA4307000
|
trusted library allocation
|
page read and write
|
||
23D4DD90000
|
trusted library allocation
|
page read and write
|
||
213C7CD0000
|
trusted library allocation
|
page read and write
|
||
23D57D76000
|
trusted library allocation
|
page read and write
|
||
23D540FA000
|
trusted library allocation
|
page read and write
|
||
23D57BA4000
|
trusted library allocation
|
page read and write
|
||
23D4FAA1000
|
trusted library allocation
|
page read and write
|
||
23D4C17F000
|
trusted library allocation
|
page read and write
|
||
23D53ECB000
|
trusted library allocation
|
page read and write
|
||
23D4C16F000
|
trusted library allocation
|
page read and write
|
||
23D540DF000
|
trusted library allocation
|
page read and write
|
||
23D57E5C000
|
heap
|
page read and write
|
||
213C8400000
|
heap
|
page read and write
|
||
23D47BFE000
|
trusted library allocation
|
page read and write
|
||
23D53F38000
|
trusted library allocation
|
page read and write
|
||
23D4B99E000
|
trusted library allocation
|
page read and write
|
||
23D4D89A000
|
trusted library allocation
|
page read and write
|
||
23D4F8BD000
|
trusted library allocation
|
page read and write
|
||
23D4D8CE000
|
trusted library allocation
|
page read and write
|
||
23D586D3000
|
trusted library allocation
|
page read and write
|
||
D0CB4DE000
|
unkown
|
page readonly
|
||
23D4F0F5000
|
trusted library allocation
|
page read and write
|
||
23D57DE7000
|
trusted library allocation
|
page read and write
|
||
23D4F860000
|
trusted library allocation
|
page read and write
|
||
23D4E3FA000
|
trusted library allocation
|
page read and write
|
||
23D53E6A000
|
trusted library allocation
|
page read and write
|
||
23D4CD6A000
|
trusted library allocation
|
page read and write
|
||
23D4DDAA000
|
trusted library allocation
|
page read and write
|
||
23D42B5F000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4D788000
|
trusted library allocation
|
page read and write
|
||
23D4CA96000
|
trusted library allocation
|
page read and write
|
||
23D50C84000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D4B5D9000
|
trusted library allocation
|
page read and write
|
||
23D50DA8000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D4F44A000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4BB6C000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D585AA000
|
trusted library allocation
|
page read and write
|
||
23D4BBBE000
|
trusted library allocation
|
page read and write
|
||
23D58556000
|
trusted library allocation
|
page read and write
|
||
23D4E1C9000
|
trusted library allocation
|
page read and write
|
||
23D4D82B000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4E4AE000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D47BF0000
|
trusted library allocation
|
page read and write
|
||
23D4CF43000
|
trusted library allocation
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
23D4CA74000
|
trusted library allocation
|
page read and write
|
||
23D4F0B2000
|
trusted library allocation
|
page read and write
|
||
23D4CB37000
|
trusted library allocation
|
page read and write
|
||
23D57CBE000
|
trusted library allocation
|
page read and write
|
||
23D4F428000
|
trusted library allocation
|
page read and write
|
||
23D4BB6E000
|
trusted library allocation
|
page read and write
|
||
23D57C35000
|
trusted library allocation
|
page read and write
|
||
213C73C8000
|
remote allocation
|
page execute read
|
||
1EEA418A000
|
heap
|
page read and write
|
||
23D50C6E000
|
trusted library allocation
|
page read and write
|
||
23D4B984000
|
trusted library allocation
|
page read and write
|
||
23D42B54000
|
heap
|
page read and write
|
||
226BC879000
|
trusted library allocation
|
page read and write
|
||
23D57AD5000
|
trusted library allocation
|
page read and write
|
||
23D4E396000
|
trusted library allocation
|
page read and write
|
||
23D4C133000
|
trusted library allocation
|
page read and write
|
||
23D4C17F000
|
trusted library allocation
|
page read and write
|
||
23D4CA26000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D48D56000
|
trusted library allocation
|
page read and write
|
||
23D48D57000
|
trusted library allocation
|
page read and write
|
||
23D4F0FA000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D5855F000
|
trusted library allocation
|
page read and write
|
||
23D579E8000
|
trusted library allocation
|
page read and write
|
||
23D42B33000
|
heap
|
page read and write
|
||
23D55A4B000
|
trusted library allocation
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
23D4B4A3000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4B232000
|
trusted library allocation
|
page read and write
|
||
23D57A9C000
|
trusted library allocation
|
page read and write
|
||
23D4E3F6000
|
trusted library allocation
|
page read and write
|
||
23D50C84000
|
trusted library allocation
|
page read and write
|
||
23D4CA0A000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D4D842000
|
trusted library allocation
|
page read and write
|
||
23D540BE000
|
trusted library allocation
|
page read and write
|
||
23D4E3B8000
|
trusted library allocation
|
page read and write
|
||
23D4F860000
|
trusted library allocation
|
page read and write
|
||
22D67F00000
|
heap
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4CFFE000
|
trusted library allocation
|
page read and write
|
||
23D55AAA000
|
trusted library allocation
|
page read and write
|
||
23D4BA85000
|
trusted library allocation
|
page read and write
|
||
23D4D785000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D57A94000
|
trusted library allocation
|
page read and write
|
||
23D4E2DD000
|
trusted library allocation
|
page read and write
|
||
23D4D9AC000
|
trusted library allocation
|
page read and write
|
||
23D55086000
|
trusted library allocation
|
page read and write
|
||
23D4BE6A000
|
trusted library allocation
|
page read and write
|
||
226BC420000
|
heap
|
page readonly
|
||
23D4FAD5000
|
trusted library allocation
|
page read and write
|
||
23D57AFE000
|
trusted library allocation
|
page read and write
|
||
23D4D8E6000
|
trusted library allocation
|
page read and write
|
||
23D4C1C4000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4F6CF000
|
trusted library allocation
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
23D42B2B000
|
heap
|
page read and write
|
||
23D4F9D2000
|
trusted library allocation
|
page read and write
|
||
23D42B6C000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D57DE3000
|
trusted library allocation
|
page read and write
|
||
23D57DF2000
|
trusted library allocation
|
page read and write
|
||
23D4E2D3000
|
trusted library allocation
|
page read and write
|
||
23D42B3E000
|
heap
|
page read and write
|
||
23D4CEC8000
|
trusted library allocation
|
page read and write
|
||
23D5408C000
|
trusted library allocation
|
page read and write
|
||
23D47BFE000
|
trusted library allocation
|
page read and write
|
||
23D50CA4000
|
trusted library allocation
|
page read and write
|
||
23D4FA39000
|
trusted library allocation
|
page read and write
|
||
23D4E137000
|
trusted library allocation
|
page read and write
|
||
23D4C144000
|
trusted library allocation
|
page read and write
|
||
23D4BA83000
|
trusted library allocation
|
page read and write
|
||
35B1000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
213C8309000
|
heap
|
page read and write
|
||
23D4E0A7000
|
trusted library allocation
|
page read and write
|
||
22D68196000
|
trusted library allocation
|
page read and write
|
||
23D57DEB000
|
trusted library allocation
|
page read and write
|
||
23D4E3A9000
|
trusted library allocation
|
page read and write
|
||
23D57BAB000
|
trusted library allocation
|
page read and write
|
||
23D4DD05000
|
trusted library allocation
|
page read and write
|
||
23D4D8AF000
|
trusted library allocation
|
page read and write
|
||
23D4BBA1000
|
trusted library allocation
|
page read and write
|
||
226BCB00000
|
trusted library allocation
|
page read and write
|
||
23D4CAE4000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
22D681CB000
|
trusted library allocation
|
page read and write
|
||
23D4F0AD000
|
trusted library allocation
|
page read and write
|
||
23D5442C000
|
trusted library allocation
|
page read and write
|
||
23D42B1A000
|
heap
|
page read and write
|
||
23D4F80D000
|
trusted library allocation
|
page read and write
|
||
23D5630C000
|
trusted library allocation
|
page read and write
|
||
23D4CB5B000
|
trusted library allocation
|
page read and write
|
||
23D50CB3000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4CF28000
|
trusted library allocation
|
page read and write
|
||
23D4CE9B000
|
trusted library allocation
|
page read and write
|
||
23D4FA99000
|
trusted library allocation
|
page read and write
|
||
23D4BA8D000
|
trusted library allocation
|
page read and write
|
||
23D4E387000
|
trusted library allocation
|
page read and write
|
||
23D4E0AF000
|
trusted library allocation
|
page read and write
|
||
23D4E0E4000
|
trusted library allocation
|
page read and write
|
||
23D57D88000
|
trusted library allocation
|
page read and write
|
||
23D4E1C6000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4BB9A000
|
trusted library allocation
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
23D57AEE000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D540FA000
|
trusted library allocation
|
page read and write
|
||
23D4CA59000
|
trusted library allocation
|
page read and write
|
||
23D586AB000
|
trusted library allocation
|
page read and write
|
||
23D4CF30000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D4E36B000
|
trusted library allocation
|
page read and write
|
||
23D4D105000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D4DD82000
|
trusted library allocation
|
page read and write
|
||
23D42B37000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
213C83EC000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D57A9E000
|
trusted library allocation
|
page read and write
|
||
23D57BF1000
|
trusted library allocation
|
page read and write
|
||
23D4E358000
|
trusted library allocation
|
page read and write
|
||
23D4CBE0000
|
trusted library allocation
|
page read and write
|
||
BCC000
|
heap
|
page read and write
|
||
23D4CAD0000
|
trusted library allocation
|
page read and write
|
||
23D4CBC3000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4DFBC000
|
trusted library allocation
|
page read and write
|
||
23D4F860000
|
trusted library allocation
|
page read and write
|
||
23D4B4F2000
|
heap
|
page read and write
|
||
23D4C1AB000
|
trusted library allocation
|
page read and write
|
||
23D4F0AA000
|
trusted library allocation
|
page read and write
|
||
23D4E389000
|
trusted library allocation
|
page read and write
|
||
23D55A33000
|
trusted library allocation
|
page read and write
|
||
23D4D256000
|
trusted library allocation
|
page read and write
|
||
23D562E5000
|
trusted library allocation
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D4DF5B000
|
trusted library allocation
|
page read and write
|
||
23D4E0FD000
|
trusted library allocation
|
page read and write
|
||
FE5BFFF000
|
stack
|
page read and write
|
||
23D42B50000
|
heap
|
page read and write
|
||
23D4F43E000
|
trusted library allocation
|
page read and write
|
||
23D4CAB3000
|
trusted library allocation
|
page read and write
|
||
23D586A3000
|
trusted library allocation
|
page read and write
|
||
3174000
|
heap
|
page read and write
|
||
23D57AF4000
|
trusted library allocation
|
page read and write
|
||
23D50CAE000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
213C7DB3000
|
heap
|
page read and write
|
||
23D5502F000
|
trusted library allocation
|
page read and write
|
||
23D4C140000
|
trusted library allocation
|
page read and write
|
||
23D586D8000
|
trusted library allocation
|
page read and write
|
||
23D55A84000
|
trusted library allocation
|
page read and write
|
||
23D573E4000
|
trusted library allocation
|
page read and write
|
||
23D55AC3000
|
trusted library allocation
|
page read and write
|
||
23D4FACD000
|
trusted library allocation
|
page read and write
|
||
23D57BC6000
|
trusted library allocation
|
page read and write
|
||
23D4FAF5000
|
trusted library allocation
|
page read and write
|
||
213C8458000
|
heap
|
page read and write
|
||
23D4BA85000
|
trusted library allocation
|
page read and write
|
||
23D4E09B000
|
trusted library allocation
|
page read and write
|
||
23D4C194000
|
trusted library allocation
|
page read and write
|
||
23D4F47C000
|
trusted library allocation
|
page read and write
|
||
23D57CA8000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4E6B8000
|
trusted library allocation
|
page read and write
|
||
23D4FA99000
|
trusted library allocation
|
page read and write
|
||
23D585D1000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D5765D000
|
trusted library allocation
|
page read and write
|
||
23D4C17A000
|
trusted library allocation
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D48CF3000
|
trusted library allocation
|
page read and write
|
||
23D53ECC000
|
trusted library allocation
|
page read and write
|
||
213C7CB4000
|
unkown
|
page execute read
|
||
23D50CB9000
|
trusted library allocation
|
page read and write
|
||
23D55AA3000
|
trusted library allocation
|
page read and write
|
||
23D55A72000
|
trusted library allocation
|
page read and write
|
||
23D4E1B7000
|
trusted library allocation
|
page read and write
|
||
23D4C1AA000
|
trusted library allocation
|
page read and write
|
||
23D4DCF2000
|
trusted library allocation
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D4F4DA000
|
trusted library allocation
|
page read and write
|
||
23D55A6E000
|
trusted library allocation
|
page read and write
|
||
23D50C6E000
|
trusted library allocation
|
page read and write
|
||
23D4FA3E000
|
trusted library allocation
|
page read and write
|
||
23D57C3E000
|
trusted library allocation
|
page read and write
|
||
23D48C98000
|
trusted library allocation
|
page read and write
|
||
23D4F68D000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
213C842B000
|
heap
|
page read and write
|
||
23D4E642000
|
trusted library allocation
|
page read and write
|
||
23D586F0000
|
trusted library allocation
|
page read and write
|
||
23D55206000
|
trusted library allocation
|
page read and write
|
||
23D4BBCE000
|
trusted library allocation
|
page read and write
|
||
23D4E615000
|
trusted library allocation
|
page read and write
|
||
23D57A9E000
|
trusted library allocation
|
page read and write
|
||
23D57AF0000
|
trusted library allocation
|
page read and write
|
||
23D50C4C000
|
trusted library allocation
|
page read and write
|
||
23D540E7000
|
trusted library allocation
|
page read and write
|
||
23D4E191000
|
trusted library allocation
|
page read and write
|
||
213C7748000
|
trusted library allocation
|
page read and write
|
||
23D4E33A000
|
trusted library allocation
|
page read and write
|
||
23D42B18000
|
heap
|
page read and write
|
||
BFD69FE000
|
unkown
|
page readonly
|
||
23D4E2D3000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D47AFE000
|
trusted library allocation
|
page read and write
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D586A9000
|
trusted library allocation
|
page read and write
|
||
23D4BA5E000
|
trusted library allocation
|
page read and write
|
||
23D4D238000
|
trusted library allocation
|
page read and write
|
||
23D540E7000
|
trusted library allocation
|
page read and write
|
||
23D4CD9D000
|
trusted library allocation
|
page read and write
|
||
23D57DE3000
|
trusted library allocation
|
page read and write
|
||
23D4D2B8000
|
trusted library allocation
|
page read and write
|
||
23D42B26000
|
heap
|
page read and write
|
||
23D4FAF7000
|
trusted library allocation
|
page read and write
|
||
23D563C5000
|
trusted library allocation
|
page read and write
|
||
23D53E19000
|
trusted library allocation
|
page read and write
|
||
213C7CC0000
|
unkown
|
page execute read
|
||
23D42B40000
|
heap
|
page read and write
|
||
213C843B000
|
heap
|
page read and write
|
||
23D50C9F000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D57D8B000
|
trusted library allocation
|
page read and write
|
||
23D4B588000
|
trusted library allocation
|
page read and write
|
||
23D4F8CC000
|
trusted library allocation
|
page read and write
|
||
23D4E627000
|
trusted library allocation
|
page read and write
|
||
23D4CEB2000
|
trusted library allocation
|
page read and write
|
||
23D4B2B4000
|
trusted library allocation
|
page read and write
|
||
23D4B2AC000
|
trusted library allocation
|
page read and write
|
||
23D4D2E1000
|
trusted library allocation
|
page read and write
|
||
23D4D7C1000
|
trusted library allocation
|
page read and write
|
||
23D4FAE9000
|
trusted library allocation
|
page read and write
|
||
23D4CA93000
|
trusted library allocation
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
23D56F00000
|
trusted library allocation
|
page read and write
|
||
23D4D7FD000
|
trusted library allocation
|
page read and write
|
||
23D4BB7C000
|
trusted library allocation
|
page read and write
|
||
213C7D90000
|
heap
|
page read and write
|
||
23D585FD000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
23D585FD000
|
trusted library allocation
|
page read and write
|
||
23D55A47000
|
trusted library allocation
|
page read and write
|
||
23D56348000
|
trusted library allocation
|
page read and write
|
||
23D4B5FA000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D4CA5C000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D4D7F7000
|
trusted library allocation
|
page read and write
|
||
23D4B261000
|
trusted library allocation
|
page read and write
|
||
23D4E4F4000
|
trusted library allocation
|
page read and write
|
||
23D4E650000
|
trusted library allocation
|
page read and write
|
||
23D4D85E000
|
trusted library allocation
|
page read and write
|
||
BFD468E000
|
unkown
|
page readonly
|
||
23D57D5D000
|
trusted library allocation
|
page read and write
|
||
23D4FA85000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4E441000
|
trusted library allocation
|
page read and write
|
||
23D57D52000
|
trusted library allocation
|
page read and write
|
||
23D4F0A5000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D5522E000
|
trusted library allocation
|
page read and write
|
||
23D4E3F2000
|
trusted library allocation
|
page read and write
|
||
23D5408E000
|
trusted library allocation
|
page read and write
|
||
23D4D7C7000
|
trusted library allocation
|
page read and write
|
||
23D42B0E000
|
heap
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D57CF6000
|
trusted library allocation
|
page read and write
|
||
23D48DC4000
|
trusted library allocation
|
page read and write
|
||
23D4DD93000
|
trusted library allocation
|
page read and write
|
||
23D50C02000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D55A6E000
|
trusted library allocation
|
page read and write
|
||
23D42B50000
|
heap
|
page read and write
|
||
23D4F964000
|
trusted library allocation
|
page read and write
|
||
213C83E6000
|
heap
|
page read and write
|
||
23D4C13D000
|
trusted library allocation
|
page read and write
|
||
23D4E39E000
|
trusted library allocation
|
page read and write
|
||
23D48AAB000
|
trusted library allocation
|
page read and write
|
||
23D48E35000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D4BA8B000
|
trusted library allocation
|
page read and write
|
||
23D42B66000
|
heap
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D58622000
|
trusted library allocation
|
page read and write
|
||
23D57AC6000
|
trusted library allocation
|
page read and write
|
||
23D4BDF3000
|
trusted library allocation
|
page read and write
|
||
23D50CB3000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D4C18F000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4E2DD000
|
trusted library allocation
|
page read and write
|
||
23D4FADF000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D57D79000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D53F4C000
|
trusted library allocation
|
page read and write
|
||
23D4F9D5000
|
trusted library allocation
|
page read and write
|
||
23D586B9000
|
trusted library allocation
|
page read and write
|
||
23D58595000
|
trusted library allocation
|
page read and write
|
||
23D4B580000
|
trusted library allocation
|
page read and write
|
||
23D586A9000
|
trusted library allocation
|
page read and write
|
||
23D55514000
|
trusted library allocation
|
page read and write
|
||
23D4F4D8000
|
trusted library allocation
|
page read and write
|
||
23D48CD7000
|
trusted library allocation
|
page read and write
|
||
23D4D887000
|
trusted library allocation
|
page read and write
|
||
22D6815D000
|
trusted library allocation
|
page read and write
|
||
23D57DC9000
|
trusted library allocation
|
page read and write
|
||
23D4B984000
|
trusted library allocation
|
page read and write
|
||
23D53FFD000
|
trusted library allocation
|
page read and write
|
||
226BC7F0000
|
heap
|
page read and write
|
||
23D4D83B000
|
trusted library allocation
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4FADF000
|
trusted library allocation
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
23D57AA0000
|
trusted library allocation
|
page read and write
|
||
23D57998000
|
trusted library allocation
|
page read and write
|
||
23D55AC2000
|
trusted library allocation
|
page read and write
|
||
23D4F47F000
|
trusted library allocation
|
page read and write
|
||
23D57DC9000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4CB33000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D57DB4000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D47A76000
|
trusted library allocation
|
page read and write
|
||
23D4F80F000
|
trusted library allocation
|
page read and write
|
||
23D57DF6000
|
trusted library allocation
|
page read and write
|
||
23D47BDA000
|
trusted library allocation
|
page read and write
|
||
2AF7D20A000
|
trusted library allocation
|
page read and write
|
||
23D586EA000
|
trusted library allocation
|
page read and write
|
||
23D42B0E000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D4CA89000
|
trusted library allocation
|
page read and write
|
||
23D4D2E1000
|
trusted library allocation
|
page read and write
|
||
23D57D98000
|
trusted library allocation
|
page read and write
|
||
23D57AC9000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4DCEB000
|
trusted library allocation
|
page read and write
|
||
23D4FA2E000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4DF85000
|
trusted library allocation
|
page read and write
|
||
23D4D9CA000
|
trusted library allocation
|
page read and write
|
||
23D55A43000
|
trusted library allocation
|
page read and write
|
||
23D57AF8000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
1EEA5BB7000
|
heap
|
page read and write
|
||
23D42B0E000
|
heap
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D57DAE000
|
trusted library allocation
|
page read and write
|
||
23D4D86E000
|
trusted library allocation
|
page read and write
|
||
23D4FAC8000
|
trusted library allocation
|
page read and write
|
||
23D586D3000
|
trusted library allocation
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D585B4000
|
trusted library allocation
|
page read and write
|
||
23D4FA8F000
|
trusted library allocation
|
page read and write
|
||
22D68200000
|
trusted library allocation
|
page read and write
|
||
22D68203000
|
trusted library allocation
|
page read and write
|
||
23D4F05D000
|
trusted library allocation
|
page read and write
|
||
23D4E196000
|
trusted library allocation
|
page read and write
|
||
23D4DEC9000
|
trusted library allocation
|
page read and write
|
||
23D4CA9D000
|
trusted library allocation
|
page read and write
|
||
213C7540000
|
heap
|
page read and write
|
||
23D4E47D000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D50DE8000
|
trusted library allocation
|
page read and write
|
||
23D57DB8000
|
trusted library allocation
|
page read and write
|
||
23D57DF1000
|
trusted library allocation
|
page read and write
|
||
23D42B38000
|
heap
|
page read and write
|
||
23D543A3000
|
trusted library allocation
|
page read and write
|
||
23D4E6E2000
|
trusted library allocation
|
page read and write
|
||
1CAEFDE000
|
stack
|
page read and write
|
||
23D4CAF6000
|
trusted library allocation
|
page read and write
|
||
23D4F4FA000
|
trusted library allocation
|
page read and write
|
||
22D67D80000
|
heap
|
page read and write
|
||
23D42B21000
|
heap
|
page read and write
|
||
23D4E5C3000
|
trusted library allocation
|
page read and write
|
||
23D4F9BE000
|
trusted library allocation
|
page read and write
|
||
23D4F47F000
|
trusted library allocation
|
page read and write
|
||
23D54ACE000
|
trusted library allocation
|
page read and write
|
||
23D4C1AA000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
226BC36B000
|
remote allocation
|
page execute read
|
||
23D4FAFB000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
213C8421000
|
heap
|
page read and write
|
||
23D4D941000
|
trusted library allocation
|
page read and write
|
||
213C8301000
|
heap
|
page read and write
|
||
23D57BE5000
|
trusted library allocation
|
page read and write
|
||
23D5510C000
|
trusted library allocation
|
page read and write
|
||
23D585BA000
|
trusted library allocation
|
page read and write
|
||
226BCA00000
|
trusted library allocation
|
page read and write
|
||
23D50C58000
|
trusted library allocation
|
page read and write
|
||
23D4BA5D000
|
trusted library allocation
|
page read and write
|
||
23D55193000
|
trusted library allocation
|
page read and write
|
||
23D4E3A0000
|
trusted library allocation
|
page read and write
|
||
23D4F940000
|
trusted library allocation
|
page read and write
|
||
23D4CF32000
|
trusted library allocation
|
page read and write
|
||
23D4CA98000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
22D68147000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D57AF6000
|
trusted library allocation
|
page read and write
|
||
185E000
|
stack
|
page read and write
|
||
23D4CFE2000
|
trusted library allocation
|
page read and write
|
||
23D48D4A000
|
trusted library allocation
|
page read and write
|
||
23D4D7B7000
|
trusted library allocation
|
page read and write
|
||
213C7719000
|
trusted library allocation
|
page read and write
|
||
23D58597000
|
trusted library allocation
|
page read and write
|
||
22D67F30000
|
unclassified section
|
page readonly
|
||
23D4E4E7000
|
trusted library allocation
|
page read and write
|
||
23D4FACC000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
213C83F1000
|
heap
|
page read and write
|
||
23D54401000
|
trusted library allocation
|
page read and write
|
||
23D47B26000
|
trusted library allocation
|
page read and write
|
||
23D4D780000
|
trusted library allocation
|
page read and write
|
||
23D57DDA000
|
trusted library allocation
|
page read and write
|
||
23D4CA91000
|
trusted library allocation
|
page read and write
|
||
23D4BD36000
|
trusted library allocation
|
page read and write
|
||
23D4B4ED000
|
heap
|
page read and write
|
||
23D4D8EE000
|
trusted library allocation
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D4B9A1000
|
trusted library allocation
|
page read and write
|
||
23D57956000
|
trusted library allocation
|
page read and write
|
||
23D4CAF6000
|
trusted library allocation
|
page read and write
|
||
23D47B1A000
|
trusted library allocation
|
page read and write
|
||
23D4F467000
|
trusted library allocation
|
page read and write
|
||
23D4B2DB000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D4BA68000
|
trusted library allocation
|
page read and write
|
||
23D57A98000
|
trusted library allocation
|
page read and write
|
||
23D4F688000
|
trusted library allocation
|
page read and write
|
||
23D586A6000
|
trusted library allocation
|
page read and write
|
||
23D55A64000
|
trusted library allocation
|
page read and write
|
||
23D4BB71000
|
trusted library allocation
|
page read and write
|
||
23D58597000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
213C8203000
|
trusted library allocation
|
page read and write
|
||
23D48D9A000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D4E370000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D4CDB6000
|
trusted library allocation
|
page read and write
|
||
23D4F8D4000
|
trusted library allocation
|
page read and write
|
||
23D54097000
|
trusted library allocation
|
page read and write
|
||
23D579E8000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
1EEA4090000
|
heap
|
page read and write
|
||
23D42B38000
|
heap
|
page read and write
|
||
23D4E3FC000
|
trusted library allocation
|
page read and write
|
||
23D4E3AE000
|
trusted library allocation
|
page read and write
|
||
226BC43F000
|
unclassified section
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4E3D0000
|
trusted library allocation
|
page read and write
|
||
23D4C15A000
|
trusted library allocation
|
page read and write
|
||
23D4E6CC000
|
trusted library allocation
|
page read and write
|
||
23D4BB9A000
|
trusted library allocation
|
page read and write
|
||
23D4BEE2000
|
trusted library allocation
|
page read and write
|
||
23D4CA89000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D50DD8000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D55257000
|
trusted library allocation
|
page read and write
|
||
23D57A9C000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
unkown
|
page write copy
|
||
23D57D7E000
|
trusted library allocation
|
page read and write
|
||
23D57D58000
|
trusted library allocation
|
page read and write
|
||
23D4FAAB000
|
trusted library allocation
|
page read and write
|
||
23D579E4000
|
trusted library allocation
|
page read and write
|
||
23D4D767000
|
trusted library allocation
|
page read and write
|
||
23D57BBC000
|
trusted library allocation
|
page read and write
|
||
23D4F9BC000
|
trusted library allocation
|
page read and write
|
||
23D4BB6C000
|
trusted library allocation
|
page read and write
|
||
23D4D840000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4E3C7000
|
trusted library allocation
|
page read and write
|
||
23D42B2B000
|
heap
|
page read and write
|
||
23D42B13000
|
heap
|
page read and write
|
||
23D57BEB000
|
trusted library allocation
|
page read and write
|
||
23D579E2000
|
trusted library allocation
|
page read and write
|
||
23D543E4000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D48D92000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4FABA000
|
trusted library allocation
|
page read and write
|
||
23D4B4E3000
|
heap
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
23D4E5CF000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
23D4C1BD000
|
trusted library allocation
|
page read and write
|
||
23D4FA8C000
|
trusted library allocation
|
page read and write
|
||
23D4BBA1000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D57A56000
|
trusted library allocation
|
page read and write
|
||
23D4FA85000
|
trusted library allocation
|
page read and write
|
||
226BC8A2000
|
trusted library allocation
|
page read and write
|
||
23D4D2B4000
|
trusted library allocation
|
page read and write
|
||
23D48DA3000
|
trusted library allocation
|
page read and write
|
||
23D4BA68000
|
trusted library allocation
|
page read and write
|
||
23D55A43000
|
trusted library allocation
|
page read and write
|
||
23D4B22A000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D42B38000
|
heap
|
page read and write
|
||
23D4BBBE000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D5798C000
|
trusted library allocation
|
page read and write
|
||
23D4F8B5000
|
trusted library allocation
|
page read and write
|
||
23D42B9C000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D4F09A000
|
trusted library allocation
|
page read and write
|
||
23D540E7000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4F808000
|
trusted library allocation
|
page read and write
|
||
23D4E69B000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D55A9C000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D585AD000
|
trusted library allocation
|
page read and write
|
||
23D5799D000
|
trusted library allocation
|
page read and write
|
||
23D4E2D8000
|
trusted library allocation
|
page read and write
|
||
23D4CE54000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D4B4CF000
|
heap
|
page read and write
|
||
23D4CEC0000
|
trusted library allocation
|
page read and write
|
||
23D4B2FD000
|
trusted library allocation
|
page read and write
|
||
23D4D949000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D4B4F1000
|
heap
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4D299000
|
trusted library allocation
|
page read and write
|
||
23D57CC1000
|
trusted library allocation
|
page read and write
|
||
23D4CEB1000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D48DB9000
|
trusted library allocation
|
page read and write
|
||
23D4B9F8000
|
trusted library allocation
|
page read and write
|
||
213C772F000
|
trusted library allocation
|
page read and write
|
||
23D4F05D000
|
trusted library allocation
|
page read and write
|
||
23D4D2EA000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D4DD5B000
|
trusted library allocation
|
page read and write
|
||
23D55AAB000
|
trusted library allocation
|
page read and write
|
||
3B6A2E71E000
|
trusted library allocation
|
page read and write
|
||
23D4D766000
|
trusted library allocation
|
page read and write
|
||
23D4E3AA000
|
trusted library allocation
|
page read and write
|
||
23D586A9000
|
trusted library allocation
|
page read and write
|
||
23D4CFE8000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4FAD5000
|
trusted library allocation
|
page read and write
|
||
23D4FAF5000
|
trusted library allocation
|
page read and write
|
||
23D4CE24000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4F9C3000
|
trusted library allocation
|
page read and write
|
||
23D4E489000
|
trusted library allocation
|
page read and write
|
||
23D4BD72000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4DCF2000
|
trusted library allocation
|
page read and write
|
||
23D573AD000
|
trusted library allocation
|
page read and write
|
||
23D4CD53000
|
trusted library allocation
|
page read and write
|
||
22D68110000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
226BC3B0000
|
heap
|
page read and write
|
||
23D54093000
|
trusted library allocation
|
page read and write
|
||
23D56D02000
|
trusted library allocation
|
page read and write
|
||
23D54967000
|
trusted library allocation
|
page read and write
|
||
213C8429000
|
heap
|
page read and write
|
||
23D4C196000
|
trusted library allocation
|
page read and write
|
||
22D68100000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4C194000
|
trusted library allocation
|
page read and write
|
||
22D67D1E000
|
remote allocation
|
page execute read
|
||
23D57D6C000
|
trusted library allocation
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D42B5A000
|
heap
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4E4E7000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4CBF7000
|
trusted library allocation
|
page read and write
|
||
23D4E38B000
|
trusted library allocation
|
page read and write
|
||
23D4BBA1000
|
trusted library allocation
|
page read and write
|
||
23D50CD1000
|
trusted library allocation
|
page read and write
|
||
23D4C19F000
|
trusted library allocation
|
page read and write
|
||
23D57BEC000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D4CED6000
|
trusted library allocation
|
page read and write
|
||
23D4C185000
|
trusted library allocation
|
page read and write
|
||
23D4BB71000
|
trusted library allocation
|
page read and write
|
||
23D4D75F000
|
trusted library allocation
|
page read and write
|
||
22D67DFA000
|
heap
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4B4DF000
|
heap
|
page read and write
|
||
23D4E6A0000
|
trusted library allocation
|
page read and write
|
||
23D4F9A1000
|
trusted library allocation
|
page read and write
|
||
23D4F4D8000
|
trusted library allocation
|
page read and write
|
||
213C75BF000
|
unclassified section
|
page read and write
|
||
23D4FA45000
|
trusted library allocation
|
page read and write
|
||
23D4C15F000
|
trusted library allocation
|
page read and write
|
||
213C7777000
|
trusted library allocation
|
page read and write
|
||
23D540F7000
|
trusted library allocation
|
page read and write
|
||
23D48DF1000
|
trusted library allocation
|
page read and write
|
||
23D4C1EF000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D58643000
|
trusted library allocation
|
page read and write
|
||
23D55A85000
|
trusted library allocation
|
page read and write
|
||
23D58617000
|
trusted library allocation
|
page read and write
|
||
23D4CAE4000
|
trusted library allocation
|
page read and write
|
||
23D4CB2B000
|
trusted library allocation
|
page read and write
|
||
23D4F0EA000
|
trusted library allocation
|
page read and write
|
||
23D4E34D000
|
trusted library allocation
|
page read and write
|
||
23D55105000
|
trusted library allocation
|
page read and write
|
||
23D474B3000
|
trusted library allocation
|
page read and write
|
||
23D57E6A000
|
heap
|
page read and write
|
||
23D4FAF1000
|
trusted library allocation
|
page read and write
|
||
23D4D2E6000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
23D53F32000
|
trusted library allocation
|
page read and write
|
||
213C835C000
|
heap
|
page read and write
|
||
23D55A72000
|
trusted library allocation
|
page read and write
|
||
23D4CB8C000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4E3FC000
|
trusted library allocation
|
page read and write
|
||
23D4B2EF000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D4CA9D000
|
trusted library allocation
|
page read and write
|
||
23D4B963000
|
trusted library allocation
|
page read and write
|
||
23D4FAAC000
|
trusted library allocation
|
page read and write
|
||
23D4F4EF000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
23D58556000
|
trusted library allocation
|
page read and write
|
||
23D57E71000
|
heap
|
page read and write
|
||
23D4DFEC000
|
trusted library allocation
|
page read and write
|
||
23D4CE24000
|
trusted library allocation
|
page read and write
|
||
23D4E3D0000
|
trusted library allocation
|
page read and write
|
||
23D4D763000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D4D8FA000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
213C83E3000
|
heap
|
page read and write
|
||
23D47498000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D4E491000
|
trusted library allocation
|
page read and write
|
||
23D4E445000
|
trusted library allocation
|
page read and write
|
||
1EEA418A000
|
heap
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D55A4B000
|
trusted library allocation
|
page read and write
|
||
23D4BB6A000
|
trusted library allocation
|
page read and write
|
||
23D4CAF6000
|
trusted library allocation
|
page read and write
|
||
23D4CEC3000
|
trusted library allocation
|
page read and write
|
||
23D4D92F000
|
trusted library allocation
|
page read and write
|
||
21DF2E91000
|
trusted library allocation
|
page execute read
|
||
23D4B29E000
|
trusted library allocation
|
page read and write
|
||
23D48CF3000
|
trusted library allocation
|
page read and write
|
||
2AF7D100000
|
trusted library allocation
|
page read and write
|
||
23D4F075000
|
trusted library allocation
|
page read and write
|
||
23D579E0000
|
trusted library allocation
|
page read and write
|
||
23D57E4C000
|
heap
|
page read and write
|
||
23D4E6F2000
|
trusted library allocation
|
page read and write
|
||
23D4DEB7000
|
trusted library allocation
|
page read and write
|
||
23D57C2C000
|
trusted library allocation
|
page read and write
|
||
23D586BC000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
23D48AE3000
|
trusted library allocation
|
page read and write
|
||
23D50C40000
|
trusted library allocation
|
page read and write
|
||
23D4DD9F000
|
trusted library allocation
|
page read and write
|
||
23D4F4F6000
|
trusted library allocation
|
page read and write
|
||
23D4C152000
|
trusted library allocation
|
page read and write
|
||
23D540EE000
|
trusted library allocation
|
page read and write
|
||
23D4E353000
|
trusted library allocation
|
page read and write
|
||
23D585AD000
|
trusted library allocation
|
page read and write
|
||
23D4BD3D000
|
trusted library allocation
|
page read and write
|
||
23D4CEFB000
|
trusted library allocation
|
page read and write
|
||
23D4E3B7000
|
trusted library allocation
|
page read and write
|
||
23D4D226000
|
trusted library allocation
|
page read and write
|
||
226BC8B6000
|
trusted library allocation
|
page read and write
|
||
213C8360000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
226BC8AB000
|
trusted library allocation
|
page read and write
|
||
23D48D43000
|
trusted library allocation
|
page read and write
|
||
23D4F04E000
|
trusted library allocation
|
page read and write
|
||
23D4C1C4000
|
trusted library allocation
|
page read and write
|
||
23D57998000
|
trusted library allocation
|
page read and write
|
||
23D4D213000
|
trusted library allocation
|
page read and write
|
||
23D4D9C7000
|
trusted library allocation
|
page read and write
|
||
213C83E8000
|
heap
|
page read and write
|
||
23D4B4F8000
|
heap
|
page read and write
|
||
23D579E8000
|
trusted library allocation
|
page read and write
|
||
23D4BDFA000
|
trusted library allocation
|
page read and write
|
||
23D4D2FE000
|
trusted library allocation
|
page read and write
|
||
226BC432000
|
unclassified section
|
page read and write
|
||
23D4E2A0000
|
trusted library allocation
|
page read and write
|
||
23D573BD000
|
trusted library allocation
|
page read and write
|
||
23D47BDF000
|
trusted library allocation
|
page read and write
|
||
23D4C161000
|
trusted library allocation
|
page read and write
|
||
23D551AC000
|
trusted library allocation
|
page read and write
|
||
23D4F4E2000
|
trusted library allocation
|
page read and write
|
||
23D4CBA1000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D4BB78000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D4C191000
|
trusted library allocation
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D4D93E000
|
trusted library allocation
|
page read and write
|
||
23D4B47B000
|
heap
|
page read and write
|
||
23D42B38000
|
heap
|
page read and write
|
||
23D4B25F000
|
trusted library allocation
|
page read and write
|
||
23D53F3A000
|
trusted library allocation
|
page read and write
|
||
23D4E489000
|
trusted library allocation
|
page read and write
|
||
23D42B3E000
|
heap
|
page read and write
|
||
23D57DAE000
|
trusted library allocation
|
page read and write
|
||
23D48D33000
|
trusted library allocation
|
page read and write
|
||
23D4FAA1000
|
trusted library allocation
|
page read and write
|
||
23D47B1E000
|
trusted library allocation
|
page read and write
|
||
23D4D7FD000
|
trusted library allocation
|
page read and write
|
||
23D4B9B5000
|
trusted library allocation
|
page read and write
|
||
23D4CD6C000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
23D4D96C000
|
trusted library allocation
|
page read and write
|
||
23D57974000
|
trusted library allocation
|
page read and write
|
||
AFC000
|
unkown
|
page readonly
|
||
23D42B25000
|
heap
|
page read and write
|
||
2A01FFE000
|
stack
|
page read and write
|
||
23D57A94000
|
trusted library allocation
|
page read and write
|
||
23D4F837000
|
trusted library allocation
|
page read and write
|
||
23D4CB6B000
|
trusted library allocation
|
page read and write
|
||
1EEA5BA0000
|
heap
|
page read and write
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
23D48D89000
|
trusted library allocation
|
page read and write
|
||
213C8369000
|
heap
|
page read and write
|
||
23D4BA57000
|
trusted library allocation
|
page read and write
|
||
23D579E6000
|
trusted library allocation
|
page read and write
|
||
23D563AC000
|
trusted library allocation
|
page read and write
|
||
23D4F9CB000
|
trusted library allocation
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D4CB27000
|
trusted library allocation
|
page read and write
|
||
22D68238000
|
trusted library allocation
|
page read and write
|
||
23D53ED6000
|
trusted library allocation
|
page read and write
|
||
23D4E3A0000
|
trusted library allocation
|
page read and write
|
||
23D53E2F000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4B4F6000
|
heap
|
page read and write
|
||
23D4E47D000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D4E3FC000
|
trusted library allocation
|
page read and write
|
||
23D5855F000
|
trusted library allocation
|
page read and write
|
||
23D4D82E000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
BFD82BE000
|
stack
|
page read and write
|
||
23D4FA85000
|
trusted library allocation
|
page read and write
|
||
23D4B25F000
|
trusted library allocation
|
page read and write
|
||
23D4C15F000
|
trusted library allocation
|
page read and write
|
||
23D4D299000
|
trusted library allocation
|
page read and write
|
||
23D4F4E4000
|
trusted library allocation
|
page read and write
|
||
23D4F012000
|
trusted library allocation
|
page read and write
|
||
23D4E3AE000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D57DE3000
|
trusted library allocation
|
page read and write
|
||
23D4B4F2000
|
heap
|
page read and write
|
||
23D50CAE000
|
trusted library allocation
|
page read and write
|
||
23D50C69000
|
trusted library allocation
|
page read and write
|
||
23D48AD4000
|
trusted library allocation
|
page read and write
|
||
23D4CAF6000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
23D4BBD9000
|
trusted library allocation
|
page read and write
|
||
23D4C17F000
|
trusted library allocation
|
page read and write
|
||
23D586B9000
|
trusted library allocation
|
page read and write
|
||
23D4E0A9000
|
trusted library allocation
|
page read and write
|
||
23D4BBA1000
|
trusted library allocation
|
page read and write
|
||
23D4B22A000
|
trusted library allocation
|
page read and write
|
||
23D57CD3000
|
trusted library allocation
|
page read and write
|
||
23D57AF6000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
1EEA3F80000
|
heap
|
page read and write
|
||
23D53ECB000
|
trusted library allocation
|
page read and write
|
||
61C60303000
|
trusted library allocation
|
page read and write
|
||
23D4F017000
|
trusted library allocation
|
page read and write
|
||
23D4BDD0000
|
trusted library allocation
|
page read and write
|
||
23D4CDC5000
|
trusted library allocation
|
page read and write
|
||
23D50C7E000
|
trusted library allocation
|
page read and write
|
||
23D57DFE000
|
trusted library allocation
|
page read and write
|
||
22D68112000
|
trusted library allocation
|
page read and write
|
||
23D585AA000
|
trusted library allocation
|
page read and write
|
||
23D57DDF000
|
trusted library allocation
|
page read and write
|
||
23D4E6AC000
|
trusted library allocation
|
page read and write
|
||
23D579DC000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D4E3AA000
|
trusted library allocation
|
page read and write
|
||
23D42B38000
|
heap
|
page read and write
|
||
23D4F9AD000
|
trusted library allocation
|
page read and write
|
||
23D57DFB000
|
trusted library allocation
|
page read and write
|
||
213C8467000
|
heap
|
page read and write
|
||
23D4D8B3000
|
trusted library allocation
|
page read and write
|
||
23D4C1B6000
|
trusted library allocation
|
page read and write
|
||
1CB123E000
|
unkown
|
page readonly
|
||
23D57DAF000
|
trusted library allocation
|
page read and write
|
||
23D53FCB000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
23D53FCF000
|
trusted library allocation
|
page read and write
|
||
213C83E0000
|
heap
|
page read and write
|
||
22D67DEF000
|
unclassified section
|
page read and write
|
||
23D4BB8C000
|
trusted library allocation
|
page read and write
|
||
213C7350000
|
unclassified section
|
page readonly
|
||
23D53FBF000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D57D63000
|
trusted library allocation
|
page read and write
|
||
23D57A96000
|
trusted library allocation
|
page read and write
|
||
23D4BA3F000
|
trusted library allocation
|
page read and write
|
||
23D4FADF000
|
trusted library allocation
|
page read and write
|
||
1EEA4070000
|
heap
|
page read and write
|
||
213C843B000
|
heap
|
page read and write
|
||
23D586A3000
|
trusted library allocation
|
page read and write
|
||
23D4D102000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D53FCF000
|
trusted library allocation
|
page read and write
|
||
23D57F51000
|
heap
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D57E47000
|
heap
|
page read and write
|
||
D0CE7FE000
|
unkown
|
page readonly
|
||
23D42B2A000
|
heap
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D57BF1000
|
trusted library allocation
|
page read and write
|
||
23D57DF6000
|
trusted library allocation
|
page read and write
|
||
23D4E3C3000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D4B586000
|
trusted library allocation
|
page read and write
|
||
23D4D780000
|
trusted library allocation
|
page read and write
|
||
23D4CEF2000
|
trusted library allocation
|
page read and write
|
||
213C7723000
|
trusted library allocation
|
page read and write
|
||
213C77CE000
|
trusted library allocation
|
page read and write
|
||
23D4F964000
|
trusted library allocation
|
page read and write
|
||
BFD47CE000
|
stack
|
page read and write
|
||
23D47BDF000
|
trusted library allocation
|
page read and write
|
||
23D57C9D000
|
trusted library allocation
|
page read and write
|
||
23D542E5000
|
trusted library allocation
|
page read and write
|
||
23D57DB4000
|
trusted library allocation
|
page read and write
|
||
23D4B4C9000
|
heap
|
page read and write
|
||
23D4DF08000
|
trusted library allocation
|
page read and write
|
||
23D4F017000
|
trusted library allocation
|
page read and write
|
||
23D4B21D000
|
trusted library allocation
|
page read and write
|
||
23D4FA96000
|
trusted library allocation
|
page read and write
|
||
23D4C8E5000
|
trusted library allocation
|
page read and write
|
||
23D4D2C5000
|
trusted library allocation
|
page read and write
|
||
23D586D8000
|
trusted library allocation
|
page read and write
|
||
23D4B216000
|
trusted library allocation
|
page read and write
|
||
23D57DD1000
|
trusted library allocation
|
page read and write
|
||
23D4D2E6000
|
trusted library allocation
|
page read and write
|
||
23D48CFB000
|
trusted library allocation
|
page read and write
|
||
23D4FAF5000
|
trusted library allocation
|
page read and write
|
||
23D4C1C3000
|
trusted library allocation
|
page read and write
|
||
23D4F4D8000
|
trusted library allocation
|
page read and write
|
||
23D4B4F2000
|
heap
|
page read and write
|
||
23D57D6B000
|
trusted library allocation
|
page read and write
|
||
23D4CB33000
|
trusted library allocation
|
page read and write
|
||
23D4DDB6000
|
trusted library allocation
|
page read and write
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4D9D2000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D4F458000
|
trusted library allocation
|
page read and write
|
||
23D4F39E000
|
trusted library allocation
|
page read and write
|
||
226BC600000
|
trusted library allocation
|
page read and write
|
||
23D4CE5E000
|
trusted library allocation
|
page read and write
|
||
23D4E14B000
|
trusted library allocation
|
page read and write
|
||
22D68167000
|
trusted library allocation
|
page read and write
|
||
23D4B25F000
|
trusted library allocation
|
page read and write
|
||
23D4D766000
|
trusted library allocation
|
page read and write
|
||
23D4E5BA000
|
trusted library allocation
|
page read and write
|
||
23D57A96000
|
trusted library allocation
|
page read and write
|
||
213C83E9000
|
heap
|
page read and write
|
||
23D57DFC000
|
trusted library allocation
|
page read and write
|
||
23D4D7AF000
|
trusted library allocation
|
page read and write
|
||
23D5642E000
|
trusted library allocation
|
page read and write
|
||
213C83EC000
|
heap
|
page read and write
|
||
23D576DD000
|
trusted library allocation
|
page read and write
|
||
23D50C4A000
|
trusted library allocation
|
page read and write
|
||
23D540EE000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D4B9D9000
|
trusted library allocation
|
page read and write
|
||
23D50D48000
|
trusted library allocation
|
page read and write
|
||
23D57DAB000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4E4C2000
|
trusted library allocation
|
page read and write
|
||
23D57AC9000
|
trusted library allocation
|
page read and write
|
||
213C83F1000
|
heap
|
page read and write
|
||
23D4E35B000
|
trusted library allocation
|
page read and write
|
||
23D579DA000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D53F76000
|
trusted library allocation
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
23D4CA97000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D5498A000
|
trusted library allocation
|
page read and write
|
||
23D50CA4000
|
trusted library allocation
|
page read and write
|
||
22D681B1000
|
trusted library allocation
|
page read and write
|
||
23D586BC000
|
trusted library allocation
|
page read and write
|
||
23D53FBF000
|
trusted library allocation
|
page read and write
|
||
23D48DC4000
|
trusted library allocation
|
page read and write
|
||
226BC8B2000
|
trusted library allocation
|
page read and write
|
||
23D57DDC000
|
trusted library allocation
|
page read and write
|
||
23D4D7FD000
|
trusted library allocation
|
page read and write
|
||
23D4B29E000
|
trusted library allocation
|
page read and write
|
||
23D5860E000
|
trusted library allocation
|
page read and write
|
||
23D54305000
|
trusted library allocation
|
page read and write
|
||
23D4B4CE000
|
heap
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D54A38000
|
trusted library allocation
|
page read and write
|
||
23D57DA6000
|
trusted library allocation
|
page read and write
|
||
23D42B30000
|
heap
|
page read and write
|
||
23D55AB7000
|
trusted library allocation
|
page read and write
|
||
23D5869F000
|
trusted library allocation
|
page read and write
|
||
23D4FA8C000
|
trusted library allocation
|
page read and write
|
||
23D4CE43000
|
trusted library allocation
|
page read and write
|
||
23D4CA84000
|
trusted library allocation
|
page read and write
|
||
23D4E3EF000
|
trusted library allocation
|
page read and write
|
||
23D4BD92000
|
trusted library allocation
|
page read and write
|
||
23D5769F000
|
trusted library allocation
|
page read and write
|
||
23D4D86E000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
23D57CBE000
|
trusted library allocation
|
page read and write
|
||
23D4E6A2000
|
trusted library allocation
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D4F9DF000
|
trusted library allocation
|
page read and write
|
||
23D50CD7000
|
trusted library allocation
|
page read and write
|
||
22D68198000
|
trusted library allocation
|
page read and write
|
||
23D540FA000
|
trusted library allocation
|
page read and write
|
||
23D54386000
|
trusted library allocation
|
page read and write
|
||
23D4BB64000
|
trusted library allocation
|
page read and write
|
||
22D68103000
|
trusted library allocation
|
page read and write
|
||
23D4D8EE000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D53F44000
|
trusted library allocation
|
page read and write
|
||
23D4CEC4000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D57AEE000
|
trusted library allocation
|
page read and write
|
||
23D4BA68000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4B2D6000
|
trusted library allocation
|
page read and write
|
||
226BC7F6000
|
heap
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4D765000
|
trusted library allocation
|
page read and write
|
||
23D4B4F2000
|
heap
|
page read and write
|
||
23D57A9E000
|
trusted library allocation
|
page read and write
|
||
23D4E3F2000
|
trusted library allocation
|
page read and write
|
||
23D4B2C1000
|
trusted library allocation
|
page read and write
|
||
23D4C89E000
|
trusted library allocation
|
page read and write
|
||
23D57695000
|
trusted library allocation
|
page read and write
|
||
23D4CA91000
|
trusted library allocation
|
page read and write
|
||
23D4B4CC000
|
heap
|
page read and write
|
||
23D4C1BA000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4BD74000
|
trusted library allocation
|
page read and write
|
||
23D576F6000
|
trusted library allocation
|
page read and write
|
||
23D4FAF5000
|
trusted library allocation
|
page read and write
|
||
23D48D4F000
|
trusted library allocation
|
page read and write
|
||
226BC2F0000
|
unclassified section
|
page readonly
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4CAB6000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
23D4BBCC000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D4D83D000
|
trusted library allocation
|
page read and write
|
||
23D4E37F000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D57DC9000
|
trusted library allocation
|
page read and write
|
||
23D4D299000
|
trusted library allocation
|
page read and write
|
||
23D4F0F2000
|
trusted library allocation
|
page read and write
|
||
1CB22BE000
|
unkown
|
page readonly
|
||
23D5522C000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D53EE0000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D54700000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
226BC900000
|
heap
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4BBD9000
|
trusted library allocation
|
page read and write
|
||
23D53E99000
|
trusted library allocation
|
page read and write
|
||
23D48DDE000
|
trusted library allocation
|
page read and write
|
||
23D57BF1000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4FA8C000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D4BB9D000
|
trusted library allocation
|
page read and write
|
||
23D58597000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D47BE3000
|
trusted library allocation
|
page read and write
|
||
23D56401000
|
trusted library allocation
|
page read and write
|
||
23D4B2D8000
|
trusted library allocation
|
page read and write
|
||
23D54433000
|
trusted library allocation
|
page read and write
|
||
23D42B58000
|
heap
|
page read and write
|
||
22D6816E000
|
trusted library allocation
|
page read and write
|
||
23D56DA8000
|
trusted library allocation
|
page read and write
|
||
23D4BBAC000
|
trusted library allocation
|
page read and write
|
||
213C8467000
|
heap
|
page read and write
|
||
2AF7CF50000
|
heap
|
page read and write
|
||
23D4E4F4000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D579DE000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D50CFB000
|
trusted library allocation
|
page read and write
|
||
23D579E6000
|
trusted library allocation
|
page read and write
|
||
23D50C4C000
|
trusted library allocation
|
page read and write
|
||
213C837F000
|
heap
|
page read and write
|
||
23D5636D000
|
trusted library allocation
|
page read and write
|
||
23D4D7FD000
|
trusted library allocation
|
page read and write
|
||
23D54A6D000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
226BC370000
|
unclassified section
|
page readonly
|
||
23D47AFB000
|
trusted library allocation
|
page read and write
|
||
23D4F8DC000
|
trusted library allocation
|
page read and write
|
||
23D5427B000
|
trusted library allocation
|
page read and write
|
||
23D4FAD2000
|
trusted library allocation
|
page read and write
|
||
23D4CEEE000
|
trusted library allocation
|
page read and write
|
||
23D4B4E3000
|
heap
|
page read and write
|
||
23D4D87C000
|
trusted library allocation
|
page read and write
|
||
23D4D753000
|
trusted library allocation
|
page read and write
|
||
23D42B57000
|
heap
|
page read and write
|
||
23D4E393000
|
trusted library allocation
|
page read and write
|
||
23D4B2FD000
|
trusted library allocation
|
page read and write
|
||
1EEA4183000
|
heap
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D4CE82000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D57DB4000
|
trusted library allocation
|
page read and write
|
||
213C7590000
|
heap
|
page readonly
|
||
23D57C29000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
23D4CA3C000
|
trusted library allocation
|
page read and write
|
||
23D4CA89000
|
trusted library allocation
|
page read and write
|
||
23D4DD9F000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4E370000
|
trusted library allocation
|
page read and write
|
||
23D4F8BD000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D540FD000
|
trusted library allocation
|
page read and write
|
||
23D4D778000
|
trusted library allocation
|
page read and write
|
||
23D48D56000
|
trusted library allocation
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D57DC7000
|
trusted library allocation
|
page read and write
|
||
23D4E34D000
|
trusted library allocation
|
page read and write
|
||
23D57AFC000
|
trusted library allocation
|
page read and write
|
||
23D4B4E8000
|
heap
|
page read and write
|
||
23D5793D000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D5867D000
|
trusted library allocation
|
page read and write
|
||
D0CDFFE000
|
stack
|
page read and write
|
||
23D4B800000
|
trusted library allocation
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D4B4F7000
|
heap
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D57934000
|
trusted library allocation
|
page read and write
|
||
23D57C59000
|
trusted library allocation
|
page read and write
|
||
23D57BC6000
|
trusted library allocation
|
page read and write
|
||
23D4E387000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
226BC849000
|
trusted library allocation
|
page read and write
|
||
D0CB49E000
|
stack
|
page read and write
|
||
23D573B9000
|
trusted library allocation
|
page read and write
|
||
23D4E4F8000
|
trusted library allocation
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
23D4BBAE000
|
trusted library allocation
|
page read and write
|
||
23D4E280000
|
trusted library allocation
|
page read and write
|
||
23D4E36B000
|
trusted library allocation
|
page read and write
|
||
23D4E37E000
|
trusted library allocation
|
page read and write
|
||
23D57BB7000
|
trusted library allocation
|
page read and write
|
||
23D57A45000
|
trusted library allocation
|
page read and write
|
||
213C8225000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
23D4D791000
|
trusted library allocation
|
page read and write
|
||
23D4FA19000
|
trusted library allocation
|
page read and write
|
||
23D4749E000
|
trusted library allocation
|
page read and write
|
||
23D4E2C5000
|
trusted library allocation
|
page read and write
|
||
23D57666000
|
trusted library allocation
|
page read and write
|
||
23D57DE1000
|
trusted library allocation
|
page read and write
|
||
23D50C4C000
|
trusted library allocation
|
page read and write
|
||
23D4CD76000
|
trusted library allocation
|
page read and write
|
||
23D4D949000
|
trusted library allocation
|
page read and write
|
||
BFD7ABE000
|
unkown
|
page readonly
|
||
23D4FA34000
|
trusted library allocation
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D573AF000
|
trusted library allocation
|
page read and write
|
||
23D4E343000
|
trusted library allocation
|
page read and write
|
||
23D57666000
|
trusted library allocation
|
page read and write
|
||
23D57685000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4FAC8000
|
trusted library allocation
|
page read and write
|
||
23D4C1FC000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4FAE3000
|
trusted library allocation
|
page read and write
|
||
23D4D7B7000
|
trusted library allocation
|
page read and write
|
||
23D57DF1000
|
trusted library allocation
|
page read and write
|
||
D0CBFD8000
|
stack
|
page read and write
|
||
23D4D95C000
|
trusted library allocation
|
page read and write
|
||
226BC5A0000
|
unclassified section
|
page readonly
|
||
1EEA418A000
|
heap
|
page read and write
|
||
23D4BB7C000
|
trusted library allocation
|
page read and write
|
||
23D585FD000
|
trusted library allocation
|
page read and write
|
||
23D4E479000
|
trusted library allocation
|
page read and write
|
||
23D53ED6000
|
trusted library allocation
|
page read and write
|
||
23D4CE3A000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D4E5EB000
|
trusted library allocation
|
page read and write
|
||
23D573B9000
|
trusted library allocation
|
page read and write
|
||
23D53F7F000
|
trusted library allocation
|
page read and write
|
||
23D4DF8C000
|
trusted library allocation
|
page read and write
|
||
23D4F9BE000
|
trusted library allocation
|
page read and write
|
||
23D4D966000
|
trusted library allocation
|
page read and write
|
||
23D57DDF000
|
trusted library allocation
|
page read and write
|
||
23D48C72000
|
trusted library allocation
|
page read and write
|
||
23D4C15A000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4F9D5000
|
trusted library allocation
|
page read and write
|
||
23D48E38000
|
trusted library allocation
|
page read and write
|
||
23D4E091000
|
trusted library allocation
|
page read and write
|
||
23D4BBF5000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D585F5000
|
trusted library allocation
|
page read and write
|
||
23D4D8AF000
|
trusted library allocation
|
page read and write
|
||
23D55150000
|
trusted library allocation
|
page read and write
|
||
23D58549000
|
trusted library allocation
|
page read and write
|
||
23D58616000
|
trusted library allocation
|
page read and write
|
||
23D4F9D2000
|
trusted library allocation
|
page read and write
|
||
23D4DDB9000
|
trusted library allocation
|
page read and write
|
||
23D4B9D4000
|
trusted library allocation
|
page read and write
|
||
23D4CB2D000
|
trusted library allocation
|
page read and write
|
||
23D4BD77000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D4CA91000
|
trusted library allocation
|
page read and write
|
||
23D48D7F000
|
trusted library allocation
|
page read and write
|
||
23D4F7F5000
|
trusted library allocation
|
page read and write
|
||
213C8364000
|
heap
|
page read and write
|
||
23D4D842000
|
trusted library allocation
|
page read and write
|
||
23D579FE000
|
trusted library allocation
|
page read and write
|
||
23D4E1E7000
|
trusted library allocation
|
page read and write
|
||
23D4D95C000
|
trusted library allocation
|
page read and write
|
||
23D4B2BB000
|
trusted library allocation
|
page read and write
|
||
23D563E4000
|
trusted library allocation
|
page read and write
|
||
23D57DF9000
|
trusted library allocation
|
page read and write
|
||
23D4E13B000
|
trusted library allocation
|
page read and write
|
||
23D4E3D1000
|
trusted library allocation
|
page read and write
|
||
23D4CA38000
|
trusted library allocation
|
page read and write
|
||
23D4BD7B000
|
trusted library allocation
|
page read and write
|
||
226BC813000
|
trusted library allocation
|
page read and write
|
||
23D4F881000
|
trusted library allocation
|
page read and write
|
||
22D67F20000
|
heap
|
page read and write
|
||
23D4D218000
|
trusted library allocation
|
page read and write
|
||
23D57967000
|
trusted library allocation
|
page read and write
|
||
23D42B50000
|
heap
|
page read and write
|
||
23D57DF7000
|
trusted library allocation
|
page read and write
|
||
35B1000
|
heap
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
23D57AF8000
|
trusted library allocation
|
page read and write
|
||
1EEA416D000
|
heap
|
page read and write
|
||
23D57DEE000
|
trusted library allocation
|
page read and write
|
||
23D4E445000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
213C837D000
|
heap
|
page read and write
|
||
23D4F9BE000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4E3FA000
|
trusted library allocation
|
page read and write
|
||
23D53FCB000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D50CB3000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D57E01000
|
heap
|
page read and write
|
||
23D58618000
|
trusted library allocation
|
page read and write
|
||
23D57AF4000
|
trusted library allocation
|
page read and write
|
||
23D57C54000
|
trusted library allocation
|
page read and write
|
||
23D4FADF000
|
trusted library allocation
|
page read and write
|
||
23D4B4E2000
|
heap
|
page read and write
|
||
23D4CADA000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
BDF000
|
heap
|
page read and write
|
||
23D579E4000
|
trusted library allocation
|
page read and write
|
||
23D4F3AE000
|
trusted library allocation
|
page read and write
|
||
23D57998000
|
trusted library allocation
|
page read and write
|
||
23D42B48000
|
heap
|
page read and write
|
||
23D55A4B000
|
trusted library allocation
|
page read and write
|
||
3B6A2E724000
|
trusted library allocation
|
page read and write
|
||
23D48AC8000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
22D6821C000
|
trusted library allocation
|
page read and write
|
||
23D4E322000
|
trusted library allocation
|
page read and write
|
||
23D4BDDA000
|
trusted library allocation
|
page read and write
|
||
23D54AF1000
|
trusted library allocation
|
page read and write
|
||
23D4D87C000
|
trusted library allocation
|
page read and write
|
||
23D4E37D000
|
trusted library allocation
|
page read and write
|
||
213C83EC000
|
heap
|
page read and write
|
||
23D57925000
|
trusted library allocation
|
page read and write
|
||
23D4CB5B000
|
trusted library allocation
|
page read and write
|
||
23D4F9DF000
|
trusted library allocation
|
page read and write
|
||
2D9000
|
stack
|
page read and write
|
||
23D5796C000
|
trusted library allocation
|
page read and write
|
||
23D50CAE000
|
trusted library allocation
|
page read and write
|
||
23D585BA000
|
trusted library allocation
|
page read and write
|
||
23D57AFC000
|
trusted library allocation
|
page read and write
|
||
23D4D210000
|
trusted library allocation
|
page read and write
|
||
BFD7A7E000
|
stack
|
page read and write
|
||
1CB32BE000
|
unkown
|
page readonly
|
||
23D4B22D000
|
trusted library allocation
|
page read and write
|
||
23D4E39E000
|
trusted library allocation
|
page read and write
|
||
23D4BA90000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4DFC1000
|
trusted library allocation
|
page read and write
|
||
22D67DF0000
|
heap
|
page read and write
|
||
213C8363000
|
heap
|
page read and write
|
||
23D4E3A0000
|
trusted library allocation
|
page read and write
|
||
23D5860E000
|
trusted library allocation
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D47BAF000
|
trusted library allocation
|
page read and write
|
||
226BC430000
|
unclassified section
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
1CAEEDB000
|
stack
|
page read and write
|
||
23D4F4E2000
|
trusted library allocation
|
page read and write
|
||
23D4FA38000
|
trusted library allocation
|
page read and write
|
||
23D4DDB6000
|
trusted library allocation
|
page read and write
|
||
23D4B9D4000
|
trusted library allocation
|
page read and write
|
||
23D4D86C000
|
trusted library allocation
|
page read and write
|
||
213C7710000
|
trusted library allocation
|
page read and write
|
||
226BC811000
|
trusted library allocation
|
page read and write
|
||
23D540FA000
|
trusted library allocation
|
page read and write
|
||
23D4E48D000
|
trusted library allocation
|
page read and write
|
||
23D57AC9000
|
trusted library allocation
|
page read and write
|
||
23D57C52000
|
trusted library allocation
|
page read and write
|
||
23D57DFB000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
226BC590000
|
heap
|
page read and write
|
||
23D4F4D6000
|
trusted library allocation
|
page read and write
|
||
213C73D0000
|
unclassified section
|
page readonly
|
||
23D4BB92000
|
trusted library allocation
|
page read and write
|
||
23D4D769000
|
trusted library allocation
|
page read and write
|
||
B22000
|
unkown
|
page readonly
|
||
2AF7CFDA000
|
heap
|
page read and write
|
||
23D57BC8000
|
trusted library allocation
|
page read and write
|
||
23D543AC000
|
trusted library allocation
|
page read and write
|
||
23D4DD90000
|
trusted library allocation
|
page read and write
|
||
23D48AC8000
|
trusted library allocation
|
page read and write
|
||
23D4E2D8000
|
trusted library allocation
|
page read and write
|
||
23D57D6B000
|
trusted library allocation
|
page read and write
|
||
23D474A6000
|
trusted library allocation
|
page read and write
|
||
23D57DDA000
|
trusted library allocation
|
page read and write
|
||
22D68370000
|
heap
|
page read and write
|
||
23D4D798000
|
trusted library allocation
|
page read and write
|
||
23D48DBE000
|
trusted library allocation
|
page read and write
|
||
23D4E2D3000
|
trusted library allocation
|
page read and write
|
||
23D57CD3000
|
trusted library allocation
|
page read and write
|
||
23D57DC7000
|
trusted library allocation
|
page read and write
|
||
23D58618000
|
trusted library allocation
|
page read and write
|
||
23D47C00000
|
trusted library allocation
|
page read and write
|
||
23D4E4CD000
|
trusted library allocation
|
page read and write
|
||
226BC824000
|
trusted library allocation
|
page read and write
|
||
23D57C10000
|
trusted library allocation
|
page read and write
|
||
23D48DDD000
|
trusted library allocation
|
page read and write
|
||
23D54905000
|
trusted library allocation
|
page read and write
|
||
213C83FC000
|
heap
|
page read and write
|
||
23D57C70000
|
trusted library allocation
|
page read and write
|
||
23D53FF2000
|
trusted library allocation
|
page read and write
|
||
23D4F4D1000
|
trusted library allocation
|
page read and write
|
||
226BC8F6000
|
trusted library allocation
|
page read and write
|
||
23D4C8CE000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D57AF0000
|
trusted library allocation
|
page read and write
|
||
23D4E358000
|
trusted library allocation
|
page read and write
|
||
23D4C144000
|
trusted library allocation
|
page read and write
|
||
22D67DE2000
|
unclassified section
|
page read and write
|
||
23D4BBBB000
|
trusted library allocation
|
page read and write
|
||
23D586BF000
|
trusted library allocation
|
page read and write
|
||
23D586CE000
|
trusted library allocation
|
page read and write
|
||
23D48D96000
|
trusted library allocation
|
page read and write
|
||
23D4E49B000
|
trusted library allocation
|
page read and write
|
||
BDD000
|
heap
|
page read and write
|
||
23D474C9000
|
trusted library allocation
|
page read and write
|
||
213C7715000
|
trusted library allocation
|
page read and write
|
||
23D55186000
|
trusted library allocation
|
page read and write
|
||
23D57A9A000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D54100000
|
trusted library allocation
|
page read and write
|
||
23D540B3000
|
trusted library allocation
|
page read and write
|
||
23D57100000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4CAC0000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
213C8445000
|
heap
|
page read and write
|
||
23D4CADF000
|
trusted library allocation
|
page read and write
|
||
23D47B17000
|
trusted library allocation
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D4B4F2000
|
heap
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4D7CA000
|
trusted library allocation
|
page read and write
|
||
23D4E2D8000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4B4E2000
|
heap
|
page read and write
|
||
23D4E4E7000
|
trusted library allocation
|
page read and write
|
||
23D4E387000
|
trusted library allocation
|
page read and write
|
||
23D540E9000
|
trusted library allocation
|
page read and write
|
||
23D4D7CA000
|
trusted library allocation
|
page read and write
|
||
23D4BA68000
|
trusted library allocation
|
page read and write
|
||
23D42B54000
|
heap
|
page read and write
|
||
23D53F6C000
|
trusted library allocation
|
page read and write
|
||
23D48D50000
|
trusted library allocation
|
page read and write
|
||
23D57D98000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D4BBD9000
|
trusted library allocation
|
page read and write
|
||
23D53FBF000
|
trusted library allocation
|
page read and write
|
||
23D57AFE000
|
trusted library allocation
|
page read and write
|
||
23D54406000
|
trusted library allocation
|
page read and write
|
||
23D585E3000
|
trusted library allocation
|
page read and write
|
||
23D57A98000
|
trusted library allocation
|
page read and write
|
||
23D4D7C5000
|
trusted library allocation
|
page read and write
|
||
23D4CFFD000
|
trusted library allocation
|
page read and write
|
||
23D42B4C000
|
heap
|
page read and write
|
||
23D4F95E000
|
trusted library allocation
|
page read and write
|
||
23D4CBFC000
|
trusted library allocation
|
page read and write
|
||
23D57326000
|
trusted library allocation
|
page read and write
|
||
213C83E6000
|
heap
|
page read and write
|
||
23D576F6000
|
trusted library allocation
|
page read and write
|
||
213C8445000
|
heap
|
page read and write
|
||
23D4CB5B000
|
trusted library allocation
|
page read and write
|
||
23D55800000
|
trusted library allocation
|
page read and write
|
||
23D585D1000
|
trusted library allocation
|
page read and write
|
||
23D4E5B6000
|
trusted library allocation
|
page read and write
|
||
23D4E36B000
|
trusted library allocation
|
page read and write
|
||
23D4DF74000
|
trusted library allocation
|
page read and write
|
||
23D4CEA0000
|
trusted library allocation
|
page read and write
|
||
23D4F038000
|
trusted library allocation
|
page read and write
|
||
23D4F4DA000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D4E4F8000
|
trusted library allocation
|
page read and write
|
||
23D5798C000
|
trusted library allocation
|
page read and write
|
||
23D4E4CF000
|
trusted library allocation
|
page read and write
|
||
23D54093000
|
trusted library allocation
|
page read and write
|
||
23D4B984000
|
trusted library allocation
|
page read and write
|
||
23D4BB92000
|
trusted library allocation
|
page read and write
|
||
23D4D700000
|
trusted library allocation
|
page read and write
|
||
23D586A3000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4D9BD000
|
trusted library allocation
|
page read and write
|
||
BFD61FE000
|
stack
|
page read and write
|
||
23D4C8C2000
|
trusted library allocation
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4CBF2000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D57974000
|
trusted library allocation
|
page read and write
|
||
23D4B4F4000
|
heap
|
page read and write
|
||
23D4E585000
|
trusted library allocation
|
page read and write
|
||
23D4B582000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D4B2FD000
|
trusted library allocation
|
page read and write
|
||
23D4BD46000
|
trusted library allocation
|
page read and write
|
||
23D4F0A5000
|
trusted library allocation
|
page read and write
|
||
23D4F8F8000
|
trusted library allocation
|
page read and write
|
||
23D4D7C5000
|
trusted library allocation
|
page read and write
|
||
BFD470B000
|
stack
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D42B2A000
|
heap
|
page read and write
|
||
23D4D244000
|
trusted library allocation
|
page read and write
|
||
23D57AC6000
|
trusted library allocation
|
page read and write
|
||
23D4FAE3000
|
trusted library allocation
|
page read and write
|
||
23D573E4000
|
trusted library allocation
|
page read and write
|
||
23D4C108000
|
trusted library allocation
|
page read and write
|
||
23D5862D000
|
trusted library allocation
|
page read and write
|
||
23D4F3B9000
|
trusted library allocation
|
page read and write
|
||
23D540FD000
|
trusted library allocation
|
page read and write
|
||
23D4BBC2000
|
trusted library allocation
|
page read and write
|
||
23D57D5C000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D4D7BE000
|
trusted library allocation
|
page read and write
|
||
23D4CAF6000
|
trusted library allocation
|
page read and write
|
||
23D53FFD000
|
trusted library allocation
|
page read and write
|
||
23D4C1A2000
|
trusted library allocation
|
page read and write
|
||
23D4B24E000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D53FFA000
|
trusted library allocation
|
page read and write
|
||
23D58614000
|
trusted library allocation
|
page read and write
|
||
23D4D83D000
|
trusted library allocation
|
page read and write
|
||
23D58622000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D573E2000
|
trusted library allocation
|
page read and write
|
||
23D57AC6000
|
trusted library allocation
|
page read and write
|
||
23D4F8BD000
|
trusted library allocation
|
page read and write
|
||
23D4D7CA000
|
trusted library allocation
|
page read and write
|
||
23D586EE000
|
trusted library allocation
|
page read and write
|
||
23D4D8F7000
|
trusted library allocation
|
page read and write
|
||
23D4FAD3000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4CA7E000
|
trusted library allocation
|
page read and write
|
||
23D54348000
|
trusted library allocation
|
page read and write
|
||
23D53F6C000
|
trusted library allocation
|
page read and write
|
||
23D57AA0000
|
trusted library allocation
|
page read and write
|
||
23D4CB7C000
|
trusted library allocation
|
page read and write
|
||
23D57D84000
|
trusted library allocation
|
page read and write
|
||
23D57DFB000
|
trusted library allocation
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D42B4A000
|
heap
|
page read and write
|
||
23D585F5000
|
trusted library allocation
|
page read and write
|
||
23D4E09D000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D4E3A8000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4BDDA000
|
trusted library allocation
|
page read and write
|
||
23D4E19B000
|
trusted library allocation
|
page read and write
|
||
23D4CF3B000
|
trusted library allocation
|
page read and write
|
||
23D57E35000
|
heap
|
page read and write
|
||
23D48CCF000
|
trusted library allocation
|
page read and write
|
||
23D55AB7000
|
trusted library allocation
|
page read and write
|
||
23D48DA5000
|
trusted library allocation
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D4E14B000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D4D842000
|
trusted library allocation
|
page read and write
|
||
23D4FABA000
|
trusted library allocation
|
page read and write
|
||
23D4C17F000
|
trusted library allocation
|
page read and write
|
||
23D55A6B000
|
trusted library allocation
|
page read and write
|
||
23D4F9CB000
|
trusted library allocation
|
page read and write
|
||
23D57A96000
|
trusted library allocation
|
page read and write
|
||
23D53E93000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
23D585D1000
|
trusted library allocation
|
page read and write
|
||
23D42B4B000
|
heap
|
page read and write
|
||
23D4F0AA000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
AFC000
|
unkown
|
page readonly
|
||
23D4F4F6000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D4BA21000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D58606000
|
trusted library allocation
|
page read and write
|
||
23D53F4C000
|
trusted library allocation
|
page read and write
|
||
23D4E4AE000
|
trusted library allocation
|
page read and write
|
||
23D4BAA0000
|
trusted library allocation
|
page read and write
|
||
23D4BA64000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D4FAFB000
|
trusted library allocation
|
page read and write
|
||
23D4E61C000
|
trusted library allocation
|
page read and write
|
||
23D573E8000
|
trusted library allocation
|
page read and write
|
||
23D4B2DA000
|
trusted library allocation
|
page read and write
|
||
23D5514D000
|
trusted library allocation
|
page read and write
|
||
23D4CADD000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4F8D8000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4E6ED000
|
trusted library allocation
|
page read and write
|
||
23D4D2F9000
|
trusted library allocation
|
page read and write
|
||
23D5766C000
|
trusted library allocation
|
page read and write
|
||
23D540F7000
|
trusted library allocation
|
page read and write
|
||
23D4F94A000
|
trusted library allocation
|
page read and write
|
||
23D4E370000
|
trusted library allocation
|
page read and write
|
||
23D586C9000
|
trusted library allocation
|
page read and write
|
||
23D53F76000
|
trusted library allocation
|
page read and write
|
||
23D55A9C000
|
trusted library allocation
|
page read and write
|
||
23D5852C000
|
trusted library allocation
|
page read and write
|
||
23D4BAD6000
|
trusted library allocation
|
page read and write
|
||
23D4DF85000
|
trusted library allocation
|
page read and write
|
||
23D4CB33000
|
trusted library allocation
|
page read and write
|
||
23D57DC1000
|
trusted library allocation
|
page read and write
|
||
23D4F4EF000
|
trusted library allocation
|
page read and write
|
||
23D579DC000
|
trusted library allocation
|
page read and write
|
||
23D4E1F9000
|
trusted library allocation
|
page read and write
|
||
23D48D41000
|
trusted library allocation
|
page read and write
|
||
213C83F2000
|
heap
|
page read and write
|
||
23D4F0FA000
|
trusted library allocation
|
page read and write
|
||
23D57AD5000
|
trusted library allocation
|
page read and write
|
||
23D4E623000
|
trusted library allocation
|
page read and write
|
||
23D42B25000
|
heap
|
page read and write
|
||
23D4F8F2000
|
trusted library allocation
|
page read and write
|
||
23D53FCB000
|
trusted library allocation
|
page read and write
|
||
23D4B929000
|
trusted library allocation
|
page read and write
|
||
23D4F8BF000
|
trusted library allocation
|
page read and write
|
||
23D573F5000
|
trusted library allocation
|
page read and write
|
||
23D57DC4000
|
trusted library allocation
|
page read and write
|
||
23D42B2B000
|
heap
|
page read and write
|
||
23D50C7E000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D57A56000
|
trusted library allocation
|
page read and write
|
||
23D53FCF000
|
trusted library allocation
|
page read and write
|
||
23D4E389000
|
trusted library allocation
|
page read and write
|
||
23D4D9A7000
|
trusted library allocation
|
page read and write
|
||
23D4B233000
|
trusted library allocation
|
page read and write
|
||
23D53E99000
|
trusted library allocation
|
page read and write
|
||
23D53EF7000
|
trusted library allocation
|
page read and write
|
||
23D4F4EF000
|
trusted library allocation
|
page read and write
|
||
213C776F000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4BB8C000
|
trusted library allocation
|
page read and write
|
||
23D55A87000
|
trusted library allocation
|
page read and write
|
||
23D42B31000
|
heap
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D4D8E6000
|
trusted library allocation
|
page read and write
|
||
23D4BA40000
|
trusted library allocation
|
page read and write
|
||
23D57DAB000
|
trusted library allocation
|
page read and write
|
||
23D58611000
|
trusted library allocation
|
page read and write
|
||
23D57D89000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
22D68219000
|
trusted library allocation
|
page read and write
|
||
23D4FAAC000
|
trusted library allocation
|
page read and write
|
||
23D4748A000
|
trusted library allocation
|
page read and write
|
||
23D47BF0000
|
trusted library allocation
|
page read and write
|
||
23D57CA8000
|
trusted library allocation
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
23D4D235000
|
trusted library allocation
|
page read and write
|
||
2A007FE000
|
stack
|
page read and write
|
||
23D4D10A000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D57954000
|
trusted library allocation
|
page read and write
|
||
23D57654000
|
trusted library allocation
|
page read and write
|
||
23D4BDF9000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4F699000
|
trusted library allocation
|
page read and write
|
||
213C83B9000
|
heap
|
page read and write
|
||
23D586D8000
|
trusted library allocation
|
page read and write
|
||
23D53EB9000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4CA84000
|
trusted library allocation
|
page read and write
|
||
23D4BA48000
|
trusted library allocation
|
page read and write
|
||
23D42B38000
|
heap
|
page read and write
|
||
23D57954000
|
trusted library allocation
|
page read and write
|
||
226BC440000
|
heap
|
page read and write
|
||
23D586A6000
|
trusted library allocation
|
page read and write
|
||
23D50CB3000
|
trusted library allocation
|
page read and write
|
||
23D585FB000
|
trusted library allocation
|
page read and write
|
||
23D4E358000
|
trusted library allocation
|
page read and write
|
||
1EEA5BA7000
|
heap
|
page read and write
|
||
D0CEFFE000
|
stack
|
page read and write
|
||
23D579DC000
|
trusted library allocation
|
page read and write
|
||
23D4C18F000
|
trusted library allocation
|
page read and write
|
||
23D42B1C000
|
heap
|
page read and write
|
||
23D4E38B000
|
trusted library allocation
|
page read and write
|
||
23D4DEF2000
|
trusted library allocation
|
page read and write
|
||
23D42B5A000
|
heap
|
page read and write
|
||
23D4BB90000
|
trusted library allocation
|
page read and write
|
||
23D4E451000
|
trusted library allocation
|
page read and write
|
||
23D42B0F000
|
heap
|
page read and write
|
||
23D4E172000
|
trusted library allocation
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D4B9A1000
|
trusted library allocation
|
page read and write
|
||
22D67FA0000
|
heap
|
page read and write
|
||
23D57AF6000
|
trusted library allocation
|
page read and write
|
||
23D4B21A000
|
trusted library allocation
|
page read and write
|
||
23D4CE5C000
|
trusted library allocation
|
page read and write
|
||
23D4C1A4000
|
trusted library allocation
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D586D3000
|
trusted library allocation
|
page read and write
|
||
23D57BDB000
|
trusted library allocation
|
page read and write
|
||
23D4E656000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D57DEA000
|
trusted library allocation
|
page read and write
|
||
23D573B7000
|
trusted library allocation
|
page read and write
|
||
23D4CB59000
|
trusted library allocation
|
page read and write
|
||
23D4D8B3000
|
trusted library allocation
|
page read and write
|
||
23D585B1000
|
trusted library allocation
|
page read and write
|
||
23D4E396000
|
trusted library allocation
|
page read and write
|
||
23D57DDF000
|
trusted library allocation
|
page read and write
|
||
23D48DBB000
|
trusted library allocation
|
page read and write
|
||
23D55AA3000
|
trusted library allocation
|
page read and write
|
||
23D48AEA000
|
trusted library allocation
|
page read and write
|
||
23D4F95E000
|
trusted library allocation
|
page read and write
|
||
21DF2E70000
|
trusted library allocation
|
page execute read
|
||
23D4D7CA000
|
trusted library allocation
|
page read and write
|
||
23D4D2B8000
|
trusted library allocation
|
page read and write
|
||
23D4B9B8000
|
trusted library allocation
|
page read and write
|
||
23D53F4A000
|
trusted library allocation
|
page read and write
|
||
23D4C133000
|
trusted library allocation
|
page read and write
|
||
23D4BB6A000
|
trusted library allocation
|
page read and write
|
||
23D4D798000
|
trusted library allocation
|
page read and write
|
||
23D4F93C000
|
trusted library allocation
|
page read and write
|
||
23D54307000
|
trusted library allocation
|
page read and write
|
||
23D4BBBB000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D42B1F000
|
heap
|
page read and write
|
||
23D48DF6000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D576DD000
|
trusted library allocation
|
page read and write
|
||
23D4F4D6000
|
trusted library allocation
|
page read and write
|
||
23D5491C000
|
trusted library allocation
|
page read and write
|
||
23D4CD61000
|
trusted library allocation
|
page read and write
|
||
2A017FE000
|
stack
|
page read and write
|
||
23D42B15000
|
heap
|
page read and write
|
||
23D4F9C3000
|
trusted library allocation
|
page read and write
|
||
23D4DF10000
|
trusted library allocation
|
page read and write
|
||
23D4DE51000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
22D68000000
|
trusted library allocation
|
page read and write
|
||
23D54093000
|
trusted library allocation
|
page read and write
|
||
226BCA03000
|
trusted library allocation
|
page read and write
|
||
23D4B58D000
|
trusted library allocation
|
page read and write
|
||
23D47BA7000
|
trusted library allocation
|
page read and write
|
||
23D42B4F000
|
heap
|
page read and write
|
||
23D57FC2000
|
heap
|
page read and write
|
||
23D47BFE000
|
trusted library allocation
|
page read and write
|
||
23D4FAE3000
|
trusted library allocation
|
page read and write
|
||
23D4D7C1000
|
trusted library allocation
|
page read and write
|
||
D0CB59E000
|
stack
|
page read and write
|
||
23D579E4000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4DF74000
|
trusted library allocation
|
page read and write
|
||
23D4FAE3000
|
trusted library allocation
|
page read and write
|
||
23D585AA000
|
trusted library allocation
|
page read and write
|
||
23D42B50000
|
heap
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D50C4C000
|
trusted library allocation
|
page read and write
|
||
23D4CB7C000
|
trusted library allocation
|
page read and write
|
||
23D42B5D000
|
heap
|
page read and write
|
||
23D4D238000
|
trusted library allocation
|
page read and write
|
||
23D4FA93000
|
trusted library allocation
|
page read and write
|
||
23D57DF6000
|
trusted library allocation
|
page read and write
|
||
23D4F4D1000
|
trusted library allocation
|
page read and write
|
||
23D579E8000
|
trusted library allocation
|
page read and write
|
||
23D4E36B000
|
trusted library allocation
|
page read and write
|
||
23D57BE5000
|
trusted library allocation
|
page read and write
|
||
23D579DE000
|
trusted library allocation
|
page read and write
|
||
23D4B4D6000
|
heap
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D4E56A000
|
trusted library allocation
|
page read and write
|
||
BFD8ABE000
|
unkown
|
page readonly
|
||
23D4C199000
|
trusted library allocation
|
page read and write
|
||
23D4CAF6000
|
trusted library allocation
|
page read and write
|
||
23D4D244000
|
trusted library allocation
|
page read and write
|
||
23D540FD000
|
trusted library allocation
|
page read and write
|
||
23D58533000
|
trusted library allocation
|
page read and write
|
||
23D4E3CF000
|
trusted library allocation
|
page read and write
|
||
23D4BA85000
|
trusted library allocation
|
page read and write
|
||
23D58593000
|
trusted library allocation
|
page read and write
|
||
23D4D840000
|
trusted library allocation
|
page read and write
|
||
23D4B561000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4CEBC000
|
trusted library allocation
|
page read and write
|
||
23D4D2FE000
|
trusted library allocation
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
23D4B2BF000
|
trusted library allocation
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4CAAC000
|
trusted library allocation
|
page read and write
|
||
23D4FADF000
|
trusted library allocation
|
page read and write
|
||
23D50CD1000
|
trusted library allocation
|
page read and write
|
||
226BC800000
|
trusted library allocation
|
page read and write
|
||
2AF7D3A0000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D4F820000
|
trusted library allocation
|
page read and write
|
||
23D4B29A000
|
trusted library allocation
|
page read and write
|
||
23D4F9DF000
|
trusted library allocation
|
page read and write
|
||
22D67DD0000
|
heap
|
page readonly
|
||
23D4C8E7000
|
trusted library allocation
|
page read and write
|
||
23D4B2CC000
|
trusted library allocation
|
page read and write
|
||
23D4FABA000
|
trusted library allocation
|
page read and write
|
||
23D48DBB000
|
trusted library allocation
|
page read and write
|
||
23D4F940000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D4E1EF000
|
trusted library allocation
|
page read and write
|
||
23D4BBA8000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D4B29A000
|
trusted library allocation
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4D76C000
|
trusted library allocation
|
page read and write
|
||
23D4CEA5000
|
trusted library allocation
|
page read and write
|
||
23D42B27000
|
heap
|
page read and write
|
||
23D4CA04000
|
trusted library allocation
|
page read and write
|
||
23D4F09A000
|
trusted library allocation
|
page read and write
|
||
23D4D886000
|
trusted library allocation
|
page read and write
|
||
23D4CB59000
|
trusted library allocation
|
page read and write
|
||
23D585E3000
|
trusted library allocation
|
page read and write
|
||
23D4BBE2000
|
trusted library allocation
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D4E397000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
23D4E4CF000
|
trusted library allocation
|
page read and write
|
||
22D681A5000
|
trusted library allocation
|
page read and write
|
||
23D4B232000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D50C84000
|
trusted library allocation
|
page read and write
|
||
23D4F4FA000
|
trusted library allocation
|
page read and write
|
||
23D57DAE000
|
trusted library allocation
|
page read and write
|
||
23D4BB6C000
|
trusted library allocation
|
page read and write
|
||
23D53F6C000
|
trusted library allocation
|
page read and write
|
||
213C83F1000
|
heap
|
page read and write
|
||
23D4E11C000
|
trusted library allocation
|
page read and write
|
||
22D6812E000
|
trusted library allocation
|
page read and write
|
||
23D42B57000
|
heap
|
page read and write
|
||
23D42B57000
|
heap
|
page read and write
|
||
23D4E0AD000
|
trusted library allocation
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D4F6D0000
|
trusted library allocation
|
page read and write
|
||
23D4CA89000
|
trusted library allocation
|
page read and write
|
||
23D53FF8000
|
trusted library allocation
|
page read and write
|
||
213C75D4000
|
heap
|
page read and write
|
||
23D4D738000
|
trusted library allocation
|
page read and write
|
||
226BC7F4000
|
heap
|
page read and write
|
||
23D4B25F000
|
trusted library allocation
|
page read and write
|
||
23D42B1E000
|
heap
|
page read and write
|
||
23D4F6E0000
|
trusted library allocation
|
page read and write
|
||
23D57CF6000
|
trusted library allocation
|
page read and write
|
||
23D4BDF1000
|
trusted library allocation
|
page read and write
|
||
23D4D2FB000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
22D67D60000
|
heap
|
page read and write
|
||
23D4E3C3000
|
trusted library allocation
|
page read and write
|
||
23D53F00000
|
trusted library allocation
|
page read and write
|
||
23D57D7E000
|
trusted library allocation
|
page read and write
|
||
23D586B0000
|
trusted library allocation
|
page read and write
|
||
23D47B7E000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D551E4000
|
trusted library allocation
|
page read and write
|
||
23D4FA36000
|
trusted library allocation
|
page read and write
|
||
23D585B4000
|
trusted library allocation
|
page read and write
|
||
23D4B47D000
|
heap
|
page read and write
|
||
23D4CA84000
|
trusted library allocation
|
page read and write
|
||
23D4FA93000
|
trusted library allocation
|
page read and write
|
||
23D4E2DD000
|
trusted library allocation
|
page read and write
|
||
23D57DE7000
|
trusted library allocation
|
page read and write
|
||
23D48A53000
|
trusted library allocation
|
page read and write
|
||
213C77BC000
|
trusted library allocation
|
page read and write
|
||
23D4E38B000
|
trusted library allocation
|
page read and write
|
||
23D58595000
|
trusted library allocation
|
page read and write
|
||
23D4D235000
|
trusted library allocation
|
page read and write
|
||
23D4BAA7000
|
trusted library allocation
|
page read and write
|
||
23D4BB49000
|
trusted library allocation
|
page read and write
|
||
23D42B9B000
|
heap
|
page read and write
|
||
23D4F8D4000
|
trusted library allocation
|
page read and write
|
||
23D4F0AD000
|
trusted library allocation
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D4D876000
|
trusted library allocation
|
page read and write
|
||
2A7FDFF000
|
stack
|
page read and write
|
||
23D4D771000
|
trusted library allocation
|
page read and write
|
||
23D4BB7E000
|
trusted library allocation
|
page read and write
|
||
23D4DFDC000
|
trusted library allocation
|
page read and write
|
||
23D4F467000
|
trusted library allocation
|
page read and write
|
||
23D4E3B1000
|
trusted library allocation
|
page read and write
|
||
23D4E11C000
|
trusted library allocation
|
page read and write
|
||
23D57DE7000
|
trusted library allocation
|
page read and write
|
||
23D4E1E2000
|
trusted library allocation
|
page read and write
|
||
23D42B29000
|
heap
|
page read and write
|
||
23D57FC2000
|
heap
|
page read and write
|
||
23D42B2D000
|
heap
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4CFFD000
|
trusted library allocation
|
page read and write
|
||
23D4B4E3000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D579E0000
|
trusted library allocation
|
page read and write
|
||
23D4B941000
|
trusted library allocation
|
page read and write
|
||
23D540D6000
|
trusted library allocation
|
page read and write
|
||
23D42B57000
|
heap
|
page read and write
|
||
23D4F835000
|
trusted library allocation
|
page read and write
|
||
23D4CF1E000
|
trusted library allocation
|
page read and write
|
||
23D42B49000
|
heap
|
page read and write
|
||
23D4B9D4000
|
trusted library allocation
|
page read and write
|
||
23D540EE000
|
trusted library allocation
|
page read and write
|
||
23D56343000
|
trusted library allocation
|
page read and write
|
||
23D57DA9000
|
trusted library allocation
|
page read and write
|
||
23D5860F000
|
trusted library allocation
|
page read and write
|
||
23D4FADF000
|
trusted library allocation
|
page read and write
|
||
23D50CAE000
|
trusted library allocation
|
page read and write
|
||
23D5858C000
|
trusted library allocation
|
page read and write
|
||
23D4FAAF000
|
trusted library allocation
|
page read and write
|
||
23D4CAF6000
|
trusted library allocation
|
page read and write
|
||
23D4D2C5000
|
trusted library allocation
|
page read and write
|
||
23D579DA000
|
trusted library allocation
|
page read and write
|
||
23D579DA000
|
trusted library allocation
|
page read and write
|
||
23D4BA4C000
|
trusted library allocation
|
page read and write
|
||
23D579AD000
|
trusted library allocation
|
page read and write
|
||
23D42B1A000
|
heap
|
page read and write
|
||
213C8459000
|
heap
|
page read and write
|
||
23D4D296000
|
trusted library allocation
|
page read and write
|
||
23D4E353000
|
trusted library allocation
|
page read and write
|
||
23D53FF8000
|
trusted library allocation
|
page read and write
|
||
23D4FAFD000
|
trusted library allocation
|
page read and write
|
||
213C73F0000
|
heap
|
page read and write
|
||
23D4E4F8000
|
trusted library allocation
|
page read and write
|
||
226BC876000
|
trusted library allocation
|
page read and write
|
||
23D42B24000
|
heap
|
page read and write
|
||
23D4D7CA000
|
trusted library allocation
|
page read and write
|
||
23D4B271000
|
trusted library allocation
|
page read and write
|
||
23D4E39E000
|
trusted library allocation
|
page read and write
|
||
23D4BA7F000
|
trusted library allocation
|
page read and write
|
||
23D54090000
|
trusted library allocation
|
page read and write
|
||
FE5CFFE000
|
stack
|
page read and write
|
||
23D48CEF000
|
trusted library allocation
|
page read and write
|
||
23D53F7F000
|
trusted library allocation
|
page read and write
|
||
23D4CEFD000
|
trusted library allocation
|
page read and write
|
||
23D4CDAD000
|
trusted library allocation
|
page read and write
|
||
23D4F0A2000
|
trusted library allocation
|
page read and write
|
||
23D47BE3000
|
trusted library allocation
|
page read and write
|
||
23D54380000
|
trusted library allocation
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
213C835F000
|
heap
|
page read and write
|
||
23D3DA63000
|
heap
|
page read and write
|
||
23D42B1D000
|
heap
|
page read and write
|
||
23D4D833000
|
trusted library allocation
|
page read and write
|
||
23D4E4B2000
|
trusted library allocation
|
page read and write
|
||
23D4D85B000
|
trusted library allocation
|
page read and write
|
||
23D57EB8000
|
heap
|
page read and write
|
||
23D4CAF0000
|
trusted library allocation
|
page read and write
|
||
23D4FAB1000
|
trusted library allocation
|
page read and write
|
||
23D4E3F2000
|
trusted library allocation
|
page read and write
|
||
23D42B3B000
|
heap
|
page read and write
|
||
D0CB55E000
|
unkown
|
page readonly
|
||
23D4CA60000
|
trusted library allocation
|
page read and write
|
||
23D4C138000
|
trusted library allocation
|
page read and write
|
||
23D42B40000
|
heap
|
page read and write
|
||
23D42B4E000
|
heap
|
page read and write
|
||
23D4CE56000
|
trusted library allocation
|
page read and write
|
||
23D47490000
|
trusted library allocation
|
page read and write
|
||
1EEA5BB5000
|
heap
|
page read and write
|
||
23D55A64000
|
trusted library allocation
|
page read and write
|
||
23D4D821000
|
trusted library allocation
|
page read and write
|
||
23D42B52000
|
heap
|
page read and write
|
||
23D4FA85000
|
trusted library allocation
|
page read and write
|
||
23D4E358000
|
trusted library allocation
|
page read and write
|
||
23D4BDCA000
|
trusted library allocation
|
page read and write
|
||
23D4BB81000
|
trusted library allocation
|
page read and write
|
||
23D42B5B000
|
heap
|
page read and write
|
||
23D42B3D000
|
heap
|
page read and write
|
||
1CB09FE000
|
stack
|
page read and write
|
||
23D53FCB000
|
trusted library allocation
|
page read and write
|
||
23D4E4F4000
|
trusted library allocation
|
page read and write
|
||
23D42B0E000
|
heap
|
page read and write
|
||
23D42B53000
|
heap
|
page read and write
|
||
23D586D6000
|
trusted library allocation
|
page read and write
|
||
23D4E396000
|
trusted library allocation
|
page read and write
|
||
23D4D273000
|
trusted library allocation
|
page read and write
|
||
23D42B2E000
|
heap
|
page read and write
|
||
23D48D47000
|
trusted library allocation
|
page read and write
|
||
23D55141000
|
trusted library allocation
|
page read and write
|
||
23D585C7000
|
trusted library allocation
|
page read and write
|
||
23D57E8C000
|
heap
|
page read and write
|
||
23D4E1D2000
|
trusted library allocation
|
page read and write
|
||
23D4D83B000
|
trusted library allocation
|
page read and write
|
||
23D4D798000
|
trusted library allocation
|
page read and write
|
||
23D4B4D3000
|
heap
|
page read and write
|
||
23D4BB85000
|
trusted library allocation
|
page read and write
|
||
23D540C1000
|
trusted library allocation
|
page read and write
|
||
23D5511C000
|
trusted library allocation
|
page read and write
|
||
23D585B4000
|
trusted library allocation
|
page read and write
|
||
23D4CFFA000
|
trusted library allocation
|
page read and write
|
||
23D42B22000
|
heap
|
page read and write
|
There are 3794 hidden memdumps, click here to show them.