IOC Report
3.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\3.dll"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\3.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\3.dll,TMethodImplementationIntercept
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\3.dll,__dbk_fcall_wrapper
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\3.dll,b1oc1ab00u045627q07f
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\3.dll",TMethodImplementationIntercept
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\3.dll",__dbk_fcall_wrapper
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\3.dll",b1oc1ab00u045627q07f
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\3.dll",dbkFCallWrapperAddr
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3.dll",#1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.borland.com/namespaces/Types-IWSDLPublish
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
unknown
http://tools.ietf.org/html/rfc1321
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.borland.com/rootpart.xml
unknown
http://tempuri.org/iY
unknown
http://www.schneier.com/paper-blowfish-fse.htmlS
unknown
http://tempuri.org/
unknown
http://csrc.nist.gov/publications/drafts/800-67-rev1/SP-800-67-rev1-2_July-2011.pdfS
unknown
http://www.indyproject.org/
unknown
http://tools.ietf.org/html/rfc4648S
unknown
http://www.borland.com/namespaces/Types-IAppServerSOAPq
unknown
http://schemas.xmlsoap.org/wsdl/soap12/SV
unknown
http://www.itl.nist.gov/fipspubs/fip180-1.htm
unknown
http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdfS
unknown
http://schemas.xmlsoap.org/wsdl/soap/
unknown
http://www.borland.com/namespaces/TypesA
unknown
http://www.borland.com/namespaces/Types-IAppServerSOAP
unknown
http://www.movable-type.co.uk/scripts/xxtea.pdfS
unknown
http://www.borland.com/namespaces/Types
unknown
http://schemas.xmlsoap.org/soap/http
unknown
http://schemas.xmlsoap.org/wsdl/soap/#
unknown
http://www.schneier.com/paper-twofish-paper.pdfS
unknown
http://schemas.xmlsoap.org/wsdl/http/
unknown
http://tempuri.org/U
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://csrc.nist.gov/publications/drafts/fips180-4/Draft-FIPS180-4_Feb2011.pdfU
unknown
http://www.componentace.com
unknown
http://schemas.xmlsoap.org/wsdl/mime/
unknown
http://www.borland.com/namespaces/Types-IAppServerSOAPU
unknown
http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdfS
unknown
http://www.borland.com/namespaces/Typesa
unknown
http://www.ietf.org/rfc/rfc3447.txtS
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
strogonoff.xyz
141.98.169.154
malicious
pastebin.com
104.20.3.235
malicious
paradoxine.sbs
95.164.37.66

Memdumps

Base Address
Regiontype
Protect
Malicious
2DA1000
heap
page read and write
5290000
unkown
page execute and read and write
2DA1000
heap
page read and write
5324000
unkown
page execute and write copy
4E60000
unkown
page execute and read and write
4AAD000
unkown
page execute and write copy
5EFC000
direct allocation
page read and write
48A0000
unkown
page execute and write copy
4E81000
unkown
page execute and write copy
4DC1000
unkown
page execute and write copy
5766000
unkown
page execute and read and write
4EC9000
unkown
page execute and write copy
52DA000
unkown
page execute and read and write
53D2000
unkown
page execute and write copy
4D8A000
unkown
page execute and read and write
4BE4000
unkown
page execute and write copy
5970000
unkown
page execute and write copy
54D8000
unkown
page execute and read and write
4CBC000
unkown
page execute and write copy
5818000
unkown
page execute and write copy
50C8000
unkown
page execute and read and write
4CBF000
unkown
page execute and write copy
5120000
unkown
page execute and write copy
2B74000
heap
page read and write
4A94000
unkown
page execute and write copy
4D89000
unkown
page execute and write copy
59D6000
unkown
page execute and read and write
5582000
unkown
page execute and write copy
50CD000
unkown
page execute and write copy
45F8000
unkown
page execute and write copy
5606000
unkown
page execute and write copy
488C000
unkown
page execute and read and write
5787000
unkown
page execute and read and write
56BB000
unkown
page execute and read and write
4D18000
unkown
page execute and write copy
52B6000
unkown
page execute and read and write
49C1000
unkown
page execute and read and write
5615000
unkown
page execute and read and write
511C000
unkown
page execute and write copy
5A0C000
unkown
page execute and write copy
508A000
unkown
page execute and write copy
527B000
unkown
page execute and read and write
48B0000
unkown
page readonly
4E15000
unkown
page execute and write copy
4AFF000
direct allocation
page read and write
519C000
unkown
page execute and read and write
4F3B000
unkown
page execute and write copy
4A04000
unkown
page execute and read and write
4DCC000
unkown
page write copy
4A5E000
unkown
page write copy
56E4000
unkown
page execute and write copy
54E7000
unkown
page execute and write copy
4E0E000
unkown
page execute and read and write
4FDE000
unkown
page execute and write copy
4801000
heap
page read and write
56D2000
unkown
page execute and write copy
50B0000
unkown
page execute and write copy
2B70000
heap
page read and write
5EED000
direct allocation
page read and write
537B000
unkown
page execute and write copy
589F000
unkown
page execute and write copy
662E000
stack
page read and write
4DB2000
unkown
page execute and write copy
4A05000
unkown
page execute and write copy
59C3000
unkown
page execute and read and write
545C000
unkown
page execute and read and write
4F39000
unkown
page execute and write copy
559B000
unkown
page execute and write copy
53C7000
unkown
page execute and read and write
4D7D000
unkown
page execute and write copy
59BC000
unkown
page execute and write copy
4C0E000
unkown
page write copy
5F80000
heap
page read and write
4F75000
unkown
page execute and write copy
4E3B000
unkown
page execute and write copy
4DB1000
unkown
page execute and write copy
4DD7000
unkown
page execute and write copy
5098000
unkown
page execute and write copy
4BAF000
unkown
page execute and write copy
4A69000
unkown
page execute and read and write
2D08000
heap
page read and write
4CCD000
unkown
page execute and read and write
5FF2000
direct allocation
page read and write
13F4000
heap
page read and write
4A9F000
direct allocation
page read and write
52CA000
unkown
page execute and read and write
4A7B000
direct allocation
page read and write
2DA0000
trusted library allocation
page read and write
4DE4000
unkown
page execute and read and write
6260000
heap
page read and write
4E21000
unkown
page read and write
482A000
unkown
page execute and write copy
4801000
heap
page read and write
4AC0000
unkown
page execute and read and write
50A5000
unkown
page execute and read and write
55C7000
unkown
page execute and read and write
51C2000
unkown
page execute and read and write
2B74000
heap
page read and write
56FE000
unkown
page execute and write copy
2D8B000
heap
page read and write
48A7000
unkown
page execute and write copy
51E9000
unkown
page execute and read and write
4857000
unkown
page execute and read and write
4F4B000
unkown
page execute and write copy
4CBD000
unkown
page execute and read and write
503A000
unkown
page execute and write copy
5A20000
unkown
page execute and read and write
2B41000
heap
page read and write
5258000
unkown
page execute and write copy
4888000
unkown
page execute and write copy
5578000
unkown
page execute and write copy
530F000
unkown
page execute and read and write
2DA1000
heap
page read and write
540D000
unkown
page execute and read and write
2B00000
heap
page read and write
4EC2000
unkown
page execute and write copy
5781000
unkown
page execute and write copy
5A2C000
unkown
page execute and read and write
6040000
heap
page read and write
529A000
unkown
page execute and write copy
5495000
unkown
page execute and read and write
4A19000
unkown
page execute and read and write
567F000
unkown
page execute and read and write
5653000
unkown
page execute and read and write
504E000
unkown
page execute and read and write
591E000
unkown
page execute and read and write
26E9000
stack
page read and write
5319000
unkown
page execute and write copy
5290000
unkown
page execute and write copy
4801000
heap
page read and write
524B000
unkown
page execute and read and write
49EE000
unkown
page execute and write copy
5004000
unkown
page execute and read and write
4AE3000
unkown
page execute and write copy
5034000
unkown
page execute and read and write
2B50000
heap
page read and write
4E81000
unkown
page execute read
55CA000
unkown
page execute and write copy
530D000
unkown
page execute and write copy
4C43000
unkown
page execute and read and write
4D8C000
unkown
page execute and write copy
48E0000
unkown
page execute and write copy
4D9A000
unkown
page execute and write copy
4948000
unkown
page execute and write copy
52B8000
unkown
page execute and read and write
576B000
unkown
page execute and write copy
4E62000
unkown
page execute and write copy
4B52000
unkown
page execute and read and write
2F20000
heap
page read and write
52CB000
unkown
page execute and write copy
48F7000
unkown
page execute and read and write
5058000
unkown
page execute and write copy
53A7000
unkown
page write copy
48BA000
unkown
page execute and read and write
5299000
unkown
page execute and read and write
4F7C000
unkown
page execute and write copy
4E0B000
unkown
page execute and write copy
553E000
unkown
page execute and write copy
4B54000
unkown
page execute and read and write
4E1D000
unkown
page execute and write copy
5111000
unkown
page execute and write copy
5862000
unkown
page execute and read and write
54F4000
unkown
page execute and read and write
5262000
unkown
page execute and read and write
4FB9000
unkown
page execute and read and write
57F7000
unkown
page execute and read and write
4992000
unkown
page execute and write copy
5280000
unkown
page execute and write copy
509E000
unkown
page execute and write copy
534B000
unkown
page execute and read and write
4AEC000
unkown
page write copy
60EF000
direct allocation
page read and write
2BF4000
heap
page read and write
5090000
unkown
page execute and write copy
4E93000
unkown
page execute and read and write
4F6E000
unkown
page execute and write copy
4AC5000
unkown
page execute and read and write
5315000
unkown
page execute and write copy
579F000
unkown
page execute and read and write
4B2B000
unkown
page execute and write copy
5511000
unkown
page execute and read and write
4FD9000
unkown
page execute and write copy
5148000
unkown
page execute and read and write
5991000
unkown
page execute and write copy
55E0000
unkown
page execute and read and write
4E53000
unkown
page execute and write copy
4B15000
unkown
page execute and write copy
4EC7000
unkown
page execute and read and write
4A62000
unkown
page read and write
5824000
unkown
page execute and read and write
502C000
unkown
page execute and read and write
4DF9000
unkown
page execute and write copy
5934000
unkown
page execute and read and write
4E89000
unkown
page execute and write copy
4FEE000
unkown
page execute and read and write
4801000
heap
page read and write
4DD5000
unkown
page execute and write copy
53BD000
unkown
page read and write
505D000
unkown
page execute and write copy
4DD6000
unkown
page execute and read and write
4D17000
unkown
page execute and read and write
5185000
unkown
page execute and write copy
57D8000
unkown
page execute and read and write
4B6D000
unkown
page execute and write copy
4B2A000
unkown
page execute and write copy
4EB8000
unkown
page execute and write copy
4EB5000
unkown
page execute and write copy
49D8000
unkown
page execute and write copy
4BCB000
unkown
page execute and write copy
2B34000
heap
page read and write
5496000
unkown
page execute and write copy
5194000
unkown
page execute and read and write
51EF000
unkown
page execute and write copy
4A44000
unkown
page execute and read and write
4A17000
unkown
page execute and read and write
5979000
unkown
page execute and read and write
4E79000
unkown
page execute and read and write
54DD000
unkown
page execute and read and write
4F14000
unkown
page execute and write copy
4A80000
unkown
page execute and read and write
4E54000
unkown
page execute and read and write
573E000
unkown
page execute and read and write
496C000
unkown
page execute and read and write
5320000
unkown
page execute and write copy
4B2D000
unkown
page execute and write copy
5082000
unkown
page execute and read and write
5706000
unkown
page execute and write copy
2BF4000
heap
page read and write
2BF4000
heap
page read and write
4F6E000
unkown
page execute and read and write
4D2C000
unkown
page execute and read and write
4D0D000
unkown
page execute and write copy
4DD8000
unkown
page execute and read and write
5266000
unkown
page execute and read and write
4E08000
unkown
page execute and write copy
4B0D000
direct allocation
page read and write
4CF4000
unkown
page execute and write copy
5117000
unkown
page execute and write copy
5024000
unkown
page execute and read and write
4FB1000
unkown
page execute and read and write
4E74000
unkown
page execute and write copy
5188000
unkown
page execute and write copy
505A000
unkown
page execute and read and write
5325000
unkown
page execute and read and write
5AF9000
unkown
page execute and write copy
505F000
unkown
page execute and write copy
48D3000
unkown
page execute and read and write
519C000
unkown
page execute and read and write
52B1000
unkown
page execute and write copy
55FB000
unkown
page execute and read and write
4A47000
unkown
page execute and read and write
2CA0000
heap
page read and write
4D95000
unkown
page execute and write copy
4975000
unkown
page execute and read and write
5190000
unkown
page execute and read and write
506B000
unkown
page execute and read and write
5333000
unkown
page execute and read and write
51BD000
unkown
page execute and write copy
5A04000
unkown
page execute and write copy
5291000
unkown
page execute and write copy
2E20000
heap
page read and write
4FF7000
unkown
page execute and read and write
4897000
unkown
page execute and write copy
4DFC000
unkown
page execute and write copy
51CD000
unkown
page execute and read and write
599D000
unkown
page execute and write copy
57CF000
unkown
page execute and read and write
4E1C000
unkown
page execute and write copy
4D60000
unkown
page execute and write copy
593F000
unkown
page execute and read and write
4D44000
unkown
page execute and write copy
50D4000
unkown
page execute and write copy
512E000
unkown
page execute and read and write
4E81000
unkown
page execute and write copy
4BD8000
unkown
page execute and write copy
4E2B000
unkown
page execute and read and write
5616000
unkown
page execute and write copy
4F61000
unkown
page execute and read and write
4D39000
unkown
page execute and write copy
5A38000
unkown
page execute and write copy
516D000
unkown
page execute and write copy
52F9000
unkown
page execute and read and write
4DC4000
unkown
page execute and write copy
5069000
unkown
page execute and write copy
48DC000
unkown
page execute and read and write
49E5000
unkown
page execute and read and write
53AA000
unkown
page execute and read and write
5EAB000
direct allocation
page read and write
4F6D000
unkown
page execute and read and write
5F03000
direct allocation
page read and write
583B000
unkown
page execute and write copy
53EC000
unkown
page execute and write copy
597D000
unkown
page execute and write copy
53C5000
unkown
page execute and write copy
4800000
heap
page read and write
4DAA000
unkown
page execute and read and write
58FF000
unkown
page execute and read and write
4B22000
unkown
page execute and write copy
5ADB000
unkown
page execute and write copy
5847000
unkown
page execute and read and write
501B000
unkown
page execute and write copy
54F8000
unkown
page execute and read and write
59CF000
unkown
page execute and read and write
4CCC000
unkown
page execute and write copy
4F2B000
unkown
page execute and write copy
4819000
unkown
page execute and write copy
58D0000
unkown
page execute and read and write
4B8E000
unkown
page execute and write copy
58CD000
unkown
page execute and write copy
4AB2000
unkown
page execute and write copy
4CAF000
unkown
page execute and read and write
531E000
unkown
page execute and read and write
5BB9000
unkown
page execute and write copy
5D51000
unkown
page execute read
5874000
unkown
page execute and write copy
4936000
unkown
page execute and read and write
4AE1000
direct allocation
page read and write
4BE8000
unkown
page write copy
4FDE000
unkown
page execute and read and write
13F4000
heap
page read and write
4E27000
unkown
page execute and write copy
4DD4000
unkown
page execute and write copy
4A90000
unkown
page execute and read and write
53FA000
unkown
page execute and write copy
4E26000
unkown
page execute and read and write
56D7000
unkown
page execute and read and write
520000
heap
page read and write
50D0000
unkown
page execute and write copy
5021000
unkown
page execute and write copy
5074000
unkown
page execute and read and write
55A0000
unkown
page read and write
57E9000
unkown
page execute and write copy
2BF4000
heap
page read and write
50B6000
unkown
page execute and read and write
539C000
unkown
page write copy
512A000
unkown
page execute and read and write
4AAD000
direct allocation
page read and write
525B000
unkown
page execute and read and write
5D45000
unkown
page readonly
5113000
unkown
page execute and write copy
497D000
unkown
page execute and read and write
4F00000
unkown
page execute and write copy
5363000
unkown
page execute and write copy
4E5F000
unkown
page execute and write copy
53C3000
unkown
page execute and read and write
50EF000
unkown
page execute and write copy
5046000
unkown
page execute and write copy
57CC000
unkown
page execute and read and write
5529000
unkown
page execute and write copy
4BEC000
unkown
page execute and write copy
5AE2000
unkown
page execute and write copy
5B69000
unkown
page execute and write copy
5B6A000
unkown
page execute and read and write
4B1A000
unkown
page execute and write copy
508B000
unkown
page execute and read and write
5364000
unkown
page execute and read and write
5853000
unkown
page execute and read and write
4DE3000
unkown
page execute and write copy
58F2000
unkown
page execute and write copy
4A7D000
unkown
page execute and read and write
4FB2000
unkown
page execute and write copy
51AE000
unkown
page execute and read and write
4F6D000
unkown
page execute and write copy
51AA000
unkown
page execute and write copy
5281000
unkown
page execute and write copy
53D0000
unkown
page execute and read and write
4DC9000
unkown
page read and write
4F95000
unkown
page execute and write copy
507A000
unkown
page execute and write copy
5B9C000
unkown
page execute and write copy
52C1000
unkown
page execute and read and write
5C2B000
unkown
page execute and write copy
4938000
unkown
page execute and read and write
2B34000
heap
page read and write
4F2A000
unkown
page execute and read and write
2B34000
heap
page read and write
565B000
unkown
page execute and write copy
2DA1000
heap
page read and write
4FB9000
unkown
page execute and read and write
5043000
unkown
page execute and read and write
56BB000
unkown
page execute and write copy
4F54000
unkown
page execute and write copy
4AD5000
unkown
page execute and write copy
27AC000
stack
page read and write
4F5E000
unkown
page execute and read and write
6034000
direct allocation
page read and write
2B74000
heap
page read and write
545A000
unkown
page execute and read and write
4EFC000
unkown
page execute and read and write
53AD000
unkown
page execute and write copy
4B2F000
unkown
page execute and read and write
2BF4000
heap
page read and write
4E6F000
unkown
page execute and write copy
4B20000
unkown
page execute and write copy
5854000
unkown
page execute and write copy
5AB6000
unkown
page execute and read and write
4AE4000
unkown
page execute and read and write
49F0000
heap
page read and write
5114000
unkown
page execute and write copy
5E61000
heap
page read and write
5570000
unkown
page execute and write copy
4C92000
unkown
page execute and read and write
55F0000
unkown
page execute and write copy
4BDD000
unkown
page execute and read and write
511C000
unkown
page execute and read and write
5E62000
direct allocation
page read and write
60B8000
direct allocation
page read and write
4E1F000
unkown
page execute and write copy
4A33000
unkown
page execute and write copy
51A5000
unkown
page execute and read and write
4FF5000
unkown
page execute and write copy
58B1000
unkown
page execute and write copy
514A000
unkown
page execute and write copy
52BE000
unkown
page execute and read and write
5159000
unkown
page execute and read and write
2860000
heap
page read and write
49D1000
unkown
page execute and read and write
5117000
unkown
page execute and read and write
4D48000
unkown
page execute and read and write
50B3000
unkown
page execute and read and write
35D0000
heap
page read and write
5BBB000
unkown
page execute and read and write
5B30000
unkown
page execute and read and write
4D82000
unkown
page execute and write copy
51FC000
unkown
page execute and read and write
5214000
unkown
page execute and read and write
4EB1000
unkown
page execute and write copy
60C2000
direct allocation
page read and write
53FB000
unkown
page execute and read and write
4E7E000
unkown
page execute and read and write
52BB000
unkown
page execute and write copy
528D000
unkown
page execute and read and write
5084000
unkown
page execute and read and write
5712000
unkown
page execute and write copy
50EC000
unkown
page execute and read and write
5931000
unkown
page execute and write copy
50A8000
unkown
page execute and read and write
4D88000
unkown
page execute and read and write
4D75000
unkown
page execute and read and write
4E0D000
unkown
page execute and write copy
4BE6000
unkown
page execute and write copy
4DA2000
unkown
page execute and write copy
5060000
unkown
page execute and read and write
5A15000
unkown
page execute and write copy
51D8000
unkown
page execute and read and write
4FEC000
unkown
page execute and write copy
4801000
heap
page read and write
4F94000
unkown
page execute and read and write
5907000
unkown
page execute and read and write
5BD8000
unkown
page execute and read and write
4B28000
unkown
page execute and write copy
2BF4000
heap
page read and write
5886000
unkown
page execute and write copy
57BF000
unkown
page execute and write copy
2B7C000
stack
page read and write
5AF8000
unkown
page execute and read and write
5013000
unkown
page execute and write copy
4BA7000
unkown
page execute and read and write
5B47000
unkown
page execute and read and write
2BF4000
heap
page read and write
4F1C000
unkown
page execute and read and write
51AC000
unkown
page execute and read and write
5005000
unkown
page execute and write copy
45BF000
unkown
page read and write
4E24000
unkown
page execute and read and write
560E000
unkown
page execute and write copy
2BF4000
heap
page read and write
4B1B000
unkown
page execute and write copy
4F29000
unkown
page execute and read and write
4DFB000
unkown
page execute and read and write
4F59000
unkown
page execute and write copy
4FAC000
unkown
page execute and write copy
2680000
heap
page read and write
5C91000
unkown
page execute and write copy
592A000
unkown
page execute and write copy
4A6F000
unkown
page read and write
5780000
unkown
page read and write
4DEA000
unkown
page execute and read and write
4EB9000
unkown
page execute and read and write
4D90000
unkown
page execute and read and write
4ED2000
unkown
page execute and read and write
565E000
unkown
page execute and read and write
52A2000
unkown
page execute and write copy
50E3000
unkown
page execute and read and write
5411000
unkown
page execute read
493F000
unkown
page execute and write copy
565D000
unkown
page execute and write copy
52B7000
unkown
page execute and write copy
520C000
unkown
page execute and read and write
2BF4000
heap
page read and write
528B000
unkown
page execute and read and write
5A00000
unkown
page execute and write copy
48FF000
unkown
page execute and write copy
4DFA000
unkown
page execute and write copy
5054000
unkown
page execute and write copy
516B000
unkown
page execute and read and write
5840000
unkown
page execute and write copy
4A10000
unkown
page execute and write copy
509B000
unkown
page execute and read and write
4FF1000
unkown
page execute and write copy
511A000
unkown
page execute and read and write
492C000
unkown
page execute and write copy
521E000
unkown
page execute and read and write
276B000
stack
page read and write
2B34000
heap
page read and write
4F46000
unkown
page execute and write copy
5249000
unkown
page execute and write copy
5054000
unkown
page execute and write copy
4F86000
unkown
page execute and read and write
5141000
unkown
page execute and write copy
4E80000
unkown
page execute and read and write
578D000
unkown
page execute and write copy
57AE000
unkown
page execute and write copy
481C000
unkown
page execute and write copy
4AFE000
unkown
page execute and read and write
4E1E000
unkown
page read and write
4F58000
unkown
page execute and write copy
57AC000
unkown
page execute and read and write
6131000
direct allocation
page read and write
5C1B000
unkown
page execute and write copy
2B41000
heap
page read and write
49A2000
unkown
page execute and read and write
4F91000
unkown
page execute and write copy
4DC4000
unkown
page execute and write copy
573B000
unkown
page execute and read and write
4D8C000
unkown
page execute and read and write
52BF000
unkown
page execute and read and write
4E62000
unkown
page execute and write copy
5C8C000
unkown
page execute and write copy
555B000
unkown
page execute and read and write
594D000
unkown
page execute and write copy
49B3000
unkown
page execute and write copy
52D6000
unkown
page execute and read and write
5873000
unkown
page execute and read and write
5827000
unkown
page execute and read and write
5154000
unkown
page execute and read and write
5127000
unkown
page execute and write copy
4801000
heap
page read and write
525D000
unkown
page execute and read and write
590F000
unkown
page execute and read and write
4DF5000
unkown
page execute and write copy
4EFA000
unkown
page execute and read and write
5468000
unkown
page execute and write copy
58D1000
unkown
page execute and write copy
51AD000
unkown
page execute and write copy
51D1000
unkown
page execute and write copy
5A53000
unkown
page execute and write copy
5CCE000
unkown
page execute and write copy
13F0000
heap
page read and write
615D000
direct allocation
page read and write
4A97000
direct allocation
page read and write
50D7000
unkown
page execute and read and write
5929000
unkown
page execute and read and write
4E41000
unkown
page execute and write copy
4ADC000
unkown
page execute and write copy
5208000
unkown
page execute and write copy
5295000
unkown
page execute and read and write
48A6000
unkown
page execute and read and write
4A67000
unkown
page execute and read and write
50AB000
unkown
page execute and write copy
5E61000
heap
page read and write
4D5A000
unkown
page execute and read and write
5BDD000
unkown
page execute and read and write
4A14000
unkown
page execute and read and write
4BF7000
unkown
page execute and write copy
66C0000
heap
page read and write
4801000
heap
page read and write
58D6000
unkown
page execute and read and write
53EF000
unkown
page execute and write copy
4D5A000
unkown
page execute and write copy
2B74000
heap
page read and write
55B9000
unkown
page execute and read and write
4B11000
unkown
page execute and read and write
5170000
unkown
page execute and write copy
5105000
unkown
page execute and write copy
56BC000
unkown
page execute and write copy
4FAD000
unkown
page execute and read and write
5066000
unkown
page execute and read and write
5112000
unkown
page execute and read and write
4E0C000
unkown
page execute and read and write
2DA1000
heap
page read and write
4A0D000
unkown
page execute and read and write
5207000
unkown
page execute and write copy
59A0000
unkown
page execute and read and write
4DA4000
unkown
page execute and write copy
53B7000
unkown
page execute and read and write
533F000
unkown
page execute and read and write
50F0000
unkown
page execute and read and write
5326000
unkown
page execute and write copy
5CF8000
unkown
page execute and write copy
575D000
unkown
page execute and read and write
51EE000
unkown
page execute and read and write
4FFD000
unkown
page execute and write copy
5087000
unkown
page execute and write copy
5209000
unkown
page execute and write copy
5A9B000
unkown
page execute and read and write
4E37000
unkown
page execute and read and write
494C000
unkown
page execute and write copy
4FF8000
unkown
page execute and write copy
5626000
unkown
page execute and read and write
53C2000
unkown
page read and write
4D94000
unkown
page execute and read and write
4BE0000
unkown
page execute read
4F52000
unkown
page execute and write copy
4F04000
unkown
page execute and write copy
4E6B000
unkown
page execute and write copy
4B7B000
unkown
page execute and write copy
51AE000
unkown
page execute and read and write
45C2000
unkown
page read and write
4B68000
unkown
page execute and write copy
5F0A000
direct allocation
page read and write
5908000
unkown
page execute and write copy
49BF000
unkown
page execute and read and write
49D4000
unkown
page execute and write copy
4DFF000
unkown
page execute and write copy
4E9A000
unkown
page execute and read and write
60F6000
direct allocation
page read and write
4D81000
unkown
page execute and read and write
5046000
unkown
page execute and read and write
5171000
unkown
page execute and read and write
4F71000
unkown
page execute and write copy
50A7000
unkown
page execute and write copy
4E3A000
unkown
page execute and write copy
50FC000
unkown
page execute and write copy
45D0000
unkown
page readonly
666F000
stack
page read and write
4B51000
unkown
page execute and write copy
537C000
unkown
page execute and write copy
4C2F000
unkown
page execute and read and write
599B000
unkown
page execute and write copy
4E28000
unkown
page execute and write copy
52EC000
unkown
page execute and write copy
59C8000
unkown
page execute and read and write
575B000
unkown
page execute and read and write
5968000
unkown
page execute and read and write
2B74000
heap
page read and write
5361000
unkown
page execute and read and write
4FCC000
unkown
page execute and read and write
4E93000
unkown
page execute and read and write
525E000
unkown
page execute and read and write
4D67000
unkown
page execute and read and write
2DA1000
heap
page read and write
5A9F000
unkown
page execute and write copy
547D000
unkown
page execute and write copy
4E27000
unkown
page execute and read and write
4F1A000
unkown
page execute and read and write
4E87000
unkown
page execute and write copy
5164000
unkown
page execute and write copy
2B74000
heap
page read and write
4E63000
unkown
page execute and read and write
5063000
unkown
page execute and write copy
59B5000
unkown
page execute and write copy
4836000
unkown
page execute and write copy
2EDE000
stack
page read and write
4D8B000
unkown
page execute and write copy
47C000
stack
page read and write
4D8E000
unkown
page execute and read and write
539E000
unkown
page execute and write copy
515E000
unkown
page execute and read and write
4DD8000
unkown
page execute and read and write
588D000
unkown
page execute and read and write
2B34000
heap
page read and write
5E70000
direct allocation
page read and write
533D000
unkown
page execute and write copy
52A9000
unkown
page execute and write copy
4B1D000
unkown
page execute and read and write
5314000
unkown
page execute and read and write
52F4000
unkown
page execute and write copy
4EAF000
unkown
page execute and read and write
522F000
unkown
page execute and read and write
4EF0000
unkown
page execute and write copy
2B41000
heap
page read and write
616C000
direct allocation
page read and write
5480000
unkown
page execute and write copy
4DAF000
unkown
page execute and read and write
58B3000
unkown
page execute and write copy
4CF6000
unkown
page execute and write copy
5307000
unkown
page execute and write copy
517D000
unkown
page execute and write copy
4AAE000
unkown
page execute and write copy
4BC2000
unkown
page execute and read and write
4E31000
unkown
page execute and read and write
58B2000
unkown
page execute and read and write
524A000
unkown
page execute and write copy
49D9000
unkown
page execute and read and write
45F9000
unkown
page execute and read and write
4D96000
unkown
page execute and write copy
4E18000
unkown
page execute and write copy
5AAD000
unkown
page execute and read and write
5A69000
unkown
page execute and read and write
4E68000
unkown
page execute and read and write
4EEA000
unkown
page execute and read and write
52EA000
unkown
page execute and read and write
4F41000
unkown
page execute and write copy
51D7000
unkown
page execute and write copy
4D97000
unkown
page execute and read and write
56BD000
unkown
page execute and write copy
4E12000
unkown
page execute and write copy
4B3D000
unkown
page execute and write copy
51B3000
unkown
page execute and write copy
4801000
heap
page read and write
4AFB000
unkown
page read and write
50B2000
unkown
page execute and read and write
4B57000
unkown
page execute and write copy
4ED1000
unkown
page execute and write copy
55E1000
unkown
page execute and write copy
15C7000
heap
page read and write
5801000
unkown
page execute and write copy
4E34000
unkown
page execute and write copy
4E1E000
unkown
page execute and read and write
575F000
unkown
page execute and write copy
4C64000
unkown
page execute and read and write
598E000
unkown
page execute and read and write
5834000
unkown
page execute and write copy
49F9000
unkown
page execute and write copy
52B0000
unkown
page execute and write copy
4EAB000
unkown
page execute and write copy
4BA3000
unkown
page execute and write copy
4A48000
unkown
page execute and write copy
5668000
unkown
page execute and write copy
5376000
unkown
page execute and read and write
4A5D000
unkown
page read and write
4A98000
unkown
page execute and read and write
5288000
unkown
page execute and read and write
59F1000
unkown
page execute and read and write
4BF0000
unkown
page execute and write copy
52E6000
unkown
page execute and read and write
4DAA000
unkown
page execute and read and write
506E000
unkown
page execute and write copy
4AE8000
direct allocation
page read and write
5B61000
unkown
page execute and read and write
4D94000
unkown
page execute and write copy
5C26000
unkown
page execute and write copy
4DD0000
unkown
page execute and read and write
59E4000
unkown
page execute and write copy
13F4000
heap
page read and write
50D2000
unkown
page execute and read and write
49C0000
unkown
page execute and write copy
5256000
unkown
page execute and read and write
4ABA000
unkown
page execute and read and write
4FD8000
unkown
page execute and read and write
4E5F000
unkown
page execute and read and write
4F9C000
unkown
page execute and read and write
57F0000
unkown
page execute and write copy
4DCA000
unkown
page execute and write copy
519F000
unkown
page execute and write copy
48F2000
unkown
page execute and write copy
5879000
unkown
page execute and write copy
5674000
unkown
page execute and write copy
58FE000
unkown
page execute and write copy
4BD7000
unkown
page execute and read and write
2B41000
heap
page read and write
487D000
unkown
page execute and write copy
4F08000
unkown
page execute and write copy
591D000
unkown
page execute and write copy
13F4000
heap
page read and write
4D54000
unkown
page execute and write copy
5722000
unkown
page execute and read and write
4CF3000
unkown
page execute and read and write
574E000
unkown
page execute and read and write
51C4000
unkown
page execute and write copy
4F7A000
unkown
page execute and read and write
53A1000
unkown
page write copy
56F7000
unkown
page execute and read and write
52C2000
unkown
page execute and write copy
4D40000
unkown
page execute and write copy
58A5000
unkown
page execute and read and write
4F99000
unkown
page execute and read and write
4937000
unkown
page execute and write copy
4EB7000
unkown
page execute and write copy
599C000
unkown
page execute and read and write
5A10000
unkown
page execute and write copy
4DCE000
unkown
page execute and read and write
529E000
unkown
page execute and write copy
5334000
unkown
page execute and write copy
34AA000
heap
page read and write
51FB000
unkown
page execute and read and write
4F1D000
unkown
page execute and read and write
532A000
unkown
page execute and write copy
4A5B000
unkown
page execute and write copy
4DAE000
unkown
page execute and read and write
5304000
unkown
page execute and read and write
5218000
unkown
page execute and read and write
54DE000
unkown
page execute and write copy
5936000
unkown
page execute and read and write
49B2000
unkown
page execute and read and write
524E000
unkown
page execute and read and write
4DDC000
unkown
page execute and write copy
58B4000
unkown
page execute and read and write
532E000
unkown
page execute and write copy
2D05000
heap
page read and write
4801000
heap
page read and write
4E4B000
unkown
page execute and write copy
492E000
unkown
page execute and read and write
55A4000
unkown
page execute and write copy
5DE0000
trusted library allocation
page read and write
4AAE000
unkown
page read and write
592B000
unkown
page execute and read and write
5E61000
heap
page read and write
530E000
unkown
page execute and read and write
520B000
unkown
page execute and write copy
5397000
unkown
page read and write
53AF000
unkown
page read and write
48C5000
unkown
page execute and write copy
4E40000
unkown
page execute and read and write
4F50000
unkown
page execute and write copy
4DD7000
unkown
page execute and write copy
580D000
unkown
page execute and write copy
45B9000
unkown
page read and write
5184000
unkown
page execute and read and write
57E5000
unkown
page execute and write copy
4EC1000
unkown
page execute and read and write
6730000
heap
page read and write
5675000
unkown
page execute and read and write
60BB000
direct allocation
page read and write
4E55000
unkown
page execute and write copy
47C5000
unkown
page execute and read and write
514C000
unkown
page execute and write copy
5133000
unkown
page execute and read and write
60AA000
direct allocation
page read and write
490F000
unkown
page execute and read and write
2A70000
heap
page read and write
53C6000
unkown
page execute and write copy
53DC000
unkown
page execute and write copy
5994000
unkown
page execute and write copy
4CA8000
unkown
page execute and read and write
5BB0000
unkown
page execute and read and write
5B3F000
unkown
page execute and read and write
4801000
heap
page read and write
4F57000
unkown
page execute and read and write
4E58000
unkown
page execute and read and write
58C7000
unkown
page execute and write copy
4F78000
unkown
page execute and write copy
4BBF000
unkown
page execute and write copy
52E3000
unkown
page execute and read and write
5659000
unkown
page execute and write copy
5019000
unkown
page execute and read and write
60B5000
unkown
page readonly
4EEB000
unkown
page execute and write copy
4B23000
direct allocation
page read and write
4FA7000
unkown
page execute and read and write
4FC1000
unkown
page execute and read and write
4917000
unkown
page execute and read and write
529D000
unkown
page execute and read and write
4C30000
unkown
page execute and write copy
582A000
unkown
page execute and read and write
50EC000
unkown
page execute and read and write
5126000
unkown
page execute and read and write
5F5E000
stack
page read and write
5298000
unkown
page execute and write copy
F3B000
stack
page read and write
560A000
unkown
page execute and write copy
4921000
unkown
page execute and write copy
4C73000
unkown
page execute and write copy
4EA2000
unkown
page execute and write copy
5040000
unkown
page execute and write copy
4E21000
unkown
page execute and write copy
4B02000
unkown
page execute and write copy
5086000
unkown
page execute and read and write
5869000
unkown
page execute and read and write
4AE7000
unkown
page read and write
4CF9000
unkown
page execute and write copy
4EFE000
unkown
page execute and write copy
5BEF000
unkown
page execute and read and write
4F49000
unkown
page execute and write copy
4FC8000
unkown
page execute and read and write
4B3D000
unkown
page execute and write copy
4BDA000
unkown
page execute and read and write
55EF000
unkown
page execute and read and write
3280000
heap
page read and write
5C25000
unkown
page execute and read and write
510A000
unkown
page execute and write copy
53CF000
unkown
page execute and write copy
55E9000
unkown
page execute and write copy
5DD5000
unkown
page readonly
6731000
heap
page read and write
5138000
unkown
page execute and read and write
511B000
unkown
page execute and write copy
4F74000
unkown
page execute and read and write
5885000
unkown
page execute and read and write
2B41000
heap
page read and write
5111000
unkown
page execute and read and write
51BC000
unkown
page execute and read and write
4FB1000
unkown
page execute and write copy
15CE000
heap
page read and write
513E000
unkown
page execute and read and write
558E000
unkown
page execute and read and write
4DD2000
unkown
page execute and write copy
5118000
unkown
page execute and read and write
4D97000
unkown
page execute and read and write
2DA1000
heap
page read and write
4801000
heap
page read and write
4C6D000
unkown
page execute and read and write
5289000
unkown
page execute and write copy
4F3D000
unkown
page execute and read and write
4DBE000
unkown
page execute and write copy
4F82000
unkown
page execute and read and write
4D5F000
unkown
page execute and read and write
5299000
unkown
page execute and write copy
58ED000
unkown
page execute and write copy
5301000
unkown
page execute and write copy
4DFE000
unkown
page execute and write copy
4AE8000
unkown
page write copy
4835000
unkown
page execute and read and write
4ED1000
unkown
page execute and read and write
5321000
unkown
page execute and write copy
5140000
unkown
page execute and read and write
4610000
unkown
page write copy
4FC4000
unkown
page execute and write copy
4991000
unkown
page execute and read and write
5328000
unkown
page execute and write copy
4AFC000
unkown
page execute and read and write
5FE3000
direct allocation
page read and write
57FA000
unkown
page execute and write copy
5996000
unkown
page execute and read and write
51A2000
unkown
page execute and write copy
4AFF000
unkown
page read and write
538F000
unkown
page execute and read and write
5940000
unkown
page execute and write copy
4E3D000
unkown
page execute and write copy
5C1A000
unkown
page execute and read and write
53F1000
unkown
page execute and read and write
535A000
unkown
page execute and write copy
4A57000
unkown
page read and write
4DBF000
unkown
page execute and read and write
5347000
unkown
page execute and write copy
2D70000
heap
page read and write
59FF000
unkown
page execute and read and write
5067000
unkown
page execute and write copy
59B4000
unkown
page execute and read and write
4A50000
unkown
page execute read
57A8000
unkown
page execute and read and write
4F1B000
unkown
page execute and write copy
2B30000
heap
page read and write
5EA4000
direct allocation
page read and write
2BF4000
heap
page read and write
594B000
unkown
page execute and read and write
2BBC000
stack
page read and write
4DBA000
unkown
page execute and write copy
4CA1000
unkown
page execute and write copy
4A45000
unkown
page execute and write copy
52C4000
unkown
page execute and read and write
4D90000
unkown
page execute and write copy
533C000
unkown
page execute and read and write
4BE0000
unkown
page execute and read and write
4DEE000
unkown
page execute and read and write
52A8000
unkown
page execute and read and write
56CE000
unkown
page execute and read and write
516B000
unkown
page execute and write copy
52A4000
unkown
page execute and write copy
4FFD000
unkown
page execute and read and write
509C000
unkown
page execute and read and write
51EE000
unkown
page execute and read and write
4B66000
unkown
page execute and read and write
4E9C000
unkown
page execute and read and write
4E41000
unkown
page execute and write copy
54F5000
unkown
page execute and write copy
4E05000
unkown
page execute and read and write
45FB000
unkown
page execute and read and write
4A50000
unkown
page execute and write copy
589E000
unkown
page execute and read and write
5CAA000
unkown
page execute and read and write
4C64000
unkown
page execute and write copy
510D000
unkown
page execute and write copy
4F11000
unkown
page execute and write copy
2BF4000
heap
page read and write
4E0C000
unkown
page execute and read and write
5828000
unkown
page execute and write copy
4BEC000
unkown
page write copy
4D95000
unkown
page execute and write copy
50A4000
unkown
page execute and write copy
4A7E000
unkown
page write copy
57D9000
unkown
page execute and write copy
4B28000
unkown
page execute and write copy
2BFF000
stack
page read and write
611B000
direct allocation
page read and write
58DE000
unkown
page execute and read and write
51DC000
unkown
page execute and read and write
51A1000
unkown
page execute and read and write
4ECA000
unkown
page execute and write copy
5A7E000
unkown
page execute and write copy
4C11000
unkown
page execute and read and write
4DF7000
unkown
page execute and read and write
5F00000
heap
page read and write
5D50000
unkown
page read and write
4F73000
unkown
page execute and write copy
495D000
unkown
page execute and write copy
4FB4000
unkown
page execute and write copy
5E61000
heap
page read and write
5219000
unkown
page execute and write copy
549A000
unkown
page execute and read and write
5053000
unkown
page execute and read and write
4FDA000
unkown
page execute and read and write
2BDF000
stack
page read and write
4C63000
unkown
page execute and read and write
4D51000
unkown
page execute and write copy
50F2000
unkown
page execute and write copy
4F09000
unkown
page execute and read and write
4A37000
unkown
page execute and read and write
535B000
unkown
page execute and read and write
5E61000
heap
page read and write
49A1000
unkown
page execute and write copy
4DE2000
unkown
page execute and read and write
5143000
unkown
page execute and read and write
5051000
unkown
page execute and write copy
4C6C000
unkown
page execute and read and write
2BF4000
heap
page read and write
48CC000
unkown
page execute and write copy
5104000
unkown
page execute and read and write
4B14000
direct allocation
page read and write
5C24000
unkown
page execute and write copy
4CC8000
unkown
page execute and read and write
5376000
unkown
page execute and write copy
56AC000
unkown
page execute and write copy
2B74000
heap
page read and write
543C000
unkown
page execute and write copy
504B000
unkown
page execute and write copy
4F4F000
unkown
page execute and read and write
4A08000
unkown
page execute and read and write
5340000
unkown
page execute and write copy
4F2F000
unkown
page execute and read and write
4E25000
unkown
page execute and write copy
4FD5000
unkown
page execute and read and write
4E9F000
unkown
page execute and write copy
2BF0000
heap
page read and write
4F51000
unkown
page execute and read and write
4EF2000
unkown
page execute and read and write
5CCD000
unkown
page execute and read and write
4A72000
direct allocation
page read and write
4FB8000
unkown
page execute and write copy
5CBE000
unkown
page execute and write copy
4E03000
unkown
page execute and read and write
2DA1000
heap
page read and write
59CB000
unkown
page execute and read and write
57B5000
unkown
page execute and read and write
4C2B000
unkown
page execute and read and write
55F0000
unkown
page execute and write copy
4A12000
unkown
page execute and read and write
4B84000
unkown
page execute and write copy
58DD000
unkown
page execute and write copy
4A1A000
unkown
page execute and write copy
5990000
unkown
page execute and read and write
4CBC000
unkown
page execute and write copy
4926000
unkown
page execute and write copy
49C7000
unkown
page execute and write copy
5747000
unkown
page execute and read and write
55A5000
unkown
page execute and read and write
5BD5000
unkown
page execute and read and write
4C44000
unkown
page execute and write copy
52DA000
unkown
page execute and write copy
59BA000
unkown
page execute and read and write
5B79000
unkown
page execute and read and write
4801000
heap
page read and write
4E0D000
unkown
page execute and write copy
4E20000
unkown
page write copy
2DA1000
heap
page read and write
575C000
unkown
page execute and write copy
5758000
unkown
page execute and write copy
5471000
unkown
page execute and read and write
4C20000
unkown
page execute and write copy
5846000
unkown
page execute and write copy
4E58000
unkown
page execute and read and write
5864000
unkown
page execute and write copy
4E10000
unkown
page execute and write copy
533A000
unkown
page execute and read and write
597C000
unkown
page execute and read and write
4A7B000
unkown
page execute and read and write
51B5000
unkown
page execute and write copy
565A000
unkown
page execute and read and write
4E90000
unkown
page execute and write copy
5EDF000
direct allocation
page read and write
47C4000
unkown
page execute and write copy
4F19000
unkown
page execute and write copy
53F4000
unkown
page execute and write copy
4C57000
unkown
page execute and read and write
4A15000
unkown
page execute and write copy
4B39000
unkown
page execute and write copy
4F20000
unkown
page execute and read and write
52BD000
unkown
page execute and read and write
4CFB000
unkown
page execute and write copy
5296000
unkown
page execute and write copy
527D000
unkown
page execute and write copy
2B74000
heap
page read and write
5206000
unkown
page execute and read and write
57A1000
unkown
page execute and read and write
4F54000
unkown
page execute and read and write
53DB000
unkown
page execute and read and write
51F8000
unkown
page execute and read and write
5208000
unkown
page execute and read and write
49EF000
unkown
page execute and read and write
4E8C000
unkown
page execute and read and write
4DA1000
unkown
page execute and read and write
4900000
trusted library allocation
page read and write
5BF6000
unkown
page execute and read and write
5670000
unkown
page execute and write copy
5E62000
heap
page read and write
2B74000
heap
page read and write
4A67000
unkown
page write copy
4AF7000
unkown
page execute and write copy
4DE8000
unkown
page execute and read and write
53AC000
unkown
page execute and read and write
6D90000
heap
page read and write
588E000
unkown
page execute and write copy
5400000
unkown
page execute and write copy
4DD8000
unkown
page execute and read and write
49EB000
unkown
page execute and write copy
53CA000
unkown
page execute and read and write
52F4000
unkown
page execute and read and write
508E000
unkown
page execute and read and write
57BB000
unkown
page execute and write copy
4E6D000
unkown
page execute and read and write
51DB000
unkown
page execute and write copy
4DF8000
unkown
page execute and read and write
57F3000
unkown
page execute and write copy
50A9000
unkown
page execute and read and write
5A42000
unkown
page execute and write copy
2CA0000
heap
page read and write
5173000
unkown
page execute and read and write
4E80000
unkown
page execute and read and write
4FF8000
unkown
page execute and write copy
4B20000
unkown
page execute and read and write
493D000
unkown
page execute and read and write
4E98000
unkown
page execute and read and write
4ABC000
unkown
page execute and write copy
5090000
unkown
page execute and write copy
4801000
heap
page read and write
4E17000
unkown
page execute and write copy
48DB000
unkown
page execute and write copy
5083000
unkown
page execute and read and write
4859000
unkown
page execute and write copy
6094000
direct allocation
page read and write
5844000
unkown
page execute and read and write
55D3000
unkown
page execute and read and write
5637000
unkown
page execute and read and write
2BF4000
heap
page read and write
2DB0000
heap
page read and write
4D65000
unkown
page execute and write copy
51A4000
unkown
page execute and read and write
5019000
unkown
page execute and write copy
4FD6000
unkown
page execute and write copy
4EC2000
unkown
page execute and write copy
2AE0000
heap
page read and write
4D80000
unkown
page execute and write copy
5286000
unkown
page execute and read and write
512B000
unkown
page execute and read and write
4F91000
unkown
page execute and read and write
5E4B000
direct allocation
page read and write
4B0E000
unkown
page execute and read and write
4D7B000
unkown
page execute and write copy
4C35000
unkown
page execute and write copy
4B59000
unkown
page execute and read and write
5704000
unkown
page execute and read and write
4DEE000
unkown
page write copy
5C61000
unkown
page execute and write copy
4E4A000
unkown
page execute and read and write
4E0F000
unkown
page execute and write copy
5C8B000
unkown
page execute and read and write
2A3C000
stack
page read and write
50AF000
unkown
page execute and read and write
4B90000
unkown
page execute and write copy
50C9000
unkown
page execute and read and write
569A000
unkown
page execute and read and write
58EC000
unkown
page execute and read and write
588B000
unkown
page execute and write copy
5A74000
unkown
page execute and write copy
53F1000
unkown
page read and write
4F2A000
unkown
page execute and read and write
527C000
unkown
page execute and write copy
50C1000
unkown
page execute and read and write
4C51000
unkown
page execute and read and write
5080000
unkown
page execute and read and write
5133000
unkown
page execute and write copy
5A89000
unkown
page execute and read and write
4EBC000
unkown
page execute and read and write
525E000
unkown
page execute and write copy
508F000
unkown
page execute and read and write
55A3000
unkown
page execute and read and write
5369000
unkown
page execute and read and write
55A0000
unkown
page execute and write copy
2BF4000
heap
page read and write
4DEB000
unkown
page execute and write copy
50BE000
unkown
page execute and write copy
4C0000
heap
page read and write
45D1000
unkown
page execute read
5100000
unkown
page execute and write copy
52C8000
unkown
page execute and write copy
505A000
unkown
page execute and read and write
4DDB000
unkown
page execute and read and write
4A22000
unkown
page execute and read and write
52B1000
unkown
page execute and read and write
2AD0000
trusted library allocation
page read and write
5121000
unkown
page execute and write copy
508F000
unkown
page execute and read and write
4DAD000
unkown
page execute and read and write
4E67000
unkown
page execute and write copy
5A52000
unkown
page execute and read and write
4FE2000
unkown
page execute and write copy
4AE0000
unkown
page execute read
4E44000
unkown
page execute and read and write
2F00000
heap
page read and write
5075000
unkown
page execute and write copy
5334000
unkown
page execute and write copy
2F1E000
stack
page read and write
4FB6000
unkown
page execute and read and write
5145000
unkown
page execute and write copy
4F1E000
unkown
page execute and write copy
5948000
unkown
page execute and write copy
4E02000
unkown
page execute and write copy
50E1000
unkown
page execute and write copy
4E24000
unkown
page execute and write copy
4F82000
unkown
page execute and write copy
49E1000
unkown
page execute and write copy
4B06000
direct allocation
page read and write
4C40000
unkown
page execute and read and write
4905000
unkown
page execute and read and write
4DAF000
unkown
page execute and write copy
4D71000
unkown
page execute and read and write
52E3000
unkown
page execute and write copy
5077000
unkown
page execute and read and write
4898000
unkown
page execute and read and write
52B6000
unkown
page execute and write copy
50B2000
unkown
page execute and read and write
4E75000
unkown
page execute and read and write
4E9D000
unkown
page execute and write copy
50B4000
unkown
page execute and write copy
4EC4000
unkown
page execute and write copy
51DA000
unkown
page execute and read and write
52DD000
unkown
page execute and read and write
5144000
unkown
page execute and write copy
5855000
unkown
page execute and read and write
4EE4000
unkown
page execute and read and write
585D000
unkown
page execute and read and write
4B37000
unkown
page execute and write copy
53C9000
unkown
page execute and read and write
4DF3000
unkown
page readonly
4EF9000
unkown
page execute and write copy
34A0000
heap
page read and write
52A1000
unkown
page execute and read and write
5842000
unkown
page execute and write copy
2B34000
heap
page read and write
5147000
unkown
page execute and write copy
5057000
unkown
page execute and read and write
2D17000
heap
page read and write
5CF7000
unkown
page execute and read and write
5715000
unkown
page execute and write copy
4EE2000
unkown
page execute and read and write
5763000
unkown
page execute and write copy
53CA000
unkown
page execute and write copy
27BC000
stack
page read and write
4C52000
unkown
page execute and write copy
59C6000
unkown
page execute and write copy
58BA000
unkown
page execute and read and write
4957000
unkown
page execute and write copy
534E000
unkown
page execute and read and write
531D000
unkown
page execute and write copy
2B34000
heap
page read and write
5591000
unkown
page execute and read and write
5825000
unkown
page execute and write copy
5349000
unkown
page execute and write copy
516C000
unkown
page execute and write copy
49E9000
unkown
page execute and write copy
53BF000
unkown
page execute and write copy
5590000
unkown
page execute and write copy
4FC9000
unkown
page execute and write copy
5848000
unkown
page execute and write copy
2AF0000
heap
page read and write
57A4000
unkown
page execute and read and write
5048000
unkown
page execute and write copy
4D86000
unkown
page execute and read and write
4911000
unkown
page execute and write copy
53BE000
unkown
page write copy
4D30000
unkown
page execute and write copy
4BBD000
unkown
page execute and write copy
5248000
unkown
page execute and write copy
4A95000
unkown
page execute and read and write
5278000
unkown
page execute and read and write
4F71000
unkown
page execute read
4A3E000
unkown
page execute and read and write
50DC000
unkown
page execute and write copy
4A9A000
unkown
page execute and write copy
511B000
unkown
page execute and read and write
505C000
unkown
page execute and read and write
4C3A000
unkown
page execute and read and write
5172000
unkown
page execute and write copy
4EC0000
unkown
page execute and read and write
487E000
unkown
page execute and read and write
5147000
unkown
page execute and write copy
4BF2000
unkown
page read and write
4FF0000
unkown
page execute and read and write
51A2000
unkown
page execute and read and write
4CB8000
unkown
page execute and read and write
5212000
unkown
page execute and write copy
5125000
unkown
page execute and write copy
4CAA000
unkown
page execute and write copy
4A7D000
unkown
page read and write
5E61000
heap
page read and write
4FDF000
unkown
page execute and write copy
53F0000
unkown
page execute and read and write
4DCC000
unkown
page execute and write copy
52F2000
unkown
page execute and write copy
4B04000
unkown
page execute and read and write
5798000
unkown
page execute and read and write
5CA0000
unkown
page execute and read and write
504F000
unkown
page execute and write copy
4EA8000
unkown
page execute and write copy
4DB6000
unkown
page execute and read and write
60FD000
direct allocation
page read and write
507B000
unkown
page execute and read and write
4FB2000
unkown
page execute and read and write
4983000
unkown
page execute and write copy
521A000
unkown
page execute and read and write
53DA000
unkown
page execute and write copy
516A000
unkown
page execute and write copy
2CF3000
heap
page read and write
56A3000
unkown
page execute and read and write
48E1000
unkown
page execute and read and write
52CB000
unkown
page execute and write copy
532F000
unkown
page execute and read and write
2D78000
heap
page read and write
4E9A000
unkown
page execute and write copy
5232000
unkown
page execute and write copy
58C0000
unkown
page execute and write copy
4FD3000
unkown
page execute and read and write
532D000
unkown
page execute and read and write
5937000
unkown
page execute and write copy
4D89000
unkown
page execute and write copy
45FA000
unkown
page execute and write copy
5E8D000
direct allocation
page read and write
5224000
unkown
page execute and read and write
48E4000
unkown
page execute and read and write
5694000
unkown
page execute and write copy
5841000
unkown
page execute and read and write
498B000
unkown
page execute and write copy
4E95000
unkown
page execute and write copy
5098000
unkown
page execute and write copy
57A2000
unkown
page execute and write copy
49CA000
unkown
page execute and read and write
13F4000
heap
page read and write
598F000
unkown
page execute and write copy
5221000
unkown
page execute and read and write
4AF5000
unkown
page execute and write copy
4E3B000
unkown
page execute and write copy
45EF000
unkown
page execute and write copy
2B34000
heap
page read and write
5745000
unkown
page execute and write copy
563F000
unkown
page execute and read and write
277C000
stack
page read and write
5474000
unkown
page execute and read and write
502C000
unkown
page execute and write copy
4AF2000
unkown
page read and write
571F000
unkown
page execute and write copy
58A1000
unkown
page execute and write copy
5263000
unkown
page execute and read and write
59C4000
unkown
page execute and write copy
4F08000
unkown
page execute and write copy
2F27000
heap
page read and write
4FD6000
unkown
page execute and write copy
4883000
unkown
page execute and read and write
507D000
unkown
page execute and write copy
50E3000
unkown
page execute and read and write
543B000
unkown
page execute and read and write
49BD000
unkown
page execute and write copy
5399000
unkown
page read and write
4912000
unkown
page execute and read and write
510B000
unkown
page execute and read and write
564B000
unkown
page execute and write copy
53FB000
unkown
page execute and write copy
4D59000
unkown
page execute and write copy
4F75000
unkown
page execute and write copy
6114000
direct allocation
page read and write
59AA000
unkown
page execute and read and write
5042000
unkown
page execute and write copy
4E2E000
unkown
page execute and write copy
516A000
unkown
page execute and read and write
5C75000
unkown
page execute and read and write
13F4000
heap
page read and write
5068000
unkown
page execute and read and write
4F6F000
unkown
page execute and write copy
595B000
unkown
page execute and write copy
5680000
unkown
page execute and write copy
57F2000
unkown
page execute and read and write
4E3E000
unkown
page execute and read and write
549D000
unkown
page execute and write copy
5074000
unkown
page execute and write copy
5898000
unkown
page execute and write copy
4B3F000
unkown
page execute and write copy
57CB000
unkown
page execute and write copy
53F1000
unkown
page execute and write copy
548C000
unkown
page execute and read and write
51C7000
unkown
page execute and write copy
4D4B000
unkown
page execute and read and write
5512000
unkown
page execute and write copy
574A000
unkown
page execute and write copy
4A03000
unkown
page execute and write copy
502D000
unkown
page execute and write copy
49AB000
unkown
page execute and write copy
5405000
unkown
page execute and read and write
5577000
unkown
page execute and read and write
5350000
unkown
page execute and read and write
4EB3000
unkown
page execute and write copy
2B9E000
stack
page read and write
5A21000
unkown
page execute and write copy
5B85000
unkown
page execute and read and write
5775000
unkown
page execute and read and write
5330000
unkown
page execute and write copy
4E44000
unkown
page execute and write copy
5107000
unkown
page execute and read and write
2B74000
heap
page read and write
5656000
unkown
page execute and write copy
4A13000
unkown
page execute and write copy
53C3000
unkown
page execute and read and write
579D000
unkown
page execute and write copy
524000
heap
page read and write
4F17000
unkown
page execute and read and write
524F000
unkown
page execute and write copy
581F000
unkown
page execute and write copy
4808000
unkown
page execute and read and write
52EA000
unkown
page execute and write copy
528C000
unkown
page execute and write copy
5962000
unkown
page execute and read and write
4E9C000
unkown
page execute and read and write
5C01000
unkown
page execute and write copy
52B5000
unkown
page execute and read and write
55E8000
unkown
page execute and read and write
58C9000
unkown
page execute and read and write
48FB000
unkown
page execute and read and write
5CAB000
unkown
page execute and write copy
4BF1000
unkown
page write copy
58E4000
unkown
page execute and read and write
5234000
unkown
page execute and write copy
4A81000
unkown
page execute and write copy
53B8000
unkown
page execute and write copy
4EE7000
unkown
page execute and write copy
577D000
unkown
page execute and write copy
2B70000
heap
page read and write
576F000
unkown
page execute and write copy
51EF000
unkown
page execute and write copy
527F000
unkown
page execute and read and write
4FE8000
unkown
page execute and write copy
45CE000
unkown
page write copy
45DD000
unkown
page read and write
576A000
unkown
page execute and read and write
4DE8000
unkown
page execute and write copy
4DB3000
unkown
page execute and read and write
5317000
unkown
page execute and read and write
53C4000
unkown
page execute and write copy
5104000
unkown
page execute and read and write
53C8000
unkown
page execute and write copy
5093000
unkown
page execute and read and write
4FAE000
unkown
page execute and read and write
4FE9000
unkown
page execute and read and write
4EF2000
unkown
page execute and write copy
49EA000
unkown
page execute and read and write
52EB000
unkown
page execute and write copy
588F000
unkown
page execute and read and write
52DF000
unkown
page execute and write copy
52CE000
unkown
page execute and read and write
4978000
unkown
page execute and write copy
56FA000
unkown
page execute and write copy
4A61000
unkown
page execute and read and write
50C0000
unkown
page execute and write copy
6044000
direct allocation
page read and write
51CE000
unkown
page execute and write copy
4A68000
unkown
page execute and write copy
4DD1000
unkown
page execute and write copy
4B40000
unkown
page write copy
5CBD000
unkown
page execute and read and write
4C75000
unkown
page execute and read and write
5361000
unkown
page execute and write copy
4A8F000
unkown
page execute and write copy
4F4E000
unkown
page execute and read and write
49AC000
unkown
page execute and read and write
53DF000
unkown
page execute and read and write
5254000
unkown
page execute and read and write
5B38000
unkown
page execute and read and write
5E61000
heap
page read and write
4AAF000
unkown
page execute and read and write
4E20000
unkown
page execute and read and write
51D9000
unkown
page execute and write copy
48C7000
unkown
page execute and read and write
5189000
unkown
page execute and write copy
5E61000
heap
page read and write
4F6B000
unkown
page execute and read and write
2B74000
heap
page read and write
4FC3000
unkown
page execute and read and write
5448000
unkown
page execute and write copy
4AA1000
unkown
page execute and write copy
5310000
unkown
page execute and write copy
45E2000
unkown
page read and write
4801000
heap
page read and write
5935000
unkown
page execute and write copy
51FF000
unkown
page execute and read and write
4EFB000
unkown
page execute and write copy
517F000
unkown
page execute and write copy
5A87000
unkown
page execute and write copy
5569000
unkown
page execute and write copy
55E8000
unkown
page execute and read and write
496A000
unkown
page execute and write copy
4AC4000
direct allocation
page read and write
4F2A000
unkown
page execute and write copy
58F8000
unkown
page execute and write copy
536A000
unkown
page execute and read and write
53AE000
unkown
page write copy
2DA1000
heap
page read and write
4E88000
unkown
page execute and read and write
4B0D000
unkown
page read and write
4EE5000
unkown
page execute and write copy
4CA0000
unkown
page execute and read and write
4E5C000
unkown
page execute and write copy
547C000
unkown
page execute and read and write
267B000
stack
page read and write
5206000
unkown
page execute and read and write
5B0D000
unkown
page execute and read and write
6FBD000
direct allocation
page read and write
59D0000
unkown
page execute and write copy
4A2A000
unkown
page execute and read and write
4EE8000
unkown
page execute and read and write
5686000
unkown
page execute and read and write
26BC000
stack
page read and write
4F1B000
unkown
page execute and read and write
56DA000
unkown
page execute and write copy
526B000
unkown
page execute and write copy
4CE8000
unkown
page execute and read and write
59C0000
unkown
page execute and read and write
2B34000
heap
page read and write
4D01000
unkown
page execute and read and write
2B41000
heap
page read and write
5933000
unkown
page execute and write copy
4D3F000
unkown
page execute and read and write
5020000
unkown
page execute and write copy
4801000
heap
page read and write
5047000
unkown
page execute and read and write
5257000
unkown
page execute and write copy
4A74000
unkown
page execute and write copy
4D78000
unkown
page execute and write copy
4FA9000
unkown
page execute and write copy
13F4000
heap
page read and write
4F87000
unkown
page execute and write copy
4EA4000
unkown
page execute and read and write
15B0000
heap
page read and write
5959000
unkown
page execute and read and write
4C65000
unkown
page execute and read and write
4F3D000
unkown
page execute and read and write
4ED7000
unkown
page execute and read and write
4DB9000
unkown
page execute and read and write
4FF2000
unkown
page execute and read and write
563C000
unkown
page execute and read and write
524D000
unkown
page execute and write copy
4F4D000
unkown
page execute and read and write
2B74000
heap
page read and write
4C04000
unkown
page execute and write copy
520E000
unkown
page execute and write copy
4D66000
unkown
page execute and write copy
5003000
unkown
page execute and write copy
45F0000
unkown
page execute and read and write
4A0A000
unkown
page execute and read and write
4AB4000
unkown
page execute and write copy
4FB0000
unkown
page execute and write copy
50DB000
unkown
page execute and write copy
52B8000
unkown
page execute and read and write
5218000
unkown
page execute and read and write
5192000
unkown
page execute and write copy
4AA6000
direct allocation
page read and write
5270000
unkown
page execute and write copy
58C4000
unkown
page execute and read and write
4A92000
unkown
page execute and write copy
4D3C000
unkown
page execute and write copy
52D9000
unkown
page execute and read and write
574C000
unkown
page execute and read and write
57D7000
unkown
page execute and write copy
4F84000
unkown
page execute and write copy
2D27000
heap
page read and write
506C000
unkown
page execute and read and write
4BAA000
unkown
page execute and write copy
5373000
unkown
page execute and read and write
5C74000
unkown
page execute and write copy
52B9000
unkown
page execute and write copy
4987000
unkown
page execute and write copy
51B9000
unkown
page execute and read and write
586A000
unkown
page execute and write copy
5729000
unkown
page execute and read and write
59CA000
unkown
page execute and write copy
4E10000
unkown
page execute and write copy
52BB000
unkown
page execute and write copy
4FCF000
unkown
page execute and read and write
4C3B000
unkown
page execute and write copy
13F4000
heap
page read and write
4829000
unkown
page execute and read and write
538B000
unkown
page execute and write copy
50AF000
unkown
page execute and write copy
4DF9000
unkown
page execute and read and write
4CD6000
unkown
page execute and read and write
4801000
heap
page read and write
4EB0000
unkown
page execute and write copy
585B000
unkown
page execute and read and write
6670000
heap
page read and write
581E000
unkown
page execute and read and write
4EB6000
unkown
page execute and read and write
5321000
unkown
page execute and read and write
5167000
unkown
page execute and write copy
4DF6000
unkown
page execute and write copy
46D0000
unkown
page readonly
5328000
unkown
page execute and read and write
500C000
unkown
page execute and write copy
4E04000
unkown
page execute and write copy
5358000
unkown
page execute and write copy
5231000
unkown
page execute and read and write
5114000
unkown
page execute and write copy
4AFD000
unkown
page execute and write copy
5E9D000
direct allocation
page read and write
49DB000
unkown
page execute and write copy
15A0000
direct allocation
page execute and read and write
4D80000
unkown
page execute and write copy
5451000
unkown
page execute and write copy
51F8000
unkown
page execute and read and write
4904000
unkown
page execute and write copy
4BF6000
unkown
page execute and read and write
4DCF000
unkown
page execute and read and write
534C000
unkown
page execute and write copy
51D2000
unkown
page execute and write copy
4FA4000
unkown
page execute and read and write
4CB9000
unkown
page execute and write copy
5069000
unkown
page execute and write copy
4B12000
unkown
page execute and write copy
45BD000
unkown
page read and write
559E000
unkown
page execute and read and write
4BB1000
unkown
page execute and write copy
4A92000
unkown
page execute and write copy
4E2A000
unkown
page execute and read and write
2790000
heap
page read and write
4EA5000
unkown
page execute and write copy
4F97000
unkown
page execute and read and write
5987000
unkown
page execute and read and write
508C000
unkown
page execute and write copy
2BF4000
heap
page read and write
56CD000
unkown
page execute and write copy
4AE9000
unkown
page read and write
5A4C000
unkown
page execute and read and write
4ECD000
unkown
page execute and write copy
5817000
unkown
page execute and read and write
4872000
unkown
page execute and write copy
6002000
direct allocation
page read and write
571D000
unkown
page execute and read and write
4E3C000
unkown
page execute and read and write
5061000
unkown
page execute and write copy
4BB0000
unkown
page execute and read and write
2A10000
heap
page read and write
5104000
unkown
page execute and read and write
4DC7000
unkown
page execute and write copy
5E61000
heap
page read and write
5859000
unkown
page execute and write copy
4A7F000
unkown
page execute and write copy
511D000
unkown
page execute and write copy
4CEB000
unkown
page execute and read and write
5892000
unkown
page execute and write copy
4AF4000
unkown
page execute and read and write
4FDB000
unkown
page execute and write copy
2CAA000
heap
page read and write
504E000
unkown
page execute and write copy
4DC0000
unkown
page execute and write copy
4F48000
unkown
page execute and write copy
599E000
unkown
page execute and read and write
3250000
heap
page read and write
2B74000
heap
page read and write
4D2F000
unkown
page execute and read and write
51A1000
unkown
page execute and read and write
4E45000
unkown
page execute and read and write
4B33000
unkown
page execute and write copy
4F04000
unkown
page execute and read and write
4FA4000
unkown
page execute and write copy
56E5000
unkown
page execute and read and write
4F3A000
unkown
page execute and read and write
514D000
unkown
page execute and read and write
56C0000
unkown
page execute and write copy
4EAC000
unkown
page execute and write copy
52B0000
unkown
page execute and write copy
4EBA000
unkown
page execute and read and write
5C07000
unkown
page execute and read and write
4BDE000
unkown
page execute and write copy
52DB000
unkown
page execute and write copy
4EDD000
unkown
page execute and write copy
50E4000
unkown
page execute and write copy
551E000
unkown
page execute and write copy
48D5000
unkown
page execute and read and write
6017000
direct allocation
page read and write
4BE8000
unkown
page execute and read and write
4F61000
unkown
page execute and write copy
13F4000
heap
page read and write
523C000
unkown
page execute and read and write
4E78000
unkown
page execute and write copy
57F5000
unkown
page execute and write copy
51AD000
unkown
page execute and write copy
519B000
unkown
page execute and write copy
4DC0000
unkown
page execute read
4EF8000
unkown
page execute and read and write
57C3000
unkown
page execute and read and write
4E7E000
unkown
page execute and read and write
47C3000
unkown
page execute and read and write
57A0000
unkown
page execute and write copy
500B000
unkown
page execute and read and write
48FA000
unkown
page execute and write copy
538F000
unkown
page execute and write copy
4D7E000
unkown
page execute and read and write
596F000
unkown
page execute and read and write
4E83000
unkown
page execute and read and write
15BF000
heap
page read and write
4A79000
unkown
page execute and write copy
50CC000
unkown
page execute and read and write
4ACE000
unkown
page execute and write copy
5BDE000
unkown
page execute and write copy
51AC000
unkown
page execute and read and write
5C08000
unkown
page execute and write copy
4D87000
unkown
page execute and read and write
4ECE000
unkown
page execute and read and write
4EAB000
unkown
page execute and read and write
5FAA000
direct allocation
page read and write
4DCF000
unkown
page read and write
4A99000
unkown
page execute and write copy
560D000
unkown
page execute and read and write
52E4000
unkown
page execute and read and write
50ED000
unkown
page execute and write copy
5AAC000
unkown
page execute and write copy
5ED5000
unkown
page readonly
591F000
unkown
page execute and write copy
4FC2000
unkown
page execute and write copy
5946000
unkown
page execute and read and write
4B41000
unkown
page read and write
4E51000
unkown
page execute and write copy
4F34000
unkown
page execute and write copy
4B31000
direct allocation
page read and write
4B1F000
unkown
page execute and write copy
56EC000
unkown
page execute and write copy
516D000
unkown
page execute and read and write
5B97000
unkown
page execute and write copy
536A000
unkown
page execute and read and write
498C000
unkown
page execute and read and write
4FD1000
unkown
page execute and write copy
575E000
unkown
page execute and read and write
13F4000
heap
page read and write
5444000
unkown
page execute and write copy
4994000
unkown
page execute and read and write
56B2000
unkown
page execute and write copy
495E000
unkown
page execute and read and write
4D38000
unkown
page execute and read and write
4D9B000
unkown
page execute and read and write
4B19000
unkown
page execute and read and write
4E4E000
unkown
page execute and read and write
4E36000
unkown
page execute and write copy
4A82000
unkown
page read and write
480F000
unkown
page execute and read and write
6148000
direct allocation
page read and write
531C000
unkown
page execute and read and write
5592000
unkown
page execute and write copy
4F68000
unkown
page execute and write copy
40A1000
unkown
page execute read
517D000
unkown
page execute and write copy
57C4000
unkown
page execute and write copy
4A24000
unkown
page execute and write copy
4AB1000
unkown
page read and write
55CB000
unkown
page execute and read and write
5999000
unkown
page execute and write copy
5298000
unkown
page execute and read and write
57AA000
unkown
page execute and read and write
5329000
unkown
page execute and read and write
5187000
unkown
page execute and read and write
5239000
unkown
page execute and write copy
50FA000
unkown
page execute and read and write
5392000
unkown
page execute and read and write
15D5000
heap
page read and write
56DB000
unkown
page execute and write copy
50CA000
unkown
page execute and read and write
4D59000
unkown
page execute and write copy
4EF1000
unkown
page execute and read and write
2D4F000
stack
page read and write
2B34000
heap
page read and write
5782000
unkown
page execute and read and write
52FF000
unkown
page execute and read and write
4D2E000
unkown
page execute and write copy
545D000
unkown
page execute and write copy
52B2000
unkown
page execute and write copy
4A58000
unkown
page write copy
2DA1000
heap
page read and write
5783000
unkown
page execute and write copy
536F000
unkown
page execute and read and write
55BA000
unkown
page execute and write copy
59D7000
unkown
page execute and write copy
58BE000
unkown
page execute and read and write
58E7000
unkown
page execute and read and write
4B89000
unkown
page execute and write copy
4EC2000
unkown
page execute and read and write
510A000
unkown
page execute and read and write
2A60000
heap
page read and write
53EA000
unkown
page execute and read and write
5BB1000
unkown
page execute and write copy
4D65000
unkown
page execute and read and write
4ADA000
direct allocation
page read and write
4ADE000
unkown
page execute and read and write
13F4000
heap
page read and write
49B8000
unkown
page execute and read and write
5871000
unkown
page execute and read and write
5AC8000
unkown
page execute and read and write
55E9000
unkown
page execute and write copy
6052000
direct allocation
page read and write
4BE1000
unkown
page execute and write copy
4B2A000
direct allocation
page read and write
603D000
direct allocation
page read and write
502E000
unkown
page execute and write copy
5088000
unkown
page execute and read and write
5E61000
heap
page read and write
5351000
unkown
page execute and write copy
4BD5000
unkown
page execute and write copy
57C5000
unkown
page execute and read and write
46D1000
unkown
page execute read
4B23000
unkown
page execute and read and write
5341000
unkown
page execute and read and write
56E1000
unkown
page execute and read and write
55C6000
unkown
page execute and read and write
5057000
unkown
page execute and read and write
488F000
unkown
page execute and read and write
5E77000
direct allocation
page read and write
5232000
unkown
page execute and read and write
2B34000
heap
page read and write
5215000
unkown
page execute and write copy
5076000
unkown
page execute and write copy
4611000
unkown
page read and write
4D3F000
unkown
page execute and read and write
4FDB000
unkown
page execute and read and write
4FCB000
unkown
page execute and write copy
4BBE000
unkown
page execute and read and write
5917000
unkown
page execute and write copy
4ED5000
unkown
page execute and write copy
4C1F000
unkown
page execute and read and write
485C000
unkown
page execute and read and write
4E32000
unkown
page execute and write copy
52F1000
unkown
page execute and read and write
52AF000
unkown
page execute and read and write
585C000
unkown
page execute and write copy
5AC4000
unkown
page execute and read and write
5142000
unkown
page execute and write copy
5E86000
direct allocation
page read and write
2DA1000
heap
page read and write
51EC000
unkown
page execute and write copy
4DFD000
unkown
page execute and write copy
4A73000
unkown
page execute and read and write
5A23000
unkown
page execute and read and write
5AC9000
unkown
page execute and write copy
51A3000
unkown
page execute and write copy
13F4000
heap
page read and write
4A8A000
unkown
page execute and write copy
5219000
unkown
page execute and write copy
5809000
unkown
page execute and write copy
5115000
unkown
page execute and read and write
4A3D000
unkown
page execute and write copy
52E5000
unkown
page execute and write copy
5035000
unkown
page execute and write copy
4A8A000
unkown
page execute and write copy
2BF4000
heap
page read and write
50F6000
unkown
page execute and read and write
50E8000
unkown
page execute and write copy
51FD000
unkown
page execute and read and write
5322000
unkown
page execute and write copy
4DD0000
unkown
page execute and write copy
13F4000
heap
page read and write
5113000
unkown
page execute and read and write
515C000
unkown
page execute and write copy
5701000
unkown
page execute and write copy
4EE8000
unkown
page execute and write copy
4CF8000
unkown
page execute and read and write
590A000
unkown
page execute and read and write
52F7000
unkown
page execute and write copy
5390000
unkown
page execute and write copy
4E0A000
unkown
page execute and write copy
4FB3000
unkown
page execute and read and write
4C7E000
unkown
page execute and read and write
50A3000
unkown
page execute and read and write
13F4000
heap
page read and write
532D000
unkown
page execute and read and write
45B8000
unkown
page write copy
4DA9000
unkown
page execute and write copy
51C3000
unkown
page execute and write copy
60D2000
direct allocation
page read and write
4DCB000
unkown
page execute and read and write
4E84000
unkown
page execute and write copy
5637000
unkown
page execute and read and write
5932000
unkown
page execute and read and write
4F38000
unkown
page execute and read and write
4E73000
unkown
page execute and read and write
5708000
unkown
page execute and read and write
4E6A000
unkown
page execute and read and write
5878000
unkown
page execute and read and write
49F8000
unkown
page execute and read and write
5470000
unkown
page execute and write copy
4C14000
unkown
page execute and write copy
4C65000
unkown
page execute and write copy
4E85000
unkown
page execute and read and write
4FF0000
unkown
page execute and read and write
4541000
unkown
page execute read
4B38000
direct allocation
page read and write
4D72000
unkown
page execute and write copy
55BF000
unkown
page execute and write copy
5249000
unkown
page execute and read and write
50E0000
unkown
page execute and read and write
51C6000
unkown
page execute and read and write
45F4000
unkown
page execute and read and write
4A5C000
unkown
page write copy
4A61000
unkown
page write copy
5188000
unkown
page execute and write copy
2B74000
heap
page read and write
58A0000
unkown
page execute and read and write
50E8000
unkown
page execute and write copy
4ACB000
direct allocation
page read and write
506F000
unkown
page execute and read and write
2BF4000
heap
page read and write
2DA1000
heap
page read and write
4DB5000
unkown
page execute and write copy
5235000
unkown
page execute and write copy
583D000
unkown
page execute and read and write
5743000
unkown
page execute and read and write
4FBA000
unkown
page execute and write copy
517C000
unkown
page execute and read and write
5F8C000
direct allocation
page read and write
4D13000
unkown
page execute and read and write
5A2D000
unkown
page execute and write copy
2BBE000
stack
page read and write
5014000
unkown
page execute and read and write
4CFC000
unkown
page execute and read and write
2CFF000
heap
page read and write
5257000
unkown
page execute and read and write
56C4000
unkown
page execute and read and write
56FB000
unkown
page execute and read and write
51B2000
unkown
page execute and write copy
2D3B000
heap
page read and write
51A7000
unkown
page execute and write copy
4F16000
unkown
page execute and read and write
53EE000
unkown
page execute and read and write
52EE000
unkown
page execute and read and write
5039000
unkown
page execute and read and write
533F000
unkown
page execute and read and write
6104000
direct allocation
page read and write
4BFB000
unkown
page read and write
55C8000
unkown
page execute and write copy
500C000
unkown
page execute and write copy
4CF5000
unkown
page execute and read and write
5BBF000
unkown
page execute and read and write
5B9A000
unkown
page execute and write copy
4E8E000
unkown
page execute and write copy
505B000
unkown
page execute and write copy
5225000
unkown
page execute and write copy
4E61000
unkown
page execute and read and write
4E95000
unkown
page execute and write copy
5832000
unkown
page execute and read and write
57A7000
unkown
page execute and write copy
2B40000
heap
page read and write
4F96000
unkown
page execute and write copy
55C7000
unkown
page execute and write copy
5EC8000
direct allocation
page read and write
57F9000
unkown
page execute and read and write
56C3000
unkown
page execute and write copy
5913000
unkown
page execute and write copy
5872000
unkown
page execute and write copy
5333000
unkown
page execute and read and write
5081000
unkown
page execute and write copy
4F5F000
unkown
page execute and write copy
5ACC000
unkown
page execute and write copy
566E000
unkown
page execute and write copy
4D2E000
unkown
page execute and write copy
4D68000
unkown
page execute and write copy
5000000
unkown
page execute and write copy
4935000
unkown
page execute and write copy
4B36000
unkown
page execute and read and write
13F4000
heap
page read and write
4DBB000
unkown
page execute and read and write
50EE000
unkown
page execute and read and write
5230000
unkown
page execute and write copy
5B99000
unkown
page execute and read and write
49CC000
unkown
page execute and read and write
5212000
unkown
page execute and write copy
52D0000
unkown
page execute and read and write
5297000
unkown
page execute and read and write
2DA0000
heap
page read and write
589C000
unkown
page execute and write copy
516B000
unkown
page execute and read and write
4FE4000
unkown
page execute and read and write
53D8000
unkown
page execute and write copy
491B000
unkown
page execute and read and write
53F8000
unkown
page execute and read and write
5A45000
unkown
page execute and write copy
5190000
unkown
page execute and write copy
4F8B000
unkown
page execute and write copy
4F29000
unkown
page execute and write copy
4FA5000
unkown
page execute and write copy
48CD000
unkown
page execute and read and write
4FD9000
unkown
page execute and write copy
27A0000
heap
page read and write
52FD000
unkown
page execute and write copy
538E000
unkown
page execute and write copy
4AA8000
unkown
page execute and read and write
323C000
stack
page read and write
50FF000
unkown
page execute and read and write
2B34000
heap
page read and write
4DDF000
unkown
page read and write
536B000
unkown
page execute and write copy
5447000
unkown
page execute and read and write
6068000
direct allocation
page read and write
559A000
unkown
page execute and read and write
4801000
heap
page read and write
53C1000
unkown
page execute and write copy
4E2C000
unkown
page execute and read and write
2DA1000
heap
page read and write
4BAE000
unkown
page execute and read and write
49C2000
unkown
page execute and write copy
5716000
unkown
page execute and read and write
60B1000
direct allocation
page read and write
522E000
unkown
page execute and read and write
5010000
unkown
page execute and write copy
52EC000
unkown
page execute and write copy
5045000
unkown
page execute and read and write
2B41000
heap
page read and write
50F1000
unkown
page execute and read and write
4ED3000
unkown
page execute and write copy
59C1000
unkown
page execute and write copy
539D000
unkown
page execute and read and write
50DF000
unkown
page execute and write copy
4AF1000
unkown
page write copy
4E6E000
unkown
page execute and write copy
2A5A000
heap
page read and write
FB0000
heap
page read and write
4E31000
unkown
page execute and read and write
601F000
direct allocation
page read and write
58C1000
unkown
page execute and read and write
4E65000
unkown
page execute and write copy
5101000
unkown
page execute and read and write
489F000
unkown
page execute and read and write
4F13000
unkown
page execute and read and write
4EB2000
unkown
page execute and read and write
4DB8000
unkown
page execute and write copy
50B4000
unkown
page execute and write copy
5B2C000
unkown
page execute and write copy
53D1000
unkown
page execute and write copy
48E6000
unkown
page execute and read and write
13F4000
heap
page read and write
4C03000
unkown
page execute and read and write
49AD000
unkown
page execute and write copy
50EB000
unkown
page execute and write copy
57B1000
unkown
page execute and read and write
52D1000
unkown
page execute and write copy
4F7E000
unkown
page execute and read and write
4DC8000
unkown
page write copy
53BE000
unkown
page execute and read and write
517E000
unkown
page execute and read and write
2F20000
heap
page read and write
530C000
unkown
page execute and read and write
2FC0000
heap
page read and write
501E000
unkown
page execute and read and write
5041000
unkown
page execute and read and write
5671000
unkown
page execute and read and write
4DFE000
unkown
page execute and read and write
2B74000
heap
page read and write
2E20000
heap
page read and write
526D000
unkown
page execute and read and write
59A1000
unkown
page execute and write copy
45F2000
unkown
page execute and write copy
4DC5000
unkown
page execute and write copy
4A89000
unkown
page execute and read and write
570E000
unkown
page execute and read and write
5684000
unkown
page execute and write copy
4D99000
unkown
page execute and read and write
5487000
unkown
page execute and write copy
4F1C000
unkown
page execute and write copy
5122000
unkown
page execute and read and write
50EE000
unkown
page execute and read and write
509D000
unkown
page execute and write copy
2D50000
trusted library allocation
page read and write
510E000
unkown
page execute and write copy
2B34000
heap
page read and write
511F000
unkown
page execute and write copy
4F9E000
unkown
page execute and read and write
4E03000
unkown
page execute and read and write
551C000
unkown
page execute and read and write
4E20000
unkown
page execute and read and write
509F000
unkown
page execute and read and write
57F4000
unkown
page execute and read and write
5229000
unkown
page execute and read and write
5690000
unkown
page execute and read and write
5D0A000
unkown
page execute and read and write
4B9B000
unkown
page execute and write copy
4E6C000
unkown
page execute and read and write
4F33000
unkown
page execute and read and write
51F1000
unkown
page execute and write copy
5223000
unkown
page execute and write copy
5FB2000
direct allocation
page read and write
13F4000
heap
page read and write
4F45000
unkown
page execute and write copy
2AA0000
heap
page read and write
5176000
unkown
page execute and read and write
4E16000
unkown
page execute and read and write
4CEC000
unkown
page execute and write copy
2D1E000
heap
page read and write
590B000
unkown
page execute and write copy
4C13000
unkown
page execute and read and write
527B000
unkown
page execute and read and write
548E000
unkown
page execute and read and write
53AB000
unkown
page read and write
5988000
unkown
page execute and write copy
4D22000
unkown
page execute and write copy
4FA5000
unkown
page execute and read and write
4E64000
unkown
page execute and read and write
5919000
unkown
page execute and write copy
4B24000
unkown
page execute and write copy
4DC8000
unkown
page execute and read and write
2B74000
heap
page read and write
35E0000
trusted library allocation
page read and write
5248000
unkown
page execute and read and write
5678000
unkown
page execute and read and write
48D2000
unkown
page execute and write copy
2B74000
heap
page read and write
51D4000
unkown
page execute and read and write
5032000
unkown
page execute and write copy
45B0000
unkown
page execute read
50AB000
unkown
page execute and read and write
4801000
heap
page read and write
4E43000
unkown
page execute and read and write
272C000
stack
page read and write
6026000
direct allocation
page read and write
4D35000
unkown
page execute and read and write
5107000
unkown
page execute and read and write
4DDF000
unkown
page execute and read and write
5B6B000
unkown
page execute and write copy
50DA000
unkown
page execute and read and write
553D000
unkown
page execute and read and write
4EC1000
unkown
page execute and write copy
5394000
unkown
page execute and write copy
4D05000
unkown
page execute and read and write
5308000
unkown
page execute and read and write
50DE000
unkown
page execute and read and write
60CB000
direct allocation
page read and write
56BC000
unkown
page execute and read and write
53E5000
unkown
page execute and write copy
5370000
unkown
page execute and write copy
4F63000
unkown
page execute and write copy
487A000
unkown
page execute and read and write
4E0A000
unkown
page execute and write copy
4963000
unkown
page execute and read and write
4ECD000
unkown
page execute and write copy
4FA9000
unkown
page execute and write copy
51DE000
unkown
page execute and write copy
58F0000
unkown
page execute and write copy
4F5D000
unkown
page execute and write copy
5081000
unkown
page execute and write copy
5755000
unkown
page execute and read and write
4AB8000
unkown
page execute and write copy
4962000
unkown
page execute and write copy
56C0000
unkown
page execute and read and write
5A63000
unkown
page execute and write copy
4986000
unkown
page execute and read and write
4DED000
unkown
page read and write
4C41000
unkown
page read and write
525A000
unkown
page execute and read and write
5EBA000
direct allocation
page read and write
2B41000
heap
page read and write
5357000
unkown
page execute and read and write
4E15000
unkown
page execute and read and write
4FAF000
unkown
page execute and write copy
5784000
unkown
page execute and read and write
4BC1000
unkown
page execute and write copy
587C000
unkown
page execute and read and write
5362000
unkown
page execute and write copy
5811000
unkown
page execute and read and write
4B13000
unkown
page execute and read and write
5270000
unkown
page execute and read and write
51E8000
unkown
page execute and write copy
5662000
unkown
page execute and write copy
48F4000
unkown
page execute and read and write
2BF4000
heap
page read and write
4F4E000
unkown
page execute and write copy
5BC0000
unkown
page execute and write copy
5713000
unkown
page execute and read and write
5002000
unkown
page execute and read and write
5289000
unkown
page execute and write copy
2B34000
heap
page read and write
5276000
unkown
page execute and read and write
5406000
unkown
page execute and write copy
4E9E000
unkown
page execute and read and write
589A000
unkown
page execute and read and write
57CA000
unkown
page execute and read and write
538E000
unkown
page execute and read and write
4A93000
unkown
page execute and read and write
59A2000
unkown
page execute and read and write
2BF4000
heap
page read and write
4AD2000
unkown
page execute and read and write
5ADA000
unkown
page execute and read and write
4AED000
unkown
page execute and write copy
4E07000
unkown
page execute and read and write
4DD0000
unkown
page execute and read and write
5BBD000
unkown
page execute and write copy
5305000
unkown
page execute and write copy
52C5000
unkown
page execute and write copy
54B7000
unkown
page execute and write copy
4D8A000
unkown
page execute and read and write
4D59000
unkown
page execute and read and write
511F000
unkown
page execute and read and write
4FF5000
unkown
page execute and read and write
5627000
unkown
page execute and write copy
56DB000
unkown
page execute and read and write
4EEF000
unkown
page execute and read and write
5082000
unkown
page execute and write copy
5939000
unkown
page execute and read and write
56B5000
unkown
page execute and read and write
5A5E000
unkown
page execute and read and write
5482000
unkown
page execute and read and write
582B000
unkown
page execute and write copy
5717000
unkown
page execute and write copy
4BC0000
unkown
page execute and read and write
5688000
unkown
page execute and read and write
4E47000
unkown
page execute and read and write
4C40000
unkown
page write copy
FC0000
trusted library allocation
page read and write
4F4E000
unkown
page execute and write copy
4D8E000
unkown
page execute and read and write
5146000
unkown
page execute and read and write
4BEB000
unkown
page execute and read and write
5D45000
unkown
page execute and read and write
6164000
direct allocation
page read and write
57B8000
unkown
page execute and write copy
4A6E000
unkown
page write copy
4CFE000
unkown
page execute and write copy
556F000
unkown
page execute and read and write
508A000
unkown
page execute and read and write
4DA9000
unkown
page execute and read and write
525C000
unkown
page execute and write copy
4D1E000
unkown
page execute and read and write
4F47000
unkown
page execute and read and write
4DA6000
unkown
page execute and write copy
5280000
unkown
page execute and read and write
52E5000
unkown
page execute and read and write
4E4B000
unkown
page execute and write copy
56A5000
unkown
page execute and write copy
4F10000
unkown
page execute and read and write
4FEA000
unkown
page execute and write copy
4C24000
unkown
page execute and write copy
5796000
unkown
page execute and read and write
4DC8000
unkown
page execute and read and write
4E99000
unkown
page execute and write copy
5134000
unkown
page execute and read and write
5903000
unkown
page execute and read and write
4BE9000
unkown
page read and write
5472000
unkown
page execute and write copy
4CCE000
unkown
page execute and write copy
5ACB000
unkown
page execute and read and write
5724000
unkown
page execute and read and write
51F0000
unkown
page execute and read and write
502E000
unkown
page execute and read and write
4DA3000
unkown
page execute and read and write
5A72000
unkown
page execute and read and write
3270000
heap
page read and write
2BF4000
heap
page read and write
5B6E000
unkown
page execute and read and write
5A80000
unkown
page execute and read and write
4942000
unkown
page execute and read and write
548F000
unkown
page execute and write copy
4801000
heap
page read and write
4967000
unkown
page execute and read and write
4B82000
unkown
page execute and read and write
2BF4000
heap
page read and write
54B1000
unkown
page execute and write copy
610D000
direct allocation
page read and write
522B000
unkown
page execute and write copy
506F000
unkown
page execute and write copy
49C8000
unkown
page execute and read and write
4DD6000
unkown
page execute and read and write
4EAA000
unkown
page execute and read and write
4C15000
unkown
page execute read
5131000
unkown
page execute and write copy
2A40000
heap
page read and write
58E2000
unkown
page execute and write copy
58A5000
unkown
page readonly
50F9000
unkown
page execute and write copy
511E000
unkown
page execute and read and write
5362000
unkown
page execute and read and write
4AEE000
unkown
page write copy
5BA4000
unkown
page execute and write copy
51D6000
unkown
page execute and write copy
5160000
unkown
page execute and write copy
4C7C000
unkown
page execute and read and write
48A4000
unkown
page execute and write copy
52DF000
unkown
page execute and read and write
5B48000
unkown
page execute and write copy
50B7000
unkown
page execute and write copy
520A000
unkown
page execute and read and write
512D000
unkown
page execute and write copy
5D0B000
unkown
page execute and write copy
4AF8000
direct allocation
page read and write
4E8D000
unkown
page execute and write copy
5300000
unkown
page execute and write copy
4F50000
unkown
page execute and write copy
4E8F000
unkown
page execute and read and write
4A5D000
unkown
page execute and read and write
4F81000
unkown
page execute and read and write
5608000
unkown
page execute and read and write
4EEE000
unkown
page execute and write copy
6FF0000
heap
page read and write
4540000
unkown
page readonly
54B9000
unkown
page execute and read and write
2DA1000
heap
page read and write
5243000
unkown
page execute and write copy
2DA1000
heap
page read and write
13F4000
heap
page read and write
5A57000
unkown
page execute and write copy
592D000
unkown
page execute and write copy
4DF2000
unkown
page read and write
4B4A000
unkown
page execute and write copy
4F68000
unkown
page execute and write copy
506D000
unkown
page execute and write copy
511A000
unkown
page execute and write copy
4E57000
unkown
page execute and write copy
51CE000
unkown
page execute and write copy
5132000
unkown
page execute and read and write
488E000
unkown
page execute and write copy
4BA9000
unkown
page execute and read and write
4801000
heap
page read and write
4EDF000
unkown
page execute and write copy
505B000
unkown
page execute and write copy
4F4F000
unkown
page execute and read and write
4F01000
unkown
page execute and read and write
4C7D000
unkown
page execute and write copy
4D3A000
unkown
page execute and write copy
4CC9000
unkown
page execute and read and write
4C6E000
unkown
page execute and write copy
519A000
unkown
page execute and read and write
4DE1000
unkown
page execute and read and write
577C000
unkown
page execute and read and write
4D19000
unkown
page execute and write copy
4F18000
unkown
page execute and write copy
4E1D000
unkown
page execute and read and write
48B8000
unkown
page execute and read and write
51F9000
unkown
page execute and write copy
5568000
unkown
page execute and read and write
49B4000
unkown
page execute and read and write
503D000
unkown
page execute and write copy
53D0000
unkown
page execute and read and write
4ECB000
unkown
page execute and write copy
56C5000
unkown
page execute and write copy
5836000
unkown
page execute and read and write
51D1000
unkown
page execute and read and write
5116000
unkown
page execute and write copy
6685000
unkown
page readonly
5FEA000
direct allocation
page read and write
523A000
unkown
page execute and read and write
4D72000
unkown
page execute and write copy
51F3000
unkown
page execute and read and write
4BB9000
unkown
page execute and write copy
532E000
unkown
page execute and write copy
45C7000
unkown
page write copy
4E3F000
unkown
page execute and read and write
4F72000
unkown
page execute and read and write
5089000
unkown
page execute and read and write
2DA1000
heap
page read and write
5FB9000
direct allocation
page read and write
4E80000
unkown
page readonly
518C000
unkown
page execute and write copy
4D95000
unkown
page execute and read and write
5300000
unkown
page execute and read and write
49F7000
unkown
page execute and write copy
525B000
unkown
page execute and write copy
5096000
unkown
page execute and read and write
4E97000
unkown
page execute and write copy
56DF000
unkown
page execute and write copy
614F000
direct allocation
page read and write
2B42000
heap
page read and write
4B2C000
unkown
page execute and read and write
5AEC000
unkown
page execute and read and write
5E60000
heap
page read and write
6173000
direct allocation
page read and write
2DA1000
heap
page read and write
4FDD000
unkown
page execute and write copy
497C000
unkown
page execute and write copy
5323000
unkown
page execute and read and write
4D1A000
unkown
page execute and read and write
4B5F000
unkown
page execute and read and write
50CB000
unkown
page execute and read and write
4E08000
unkown
page execute and write copy
4BBC000
unkown
page execute and read and write
5050000
unkown
page execute and write copy
53C5000
unkown
page execute and read and write
512D000
unkown
page execute and write copy
5830000
unkown
page execute and write copy
4CB0000
unkown
page execute and write copy
4C4D000
unkown
page execute and write copy
5795000
unkown
page execute and write copy
4C8C000
unkown
page execute and read and write
4CE1000
unkown
page execute and read and write
5188000
unkown
page execute and read and write
5740000
unkown
page execute and write copy
4F32000
unkown
page execute and write copy
15BB000
heap
page read and write
4D7C000
unkown
page execute and read and write
6D1E000
stack
page read and write
49B7000
unkown
page execute and write copy
55EF000
unkown
page execute and read and write
4EF4000
unkown
page execute and write copy
545B000
unkown
page execute and write copy
2DA1000
heap
page read and write
519D000
unkown
page execute and write copy
5264000
unkown
page execute and write copy
53B7000
unkown
page execute and read and write
4E52000
unkown
page execute and read and write
4DA5000
unkown
page execute and read and write
2A20000
heap
page read and write
50EA000
unkown
page execute and read and write
2DA1000
heap
page read and write
4E3F000
unkown
page execute and write copy
508C000
unkown
page execute and write copy
4B8F000
unkown
page execute and read and write
4D7A000
unkown
page execute and read and write
4DA4000
unkown
page execute and write copy
48B9000
unkown
page execute and write copy
5197000
unkown
page execute and write copy
5972000
unkown
page execute and read and write
50A1000
unkown
page execute and read and write
49A4000
unkown
page execute and read and write
48B1000
unkown
page execute read
5158000
unkown
page execute and write copy
528F000
unkown
page execute and write copy
4F10000
unkown
page execute and write copy
57AB000
unkown
page execute and write copy
55A1000
unkown
page execute read
5122000
unkown
page execute and write copy
5020000
unkown
page execute and read and write
54DA000
unkown
page execute and write copy
4A6B000
direct allocation
page read and write
2AFA000
heap
page read and write
4FF9000
unkown
page execute and read and write
4B1C000
direct allocation
page read and write
4890000
unkown
page execute and write copy
50CB000
unkown
page execute and write copy
55A4000
unkown
page execute and read and write
4DF5000
unkown
page execute and read and write
4E1D000
unkown
page execute and write copy
4960000
unkown
page execute and write copy
51B8000
unkown
page execute and read and write
534B000
unkown
page execute and read and write
51BC000
unkown
page execute and read and write
4FC3000
unkown
page execute and read and write
5AED000
unkown
page execute and write copy
5177000
unkown
page execute and write copy
4ECC000
unkown
page execute and read and write
55ED000
unkown
page execute and write copy
51FE000
unkown
page execute and write copy
5B9B000
unkown
page execute and read and write
4A54000
unkown
page execute and write copy
4ECA000
unkown
page execute and read and write
5359000
unkown
page execute and read and write
4A82000
direct allocation
page read and write
4CD7000
unkown
page execute and write copy
4CE4000
unkown
page execute and read and write
5A7D000
unkown
page execute and read and write
2B34000
heap
page read and write
5485000
unkown
page execute and read and write
56F2000
unkown
page execute and read and write
4A70000
unkown
page execute and write copy
489D000
unkown
page execute and write copy
4DBC000
unkown
page execute and write copy
4CE9000
unkown
page execute and write copy
525A000
unkown
page execute and write copy
59B7000
unkown
page execute and read and write
607F000
direct allocation
page read and write
5241000
unkown
page execute and read and write
5348000
unkown
page execute and read and write
4A60000
unkown
page execute and write copy
5B74000
unkown
page execute and read and write
5467000
unkown
page execute and read and write
57A9000
unkown
page execute and write copy
53ED000
unkown
page execute and write copy
58D7000
unkown
page execute and write copy
566F000
unkown
page execute and read and write
2DA1000
heap
page read and write
530D000
unkown
page execute and write copy
4FED000
unkown
page execute and write copy
5951000
heap
page read and write
582E000
unkown
page execute and read and write
485E000
unkown
page execute and write copy
47B2000
unkown
page execute and write copy
4906000
unkown
page execute and write copy
4C66000
unkown
page execute and write copy
58E5000
unkown
page execute and write copy
5A5D000
unkown
page execute and write copy
5149000
unkown
page execute and read and write
53CF000
unkown
page execute and write copy
4891000
unkown
page execute and read and write
56C1000
unkown
page execute and read and write
5237000
unkown
page execute and read and write
2BF4000
heap
page read and write
5143000
unkown
page execute and read and write
537A000
unkown
page execute and read and write
6156000
direct allocation
page read and write
4A9C000
unkown
page execute and read and write
2A90000
heap
page read and write
5196000
unkown
page execute and read and write
52E7000
unkown
page execute and write copy
45E5000
unkown
page execute and write copy
508D000
unkown
page execute and write copy
52C8000
unkown
page execute and write copy
51AF000
unkown
page execute and write copy
549B000
unkown
page execute and write copy
4F40000
unkown
page execute and write copy
5B8A000
unkown
page execute and write copy
47B1000
unkown
page execute and read and write
4F38000
unkown
page execute and read and write
5EB2000
direct allocation
page read and write
4EDB000
unkown
page execute and read and write
4FB0000
unkown
page execute and read and write
4E9F000
unkown
page execute and read and write
4E78000
unkown
page execute and write copy
5B96000
unkown
page execute and read and write
2DA1000
heap
page read and write
2B74000
heap
page read and write
5781000
unkown
page execute read
551D000
unkown
page execute and write copy
567D000
unkown
page execute and write copy
4F74000
unkown
page execute and read and write
5119000
unkown
page execute and write copy
4932000
unkown
page execute and write copy
45CB000
unkown
page read and write
5FCA000
direct allocation
page read and write
5080000
unkown
page execute and read and write
4F39000
unkown
page execute and write copy
4D42000
unkown
page execute and read and write
5222000
unkown
page execute and read and write
45BC000
unkown
page write copy
4C44000
unkown
page execute read
5FFB000
direct allocation
page read and write
2D0E000
stack
page read and write
4EAD000
unkown
page execute and read and write
590D000
unkown
page execute and write copy
4E87000
unkown
page execute and write copy
4F05000
unkown
page execute and read and write
5312000
unkown
page execute and write copy
4AED000
unkown
page read and write
2BF4000
heap
page read and write
4944000
unkown
page execute and read and write
5890000
unkown
page execute and write copy
5058000
unkown
page execute and write copy
4DDE000
unkown
page write copy
496F000
unkown
page execute and write copy
511F000
unkown
page execute and read and write
4B38000
unkown
page execute and read and write
56DA000
unkown
page execute and read and write
4C07000
unkown
page read and write
56C6000
unkown
page execute and read and write
5BB8000
unkown
page execute and read and write
58F1000
unkown
page execute and read and write
4D48000
unkown
page execute and read and write
4FDF000
unkown
page execute and read and write
5008000
unkown
page execute and write copy
4C8B000
unkown
page execute and write copy
53D9000
unkown
page execute and read and write
49DD000
unkown
page execute and read and write
50E0000
unkown
page execute and read and write
5849000
unkown
page execute and read and write
4FFE000
unkown
page execute and write copy
4FAC000
unkown
page execute and read and write
5737000
unkown
page execute and write copy
27F0000
heap
page read and write
5475000
unkown
page execute and write copy
4DFD000
unkown
page execute and read and write
5346000
unkown
page execute and read and write
540E000
unkown
page execute and write copy
5850000
unkown
page execute and write copy
52BA000
unkown
page execute and read and write
4FEB000
unkown
page execute and read and write
4E6C000
unkown
page execute and write copy
4AB1000
unkown
page execute and read and write
4E9E000
unkown
page execute and write copy
5424000
unkown
page execute and write copy
4B88000
unkown
page execute and read and write
2B74000
heap
page read and write
5A5C000
unkown
page execute and read and write
4DD2000
unkown
page read and write
50D8000
unkown
page execute and write copy
5089000
unkown
page execute and write copy
53C4000
unkown
page execute and write copy
50D7000
unkown
page execute and read and write
5969000
unkown
page execute and write copy
4E00000
unkown
page execute and read and write
4B1F000
unkown
page execute and read and write
4AEF000
unkown
page read and write
4FC0000
unkown
page execute and write copy
4AB0000
unkown
page execute and write copy
4FBF000
unkown
page execute and read and write
498F000
unkown
page execute and write copy
4DD6000
unkown
page execute and read and write
4B49000
unkown
page execute and read and write
2B2E000
stack
page read and write
59F2000
unkown
page execute and write copy
4EBA000
unkown
page execute and write copy
544B000
unkown
page execute and write copy
4E14000
unkown
page execute and read and write
4E3A000
unkown
page execute and read and write
4D12000
unkown
page execute and write copy
539E000
unkown
page write copy
2B74000
heap
page read and write
4A09000
unkown
page execute and write copy
51B7000
unkown
page execute and read and write
4F07000
unkown
page execute and read and write
4C9E000
unkown
page execute and write copy
4E96000
unkown
page execute and read and write
4FA2000
unkown
page execute and write copy
4801000
heap
page read and write
56D1000
unkown
page execute and read and write
503A000
unkown
page execute and read and write
4E0B000
unkown
page execute and read and write
2C3E000
stack
page read and write
5982000
unkown
page execute and read and write
2D91000
heap
page read and write
5A6B000
unkown
page execute and write copy
58D5000
unkown
page execute and write copy
546F000
unkown
page execute and read and write
501D000
unkown
page execute and write copy
49CE000
unkown
page execute and write copy
5001000
unkown
page execute and write copy
53DB000
unkown
page execute and read and write
4A2D000
unkown
page execute and write copy
5222000
unkown
page execute and write copy
5C3F000
unkown
page execute and read and write
503D000
unkown
page execute and write copy
4D28000
unkown
page execute and write copy
52CF000
unkown
page execute and write copy
4EE6000
unkown
page execute and read and write
4933000
unkown
page execute and read and write
4FD5000
unkown
page execute and read and write
51F0000
unkown
page execute and read and write
51B1000
unkown
page execute and write copy
596E000
unkown
page execute and write copy
5200000
unkown
page execute and write copy
4BBB000
unkown
page execute and write copy
574F000
unkown
page execute and write copy
4EB3000
unkown
page execute and write copy
4FBD000
unkown
page execute and read and write
50F8000
unkown
page execute and write copy
5C8F000
unkown
page execute and read and write
2B74000
heap
page read and write
4BB4000
unkown
page execute and write copy
561F000
unkown
page execute and read and write
5389000
unkown
page execute and read and write
4B05000
unkown
page execute and write copy
5592000
unkown
page execute and write copy
53AB000
unkown
page execute and write copy
56A4000
unkown
page execute and write copy
2D55000
heap
page read and write
5247000
unkown
page execute and read and write
4F66000
unkown
page execute and write copy
49B5000
unkown
page execute and write copy
4928000
unkown
page execute and read and write
4E00000
unkown
page execute and write copy
5891000
unkown
page execute and read and write
4E05000
unkown
page execute and write copy
4FE1000
unkown
page execute and read and write
4C0D000
unkown
page read and write
534D000
unkown
page execute and write copy
5AAA000
unkown
page execute and write copy
57E8000
unkown
page execute and read and write
5A81000
unkown
page execute and write copy
4FF3000
unkown
page execute and write copy
4B2A000
unkown
page execute and read and write
5591000
unkown
page execute and read and write
2B34000
heap
page read and write
49A5000
unkown
page execute and write copy
4F27000
unkown
page execute and write copy
5053000
unkown
page execute and read and write
4F44000
unkown
page execute and read and write
533B000
unkown
page execute and write copy
2DA1000
heap
page read and write
49E0000
unkown
page execute and read and write
5195000
unkown
page execute and write copy
4B5D000
unkown
page execute and write copy
4CE5000
unkown
page execute and write copy
59B8000
unkown
page execute and write copy
2BF4000
heap
page read and write
5C73000
unkown
page execute and read and write
4F7E000
unkown
page execute and read and write
4A7C000
unkown
page execute and write copy
4D8E000
unkown
page execute and write copy
4E47000
unkown
page execute and read and write
4AD1000
unkown
page execute and write copy
51AC000
unkown
page execute and read and write
4F4D000
unkown
page execute and read and write
4F70000
unkown
page read and write
FA0000
heap
page read and write
4B93000
unkown
page execute and write copy
612A000
direct allocation
page read and write
2DA1000
heap
page read and write
59CC000
unkown
page execute and write copy
4A18000
unkown
page execute and write copy
4D50000
unkown
page execute and read and write
4EDD000
unkown
page execute and write copy
4961000
unkown
page execute and read and write
58F3000
unkown
page execute and read and write
4EAC000
unkown
page execute and write copy
2B00000
heap
page read and write
4D06000
unkown
page execute and write copy
506E000
unkown
page execute and read and write
4DC1000
unkown
page execute and read and write
4A75000
unkown
page execute and read and write
5560000
unkown
page execute and read and write
4C12000
unkown
page read and write
604B000
direct allocation
page read and write
5804000
unkown
page execute and write copy
59E3000
unkown
page execute and read and write
4FB4000
unkown
page execute and write copy
4AF0000
unkown
page execute and read and write
55EB000
unkown
page execute and read and write
4D58000
unkown
page execute and read and write
4A84000
unkown
page execute and write copy
481B000
unkown
page execute and read and write
48DD000
unkown
page execute and write copy
5410000
unkown
page read and write
5639000
unkown
page execute and write copy
5A9D000
unkown
page execute and read and write
5301000
unkown
page execute and write copy
51C2000
unkown
page execute and read and write
5171000
unkown
page execute and write copy
524F000
unkown
page execute and write copy
5017000
unkown
page execute and write copy
60A3000
direct allocation
page read and write
5019000
unkown
page execute and read and write
513B000
unkown
page execute and write copy
4DF7000
unkown
page execute and write copy
590C000
unkown
page execute and read and write
5771000
unkown
page execute and read and write
50FE000
unkown
page execute and read and write
4DDD000
unkown
page execute and write copy
53FF000
unkown
page execute and read and write
58DC000
unkown
page execute and read and write
4AFE000
unkown
page write copy
523D000
unkown
page execute and write copy
595E000
unkown
page execute and read and write
5B5E000
unkown
page execute and read and write
4950000
heap
page read and write
5390000
unkown
page execute read
50F1000
unkown
page execute and write copy
52E6000
unkown
page execute and write copy
5E94000
direct allocation
page read and write
55CC000
unkown
page execute and write copy
56BE000
unkown
page execute and read and write
4A91000
unkown
page execute and read and write
2C90000
heap
page read and write
2B34000
heap
page read and write
5F11000
direct allocation
page read and write
5AC0000
heap
page read and write
4FCA000
unkown
page execute and read and write
4E97000
unkown
page execute and read and write
5D2E000
unkown
page execute and read and write
52E4000
unkown
page execute and write copy
2A90000
direct allocation
page execute and read and write
4A85000
unkown
page execute and write copy
6122000
direct allocation
page read and write
591B000
unkown
page execute and read and write
4E5E000
unkown
page execute and read and write
4E42000
unkown
page execute and read and write
5135000
unkown
page execute and write copy
4C2C000
unkown
page execute and write copy
496E000
unkown
page execute and read and write
503C000
unkown
page execute and read and write
4F90000
unkown
page execute and read and write
5888000
unkown
page execute and read and write
5654000
unkown
page execute and write copy
4E4D000
unkown
page execute and write copy
4B99000
unkown
page execute and read and write
52BE000
unkown
page execute and write copy
4B53000
unkown
page execute and write copy
4F14000
unkown
page execute and write copy
50E0000
unkown
page execute and write copy
5177000
unkown
page execute and read and write
52C9000
unkown
page execute and read and write
4D4B000
unkown
page execute and read and write
6290000
heap
page read and write
50AE000
unkown
page execute and read and write
515B000
unkown
page execute and read and write
4E69000
unkown
page execute and write copy
4D7E000
unkown
page execute and read and write
1550000
heap
page read and write
57BD000
unkown
page execute and read and write
4DB7000
unkown
page execute and write copy
47E7000
unkown
page execute and read and write
5360000
unkown
page execute and read and write
5022000
unkown
page execute and read and write
5BD9000
unkown
page execute and write copy
4B9D000
unkown
page execute and write copy
56D5000
unkown
page execute and write copy
5792000
unkown
page execute and read and write
4FF1000
unkown
page execute and write copy
50AC000
unkown
page execute and write copy
4FD0000
unkown
page execute and write copy
53F0000
unkown
page write copy
49C4000
unkown
page execute and read and write
4ACF000
unkown
page execute and read and write
5E5B000
direct allocation
page read and write
5FD9000
direct allocation
page read and write
2B41000
heap
page read and write
4E02000
unkown
page execute and write copy
59F4000
unkown
page execute and write copy
47E8000
unkown
page execute and write copy
2B34000
heap
page read and write
4C23000
unkown
page execute and read and write
45E3000
unkown
page readonly
52E1000
unkown
page execute and write copy
2B41000
heap
page read and write
58FD000
unkown
page execute and read and write
5687000
unkown
page execute and write copy
4A29000
unkown
page execute and write copy
5A1B000
unkown
page execute and write copy
4E94000
unkown
page execute and write copy
5881000
unkown
page execute and write copy
52A3000
unkown
page execute and read and write
5AAB000
unkown
page execute and read and write
4F5A000
unkown
page execute and read and write
4A89000
unkown
page execute and read and write
4EE7000
unkown
page execute and read and write
4CBB000
unkown
page execute and read and write
54A1000
unkown
page execute read
4B4D000
unkown
page execute and write copy
4F66000
unkown
page execute and read and write
57B9000
unkown
page execute and read and write
4801000
heap
page read and write
5116000
unkown
page execute and write copy
5300000
unkown
page execute and read and write
515F000
unkown
page execute and read and write
499C000
unkown
page execute and read and write
4D51000
unkown
page execute and read and write
4F80000
unkown
page execute and write copy
4F09000
unkown
page execute and read and write
51AD000
unkown
page execute and write copy
49A3000
unkown
page execute and write copy
4915000
unkown
page execute and write copy
4C94000
unkown
page execute and write copy
4E68000
unkown
page execute and read and write
4E7B000
unkown
page execute and write copy
4CA5000
unkown
page execute and read and write
4FEA000
unkown
page execute and read and write
4A1F000
unkown
page execute and read and write
2DA1000
heap
page read and write
1580000
heap
page read and write
4BDC000
unkown
page execute and write copy
52C7000
unkown
page execute and read and write
5050000
unkown
page execute and read and write
52D8000
unkown
page execute and write copy
4E43000
unkown
page execute and write copy
4ACD000
unkown
page execute and read and write
4FF4000
unkown
page execute and read and write
2FCA000
heap
page read and write
57E3000
unkown
page execute and write copy
5492000
unkown
page execute and write copy
56F5000
unkown
page execute and write copy
536D000
unkown
page execute and write copy
564A000
unkown
page execute and read and write
2B74000
heap
page read and write
4DA6000
unkown
page execute and write copy
5BF0000
unkown
page execute and write copy
5284000
unkown
page execute and write copy
513F000
unkown
page execute and write copy
5329000
unkown
page execute and write copy
5B2B000
unkown
page execute and read and write
4B7E000
unkown
page execute and read and write
54DB000
unkown
page execute and read and write
4DE9000
unkown
page execute and write copy
5B31000
unkown
page execute and write copy
4B9C000
unkown
page execute and read and write
4EED000
unkown
page execute and read and write
521D000
unkown
page execute and read and write
13F4000
heap
page read and write
2B20000
direct allocation
page execute and read and write
4ED8000
unkown
page execute and write copy
4EDD000
unkown
page execute and read and write
4895000
unkown
page execute and read and write
5993000
unkown
page execute and read and write
5B86000
unkown
page execute and write copy
5AB7000
unkown
page execute and write copy
4EFB000
unkown
page execute and write copy
4E92000
unkown
page execute and write copy
51DA000
unkown
page execute and write copy
52DE000
unkown
page execute and write copy
2C9F000
stack
page read and write
4B1E000
unkown
page execute and write copy
4BB6000
unkown
page execute and read and write
5561000
unkown
page execute and write copy
50EB000
unkown
page execute and write copy
4A56000
unkown
page execute and read and write
48A8000
unkown
page execute and read and write
5E61000
heap
page read and write
5E52000
direct allocation
page read and write
5A24000
unkown
page execute and write copy
50CF000
unkown
page execute and read and write
49CB000
unkown
page execute and write copy
4873000
unkown
page execute and read and write
4DE0000
unkown
page execute and write copy
578B000
unkown
page execute and write copy
5742000
unkown
page execute and write copy
4A4B000
unkown
page execute and write copy
50E2000
unkown
page execute and write copy
4B0C000
unkown
page execute and read and write
12FC000
stack
page read and write
5105000
unkown
page execute and write copy
51F5000
unkown
page execute and read and write
4EB4000
unkown
page execute and read and write
5983000
unkown
page execute and write copy
5140000
unkown
page execute and read and write
56F1000
unkown
page execute and write copy
4DD7000
unkown
page write copy
539F000
unkown
page read and write
4EBF000
unkown
page execute and write copy
512A000
unkown
page execute and write copy
4A64000
unkown
page execute and read and write
57C0000
unkown
page execute and read and write
5581000
unkown
page execute and read and write
2CE6000
heap
page read and write
4894000
unkown
page execute and write copy
5A1A000
unkown
page execute and read and write
58FB000
unkown
page execute and write copy
4FE0000
unkown
page execute and write copy
473E000
unkown
page execute and write copy
64D0000
heap
page read and write
5609000
unkown
page execute and read and write
5450000
unkown
page execute and read and write
5A0F000
unkown
page execute and read and write
49B6000
unkown
page execute and read and write
4B0E000
unkown
page write copy
5CA2000
unkown
page execute and write copy
4BD4000
unkown
page execute and read and write
538D000
unkown
page execute and read and write
4F7A000
unkown
page execute and read and write
4E09000
unkown
page execute and read and write
4AE0000
unkown
page execute and write copy
4A6B000
unkown
page read and write
4D6C000
unkown
page execute and write copy
4D91000
unkown
page execute and write copy
2B54000
heap
page read and write
5774000
unkown
page execute and read and write
4AE1000
unkown
page execute and read and write
13F4000
heap
page read and write
4DE9000
unkown
page execute and read and write
5793000
unkown
page execute and write copy
55E6000
unkown
page execute and read and write
5083000
unkown
page execute and write copy
5127000
unkown
page execute and read and write
5767000
unkown
page execute and write copy
5BB7000
unkown
page execute and write copy
4D58000
unkown
page execute and read and write
4A4A000
unkown
page execute and read and write
5039000
unkown
page execute and write copy
4E01000
unkown
page execute and read and write
5092000
unkown
page execute and write copy
5AE1000
unkown
page execute and read and write
5231000
unkown
page execute and write copy
52AD000
unkown
page execute and read and write
58C3000
unkown
page execute and write copy
4A27000
unkown
page execute and read and write
4DDB000
unkown
page read and write
5682000
unkown
page execute and read and write
2DA1000
heap
page read and write
4FA3000
unkown
page execute and read and write
4DC4000
unkown
page execute and read and write
4E79000
unkown
page execute and read and write
40A0000
unkown
page readonly
4CCA000
unkown
page execute and write copy
2B74000
heap
page read and write
4A3F000
unkown
page execute and write copy
2B41000
heap
page read and write
4ECA000
unkown
page execute and read and write
5670000
unkown
page execute and write copy
5638000
unkown
page execute and write copy
503E000
unkown
page execute and read and write
4DCE000
unkown
page write copy
4F65000
unkown
page execute and read and write
4FBE000
unkown
page execute and write copy
43C000
stack
page read and write
4B1D000
unkown
page execute and read and write
5ED8000
direct allocation
page read and write
4DC7000
unkown
page read and write
4B0000
heap
page read and write
608D000
direct allocation
page read and write
4E56000
unkown
page execute and read and write
4F0E000
unkown
page execute and read and write
52E2000
unkown
page execute and read and write
4E35000
unkown
page execute and read and write
47C6000
unkown
page execute and write copy
4B13000
unkown
page readonly
58BC000
unkown
page execute and write copy
57FF000
unkown
page execute and read and write
4B3B000
unkown
page execute and read and write
4E23000
unkown
page execute and write copy
4B7F000
unkown
page execute and write copy
505F000
unkown
page execute and read and write
4F0F000
unkown
page execute and write copy
2B34000
heap
page read and write
535D000
unkown
page execute and write copy
4F48000
unkown
page execute and read and write
4E27000
unkown
page execute and read and write
4E02000
unkown
page execute and write copy
5101000
unkown
page execute and write copy
52BA000
unkown
page execute and read and write
4AD3000
unkown
page execute and write copy
4EA9000
unkown
page execute and write copy
53E1000
unkown
page execute and write copy
500E000
unkown
page execute and read and write
4F19000
unkown
page execute and write copy
5C76000
unkown
page execute and write copy
4A82000
unkown
page execute and read and write
4B29000
unkown
page execute and read and write
528F000
unkown
page execute and read and write
57B4000
unkown
page execute and write copy
2B74000
heap
page read and write
5620000
unkown
page execute and write copy
490C000
unkown
page execute and write copy
5B89000
unkown
page execute and read and write
4D38000
unkown
page execute and read and write
4E2B000
unkown
page execute and write copy
599F000
unkown
page execute and write copy
5652000
unkown
page execute and write copy
4A4E000
unkown
page execute and read and write
5340000
unkown
page execute and write copy
4EA8000
unkown
page execute and read and write
4FCD000
unkown
page execute and read and write
5B84000
unkown
page execute and write copy
460E000
unkown
page read and write
4E74000
unkown
page execute and read and write
53FC000
unkown
page execute and write copy
5378000
unkown
page execute and write copy
4801000
heap
page read and write
45DE000
unkown
page write copy
460D000
unkown
page execute and write copy
4D3B000
unkown
page execute and read and write
4BF7000
unkown
page write copy
4D8F000
unkown
page execute and read and write
4A5F000
unkown
page read and write
4AAD000
unkown
page execute and read and write
57C9000
unkown
page execute and write copy
4E66000
unkown
page execute and read and write
4FAD000
unkown
page execute and write copy
5309000
unkown
page execute and write copy
4EB7000
unkown
page execute and read and write
4AB0000
unkown
page write copy
53CD000
unkown
page execute and read and write
5655000
unkown
page execute and read and write
4AF1000
unkown
page execute and write copy
4E72000
unkown
page execute and read and write
4A3B000
unkown
page execute and read and write
2B34000
heap
page read and write
4BED000
unkown
page read and write
2B34000
heap
page read and write
4EE3000
unkown
page execute and write copy
4CFA000
unkown
page execute and read and write
5663000
unkown
page execute and read and write
602D000
direct allocation
page read and write
48B4000
unkown
page execute and write copy
5A6C000
unkown
page execute and read and write
56B4000
unkown
page execute and write copy
572C000
unkown
page execute and write copy
4EE5000
unkown
page execute and write copy
13F4000
heap
page read and write
504D000
unkown
page execute and read and write
4EFD000
unkown
page execute and read and write
5B83000
unkown
page execute and read and write
5B60000
unkown
page execute and write copy
4F5A000
unkown
page execute and read and write
6010000
direct allocation
page read and write
4E16000
unkown
page execute and read and write
48D4000
unkown
page execute and write copy
5964000
unkown
page execute and write copy
4D02000
unkown
page execute and write copy
523D000
unkown
page execute and write copy
60CF000
stack
page read and write
4F06000
unkown
page execute and write copy
4A59000
unkown
page read and write
5797000
unkown
page execute and write copy
6138000
direct allocation
page read and write
4A8D000
unkown
page execute and read and write
5807000
unkown
page execute and read and write
2A50000
heap
page read and write
5110000
unkown
page execute and read and write
4E09000
unkown
page execute and read and write
5205000
unkown
page execute and write copy
4DFD000
unkown
page execute and read and write
4EAD000
unkown
page execute and read and write
4F6F000
unkown
page execute and read and write
4ABF000
unkown
page execute and write copy
4DC3000
unkown
page execute and read and write
13F4000
heap
page read and write
4B2B000
unkown
page execute and read and write
5108000
unkown
page execute and write copy
5214000
unkown
page execute and read and write
5605000
unkown
page execute and read and write
2870000
trusted library allocation
page read and write
4F9D000
unkown
page execute and write copy
48E5000
unkown
page execute and write copy
596D000
unkown
page execute and read and write
503B000
unkown
page execute and write copy
2DA1000
heap
page read and write
58B5000
unkown
page execute and write copy
50CC000
unkown
page execute and write copy
5785000
unkown
page execute and write copy
4D2D000
unkown
page execute and read and write
5100000
unkown
page execute and read and write
537B000
unkown
page execute and read and write
572E000
unkown
page execute and read and write
581D000
unkown
page execute and write copy
5F93000
direct allocation
page read and write
5861000
unkown
page execute and write copy
4DD7000
unkown
page execute and write copy
4BB3000
unkown
page execute and read and write
5A85000
unkown
page execute and read and write
5068000
unkown
page execute and read and write
52EB000
unkown
page execute and read and write
5D30000
unkown
page execute and write copy
51E3000
unkown
page execute and read and write
2B74000
heap
page read and write
4DFD000
unkown
page execute and read and write
593D000
unkown
page execute and write copy
2B41000
heap
page read and write
522A000
unkown
page execute and read and write
4E05000
unkown
page execute and read and write
5528000
unkown
page execute and read and write
5193000
unkown
page execute and write copy
4E7B000
unkown
page execute and write copy
4F77000
unkown
page execute and read and write
4801000
heap
page read and write
4AC8000
unkown
page execute and write copy
50FF000
unkown
page execute and write copy
5989000
unkown
page execute and read and write
4E42000
unkown
page execute and read and write
4DCB000
unkown
page execute and write copy
50A0000
unkown
page execute and write copy
5BF7000
unkown
page execute and write copy
60E7000
direct allocation
page read and write
55D4000
unkown
page execute and write copy
4B60000
unkown
page execute and write copy
54A2000
unkown
page execute and read and write
4E0F000
unkown
page execute and read and write
4E21000
unkown
page execute and write copy
5215000
unkown
page execute and write copy
539D000
unkown
page read and write
45EA000
unkown
page execute and write copy
56B3000
unkown
page execute and read and write
5280000
unkown
page execute and write copy
5E7F000
direct allocation
page read and write
5185000
unkown
page execute and read and write
4BEF000
unkown
page read and write
500A000
unkown
page execute and read and write
4AB4000
unkown
page execute and read and write
4E34000
unkown
page execute and read and write
51BB000
unkown
page execute and write copy
4B18000
unkown
page execute and write copy
5B40000
unkown
page execute and write copy
51F7000
unkown
page execute and write copy
4BBA000
unkown
page execute and read and write
4F92000
unkown
page execute and write copy
4CE2000
unkown
page execute and write copy
5220000
unkown
page execute and write copy
4BEF000
unkown
page execute and read and write
4B3E000
unkown
page read and write
4DDF000
unkown
page execute and write copy
51E4000
unkown
page execute and write copy
4B50000
unkown
page execute and read and write
54A0000
unkown
page read and write
4EED000
unkown
page execute and write copy
59A3000
unkown
page execute and write copy
4801000
heap
page read and write
4D4C000
unkown
page execute and write copy
52C0000
unkown
page execute and write copy
5045000
unkown
page execute and write copy
4C9D000
unkown
page execute and read and write
2B74000
heap
page read and write
507C000
unkown
page execute and write copy
4DD1000
unkown
page write copy
4EEE000
unkown
page execute and read and write
5037000
unkown
page execute and read and write
4FD3000
unkown
page execute and write copy
51F8000
unkown
page execute and read and write
605A000
direct allocation
page read and write
49E3000
unkown
page execute and read and write
4C6D000
unkown
page execute and write copy
55BD000
unkown
page execute and read and write
51B0000
unkown
page execute and read and write
576C000
unkown
page execute and read and write
4B27000
unkown
page execute and read and write
5E61000
heap
page read and write
36D0000
heap
page read and write
4EDE000
unkown
page execute and read and write
4801000
heap
page read and write
55F9000
unkown
page execute and write copy
598A000
unkown
page execute and write copy
4DA5000
unkown
page execute and read and write
50C9000
unkown
page execute and write copy
4D37000
unkown
page execute and write copy
5255000
unkown
page execute and write copy
4CA9000
unkown
page execute and write copy
541E000
unkown
page execute and write copy
4F35000
unkown
page execute and write copy
51D9000
unkown
page execute and read and write
5277000
unkown
page execute and read and write
5B70000
unkown
page execute and write copy
56E6000
unkown
page execute and write copy
4F98000
unkown
page execute and write copy
555C000
unkown
page execute and write copy
4BEE000
unkown
page write copy
4DF5000
unkown
page execute and write copy
4809000
unkown
page execute and write copy
4DD9000
unkown
page execute and write copy
4E46000
unkown
page execute and write copy
52C4000
unkown
page execute and read and write
4E73000
unkown
page execute and write copy
5B39000
unkown
page execute and write copy
5343000
unkown
page execute and write copy
5772000
unkown
page execute and write copy
4D40000
unkown
page execute and write copy
5365000
unkown
page execute and write copy
4C77000
unkown
page execute and write copy
5A8A000
unkown
page execute and write copy
57E4000
unkown
page execute and read and write
5EE6000
direct allocation
page read and write
5306000
unkown
page execute and read and write
45B7000
unkown
page read and write
4EBF000
unkown
page execute and read and write
498A000
unkown
page execute and read and write
5F18000
direct allocation
page read and write
4DBB000
unkown
page execute and read and write
6D5F000
stack
page read and write
48A2000
unkown
page execute and read and write
58F9000
unkown
page execute and read and write
56AD000
unkown
page execute and read and write
4BE7000
unkown
page read and write
5283000
unkown
page execute and read and write
4C89000
unkown
page execute and read and write
4F8D000
unkown
page execute and read and write
4EAB000
unkown
page execute and read and write
499D000
unkown
page execute and write copy
496D000
unkown
page execute and write copy
473D000
unkown
page execute and read and write
4D9C000
unkown
page execute and write copy
55A5000
unkown
page execute and write copy
5C2A000
unkown
page execute and read and write
4D94000
unkown
page execute and read and write
4FD1000
unkown
page execute and read and write
2B34000
heap
page read and write
5085000
unkown
page execute and write copy
4C88000
unkown
page execute and write copy
485F000
unkown
page execute and read and write
4DB2000
unkown
page execute and read and write
5B68000
unkown
page execute and read and write
4A99000
unkown
page execute and read and write
4CA7000
unkown
page execute and write copy
27DC000
stack
page read and write
2B34000
heap
page read and write
51E5000
unkown
page execute and read and write
4BF9000
unkown
page read and write
5490000
unkown
page execute and read and write
57EB000
unkown
page execute and write copy
4DAA000
unkown
page execute and write copy
56D4000
unkown
page execute and read and write
4E11000
unkown
page execute and read and write
5174000
unkown
page execute and write copy
5006000
unkown
page execute and read and write
2DA1000
heap
page read and write
4802000
heap
page read and write
566F000
unkown
page execute and read and write
45CF000
unkown
page read and write
5228000
unkown
page execute and write copy
4B55000
unkown
page execute and write copy
514F000
unkown
page execute and write copy
54BA000
unkown
page execute and write copy
4E4C000
unkown
page execute and read and write
495B000
unkown
page execute and read and write
4AA6000
unkown
page execute and write copy
58AE000
unkown
page execute and write copy
4FC4000
unkown
page execute and write copy
585F000
unkown
page execute and write copy
5375000
unkown
page execute and read and write
50ED000
unkown
page execute and write copy
59C5000
unkown
page execute and read and write
541D000
unkown
page execute and read and write
5950000
heap
page read and write
50A3000
unkown
page execute and write copy
499A000
unkown
page execute and write copy
58AD000
unkown
page execute and read and write
4818000
unkown
page execute and read and write
2F2A000
heap
page read and write
55E7000
unkown
page execute and write copy
4AF6000
unkown
page execute and read and write
4C62000
unkown
page execute and write copy
57DA000
unkown
page execute and read and write
4FD8000
unkown
page execute and read and write
50D5000
unkown
page execute and write copy
2BF4000
heap
page read and write
4DD2000
unkown
page execute and read and write
54F9000
unkown
page execute and write copy
5AC5000
unkown
page execute and write copy
4F80000
unkown
page execute and write copy
50E1000
unkown
page execute and write copy
517A000
unkown
page execute and write copy
4EA5000
unkown
page execute and read and write
4F51000
unkown
page execute and write copy
4A9B000
unkown
page execute and read and write
53C3000
unkown
page readonly
505E000
unkown
page execute and read and write
6240000
heap
page read and write
6078000
direct allocation
page read and write
4D6F000
unkown
page execute and read and write
4B09000
unkown
page execute and write copy
4EDB000
unkown
page execute and write copy
50F0000
unkown
page execute and write copy
4EF0000
unkown
page execute and write copy
5025000
unkown
page execute and write copy
4FFF000
unkown
page execute and read and write
6188000
direct allocation
page read and write
5A03000
unkown
page execute and read and write
5115000
unkown
page execute and read and write
4D50000
unkown
page execute and write copy
5776000
unkown
page execute and write copy
4965000
unkown
page execute and write copy
5134000
unkown
page execute and write copy
4F4A000
unkown
page execute and read and write
599A000
unkown
page execute and read and write
4BCA000
unkown
page execute and read and write
4F1F000
unkown
page execute and write copy
4B8D000
unkown
page execute and read and write
5677000
unkown
page execute and write copy
6181000
direct allocation
page read and write
4DBC000
unkown
page execute and read and write
4F60000
unkown
page execute and read and write
13F4000
heap
page read and write
4B0D000
unkown
page execute and write copy
5191000
unkown
page execute and read and write
2BF4000
heap
page read and write
51EB000
unkown
page execute and write copy
58D4000
unkown
page execute and read and write
4ADA000
unkown
page execute and read and write
2BF4000
heap
page read and write
5207000
unkown
page execute and read and write
13F4000
heap
page read and write
4AAB000
unkown
page execute and write copy
4D71000
unkown
page execute and read and write
49A7000
unkown
page execute and read and write
4C5F000
unkown
page execute and read and write
5C60000
unkown
page execute and read and write
68B0000
heap
page read and write
53CE000
unkown
page execute and read and write
2B40000
heap
page read and write
49E4000
unkown
page execute and write copy
4F0B000
unkown
page execute and write copy
50EA000
unkown
page execute and read and write
5277000
unkown
page execute and write copy
4AD2000
direct allocation
page read and write
4D33000
unkown
page execute and write copy
4FEF000
unkown
page execute and write copy
4ED7000
unkown
page execute and read and write
2D9D000
heap
page read and write
5BA3000
unkown
page execute and read and write
4E91000
unkown
page execute and read and write
4F2B000
unkown
page execute and write copy
52E9000
unkown
page execute and read and write
45C1000
unkown
page write copy
4D67000
unkown
page execute and read and write
534F000
unkown
page execute and write copy
4F2C000
unkown
page execute and read and write
2C7F000
stack
page read and write
51BB000
unkown
page execute and write copy
5145000
unkown
page execute and read and write
53CB000
unkown
page execute and write copy
4FA0000
unkown
page execute and write copy
4D23000
unkown
page execute and read and write
521B000
unkown
page execute and write copy
5018000
unkown
page execute and read and write
13F4000
heap
page read and write
4F34000
unkown
page execute and read and write
530B000
unkown
page execute and read and write
577A000
unkown
page execute and write copy
5E61000
heap
page read and write
48EE000
unkown
page execute and read and write
4B12000
unkown
page read and write
4DA9000
unkown
page execute and write copy
571C000
unkown
page execute and write copy
2B41000
heap
page read and write
4F52000
unkown
page execute and read and write
4ED4000
unkown
page execute and read and write
5024000
unkown
page execute and write copy
4801000
heap
page read and write
4C4C000
unkown
page execute and read and write
4B24000
unkown
page execute and read and write
4882000
unkown
page execute and write copy
2C50000
heap
page read and write
4E60000
unkown
page execute and write copy
5718000
unkown
page execute and read and write
4CA9000
unkown
page execute and read and write
2C9A000
heap
page read and write
5723000
unkown
page execute and write copy
4A38000
unkown
page execute and write copy
57CE000
unkown
page execute and write copy
4614000
unkown
page execute and write copy
51BE000
unkown
page execute and write copy
32C0000
heap
page read and write
56D2000
unkown
page execute and write copy
5413000
unkown
page execute and read and write
4907000
unkown
page execute and read and write
50E4000
unkown
page execute and write copy
510C000
unkown
page execute and write copy
2B34000
heap
page read and write
4A98000
unkown
page execute and write copy
5A0B000
unkown
page execute and read and write
4801000
heap
page read and write
5728000
unkown
page execute and write copy
53C0000
unkown
page execute and read and write
4F94000
unkown
page execute and read and write
13F4000
heap
page read and write
2DA1000
heap
page read and write
5AA8000
unkown
page execute and read and write
1570000
heap
page read and write
57ED000
unkown
page execute and read and write
4F8D000
unkown
page execute and write copy
5A3F000
unkown
page execute and read and write
56FD000
unkown
page execute and read and write
2B34000
heap
page read and write
5278000
unkown
page execute and write copy
4F13000
unkown
page execute and read and write
60E0000
direct allocation
page read and write
4D73000
unkown
page execute and read and write
493C000
unkown
page execute and write copy
56A7000
unkown
page execute and read and write
5B8D000
unkown
page execute and read and write
5B52000
unkown
page execute and write copy
4E95000
unkown
page execute and read and write
4AC1000
unkown
page execute and write copy
55C9000
unkown
page execute and read and write
49D5000
unkown
page execute and read and write
4C83000
unkown
page execute and write copy
497B000
unkown
page execute and read and write
543F000
unkown
page execute and read and write
563E000
unkown
page execute and write copy
51D0000
unkown
page execute and read and write
5105000
unkown
page execute and write copy
4B07000
unkown
page execute and read and write
518F000
unkown
page execute and write copy
4B92000
unkown
page execute and read and write
4B79000
unkown
page execute and read and write
5918000
unkown
page execute and read and write
4EC4000
unkown
page execute and read and write
4C13000
unkown
page readonly
5B75000
unkown
page execute and write copy
580A000
unkown
page execute and read and write
4F67000
unkown
page execute and read and write
57EA000
unkown
page execute and read and write
4BC3000
unkown
page execute and write copy
5078000
unkown
page execute and write copy
5374000
unkown
page execute and write copy
50C4000
unkown
page execute and write copy
507A000
unkown
page execute and read and write
491A000
unkown
page execute and write copy
4B4B000
unkown
page execute and read and write
4DCD000
unkown
page read and write
4D19000
unkown
page execute and write copy
4C72000
unkown
page execute and read and write
4E7F000
unkown
page execute and write copy
4D89000
unkown
page execute and write copy
547E000
unkown
page execute and read and write
4EE4000
unkown
page execute and read and write
5916000
unkown
page execute and read and write
549C000
unkown
page execute and read and write
4DAB000
unkown
page execute and write copy
4E66000
unkown
page execute and write copy
2CAA000
heap
page read and write
5227000
unkown
page execute and read and write
54B0000
unkown
page execute and read and write
4C33000
unkown
page execute and read and write
551D000
unkown
page execute and read and write
570C000
unkown
page execute and write copy
51F4000
unkown
page execute and write copy
51F9000
unkown
page execute and write copy
55A6000
unkown
page execute and write copy
2B74000
heap
page read and write
49DF000
unkown
page execute and write copy
5B62000
unkown
page execute and write copy
5120000
unkown
page execute and read and write
4B19000
unkown
page execute and read and write
5904000
unkown
page execute and write copy
5207000
unkown
page execute and write copy
4EDC000
unkown
page execute and read and write
5EC1000
direct allocation
page read and write
4901000
unkown
page execute and read and write
4F5B000
unkown
page execute and write copy
51FF000
unkown
page execute and read and write
5264000
unkown
page execute and write copy
4C8E000
unkown
page execute and write copy
54E6000
unkown
page execute and read and write
5483000
unkown
page execute and write copy
5EF4000
direct allocation
page read and write
51CD000
unkown
page execute and read and write
501F000
unkown
page execute and read and write
4810000
unkown
page execute and write copy
4D9E000
unkown
page execute and write copy
5259000
unkown
page execute and read and write
5BB6000
unkown
page execute and read and write
58E9000
unkown
page execute and write copy
4E1B000
unkown
page execute and read and write
4DBE000
unkown
page execute and read and write
4FAB000
unkown
page execute and read and write
518F000
unkown
page execute and read and write
4B44000
unkown
page execute and write copy
4AF7000
unkown
page write copy
4E8E000
unkown
page execute and read and write
5423000
unkown
page execute and read and write
4E9B000
unkown
page execute and write copy
48F5000
unkown
page execute and write copy
51FE000
unkown
page execute and write copy
2DA1000
heap
page read and write
4AD4000
unkown
page execute and read and write
4E2F000
unkown
page execute and write copy
5220000
unkown
page execute and write copy
4DAC000
unkown
page execute and write copy
53E7000
unkown
page execute and read and write
50B8000
unkown
page execute and read and write
4A66000
unkown
page execute and write copy
4B10000
unkown
page execute and write copy
4EF6000
unkown
page execute and read and write
58EE000
unkown
page execute and read and write
50AA000
unkown
page execute and write copy
2B34000
heap
page read and write
52C0000
unkown
page execute and write copy
2B34000
heap
page read and write
4DE0000
unkown
page execute and write copy
59AB000
unkown
page execute and write copy
2BF4000
heap
page read and write
4D47000
unkown
page execute and write copy
4AA5000
unkown
page execute and read and write
4F4A000
unkown
page execute and write copy
503C000
unkown
page execute and read and write
51B4000
unkown
page execute and read and write
522A000
unkown
page execute and write copy
4ABD000
direct allocation
page read and write
51C8000
unkown
page execute and read and write
49FA000
unkown
page execute and read and write
4C87000
unkown
page execute and read and write
4DC5000
unkown
page execute and read and write
4A62000
unkown
page execute and write copy
13F4000
heap
page read and write
5A6E000
unkown
page execute and write copy
49EC000
unkown
page execute and read and write
510C000
unkown
page execute and read and write
52F0000
unkown
page execute and write copy
53FA000
unkown
page execute and read and write
52EA000
unkown
page execute and read and write
4E4B000
unkown
page execute and read and write
51A2000
unkown
page execute and write copy
4D8F000
unkown
page execute and write copy
520F000
unkown
page execute and read and write
4B3E000
unkown
page execute and read and write
4E20000
unkown
page execute and read and write
53B8000
unkown
page execute and write copy
5168000
unkown
page execute and read and write
4D74000
unkown
page execute and write copy
4C3E000
unkown
page read and write
5741000
unkown
page execute and read and write
4AE7000
unkown
page execute and write copy
4E5D000
unkown
page execute and write copy
4924000
unkown
page execute and read and write
51D5000
unkown
page execute and read and write
4D4C000
unkown
page execute and write copy
5173000
unkown
page execute and read and write
32C4000
heap
page read and write
53E8000
unkown
page execute and write copy
52AE000
unkown
page execute and read and write
5698000
unkown
page execute and read and write
4FBA000
unkown
page execute and write copy
5C40000
unkown
page execute and write copy
51F1000
unkown
page execute and write copy
45ED000
unkown
page execute and read and write
5A55000
unkown
page execute and read and write
2A20000
heap
page read and write
4D82000
unkown
page execute and write copy
595F000
unkown
page execute and write copy
51B2000
unkown
page execute and read and write
5029000
unkown
page execute and write copy
4DDD000
unkown
page execute and read and write
4E2A000
unkown
page execute and write copy
577E000
unkown
page execute and read and write
502D000
unkown
page execute and read and write
4F45000
unkown
page execute and read and write
5B0E000
unkown
page execute and write copy
52DD000
unkown
page execute and read and write
548D000
unkown
page execute and write copy
4D18000
unkown
page execute and read and write
4FDD000
unkown
page execute and read and write
5414000
unkown
page execute and write copy
50DF000
unkown
page execute and read and write
4A90000
direct allocation
page read and write
5860000
unkown
page execute and read and write
51CD000
unkown
page execute and write copy
48DE000
unkown
page execute and read and write
516E000
unkown
page execute and write copy
5115000
unkown
page execute and read and write
58A8000
unkown
page execute and write copy
5A44000
unkown
page execute and read and write
45BE000
unkown
page write copy
6061000
direct allocation
page read and write
50B4000
unkown
page execute and write copy
4EF6000
unkown
page execute and write copy
4D04000
unkown
page execute and write copy
56C1000
unkown
page execute and write copy
4D49000
unkown
page execute and write copy
50E7000
unkown
page execute and read and write
56EF000
unkown
page execute and read and write
5279000
unkown
page execute and write copy
5794000
unkown
page execute and read and write
5B8F000
unkown
page execute and write copy
4DE4000
unkown
page execute and write copy
5930000
unkown
page execute and read and write
4879000
unkown
page execute and write copy
4C41000
unkown
page execute and write copy
4DA3000
unkown
page execute and read and write
5440000
unkown
page execute and write copy
48ED000
unkown
page execute and write copy
4D0C000
unkown
page execute and read and write
5C23000
unkown
page execute and read and write
597B000
unkown
page execute and write copy
4DCF000
unkown
page execute and write copy
2710000
heap
page read and write
4ED3000
unkown
page execute and write copy
4BE3000
unkown
page execute and read and write
5211000
unkown
page execute and read and write
27F0000
heap
page read and write
578C000
unkown
page execute and read and write
54DC000
unkown
page execute and write copy
494E000
unkown
page execute and read and write
501F000
unkown
page execute and write copy
53F2000
unkown
page execute and write copy
5B7C000
unkown
page execute and write copy
4DBD000
unkown
page execute and write copy
51B9000
unkown
page execute and write copy
58AF000
unkown
page execute and read and write
4E45000
unkown
page execute and write copy
4A83000
unkown
page readonly
5BD6000
unkown
page execute and write copy
5728000
unkown
page execute and write copy
4F2E000
unkown
page execute and write copy
5234000
unkown
page execute and read and write
4E96000
unkown
page execute and write copy
4D1C000
unkown
page execute and write copy
50E5000
unkown
page execute and read and write
5077000
unkown
page execute and read and write
52F3000
unkown
page execute and read and write
4F42000
unkown
page execute and read and write
4D31000
unkown
page execute and read and write
4CCB000
unkown
page execute and read and write
4A31000
unkown
page execute and read and write
4F43000
unkown
page execute and write copy
4DBA000
unkown
page execute and write copy
4BA2000
unkown
page execute and read and write
517C000
unkown
page execute and read and write
5727000
unkown
page execute and read and write
4E45000
unkown
page execute and write copy
512B000
unkown
page execute and write copy
5691000
unkown
page execute and write copy
4CCA000
unkown
page execute and write copy
4F1F000
unkown
page execute and read and write
5A4D000
unkown
page execute and write copy
5653000
unkown
page execute and read and write
4EDE000
unkown
page execute and write copy
2A50000
trusted library allocation
page read and write
4DA7000
unkown
page execute and read and write
4CFF000
unkown
page execute and read and write
51FA000
unkown
page execute and write copy
4E8B000
unkown
page execute and read and write
4A0B000
unkown
page execute and write copy
4DD3000
unkown
page execute and read and write
4A21000
unkown
page execute and write copy
4C12000
unkown
page execute and write copy
504F000
unkown
page execute and read and write
4F7B000
unkown
page execute and write copy
5048000
unkown
page execute and write copy
4BE5000
unkown
page execute and read and write
524D000
unkown
page execute and read and write
4F21000
unkown
page execute and write copy
5B51000
unkown
page execute and read and write
4EBB000
unkown
page execute and write copy
4E1F000
unkown
page execute and write copy
2DA0000
direct allocation
page execute and read and write
512C000
unkown
page execute and read and write
4F89000
unkown
page execute and read and write
5011000
unkown
page execute and read and write
2B74000
heap
page read and write
5028000
unkown
page execute and read and write
50E1000
unkown
page execute and read and write
4BA8000
unkown
page execute and write copy
45E9000
unkown
page execute and read and write
502B000
unkown
page execute and read and write
4F49000
unkown
page execute and read and write
5049000
unkown
page execute and read and write
57C1000
unkown
page execute and write copy
5279000
unkown
page execute and read and write
54B5000
unkown
page execute and read and write
52B9000
unkown
page execute and write copy
5A9C000
unkown
page execute and write copy
51FC000
unkown
page execute and write copy
518D000
unkown
page execute and read and write
609C000
direct allocation
page read and write
518B000
unkown
page execute and read and write
268A000
heap
page read and write
5276000
unkown
page execute and write copy
5443000
unkown
page execute and read and write
53E4000
unkown
page execute and read and write
516E000
unkown
page execute and read and write
48E3000
unkown
page execute and write copy
4FD4000
unkown
page execute and write copy
55F8000
unkown
page execute and read and write
5320000
unkown
page execute and read and write
55FC000
unkown
page execute and write copy
4ABE000
unkown
page execute and read and write
4BEA000
unkown
page execute and write copy
6086000
direct allocation
page read and write
4E4A000
unkown
page execute and write copy
565A000
unkown
page execute and read and write
2DC0000
heap
page read and write
53B0000
unkown
page execute and read and write
4DB7000
unkown
page execute and read and write
50D3000
unkown
page execute and write copy
50F7000
unkown
page execute and read and write
4F90000
unkown
page execute and write copy
4E0E000
unkown
page execute and read and write
5894000
unkown
page execute and read and write
4C58000
unkown
page execute and write copy
4943000
unkown
page execute and write copy
4D70000
unkown
page execute and write copy
581B000
unkown
page execute and read and write
5900000
unkown
page execute and write copy
544A000
unkown
page execute and read and write
5D46000
unkown
page execute and write copy
5699000
unkown
page execute and write copy
5A37000
unkown
page execute and read and write
53EE000
unkown
page read and write
499E000
unkown
page execute and read and write
4AE9000
unkown
page execute and read and write
13F4000
heap
page read and write
53A2000
unkown
page read and write
2D80000
heap
page read and write
53D4000
unkown
page execute and read and write
4F84000
unkown
page execute and read and write
2B34000
heap
page read and write
28F0000
heap
page read and write
5102000
unkown
page execute and write copy
5260000
unkown
page execute and write copy
53B1000
unkown
page execute and write copy
5271000
unkown
page execute and write copy
2FCC000
stack
page read and write
5326000
unkown
page execute and read and write
4F28000
unkown
page execute and read and write
566C000
unkown
page execute and read and write
54A3000
unkown
page execute and write copy
57F8000
unkown
page execute and write copy
4CD6000
unkown
page execute and write copy
574D000
unkown
page execute and write copy
51EB000
unkown
page execute and read and write
4949000
unkown
page execute and read and write
5802000
unkown
page execute and read and write
5973000
unkown
page execute and write copy
5075000
unkown
page execute and read and write
5813000
unkown
page execute and write copy
4CD5000
unkown
page execute and read and write
4CBB000
unkown
page execute and read and write
4B6B000
unkown
page execute and read and write
59F3000
unkown
page execute and read and write
13F4000
heap
page read and write
5175000
unkown
page execute and write copy
4FCD000
unkown
page execute and write copy
573D000
unkown
page execute and write copy
5170000
unkown
page execute and read and write
617A000
direct allocation
page read and write
5F80000
direct allocation
page read and write
4BFA000
unkown
page write copy
4F15000
unkown
page execute and read and write
5A13000
unkown
page execute and read and write
4FFF000
unkown
page execute and read and write
5C00000
unkown
page execute and read and write
4EF4000
unkown
page execute and read and write
5079000
unkown
page execute and read and write
536B000
unkown
page execute and write copy
5FC0000
direct allocation
page read and write
5163000
unkown
page execute and read and write
50D3000
unkown
page execute and read and write
515B000
unkown
page execute and write copy
50BD000
unkown
page execute and read and write
56E7000
unkown
page execute and read and write
2E00000
heap
page read and write
5609000
unkown
page execute and write copy
5274000
unkown
page execute and read and write
4D81000
unkown
page execute and read and write
4B56000
unkown
page execute and read and write
4D46000
unkown
page execute and read and write
5398000
unkown
page write copy
5AAE000
unkown
page execute and write copy
49C9000
unkown
page execute and write copy
4D07000
unkown
page execute and read and write
4A52000
unkown
page execute and read and write
4E4D000
unkown
page execute and write copy
There are 3790 hidden memdumps, click here to show them.