IOC Report
ORDER-24930-067548.js

loading gif

Files

File Path
Type
Category
Malicious
ORDER-24930-067548.js
ASCII text, with very long lines (7873), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\cc[1].js
Unicode text, UTF-16, little-endian text, with very long lines (27355), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\OLWJMU.js
Unicode text, UTF-16, little-endian text, with very long lines (27355), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Service.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GeUT.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Service.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
modified
C:\Users\user\AppData\Local\Temp\places.raw
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4627.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4638.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5E07.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp5E27.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5E37.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5F04.tmp.dat
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5F14.tmp.dat
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp5F83.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp5F93.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp5FA4.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5FA5.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.h
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\system32\wbem\Performance\WmiApRpl.h (copy)
ASCII text, with CRLF line terminators
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ORDER-24930-067548.js"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\OLWJMU.js"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Local\Temp\GeUT.exe
"C:\Users\user\AppData\Local\Temp\GeUT.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Users\user\AppData\Roaming\Service.exe
"C:\Users\user\AppData\Roaming\Service.exe"
malicious
C:\Windows\System32\wbem\WMIADAP.exe
wmiadap.exe /F /T /R
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://192.210.215.11/zoom/cc.j
unknown
malicious
http://192.210.215.11/zoom/cc.js
192.210.215.11
malicious
as525795.duckdns.org
malicious
194.37.97.150
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://urn.to/r/sds_seeaCould
unknown
http://go.mic
unknown
http://james.newtonking.com/projects/json
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://192.210.215.11/zoom/cc.jst
unknown
https://github.com/LimerBoy/StormKitty
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
https://support.mozilla.org
unknown
https://urn.to/r/sds_see
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 15 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
192.210.215.11
unknown
United States
malicious
194.37.97.150
unknown
Romania
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WindowsUpdate
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_CURRENT_USER\SOFTWARE\497B5ED3636167B0F1E8
436ACE6829F875FEC7CFDC9CAE0283849C6021AF7AE44C96E35989B0FF7E6B20

Memdumps

Base Address
Regiontype
Protect
Malicious
2AD1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2CF9000
trusted library allocation
page read and write
malicious
78E0000
trusted library section
page read and write
malicious
2DF9000
trusted library allocation
page read and write
malicious
3001000
trusted library allocation
page read and write
malicious
1123000
trusted library allocation
page execute and read and write
BE8000
stack
page read and write
2841000
trusted library allocation
page read and write
119E000
stack
page read and write
3961000
trusted library allocation
page read and write
2BDE0DBC000
heap
page read and write
1EF37574000
heap
page read and write
D4B000
stack
page read and write
55E000
stack
page read and write
5574000
trusted library allocation
page read and write
7E0000
heap
page read and write
770000
trusted library allocation
page read and write
4A10000
heap
page read and write
2A53000
trusted library allocation
page read and write
2BDE0E4C000
heap
page read and write
810000
heap
page read and write
2B90000
heap
page read and write
6B0000
heap
page read and write
1EF35002000
heap
page read and write
250E000
stack
page read and write
1EF375AD000
heap
page read and write
538E000
stack
page read and write
130E000
stack
page read and write
4F7000
stack
page read and write
1EF3774A000
heap
page read and write
4064000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
1EF38049000
heap
page read and write
2A48000
trusted library allocation
page read and write
294E000
stack
page read and write
4CEE000
stack
page read and write
1013000
trusted library allocation
page read and write
FE0000
heap
page read and write
13D0000
heap
page read and write
1EF374BC000
heap
page read and write
1EF370EF000
heap
page read and write
28B0000
heap
page read and write
56CE000
stack
page read and write
157B000
trusted library allocation
page execute and read and write
2AE9000
trusted library allocation
page read and write
2BDE1732000
heap
page read and write
1EF37EA7000
heap
page read and write
1EF34EFE000
heap
page read and write
52D4000
trusted library allocation
page read and write
2624000
trusted library allocation
page read and write
1EF374A9000
heap
page read and write
1EF37499000
heap
page read and write
1EF37EF0000
heap
page read and write
488F000
stack
page read and write
C6E000
stack
page read and write
1EF376B6000
heap
page read and write
AC3000
trusted library allocation
page execute and read and write
1155000
heap
page read and write
12CD000
stack
page read and write
830000
heap
page read and write
7A80000
trusted library allocation
page read and write
1EF3804A000
heap
page read and write
DE0000
trusted library allocation
page read and write
2B83000
trusted library allocation
page read and write
1EF374D1000
heap
page read and write
1EF38620000
trusted library allocation
page read and write
2CC9000
trusted library allocation
page read and write
AB5000
heap
page read and write
4E2E000
stack
page read and write
802000
unkown
page readonly
2A83000
trusted library allocation
page read and write
5BCE000
stack
page read and write
F20000
heap
page read and write
311B000
trusted library allocation
page read and write
2BDE0D9A000
heap
page read and write
22C5000
trusted library allocation
page read and write
5D5F000
stack
page read and write
15B0000
trusted library allocation
page read and write
2BDE17A9000
heap
page read and write
1EF374D2000
heap
page read and write
2BDE0DC7000
heap
page read and write
BC4000
trusted library allocation
page read and write
1EF37EF1000
heap
page read and write
1070000
trusted library allocation
page execute and read and write
1EF34F85000
heap
page read and write
7A90000
heap
page read and write
2BDE18E0000
heap
page read and write
1EF34F9D000
heap
page read and write
529E000
stack
page read and write
5661000
trusted library allocation
page read and write
5A7F000
stack
page read and write
2BDDF0AB000
heap
page read and write
5000000
trusted library allocation
page read and write
2F5E000
stack
page read and write
4FF0000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
1EF373C0000
heap
page read and write
4DBE000
stack
page read and write
4DDE000
stack
page read and write
133A000
heap
page read and write
3DB1000
trusted library allocation
page read and write
F2A000
trusted library allocation
page execute and read and write
AFB000
trusted library allocation
page execute and read and write
58DE000
stack
page read and write
24C0000
trusted library allocation
page read and write
7DB000
trusted library allocation
page execute and read and write
2D50000
heap
page read and write
2B80000
trusted library allocation
page read and write
A5F000
stack
page read and write
547E000
stack
page read and write
103A000
trusted library allocation
page execute and read and write
55A0000
heap
page read and write
1036000
trusted library allocation
page execute and read and write
779E000
stack
page read and write
1EF375CC000
heap
page read and write
50F0000
trusted library section
page read and write
1207000
trusted library allocation
page execute and read and write
6CD6000
heap
page read and write
9E0000
heap
page read and write
29D7000
trusted library allocation
page read and write
1EF374FE000
heap
page read and write
2527000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
106D000
stack
page read and write
280E000
stack
page read and write
585E000
stack
page read and write
4E50000
heap
page read and write
10F0000
heap
page read and write
77DE000
stack
page read and write
5A80000
trusted library allocation
page execute and read and write
1EF37ED2000
heap
page read and write
2EA0000
heap
page execute and read and write
12F0000
heap
page read and write
2CEE000
trusted library allocation
page read and write
1EF373C4000
heap
page read and write
25C5000
trusted library allocation
page read and write
2BDE10D0000
heap
page read and write
2BDE173A000
heap
page read and write
1150000
heap
page read and write
10FE000
stack
page read and write
C95000
heap
page read and write
774000
trusted library allocation
page read and write
2BDE0DAF000
heap
page read and write
1328000
heap
page read and write
1250000
heap
page read and write
113F000
stack
page read and write
653000
heap
page read and write
2BDDF0B1000
heap
page read and write
4E3E000
stack
page read and write
4DA0000
heap
page read and write
1110000
trusted library allocation
page read and write
2BDE175A000
heap
page read and write
1EF375CC000
heap
page read and write
10CE000
heap
page read and write
1EF375F6000
heap
page read and write
2BDDF0AB000
heap
page read and write
3120000
trusted library allocation
page execute and read and write
3521000
trusted library allocation
page read and write
7D0000
heap
page read and write
12F0000
heap
page read and write
2BDE1746000
heap
page read and write
1454000
trusted library allocation
page read and write
278E000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
BE0000
heap
page read and write
24CE000
stack
page read and write
2690000
trusted library allocation
page execute and read and write
2937000
trusted library allocation
page read and write
DE0000
heap
page read and write
1EF3762E000
heap
page read and write
2778000
trusted library allocation
page read and write
2C88000
trusted library allocation
page read and write
2BDE0DC7000
heap
page read and write
7E9C000
stack
page read and write
12E3000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
12DD000
trusted library allocation
page execute and read and write
5680000
trusted library allocation
page read and write
7CA000
trusted library allocation
page execute and read and write
333E000
stack
page read and write
4C7F000
stack
page read and write
1EF374D5000
heap
page read and write
14D4000
trusted library allocation
page read and write
2920000
heap
page read and write
2BDE0DC7000
heap
page read and write
793000
trusted library allocation
page execute and read and write
E80000
heap
page read and write
521E000
stack
page read and write
557F000
stack
page read and write
2770000
heap
page read and write
BE4000
trusted library allocation
page read and write
E1E000
heap
page read and write
390000
heap
page read and write
1EF37441000
heap
page read and write
2B7D000
trusted library allocation
page execute and read and write
1EF34FCB000
heap
page read and write
5590000
heap
page read and write
3841000
trusted library allocation
page read and write
1EF37398000
heap
page read and write
1EF374FB000
heap
page read and write
1EF374BC000
heap
page read and write
2C60000
trusted library allocation
page execute and read and write
B76000
heap
page read and write
1566000
trusted library allocation
page execute and read and write
1EF375B8000
heap
page read and write
29E9000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
2757000
trusted library allocation
page read and write
536E000
stack
page read and write
77D000
trusted library allocation
page execute and read and write
27A4000
trusted library allocation
page read and write
515E000
stack
page read and write
2BDE1739000
heap
page read and write
1EF38610000
heap
page read and write
1EF375AD000
heap
page read and write
C110EFB000
stack
page read and write
2BDE0E1A000
heap
page read and write
1355000
heap
page read and write
1EF36A20000
heap
page read and write
54F9000
stack
page read and write
2160000
heap
page execute and read and write
1EF38057000
heap
page read and write
1EF37920000
heap
page read and write
2D1E000
stack
page read and write
1EF375D6000
heap
page read and write
568F000
stack
page read and write
15A0000
trusted library allocation
page read and write
1EF37598000
heap
page read and write
51D2000
trusted library allocation
page read and write
E10000
heap
page read and write
B3E000
stack
page read and write
C20000
heap
page read and write
1EF3760E000
heap
page read and write
53DE000
stack
page read and write
2BDE12E0000
trusted library allocation
page read and write
2AF4000
trusted library allocation
page read and write
2BDDF074000
heap
page read and write
E00000
heap
page read and write
2271000
trusted library allocation
page read and write
1EF34F8F000
heap
page read and write
50EE000
stack
page read and write
C7B000
heap
page read and write
92E000
heap
page read and write
116F000
stack
page read and write
5C5000
heap
page read and write
5050000
heap
page execute and read and write
51E0000
trusted library allocation
page read and write
30EE000
stack
page read and write
85B000
stack
page read and write
281E000
trusted library allocation
page read and write
2A19000
trusted library allocation
page read and write
2BDE0DF0000
heap
page read and write
128E000
stack
page read and write
27C1000
trusted library allocation
page read and write
30B000
stack
page read and write
910000
heap
page read and write
2BDE1D15000
heap
page read and write
129F000
stack
page read and write
5A59000
stack
page read and write
1EF37371000
heap
page read and write
2ADE000
trusted library allocation
page read and write
773000
trusted library allocation
page execute and read and write
7A0000
trusted library allocation
page read and write
1047000
trusted library allocation
page execute and read and write
39A1000
trusted library allocation
page read and write
DA5000
trusted library allocation
page read and write
2357000
trusted library allocation
page read and write
4B30000
heap
page execute and read and write
15D3000
heap
page read and write
4F10000
heap
page execute and read and write
25A0000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
8E0000
heap
page read and write
2B04000
trusted library allocation
page read and write
2BDE0E40000
heap
page read and write
7E3000
heap
page read and write
2BDE0DC7000
heap
page read and write
2BDE0DC4000
heap
page read and write
FE5000
heap
page read and write
575000
heap
page read and write
1EF375B8000
heap
page read and write
4E09000
trusted library allocation
page read and write
2652000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
4B5E000
stack
page read and write
E6F000
stack
page read and write
135A000
trusted library allocation
page execute and read and write
1EF34F97000
heap
page read and write
1EF37671000
heap
page read and write
1EF37493000
heap
page read and write
2BDE0D90000
heap
page read and write
2521000
trusted library allocation
page read and write
5C5B000
stack
page read and write
840000
heap
page read and write
3155000
trusted library allocation
page read and write
5D4000
trusted library allocation
page read and write
12EE000
stack
page read and write
1EF37633000
heap
page read and write
2B9A000
trusted library allocation
page execute and read and write
272D000
stack
page read and write
26D0000
trusted library allocation
page read and write
3FB1000
trusted library allocation
page read and write
11F6000
trusted library allocation
page execute and read and write
78DE000
stack
page read and write
2D1F000
stack
page read and write
48FE000
stack
page read and write
4D50000
trusted library allocation
page read and write
4C1F000
stack
page read and write
10F7000
stack
page read and write
1EF373AD000
heap
page read and write
8E0000
trusted library allocation
page read and write
918000
heap
page read and write
1EF38060000
heap
page read and write
1EF37EF0000
heap
page read and write
1EF37486000
heap
page read and write
1EF37EA1000
heap
page read and write
4FD9000
trusted library allocation
page read and write
800000
heap
page read and write
FE0000
heap
page read and write
2737000
trusted library allocation
page read and write
2728000
trusted library allocation
page read and write
2BDE0D88000
heap
page read and write
2B3E000
trusted library allocation
page read and write
27EA000
trusted library allocation
page read and write
1EF3806D000
heap
page read and write
2BDE1C91000
heap
page read and write
228E000
stack
page read and write
1EF34FDE000
heap
page read and write
1320000
heap
page read and write
2BDE0DF0000
heap
page read and write
40C4000
trusted library allocation
page read and write
1EF37498000
heap
page read and write
B5E000
heap
page read and write
3150000
trusted library allocation
page read and write
2BDDF0C6000
heap
page read and write
C20000
heap
page read and write
1EF37E85000
heap
page read and write
1EF37598000
heap
page read and write
1554000
trusted library allocation
page read and write
1EF374D7000
heap
page read and write
28AE000
stack
page read and write
246E000
stack
page read and write
5666000
trusted library allocation
page read and write
22C0000
trusted library allocation
page read and write
52C5000
trusted library allocation
page read and write
B5E000
stack
page read and write
531F000
stack
page read and write
29E7000
trusted library allocation
page read and write
786000
trusted library allocation
page execute and read and write
2BDE0DF0000
heap
page read and write
C10000
heap
page read and write
48DE000
stack
page read and write
1EF37574000
heap
page read and write
2AB9000
trusted library allocation
page read and write
1EF3767D000
heap
page read and write
3098000
trusted library allocation
page read and write
1EF37498000
heap
page read and write
53FE000
stack
page read and write
1EF37E52000
heap
page read and write
1EF374C8000
heap
page read and write
2A03000
trusted library allocation
page read and write
5C0E000
stack
page read and write
29A1000
trusted library allocation
page read and write
A3E000
stack
page read and write
2D67000
trusted library allocation
page read and write
2BDE0E3B000
heap
page read and write
1EF37498000
heap
page read and write
2BDE0D87000
heap
page read and write
ED1000
heap
page read and write
1020000
trusted library allocation
page read and write
1EF37E52000
heap
page read and write
2BDE0DAE000
heap
page read and write
7A10000
trusted library allocation
page read and write
E70000
heap
page read and write
F40000
heap
page read and write
2750000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
22764FE000
stack
page read and write
2BDE0DA0000
heap
page read and write
2DB0000
trusted library allocation
page read and write
6CF000
stack
page read and write
2A5F000
trusted library allocation
page read and write
565E000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
1EF34FF3000
heap
page read and write
1466000
trusted library allocation
page execute and read and write
106E000
stack
page read and write
1EF373BC000
heap
page read and write
1EF37657000
heap
page read and write
2A90000
trusted library allocation
page execute and read and write
11F2000
trusted library allocation
page read and write
5150000
heap
page execute and read and write
1EF375D6000
heap
page read and write
FE3000
trusted library allocation
page execute and read and write
30AE000
stack
page read and write
26D0000
heap
page read and write
1EF375D2000
heap
page read and write
4EE0000
heap
page read and write
BB0000
trusted library allocation
page read and write
4D9E000
stack
page read and write
130B000
trusted library allocation
page execute and read and write
27BE000
stack
page read and write
1328000
heap
page read and write
1EF37E8F000
heap
page read and write
2BDE17A9000
heap
page read and write
F37000
trusted library allocation
page execute and read and write
CCF000
heap
page read and write
510E000
stack
page read and write
2BDE0DC7000
heap
page read and write
BC9000
heap
page read and write
FDB000
trusted library allocation
page execute and read and write
7D7000
trusted library allocation
page execute and read and write
4F3E000
stack
page read and write
5E6000
trusted library allocation
page execute and read and write
57CE000
stack
page read and write
2839000
trusted library allocation
page read and write
551F000
stack
page read and write
2A6F000
trusted library allocation
page read and write
2BDE17A9000
heap
page read and write
28A8000
trusted library allocation
page read and write
135F000
stack
page read and write
1EF373A9000
heap
page read and write
560000
heap
page read and write
860000
heap
page read and write
535E000
stack
page read and write
E03000
trusted library allocation
page execute and read and write
1EF3501C000
heap
page read and write
1EF37598000
heap
page read and write
1EF379B0000
heap
page read and write
57DE000
stack
page read and write
577E000
stack
page read and write
1EF37481000
heap
page read and write
1580000
heap
page read and write
1EF374BC000
heap
page read and write
830000
heap
page read and write
1EF375B0000
heap
page read and write
3A0000
heap
page read and write
51EE000
stack
page read and write
2E90000
trusted library allocation
page read and write
1EF38081000
heap
page read and write
2BDDEF90000
heap
page read and write
6CA0000
trusted library allocation
page execute and read and write
54CE000
stack
page read and write
2BDDF023000
heap
page read and write
2BDE0E2E000
heap
page read and write
1460000
trusted library allocation
page read and write
2C4C000
stack
page read and write
2BDE0DC8000
heap
page read and write
4C6E000
stack
page read and write
268D000
stack
page read and write
5C4000
trusted library allocation
page read and write
785000
trusted library allocation
page read and write
7BA000
trusted library allocation
page execute and read and write
580000
heap
page read and write
6F8E000
stack
page read and write
1EF37424000
heap
page read and write
1EF34FA3000
heap
page read and write
1EF34F98000
heap
page read and write
2BDE1744000
heap
page read and write
2790000
heap
page read and write
1EF34EFD000
heap
page read and write
2AA0000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
2A9E000
trusted library allocation
page read and write
2BDE0DAD000
heap
page read and write
4EAE000
stack
page read and write
1EF34FA3000
heap
page read and write
30F0000
heap
page execute and read and write
2BDDF0AB000
heap
page read and write
1EF374AB000
heap
page read and write
1EF373D5000
heap
page read and write
2DB7000
trusted library allocation
page read and write
1EF37370000
heap
page read and write
1EF34FF1000
heap
page read and write
2FFE000
stack
page read and write
12C0000
heap
page read and write
2BDDF125000
heap
page read and write
5CCF000
stack
page read and write
64AE000
stack
page read and write
27D3000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
1EF37682000
heap
page read and write
DCF000
stack
page read and write
1EF38060000
heap
page read and write
1EF34EFE000
heap
page read and write
13CF000
stack
page read and write
123B000
stack
page read and write
1EF37EC3000
heap
page read and write
2BDDF120000
heap
page read and write
54BE000
stack
page read and write
1037000
trusted library allocation
page execute and read and write
147B000
trusted library allocation
page execute and read and write
1EF37E8E000
heap
page read and write
2C5E000
stack
page read and write
1EF374C2000
heap
page read and write
7F0000
heap
page read and write
5A7000
stack
page read and write
1EF37E75000
heap
page read and write
1EF375B0000
heap
page read and write
2A81000
trusted library allocation
page read and write
1EF34F9E000
heap
page read and write
1EF37633000
heap
page read and write
2BDDF077000
heap
page read and write
5EA000
trusted library allocation
page execute and read and write
1EF375B8000
heap
page read and write
2BDE1700000
heap
page read and write
1EF3743C000
heap
page read and write
FF0000
trusted library allocation
page read and write
B8B000
stack
page read and write
4FA0000
heap
page read and write
5730000
heap
page read and write
26D7000
trusted library allocation
page execute and read and write
AEB000
stack
page read and write
BE7000
trusted library allocation
page execute and read and write
7C8000
heap
page read and write
C16000
trusted library allocation
page execute and read and write
1EF34F00000
heap
page read and write
1220000
heap
page read and write
1EF34FFC000
heap
page read and write
D64000
trusted library allocation
page read and write
4F1E000
stack
page read and write
11D0000
trusted library allocation
page read and write
D80000
heap
page read and write
3C85000
trusted library allocation
page read and write
101B000
trusted library allocation
page execute and read and write
12F0000
trusted library allocation
page execute and read and write
281E000
stack
page read and write
D60000
heap
page read and write
750000
heap
page read and write
4B1F000
stack
page read and write
EC0000
trusted library allocation
page read and write
2570000
trusted library allocation
page execute and read and write
2BDE1748000
heap
page read and write
1EF373ED000
heap
page read and write
FB0000
heap
page read and write
3381000
trusted library allocation
page read and write
408A000
trusted library allocation
page read and write
1EF374BC000
heap
page read and write
A70000
trusted library allocation
page execute and read and write
1EF37671000
heap
page read and write
1030000
trusted library allocation
page read and write
2CDE000
stack
page read and write
13B0000
heap
page read and write
261D000
stack
page read and write
2BDE0E46000
heap
page read and write
2799000
trusted library allocation
page read and write
6F0000
trusted library allocation
page read and write
2BDE0DE6000
heap
page read and write
7A3000
trusted library allocation
page execute and read and write
1EF37EF9000
heap
page read and write
1EF34F7A000
heap
page read and write
5540000
heap
page read and write
132E000
heap
page read and write
1EF34F20000
heap
page read and write
7CB0000
trusted library allocation
page execute and read and write
E99000
heap
page read and write
850000
heap
page read and write
161F000
stack
page read and write
1220000
trusted library allocation
page read and write
8FE000
stack
page read and write
14D0000
heap
page read and write
1134000
trusted library allocation
page read and write
1EF375E4000
heap
page read and write
1EF34FDF000
heap
page read and write
2A31000
trusted library allocation
page read and write
55E0000
heap
page execute and read and write
513E000
stack
page read and write
4D8F000
stack
page read and write
7CD0000
trusted library allocation
page read and write
2EA0000
heap
page execute and read and write
11E3000
trusted library allocation
page read and write
2731000
trusted library allocation
page read and write
563A000
stack
page read and write
7CB000
trusted library allocation
page execute and read and write
2DAE000
stack
page read and write
2740000
trusted library allocation
page execute and read and write
2280000
heap
page read and write
7C6000
trusted library allocation
page execute and read and write
E45000
heap
page read and write
4F6E000
stack
page read and write
1EF374BC000
heap
page read and write
4101000
trusted library allocation
page read and write
226E000
stack
page read and write
1EF375D6000
heap
page read and write
1EF375AD000
heap
page read and write
49DE000
stack
page read and write
1EF34FF0000
heap
page read and write
2A7C000
trusted library allocation
page read and write
1EF37EBB000
heap
page read and write
1EF37405000
heap
page read and write
7E5000
heap
page read and write
2A93000
trusted library allocation
page read and write
774000
trusted library allocation
page read and write
2BDDF12A000
heap
page read and write
4A3E000
stack
page read and write
2BDDF086000
heap
page read and write
1EF34FBA000
heap
page read and write
C10000
heap
page read and write
823000
heap
page read and write
3DB5000
trusted library allocation
page read and write
D20000
heap
page read and write
2BDE0DC7000
heap
page read and write
1020000
trusted library allocation
page read and write
2550000
heap
page read and write
136E000
stack
page read and write
1EF37374000
heap
page read and write
1EF37ED2000
heap
page read and write
1EF375B8000
heap
page read and write
1EF34EFC000
heap
page read and write
6CD0000
heap
page read and write
3DB1000
trusted library allocation
page read and write
492E000
stack
page read and write
2BDE0D8A000
heap
page read and write
89E000
stack
page read and write
1EF37377000
heap
page read and write
B6A000
heap
page read and write
1EF375F8000
heap
page read and write
1EF37E62000
heap
page read and write
51CE000
stack
page read and write
66FC000
stack
page read and write
11C0000
heap
page read and write
81E000
stack
page read and write
1EF37395000
heap
page read and write
F30000
trusted library allocation
page execute and read and write
2950000
heap
page execute and read and write
1EF34F7D000
heap
page read and write
4DEE000
trusted library allocation
page read and write
C97000
heap
page read and write
1600000
heap
page read and write
2D61000
trusted library allocation
page read and write
2846000
trusted library allocation
page read and write
2BDDF041000
heap
page read and write
4FB4000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
AF7000
stack
page read and write
1EF375F6000
heap
page read and write
57DE000
stack
page read and write
1EF37598000
heap
page read and write
1EF37451000
heap
page read and write
1EF34F7D000
heap
page read and write
5501000
trusted library allocation
page read and write
2BDE0F10000
heap
page read and write
4C8E000
stack
page read and write
A67000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
794000
trusted library allocation
page read and write
565F000
stack
page read and write
4EBE000
stack
page read and write
1EF37598000
heap
page read and write
7B7000
trusted library allocation
page execute and read and write
4FEE000
stack
page read and write
525E000
stack
page read and write
AD0000
trusted library allocation
page read and write
750000
trusted library allocation
page read and write
4ECE000
stack
page read and write
2160000
trusted library allocation
page execute and read and write
4D60000
heap
page execute and read and write
4FF7000
trusted library allocation
page read and write
2BDE0E4C000
heap
page read and write
758000
stack
page read and write
C110CFE000
stack
page read and write
2BDE0D91000
heap
page read and write
55CE000
stack
page read and write
B34000
trusted library allocation
page read and write
704C000
stack
page read and write
2BDDF0B5000
heap
page read and write
5020000
heap
page read and write
2BDE16E0000
heap
page read and write
76B000
stack
page read and write
1EF375B0000
heap
page read and write
44AE000
stack
page read and write
55D0000
trusted library allocation
page read and write
3731000
trusted library allocation
page read and write
1EF34F8A000
heap
page read and write
2ACF000
trusted library allocation
page read and write
1EF373E4000
heap
page read and write
C50000
trusted library allocation
page execute and read and write
2AB0000
heap
page execute and read and write
8F0000
heap
page read and write
1EF3804A000
heap
page read and write
302F000
stack
page read and write
1EF37477000
heap
page read and write
1EF37692000
heap
page read and write
52D7000
trusted library allocation
page read and write
28B3000
trusted library allocation
page read and write
2C50000
heap
page read and write
2BDE0DC7000
heap
page read and write
8EE000
stack
page read and write
1EF37513000
heap
page read and write
DA0000
trusted library allocation
page read and write
1543000
trusted library allocation
page execute and read and write
1EF37E85000
heap
page read and write
1EF373BD000
heap
page read and write
1EF38081000
heap
page read and write
284F000
trusted library allocation
page read and write
1140000
heap
page read and write
C83000
heap
page read and write
10D9000
heap
page read and write
1050000
heap
page read and write
2BDE0D8B000
heap
page read and write
750000
trusted library allocation
page read and write
1120000
heap
page read and write
2BDE17E0000
heap
page read and write
58DE000
stack
page read and write
1EF37424000
heap
page read and write
2641000
trusted library allocation
page read and write
2BDDF060000
heap
page read and write
15C0000
trusted library allocation
page read and write
C60000
heap
page read and write
525E000
stack
page read and write
9D0000
heap
page read and write
159F000
stack
page read and write
272F000
stack
page read and write
100E000
stack
page read and write
12A0000
heap
page read and write
14E0000
trusted library allocation
page read and write
1EF375F8000
heap
page read and write
1EF375F6000
heap
page read and write
3AD1000
trusted library allocation
page read and write
BC3000
heap
page read and write
5D80000
trusted library allocation
page execute and read and write
3351000
trusted library allocation
page read and write
1EF373D0000
heap
page read and write
6D48000
heap
page read and write
4ACE000
stack
page read and write
289A000
trusted library allocation
page read and write
554E000
stack
page read and write
55F0000
heap
page read and write
4B0E000
stack
page read and write
BA0000
trusted library allocation
page read and write
FA3000
trusted library allocation
page execute and read and write
1EF37424000
heap
page read and write
2900000
trusted library allocation
page read and write
2CC3000
trusted library allocation
page read and write
1EF38060000
heap
page read and write
7D5E000
stack
page read and write
1EF37503000
heap
page read and write
6BBD000
stack
page read and write
1EF375AD000
heap
page read and write
12D0000
heap
page read and write
1EF37598000
heap
page read and write
55F3000
heap
page read and write
2634000
trusted library allocation
page read and write
1EF3766E000
heap
page read and write
1EF34FCD000
heap
page read and write
830000
heap
page read and write
2BDE0D8A000
heap
page read and write
5340000
heap
page read and write
980000
heap
page read and write
4A60000
heap
page read and write
683E000
stack
page read and write
2830000
heap
page execute and read and write
2BDE0E3C000
heap
page read and write
EA3000
heap
page read and write
2BDE0DF0000
heap
page read and write
1EF374BC000
heap
page read and write
2BDDF0C0000
heap
page read and write
2710000
heap
page execute and read and write
1EF34F5D000
heap
page read and write
262E000
trusted library allocation
page read and write
7CE0000
trusted library allocation
page execute and read and write
82F000
stack
page read and write
1EF37EF4000
heap
page read and write
47F5000
trusted library allocation
page read and write
1EF34FA9000
heap
page read and write
16B0000
heap
page read and write
FBB000
heap
page read and write
B8F000
stack
page read and write
1EF37474000
heap
page read and write
2277000
trusted library allocation
page read and write
2BDDF0AB000
heap
page read and write
D10000
heap
page read and write
2FAF000
stack
page read and write
583F000
stack
page read and write
24E0000
trusted library allocation
page read and write
E93000
heap
page read and write
54DE000
stack
page read and write
53C0000
heap
page execute and read and write
D8F000
stack
page read and write
1EF37473000
heap
page read and write
2AD0000
trusted library allocation
page read and write
3721000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
4E01000
trusted library allocation
page read and write
12D3000
trusted library allocation
page execute and read and write
1EF34FF8000
heap
page read and write
1EF3501C000
heap
page read and write
4EE0000
heap
page execute and read and write
1360000
trusted library allocation
page read and write
A6E000
stack
page read and write
86A000
heap
page read and write
51F0000
trusted library allocation
page read and write
65B000
stack
page read and write
1383000
heap
page read and write
1EF37486000
heap
page read and write
78B000
stack
page read and write
6C80000
trusted library allocation
page read and write
2BDE17A9000
heap
page read and write
4F50000
heap
page execute and read and write
1EF34FC6000
heap
page read and write
1EF37EDB000
heap
page read and write
1EF3766E000
heap
page read and write
24E5000
trusted library allocation
page read and write
5C0000
heap
page read and write
FD7000
trusted library allocation
page execute and read and write
1EF374BC000
heap
page read and write
BD0000
heap
page read and write
740000
trusted library allocation
page execute and read and write
27EF000
stack
page read and write
29E3000
trusted library allocation
page read and write
2BDE0DF0000
heap
page read and write
100A000
trusted library allocation
page execute and read and write
F10000
heap
page read and write
7D00000
trusted library allocation
page read and write
2B60000
heap
page read and write
1040000
trusted library allocation
page read and write
BCE000
stack
page read and write
C0A000
trusted library allocation
page execute and read and write
2BAB000
trusted library allocation
page execute and read and write
2275EFE000
stack
page read and write
2E70000
trusted library allocation
page read and write
2BDE0DB4000
heap
page read and write
1EF37379000
heap
page read and write
800000
heap
page read and write
4FAF000
stack
page read and write
1EF37EA7000
heap
page read and write
1EF37489000
heap
page read and write
537F000
stack
page read and write
1350000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
F64000
heap
page read and write
6D1B000
heap
page read and write
2BDE0DF9000
heap
page read and write
27EF000
trusted library allocation
page read and write
2BDE0FC0000
heap
page read and write
F50000
heap
page read and write
51AE000
stack
page read and write
558000
stack
page read and write
808000
heap
page read and write
7BA000
heap
page read and write
1EF373E8000
heap
page read and write
1EF34F97000
heap
page read and write
2BDE1D98000
heap
page read and write
2BDDF0BB000
heap
page read and write
6DA9000
heap
page read and write
1EF370E6000
heap
page read and write
2783000
trusted library allocation
page read and write
1477000
trusted library allocation
page execute and read and write
2BDE0D79000
heap
page read and write
1EF38081000
heap
page read and write
1000000
trusted library allocation
page read and write
483E000
stack
page read and write
563E000
stack
page read and write
717000
trusted library allocation
page execute and read and write
1290000
heap
page read and write
E0D000
trusted library allocation
page execute and read and write
7CF0000
trusted library allocation
page execute and read and write
45B000
stack
page read and write
1EF37495000
heap
page read and write
2BDE0DA3000
heap
page read and write
2EF0000
heap
page execute and read and write
7C6000
heap
page read and write
57EE000
stack
page read and write
1EF38080000
heap
page read and write
4F4E000
stack
page read and write
2BDDF0AC000
heap
page read and write
7E0000
heap
page read and write
2BDE0E4A000
heap
page read and write
512E000
stack
page read and write
2C70000
heap
page execute and read and write
1EF37E8E000
heap
page read and write
1EF34FF3000
heap
page read and write
BA8000
heap
page read and write
C83000
heap
page read and write
54C0000
heap
page execute and read and write
1EF375B0000
heap
page read and write
57CE000
stack
page read and write
7A20000
trusted library allocation
page read and write
5ABE000
stack
page read and write
65BD000
stack
page read and write
527E000
stack
page read and write
2BDDF023000
heap
page read and write
2B18000
trusted library allocation
page read and write
2BDDEF70000
heap
page read and write
504E000
stack
page read and write
4D75000
trusted library allocation
page read and write
27D0000
heap
page read and write
1EF3805F000
heap
page read and write
2130000
trusted library allocation
page execute and read and write
55C0000
trusted library allocation
page read and write
710000
heap
page read and write
8DE000
stack
page read and write
1EF37ED2000
heap
page read and write
1EF34FAB000
heap
page read and write
A80000
heap
page read and write
2D9E000
stack
page read and write
2BDDEFD7000
heap
page read and write
26DB000
trusted library allocation
page execute and read and write
10B8000
heap
page read and write
2BDE0FF5000
heap
page read and write
4E85000
trusted library allocation
page read and write
2D37000
trusted library allocation
page read and write
15DB000
trusted library allocation
page execute and read and write
22E1000
trusted library allocation
page read and write
F60000
trusted library allocation
page execute and read and write
2BDDF0B0000
heap
page read and write
850000
heap
page read and write
2BDE1DDF000
heap
page read and write
2C80000
trusted library allocation
page read and write
C1102F4000
stack
page read and write
7BB000
trusted library allocation
page execute and read and write
12DE000
heap
page read and write
1EF37ED2000
heap
page read and write
2AC6000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
1EF374BF000
heap
page read and write
3561000
trusted library allocation
page read and write
1EF37424000
heap
page read and write
40B1000
trusted library allocation
page read and write
BAD000
trusted library allocation
page execute and read and write
E17000
heap
page read and write
513F000
stack
page read and write
2813000
trusted library allocation
page read and write
1EF34EF0000
heap
page read and write
4A9E000
stack
page read and write
566D000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
1EF374E7000
heap
page read and write
1EF3766E000
heap
page read and write
27C0000
heap
page execute and read and write
2910000
trusted library allocation
page read and write
2BDDF02F000
heap
page read and write
7290000
heap
page read and write
1343000
heap
page read and write
1EF37373000
heap
page read and write
14E4000
trusted library allocation
page read and write
24F7000
trusted library allocation
page read and write
161A000
heap
page read and write
56FE000
stack
page read and write
1EF378D0000
heap
page read and write
104B000
trusted library allocation
page execute and read and write
AA0000
heap
page read and write
1030000
trusted library allocation
page read and write
865000
heap
page read and write
5008000
trusted library allocation
page read and write
2BDDF011000
heap
page read and write
4E40000
heap
page read and write
880000
heap
page read and write
1356000
trusted library allocation
page execute and read and write
1EF375CC000
heap
page read and write
B60000
trusted library allocation
page execute and read and write
4B10000
heap
page execute and read and write
8B9000
heap
page read and write
105B000
stack
page read and write
27B1000
trusted library allocation
page read and write
51EF000
stack
page read and write
693E000
stack
page read and write
2BDE0E2F000
heap
page read and write
17AF000
stack
page read and write
2900000
trusted library allocation
page read and write
EA0000
heap
page read and write
A1E000
stack
page read and write
1EF37485000
heap
page read and write
2340000
heap
page execute and read and write
50AE000
stack
page read and write
2FB7000
trusted library allocation
page read and write
6B5000
heap
page read and write
1EF374DA000
heap
page read and write
14BF000
stack
page read and write
2961000
trusted library allocation
page read and write
50EE000
stack
page read and write
A60000
heap
page read and write
665000
heap
page read and write
830000
trusted library allocation
page read and write
26CA000
trusted library allocation
page execute and read and write
5920000
heap
page read and write
2A4E000
stack
page read and write
28CA000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
573E000
stack
page read and write
1EF375D6000
heap
page read and write
4021000
trusted library allocation
page read and write
1EF37E85000
heap
page read and write
13CE000
stack
page read and write
2BDDF12E000
heap
page read and write
4DE4000
trusted library allocation
page read and write
12D4000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
2E5D000
stack
page read and write
1EF37371000
heap
page read and write
3271000
trusted library allocation
page read and write
1507000
trusted library allocation
page execute and read and write
398000
stack
page read and write
1EF3766E000
heap
page read and write
A8E000
stack
page read and write
2EEE000
stack
page read and write
95E000
heap
page read and write
539F000
stack
page read and write
2BDE0E42000
heap
page read and write
FF0000
trusted library allocation
page read and write
27E0000
heap
page read and write
A35000
heap
page read and write
919000
heap
page read and write
513D000
stack
page read and write
1520000
heap
page read and write
EA9000
heap
page read and write
3C81000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
1EF375F6000
heap
page read and write
E52000
heap
page read and write
28C0000
trusted library allocation
page read and write
1245000
heap
page read and write
14F6000
trusted library allocation
page execute and read and write
1EF374D6000
heap
page read and write
1017000
trusted library allocation
page execute and read and write
7D10000
trusted library allocation
page execute and read and write
59EE000
stack
page read and write
1EF37789000
heap
page read and write
1EF375EC000
heap
page read and write
1EF37E41000
heap
page read and write
2884000
trusted library allocation
page read and write
1EF375E8000
heap
page read and write
3D61000
trusted library allocation
page read and write
1EF34FD7000
heap
page read and write
12CE000
stack
page read and write
1287000
heap
page read and write
2BDE174E000
heap
page read and write
1333000
heap
page read and write
1EF34F9E000
heap
page read and write
D9E000
stack
page read and write
BF3000
trusted library allocation
page execute and read and write
F0B000
trusted library allocation
page execute and read and write
5811000
trusted library allocation
page read and write
2763000
trusted library allocation
page read and write
2BDE0D98000
heap
page read and write
1EF375B0000
heap
page read and write
1EF37682000
heap
page read and write
1EF37742000
heap
page read and write
2DC0000
heap
page read and write
F30000
heap
page read and write
2BDDF06F000
heap
page read and write
50AF000
stack
page read and write
2BDE0DBE000
heap
page read and write
2BDDF12E000
heap
page read and write
28EE000
stack
page read and write
1EF374A6000
heap
page read and write
BEB000
trusted library allocation
page execute and read and write
7A4000
trusted library allocation
page read and write
22765FD000
stack
page read and write
638000
heap
page read and write
1EF34FC6000
heap
page read and write
2BDE0A20000
heap
page read and write
1EF37574000
heap
page read and write
C00000
trusted library allocation
page read and write
C75000
heap
page read and write
A40000
heap
page read and write
B33000
trusted library allocation
page execute and read and write
1EF376FA000
heap
page read and write
4E10000
heap
page read and write
5F7000
trusted library allocation
page execute and read and write
1EF37480000
heap
page read and write
525E000
stack
page read and write
1EF37459000
heap
page read and write
2C6E000
stack
page read and write
1EF34FBA000
heap
page read and write
28BE000
trusted library allocation
page read and write
40AC000
trusted library allocation
page read and write
11C0000
heap
page read and write
2D31000
trusted library allocation
page read and write
2BDE0DA3000
heap
page read and write
C7E000
stack
page read and write
4E1E000
stack
page read and write
1EF3771B000
heap
page read and write
261D000
stack
page read and write
1EF376D7000
heap
page read and write
1EF37445000
heap
page read and write
C18000
heap
page read and write
2BDE0E0B000
heap
page read and write
444E000
stack
page read and write
1EF35002000
heap
page read and write
1EF37579000
heap
page read and write
8CE000
stack
page read and write
4FAE000
stack
page read and write
1EF35000000
heap
page read and write
7B0000
trusted library allocation
page read and write
2620000
heap
page read and write
5470000
heap
page execute and read and write
1EF375DF000
heap
page read and write
1EF37741000
heap
page read and write
1EF37EE1000
heap
page read and write
EA6000
heap
page read and write
2C9F000
stack
page read and write
1EF37680000
heap
page read and write
407C000
trusted library allocation
page read and write
2BDE0DE8000
heap
page read and write
2A6A000
trusted library allocation
page read and write
12F5000
heap
page read and write
2BDE175A000
heap
page read and write
1EF374C3000
heap
page read and write
5EB1000
trusted library allocation
page read and write
4B70000
heap
page execute and read and write
1EF374C8000
heap
page read and write
1EF34FAB000
heap
page read and write
503C000
stack
page read and write
C8F000
stack
page read and write
22CE000
stack
page read and write
2BDE0D98000
heap
page read and write
12AF000
stack
page read and write
1EF37481000
heap
page read and write
4B80000
heap
page execute and read and write
FB4000
heap
page read and write
967000
heap
page read and write
11A0000
trusted library allocation
page read and write
12E9000
heap
page read and write
4A5F000
stack
page read and write
1EF374B9000
heap
page read and write
1090000
heap
page read and write
CBE000
stack
page read and write
591E000
stack
page read and write
7C0000
heap
page read and write
55CF000
stack
page read and write
CF7000
stack
page read and write
1EF34F97000
heap
page read and write
5A5E000
stack
page read and write
1EF37993000
heap
page read and write
1EF37EDE000
heap
page read and write
718C000
stack
page read and write
645000
heap
page read and write
DB0000
heap
page read and write
1527000
heap
page read and write
1EF34FCC000
heap
page read and write
AF7000
trusted library allocation
page execute and read and write
1EF376B5000
heap
page read and write
B0E000
stack
page read and write
2CE3000
trusted library allocation
page read and write
24F0000
heap
page execute and read and write
1444000
trusted library allocation
page read and write
C8A000
heap
page read and write
1EF3747A000
heap
page read and write
A80000
heap
page read and write
7F9D000
stack
page read and write
1EF37E85000
heap
page read and write
2BDE0E2C000
heap
page read and write
1000000
heap
page read and write
1EF3763F000
heap
page read and write
1570000
trusted library allocation
page read and write
53BE000
stack
page read and write
646E000
stack
page read and write
1EF3747D000
heap
page read and write
2275FFE000
stack
page read and write
A9B000
stack
page read and write
1EF37EDE000
heap
page read and write
2990000
heap
page read and write
EE4000
trusted library allocation
page read and write
2BDE1733000
heap
page read and write
2BDDF084000
heap
page read and write
2D20000
heap
page execute and read and write
9FF000
stack
page read and write
12EE000
stack
page read and write
560000
heap
page read and write
BD7000
stack
page read and write
74F000
stack
page read and write
27E7000
trusted library allocation
page read and write
53AE000
stack
page read and write
C1106FF000
stack
page read and write
512E000
stack
page read and write
2F60000
heap
page read and write
2D5E000
stack
page read and write
AE0000
heap
page read and write
26B0000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
2B4A000
trusted library allocation
page read and write
1EF34FBA000
heap
page read and write
4D2E000
stack
page read and write
1EF34FA3000
heap
page read and write
E88000
heap
page read and write
BB4000
trusted library allocation
page read and write
1EF37EBA000
heap
page read and write
3190000
heap
page read and write
276D000
stack
page read and write
1EF3742D000
heap
page read and write
A4E000
stack
page read and write
6D5A000
heap
page read and write
D10000
heap
page read and write
700000
heap
page read and write
1200000
trusted library allocation
page read and write
957000
stack
page read and write
1EF37720000
heap
page read and write
4381000
trusted library allocation
page read and write
A23000
heap
page read and write
6E3000
trusted library allocation
page execute and read and write
2BDE0DC7000
heap
page read and write
2BDDEE90000
heap
page read and write
2CA0000
heap
page read and write
1EF37493000
heap
page read and write
C10000
trusted library allocation
page execute and read and write
F25000
heap
page read and write
D0F000
stack
page read and write
548E000
stack
page read and write
630000
heap
page read and write
1014000
trusted library allocation
page read and write
90E000
heap
page read and write
12A5000
heap
page read and write
1EF376F9000
heap
page read and write
2BDE174D000
heap
page read and write
5FFF000
stack
page read and write
1EF37496000
heap
page read and write
57D9000
stack
page read and write
1EF374EF000
heap
page read and write
C97000
heap
page read and write
1EF34F5F000
heap
page read and write
2500000
trusted library allocation
page read and write
C0E000
stack
page read and write
1EF3744D000
heap
page read and write
1EF34FE6000
heap
page read and write
440000
heap
page read and write
769E000
stack
page read and write
E3C000
heap
page read and write
DC0000
heap
page read and write
2BDE0DF9000
heap
page read and write
885000
heap
page read and write
1EF375CC000
heap
page read and write
C33000
heap
page read and write
553F000
stack
page read and write
1040000
heap
page read and write
230E000
stack
page read and write
2E40000
heap
page read and write
5510000
trusted library allocation
page read and write
2AA9000
trusted library allocation
page read and write
501F000
stack
page read and write
2BDE0E30000
heap
page read and write
E2E000
heap
page read and write
BE2000
trusted library allocation
page read and write
2FAD000
stack
page read and write
147F000
stack
page read and write
1EF37479000
heap
page read and write
FF4000
trusted library allocation
page read and write
1EF37469000
heap
page read and write
1EF373C4000
heap
page read and write
1EF34F9F000
heap
page read and write
1370000
heap
page read and write
27E1000
trusted library allocation
page read and write
1EF37663000
heap
page read and write
70A000
trusted library allocation
page execute and read and write
52BE000
stack
page read and write
7A60000
trusted library allocation
page read and write
1EF34F98000
heap
page read and write
1EF36F2A000
heap
page read and write
554E000
stack
page read and write
54E0000
trusted library allocation
page read and write
1EF35019000
heap
page read and write
2BDE175A000
heap
page read and write
2801000
trusted library allocation
page read and write
1258000
heap
page read and write
27FC000
trusted library allocation
page read and write
1EF3748B000
heap
page read and write
2BDE0DC7000
heap
page read and write
4B9E000
stack
page read and write
7CC0000
trusted library allocation
page read and write
820000
heap
page read and write
2ACD000
trusted library allocation
page read and write
4F6E000
stack
page read and write
AB0000
heap
page read and write
55CF000
trusted library allocation
page read and write
E40000
heap
page read and write
7F0000
heap
page read and write
1EF375D6000
heap
page read and write
1EF38049000
heap
page read and write
58E0000
trusted library allocation
page read and write
1320000
heap
page execute and read and write
B70000
trusted library allocation
page read and write
4DEB000
trusted library allocation
page read and write
4DFE000
stack
page read and write
2580000
heap
page read and write
11B7000
heap
page read and write
6CDA000
heap
page read and write
1EF374A1000
heap
page read and write
1EF37EBB000
heap
page read and write
10E0000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
532E000
stack
page read and write
1EF375E6000
heap
page read and write
2480000
trusted library allocation
page read and write
276E000
stack
page read and write
282E000
stack
page read and write
1EF375AD000
heap
page read and write
1EF37910000
heap
page read and write
527E000
stack
page read and write
1310000
heap
page read and write
5530000
heap
page execute and read and write
1EF375D6000
heap
page read and write
253E000
stack
page read and write
E5F000
stack
page read and write
28C5000
trusted library allocation
page read and write
1EF37470000
heap
page read and write
1338000
heap
page read and write
2BDDF023000
heap
page read and write
2680000
heap
page read and write
27DE000
stack
page read and write
E39000
heap
page read and write
585E000
stack
page read and write
2BDDF086000
heap
page read and write
74E000
stack
page read and write
2BDE0E0A000
heap
page read and write
3B0000
heap
page read and write
2B33000
trusted library allocation
page read and write
A00000
heap
page read and write
1240000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
1EF34F93000
heap
page read and write
1EF373D9000
heap
page read and write
1EF3501C000
heap
page read and write
1EF34FCD000
heap
page read and write
1EF37476000
heap
page read and write
1EF373D0000
heap
page read and write
2917000
trusted library allocation
page read and write
5190000
heap
page execute and read and write
798000
heap
page read and write
1EF37486000
heap
page read and write
587E000
stack
page read and write
2896000
trusted library allocation
page read and write
2BDE0DC0000
heap
page read and write
524E000
stack
page read and write
15EE000
stack
page read and write
1EF37683000
heap
page read and write
4E2E000
stack
page read and write
DFE000
stack
page read and write
495D000
stack
page read and write
1EF375B8000
heap
page read and write
2B74000
trusted library allocation
page read and write
408F000
trusted library allocation
page read and write
1690000
trusted library allocation
page execute and read and write
820000
trusted library allocation
page execute and read and write
1EF37424000
heap
page read and write
111E000
heap
page read and write
1EF37468000
heap
page read and write
2A3A000
trusted library allocation
page read and write
1EF374BC000
heap
page read and write
FC6000
trusted library allocation
page execute and read and write
CC0000
heap
page read and write
EF8000
stack
page read and write
BDE000
stack
page read and write
6D0000
trusted library allocation
page read and write
1EF375AD000
heap
page read and write
11B0000
heap
page read and write
7F1F0000
trusted library allocation
page execute and read and write
215E000
stack
page read and write
14FA000
trusted library allocation
page execute and read and write
52BE000
stack
page read and write
1544000
trusted library allocation
page read and write
2BDE1732000
heap
page read and write
5310000
heap
page read and write
2BDE1D56000
heap
page read and write
BB000
stack
page read and write
58BE000
stack
page read and write
3911000
trusted library allocation
page read and write
1080000
heap
page read and write
2874000
trusted library allocation
page read and write
55EE000
stack
page read and write
64B0000
heap
page read and write
5160000
heap
page read and write
1EF34FCB000
heap
page read and write
1EF34F7A000
heap
page read and write
4BE0000
heap
page read and write
7A00000
trusted library allocation
page read and write
4081000
trusted library allocation
page read and write
1EF37496000
heap
page read and write
BE3000
trusted library allocation
page execute and read and write
1EF375F8000
heap
page read and write
835000
heap
page read and write
A08000
heap
page read and write
1EF3771B000
heap
page read and write
6ABB000
stack
page read and write
AE6000
trusted library allocation
page execute and read and write
5170000
heap
page execute and read and write
A20000
heap
page read and write
2E58000
trusted library allocation
page read and write
1EF37498000
heap
page read and write
52A0000
heap
page read and write
2BDE0D76000
heap
page read and write
1EF374BC000
heap
page read and write
4D7E000
stack
page read and write
5B0000
trusted library allocation
page read and write
1EF34FA3000
heap
page read and write
1EF37491000
heap
page read and write
1EF374BF000
heap
page read and write
5AC0000
heap
page execute and read and write
F0F000
stack
page read and write
1EF38041000
heap
page read and write
1EF375D7000
heap
page read and write
505E000
stack
page read and write
11D4000
trusted library allocation
page read and write
287F000
trusted library allocation
page read and write
138B000
heap
page read and write
DF0000
heap
page read and write
1EF375F8000
heap
page read and write
2BDDF0BE000
heap
page read and write
E25000
heap
page read and write
3FE000
stack
page read and write
4F1F000
stack
page read and write
1EF37E64000
heap
page read and write
AD4000
trusted library allocation
page read and write
1EF37900000
heap
page read and write
7A4000
trusted library allocation
page read and write
11DD000
trusted library allocation
page execute and read and write
2C95000
trusted library allocation
page read and write
4071000
trusted library allocation
page read and write
54BE000
stack
page read and write
2B1A000
trusted library allocation
page read and write
2BDE0DC7000
heap
page read and write
7D0000
trusted library allocation
page read and write
69B000
stack
page read and write
56CF000
stack
page read and write
1EF3501C000
heap
page read and write
2BDE0DAE000
heap
page read and write
F90000
trusted library allocation
page read and write
26C6000
trusted library allocation
page execute and read and write
8C8000
heap
page read and write
15E5000
heap
page read and write
2BDE0D83000
heap
page read and write
1EF37E62000
heap
page read and write
1EF375F8000
heap
page read and write
4EFE000
stack
page read and write
22761FE000
stack
page read and write
1EF34F7D000
heap
page read and write
1EF34FC6000
heap
page read and write
ADE000
stack
page read and write
C06000
trusted library allocation
page execute and read and write
500000
heap
page read and write
151E000
stack
page read and write
2DA0000
trusted library allocation
page execute and read and write
4E8E000
stack
page read and write
1EF375F9000
heap
page read and write
55CD000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
2BDE0E2D000
heap
page read and write
D7B000
stack
page read and write
2BDDF060000
heap
page read and write
1EF37486000
heap
page read and write
2AC0000
heap
page read and write
2898000
trusted library allocation
page read and write
1EF37EEF000
heap
page read and write
2C70000
heap
page execute and read and write
C37000
trusted library allocation
page execute and read and write
5650000
heap
page execute and read and write
1060000
trusted library allocation
page read and write
15A4000
trusted library allocation
page read and write
C1107FE000
stack
page read and write
48E0000
heap
page read and write
406B000
trusted library allocation
page read and write
2EF0000
heap
page execute and read and write
28F7000
trusted library allocation
page read and write
C4E000
stack
page read and write
150B000
trusted library allocation
page execute and read and write
543E000
stack
page read and write
764000
trusted library allocation
page read and write
2BDE0DC7000
heap
page read and write
436F000
stack
page read and write
EEE000
stack
page read and write
12C0000
heap
page read and write
51D5000
trusted library allocation
page read and write
1124000
trusted library allocation
page read and write
1EF375AD000
heap
page read and write
C1108FE000
stack
page read and write
1EF35001000
heap
page read and write
925000
heap
page read and write
1300000
trusted library allocation
page read and write
514E000
stack
page read and write
1EF3766E000
heap
page read and write
1EF373E1000
heap
page read and write
1EF374A1000
heap
page read and write
5FB000
trusted library allocation
page execute and read and write
A75000
heap
page read and write
763000
trusted library allocation
page execute and read and write
2BDE0DA3000
heap
page read and write
B98000
stack
page read and write
2BDE0FB0000
heap
page read and write
1EF374C8000
heap
page read and write
2735000
trusted library allocation
page read and write
1EF373C1000
heap
page read and write
1EF38444000
heap
page read and write
5F0E000
stack
page read and write
82E000
stack
page read and write
2BDE1DDA000
heap
page read and write
24D0000
heap
page read and write
124F000
stack
page read and write
945000
heap
page read and write
27B8000
trusted library allocation
page read and write
4D1E000
stack
page read and write
4EEE000
stack
page read and write
1314000
trusted library allocation
page read and write
1EF37E8F000
heap
page read and write
2510000
heap
page read and write
7AA000
trusted library allocation
page execute and read and write
29B5000
trusted library allocation
page read and write
1EF375E4000
heap
page read and write
EB6000
heap
page read and write
1EF3738C000
heap
page read and write
1EF37E85000
heap
page read and write
529E000
stack
page read and write
620000
heap
page read and write
2A8E000
stack
page read and write
8F7000
stack
page read and write
1500000
trusted library allocation
page read and write
E50000
heap
page read and write
4E90000
heap
page execute and read and write
C70000
heap
page read and write
F80000
heap
page read and write
1EF385A0000
heap
page read and write
66BE000
stack
page read and write
B48000
heap
page read and write
2BDE173D000
heap
page read and write
F70000
heap
page execute and read and write
1EF34F8F000
heap
page read and write
528E000
stack
page read and write
1EF37475000
heap
page read and write
3130000
trusted library allocation
page read and write
47F0000
trusted library allocation
page read and write
4CB5000
trusted library allocation
page read and write
1EF374BC000
heap
page read and write
4C5E000
stack
page read and write
2BDE170E000
heap
page read and write
4DF4000
trusted library allocation
page read and write
2BDDF078000
heap
page read and write
1EF37ED2000
heap
page read and write
4A60000
heap
page read and write
797000
stack
page read and write
784000
trusted library allocation
page read and write
29BF000
stack
page read and write
FA4000
trusted library allocation
page read and write
26B0000
heap
page execute and read and write
706000
trusted library allocation
page execute and read and write
211D000
stack
page read and write
620000
heap
page read and write
7D5000
heap
page read and write
2B70000
trusted library allocation
page read and write
48CE000
stack
page read and write
400000
remote allocation
page execute and read and write
2D80000
trusted library allocation
page execute and read and write
48E0000
heap
page read and write
2BDE17A9000
heap
page read and write
D63000
trusted library allocation
page execute and read and write
1EF38044000
heap
page read and write
515E000
stack
page read and write
2BDE0DAC000
heap
page read and write
1EF37672000
heap
page read and write
2BDDF084000
heap
page read and write
AEA000
trusted library allocation
page execute and read and write
2967000
trusted library allocation
page read and write
FAE000
stack
page read and write
1EF37ED2000
heap
page read and write
6FE000
stack
page read and write
4A9D000
stack
page read and write
1EF37EA0000
heap
page read and write
C110AFB000
stack
page read and write
1EF37E87000
heap
page read and write
54CE000
stack
page read and write
2891000
trusted library allocation
page read and write
1EF37498000
heap
page read and write
1300000
heap
page read and write
1EF34F88000
heap
page read and write
2847000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
1EF34FA3000
heap
page read and write
2BDE1D56000
heap
page read and write
12E3000
heap
page read and write
1EF3501C000
heap
page read and write
F20000
heap
page read and write
640000
heap
page read and write
1EF3739D000
heap
page read and write
1EF3766E000
heap
page read and write
976000
heap
page read and write
136C000
heap
page read and write
28F0000
trusted library allocation
page read and write
2BDE0E3B000
heap
page read and write
524F000
stack
page read and write
29C0000
heap
page execute and read and write
6BF0000
trusted library allocation
page read and write
2BDE0E4C000
heap
page read and write
22E7000
trusted library allocation
page read and write
FBE000
stack
page read and write
E44000
heap
page read and write
823000
heap
page read and write
4FE2000
trusted library allocation
page read and write
1EF35001000
heap
page read and write
1560000
trusted library allocation
page read and write
1EF37598000
heap
page read and write
1EF375F8000
heap
page read and write
2BDE0DC4000
heap
page read and write
1EF37496000
heap
page read and write
26C0000
trusted library allocation
page read and write
2510000
heap
page read and write
57F0000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
1EF34FC6000
heap
page read and write
5E0000
heap
page read and write
2351000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
1EF38040000
heap
page read and write
16A0000
trusted library allocation
page read and write
12FA000
trusted library allocation
page execute and read and write
2E70000
heap
page read and write
1EF374C5000
heap
page read and write
1EF38060000
heap
page read and write
514E000
stack
page read and write
2A38000
trusted library allocation
page read and write
2BDDEFD0000
heap
page read and write
1320000
heap
page read and write
1EF34F4A000
heap
page read and write
14D3000
trusted library allocation
page execute and read and write
1302000
trusted library allocation
page read and write
2C70000
heap
page read and write
2BDE0E40000
heap
page read and write
1EF375AD000
heap
page read and write
2BDE1D56000
heap
page read and write
4CFE000
stack
page read and write
11FA000
trusted library allocation
page execute and read and write
15CA000
trusted library allocation
page execute and read and write
2DB1000
trusted library allocation
page read and write
E78000
heap
page read and write
120B000
trusted library allocation
page execute and read and write
1EF37371000
heap
page read and write
6C00000
trusted library allocation
page read and write
461E000
stack
page read and write
2B28000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
15D7000
trusted library allocation
page execute and read and write
1EF3740D000
heap
page read and write
BF4000
trusted library allocation
page read and write
2BA2000
trusted library allocation
page read and write
4E2E000
stack
page read and write
BDA000
trusted library allocation
page execute and read and write
F6F000
stack
page read and write
1EF3747C000
heap
page read and write
4CB0000
trusted library allocation
page read and write
A80000
heap
page read and write
50C1000
trusted library allocation
page read and write
9C5000
heap
page read and write
1EF375B8000
heap
page read and write
2D1E000
stack
page read and write
2803000
trusted library allocation
page read and write
262B000
trusted library allocation
page read and write
77B000
stack
page read and write
40B7000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
2E1E000
stack
page read and write
4B9E000
stack
page read and write
1EF37E63000
heap
page read and write
2170000
heap
page read and write
8AE000
heap
page read and write
1EF37533000
heap
page read and write
5AB0000
heap
page read and write
1EF3501C000
heap
page read and write
2C81000
trusted library allocation
page read and write
1EF37493000
heap
page read and write
1EF34F7A000
heap
page read and write
2A0E000
trusted library allocation
page read and write
1EF376D7000
heap
page read and write
2140000
trusted library allocation
page read and write
1EF370E4000
heap
page read and write
128E000
stack
page read and write
4DFE000
stack
page read and write
40D6000
trusted library allocation
page read and write
9C0000
heap
page read and write
2890000
trusted library allocation
page read and write
4A5D000
stack
page read and write
FE4000
trusted library allocation
page read and write
1EF34ED0000
heap
page read and write
273E000
stack
page read and write
569E000
stack
page read and write
1080000
trusted library allocation
page read and write
2275BE9000
stack
page read and write
705000
heap
page read and write
E04000
trusted library allocation
page read and write
2BDDF060000
heap
page read and write
266E000
stack
page read and write
BBE000
heap
page read and write
5EFE000
stack
page read and write
C3B000
trusted library allocation
page execute and read and write
556E000
stack
page read and write
1EF373D0000
heap
page read and write
2BDE0DE9000
heap
page read and write
2BDE0EB0000
heap
page read and write
4CBE000
stack
page read and write
40A1000
trusted library allocation
page read and write
E1A000
heap
page read and write
2DD0000
trusted library allocation
page read and write
1EF35011000
heap
page read and write
B80000
heap
page read and write
728D000
stack
page read and write
1EF37421000
heap
page read and write
40A8000
trusted library allocation
page read and write
1EF37598000
heap
page read and write
5D61000
trusted library allocation
page read and write
2BDE170B000
heap
page read and write
24BE000
stack
page read and write
247F000
stack
page read and write
2BA0000
trusted library allocation
page read and write
562E000
stack
page read and write
15B0000
heap
page read and write
BC0000
trusted library allocation
page execute and read and write
C1104FE000
stack
page read and write
27B6000
trusted library allocation
page read and write
48BE000
stack
page read and write
1EF374D3000
heap
page read and write
1EF37E85000
heap
page read and write
D70000
trusted library allocation
page read and write
538E000
stack
page read and write
1EF374BC000
heap
page read and write
1EF37EF0000
heap
page read and write
55CE000
stack
page read and write
539E000
stack
page read and write
2BDE0DF2000
heap
page read and write
2910000
heap
page execute and read and write
C8A000
heap
page read and write
4D70000
trusted library allocation
page read and write
10F7000
stack
page read and write
564B000
trusted library allocation
page read and write
12AE000
stack
page read and write
7F5000
heap
page read and write
1EF375E6000
heap
page read and write
B40000
heap
page read and write
2A36000
trusted library allocation
page read and write
D30000
heap
page read and write
C40000
heap
page read and write
22763FF000
stack
page read and write
7A0000
heap
page read and write
2BDE0DC7000
heap
page read and write
790000
trusted library allocation
page read and write
1EF375FF000
heap
page read and write
BD5000
heap
page read and write
4EA0000
heap
page read and write
8AE000
stack
page read and write
26B4000
trusted library allocation
page read and write
1EF375E7000
heap
page read and write
2BDE175A000
heap
page read and write
1EF37EF2000
heap
page read and write
1EF37495000
heap
page read and write
3D31000
trusted library allocation
page read and write
9FE000
stack
page read and write
1EF375F8000
heap
page read and write
2829000
trusted library allocation
page read and write
A60000
heap
page execute and read and write
1EF374B1000
heap
page read and write
52C2000
trusted library allocation
page read and write
2BDE1751000
heap
page read and write
2BDE0DC7000
heap
page read and write
186E000
stack
page read and write
5180000
heap
page execute and read and write
27AE000
stack
page read and write
1EF37398000
heap
page read and write
5A1F000
stack
page read and write
FB4000
trusted library allocation
page read and write
2BDE175A000
heap
page read and write
11F0000
trusted library allocation
page read and write
493E000
stack
page read and write
1EF373ED000
heap
page read and write
BE0000
trusted library allocation
page read and write
1EF3737D000
heap
page read and write
27A0000
trusted library allocation
page read and write
F2F000
stack
page read and write
BB3000
trusted library allocation
page execute and read and write
6A7C000
stack
page read and write
1EF37ED2000
heap
page read and write
4F60000
heap
page read and write
EFA000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
933000
heap
page read and write
1EF37777000
heap
page read and write
295E000
stack
page read and write
120E000
stack
page read and write
496E000
stack
page read and write
2DB1000
trusted library allocation
page read and write
13B5000
heap
page read and write
5410000
heap
page read and write
447E000
stack
page read and write
6FCE000
stack
page read and write
6F4000
trusted library allocation
page read and write
2BDE0E40000
heap
page read and write
BF4000
trusted library allocation
page read and write
2BDE0D81000
heap
page read and write
2BDE0DC7000
heap
page read and write
890000
heap
page read and write
5140000
heap
page execute and read and write
1EF37482000
heap
page read and write
780000
trusted library allocation
page read and write
1EF37F00000
heap
page read and write
12C0000
trusted library allocation
page read and write
4084000
trusted library allocation
page read and write
1EF374CB000
heap
page read and write
4D4F000
stack
page read and write
EE0000
trusted library allocation
page read and write
1EF3764F000
heap
page read and write
2BDE0DC7000
heap
page read and write
1EF37ED2000
heap
page read and write
697B000
stack
page read and write
2AB5000
trusted library allocation
page read and write
1EF37672000
heap
page read and write
1550000
trusted library allocation
page read and write
A4E000
stack
page read and write
20DE000
stack
page read and write
630000
heap
page read and write
E50000
heap
page read and write
ED4000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
58CF000
stack
page read and write
790000
heap
page read and write
1EF37471000
heap
page read and write
1EF375F7000
heap
page read and write
53F0000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
1EF37666000
heap
page read and write
2767000
trusted library allocation
page read and write
B40000
heap
page read and write
2600000
heap
page read and write
E40000
heap
page read and write
102A000
trusted library allocation
page execute and read and write
2BDDF060000
heap
page read and write
1470000
trusted library allocation
page read and write
1EF34F83000
heap
page read and write
E6F000
stack
page read and write
5C3000
trusted library allocation
page execute and read and write
1EF37498000
heap
page read and write
1490000
heap
page read and write
2BDE0E2C000
heap
page read and write
39A5000
trusted library allocation
page read and write
1EF375B0000
heap
page read and write
4E1E000
stack
page read and write
1EF37E85000
heap
page read and write
4AB000
stack
page read and write
1EF37375000
heap
page read and write
555E000
stack
page read and write
3AD5000
trusted library allocation
page read and write
1013000
trusted library allocation
page execute and read and write
40BA000
trusted library allocation
page read and write
1EF3766E000
heap
page read and write
1EF37AE9000
heap
page read and write
1EF35018000
heap
page read and write
4F2E000
stack
page read and write
7B3000
heap
page read and write
4094000
trusted library allocation
page read and write
1EF3501B000
heap
page read and write
4A0E000
stack
page read and write
2F20000
heap
page read and write
C55000
trusted library allocation
page read and write
510F000
stack
page read and write
F20000
heap
page read and write
C45000
heap
page read and write
4FBB000
trusted library allocation
page read and write
2BDE1DDB000
heap
page read and write
1EF3762F000
heap
page read and write
5D0000
trusted library allocation
page read and write
5DCF000
stack
page read and write
1EF37474000
heap
page read and write
11D3000
trusted library allocation
page execute and read and write
73DE000
stack
page read and write
1EF375F6000
heap
page read and write
264E000
stack
page read and write
1240000
trusted library allocation
page read and write
1032000
trusted library allocation
page read and write
2BDE0D78000
heap
page read and write
7A0E000
trusted library allocation
page read and write
BF0000
heap
page read and write
1130000
trusted library allocation
page read and write
4E15000
trusted library allocation
page read and write
ACE000
stack
page read and write
28BE000
stack
page read and write
286D000
stack
page read and write
4E12000
trusted library allocation
page read and write
1EF38060000
heap
page read and write
29D7000
trusted library allocation
page read and write
820000
heap
page read and write
1870000
heap
page read and write
C17000
trusted library allocation
page execute and read and write
2BDE0D93000
heap
page read and write
1EF38045000
heap
page read and write
B7E000
stack
page read and write
E9E000
heap
page read and write
F26000
trusted library allocation
page execute and read and write
1205000
trusted library allocation
page execute and read and write
D19000
heap
page read and write
BD6000
trusted library allocation
page execute and read and write
F3A000
heap
page read and write
1EF34F4F000
heap
page read and write
37E1000
trusted library allocation
page read and write
2BDE1CD2000
heap
page read and write
86C000
heap
page read and write
4A8E000
stack
page read and write
2BDE0D8B000
heap
page read and write
1EF37ED2000
heap
page read and write
C50000
trusted library allocation
page read and write
15C6000
trusted library allocation
page execute and read and write
56B000
stack
page read and write
1338000
stack
page read and write
C1B000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
4EA0000
heap
page read and write
A00000
heap
page read and write
2BDE0E4A000
heap
page read and write
2BDE174D000
heap
page read and write
69E000
heap
page read and write
1EF37527000
heap
page read and write
1EF375F9000
heap
page read and write
4D30000
heap
page execute and read and write
2567000
trusted library allocation
page read and write
523E000
stack
page read and write
F3E000
heap
page read and write
BA4000
trusted library allocation
page read and write
58EF000
stack
page read and write
2E0E000
stack
page read and write
2BDE0D73000
heap
page read and write
900000
heap
page read and write
6F0E000
stack
page read and write
1EF34F4F000
heap
page read and write
1EF35002000
heap
page read and write
1EF3748D000
heap
page read and write
51E4000
trusted library allocation
page read and write
61E000
stack
page read and write
4FE5000
trusted library allocation
page read and write
957000
heap
page read and write
4BDE000
stack
page read and write
1EF34EF5000
heap
page read and write
290E000
stack
page read and write
2BDE1AE4000
heap
page read and write
487E000
stack
page read and write
1EF34F90000
heap
page read and write
2BDDF074000
heap
page read and write
39D1000
trusted library allocation
page read and write
E20000
heap
page read and write
242E000
stack
page read and write
132D000
heap
page read and write
595F000
stack
page read and write
83B000
heap
page read and write
1EF34FD3000
heap
page read and write
808000
heap
page read and write
285E000
trusted library allocation
page read and write
1EF3764F000
heap
page read and write
C60000
heap
page read and write
2895000
trusted library allocation
page read and write
132C000
heap
page read and write
545E000
stack
page read and write
1EF37372000
heap
page read and write
136B000
trusted library allocation
page execute and read and write
BA3000
trusted library allocation
page execute and read and write
2759000
trusted library allocation
page read and write
1EF375CC000
heap
page read and write
2BDE0E3B000
heap
page read and write
146A000
trusted library allocation
page execute and read and write
C1103FE000
stack
page read and write
1EF379A0000
heap
page read and write
2655000
trusted library allocation
page read and write
2BDE0E4A000
heap
page read and write
182D000
stack
page read and write
1EF37EB9000
heap
page read and write
1346000
heap
page read and write
156A000
trusted library allocation
page execute and read and write
1EF37EFA000
heap
page read and write
2721000
trusted library allocation
page read and write
2BDE1727000
heap
page read and write
1EF37EF5000
heap
page read and write
770000
heap
page read and write
1EF374A9000
heap
page read and write
1030000
heap
page read and write
1EF3747A000
heap
page read and write
14F0000
heap
page read and write
22D0000
heap
page execute and read and write
24F4000
trusted library allocation
page read and write
2BDE0DC7000
heap
page read and write
962000
heap
page read and write
1EF375B0000
heap
page read and write
1EF38060000
heap
page read and write
48BF000
stack
page read and write
11ED000
trusted library allocation
page execute and read and write
4C9E000
stack
page read and write
2D7E000
stack
page read and write
51F0000
trusted library allocation
page read and write
5D0000
heap
page read and write
C0E000
stack
page read and write
287E000
stack
page read and write
2AFF000
trusted library allocation
page read and write
714D000
stack
page read and write
52EE000
stack
page read and write
2649000
trusted library allocation
page read and write
1EF37E85000
heap
page read and write
7A30000
trusted library allocation
page execute and read and write
2CC7000
trusted library allocation
page read and write
1B7000
stack
page read and write
2835000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
2869000
trusted library allocation
page read and write
1EF3747F000
heap
page read and write
15B4000
trusted library allocation
page read and write
54BC000
stack
page read and write
1310000
trusted library allocation
page read and write
1EF37498000
heap
page read and write
3B5000
heap
page read and write
C7E000
heap
page read and write
2BDE1727000
heap
page read and write
690000
heap
page read and write
2BDDF071000
heap
page read and write
9BB000
stack
page read and write
E10000
heap
page read and write
2BDDF129000
heap
page read and write
2BDE1736000
heap
page read and write
E0F000
stack
page read and write
7B6000
trusted library allocation
page execute and read and write
BBF000
stack
page read and write
29F8000
trusted library allocation
page read and write
4EFE000
stack
page read and write
3031000
trusted library allocation
page read and write
B90000
heap
page read and write
10CE000
stack
page read and write
4FD6000
trusted library allocation
page read and write
BB000
stack
page read and write
4FEE000
stack
page read and write
1EF374A5000
heap
page read and write
1367000
trusted library allocation
page execute and read and write
4B6E000
stack
page read and write
1EF37636000
heap
page read and write
134F000
stack
page read and write
4AAE000
stack
page read and write
D9E000
stack
page read and write
A50000
heap
page read and write
9A8000
stack
page read and write
5230000
heap
page read and write
17EE000
stack
page read and write
2BDE0E32000
heap
page read and write
2A24000
trusted library allocation
page read and write
27BA000
trusted library allocation
page read and write
25DE000
stack
page read and write
A00000
heap
page read and write
AC4000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
26A0000
trusted library allocation
page read and write
DA0000
heap
page read and write
8AB000
stack
page read and write
B8E000
stack
page read and write
88C000
stack
page read and write
1EF374FE000
heap
page read and write
A6B000
trusted library allocation
page execute and read and write
1EF37483000
heap
page read and write
4E8E000
stack
page read and write
4C4E000
stack
page read and write
2B50000
trusted library allocation
page read and write
67F9000
stack
page read and write
1EF36D74000
heap
page read and write
2485000
trusted library allocation
page read and write
1EF34F87000
heap
page read and write
17B000
stack
page read and write
1577000
trusted library allocation
page execute and read and write
BEB000
trusted library allocation
page execute and read and write
59B000
stack
page read and write
2561000
trusted library allocation
page read and write
2C0E000
stack
page read and write
40C8000
trusted library allocation
page read and write
1EF37435000
heap
page read and write
1EF375B8000
heap
page read and write
570000
heap
page read and write
465E000
stack
page read and write
53F5000
trusted library allocation
page read and write
8F8000
heap
page read and write
1157000
stack
page read and write
1EF37574000
heap
page read and write
1EF37600000
heap
page read and write
40E000
remote allocation
page execute and read and write
4087000
trusted library allocation
page read and write
F72000
heap
page read and write
52E0000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
27DE000
stack
page read and write
EF6000
trusted library allocation
page execute and read and write
2BDE1C90000
heap
page read and write
F00000
heap
page read and write
1EF37477000
heap
page read and write
2BDE0D70000
heap
page read and write
6D5D000
heap
page read and write
939000
heap
page read and write
10D3000
heap
page read and write
1EF37E40000
heap
page read and write
1EF374D6000
heap
page read and write
7E5E000
stack
page read and write
1EF37692000
heap
page read and write
1EF3766E000
heap
page read and write
2BDDF0AB000
heap
page read and write
53DE000
stack
page read and write
22A0000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
29A8000
trusted library allocation
page read and write
493E000
stack
page read and write
B80000
heap
page read and write
51E7000
trusted library allocation
page read and write
FD0000
heap
page read and write
2BDE17D0000
heap
page read and write
2900000
heap
page execute and read and write
511F000
stack
page read and write
7B2000
trusted library allocation
page read and write
534E000
stack
page read and write
1EF37415000
heap
page read and write
558E000
stack
page read and write
1510000
heap
page read and write
7C7000
trusted library allocation
page execute and read and write
E6E000
stack
page read and write
1EF375B0000
heap
page read and write
2BDDF0BF000
heap
page read and write
55DE000
stack
page read and write
1EF34F83000
heap
page read and write
A50000
heap
page read and write
A95000
heap
page read and write
CCF000
heap
page read and write
7F0000
heap
page read and write
2BDE0DBE000
heap
page read and write
14CE000
stack
page read and write
C1109FE000
stack
page read and write
1120000
heap
page read and write
27C8000
trusted library allocation
page read and write
800000
heap
page read and write
CB1000
heap
page read and write
ED3000
trusted library allocation
page execute and read and write
123F000
stack
page read and write
1EF37398000
heap
page read and write
A70000
heap
page read and write
28EC000
stack
page read and write
2BDE0D7F000
heap
page read and write
4E6E000
stack
page read and write
C10000
heap
page read and write
1EF374AF000
heap
page read and write
10F5000
heap
page read and write
2911000
trusted library allocation
page read and write
127A000
heap
page read and write
C110BFF000
stack
page read and write
1EF374C8000
heap
page read and write
BA0000
heap
page read and write
1EF373E9000
heap
page read and write
29B000
stack
page read and write
F4F000
stack
page read and write
1EF375F6000
heap
page read and write
1EF34FC6000
heap
page read and write
72DC000
stack
page read and write
2BDE0E33000
heap
page read and write
50DE000
stack
page read and write
584F000
stack
page read and write
C68000
heap
page read and write
2B16000
trusted library allocation
page read and write
2E60000
trusted library allocation
page execute and read and write
2BDE0D77000
heap
page read and write
1EF34FF7000
heap
page read and write
C68000
heap
page read and write
C04000
trusted library allocation
page read and write
1EF373D1000
heap
page read and write
1EF37E41000
heap
page read and write
227F000
stack
page read and write
C1A000
trusted library allocation
page execute and read and write
1010000
trusted library allocation
page read and write
1EF35019000
heap
page read and write
4CFD000
stack
page read and write
2BDE0E2C000
heap
page read and write
1EF374BC000
heap
page read and write
2BDE1D14000
heap
page read and write
4029000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
579E000
stack
page read and write
1EF374BD000
heap
page read and write
AF8000
stack
page read and write
E9E000
stack
page read and write
3931000
trusted library allocation
page read and write
1EF37AD0000
heap
page read and write
6E4000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
4D3E000
stack
page read and write
1EF37449000
heap
page read and write
575F000
stack
page read and write
1EF3748C000
heap
page read and write
1EF37681000
heap
page read and write
780000
trusted library allocation
page read and write
6E0E000
stack
page read and write
53BE000
stack
page read and write
620000
heap
page read and write
1EF34FDE000
heap
page read and write
BDA000
trusted library allocation
page execute and read and write
1EF37EDE000
heap
page read and write
1EF38041000
heap
page read and write
50EE000
stack
page read and write
1EF34FCD000
heap
page read and write
4F2E000
stack
page read and write
ADB000
stack
page read and write
1EF375F8000
heap
page read and write
A90000
heap
page read and write
800000
unkown
page readonly
1EF375CD000
heap
page read and write
1EF34F7D000
heap
page read and write
1380000
trusted library allocation
page read and write
22767FB000
stack
page read and write
AF8000
stack
page read and write
3101000
trusted library allocation
page read and write
4B6E000
stack
page read and write
BC0000
trusted library allocation
page read and write
1EF375B9000
heap
page read and write
48CD000
stack
page read and write
2BDE0D7C000
heap
page read and write
2CB9000
trusted library allocation
page read and write
311E000
stack
page read and write
1307000
trusted library allocation
page execute and read and write
13A0000
heap
page read and write
10E6000
heap
page read and write
1EF374BC000
heap
page read and write
1EF3766E000
heap
page read and write
284D000
trusted library allocation
page read and write
2BDE0D7C000
heap
page read and write
3107000
trusted library allocation
page read and write
4FC4000
trusted library allocation
page read and write
1EF34F49000
heap
page read and write
2769000
trusted library allocation
page read and write
EAE000
stack
page read and write
790000
heap
page read and write
1EF37498000
heap
page read and write
B7F000
stack
page read and write
1EF38060000
heap
page read and write
913000
heap
page read and write
A0E000
stack
page read and write
2BA7000
trusted library allocation
page execute and read and write
F55000
heap
page read and write
40BF000
trusted library allocation
page read and write
2DA0000
heap
page execute and read and write
835000
heap
page read and write
22762FE000
stack
page read and write
C39000
heap
page read and write
103B000
trusted library allocation
page execute and read and write
2BDE0D98000
heap
page read and write
2B1E000
stack
page read and write
1202000
trusted library allocation
page read and write
1EF374BC000
heap
page read and write
2BDE1CD2000
heap
page read and write
1EF34FB2000
heap
page read and write
28F4000
trusted library allocation
page read and write
1EF375D2000
heap
page read and write
86E000
heap
page read and write
1EF37EDC000
heap
page read and write
4E06000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
B10000
heap
page read and write
1EF374A1000
heap
page read and write
2BDE0FF0000
heap
page read and write
4DA8000
heap
page read and write
2B11000
trusted library allocation
page read and write
1EF37EBB000
heap
page read and write
1EF375B9000
heap
page read and write
1EF373FC000
heap
page read and write
538E000
stack
page read and write
4EBF000
stack
page read and write
2CD8000
trusted library allocation
page read and write
FCA000
trusted library allocation
page execute and read and write
1EF3501C000
heap
page read and write
2646000
trusted library allocation
page read and write
1006000
trusted library allocation
page execute and read and write
527F000
stack
page read and write
43AE000
stack
page read and write
BE7000
trusted library allocation
page execute and read and write
2BDE174E000
heap
page read and write
D38000
heap
page read and write
15B8000
heap
page read and write
6F7000
stack
page read and write
1EF37EB0000
heap
page read and write
1318000
heap
page read and write
4FEE000
stack
page read and write
2BDDF0BD000
heap
page read and write
1EF34EC0000
heap
page read and write
C68000
heap
page read and write
DD7000
stack
page read and write
11C5000
heap
page read and write
B3E000
stack
page read and write
2BC0000
trusted library allocation
page read and write
2BDE0DA3000
heap
page read and write
2BDDF129000
heap
page read and write
1EF37522000
heap
page read and write
F3B000
trusted library allocation
page execute and read and write
1EF36D71000
heap
page read and write
3370000
heap
page execute and read and write
1EF34FBA000
heap
page read and write
15D0000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
F07000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
C60000
heap
page read and write
56E0000
heap
page read and write
2BDE173E000
heap
page read and write
40B5000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
BB4000
trusted library allocation
page read and write
1EF38045000
heap
page read and write
1EF375B8000
heap
page read and write
BC5000
heap
page read and write
2BDE16FC000
heap
page read and write
4E6E000
stack
page read and write
1EF373D5000
heap
page read and write
1EF34FA3000
heap
page read and write
4011000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
6F4D000
stack
page read and write
2B73000
trusted library allocation
page execute and read and write
2BDE1DDF000
heap
page read and write
2BDE0DFB000
heap
page read and write
2BDDF12C000
heap
page read and write
1EF37395000
heap
page read and write
2BDE178F000
heap
page read and write
8F7000
stack
page read and write
56D0000
heap
page execute and read and write
DF0000
heap
page read and write
1284000
heap
page read and write
73E000
stack
page read and write
780000
trusted library allocation
page read and write
4CFE000
stack
page read and write
BC0000
heap
page read and write
1B7000
stack
page read and write
1EF375D2000
heap
page read and write
1EF37670000
heap
page read and write
15A3000
trusted library allocation
page execute and read and write
55E000
stack
page read and write
700F000
stack
page read and write
27B0000
trusted library allocation
page execute and read and write
4F6E000
stack
page read and write
440000
heap
page read and write
2CB7000
trusted library allocation
page read and write
78A000
trusted library allocation
page execute and read and write
7A70000
trusted library allocation
page read and write
1EF34FA1000
heap
page read and write
E00000
heap
page read and write
1EF37E74000
heap
page read and write
567E000
stack
page read and write
1EF34F93000
heap
page read and write
1EF34FEF000
heap
page read and write
B20000
trusted library allocation
page read and write
D74000
trusted library allocation
page read and write
4DBE000
stack
page read and write
1EF374BC000
heap
page read and write
C2E000
heap
page read and write
53A0000
heap
page execute and read and write
1EF373E4000
heap
page read and write
1EF37636000
heap
page read and write
1443000
trusted library allocation
page execute and read and write
4E3E000
stack
page read and write
7B4000
trusted library allocation
page read and write
503E000
stack
page read and write
10B0000
heap
page read and write
2B5C000
stack
page read and write
2BDDF02F000
heap
page read and write
1230000
trusted library allocation
page execute and read and write
71B000
trusted library allocation
page execute and read and write
12C8000
heap
page read and write
56CE000
stack
page read and write
11AE000
stack
page read and write
1024000
trusted library allocation
page read and write
1EF34FBA000
heap
page read and write
4078000
trusted library allocation
page read and write
409B000
trusted library allocation
page read and write
1EF375B9000
heap
page read and write
D50000
trusted library allocation
page read and write
2BDE1750000
heap
page read and write
5519000
trusted library allocation
page read and write
2BDE12D0000
heap
page read and write
3725000
trusted library allocation
page read and write
29D9000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
1EF37EF0000
heap
page read and write
1EF3804A000
heap
page read and write
4031000
trusted library allocation
page read and write
C7E000
heap
page read and write
4B50000
heap
page read and write
1100000
heap
page read and write
B63000
heap
page read and write
CDB000
stack
page read and write
900000
trusted library allocation
page read and write
2600000
heap
page execute and read and write
292E000
stack
page read and write
898000
heap
page read and write
1EF34FFE000
heap
page read and write
There are 2369 hidden memdumps, click here to show them.